ap Educator Experience with the U.S. Diabetes Conversation Map(R) Education Program in the Journey for Control of Diabetes: The IDEA Study By spectrum.diabetesjournals.org Published On :: 2010-07-01 Omar D. FernandesJul 1, 2010; 23:194-198Care Innovations Full Article
ap Diabetes Self-Management Education for Older Adults: General Principles and Practical Application By spectrum.diabetesjournals.org Published On :: 2006-10-01 Emmy SuhlOct 1, 2006; 19:234-240Articles Full Article
ap The Diabetes Attitudes, Wishes, and Needs (DAWN) Program: A New Approach to Improving Outcomes of Diabetes Care By spectrum.diabetesjournals.org Published On :: 2005-07-01 Soren E. SkovlundJul 1, 2005; 18:136-142Lifestyle and Behavior Full Article
ap Happy Family: Investing for the Future By www8.gsb.columbia.edu Published On :: Tue, 07 Apr 2020 15:00:27 +0000 What strategic and operational challenges lie ahead for innovative start-up Happy Family, a leading producer of organic baby foods? Full Article
ap Violence is not the answer - Dexta Daps’ new single spurs conversation on domestic abuse By jamaica-star.com Published On :: Wed, 06 May 2020 05:01:37 -0500 Hours after he was released from police lock-up last week, dancehall artiste Dexta Daps dropped some new music on his eager fans. The track, Breaking News, explores an all-too-familiar domestic violence storyline, but incorporates a controversial... Full Article
ap People just wah hear sumpn different - Govana finds captive audience as ‘Convo Pt 2’ hits a million views By jamaica-star.com Published On :: Thu, 07 May 2020 05:01:23 -0500 Back in January when dancehall artiste Govana released the track HAMANTS Convo, the storyline captivated listeners across the globe. For weeks, the song, which highlights infidelity in relationships, trended at number one on the local YouTube... Full Article
ap It felt like prison - Cruise ship worker happy to be home By jamaica-star.com Published On :: Thu, 07 May 2020 05:01:43 -0500 "It felt like prison." Those are the exact words of Jermaine who returned to the island yesterday after he was stranded on a cruise ship for 56 days in South Hampton, United Kingdom. "Bwoy we are out of prison ... it was rough mentally. They... Full Article
ap COVID-19: Economic Implications for Japan and the United States By www8.gsb.columbia.edu Published On :: Fri, 01 May 2020 00:00:00 -0400 Exploring the economic implications of COVID-19 on Japan and the US. Full Article
ap NYC Silkscreen Studio Swaps Fine Art Prints for Safety Signage By www8.gsb.columbia.edu Published On :: Wed, 22 Apr 2020 00:00:00 -0400 Gary Lichtenstein Editions has partnered with Urban Pathways to increase awareness and safety in the homeless community. Full Article
ap State Cyber Interventions Below the Threshold of the Use of Force: Challenges in the Application of International Law By feedproxy.google.com Published On :: Wed, 17 Apr 2019 10:45:01 +0000 Invitation Only Research Event 30 April 2019 - 10:00am to 4:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House Under what circumstances will a state-sponsored cyberattack on another state that falls below the threshold of the use of force be a breach of international law – for example, hacking into another state’s electoral databases, usurping inherently governmental functions such as parliamentary processes or an attack on another state’s financial system? In the dynamic field of state cyber operations, persistent, low-level cyberattacks are increasing, as are multilateral attempts to attribute the attacks to the states responsible. There is general agreement that international law applies to cyberspace but the question is how it applies and with what consequences. This meeting will bring together a small group of academics and practitioners to explore the application of international law to states’ cyber operations that interfere in the internal affairs of another state and which fall below the threshold of the use of force. What is the law on non-intervention in international law and how does it apply to states’ cyber activities? Does the Nicaragua case represent the best expression of the law in this area including the requirement of coercion? And are there any other principles of international law that are relevant? The meeting will also consider processes and procedures for agreeing on the law and best practices. The purpose of the meeting will be to inform a research paper by Chatham House. Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project International Law Programme Full Article
ap Cyber Interference in Elections: Applying a Human Rights Framework By feedproxy.google.com Published On :: Thu, 25 Apr 2019 13:55:01 +0000 Invitation Only Research Event 7 May 2019 - 10:00am to 4:15pm Chatham House | 10 St James's Square | London | SW1Y 4LE The use of social media, including algorithms, bots and micro-targeted advertising, has developed rapidly while there has been a policy lag in identifying and addressing the challenges posed to democracy by the manipulation of voters through cyber activity. What role should international human rights law play in developing a normative framework to address potential harms caused by such cyber activity including the closing down of democratic space, the spread of disinformation and hate speech? This meeting will bring together a small group of academics and practitioners to explore the implications of applying a human rights framework to both the activities of social media companies and the activities of governments and international organizations in seeking to regulate their activity. The purpose of the meeting will be to inform a report that will provide an overview of the applicable law and recommendations for how that law might inform future policy and regulation. Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project International Law Programme, Rights, Accountability and Justice Full Article
