ORCID Profile
0000-0002-1835-3475
Current Organisation
UNSW Sydney
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Information Systems | Renewable Power and Energy Systems Engineering (excl. Solar Cells) | Power and Energy Systems Engineering (excl. Renewable Power) | Information Systems Not Elsewhere Classified | Systems Theory And Control | Electrical and Electronic Engineering | Distributed Computing | Ubiquitous Computing | Conceptual Modelling | Database Management | Computer System Security | Networking and Communications | Communications Technologies | Communications Technologies Not Elsewhere Classified | Computer Communications Networks | Interorganisational Information Systems and Web Services
Communication Networks and Services not elsewhere classified | Application Tools and System Utilities | Telecommunications | Information Services not elsewhere classified | Energy Transmission and Distribution (excl. Hydrogen) | Residential Energy Conservation and Efficiency | Information services not elsewhere classified | Computer software and services not elsewhere classified | Information Processing Services (incl. Data Entry and Capture) | Information and Communication Services not elsewhere classified |
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: IEEE
Date: 16-05-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-08-2021
Publisher: IEEE
Date: 06-2014
Publisher: Wiley
Date: 09-09-2022
DOI: 10.1111/COIN.12548
Publisher: Springer International Publishing
Date: 2022
Publisher: Elsevier BV
Date: 09-2002
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-12-2022
Publisher: Association for the Advancement of Artificial Intelligence (AAAI)
Date: 03-04-2020
Publisher: IEEE
Date: 2006
Publisher: Springer Science and Business Media LLC
Date: 07-08-2023
Publisher: IEEE
Date: 2007
Publisher: Institution of Engineering and Technology (IET)
Date: 30-11-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: IEEE
Date: 10-2007
Publisher: IEEE
Date: 05-2019
Publisher: IEEE
Publisher: Oxford University Press (OUP)
Date: 19-05-2022
Abstract: Recommendation is a critical tool for developing and promoting the benefits of the Internet of Things (IoT). In recent years, recommender systems have attracted considerable attention in many IoT-related fields such as smart health, smart home, smart tourism and smart marketing. However, traditional recommender system approaches fail to exploit ever-growing, dynamic and heterogeneous IoT data in building recommender systems for the IoT (RSIoT). This article aims to provide a comprehensive review of state-of-the-art RSIoT, including the related techniques, applications and a discussion on the limitations of applying recommendation systems to IoT. Finally, we propose a reference framework for comparing existing studies to guide future research and practices.
Publisher: IEEE
Date: 09-2020
Publisher: MDPI AG
Date: 13-09-2021
DOI: 10.3390/AUTOMATION2030013
Abstract: The Internet of Things provides manufacturing with rich data for increased automation. Beyond company-internal data exploitation, the sharing of product and manufacturing process data along and across supply chains enables more efficient production flows and product lifecycle management. Even more, data-based automation facilitates short-lived ad hoc collaborations, realizing highly dynamic business relationships for sustainable exploitation of production resources and capacities. However, the sharing and use of business data across manufacturers and with end customers add requirements on data accountability, verifiability, and reliability and needs to consider security and privacy demands. While research has already identified blockchain technology as a key technology to address these challenges, current solutions mainly evolve around logistics or focus on established business relationships instead of automated but highly dynamic collaborations that cannot draw upon long-term trust relationships. We identify three open research areas on the road to such a truly accountable and dependable manufacturing enabled by blockchain technology: blockchain-inherent challenges, scenario-driven challenges, and socio-economic challenges. Especially tackling the scenario-driven challenges, we discuss requirements and options for realizing a blockchain-based trustworthy information store and outline its use for automation to achieve a reliable sharing of product information, efficient and dependable collaboration, and dynamic distributed markets without requiring established long-term trust.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-08-2020
Publisher: IEEE
Date: 07-2018
Publisher: Wiley
Date: 17-05-2011
DOI: 10.1002/WCM.1143
Publisher: ACM
Date: 12-04-2010
Publisher: IEEE
Date: 16-11-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2018
Publisher: IEEE
Date: 11-2018
Publisher: MDPI AG
Date: 23-07-2021
DOI: 10.20944/PREPRINTS202107.0545.V1
Abstract: The Unmanned Aerial Vehicles (UAVs), used in civilian applications such as emergency medical deliveries, precision agriculture, wireless communication provisioning, etc., face the challenge of limited flight time due to their reliance on the on-board battery. Therefore, developing efficient mechanisms for in-situ power transfer to recharge UAV batteries hold potential in extending their mission time. In this paper, we study the use of far-field wireless power transfer (WPT) technique from specialized, transmitter UAVs (tUAVs) carrying Multiple Input Multiple Output (MIMO) antennas for transferring wireless power to receiver UAVs (rUAVs) in a mission. The tUAVs can fly and adjust their distance to the rUAVs to maximize energy transfer. The use of MIMO antennas further boost the energy reception by narrowing the energy beam toward the rUAVs. The complexity of their dynamic operating environment increases with the growing number of tUAVs, and rUAVs with varying levels of energy consumption and residual power. We propose an intelligent trajectory selection algorithm for the tUAVs based on a deep reinforcement learning model called Proximal Policy Optimization (PPO) to optimize the energy transfer gain. Simulation results demonstrate that with the use of PPO, the system achieves a tenfold flight time extension compared to no wireless recharging. Further, PPO outperforms the benchmark movement strategies of & rsquo Traveling Salesman Problem& rsquo and & rsquo Low Battery First& rsquo when used by the tUAVs.
