919 resultados para Three-phase Integrated Inverter


Relevância:

30.00% 30.00%

Publicador:

Resumo:

PURPOSE: We conducted a phase I multicenter trial in naïve metastatic castrate-resistant prostate cancer patients with escalating inecalcitol dosages, combined with docetaxel-based chemotherapy. Inecalcitol is a novel vitamin D receptor agonist with higher antiproliferative effects and a 100-fold lower hypercalcemic activity than calcitriol. EXPERIMENTAL DESIGN: Safety and efficacy were evaluated in groups of three to six patients receiving inecalcitol during a 21-day cycle in combination with docetaxel (75 mg/m2 every 3 weeks) and oral prednisone (5 mg twice a day) up to six cycles. Primary endpoint was dose-limiting toxicity (DLT) defined as grade 3 hypercalcemia within the first cycle. Efficacy endpoint was ≥30% PSA decline within 3 months. RESULTS: Eight dose levels (40-8,000 μg) were evaluated in 54 patients. DLT occurred in two of four patients receiving 8,000 μg/day after one and two weeks of inecalcitol. Calcemia normalized a few days after interruption of inecalcitol. Two other patients reached grade 2, and the dose level was reduced to 4,000 μg. After dose reduction, calcemia remained within normal range and grade 1 hypercalcemia. The maximum tolerated dose was 4,000 μg daily. Respectively, 85% and 76% of the patients had ≥30% PSA decline within 3 months and ≥50% PSA decline at any time during the study. Median time to PSA progression was 169 days. CONCLUSION: High antiproliferative daily inecalcitol dose has been safely used in combination with docetaxel and shows encouraging PSA response (≥30% PSA response: 85%; ≥50% PSA response: 76%). A randomized phase II study is planned.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

PURPOSE: To evaluate gadocoletic acid (B-22956), a gadolinium-based paramagnetic blood pool agent, for contrast-enhanced coronary magnetic resonance angiography (MRA) in a Phase I clinical trial, and to compare the findings with those obtained using a standard noncontrast T2 preparation sequence. MATERIALS AND METHODS: The left coronary system was imaged in 12 healthy volunteers before B-22956 application and 5 (N = 11) and 45 (N = 7) minutes after application of 0.075 mmol/kg of body weight (BW) of B-22956. Additionally, imaging of the right coronary system was performed 23 minutes after B-22956 application (N = 6). A three-dimensional gradient echo sequence with T2 preparation (precontrast) or inversion recovery (IR) pulse (postcontrast) with real-time navigator correction was used. Assessment of the left and right coronary systems was performed qualitatively (a 4-point visual score for image quality) and quantitatively in terms of signal-to-noise ratio (SNR), contrast-to-noise ratio (CNR), vessel sharpness, visible vessel length, maximal luminal diameter, and the number of visible side branches. RESULTS: Significant (P < 0.01) increases in SNR (+42%) and CNR (+86%) were noted five minutes after B-22956 application, compared to precontrast T2 preparation values. A significant increase in CNR (+40%, P < 0.05) was also noted 45 minutes postcontrast. Vessels (left anterior descending artery (LAD), left coronary circumflex (LCx), and right coronary artery (RCA)) were also significantly (P < 0.05) sharper on postcontrast images. Significant increases in vessel length were noted for the LAD (P < 0.05) and LCx and RCA (both P < 0.01), while significantly more side branches were noted for the LAD and RCA (both P < 0.05) when compared to precontrast T2 preparation values. CONCLUSION: The use of the intravascular contrast agent B-22956 substantially improves both objective and subjective parameters of image quality on high-resolution three-dimensional coronary MRA. The increase in SNR, CNR, and vessel sharpness minimizes current limitations of coronary artery visualization with high-resolution coronary MRA.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mixture materials, mix design, and pavement construction are not isolated steps in the concrete paving process. Each affects the other in ways that determine overall pavement quality and long-term performance. However, equipment and procedures commonly used to test concrete materials and concrete pavements have not changed in decades, leaving gaps in our ability to understand and control the factors that determine concrete durability. The concrete paving community needs tests that will adequately characterize the materials, predict interactions, and monitor the properties of the concrete. The overall objectives of this study are (1) to evaluate conventional and new methods for testing concrete and concrete materials to prevent material and construction problems that could lead to premature concrete pavement distress and (2) to examine and refine a suite of tests that can accurately evaluate concrete pavement properties. The project included three phases. In Phase I, the research team contacted each of 16 participating states