ap Tackling Cyber Disinformation in Elections: Applying International Human Rights Law By feedproxy.google.com Published On :: Wed, 18 Sep 2019 10:30:02 +0000 Research Event Tackling Cyber Disinformation in Elections: Applying International Human Rights Law 6 November 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Susie Alegre, Barrister and Associate Tenant, Doughty Street ChambersEvelyn Aswad, Professor of Law and the Herman G. Kaiser Chair in International Law, University of OklahomaBarbora Bukovská, Senior Director for Law and Policy, Article 19Kate Jones, Director, Diplomatic Studies Programme, University of OxfordChair: Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House Register Interest Cyber operations are increasingly used by political parties, their supporters and foreign states to influence electorates – from algorithms promoting specific messages to micro-targeting based on personal data and the creation of filter bubbles. The risks of digital tools spreading disinformation and polarizing debate, as opposed to deepening democratic engagement, have been highlighted by concerns over cyber interference in the UK’s Brexit referendum, the 2016 US presidential elections and in Ukraine. While some governments are adopting legislation in an attempt to address some of these issues, for example Germany’s ‘NetzDG’ law and France’s ‘Law against the manipulation of information’, other countries have proposed an independent regulator as in the case of the UK’s Online Harms white paper. Meanwhile, the digital platforms, as the curators of content, are under increasing pressure to take their own measures to address data mining and manipulation in the context of elections. How do international human rights standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context? What practical steps can governments and technology actors take to ensure policies, laws and practices are in line with these fundamental standards? And with a general election looming in the UK, will these steps come soon enough? This event brings together a wide range of stakeholders including civil society, the tech sector, legal experts and government, coincides with the publication of a Chatham House research paper on disinformation, elections and the human rights framework. Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Department/project International Law Programme, Cyber, Sovereignty and Human Rights, Rights, Accountability and Justice Full Article
ap Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
ap Online Disinformation and Political Discourse: Applying a Human Rights Framework By feedproxy.google.com Published On :: Tue, 05 Nov 2019 11:03:02 +0000 6 November 2019 Although some digital platforms now have an impact on more people’s lives than does any one state authority, the international community has been slow to hold to account these platforms’ activities by reference to human rights law. This paper examines how human rights frameworks should guide digital technology. Download PDF Kate Jones Associate Fellow, International Law Programme @katejones77 LinkedIn 2019-11-05-Disinformation.jpg A man votes in Manhattan, New York City, during the US elections on 8 November 2016. Photo: Getty Images. SummaryOnline political campaigning techniques are distorting our democratic political processes. These techniques include the creation of disinformation and divisive content; exploiting digital platforms’ algorithms, and using bots, cyborgs and fake accounts to distribute this content; maximizing influence through harnessing emotional responses such as anger and disgust; and micro-targeting on the basis of collated personal data and sophisticated psychological profiling techniques. Some state authorities distort political debate by restricting, filtering, shutting down or censoring online networks.Such techniques have outpaced regulatory initiatives and, save in egregious cases such as shutdown of networks, there is no international consensus on how they should be tackled. Digital platforms, driven by their commercial impetus to encourage users to spend as long as possible on them and to attract advertisers, may provide an environment conducive to manipulative techniques.International human rights law, with its careful calibrations designed to protect individuals from abuse of power by authority, provides a normative framework that should underpin responses to online disinformation and distortion of political debate. Contrary to popular view, it does not entail that there should be no control of the online environment; rather, controls should balance the interests at stake appropriately.The rights to freedom of thought and opinion are critical to delimiting the appropriate boundary between legitimate influence and illegitimate manipulation. When digital platforms exploit decision-making biases in prioritizing bad news and divisive, emotion-arousing information, they may be breaching these rights. States and digital platforms should consider structural changes to digital platforms to ensure that methods of online political discourse respect personal agency and prevent the use of sophisticated manipulative techniques.The right to privacy includes a right to choose not to divulge your personal information, and a right to opt out of trading in and profiling on the basis of your personal data. Current practices in collecting, trading and using extensive personal data to ‘micro-target’ voters without their knowledge are not consistent with this right. Significant changes are needed.Data protection laws should be implemented robustly, and should not legitimate extensive harvesting of personal data on the basis of either notional ‘consent’ or the data handler’s commercial interests. The right to privacy should be embedded in technological design (such as by allowing the user to access all information held on them at the click of a button); and political parties should be transparent in their collection and use of personal data, and in their targeting of messages. Arguably, the value of personal data should be shared with the individuals from whom it derives.The rules on the boundaries of permissible content online should be set by states, and should be consistent with the right to freedom of expression. Digital platforms have had to rapidly develop policies on retention or removal of content, but those policies do not necessarily reflect the right to freedom of expression, and platforms are currently not well placed to take account of the public interest. Platforms should be far more transparent in their content regulation policies and decision-making, and should develop frameworks enabling efficient, fair, consistent internal complaints and content monitoring processes. Expertise on international human rights law should be integral to their systems.The right to participate in public affairs and to vote includes the right to engage in public debate. States and digital platforms should ensure an environment in which all can participate in debate online and are not discouraged from standing for election, from participating or from voting by online threats or abuse. Department/project International Law Programme, Cyber, Sovereignty and Human Rights, Rights, Accountability and Justice Full Article
ap The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