Publisher: Association for Computing Machinery (ACM)
Date: 23-06-2023
DOI: 10.1145/3578555
Abstract: Public auditing and data deduplication are integral considerations in providing efficient and secure cloud storage services. Nevertheless, the traditional data deduplication models that support public auditing can endure the enormous waste of storage and computation resources induced through data redundancy and repeated audit work by multiple tenants on trusted third-party auditor (TPA). In this work, we introduce blockchain-based secure decentralized public auditing in a decentralized cloud storage with an efficient deduplication model. We employ blockchain to take on the task of centralized TPA, which also mitigates the implications of malicious blockchain miners by using the concept of a decentralized autonomous organization (DAO). Specifically, we employ the idea of redactability for blockchain to handle often neglected security issues that would adversely affect the integrity of stored auditing records on blockchain in decentralized auditing models. However, the proposed model also employs an efficient deduplication scheme to attain adequate storage savings while preserving the users from data loss due to duplicate faking attacks. Moreover, the detailed concrete security analysis demonstrates the computational infeasibility of the proposed model against proof-of-ownership, duplicate faking attack (DFA), collusion attack, storage free-riding attack, data privacy, and forgery attack with high efficiency. Finally, the comprehensive performance analysis shows the scalability and feasibility of the proposed model.
Publisher: IEEE
Date: 10-2017
DOI: 10.1109/LCN.2017.63
Publisher: IEEE
Date: 07-2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-11-2020
DOI: 10.36227/TECHRXIV.12952073
Abstract: Targeted advertising has transformed the marketing trend for any business by creating new opportunities for advertisers to reach prospective customers by delivering them personalised ads using an infrastructure of a variety of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process and trade a rich amount of user's personal data, which has prompted serious privacy concerns among in iduals and organisations. This article presents a detailed survey of privacy risks including the information flow between advertising platform and ad/analytics networks, the profiling process, the advertising sources and criteria, the measurement analysis of targeted advertising based on user's interests and profiling context and ads delivery process in both in-app and in-browser targeted ads. We provide detailed discussion of challenges in preserving user privacy that includes privacy threats posed by the advertising and analytics companies, how private information is extracted and exchanged among various advertising entities, privacy threats from third-party tracking, re-identification of private information and associated privacy risks, in addition to, overview data and tracking sharing technologies. Following, we present various techniques for preserving user privacy and a comprehensive analysis of various proposals founded on those techniques and compare them based on the underlying architectures, the privacy mechanisms and the deployment scenarios. Finally we discuss some potential research challenges and open research issues. br
Publisher: Springer Science and Business Media LLC
Date: 24-12-2022
DOI: 10.1007/S10207-022-00655-X
Abstract: Targeted advertising has transformed the marketing landscape for a wide variety of businesses, by creating new opportunities for advertisers to reach prospective customers by delivering personalised ads, using an infrastructure of a number of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process, and trade a vast amount of users’ personal data, which has prompted serious privacy concerns among both in iduals and organisations. This article presents a comprehensive survey of the privacy risks and proposed solutions for targeted advertising in a mobile environment. We outline details of the information flow between the advertising platform and ad/analytics networks, the profiling process, the measurement analysis of targeted advertising based on user’s interests and profiling context, and the ads delivery process, for both in-app and in-browser targeted ads we also include an overview of data sharing and tracking technologies. We discuss challenges in preserving the mobile user’s privacy that include threats related to private information extraction and exchange among various advertising entities, privacy threats from third-party tracking, re-identification of private information and associated privacy risks. Subsequently, we present various techniques for preserving user privacy and a comprehensive analysis of the proposals based on such techniques we compare the proposals based on the underlying architectures, privacy mechanisms, and deployment scenarios. Finally, we discuss the potential research challenges and open research issues.
Publisher: IEEE
Date: 10-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2007
DOI: 10.1109/TC.2007.1062
Publisher: Informa UK Limited
Date: 16-05-2014
DOI: 10.4161/EPI.29222
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2010
Publisher: Springer International Publishing
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2019
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2026
Publisher: Elsevier BV
Date: 06-2017
Publisher: Elsevier BV
Date: 06-2013
Publisher: Springer International Publishing
Date: 2021
Publisher: IGI Global
Date: 2021
DOI: 10.4018/978-1-7998-5839-3.CH004
Abstract: Blockchain has emerged as a technology that can change the way people and systems interact, providing mechanisms that ensure integrity and ownership of the data produced without reliance on a trusted third-party. Appendable-block blockchain is a novel instantiation that suits for solutions that require a high transaction throughput. Appendable-block blockchains focus on data produced by nodes instead of a relation (transaction) between two entities. This new kind of blockchain can improve how data are stored and managed in distributed systems. This chapter introduces the notion of appendable-block blockchain and exemplifies its applicability in multiple practical domains. Additionally, the authors provide a discussion on the security aspects of this new blockchain. Finally, the chapter presents current issues and possible future directions for appendable-block blockchains.
Publisher: CRC Press
Date: 08-11-2011
DOI: 10.1201/B11309-9
Publisher: No publisher found
Date: 2020
Publisher: Elsevier BV
Date: 02-2015
Publisher: ACM
Date: 02-11-2015
Publisher: IEEE
Date: 06-2015
Publisher: Elsevier BV
Date: 03-2022
Publisher: ACM
Date: 12-11-2020
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2007
Publisher: IEEE
Date: 2016
Publisher: Wiley
Date: 07-09-2014
DOI: 10.1002/CPE.3366
Publisher: IEEE
Date: 08-2022
Publisher: Elsevier BV
Date: 05-2020
Publisher: Informa UK Limited
Date: 12-2001
Abstract: Transcription of interview data is a common practice in qualitative health research. However, there has been little discussion of the techniques of transcription and the issues inherent in the use of transcription as a strategy for managing qualitative data in nursing publications. The process of transcription may disclose or obscure certain information. Researchers need to question practices of transcription that have been taken for granted and make transparent the processes used to preserve the integrity of data. This paperfirst examines research reported in nursing and allied health journals employing interviews for data collection and the attention given to the transcription phase. It then deals with issues of concern regarding the transcription of interviews, and offers suggestions for promoting validity.