to gather information about concrete and concrete material tests. A preliminary suite of tests to ensure long-term pavement performance was developed. The tests were selected to provide useful and easy-to-interpret results that can be performed reasonably and routinely in terms of time, expertise, training, and cost. The tests examine concrete pavement properties in five focal areas critical to the long life and durability of concrete pavements: (1) workability, (2) strength development, (3) air system, (4) permeability, and (5) shrinkage. The tests were relevant at three stages in the concrete paving process: mix design, preconstruction verification, and construction quality control. In Phase II, the research team conducted field testing in each participating state to evaluate the preliminary suite of tests and demonstrate the testing technologies and procedures using local materials. A Mobile Concrete Research Lab was designed and equipped to facilitate the demonstrations. This report documents the results of the 16 state projects. Phase III refined and finalized lab and field tests based on state project test data. The results of the overall project are detailed herein. The final suite of tests is detailed in the accompanying testing guide.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This Phase I report describes a preliminary evaluation of a new compaction monitoring system developed by Caterpillar, Inc. (CAT), for use as a quality control and quality assurance (QC/QA) tool during earthwork construction operations. The CAT compaction monitoring system consists of an instrumented roller with sensors to monitor machine power output in response to changes in soil machine interaction and is fitted with a global positioning system (GPS) to monitor roller location in real time. Three pilot tests were conducted using CAT’s compaction monitoring technology. Two of the sites were located in Peoria, Illinois, at the Caterpillar facilities. The third project was an actual earthwork grading project in West Des Moines, Iowa. Typical construction operations for all tests included the following steps: (1) aerate/till existing soil; (2) moisture condition soil with water truck (if too dry); (3) remix; (4) blade to level surface; and (5) compact soil using the CAT CP-533E roller instrumented with the compaction monitoring sensors and display screen. Test strips varied in loose lift thickness, water content, and length. The results of the study show that it is possible to evaluate soil compaction with relatively good accuracy using machine energy as an indicator, with the advantage of 100% coverage with results in real time. Additional field trials are necessary, however, to expand the range of correlations to other soil types, different roller configurations, roller speeds, lift thicknesses, and water contents. Further, with increased use of this technology, new QC/QA guidelines will need to be developed with a framework in statistical analysis. Results from Phase I revealed that the CAT compaction monitoring method has a high level of promise for use as a QC/QA tool but that additional testing is necessary in order to prove its validity under a wide range of field conditions. The Phase II work plan involves establishing a Technical Advisor Committee, developing a better understanding of the algorithms used, performing further testing in a controlled environment, testing on project sites in the Midwest, and developing QC/QA procedures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim was to investigate the efficacy of neoadjuvant docetaxel-cisplatin and identify prognostic factors for outcome in locally advanced stage IIIA (pN2 by mediastinoscopy) non-small-cell lung cancer (NSCLC) patients. In all, 75 patients (from 90 enrolled) underwent tumour resection after three 3-week cycles of docetaxel 85 mg m-2 (day 1) plus cisplatin 40 or 50 mg m-2 (days 1 and 2). Therapy was well tolerated (overall grade 3 toxicity occurred in 48% patients; no grade 4 nonhaematological toxicity was reported), with no observed late toxicities. Median overall survival (OS) and event-free survival (EFS) times were 35 and 15 months, respectively, in the 75 patients who underwent surgery; corresponding figures for all 90 patients enrolled were 28 and 12 months. At 3 years after initiating trial therapy, 27 out of 75 patients (36%) were alive and tumour free. At 5-year follow-up, 60 and 65% of patients had local relapse and distant metastases, respectively. The most common sites of distant metastases were the lung (24%) and brain (17%). Factors associated with OS, EFS and risk of local relapse and distant metastases were complete tumour resection and chemotherapy activity (clinical response, pathologic response, mediastinal downstaging). Neoadjuvant docetaxel-cisplatin was effective and tolerable in stage IIIA pN2 NSCLC, with chemotherapy contributing significantly to outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An assay for