ap Deletion of fatty acid transport protein 2 (FATP2) in the mouse liver changes the metabolic landscape by increasing the expression of PPAR{alpha}-regulated genes [Lipids] By feedproxy.google.com Published On :: 2020-04-24T06:08:45-07:00 Fatty acid transport protein 2 (FATP2) is highly expressed in the liver, small intestine, and kidney, where it functions in both the transport of exogenous long-chain fatty acids and the activation of very-long-chain fatty acids. Here, using a murine model, we investigated the phenotypic impacts of deleting FATP2, followed by a transcriptomic analysis using unbiased RNA-Seq to identify concomitant changes in the liver transcriptome. WT and FATP2-null (Fatp2−/−) mice (5 weeks) were maintained on a standard chow diet for 6 weeks. The Fatp2−/− mice had reduced weight gain, lowered serum triglyceride, and increased serum cholesterol levels and attenuated dietary fatty acid absorption. Transcriptomic analysis of the liver revealed 258 differentially expressed genes in male Fatp2−/− mice and a total of 91 in female Fatp2−/− mice. These genes mapped to the following gene ontology categories: fatty acid degradation, peroxisome biogenesis, fatty acid synthesis, and retinol and arachidonic acid metabolism. Targeted RT-quantitative PCR verified the altered expression of selected genes. Of note, most of the genes with increased expression were known to be regulated by peroxisome proliferator–activated receptor α (PPARα), suggesting that FATP2 activity is linked to a PPARα-specific proximal ligand. Targeted metabolomic experiments in the Fatp2−/− liver revealed increases of total C16:0, C16:1, and C18:1 fatty acids; increases in lipoxin A4 and prostaglandin J2; and a decrease in 20-hydroxyeicosatetraenoic acid. We conclude that the expression of FATP2 in the liver broadly affects the metabolic landscape through PPARα, indicating that FATP2 provides an important role in liver lipid metabolism through its transport or activation activities. Full Article
ap COQ11 deletion mitigates respiratory deficiency caused by mutations in the gene encoding the coenzyme Q chaperone protein Coq10 [Lipids] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Coenzyme Q (Qn) is a vital lipid component of the electron transport chain that functions in cellular energy metabolism and as a membrane antioxidant. In the yeast Saccharomyces cerevisiae, coq1–coq9 deletion mutants are respiratory-incompetent, sensitive to lipid peroxidation stress, and unable to synthesize Q6. The yeast coq10 deletion mutant is also respiratory-deficient and sensitive to lipid peroxidation, yet it continues to produce Q6 at an impaired rate. Thus, Coq10 is required for the function of Q6 in respiration and as an antioxidant and is believed to chaperone Q6 from its site of synthesis to the respiratory complexes. In several fungi, Coq10 is encoded as a fusion polypeptide with Coq11, a recently identified protein of unknown function required for efficient Q6 biosynthesis. Because “fused” proteins are often involved in similar biochemical pathways, here we examined the putative functional relationship between Coq10 and Coq11 in yeast. We used plate growth and Seahorse assays and LC-MS/MS analysis to show that COQ11 deletion rescues respiratory deficiency, sensitivity to lipid peroxidation, and decreased Q6 biosynthesis of the coq10Δ mutant. Additionally, immunoblotting indicated that yeast coq11Δ mutants accumulate increased amounts of certain Coq polypeptides and display a stabilized CoQ synthome. These effects suggest that Coq11 modulates Q6 biosynthesis and that its absence increases mitochondrial Q6 content in the coq10Δcoq11Δ double mutant. This augmented mitochondrial Q6 content counteracts the respiratory deficiency and lipid peroxidation sensitivity phenotypes of the coq10Δ mutant. This study further clarifies the intricate connection between Q6 biosynthesis, trafficking, and function in mitochondrial metabolism. Full Article
ap The testis-specific LINC component SUN3 is essential for sperm head shaping during mouse spermiogenesis [Cell Biology] By feedproxy.google.com Published On :: 2020-05-08T03:41:14-07:00 Sperm head shaping is a key event in spermiogenesis and is tightly controlled via the acrosome–manchette network. Linker of nucleoskeleton and cytoskeleton (LINC) complexes consist of Sad1 and UNC84 domain–containing (SUN) and Klarsicht/ANC-1/Syne-1 homology (KASH) domain proteins and form conserved nuclear envelope bridges implicated in transducing mechanical forces from the manchette to sculpt sperm nuclei into a hook-like shape. However, the role of LINC complexes in sperm head shaping is still poorly understood. Here we assessed the role of SUN3, a testis-specific LINC component harboring a conserved SUN domain, in spermiogenesis. We show that CRISPR/Cas9-generated Sun3 knockout male mice are infertile, displaying drastically reduced sperm counts and a globozoospermia-like phenotype, including a missing, mislocalized, or fragmented acrosome, as well as multiple defects in sperm flagella. Further examination revealed that the sperm head abnormalities are apparent at step 9 and that the sperm nuclei fail to elongate because of the absence of manchette microtubules and perinuclear rings. These observations indicate that Sun3 deletion likely impairs the ability of the LINC complex to transduce the cytoskeletal force to the nuclear envelope, required for sperm head elongation. We also found that SUN3 interacts with SUN4 in mouse testes and that the level of SUN4 proteins is drastically reduced in Sun3-null mice. Altogether, our results indicate that SUN3 is essential for sperm head shaping and male fertility, providing molecular clues regarding the underlying pathology of the globozoospermia-like phenotype. Full Article
ap Phenotypic Adaption of Pseudomonas aeruginosa by Hacking Siderophores Produced by Other Microorganisms By feedproxy.google.com Published On :: 2020-04-01 Quentin PerraudApr 1, 2020; 19:589-607Research Full Article
ap Tandem Mass Tag Approach Utilizing Pervanadate BOOST Channels Delivers Deeper Quantitative Characterization of the Tyrosine Phosphoproteome By feedproxy.google.com Published On :: 2020-04-01 Xien Yu ChuaApr 1, 2020; 19:730-743Technological Innovation and Resources Full Article
ap Integrative Metabolic Pathway Analysis Reveals Novel Therapeutic Targets in Osteoarthritis By feedproxy.google.com Published On :: 2020-04-01 Beatriz RochaApr 1, 2020; 19:574-588Research Full Article
ap Organellar maps through proteomic profiling - a conceptual guide By feedproxy.google.com Published On :: 2020-04-28 Georg H H BornerApr 28, 2020; 0:R120.001971v1-mcp.R120.001971Review Full Article