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.76
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2017
DOI: 10.1109/MC.2017.82
Publisher: Association for Computing Machinery (ACM)
Date: 27-08-2019
DOI: 10.1145/3300229
Abstract: Twitter is an important source of information that people frequently contribute to and rely on for emerging topics, public opinions, and event awareness. Crisis-relevant tweets can potentially avail a magnitude of applications such as helping authorities and governments become aware of situations and thus offer better responses. One major challenge toward crisis-awareness in Twitter is to identify those tweets that are relevant to unseen crises. In this article, we propose an automatic labeling approach to distinguishing crisis-relevant tweets while differentiating source types (e.g., government or personal accounts) simultaneously. We first analyze and identify tweet-specific linguistic, sentimental, and emotional features based on statistical topic modeling. Then, we design a novel correlative convolutional neural network which uses a shared hidden layer to learn effective representations of the multi-faceted features. The model can discover salient information while being robust to the variations and noises in tweets and sources. To obtain a bird’s-eye view of a crisis event, we further develop an approach to automatically summarize key information of identified tweets. Empirical evaluation on a real Twitter dataset demonstrates the feasibility of discerning relevant tweets for an unseen crisis. The applicability of our proposed approach is further demonstrated with a crisis aider system.
Publisher: Springer International Publishing
Date: 2018
Publisher: Elsevier BV
Date: 05-2020
Publisher: Institution of Engineering and Technology (IET)
Date: 25-01-2021
DOI: 10.1049/BME2.12009
Publisher: IEEE
Date: 04-2018
Publisher: Association for Computing Machinery (ACM)
Date: 06-09-2022
DOI: 10.1145/3550306
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2021
Publisher: IEEE
Date: 07-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2006
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 04-2015
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Association for the Advancement of Artificial Intelligence (AAAI)
Date: 17-07-2019
DOI: 10.1609/AAAI.V33I01.33018690
Abstract: Object detection is important in real-world applications. Existing methods mainly focus on object detection with sufficient labelled training data or zero-shot object detection with only concept names. In this paper, we address the challenging problem of zero-shot object detection with natural language description, which aims to simultaneously detect and recognize novel concept instances with textual descriptions. We propose a novel deep learning framework to jointly learn visual units, visual-unit attention and word-level attention, which are combined to achieve word-proposal affinity by an element-wise multiplication. To the best of our knowledge, this is the first work on zero-shot object detection with textual descriptions. Since there is no directly related work in the literature, we investigate plausible solutions based on existing zero-shot object detection for a fair comparison. We conduct extensive experiments on three challenging benchmark datasets. The extensive experimental results confirm the superiority of the proposed model.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2002
DOI: 10.1109/71.993210
Publisher: IEEE
Date: 03-2018
Publisher: IEEE
Date: 10-2010
Publisher: IEEE
Date: 07-2013
Publisher: Springer International Publishing
Date: 31-08-2018
Publisher: IEEE
Date: 06-2019
Publisher: IEEE
Date: 06-2006
Publisher: Springer Science and Business Media LLC
Date: 10-08-2014
Publisher: Association for Computing Machinery (ACM)
Date: 14-09-2023
DOI: 10.1145/3606693
Abstract: Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010–2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.
Publisher: Elsevier BV
Date: 08-2022
Publisher: IEEE
Date: 12-2021
Publisher: IEEE
Date: 03-2017
Publisher: Elsevier BV
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2019
Publisher: Elsevier BV
Date: 06-2022
Publisher: Springer International Publishing
Date: 28-08-2020
Publisher: Elsevier BV
Date: 09-2019
Publisher: Elsevier BV
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2007
Publisher: Association for Computing Machinery (ACM)
Date: 22-06-2023
DOI: 10.1145/3589648
Publisher: IEEE
Date: 05-2016
Publisher: Ovid Technologies (Wolters Kluwer Health)
Date: 09-2003
DOI: 10.1097/00024665-200309000-00014
Abstract: Computer-mediated conferencing commonly is used to promote collaborative learning, including student learning across distance. This article presents the outcomes and experiences of Master of Nursing students in three countries using flexible learning approaches facilitated by the use of computer-mediated conferencing. It examines issues relating to support for global nursing education, presents an evaluation of one particular unit, and presents themes in the feedback from students about their experience. The authors report the findings in three categories: broadened perspectives, tackling the technology, and adaptive learning. Furthermore, the article offers suggestions for enhancing student-learning experiences when computer-mediated conferencing facilities are used.
Publisher: IEEE
Date: 03-2016
Publisher: IEEE
Date: 03-05-2021
Publisher: IEEE
Date: 2002
Publisher: IEEE
Date: 05-2020
Publisher: MDPI AG
Date: 14-02-2023
DOI: 10.3390/IJMS24043857
Abstract: This study aimed to investigate the effect of the sympatholytic drug moxonidine on atherosclerosis. The effects of moxonidine on oxidised low-density lipoprotein (LDL) uptake, inflammatory gene expression and cellular migration were investigated in vitro in cultured vascular smooth muscle cells (VSMCs). The effect of moxonidine on atherosclerosis was measured by examining aortic arch Sudan IV staining and quantifying the intima-to-media ratio of the left common carotid artery in apolipoprotein E-deficient (ApoE−/−) mice infused with angiotensin II. The levels of circulating lipid hydroperoxides in mouse plasma were measured by ferrous oxidation-xylenol orange assay. Moxonidine administration increased oxidised LDL uptake by VSMCs via activation of α2 adrenoceptors. Moxonidine increased the expression of LDL receptors and the lipid efflux transporter ABCG1. Moxonidine inhibited mRNA expression of inflammatory genes and increased VSMC migration. Moxonidine administration to ApoE−/− mice (18 mg/kg/day) decreased atherosclerosis formation in the aortic arch and left common carotid artery, associated with increased plasma lipid hydroperoxide levels. In conclusion, moxonidine inhibited atherosclerosis in ApoE−/− mice, which was accompanied by an increase in oxidised LDL uptake by VSMCs, VSMC migration, ABCG1 expression in VSMCs and lipid hydroperoxide levels in the plasma.
