Melanotransferrin: A “Missing Link” And A Novel Pharmacological Target For Treatment
Funder
National Health and Medical Research Council
Funding Amount
$613,848.00
Summary
Despite >30 years of research, the precise function of the protein, melanotransferrin (MTf), is unknown. However, we have breakthrough evidence that MTf stimulates WNT signalling as a major driver in cancer progression. We will investigate this hypothesis, which will underpin new cancer therapies. Indeed, we designed a new class of drugs that target the WNT pathway via up-regulating the WNT inhibitor, NDRG1. This drug (DpC) inhibits MTf expression to block tumour cell growth and metastasis.
Reasons and Rationality. The project explains how we assess the truth and falsehood of everyday claims about what people have reason to do. It also explains what legitimizes our practice of praising and blaming people for their success and failure at doing what we think they have reason to do. In so doing it provides a foundation for both our ordinary practice of holding people responsible, and for the more institutionalised counterpart of this ordinary practice in the law.
Asymptotic Geometric Analysis and Learning Theory. Learning Theory is used in various real-world applications in diverse research areas, ranging from Biology (e.g. DNA sequencing) to Information Sciences. Therefore, having a deep understanding of fundamental questions in Learning Theory, and in particular, pin-pointing the parameters that make a learning problem hard would have a significant practical impact. This projects aims to achieve this goal, and in addition, we expect it would have a hig ....Asymptotic Geometric Analysis and Learning Theory. Learning Theory is used in various real-world applications in diverse research areas, ranging from Biology (e.g. DNA sequencing) to Information Sciences. Therefore, having a deep understanding of fundamental questions in Learning Theory, and in particular, pin-pointing the parameters that make a learning problem hard would have a significant practical impact. This projects aims to achieve this goal, and in addition, we expect it would have a high theoretical value, as the questions we shall address are of independent interest to pure mathematicians.Read moreRead less
Asymptotic Geometric Analysis and Learning Theory. Learning Theory is used in various real-world applications in diverse research areas, ranging from Biology (e.g. DNA sequencing) to Information Sciences. Therefore, having a deep understanding of fundamental questions in Learning Theory, and in particular, pin-pointing the parameters that make a learning problem hard would have a significant practical impact. This projects aims to achieve this goal, and in addition, we expect it would have a hig ....Asymptotic Geometric Analysis and Learning Theory. Learning Theory is used in various real-world applications in diverse research areas, ranging from Biology (e.g. DNA sequencing) to Information Sciences. Therefore, having a deep understanding of fundamental questions in Learning Theory, and in particular, pin-pointing the parameters that make a learning problem hard would have a significant practical impact. This projects aims to achieve this goal, and in addition, we expect it would have a high theoretical value, as the questions we shall address are of independent interest to pure mathematicians.
Read moreRead less
The Role And Underlying Mechanisms Of Constitutional Epigenetic Silencing In Cancer Predisposition
Funder
National Health and Medical Research Council
Funding Amount
$218,617.00
Summary
Familial and young onset bowel and uterine cancer are usually caused by the inheritance of spelling mistakes in the genetic code within a set of cancer-protection genes. Recently, some patients were identified with their gene switched off by paralysing chemicals instead. This study aims to identify additional cancer cases with gene paralysis, determine if this arises in the presence or absence of a genetic change in front of the gene, and how gene paralysis is transmitted to the next generation.
Cohort discovery and activity mining for policy impact prediction. Cohort discovery and activity mining for policy impact prediction. This project aims to develop an intelligent systematic framework to predict policy impacts on Australian patients, by discovering inherent patient cohorts and assessing the impact of the policies on these cohorts. The proposed methods lay the theoretical foundations for building intelligent automated tools for policy assessment. Expected outcomes are data-driven p ....Cohort discovery and activity mining for policy impact prediction. Cohort discovery and activity mining for policy impact prediction. This project aims to develop an intelligent systematic framework to predict policy impacts on Australian patients, by discovering inherent patient cohorts and assessing the impact of the policies on these cohorts. The proposed methods lay the theoretical foundations for building intelligent automated tools for policy assessment. Expected outcomes are data-driven patient group discovery, which could more precisely identify the patient cohorts most likely to benefit from a specific policy; and a model to predict the efficacy of policy options, which could increase the sustainability of the national health system by enabling smarter, more efficient policy decision-making.Read moreRead less
Trust and Distrust in Social Epistemic Networks. This project aims to discover critically-needed understandings of the social causes and consequences of ‘fake news’. It will do this by investigating and mapping the relationship between ‘epistemic vices’ and people’s acceptance of misinformation and disinformation (e.g. conspiracy theories). It will bring together approaches from experimental philosophy, natural language processing, social network analysis, and normative reflection to provide new ....Trust and Distrust in Social Epistemic Networks. This project aims to discover critically-needed understandings of the social causes and consequences of ‘fake news’. It will do this by investigating and mapping the relationship between ‘epistemic vices’ and people’s acceptance of misinformation and disinformation (e.g. conspiracy theories). It will bring together approaches from experimental philosophy, natural language processing, social network analysis, and normative reflection to provide new insights regarding distrust and intellectual vice, thus significantly advancing knowledge of the ‘dark side’ of social epistemology. Results will lead to urgently required guidance regarding the features of social networks that exacerbate or buffer against the manifestation of these vices.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
The Demands of Reason. We may reason well or badly, depending on whether we satisfy two kinds of demands. We must register all and only relevant considerations and we must respond correctly to them. But ‘the demands of reason’, as described in this project, remain inadequately understood. Drawing on work from philosophy, psychology, political and legal theory, and the social sciences, this project aims to investigate the nature, power and reach of reason’s demands. It aims to shed light on what ....The Demands of Reason. We may reason well or badly, depending on whether we satisfy two kinds of demands. We must register all and only relevant considerations and we must respond correctly to them. But ‘the demands of reason’, as described in this project, remain inadequately understood. Drawing on work from philosophy, psychology, political and legal theory, and the social sciences, this project aims to investigate the nature, power and reach of reason’s demands. It aims to shed light on what they are; whether they have the positive transformative power attributed to them by enlightenment thinkers; and whether they can be adduced to explain the nature and origin of other important normative demands, such as the demands of morality, prudence and law.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less