ap Modulation of natural HLA-B*27:05 ligandome by ankylosing spondylitis-associated endoplasmic reticulum aminopeptidase 2 (ERAP2) By feedproxy.google.com Published On :: 2020-04-07 Elena LorenteApr 7, 2020; 0:RA120.002014v1-mcp.RA120.002014Research Full Article
ap Characterization of Prenylated C-terminal Peptides Using a Thiopropyl-based Capture Technique and LC-MS/MS By feedproxy.google.com Published On :: 2020-04-13 James A. WilkinsApr 13, 2020; 0:RA120.001944v1-mcp.RA120.001944Research Full Article
ap Proteaphagy in mammalian cells can function independent of ATG5/ATG7 By feedproxy.google.com Published On :: 2020-04-16 Tatjana GoebelApr 16, 2020; 0:RA120.001983v1-mcp.RA120.001983Research Full Article
ap Developments and Applications of Functional Protein Microarrays By feedproxy.google.com Published On :: 2020-04-17 Guan-Da SyuApr 17, 2020; 0:R120.001936v1-mcp.R120.001936Review Full Article
ap Identification of an Unconventional Subpeptidome Bound to the Behcet's Disease-associated HLA-B*51:01 that is Regulated by Endoplasmic Reticulum Aminopeptidase 1 (ERAP1) By feedproxy.google.com Published On :: 2020-05-01 Liye ChenMay 1, 2020; 19:871-883Research Full Article
ap Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation By feedproxy.google.com Published On :: 2020-04-14 Nora LinscheidApr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878Research Full Article
ap Immediate adaptation analysis implicates BCL6 as an EGFR-TKI combination therapy target in NSCLC By feedproxy.google.com Published On :: 2020-03-31 Yan Zhou TranMar 31, 2020; 0:RA120.002036v1-mcp.RA120.002036Research Full Article
ap A cross-linking mass spectrometry approach defines protein interactions in yeast mitochondria By feedproxy.google.com Published On :: 2020-04-24 Andreas LindenApr 24, 2020; 0:RA120.002028v1-mcp.RA120.002028Research Full Article
ap Characterization of signaling pathways associated with pancreatic {beta}-cell adaptive flexibility in compensation of obesity-linked diabetes in db/db mice By feedproxy.google.com Published On :: 2020-04-07 Taewook KangApr 7, 2020; 0:RA119.001882v1-mcp.RA119.001882Research Full Article
ap Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue By feedproxy.google.com Published On :: 2020-05-01 Eva GriesserMay 1, 2020; 19:839-851Research Full Article
ap A Compact Quadrupole-Orbitrap Mass Spectrometer with FAIMS Interface Improves Proteome Coverage in Short LC Gradients By feedproxy.google.com Published On :: 2020-04-01 Dorte B. Bekker-JensenApr 1, 2020; 19:716-729Technological Innovation and Resources Full Article
ap Proximity Dependent Biotinylation: Key Enzymes and Adaptation to Proteomics Approaches By feedproxy.google.com Published On :: 2020-05-01 Payman Samavarchi-TehraniMay 1, 2020; 19:757-773Review Full Article
ap Microsoft delivers fixes for 110 bugs in April, 2020 Patch Tuesday By feedproxy.google.com Published On :: Tue, 14 Apr 2020 17:43:55 +0000 For the April edition of Patch Tuesday, Microsoft repaired a total of 110 security vulnerabilities across their product line. Included in this count are 37 remote code execution bugs, and 33 elevation of privilege bugs. The company rated eighteen of the vulnerabilities “Critical.” This release’s most notable item is the follow-up to last month’s announcement, […] Full Article SophosLabs Uncut Elevation of Privilege Exploits font Microsoft Patch Tuesday SharePoint updates vulnerability Windows
ap Transparency and Accountability for Drone Use: European Approaches By feedproxy.google.com Published On :: Thu, 07 Mar 2019 17:35:01 +0000 Invitation Only Research Event 11 March 2019 - 9:30am to 12 March 2019 - 12:30pm Chatham House With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
ap European Approaches to Remote Warfare By feedproxy.google.com Published On :: Fri, 26 Apr 2019 14:50:01 +0000 Research Event 15 May 2019 - 9:00am to 6:00pm Brussels, Belgium With continuing instability at Europe's borders, along with uncertainty on future US support for NATO, many European countries are increasing their allocations to defence budgets and to collective European strategic defence. In addition, with non-state armed groups creating instability and threatening civilian lives and livelihoods in proximity to the EU’s borders, various operations have been carried out in conflict theatres in the Middle East, North Africa and the Sahel under the auspices of NATO, the UN, the EU or by single EU member states.Although European military personnel have been deployed in many regions, with countries becoming more reluctant to deploy ‘boots on the ground’, warfare has been increasingly conducted through remote means. This has led to criticism on the limited transparency and accountability mechanisms at work in these operations, while some have questioned the military effectiveness of such tactics or the capacity and willingness of states to ensure that targets are struck accurately and without impact on civilian populations.Against this background, the EU has started allocating resources to military research and development projects with a focus on unmanned systems and related technologies. Under the auspices of the European Defence Fund such funding is set to increase, while potential bilateral programmes between some states have also been explored. Despite concerns raised by the European Parliament, the development of these policies and technologies has taken place without significant consideration of what the legal, ethical and military-strategic impact of these instruments might be. This event will bring together a range of experts, policymakers and civil society organizations to discuss the technology horizon of European defence investments and policy developments around remote warfare. Participants will discuss the implications of the new EU defence fund, legal, ethical, and transparency issues in military research and development and the position of the EU as a global actor. This event is being organized in partnership with PAX Netherlands.THIS EVENT IS NOW FULL AND REGISTRATION HAS CLOSED. Department/project International Security Programme Nilza Amaral Project Manager, International Security Programme Email Full Article