Publisher: IEEE
Date: 04-2014
Publisher: Springer International Publishing
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2015
Publisher: IEEE
Date: 04-2013
Publisher: IEEE
Date: 04-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2017
Publisher: Elsevier BV
Date: 07-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2012
DOI: 10.1109/TMC.2011.97
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.107
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.109
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-09-2022
Publisher: Elsevier BV
Date: 10-2005
Publisher: IEEE
Date: 03-2012
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: ACM
Date: 05-11-2018
Publisher: Springer International Publishing
Date: 2019
Publisher: Elsevier BV
Date: 10-2021
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.14
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-04-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2021
Publisher: Elsevier BV
Date: 07-2017
DOI: 10.1016/J.CELREP.2017.06.067
Abstract: Myelodysplastic syndromes and chronic myelomonocytic leukemia are blood disorders characterized by ineffective hematopoiesis and progressive marrow failure that can transform into acute leukemia. The DNA methyltransferase inhibitor 5-azacytidine (AZA) is the most effective pharmacological option, but only ∼50% of patients respond. A response only manifests after many months of treatment and is transient. The reasons underlying AZA resistance are unknown, and few alternatives exist for non-responders. Here, we show that AZA responders have more hematopoietic progenitor cells (HPCs) in the cell cycle. Non-responder HPC quiescence is mediated by integrin α5 (ITGA5) signaling and their hematopoietic potential improved by combining AZA with an ITGA5 inhibitor. AZA response is associated with the induction of an inflammatory response in HPCs in vivo. By molecular bar coding and tracking in idual clones, we found that, although AZA alters the sub-clonal contribution to different lineages, founder clones are not eliminated and continue to drive hematopoiesis even in complete responders.
Publisher: Inderscience Publishers
Date: 2012
Publisher: IEEE
Date: 04-2010
Publisher: ACM
Date: 18-05-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2009
Publisher: Springer International Publishing
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2016
Publisher: WORLD SCIENTIFIC
Date: 09-2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Elsevier BV
Date: 12-2003
Publisher: ACM
Date: 05-12-2022
Publisher: IEEE
Date: 10-2019
Publisher: Elsevier BV
Date: 03-2019
Publisher: IEEE
Date: 11-2018
Publisher: IEEE
Date: 11-2018
Publisher: IGI Global
Date: 2020
DOI: 10.4018/978-1-5225-9478-9.CH010
Abstract: Academic certificates have a significant influence on the job market, proving a particular competence or skill of a recipient. However, the ability to verify the authenticity of certificates does not follow its relevance in the labor market, causing several companies to exploit this inefficiency to falsify information or even to make fake certificates. In this context, several proposals based on blockchain appear as a technological alternative to increase the transparency and the ease of verification of these certificates. This chapter discusses the main proposals toward the handling of academic certificates from a technological point of view, discussing the technical aspects that may influence the relationship between confidentiality and transparency as well as application requirements such as performance and reliability in contrast to the blockchain characteristics. Finally, this chapter summarizes the key challenges and opportunities based on this discussion outlining future directions for academic certificate management.
Publisher: IEEE
Date: 03-05-2021
Publisher: IEEE
Date: 03-2017
Publisher: IEEE
Date: 12-2019
Publisher: Informa UK Limited
Date: 06-2005
Abstract: Clinical education is a fundamental component of nurse education. In theory, this aspect involves integrated input from registered nurses, clinical educators and university lecturers. Registered nurses are important contributors to this process and play a major role in influencing and shaping undergraduate nursing students' early clinical experiences. Despite this important function, their voice has been somewhat neglected. Little is known about registered nurses' expectations and experiences of first year aduate nursing students undertaking their first clinical placement. The aim of this study was to explore registered nurses' expectations and experiences of first year undergraduate students' levels of knowledge and clinical skills. Three consecutive focus groups were conducted with a purposive s le of 16 registered nurses. Interviews were audiotaped and transcribed and thematic analysis applied to the data to identfy themes imbedded in the data sets. Three main themes emerged: (1) Clinical nursing skills (2) Knowledge requirements and (3) Experiences of reality shock. The findings highlight that registered nurses' expectations of first year students' clinical skills and knowledge were not consistently met. Registered nurses placed significant emphasis upon a range of basic skills, but acknowledged that some aspects of nursing knowledge can only be learned through experience. Furthermore, they demonstrated a considerable degree of empathy surrounding the reality shock that students might experience during early clinical placement. Findings from this study suggest that registered nurses and academics differ in their perceptions surrounding the level of clinical skills first year students should have during their first clinical placement. There appears to be a two way theory practice gap between registered nurses in clinical practice and academics in tertiary institutions. Improved communication between registered nurses and providers of nurse education may assist in addressing some of the issues raised by this study and reduce the theory practice gap, which remains 'alive and well'.
