Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Medicine and Health Sciences

Ontogenetic Scaling Patterns And Functional Anatomy Of The Pelvic Limb Musculature In Emus (Dromaius Novaehollandiae), Luis P. Lamas, Russell P. Main, John R. Hutchinson Dec 2014

Ontogenetic Scaling Patterns And Functional Anatomy Of The Pelvic Limb Musculature In Emus (Dromaius Novaehollandiae), Luis P. Lamas, Russell P. Main, John R. Hutchinson

Department of Basic Medical Sciences Faculty Publications

Emus (Dromaius novaehollandiae) are exclusively terrestrial, bipedal and cursorial ratites with some similar biomechanical characteristics to humans. Their growth rates are impressive, as their body mass increases eighty-fold from hatching to adulthood whilst maintaining the same mode of locomotion throughout life. These ontogenetic characteristics stimulate biomechanical questions about the strategies that allow emus to cope with their rapid growth and locomotion, which can be partly addressed via scaling (allometric) analysis of morphology. In this study we have collected pelvic limb anatomical data (muscle architecture, tendon length, tendon mass and bone lengths) and calculated muscle physiological cross sectional area …


Two-Dimensional Layered Mos2 Biosensors Enable Highly Sensitive Detection Of Biomolecules, Joonhyung Lee, Piyush Dak, Yeonsung Lee, Heekyeong Park, Woong Choi, Muhammad Ashraful Alam, Sunkook Kim Dec 2014

Two-Dimensional Layered Mos2 Biosensors Enable Highly Sensitive Detection Of Biomolecules, Joonhyung Lee, Piyush Dak, Yeonsung Lee, Heekyeong Park, Woong Choi, Muhammad Ashraful Alam, Sunkook Kim

Birck and NCN Publications

We present a MoS2 biosensor to electrically detect prostate specific antigen (PSA) in a highly sensitive and label-free manner. Unlike previous MoS2-FET-based biosensors, the device configuration of our biosensors does not require a dielectric layer such as HfO2 due to the hydrophobicity of MoS2. Such an oxide-free operation improves sensitivity and simplifies sensor design. For a quantitative and selective detection of PSA antigen, anti-PSA antibody was immobilized on the sensor surface. Then, introduction of PSA antigen, into the anti-PSA immobilized sensor surface resulted in a lable-free immunoassary format. Measured off-state current of the device …


Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu Dec 2014

Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu

Cyber Center Publications

Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources. As a result, such entities may want to refrain from participating in the PPDM process. To overcome this issue and to take many other benefits of cloud computing, outsourcing PPDM tasks to the cloud environment has recently gained special attention. We consider the scenario where n entities outsource their databases (in encrypted format) to the cloud and ask the cloud to perform the clustering task on their …


Poster: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama, Elisa Bertino Nov 2014

Poster: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama, Elisa Bertino

Cyber Center Publications

In this paper, we describe a system that distinguishes be- tween legitimate and malicious database transactions per- formed by application programs. Our system is particularly useful for protecting against code-modification attacks performed by insiders who have access to and can change the programs' source code to make them execute different queries than those they are expected to execute. Our system works with any type of DBMS and requires minimum modification to application programs.


Coupled Fluid-Thermal Analysis Of Low-Pressure Sublimation And Condensation With Application To Freeze-Drying, Arnab Ganguly Oct 2014

Coupled Fluid-Thermal Analysis Of Low-Pressure Sublimation And Condensation With Application To Freeze-Drying, Arnab Ganguly

Open Access Dissertations

Freeze-drying is a low-pressure, low-temperature condensation pumping process widely used in the manufacture of bio-pharmaceuticals for removal of solvents by sublimation. The goal of the process is to provide a stable dosage form by removing the solvent in such a way that the sensitive molecular structure of the active substance is least disturbed. The vacuum environment presents unique challenges for understanding and controlling heat and mass transfer in the process. As a result, the design of equipment and associated processes has been largely empirical, slow and inefficient.^ A comprehensive simulation framework to predict both, process and equipment performance is critical …


