985 resultados para neighboring nodes
Resumo:
After an inflammatory stimulus, lymphocyte migration into draining lymph nodes increases dramatically to facilitate the encounter of naive T cells with Ag-loaded dendritic cells. In this study, we show that CD73 (ecto-5'-nucleotidase) plays an important role in regulating this process. CD73 produces adenosine from AMP and is expressed on high endothelial venules (HEV) and subsets of lymphocytes. Cd73(-/-) mice have normal sized lymphoid organs in the steady state, but approximately 1.5-fold larger draining lymph nodes and 2.5-fold increased rates of L-selectin-dependent lymphocyte migration from the blood through HEV compared with wild-type mice 24 h after LPS administration. Migration rates of cd73(+/+) and cd73(-/-) lymphocytes into lymph nodes of wild-type mice are equal, suggesting that it is CD73 on HEV that regulates lymphocyte migration into draining lymph nodes. The A(2B) receptor is a likely target of CD73-generated adenosine, because it is the only adenosine receptor expressed on the HEV-like cell line KOP2.16 and it is up-regulated by TNF-alpha. Furthermore, increased lymphocyte migration into draining lymph nodes of cd73(-/-) mice is largely normalized by pretreatment with the selective A(2B) receptor agonist BAY 60-6583. Adenosine receptor signaling to restrict lymphocyte migration across HEV may be an important mechanism to control the magnitude of an inflammatory response.
Resumo:
PURPOSE To prospectively assess the diagnostic performance of diffusion-weighted (DW) magnetic resonance (MR) imaging in the detection of pelvic lymph node metastases in patients with prostate and/or bladder cancer staged as N0 with preoperative cross-sectional imaging. MATERIALS AND METHODS This study was approved by an independent ethics committee. Written informed consent was obtained from all patients. Patients with no enlarged lymph nodes on preoperative cross-sectional images who were scheduled for radical resection of the primary tumor and extended pelvic lymph node dissection were enrolled. All patients were examined with a 3-T MR unit, and examinations included conventional and DW MR imaging of the entire pelvis. Image analysis was performed by three independent readers blinded to any clinical information. Metastases were diagnosed on the basis of high signal intensity on high b value DW MR images and morphologic features (shape, border). Histopathologic examination served as the standard of reference. Sensitivity and specificity were calculated, and bias-corrected 95% confidence intervals (CIs) were obtained with the bootstrap method. The Fleiss and Cohen κ and median test were applied for statistical analyses. RESULTS A total of 4846 lymph nodes were resected in 120 patients. Eighty-eight lymph node metastases were found in 33 of 120 patients (27.5%). Short-axis diameter of these metastases was less than or equal to 3 mm in 68, more than 3 mm to 5 mm in 13, more than 5 mm to 8 mm in five; and more than 8 mm in two. On a per-patient level, the three readers correctly detected metastases in 26 (79%; 95% CI: 64%, 91%), 21 (64%; 95% CI: 45%, 79%), and 25 (76%; 95% CI: 60%, 90%) of the 33 patients with metastases, with respective specificities of 85% (95% CI: 78%, 92%), 79% (95% CI: 70%, 88%), and 84% (95% CI: 76%, 92%). Analyzed according to hemipelvis, lymph node metastases were detected with histopathologic examination in 44 of 240 pelvic sides (18%); the three readers correctly detected these on DW MR images in 26 (59%; 95% CI: 45%, 73%), 19 (43%; 95% CI: 27%, 57%), and 28 (64%; 95% CI: 47%, 78%) of the 44 cases. CONCLUSION DW MR imaging enables noninvasive detection of small lymph node metastases in normal-sized nodes in a substantial percentage of patients with prostate and bladder cancer diagnosed as N0 with conventional cross-sectional imaging techniques.
Resumo:
Two of the main issues in wireless industrial Internet of Things applications are interoperability and network lifetime. In this work we extend a semantic interoperability platform and introduce an application-layer sleepy nodes protocol that can leverage on information stored in semantic repositories. We propose an integration platform for managing the sleep states and an application layer protocol based upon the Constraint Application Layer protocol. We evaluate our system on windowing based task allocation strategies, aiming for lower overall energy consumption that results in higher network lifetime.
Resumo:
Despite moderate improvements in outcome of glioblastoma after first-line treatment with chemoradiation recent clinical trials failed to improve the prognosis of recurrent glioblastoma. In the absence of a standard of care we aimed to investigate institutional treatment strategies to identify similarities and differences in the pattern of care for recurrent glioblastoma. We investigated re-treatment criteria and therapeutic pathways for recurrent glioblastoma of eight neuro-oncology centres in Switzerland having an established multidisciplinary tumour-board conference. Decision algorithms, differences and consensus were analysed using the objective consensus methodology. A total of 16 different treatment recommendations were identified based on combinations of eight different decision criteria. The set of criteria implemented as well as the set of treatments offered was different in each centre. For specific situations, up to 6 different treatment recommendations were provided by the eight centres. The only wide-range consensus identified was to offer best supportive care to unfit patients. A majority recommendation was identified for non-operable large early recurrence with unmethylated MGMT promoter status in the fit patients: here bevacizumab was offered. In fit patients with late recurrent non-operable MGMT promoter methylated glioblastoma temozolomide was recommended by most. No other majority recommendations were present. In the absence of strong evidence we identified few consensus recommendations in the treatment of recurrent glioblastoma. This contrasts the limited availability of single drugs and treatment modalities. Clinical situations of greatest heterogeneity may be suitable to be addressed in clinical trials and second opinion referrals are likely to yield diverging recommendations.