Publisher: IEEE
Date: 05-2020
Publisher: IEEE
Date: 12-2020
Publisher: IEEE
Date: 05-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2019
Publisher: IEEE
Date: 02-05-2022
Publisher: IEEE
Date: 05-2016
Publisher: IEEE
Date: 05-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: Association for Computing Machinery (ACM)
Date: 15-06-2020
DOI: 10.1145/3397323
Abstract: Human activity recognition (HAR) plays an irreplaceable role in various applications and has been a prosperous research topic for years. Recent studies show significant progress in feature extraction (i.e., data representation) using deep learning techniques. However, they face significant challenges in capturing multi-modal spatial-temporal patterns from the sensory data, and they commonly overlook the variants between subjects. We propose a Discriminative Adversarial MUlti-view Network (DAMUN) to address the above issues in sensor-based HAR. We first design a multi-view feature extractor to obtain representations of sensory data streams from temporal, spatial, and spatio-temporal views using convolutional networks. Then, we fuse the multi-view representations into a robust joint representation through a trainable Hadamard fusion module, and finally employ a Siamese adversarial network architecture to decrease the variants between the representations of different subjects. We have conducted extensive experiments under an iterative left-one-subject-out setting on three real-world datasets and demonstrated both the effectiveness and robustness of our approach.
Publisher: IEEE
Date: 10-2018
Publisher: ACM
Date: 12-11-2019
Publisher: IEEE
Date: 04-2007
Publisher: Elsevier BV
Date: 12-2004
DOI: 10.1016/J.NEPR.2004.01.004
Abstract: The graduate nurse year requires in iduals to make a huge transition from university student to registered nurse as part of the health care workforce. New graduates experience steep learning curves throughout the first year of professional practice. This study sought to explore experiences and learning occurring throughout the graduate nurse program for a group of seven new nurse graduates. Focus group interviews were conducted at six months and 12 months into the program using the same set of guiding questions. The first interview highlighted that graduates early in the graduate year were internalised, concentrating on their own survival in managing workloads, facing practice realities and coming to terms with themselves as nurses. Learning was primarily about survival strategies and performing tasks. By the second interview, graduates were much less focussed on themselves. They understood their place in the health care team, had gained confidence in their relationships, and were showing concern for the next graduates arriving. Learning at this stage involved more higher order skills, including critical thinking.
Publisher: Elsevier BV
Date: 02-2015
Publisher: IEEE
Date: 11-2015
Publisher: Wiley
Date: 06-1997
DOI: 10.1111/J.1440-172X.1997.TB00085.X
Abstract: The handover practice has long been an important component of clinical nursing practice allowing nurses to exchange relevant client information from one shift to the next and ensure continuity of patient care. Traditional approaches have seen nursing handovers taking place in a room away from general ward activity. Oncoming nursing staff receive the information verbally from nurses on the previous shift about all patients within the ward or unit. This practice has been proven over time to present difficulties and consequently, many hospitals are choosing to adopt models that better address current needs. This analysis describes the creative approaches taken by one private hospital in modifying handover practices with the view to reduce time and increase overall efficiency and effectiveness, whilst ensuring that staff and ward requirements are considered. The study highlights how action research principles can be applied to introduce change into the clinical practice environment.
Publisher: IEEE
Date: 10-2021
Publisher: Wiley
Date: 2011
DOI: 10.1002/WCM.913
Publisher: IEEE
Date: 09-01-2021
Publisher: Wiley
Date: 07-2003
DOI: 10.1046/J.1365-2702.2003.00717.X
Abstract: This paper reports the findings of a study that sought to gain insight into the experiences of third year nursing students who participated in a 4-week clinical placement in an international setting. This study is different from many studies describing international placements for undergraduate nursing students as it concentrates on clinical experiences on placement. Students' reflective journals and face-to-face discussions were used to collect data, which were analysed by thematic content analysis. Categories were identified describing a focus on micro clinical-based issues that expanded over time to a focus on broader issues reflecting the "nursing culture" of the placement. Students described both positive and negative aspects of being placed in an international clinical setting, with the concept of "being different" emerging. Whilst the findings cannot be generalized beyond the s le, the study highlights the importance of adequate preparation and support for students on international clinical placements, with emphasis on attention to clinical detail.
Publisher: Elsevier BV
Date: 02-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2013
Publisher: IEEE
Date: 03-05-2021
Publisher: Informa UK Limited
Date: 03-10-2014
Publisher: IEEE
Date: 10-2010
Publisher: Springer International Publishing
Date: 2019
Publisher: IEEE
Date: 06-2018
Publisher: Elsevier BV
Date: 07-2010
Publisher: Elsevier BV
Date: 2021
Publisher: Elsevier BV
Date: 02-2023
Publisher: IEEE
Date: 05-2023
Publisher: Springer Science and Business Media LLC
Date: 08-03-2016
DOI: 10.1038/LEU.2016.55
Publisher: Springer International Publishing
Date: 2014
Publisher: Elsevier BV
Date: 12-2019
Publisher: IEEE
Date: 12-2011
Publisher: IEEE
Date: 10-2021
Publisher: IEEE
Date: 05-01-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 09-2008
Publisher: IEEE
Date: 08-2020
Publisher: IEEE
Date: 2007
Publisher: Elsevier BV
Date: 2024
Publisher: IEEE
Date: 08-2018
Publisher: IEEE
Date: 06-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2010
DOI: 10.1109/TMC.2010.83
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2013
DOI: 10.1109/TMC.2012.20
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: IEEE
Date: 03-2017
Publisher: IEEE
Date: 03-2018
Publisher: IEEE
Date: 10-2018
Publisher: MDPI AG
Date: 28-11-2021
DOI: 10.3390/FI13120305
Abstract: Recommendation systems are crucial in the provision of services to the elderly with Alzheimer’s disease in IoT-based smart home environments. In this work, a Reminder Care System (RCS) is presented to help Alzheimer patients live in and operate their homes safely and independently. A contextual bandit approach is utilized in the formulation of the proposed recommendation system to tackle dynamicity in human activities and to construct accurate recommendations that meet user needs without their feedback. The system was evaluated based on three public datasets using a cumulative reward as a metric. Our experimental results demonstrate the feasibility and effectiveness of the proposed Reminder Care System for real-world IoT-based smart home applications.