ap The Smart Peace Initiative: An Integrated and Adaptive Approach to Building Peace By feedproxy.google.com Published On :: Tue, 11 Feb 2020 10:55:01 +0000 Invitation Only Research Event 12 May 2020 - 10:00am to 11:30amAdd to CalendariCalendar Outlook Google Yahoo Smart Peace brings together global expertise in conflict analysis and research, peacebuilding and mediation programming, and behavioural science and evaluation. Together, Smart Peace partners are developing integrated and adaptive peace initiatives, working with local partners to prevent and resolve complex and intractable conflicts in Central African Republic, Myanmar and northern Nigeria. This roundtable is an opportunity for Smart Peace partners to share the Smart Peace concept, approach and objectives, and experiences of the first phases of programme implementation. Roundtable discussions among participants from policy, practice and research communities will inform future priorities and planning for Smart Peace learning, advocacy and communication. Smart Peace partners include Conciliation Resources, Behavioural Insights Team, The Centre for Humanitarian Dialogue, Chatham House, ETH Zurich, International Crisis Group and The Asia Foundation. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Smart Peace Full Article
ap Cyber Security and Nuclear Weapons By feedproxy.google.com Published On :: Fri, 28 Feb 2020 09:15:20 +0000 This project aims to improve resilience in NATO’s nuclear weapons systems against cyber threats. Cyber security is a vital part of the national and international strategic infrastructure and weapons systems. The increasing cyber capabilities of countries such as China, Russia and North Korea put the North Atlantic Treaty Organization’s (NATO’s) nuclear systems - capabilities that include nuclear command, control and communication, weapons systems and early warning systems - in danger.There is an urgent need to study and address cyber challenges to nuclear assets within NATO and in key NATO countries. Greater awareness of the potential threats and vulnerabilities is key to improving preparedness and mitigating the risks of a cyber-attack on NATO nuclear weapons systems.Chatham House produces research responding to the need for information on enhancing cybersecurity for command, control and communications. This project constitutes the beginning of the second phase of the Cyber Security of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, a report published in January 2018 in partnership with the Stanley Foundation.The project responds to the need both for more public information on cyber risks in NATO’s nuclear mission, and to provide policy-driven research to shape and inform nuclear policy within NATO member states and the Nuclear Planning Group.This project is supported by the Ploughshares Fund and the Stanley Foundation. Full Article
ap Nuclear Weapons: Innovative Approaches for the Complex International Security Environment By feedproxy.google.com Published On :: Fri, 28 Feb 2020 10:09:26 +0000 This programme of work addresses the conundrum of nuclear weapons as a wicked problem in a complex adaptive system. Understanding the complexity and the wickedness of the situation allows analysts and strategic planners to approach these complex and intractable issues in new and transformative ways – with a better chance of coping or succeeding and reducing the divisions between experts.Using complexity theory, a complex adaptive system representing the international system and its interaction with the environment can be represented through an interactive visualization tool that will aid thought processes and policy decision-making. Until recently, analysts did not have the tools to be able to create models that could represent the complexity of the international system and the role that nuclear weapons play. Now that these tools are available, analysts should use them to enable decision-makers to gain insights into the range of possible outcomes from a set of possible actions.This programme builds on work by Chatham House on cyber security and artificial intelligence (AI) in the nuclear/strategic realms.In order to approach nuclear weapons as wicked problems in a complex adaptive system from different and sometimes competing perspectives, the programme of work involves the wider community of specialists who do not agree on what constitutes the problems of nuclear weapons nor on what are the desired solutions.Different theories of deterrence, restraint and disarmament are tested. The initiative is international and inclusive, paying attention to gender, age and other aspects of diversity, and the network of MacArthur Grantees are given the opportunity to participate in the research, including in the writing of research papers, so that the complexity modelling can be tested against a wide range of approaches and hypotheses.In addition, a Senior Reference Group will work alongside the programme, challenging its outcome and findings, and evaluating and guiding the direction of the research.This project is supported by the MacArthur Foundation. Full Article
ap Soundscapes of war: the audio-visual performance of war by Shi'a militias in Iraq and Syria By feedproxy.google.com Published On :: Thu, 07 May 2020 09:16:54 +0000 7 May 2020 , Volume 96, Number 3 Helle Malmvig Read online This article sets out to bring sound and music to the field of visual studies in International Relations. It argues that IR largely has approached the visual field as if it was without sound; neglecting how audial landscapes frame and direct our interpretation of moving imagery. Sound and music contribute to making imagery intelligible to us, we ‘hear the pictures’ often without noticing. The audial can for instance articulate a visual absence, or blast visual signs, bring out certain emotional stages or subjects’ inner life. Audial frames steer us in distinct directions, they can mute the cries of the wounded in war, or amplify the sounds of joy of soldiers shooting in the air. To bring the audial and the visual analytically and empirically together, the article therefore proposes four key analytical themes: 1) the audial–visual frame, 2) point of view/point of audition, 3) modes of audio-visual synchronization and 4) aesthetics moods. These are applied to a study of ‘war music videos’ in Iraq and Syria made and circulated by Shi'a militias currently fighting there. Such war music videos, it is suggested, are not just artefacts of popular culture, but have become integral parts of how warfare is practiced today, and one that is shared by soldiers in the US and Europe. War music videos are performing war, just as they shape how war is known by spectators and participants alike. Full Article