the simultaneous analysis of pharmaceutical compounds and their metabolites from micro-whole blood samples (i.e. 5 microL) was developed using an on-line dried blood spot (on-line DBS) device coupled with hydrophilic interaction/reversed-phase (HILIC/RP) LC/MS/MS. Filter paper is directly integrated to the LC device using a homemade inox desorption cell. Without any sample pretreatment, analytes are desorbed from the paper towards an automated system of valves linking a zwitterionic-HILIC column to an RP C18 column. In the same run, the polar fraction is separated by the zwitterionic-HILIC column while the non-polar fraction is eluted on the RP C18. Both fractions are detected by IT-MS operating in full scan mode for the survey scan and in product ion mode for the dependant scan using an ESI source. The procedure was evaluated by the simultaneous qualitative analysis of four probes and their relative phase I and II metabolites spiked in whole blood. In addition, the method was successfully applied to the in vivo monitoring of buprenorphine metabolism after the administration of an intraperitoneal injection of 30 mg/kg on adult female Wistar rat.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

PURPOSE: The European Organisation for Research and Treatment of Cancer and National Cancer Institute of Canada trial on temozolomide (TMZ) and radiotherapy (RT) in glioblastoma (GBM) has demonstrated that the combination of TMZ and RT conferred a significant and meaningful survival advantage compared with RT alone. We evaluated in this trial whether the recursive partitioning analysis (RPA) retains its overall prognostic value and what the benefit of the combined modality is in each RPA class. PATIENTS AND METHODS: Five hundred seventy-three patients with newly diagnosed GBM were randomly assigned to standard postoperative RT or to the same RT with concomitant TMZ followed by adjuvant TMZ. The primary end point was overall survival. The European Organisation for Research and Treatment of Cancer RPA used accounts for age, WHO performance status, extent of surgery, and the Mini-Mental Status Examination. RESULTS: Overall survival was statistically different among RPA classes III, IV, and V, with median survival times of 17, 15, and 10 months, respectively, and 2-year survival rates of 32%, 19%, and 11%, respectively (P < .0001). Survival with combined TMZ/RT was higher in RPA class III, with 21 months median survival time and a 43% 2-year survival rate, versus 15 months and 20% for RT alone (P = .006). In RPA class IV, the survival advantage remained significant, with median survival times of 16 v 13 months, respectively, and 2-year survival rates of 28% v 11%, respectively (P = .0001). In RPA class V, however, the survival advantage of RT/TMZ was of borderline significance (P = .054). CONCLUSION: RPA retains its prognostic significance overall as well as in patients receiving RT with or without TMZ for newly diagnosed GBM, particularly in classes III and IV.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access management involves balancing the dual roles that roadways must play - through travel and access to property and economic activity. When these roles are not in proper balance, the result is a roadway system that functions sub-optimally. Arterial routes that have a too high driveway density and provide overly extensive access to property have high crash rates and begin to suffer in terms of traffic operations. Such routes become congested, delays increase, and mean travel speeds decline. The Iowa access management research and awareness project has had four distinct phases. Phase I involved a detailed review of the extensive national access management literature so lessons learned elsewhere could be applied in Iowa. In Phase II original case study research was conducted in Iowa. Phase III of the project concentrated on outreach and education about access management. Phase IV of the Iowa access management project extended the work conducted during Phases II and III. The main work products for Phase IV were as follows: 1) three additional before and after case studies, illustrating the impacts of various access management treatments on traffic safety, traffic operations, and business vitality; 2) an access management handbook aimed primarily at local governments in Iowa; 3) a modular access management toolkit with brief descriptions of various access management treatments and considerations; and 4) an extensive outreach plan aimed at getting the results of Phases I through IV of the project out to diverse audiences in Iowa and elsewhere.