Publisher: American Association for Cancer Research (AACR)
Date: 30-11-2015
DOI: 10.1158/0008-5472.CAN-15-0423
Abstract: MYCN gene lification in neuroblastoma drives a gene expression program that correlates strongly with aggressive disease. Mechanistically, trimethylation of histone H3 lysine 4 (H3K4) at target gene promoters is a strict prerequisite for this transcriptional program to be enacted. WDR5 is a histone H3K4 presenter that has been found to have an essential role in H3K4 trimethylation. For this reason, in this study, we investigated the relationship between WDR5-mediated H3K4 trimethylation and N-Myc transcriptional programs in neuroblastoma cells. N-Myc upregulated WDR5 expression in neuroblastoma cells. Gene expression analysis revealed that WDR5 target genes included those with MYC-binding elements at promoters such as MDM2. We showed that WDR5 could form a protein complex at the MDM2 promoter with N-Myc, but not p53, leading to histone H3K4 trimethylation and activation of MDM2 transcription. RNAi-mediated attenuation of WDR5 upregulated expression of wild-type but not mutant p53, an effect associated with growth inhibition and apoptosis. Similarly, a small-molecule antagonist of WDR5 reduced N-Myc/WDR5 complex formation, N-Myc target gene expression, and cell growth in neuroblastoma cells. In MYCN-transgenic mice, WDR5 was overexpressed in precancerous ganglion and neuroblastoma cells compared with normal ganglion cells. Clinically, elevated levels of WDR5 in neuroblastoma specimens were an independent predictor of poor overall survival. Overall, our results identify WDR5 as a key cofactor for N-Myc–regulated transcriptional activation and tumorigenesis and as a novel therapeutic target for MYCN- lified neuroblastomas. Cancer Res 75(23) 5143–54. ©2015 AACR.
Publisher: Elsevier BV
Date: 10-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2020
Publisher: IEEE
Date: 04-2015
Publisher: IEEE
Date: 07-2020
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Auerbach Publications
Date: 21-08-2008
DOI: 10.1201/B13595-3
Publisher: Elsevier BV
Date: 08-2016
Publisher: Elsevier BV
Date: 06-2003
DOI: 10.1016/S1031-170X(03)80002-8
Abstract: Mentoring has become a popular approach for providing support in developing knowledge and practice across a variety of disciplines. Midwives often provide mentoring for midwifery mentees and newly graduated midwives without formal recognition or predetermined outcomes. Little literature exists within midwifery practice outlining how its use may be of value. This paper presents literature around the topic of mentoring, discussing possible benefits and suggesting ways in which mentoring may be utilised within midwifery to promote personal and professional development. Finally, it presents some of the limited ex les of mentoring emerging from the midwifery literature.
Publisher: Springer International Publishing
Date: 18-08-2018
Publisher: ACM
Date: 12-04-2010
Publisher: IEEE
Date: 10-2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 10-2012
Publisher: IEEE
Date: 03-01-2023
Publisher: IEEE
Date: 10-2018
Publisher: ACM
Date: 18-04-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2016
Publisher: IEEE
Date: 05-2023
Publisher: Elsevier BV
Date: 02-2022
Publisher: Elsevier BV
Date: 05-2004
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: MDPI AG
Date: 24-11-2022
DOI: 10.3390/S22239118
Abstract: The data economy is based on data and information sharing and tremendously impacts society as it facilitates innovative collaborations and decision-making strategies. Nonetheless, most dataset-sharing solutions rely on a centralized authority that rules data ownership, availability, and accessibility. Recent works have explored the integration of distributed storage and blockchain to enhance decentralization, data access, and smart contracts for automating the interactions between actors and data. However, current solutions propose a smart contract design limiting the system’s scalability in terms of actors and shared datasets. Furthermore, little is known about the performance of these architectures when using distributed storage instead of centralized storage approaches. This paper proposes a scalable architecture called DeBlock for data sharing in a trusted way among unreliable actors. The architecture integrates a public blockchain that provides a transparent record of datasets and interactions, with a distributed storage for data storage in a completely decentralized way. Furthermore, the architecture provides a smart-contract design for a transparent catalog of datasets, actors, and interactions with efficient search and retrieval capabilities. To assess the system’s feasibility, robustness, and scalability, we implement a prototype using the Ethereum blockchain and leveraging two decentralized storage protocols, Swarm and IPFS. We evaluate the performance of our proposed system in different scenarios (e.g., varying the amount and size of the shared datasets). Our results demonstrate that our proposal outperforms benchmarks in gas consumption, latency, and resource requirements, especially when increasing the number of actors and shared datasets.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2020
Publisher: IEEE
Date: 2005
Publisher: MDPI AG
Date: 16-03-2020
DOI: 10.3390/S20061656
Abstract: Within the Internet of Things (IoT) and blockchain research, there is a growing interest in decentralizing health monitoring systems, to provide improved privacy to patients, without relying on trusted third parties for handling patients’ sensitive health data. With public blockchain deployments being severely limited in their scalability, and inherently having latency in transaction processing, there is room for researching and developing new techniques to leverage the security features of blockchains within healthcare applications. This paper presents a solution for patients to share their biomedical data with their doctors without their data being handled by trusted third party entities. The solution is built on the Ethereum blockchain as a medium for negotiating and record-keeping, along with Tor for delivering data from patients to doctors. To highlight the applicability of the solution in various health monitoring scenarios, we have considered three use-cases, namely cardiac monitoring, sleep apnoea testing, and EEG following epileptic seizures. Following the discussion about the use cases, the paper outlines a security analysis performed on the proposed solution, based on multiple attack scenarios. Finally, the paper presents and discusses a performance evaluation in terms of data delivery time in comparison to existing centralized and decentralized solutions.