ap Rapid Brain Nicotine Uptake from Electronic Cigarettes By jnm.snmjournals.org Published On :: 2019-11-01T13:36:37-07:00 This study sought to determine brain nicotine kinetics from the use of increasingly popular electronic cigarettes (E-cigs). Methods: Brain uptake of nicotine following inhalation from E-cigs was directly assessed in 17 E-cig users (8 females), using 11C-nicotine and positron emission tomography. The brain nicotine kinetics parameters from E-cigs were compared with those from smoking combustible cigarettes (C-cigs). Results: After inhalation of a single puff of E-cig vapor, brain nicotine concentration rose quickly (mean T1/2 27 sec) with a peak amplitude 25% higher in females than males, resembling previous observations with C-cigs. Nonetheless, brain nicotine accumulation from E-cigs was smaller than that from C-cigs in both males and females (24% and 32%, respectively). Conclusion: E-cigs can deliver nicotine rapidly to the brain. Therefore, to the extent that rapid brain uptake promotes smoking reward, e-cigarettes might maintain a degree of nicotine dependence and also serve as non-combustible substitutes for cigarettes. Full Article
ap PARP-1-targeted Auger emitters display high-LET cytotoxic properties in vitro but show limited therapeutic utility in solid tumor models of human neuroblastoma By jnm.snmjournals.org Published On :: 2019-11-01T13:36:37-07:00 The currently available therapeutic radiopharmaceutical for high-risk neuroblastoma, 131I-MIBG, is ineffective at targeting micrometastases due to the low linear energy transfer (LET) properties of high-energy beta particles. In contrast, Auger radiation has high-LET properties with nanometer ranges in tissue, efficiently causing DNA damage when emitted in close proximity to DNA. The aim of this study was to evaluate the cytotoxicity of targeted Auger therapy in pre-clinical models of high-risk neuroblastoma. Methods: Using a radiolabeled poly(ADP-ribose) polymerase (PARP) inhibitor, 125I-KX1, we delivered an Auger emitter iodine-125 to PARP-1: a chromatin-binding enzyme overexpressed in neuroblastoma. In vitro cytotoxicity of 125I-KX1 was assessed in nineteen neuroblastoma cell lines, followed by in-depth pharmacological analysis in a sensitive and resistant pair of cell lines. Immunofluorescence microscopy was used to characterize 125I-KX1-induced DNA damage. Finally, in vitro/in vivo microdosimetry was modeled from experimentally derived pharmacological variables. Results: 125I-KX1 was highly cytotoxic in vitro across a panel of neuroblastoma cell lines, directly causing double strand DNA breaks. Based on subcellular dosimetry, 125I-KX1 was approximately twice as effective compared to 131I-KX1, whereas cytoplasmic 125I-MIBG demonstrated low biological effectiveness. Despite the ability to deliver focused radiation dose to the cell nuclei, 125I-KX1 remained less effective than its alpha-emitting analog 211At-MM4, and required significantly higher activity for equivalent in vivo efficacy based on tumor microdosimetry. Conclusion: Chromatin-targeted Auger therapy is lethal to high-risk neuroblastoma cells with potential use in micrometastatic disease. This study provides the first evidence for cellular lethality from a PARP-1 targeted Auger emitter, calling for further investigation into targeted Auger therapy. Full Article
ap 18F-DCFPyL PET/CT Imaging in Patients with Biochemical Recurrence Prostate Cancer after Primary Local Therapy By jnm.snmjournals.org Published On :: 2019-11-01T13:36:37-07:00 Objective: To investigate the lesion detection rate of 18F-DCFPyL-PET/CT, a prostate-specific membrane antigen (PSMA) targeted PET agent, in biochemical relapse prostate cancer patients after primary local therapy. Methods: This is a prospective institutional review board-approved study of 90 patients with documented biochemical recurrence (median PSA 2.5 ng/mL, range 0.21-35.5 ng/mL) with negative conventional imaging after primary local therapies, including radical prostatectomy (n = 38), radiation (n = 27) or combination (n = 25). Patients on androgen deprivation therapy were excluded. Patients underwent whole-body 18F-DCFPyL-PET/CT (299.9±15.5 MBq) at 2 h p.i. PSMA-PET lesion detection rate was correlated with PSA, PSA kinetics and original primary tumor grade. Results: Seventy patients (77.8%) showed a positive PSMA-PET scan, identifying a total of 287 lesions: 37 prostate bed foci, 208 lymph nodes, and 42 bone/organ distant sites; 11 patients had a negative scan and 9 patients showed indeterminate lesions, which were considered negative in this study. The detection rates were 47.6% (n = 10/21), 50% (n = 5/10), 88.9% (n = 8/9), and 94% (n = 47/50) for PSA >0.2 to <0.5, 0.5 to <1.0, 1 to <2.0, and ≥2.0 ng/mL, respectively. In post-surgical patients, PSA, PSAdt and PSAvel correlated with PET results but the same was not true for post-radiation patients. These parameters also correlated with the extent of disease on PET (intrapelvic vs. extrapelvic). There was no significant difference between the rate of positive scans in patients with higher grade vs lower grade primary tumors (Gleason score ≥4+3 vs <3+4). Tumor recurrence was histology confirmed in 40% (28/70) of patients. On a per-patient basis, positive predictive value was 93.3% (95% CI, 77.6-99.2%) by histopathologic validation, and 96.2% (95% CI, 86.3-99.7%) by the combination of histology and imaging/clinical follow-up. Conclusion: 18F-DCFPyL-PET/CT imaging offers high detection rates in biochemically recurrent prostate cancer patients; and is positive in about 50% of patients with PSA <0.5 ng/mL, which could substantially impact clinical management. In post-surgical patients, 18F-DCFPyL-PET/CT correlates with PSA, PSAdt and PSAvel suggesting it may have prognostic value. 18F-DCFPyL-PET/CT is highly promising for localizing sites of recurrent prostate cancer. Full Article
ap 3-year freedom from progression following 68GaPSMA PET CT triaged management in men with biochemical recurrence post radical prostatectomy. Results of a prospective multi-center trial. By jnm.snmjournals.org Published On :: 2019-11-01T13:36:36-07:00 Background: 68Ga PSMA PET CT (PSMA) is increasingly used in men with biochemical recurrence (BCR) post radical prostatectomy (RP), but its longer term prognostic / predictive potential in these men is unknown. The aim of this study was to evaluate the predictive value of PSMA PET for 3 year freedom from progression (FFP) in men with BCR post RP undergoing salvage radiotherapy (sRT). Methods: This prospective multi-center study enrolled 260 men between 2015 and 2017. Eligible patients were referred for PSMA with rising PSA following RP. Management following PSMA was recorded but not mandated. PSMA protocols were standardised across sites and reported prospectively. Clinical, pathological and surgical information, sRT, timing and duration of androgen deprivation (ADT), 3 year PSA results and clinical events were documented. FFP was defined as a PSA rise ≤ 0.2ng/mL above nadir post sRT, with no additional treatment. Results: The median PSA was 0.26ng/mL (IQR 0.15 - 0.59) and follow-up 38 months (IQR 31-43). PSMA was negative in 34.6% (90/260), confined to prostate fossa 21.5% (56/260), pelvic nodes 26.2% (68/260), and distant disease 17.7% (46/260). 