Designing A Sustainable And Transferable Inventory Management System For Small Healthcare Facilities, Shree Frazier Oct 2014

Designing A Sustainable And Transferable Inventory Management System For Small Healthcare Facilities, Shree Frazier

Open Access Theses

Managing the costs of supplies within healthcare facilities has been a task that has plagued the health industry for many years. Many facilities are accustomed to using a par system approach. This involves bringing an inventory item to an amount sufficient for daily operation. This method often requires daily inspection by a healthcare worker, which reduces his/her time spent performing value added tasks. Employees at small healthcare facilities have multiple responsibilities, therefore they cannot afford to spend much time on inventory management. A proposed approach is the Kanban method, which allows for strict monitoring of inventory items without the need …


Current Steering And Electrode Spanning With Partial Tripolar Stimulation Mode In Cochlear Implants, Ching-Chih Wu Oct 2014

Current Steering And Electrode Spanning With Partial Tripolar Stimulation Mode In Cochlear Implants, Ching-Chih Wu

Open Access Dissertations

Cochlear implants (CIs) partially restore hearing sensation to profoundly deaf people by electrically stimulating the surviving auditory neurons. However, CI users perform poorly in challenging listening tasks such as speech recognition in noise and Cochlear implants (CIs) partially restore hearing sensation to profoundly deaf people by electrically stimulating the surviving auditory neurons. However, CI users perform poorly in challenging listening tasks such as speech recognition in noise and music perception, possibly due to the small number of implanted electrodes and the large current spread of electric stimulation. Although current spread may be reduced using partial tripolar (pTP) stimulation mode, the …


An Efficient Certificateless Encryption For Secure Data Sharing In Public Clouds, Seung-Hyun Seo, Mohamed Yoosuf Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino Sep 2014

An Efficient Certificateless Encryption For Secure Data Sharing In Public Clouds, Seung-Hyun Seo, Mohamed Yoosuf Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino

Cyber Center Publications

We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this paper, we first propose a mCL-PKE scheme without using pairing operations. We apply our mCL-PKE scheme to construct a practical solution to the problem of sharing sensitive …


Using Collagen Binding Poly(N-Isopropylacrylamide) Nanoparticles To Prevent Intravascular Platelet Adhesion And Activation, Anna E. Searle, Alyssa Panitch, James Mcmasters Aug 2014

Using Collagen Binding Poly(N-Isopropylacrylamide) Nanoparticles To Prevent Intravascular Platelet Adhesion And Activation, Anna E. Searle, Alyssa Panitch, James Mcmasters

The Summer Undergraduate Research Fellowship (SURF) Symposium

Balloon angioplasty, the most prevalent non-surgical treatment for Atherosclerosis, damages the endothelial layer of the artery, baring an underlying collagenous layer, which causes platelet adhesion and activation and eventual thrombosis and intimal hyperplasia. Previous work in our lab has used a collagen-binding peptidoglycan, dermatan-sulfate-SILY (DS-SILY), that has been shown to bind to type I collagen and prevent platelet adhesion and activation. Our goal is to fabricate nanoparticle-SILY by cross-linking SILY to a poly(N-isopropylacrylamide) (NIPAm) nanoparticle instead of a DS backbone, while retaining the SILY’s high collagen binding affinity and platelet inhibition capacity observed in DS-SILY. Using a biotin-streptavidin assay, we …


Tissue Engineering: Applications In Developmental Toxicology, Stephanie N. Thiede, Nimisha Bajaj, Kevin Buno, Sherry L. Voytik-Harbin Aug 2014

Tissue Engineering: Applications In Developmental Toxicology, Stephanie N. Thiede, Nimisha Bajaj, Kevin Buno, Sherry L. Voytik-Harbin