Publisher: Springer Science and Business Media LLC
Date: 22-09-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 04-2014
Publisher: IEEE
Date: 10-2012
Publisher: Springer International Publishing
Date: 2019
Publisher: Springer Science and Business Media LLC
Date: 08-2022
Publisher: Elsevier BV
Date: 08-2019
Publisher: IEEE
Publisher: IEEE
Date: 2005
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2022
Publisher: IEEE
Date: 04-2010
Publisher: MDPI AG
Date: 05-03-2019
DOI: 10.3390/S19051126
Abstract: Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV’s eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets.
Publisher: ACM
Date: 10-05-2016
Publisher: IEEE
Date: 04-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2013
Publisher: Informa UK Limited
Date: 13-02-2023
Publisher: IEEE
Date: 04-2014
Publisher: IEEE
Date: 03-2009
Publisher: IEEE
Date: 04-2019
Publisher: IEEE
Date: 09-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2023
Publisher: IEEE
Date: 05-2013
Publisher: IEEE
Date: 12-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IEEE
Date: 12-2021
Publisher: Elsevier BV
Date: 10-2022
Publisher: IEEE
Date: 03-2016
Publisher: Springer Science and Business Media LLC
Date: 18-08-2020
Publisher: IEEE
Date: 08-2022
Publisher: IEEE
Date: 11-2016
DOI: 10.1109/LCN.2016.048
Publisher: Elsevier BV
Date: 04-2021
Publisher: Elsevier BV
Date: 04-2004
Publisher: Wiley
Date: 22-09-2011
DOI: 10.1002/WCM.1188
Publisher: Elsevier BV
Date: 07-2020
Publisher: IEEE
Date: 11-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 12-2012
Publisher: IEEE
Date: 09-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2019
Publisher: Springer Science and Business Media LLC
Date: 06-03-2018
Publisher: IEEE
Date: 05-2020
Publisher: Association for Computing Machinery (ACM)
Date: 13-02-2019
DOI: 10.1145/3293537
Abstract: Data aggregation in Wireless Sensor Networks (WSNs) can effectively reduce communication overheads and reduce the energy consumption of sensor nodes. A WSN needs to be not only energy efficient but also secure. Various attacks may make data aggregation unsecure. We investigate the reliable and secure end-to-end data aggregation problem considering selective forwarding attacks and modification attacks in homogeneous WSNs, and propose two data aggregation approaches. Our approaches, namely Sign-Share and Sham-Share, use secret sharing and signatures to allow aggregators to aggregate the data without understanding the contents of messages and the base station to verify the aggregated data and retrieve the raw data from the aggregated data. To the best of our knowledge, this is the first lightweight en-routing malicious node detection in concealed data aggregation. We have performed an extensive simulation to compare our approaches and the two state-of-the-art approaches PIP and RCDA-HOMO. The simulation results show that both Sign-Share and Sham-Share consume a reasonable amount of time in processing and aggregating the data. The simulation results show that our first approach achieved an average network lifetime of 102.33% over PIP and average aggregation energy consumption of 74.93%. In addition, it achieved an average aggregation processing time and sensor data processing time of 95.4% and 90.34% over PIP and 98.7% and 92.07% over RCDA-HOMO, respectively, and it achieved an average network delay of 71.95% over PIP. Although RCDA-HOMO is completely a different technique, a comparison was performed to measure the computational overhead.
Publisher: IEEE
Date: 12-2021
Publisher: International Joint Conferences on Artificial Intelligence Organization
Date: 08-2019
Abstract: Multi-step passenger demand forecasting is a crucial task in on-demand vehicle sharing services. However, predicting passenger demand is generally challenging due to the nonlinear and dynamic spatial-temporal dependencies. In this work, we propose to model multi-step citywide passenger demand prediction based on a graph and use a hierarchical graph convolutional structure to capture both spatial and temporal correlations simultaneously. Our model consists of three parts: 1) a long-term encoder to encode historical passenger demands 2) a short-term encoder to derive the next-step prediction for generating multi-step prediction 3) an attention-based output module to model the dynamic temporal and channel-wise information. Experiments on three real-world datasets show that our model consistently outperforms many baseline methods and state-of-the-art models.
Publisher: Elsevier BV
Date: 11-2011
Publisher: IEEE
Date: 05-2014
Publisher: IEEE
Date: 04-2020
Publisher: IEEE
Date: 06-2019
Publisher: IEEE
Date: 04-2020
Publisher: IEEE
Date: 10-2014
DOI: 10.1109/MASS.2014.66
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2018
Publisher: Elsevier BV
Date: 05-2005
Publisher: IEEE
Date: 10-2006
Publisher: IEEE
Date: 06-2017
Publisher: ICST
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2015
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: IEEE
Date: 22-03-2021
Publisher: MDPI AG
Date: 25-06-2021
DOI: 10.3390/S21134354
Abstract: A potential rise in interest in the Internet of Things in the upcoming years is expected in the fields of healthcare, supply chain, logistics, industries, smart cities, smart homes, cyber physical systems, etc. This paper discloses the fusion of the Internet of Things (IoT) with the so-called “distributed ledger technology” (DLT). IoT sensors like temperature sensors, motion sensors, GPS or connected devices convey the activity of the environment. Sensor information acquired by such IoT devices are then stored in a blockchain. Data on a blockchain remains immutable however its scalability still remains a challenging issue and thus represents a hindrance for its mass adoption in the IoT. Here a communication system based on IOTA and DLT is discussed with a systematic architecture for IoT devices and a future machine-to-machine (M2M) economy. The data communication between IoT devices is analyzed using multiple use cases such as sending DHT-11 sensor data to the IOTA tangle. The value communication is analyzed using a novel “micro-payment enabled over the top” (MP-OTT) streaming platform that is based on the “pay-as-you-go” and “consumption based” models to showcase IOTA value transactions. In this paper, we propose an enhancement to the classical “masked authenticated message” (MAM) communication protocol and two architectures called dual signature masked authenticated message (DSMAM) and index-based address value transaction (IBAVT). Further, we provided an empirical analysis and discussion of the proposed techniques. The implemented solution provides better address management with secured sharing and communication of IoT data, complete access control over the ownership of data and high scalability in terms of number of transactions that can be handled.