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of this work was to evaluate the effects of lignin, hemicellulose, and cellulose concentrations in the decomposition process of cover plant residues with potential use in no-tillage with corn, for crop-livestock integrated system, in the Cerrado region. The experiment was carried out at Embrapa Cerrados, in Planaltina, DF, Brazil in a split plot experimental design. The plots were represented by the plant species and the subplots by harvesting times, with three replicates. The cover plants Urochloa ruziziensis, Canavalia brasiliensis, Cajanus cajan, Pennisetum glaucum, Mucuna aterrima, Raphanus sativus, Sorghum bicolor were evaluated together with spontaneous plants in the fallow. Cover plants with lower lignin concentrations and, consequently, higher residue decomposition such as C. brasiliensis and U. ruziziensis promoted higher corn yield. High concentrations of lignin inhibit plant residue decomposition and this is favorable for the soil cover. Lower concentrations of lignin result in accelerated plant decomposition, more efficient nutrient cycling, and higher corn yield.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of this work was to evaluate the effect of the pasture (Urochloa brizantha) component age on soil biological properties, in a crop-livestock integrated system. The experiment was carried out in a Brazilian savannah (Cerrado) area with 92 ha, divided into six pens of approximately 15 ha. Each pen represented a different stage of the pasture component: formation, P0; one year, P1; two years, P2; three years, P3; and final with 3.5 years, Pf. Samples were taken in the 0-10 cm soil depth. The soil biological parameters - microbial biomass carbon (MBC), microbial biomass respiration (C-CO2), metabolic quotient (qCO2), microbial quotient (q mic), and total organic carbon (TOC) - were evaluated and compared among different stages of the pasture, and between an adjacent area under native Cerrado and another area under degraded pasture (PCD). The MBC, q mic and TOC increased and qCO2 reduced under the different pasture stages. Compared to PCD, the pasture stages had higher MBC, q mic and TOC, and lower qCO2. The crop-livestock integrated system improved soil microbiological parameters and immobilized carbon in the soil in comparison to the degraded pasture.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this project is to develop an investment analysis model that integrates the capabilities of four types of analysis for use in evaluating interurban transportation system improvements. The project will also explore the use of new data warehousing and mining techniques to design the types of databases required for supporting such a comprehensive transportation model. The project consists of four phases. The first phase, which is documented in this report, involves development of the conceptual foundation for the model. Prior research is reviewed in Chapter 1, which is composed of three major sections providing demand modeling background information for passenger transportation, transportation of freight (manufactured products and supplies), and transportation of natural resources and agricultural commodities. Material from the literature on geographic information systems makes up Chapter 2. Database models for the national and regional economies and for the transportation and logistics network are conceptualized in Chapter 3. Demand forecasting of transportation service requirements is introduced in Chapter 4, with separate sections for passenger transportation, freight transportation, and transportation of natural resources and commodities. Characteristics and capacities of the different modes, modal choices, and route assignments are discussed in Chapter 5. Chapter 6 concludes with a general discussion of the economic impacts and feedback of multimodal transportation activities and facilities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract This phase II trial treated elderly or frail patients with acute myeloid leukemia (AML) with single-agent subcutaneous azacytidine at 100 mg/m(2), on 5 of 28 days for up to six cycles. Treatment was stopped for lack of response, or continued to progression in responders. The primary endpoint was response within 6 months. A response rate ≥ 34% was considered a positive trial outcome. From September 2008 to April 2010, 45 patients from 10 centers (median age 74 [55-86] years) were accrued. Patients received four (1-21) cycles. Best response was complete response/complete response with incomplete recovery of neutrophils and/or platelets (CR/CRi) in eight (18%; 95% confidence interval [CI]: 8-32%.), 0 (0%) partial response (PR), seven (16%) hematologic improvement, 17 (38%) stable disease. Three non-responding patients stopped treatment after six cycles, 31 patients stopped early and 11 patients continued treatment for 8-21 cycles. Adverse events (grade ≥ III) were infections (n = 13), febrile neutropenia (n = 8), thrombocytopenia (n = 7), dyspnea (p = 6), bleeding (n = 5) and anemia (n = 4). Median overall survival was 6 months. Peripheral blood blast counts, grouped at 30%, had a borderline significant association with response (p = 0.07). This modified azacytidine schedule is feasible for elderly or frail patients with AML in an outpatient setting with moderate, mainly hematologic, toxicity and response in a proportion of patients, although the primary objective was not reached.