The Summer Undergraduate Research Fellowship (SURF) Symposium

In vivo toxicology assays are expensive, low-throughput, and often not predictive of a human response. Three-dimensional in vitro human cell-based tissue systems incorporating cell-cell and cell-matrix interactions have promise to provide high-throughput, physiologically-relevant information on the mechanism of the toxin and a more accurate assessment of the toxicity of a chemical before progression to human trials. Quantification of the disruption of vasculogenesis, the de novo formation of blood vessels from endothelial progenitor cells, can serve as an appropriate indicator of developmental toxicity since vasculogenesis is critical to the early development of the circulatory system. The current routinely used in vitro …


Three Dimensional Quantification Of Angiotensin Ii-Induced Murine Abdominal Aortic Aneurysms Using High Frequency Ultrasound, Amelia R. Adelsperger, Alexa A. Yrineo, Hilary D. Schroeder, Ashley Nicole Blaize, Katherine E. Wilson, Evan H. Phillips, Frederick W. Damen, Craig J. Goergen Aug 2014

Three Dimensional Quantification Of Angiotensin Ii-Induced Murine Abdominal Aortic Aneurysms Using High Frequency Ultrasound, Amelia R. Adelsperger, Alexa A. Yrineo, Hilary D. Schroeder, Ashley Nicole Blaize, Katherine E. Wilson, Evan H. Phillips, Frederick W. Damen, Craig J. Goergen

The Summer Undergraduate Research Fellowship (SURF) Symposium

Abdominal aortic aneurysms (AAAs), a localized dilation of the vessel wall of 50% or more above normal, claims approximately 14,000 U.S. lives yearly due to aortic rupture. This commonly asymptomatic disease can only be treated by endovascular stent grafts or invasive surgery, usually after the AAA diameter reaches 5 cm. Because these treatment methods carry serious risk, stem cell therapy is being explored in order to provide a low risk option for managing smaller AAAs. To determine if stem cell therapy, once administered, could stabilize or reduce AAA growth, baseline 3D ultrasound measurements in a control group were first needed. …


Effect Of Twin Screw Granulator Process Parameters On Granule Attributes, Haosheng Xu, Ridade Sayin, James Litster Aug 2014

Effect Of Twin Screw Granulator Process Parameters On Granule Attributes, Haosheng Xu, Ridade Sayin, James Litster

The Summer Undergraduate Research Fellowship (SURF) Symposium

Twin screw wet granulation has been considered as an efficient and effective technique of manufacturing granules (agglomerates made up of small particles) and has been widely applied in pharmaceutical industry. However, narrow granule size distributions are difficult to achieve. This study aims to elucidate the effect of process parameters such as liquid feed rate and screw configuration on the granule attributes through granule characterization. The methods used are sieve analysis (for size distribution), liquid distribution (determining the dye concentration in the granules) and density and porosity (percentage gas volume in the granule) analyses. A sieve shaker is used to divide …


Draft Genome Sequence Of Acetobacter Aceti Strain 1023, A Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, T. Joseph Kappock Jun 2014

Draft Genome Sequence Of Acetobacter Aceti Strain 1023, A Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, T. Joseph Kappock

Cyber Center Publications

The genome sequence of Acetobacter aceti 1023, an acetic acid bacterium adapted to traditional vinegar fermentation, comprises 3.0 Mb (chromosome plus plasmids). A. aceti 1023 is closely related to the cocoa fermenter Acetobacter pasteurianus 386B but possesses many additional insertion sequence elements.


A Practical Approach For Provenance Transmission In Wireless Sensor Networks, S.M. Iftekharul Alam, Sonia Fahmy May 2014

A Practical Approach For Provenance Transmission In Wireless Sensor Networks, S.M. Iftekharul Alam, Sonia Fahmy

Cyber Center Publications

Assessing the trustworthiness of sensor data and transmitters of this data is critical for quality assurance. Trust evaluation frameworks utilize data provenance along with the sensed data values to compute the trustworthiness of each data item. However, in a sizeable multi-hop sensor network, provenance information requires a large and variable number of bits in each packet, resulting in high energy dissipation due to the extended period of radio communication. In this paper, we design energy-efficient provenance encoding and construction schemes, which we refer to as Probabilistic Provenance Flow (PPF). Our work demonstrates the feasibility of adapting the Probabilistic Packet Marking …


