The gut microbiota plays an important role in maintaining intestinal homeostasis. Dysbiosis is associated with intestinal tumorigenesis. Deoxycholic acid (DCA), a secondary bile acid increased by a western diet, correlates with intestinal carcinogenesis. However, evidence relating bile acids, intestinal microbiota and tumorigenesis are limited. In our study, we investigated the effect of DCA on induction of intestinal dysbiosis and its roles in intestinal carcinogenesis. Alteration of the composition of the intestinal microbiota was induced in DCA-treated APC mice, which was accompanied by impaired intestinal barrier, gut low grade inflammation and tumor progression. The transfer of fecal microbiota from DCA-treated mice to another group of Apc mice increased tumor multiplicity, induced inflammation and recruited M2 phenotype tumor-associated macrophages. Importantly, the fecal microbiota transplantation activated the tumor-associated Wnt/β-catenin signaling pathway. Moreover, microbiota depletion by a cocktail of antibiotics was sufficient to block DCA-induced intestinal carcinogenesis, further suggesting the role of dysbiosis in tumor development. Our study demonstrated that alteration of the microbial community induced by DCA promoted intestinal carcinogenesis.
AimPatients with small serrated adenomas (SAs) (<10 mm) often undergo surveillance colonoscopy before the routine recommended time. We aimed to determine the appropriate surveillance intervals following polypectomy of small SAs for symptomatic patients.MethodWe retrospectively reviewed the data of 638 patients, including 122 cases and 516 controls. Subjects in the case group had small SAs at baseline colonoscopy, including sessile SA/polyps and traditional SAs, while subjects in the control group had negative findings. All patients underwent at least one surveillance colonoscopy during the following 5 years.ResultsThere was no significant difference in the incidence rate of advanced neoplasia between the two groups over a 5-year duration (3.6% vs 2.6%, p=0.455). Moreover, both groups also showed a low prevalence of SA formation over 1–5 years (3.6% vs 1.0%, p=0.145). Patients with baseline SA tended to undergo the first surveillance colonoscopy earlier than those without adenoma (≤1 year vs 1 to ≤3 years). Seventy-one (11.1%) of the total included subjects underwent inadequate initial colonoscopy, and 30 (42.3%) underwent early surveillance of adenoma formation within 1 year. Patients with a family history of colorectal cancer (OR 4.69, 95% CI 1.48 to 14.71, p=0.017) or inadequate baseline colonoscopy (OR 3.17, 95% CI 1.202 to 8.409, p=0.035) were at a higher risk of metachronous adenoma formation during the surveillance period.ConclusionPatients with small SAs at baseline gain little benefit from follow-up of colonoscopy within 5 years after complete polypectomy.
With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, provide safe and convenient encryption services, and effectively prevent network attacks. According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping, port number hopping, protocol camouflage, and network channel change to increase the attack threshold. Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet to achieve “one packet, one key.” Finally, through the cooperation of the ARM and the FPGA, an access control list can be used to filter illegal data and monitor the working status of the system in real time. If an abnormality is found, the feedback reconstruction mechanism is used to “clean” the FPGA to make it work normally again. The experimental results and analysis show that the mimic encryption box designed in this paper has high network encryption performance and can effectively prevent data leakage. At the same time, it provides a mimic security defense mechanism at multiple levels, which can effectively resist a variety of network attacks and has high security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.