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cases of fatal outcome after surgical intervention are autopsied to determine the cause of death and to investigate whether medical error caused or contributed to the death. For medico-legal purposes, it is imperative that autopsy findings are documented clearly. Modern imaging techniques such as multi-detector computed tomography (MDCT) and postmortem CT angiography, which is used for vascular system imaging, are useful tools for determining cause of death. The aim of this study was to determine the utility of postmortem CT angiography for the medico-legal death investigation. This study investigated 10 medico-legal cases with a fatal outcome after surgical intervention using multi-phase postmortem whole body CT angiography. A native CT scan was performed as well as three angiographic phases (arterial, venous, and dynamic) using a Virtangio((R)) perfusion device and the oily contrast agent, Angiofil((R)). The results of conventional autopsy were compared to those from the radiological investigations. We also investigated whether the radiological findings affected the final interpretation of cause-of-death. Causes of death were hemorrhagic shock, intracerebral hemorrhage, septic shock, and a combination of hemorrhage and blood aspiration. The diagnoses were made by conventional autopsy as well as by postmortem CT angiography. Hemorrhage played an important role in eight of ten cases. The radiological exam revealed the exact source of bleeding in seven of the eight cases, whereas conventional autopsy localized the source of bleeding only generally in five of the seven cases. In one case, neither conventional autopsy nor CT angiography identified the source of hemorrhage. We conclude that postmortem CT angiography is extremely useful for investigating deaths following surgical interventions. This technique helps document autopsy findings and allows a second examination if it is needed; specifically, it detects and visualizes the sources of hemorrhages in detail, which is often of particular interest in such cases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Three small trials suggest that intravenous immunoglobulin can affect biomarkers and symptoms of mild-to-moderate Alzheimer's disease. We tested the safety, effective dose, and infusion interval of intravenous immunoglobulin in such patients. METHODS: We did a multicentre, placebo-controlled phase 2 trial at seven sites in the USA and five in Germany. Participants with probable Alzheimer's disease aged 50-85 years were randomly assigned (by a computer-generated randomisation sequence, with block sizes of eight) to infusions every 4 weeks (0·2, 0·5, or 0·8 g intravenous immunoglobulin per kg bodyweight, or placebo) or infusions every 2 weeks (0·1, 0·25, or 0·4 g/kg, or placebo). Patients, caregivers, investigators assessing outcomes, and staff at imaging facilities and the clinical research organisation were masked to treatment allocation, but dispensing pharmacists, the statistician, and the person responsible for final PET analyses were not. Treatment was masked with opaque pouches and infusion lines. The primary endpoint was median area under the curve (AUC) of plasma amyloid β (Aβ)(1-40) between the last infusion and the final visit (2 weeks or 4 weeks depending on infusion interval) in the intention-to-treat population. The trial is registered at ClinicalTrials.gov (NCT00812565) and controlled-trials.com (ISRCTN64846759). FINDINGS: 89 patients were assessed for eligibility, of whom 58 were enrolled and 55 included in the primary analysis. Median AUC of plasma Aβ(1-40) was not significantly different for intravenous immunoglobulin compared with placebo for five of the six intervention groups (-18·0 [range -1347·0 to 1068·5] for 0·2 g/kg, -364·3 [-5834·5 to 1953·5] for 0·5 g/kg, and -351·8 [-1084·0 to 936·5] for 0·8 g/kg every 4 weeks vs -116·3 [-1379·0 to 5266·0] for placebo; and -13·8 [-1729·0 to 307·0] for 0·1 g/kg, and -32·5 [-1102·5 to 451·5] for 0·25 g/kg every 2 weeks vs 159·5 [51·5 to 303·0] for placebo; p>0·05 for all). The difference in median AUC of plasma Aβ(1-40) between the 0·4 g/kg every 2 weeks group (47·0 [range -341·0 to 72·5]) and the placebo group was significant (p=0·0216). 25 of 42 (60%) patients in the intervention group versus nine of 14 (64%) receiving placebo had an adverse event. Four of 42 (10%) patients in the intravenous immunoglobulin group versus four of 14 (29%) receiving placebo had a serious adverse event, including one stroke in the intervention group. INTERPRETATION: Intravenous immunoglobulin may have an acceptable safety profile. Our results did not accord with those from previous studies. Longer trials with greater power are needed to assess the cognitive and functional effects of intravenous immunoglobulin in patients with Alzheimer's disease.