Resumo:
Since the formation of Afghanistan, its nature as a Pashtun state has affected all its international relations. On the other hand, the fact that it was originally established as a buffer state between Britain and Russia still governs its national integration. In this article I examine Afghanistan's relations with its neighbors through an investigation of its history and the present conditions of its borders with its southern, western and northern neighbors. My aim is to obtain an overall perspective of Afghanistan's relations with its neighbors, historically decisive elements, and the aftermath of the September 11 terrorist attacks.
Resumo:
Thailand has recently strengthened its economic policy toward its neighboring countries in coordination with domestic regional development. It is widely recognized that economic cooperation with neighboring countries is essential in preventing the inflow of illegal labor and effectively utilizing labor and resources through the relocation of production bases. This direction is strengthened by elaborating the GMS-EC and the ECS (Economic Cooperation Strategy). In addition, economic dependency of the neighboring countries on Thailand is generally high. In this report, firstly, Thai regional development policy will be made clear in relation to its economic policy toward neighboring countries as well as the status quo of the industrial estates. Secondly, Thai policy toward the neighboring countries is examined referring to the concept of wide-ranging economic zones, regional economic cooperation and special border economic zones. Thirdly, the paper will discuss how closely the economies between Thailand and the neighboring countries are related through trade and investment. Lastly, some implications on Japan's economic cooperation will also be explored.
Resumo:
Thailand's economic cooperation with neighboring countries, including not only trade and investment but also economic assistance, is tied inseparably to regional development within Thailand. Assistance to develop infrastructure along economic corridors, for example, promotes Thai regional development. This study examines the trade and investment relationships between Thailand and its neighboring countries, as well as related economic policies of Thailand. The study also examines the type of economic assistance being extended, and the resulting regional development taking place. And lastly, the study considers policies for further cooperation by Thailand and the implications this has for Japanese economic cooperation.
Resumo:
In order to prevent, suppress and punish human trafficking, bilateral agreements between origin of victim countries and destination countries are crucial, because their cooperation involves cross-border activities such as repatriation of victims, extradition of criminals and information-sharing. This article analyzes three bilateral legal instruments between The Government of The Kingdom of Thailand and her three neighboring countries, namely The Royal Government of Cambodia, The Government of Lao People's Democratic Republic and The Government of The Union of Myanmar. The analysis will examine the legal status of the victim, the victim as witness in criminal proceedings, the victim protection programs, the recovery and restitution of damages, the process of repatriating the victim, and the prosecution of the criminal.
Resumo:
Puncturing is a well-known coding technique widely used for constructing rate-compatible codes. In this paper, we consider the problem of puncturing low-density parity-check codes and propose a new algorithm for intentional puncturing. The algorithm is based on the puncturing of untainted symbols, i.e. nodes with no punctured symbols within their neighboring set. It is shown that the algorithm proposed here performs better than previous proposals for a range of coding rates and short proportions of punctured symbols.
Resumo:
As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.
Resumo:
In this work a complete hardware-software support platform for a WSN testbed focused on developing wireless sensor applications in a simple and intuitive way is presented, as an alternative of commercial-motes-based testbeds that can be found in the state of the art. The main target of this hardware-software platform is to provide the highest abstraction level on the management of WSNs but in the simplest way in order to achieve a fast profiling mechanism for reliable prototyping based on the Cookies platform as well as helping users to develop, test and validate Cookie-Based WSN applications.
Resumo:
In this work a complete set of libraries for developing wireless sensor applications in a simple and intuitive way is presented, in contraposition to the most spread application abstraction-level mechanisms based on operating systems. The main target of this software platform, named CookieLibs, is to provide the highest abstraction level on the management of WSNs but in the simplest way for those users who are not familiar with software design, in order to achieve a fast profiling mechanism for reliable prototyping based on the Cookies platform.
Resumo:
In this work a novel wake-up architecture for wireless sensor nodes based on ultra low power FPGA is presented. A simple wake up messaging mechanism for data gathering applications is proposed. The main goal of this work is to evaluate the utilization of low power configurable devices to take advantage of their speed, flexibility and low power consumption compared with traditional approaches, based on ASICs or microcontrollers, for frame decoding and data control. A test bed based on infrared communications has been built to validate the messaging mechanism and the processing architecture.