Feasibility Of Pulsed Proton Induced Acoustics For 3d Dosimetry, Fahed M. Alsanea Apr 2014

Feasibility Of Pulsed Proton Induced Acoustics For 3d Dosimetry, Fahed M. Alsanea

Open Access Theses

Proton therapy has the potential to deposit its energy in tissue with high conformity to the tumor and significantly reduced integral dose to normal tissue compared to conventional radiation, such as x-rays. As a result, local control can be enhanced while reducing side-effects and secondary cancers. This is due to the way charged Particles deposit their energy or dose, where protons form a Bragg peak and establish a well-defined distal edge as a function of depth (range). To date, the dose delivered to a patient from proton therapy remains uncertain, in particular the positioning of the distal edge of the …


Controlling Protein Release Using Biodegradable Microparticles, Benjamin Patrick Kline Apr 2014

Controlling Protein Release Using Biodegradable Microparticles, Benjamin Patrick Kline

Open Access Theses

Research in the field of protein therapeutics has exploded over the past decade and continues to grow in both academia and in industry. Protein drugs have advantages of being highly specific and highly active making them coveted targets for high profile disease states like cancer and multiple sclerosis. Unfortunately, their many advantages are complemented by their obstacles. Because proteins are highly active and highly specific, the window between efficacy and toxicity is very narrow and drug development can be long and arduous. In addition, protein activity is dependent on its specific folding conformation that is easily disrupted by a variety …


Modeling And Optimization Of Care Transitions, Yuming Mo Apr 2014

Modeling And Optimization Of Care Transitions, Yuming Mo

Open Access Theses

More than 145 million people live with at least one chronic condition, and almost half of them have multiple conditions. As a result, many managed care and integrated delivery systems have taken a great interest in alleviating the many deficiencies in managing the current care system that spans across various care delivery settings. In addition, many Americans have to rely on some social health insurance plan to cover her care expenses. As a result, these patients often may not been sufficiently cured but have to be transitioned to less expensive but less medically intensive facilities, due to the increasing pressure …


Security Of Graph Data: Hashing Schemes And Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor Mar 2014

Security Of Graph Data: Hashing Schemes And Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor

Cyber Center Publications

Use of graph-structured data models is on the rise - in graph databases, in representing biological and healthcare data as well as geographical data. In order to secure graph-structured data, and develop cryptographically secure schemes for graph databases, it is essential to formally define and develop suitable collision resistant one-way hashing schemes and show them they are efficient. The widely used Merkle hash technique is not suitable as it is, because graphs may be directed acyclic ones or cyclic ones. In this paper, we are addressing this problem. Our contributions are: (1) define the practical and formal security model of …


Randomized And Efficient Authentication In Mobile Environments, Wei Jiang, Dan Lin, Feng Li, Elisa Bertino Feb 2014

Randomized And Efficient Authentication In Mobile Environments, Wei Jiang, Dan Lin, Feng Li, Elisa Bertino

Cyber Center Publications

In a mobile environment, a number of users act as a network nodes and communicate with one another to acquire location based information and services. This emerging paradigm has opened up new business opportunities and enables numerous applications such as road safety enhancement, service recommendations and mobile entertainment. A fundamental issue that impacts the success of these applications is the security and privacy concerns raised regarding the mobile users. In that, a malicious user or service provider can track the locations of a user traveled so that other malicious act can be carried out more effectively against the user. Therefore, …


Identidroid: Android Can Finally Wear Its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino Jan 2014

Identidroid: Android Can Finally Wear Its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino

Cyber Center Publications

Because privacy today is a major concern for mobile applications, network anonymizers are widely available on smartphones, such as Android. However despite the use of such anonymizers, in many cases applications are still able to identify the user and the device by different means than the IP address. The reason is that very often applications require device services and information that go beyond the capabilities of anonymous networks in protecting users’ identity and privacy. In this paper, we propose two solutions that address this problem. The first solution is based on an approach that shadows user and application data, device …