Publisher: IEEE
Date: 06-2019
Publisher: MDPI AG
Date: 05-09-2021
Abstract: Unmanned Aerial Vehicles (UAVs), used in civilian applications such as emergency medical deliveries, precision agriculture, wireless communication provisioning, etc., face the challenge of limited flight time due to their reliance on the on-board battery. Therefore, developing efficient mechanisms for in situ power transfer to recharge UAV batteries holds potential to extend their mission time. In this paper, we study the use of the far-field wireless power transfer (WPT) technique from specialized, transmitter UAVs (tUAVs) carrying Multiple Input Multiple Output (MIMO) antennas for transferring wireless power to receiver UAVs (rUAVs) in a mission. The tUAVs can fly and adjust their distance to the rUAVs to maximize energy transfer gain. The use of MIMO antennas further boosts the energy reception by narrowing the energy beam toward the rUAVs. The complexity of their dynamic operating environment increases with the growing number of tUAVs and rUAVs with varying levels of energy consumption and residual power. We propose an intelligent trajectory selection algorithm for the tUAVs based on a deep reinforcement learning model called Proximal Policy Optimization (PPO) to optimize the energy transfer gain. The simulation results demonstrate that the PPO-based system achieves about a tenfold increase in flight time for a set of realistic transmit power, distance, sub-band number and antenna numbers. Further, PPO outperforms the benchmark movement strategies of “Traveling Salesman Problem” and “Low Battery First” when used by the tUAVs.
Publisher: IEEE
Date: 12-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2019
Publisher: Elsevier BV
Date: 11-2015
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 10-2013
Publisher: IEEE
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2016
Publisher: ACM
Date: 03-11-2019
Publisher: IEEE
Date: 11-2015
Publisher: IEEE
Date: 04-2020
Publisher: Springer Science and Business Media LLC
Date: 04-02-2019
Publisher: Springer International Publishing
Date: 2022
Publisher: IEEE
Date: 05-09-2022
Publisher: IEEE
Date: 12-2018
Publisher: IEEE
Date: 16-11-2020
Publisher: IEEE
Date: 03-2016
Publisher: IEEE
Date: 02-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2020
Publisher: IEEE
Date: 2005
Publisher: IEEE
Date: 04-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2019
Publisher: Springer International Publishing
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2019
Publisher: IEEE
Date: 04-2020
Publisher: IEEE
Date: 06-2015
Publisher: IEEE
Date: 2005
Publisher: American Association for Cancer Research (AACR)
Date: 14-09-2018
DOI: 10.1158/1078-0432.CCR-17-3678
Abstract: Purpose: MLH1 is a major tumor suppressor gene involved in the pathogenesis of Lynch syndrome and various sporadic cancers. Despite their potential pathogenic importance, genomic regions capable of regulating MLH1 expression over long distances have yet to be identified. Experimental Design: Here, we use chromosome conformation capture (3C) to screen a 650-kb region flanking the MLH1 locus to identify interactions between the MLH1 promoter and distal regions in MLH1-expressing and nonexpressing cells. Putative enhancers were functionally validated using luciferase reporter assays, chromatin immunoprecipitation, and CRISPR-Cas9–mediated deletion of endogenous regions. To evaluate whether germline variants in the enhancer might contribute to impaired MLH1 expression in patients with suspected Lynch syndrome, we also screened germline DNA from a cohort of 74 patients with no known coding mutations or epimutations at the MLH1 promoter. Results: A 1.8-kb DNA fragment, 35 kb upstream of the MLH1 transcription start site enhances MLH1 gene expression in colorectal cells. The enhancer was bound by CTCF and CRISPR-Cas9–mediated deletion of a core binding region impairs endogenous MLH1 expression. A total of 5.4% of suspected Lynch syndrome patients have a rare single-nucleotide variant (G & A rs143969848 2.5% in gnomAD European, non-Finnish) within a highly conserved CTCF-binding motif, which disrupts enhancer activity in SW620 colorectal carcinoma cells. Conclusions: A CTCF-bound region within the MLH1-35 enhancer regulates MLH1 expression in colorectal cells and is worthy of scrutiny in future genetic screening strategies for suspected Lynch syndrome associated with loss of MLH1 expression. Clin Cancer Res 24(18) 4602–11. ©2018 AACR.
Publisher: IEEE
Date: 06-2014
Publisher: IEEE
Date: 05-2019
Publisher: Elsevier BV
Date: 09-2022
Start Date: 07-2017
End Date: 02-2022
Amount: $318,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 01-2011
End Date: 12-2015
Amount: $332,384.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2016
End Date: 12-2019
Amount: $557,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 09-2022
End Date: 09-2025
Amount: $480,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2007
End Date: 12-2010
Amount: $172,000.00
Funder: Australian Research Council
View Funded Activity