71.5% (186/260) received sRT, 38.2% (71/186) to the fossa only, 49.4% (92/186) fossa + pelvic nodes and 12.4% (23/186) nodes alone/SBRT. PSMA was highly predictive of FFP at 3 years following sRT. Overall, FFP was achieved in 64.5% (120/186) of those who received sRT, 81% (81/100) with negative/fossa confined vs. 45% (39/86) for extra fossa disease (p<0.0001). On logistic regression PSMA was more independently predictive of FFP than established clinical predictors, including PSA, T-stage, surgical margin status or Gleason score (P < 0.002). 32% of men with a negative PSMA PET did not receive treatment. Of these, 66% (19/29) progressed, with a mean rise in PSA of 1.59ng/mL over the 3 years. Conclusion: PSMA PET result is highly predictive of FFP at 3 years in men undergoing sRT for BCR following RP. In particular, men with negative PSMA PET or disease identified as still confined to the prostate fossa demonstrate high FFP, despite receiving less extensive radiotherapy and lower rates of additional ADT than those with extra fossa disease. Full Article
ap Can fluorescence-guided surgery help identify all lesions in unknown locations or is the integrated use of a roadmap created by preoperative imaging mandatory? A blinded study in prostate cancer patients. By jnm.snmjournals.org Published On :: 2019-11-11T12:55:20-08:00 Rationale: Lymphatic tracers can help visualize the lymphatic drainage patterns and sentinel nodes of individual prostate cancer patients. To determine the role of nuclear medicine, in particular the positional guidance of a SPECT/CT-based 3D imaging roadmap, in this process we studied to which extend fluorescence-guidance underestimated the number of target lesions. Methods: SPECT/CT imaging was performed after intraprostatic tracer administration of either ICG-99mTc-nanocolloid (hybrid tracer group) or 99mTc-nanocolloid to create a roadmap that depicted all sentinel nodes (SNs). Patients who received 99mTc-nanocolloid were injected with "free" ICG immediately prior to surgery ("free" ICG group). Before unblinding, fluorescence-guidance was used for intraoperative SN identification. This was followed by extended pelvic lymph node dissection (ePLND). Following unblinding of the SPECT/CT images, the number of missed SN’s were recorded and their resection was pursued when the anatomy allowed. Results: Preoperative SPECT/CT revealed no differences in the SN identification rate between ICG-99mTc-nanocolloid and 99mTc-nanocolloid. However, fluorescence-guidance only allowed intraoperative removal of all SNs in 40% of patients in the hybrid tracer group and in 20% of patients in the "free" ICG group. Overall, 75.9% of the intraoperatively resected SNs in the hybrid tracer group and 51.8% of the SNs in the "free" ICG group were removed solely under fluorescence-guidance. During ePLND 22 additional SNs were resected (7 in the hybrid tracer group and 15 in the "free" ICG group). After unblinding 18 remaining SNs were identified (6 in the hybrid group and 12 in the "free" ICG group). In the "free" ICG group, ex vivo evaluation of the excised specimens revealed that 14 SNs removed under ePLND or after unblinding contained radioactivity but no fluorescence. Conclusion: The preoperative imaging roadmap provided by SPECT/CT enhanced the detection of prostate SNs in more ectopic locations in 17 of the 25 patients and the hybrid tracer ICG-99mTc-nanocolloid was shown to outperform "free" ICG. Overall, fluorescence-guided pelvic nodal surgery underestimated the number of SNs in 60-80% of patients. Full Article
ap Combined Visual and Semi-quantitative Evaluation Improves Outcome Prediction by Early Mid-treatment 18F-fluoro-deoxi-glucose Positron Emission Tomography in Diffuse Large B-cell Lymphoma. By jnm.snmjournals.org Published On :: 2019-11-22T10:43:33-08:00 The purpose of this study was to assess the predictive and prognostic value of interim FDG PET (iPET) in evaluating early response to immuno-chemotherapy after two cycles (PET-2) in diffuse large B-cell lymphoma (DLBCL) by applying two different methods of interpretation: the Deauville visual five-point scale (5-PS) and a change in standardised uptake value by semi-quantitative evaluation. Methods: 145 patients with newly diagnosed DLBCL underwent pre-treatment PET (PET-0) and PET-2 assessment. PET-2 was classified according to both the visual 5-PS and percentage SUV changes (SUV). Receiver operating characteristic (ROC) analysis was performed to compare the accuracy of the two methods for predicting progression-free survival (PFS). Survival estimates, based on each method separately and combined, were calculated for iPET-positive (iPET+) and iPET-negative (iPET–) groups and compared. Results: Both with visual and SUV-based evaluations significant differences were found between the PFS of iPET– and iPET+ patient groups (p<0.001). Visually the best negative (NPV) and positive predictive value (PPV) occurred when iPET was defined as positive if Deauville score 4-5 (89% and 59%, respectively). Using the 66% SUV cut-off value, reported previously, NPV and PPV were 80 and 76%, respectively. SUV at 48.9% cut-off point, reported for the first time here, produced 100% specificity along with the highest sensitivity (24%). Visual and semi-quantitative SUV<48.9% assessment of each PET-2 gave the same PET-2 classification (positive or negative) in 70% (102/145) of all patients. This combined classification delivered NPV and PPV of 89% and 100% respectively, and all iPET+ patients failed to achieve or remain in remission. Conclusion: In this large consistently treated and assessed series of DLBCL, iPET had good prognostic value interpreted either visually or semi-quantitatively. We determined that the most effective SUV cut-off was at 48.9%, and that when combined with visual 5-PS assessment, a positive PET-2 was highly predictive of treatment failure. Full Article
