1000 resultados para maternal–fetal exchange


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Background/Aims
Familial clustering of hepatitis B virus (HBV) infection is related to perinatal transmission, and is the main cause of familial-type hepatocellular carcinoma (HCC). The route of HBV transmission differs between the children and siblings of patients with HCC. This study examined the differences in HBV carrier rates and HCC-related mortality between two generations in HCC families.
Methods
From 1992 to 1997, relatives of individuals with HCC were screened prospectively with ultrasonography, alpha-fetoprotein, liver biochemistry tests and viral markers. Total HCC-related deaths during a 9-year period were compared between the generations of index patients and their children.
Results
The study included a total of 13 676 relatives in two generations. More HCC-related deaths occurred in the index patient generation than in the child generation. Furthermore, children of female index patients had higher rates of liver cancer related mortality than children of male index patients. The same was true when the analysis was limited to male HBV carriers. The prevalence of HBsAg in the offspring of HBsAg positive mothers was 66% in the child generation and 72% in the index patient generation. These high prevalences indicated high maternal HBV replication status.
Conclusions
Perinatal transmission and maternal viral load are important risk factors in hepatocarcinogenesis.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Persistent hepatitis B virus (HBV) replication is important for progression of chronic liver diseases. To understand whether there is a trend of HBV replication in siblings or not, 1850 relatives of patients with hepatocellular carcinoma (HCC) were examined prospectively for liver function test, viral markers and HBV DNA. The prevalence of HBsAg in the parents', siblings', children's and grandchildren's generations were 43.4%, 57.2%, 35.5% and 32.1%, respectively. The prevalence of hepatitis B e antigen (HBeAg) in sibling's generation (mean age 44.4 years) was 19%, which is higher than that of asymptomatic HBsAg carriers. For siblings in the children's generation, the prevalence of HBeAg in hepatitis B surface antigen (HBsAg) carriers declined from 40% in the eldest siblings to 19% in the youngest siblings. In 75 families clustered with three or more HBsAg carrier siblings, the mean age for seven families of which all siblings remained HBeAg + was younger, whereas the mean age for 35 families of which all siblings had cleared HBeAg was older. For the remaining 33 families, in only 10 families had the older siblings cleared the HBeAg earlier than the younger siblings. Twenty families showed that younger siblings cleared the HBeAg earlier than the older or middle siblings. We concluded that HBV replication in HCC relatives cannot be explained by familial tendency alone. A significant number of younger siblings appeared to have a shorter HBV replication phase than their older siblings. The possible role of this in maternal–fetal transmission is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The firm is faced with a decision concerning the nature of intra-organizational exchange relationships with internal human resources and the nature or inter-organizational exchange relationships with market firms. In both situations, the firm can develop an exchange that ranges from a discrete exchange to a relational exchange. Transaction Cost Economics (TCE) and the Resource Dependency View (RDV) represent alternative efficiency-based explanations fo the nature of the exchange relationship. The aim of the paper is to test these two theories in respect of air conditioning maintenance in retail centres. Multiple sources of information are genereated from case studies of Australian retail centres to test these theories in respoect of internalized operations management (concerning strategic aspects of air conditioning maintenance) and externalized planned routine air conditioning maintenance. The analysis of the data centres on pattern matching. It is concluded that the data supports TCE - on the basis of a development in TCE's contractual schema. Further research is suggested towards taking a pluralistic stance and developing a combined efficiency and power hypothesis - upon which Williamson has speculated. For practice, the conclusions also offer a timely cautionary note concerning the adoption of one approach in all exchange relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.