ap Initial studies with [11C]vorozole positron emission tomography detect over-expression of intra-tumoral aromatase in breast cancer By jnm.snmjournals.org Published On :: 2019-11-22T10:43:33-08:00 Introduction: Aromatase inhibitors are the mainstay of hormonal therapy in estrogen receptor positive, postmenopausal breast cancer, although response rate is just over 50%. The goal of the present study was to validate and optimize positron emission tomography (PET) with 11C-vorozole for measuring aromatase expression in postmenopausal breast cancer. Methods: Ten newly diagnosed, postmenopausal women with biopsy confirmed breast cancer were administered 11C-vorozole intravenously and PET emission data collected between 40 – 90 minutes post-injection. Tracer injection and scanning were repeated 2 hours after ingestion of 2.5mg letrozole p.o. Mean and maximal standard uptake values and ratios to non-tumor tissue (SUVs, SUVRs) were calculated for tumor and non-tumor regions at baseline and after letrozole. Biopsy specimens from the same tumors were stained for aromatase using immunohistochemistry and evaluated for stain intensity and the percentage of immune-positive cells. Results: Seven of the 10 women (70%) demonstrated increased focal uptake of tracer (SUVR>1.1) coinciding with the mammographic location of the lesion. The other 3 women (30%) did not show increased uptake in the tumor (SUVR <1.0). All of the cases with SUVR above 1.1 had SUVs above 2.4 and there was no overlap in SUV between the two groups, with mean SUV in tumors overexpressing aromatase (SUVR>1.1) ranging from 2.47 to 13.6, while tumors not overexpressing aromatase (SUVR<1) ranged from 0.8 to 1.8. Pretreatment with letrozole reduced tracer uptake in the majority of subjects; although the %blocking varied across and within tumors. Tumors with high SUV in vivo also showed high staining intensity on IHC. Conclusion: PET with 11C-vorozole is a useful technique for measuring aromatase expression in individual breast lesions, enabling a non-invasive quantitative measurement of baseline and post-treatment aromatase availability in primary tumors and metastatic lesions. Full Article
ap SUV25 and {micro}PERCIST: Precision Imaging of Response to Therapy in Co-Clinical FDG-PET Imaging of Triple Negative Breast Cancer (TNBC) Patient-Derived Tumor Xenografts (PDX) By jnm.snmjournals.org Published On :: 2019-11-22T10:43:33-08:00 Numerous recent works highlight the limited utility of established tumor cell lines in recapitulating the heterogeneity of tumors in patients. More realistic preclinical cancer models are thought to be provided by transplantable, patient-derived tumor xenografts (PDX). Inter- and intra-tumor heterogeneity of PDX, however, present several challenges in developing optimal quantitative pipelines to assess response to therapy. The objective of this work was to develop and optimize image metrics of FDG-PET to assess response to combination docetaxel/carboplatin therapy in a co-clinical trial involving triple negative breast cancer (TNBC) PDX. We characterize the reproducibility of SUV metrics to assess response to therapy and optimize a preclinical PERCIST (µPERCIST) paradigm to complement clinical standards. Considerations in this effort included variability in tumor growth rate and tumor size; solid tumor vs. tumor heterogeneity and necrotic phenotype; and optimal selection of tumor slice versus whole tumor. A test-retest protocol was implemented to optimize the reproducibility of FDG-PET SUV thresholds, SUVpeak metrics, and µPERCIST parameters. In assessing response to therapy, FDG-PET imaging was performed at baseline and +4 days following therapy. The reproducibility, accuracy, variability, and performance of imaging metrics to assess response to therapy were determined. We defined an index—"Quantitative Response Assessment Score (QRAS)"—to integrate parameters of prediction and precision, and thus aid in selecting optimal image metrics of response to therapy. Our data suggests that a threshold value of 25% (SUV25) of SUVmax was highly reproducible (<9% variability). Concordance and reproducibility of µPERCIST were maximized at α=0.7 and β=2.8 and exhibited high correlation to SUV25 measures of tumor uptake. QRAS scores favor SUV25 followed by SUVP14 as optimal metrics of response to therapy. Additional studies are warranted to fully characterize the utility of SUV25 and µPERCIST SUVP14 as image metrics of response to therapy across a wide range of therapeutic regiments and PDX models. Full Article
ap Pre-treatment 18F-FDG PET/CT Radiomics predict local recurrence in patients treated with stereotactic radiotherapy for early-stage non-small cell lung cancer: a multicentric study By jnm.snmjournals.org Published On :: 2019-12-05T10:37:41-08:00 Purpose: The aim of this retrospective multicentric study was to develop and evaluate a prognostic FDG PET/CT radiomics signature in early-stage non-small cell lung cancer (NSCLC) patients treated with stereotactic radiotherapy (SBRT). Material and Methods: Patients from 3 different centers (n = 27, 29 and 8) were pooled to constitute the training set, whereas the patients from a fourth center (n = 23) were used as the testing set. The primary endpoint was local control (LC). The primary tumour was semi-automatically delineated in the PET images using the Fuzzy locally adaptive Bayesian algorithm, and manually in the low-dose CT images. A total of 184 IBSI-compliant radiomic features were extracted. Seven clinical and treatment parameters were included. We used ComBat to harmonize radiomic features extracted from the four institutions relying on different PET/CT scanners. In the training set, variables found significant in the univariate analysis were fed into a multivariate regression model and models were built by combining independent prognostic factors. Results: Median follow-up was 21.1 (1.7 – 63.4) and 25.5 (7.7 – 57.8) months in training and testing sets respectively. In univariate analysis, none of the clinical variables, 2 PET and 2 CT features were significantly predictive of LC. The best predictive models in the training set were obtained by combining one feature from PET, namely information correlation 2 (IC2) and one from CT (Flatness), reaching a sensitivity of 100% and a specificity of 96%. Another model combining 2 PET features (IC2 and Strength), reached sensitivity of 100% and specificity of 88%, both with an undefined hazard ratio (HR) (p<0.001). The latter model obtained an accuracy of 0.91 (sensitivity 100%, specificity 81%), with a HR undefined (P = 0.023) in the testing set, however other models relying on CT radiomics features only or the combination of PET and CT features failed to validate in the testing set. Conclusion: We showed that two radiomic features derived from FDG PET were independently associated with LC in patients with NSCLC undergoing SBRT and could be combined in an accurate predictive model. This model could provide local relapse-related information and could be helpful in clinical decision-making. Full Article