145 research outputs found

    Giant Mediastinal Myxoid Pleomorphic Liposarcoma

    Get PDF
    NON

    Mesozoic sedimentary and magmatic evolution of the Arabian continental margin, northern Syria: evidence from the Baer-Bassit Melange

    Get PDF
    One of the few detailed records of Mesozoic deep-water sedimentation and volcanism preserved along the tectonically emplaced Arabian continental margin is from the Baer-Bassit region of northern Syria. South-Tethyan units there occur as blocks, broken formation and disrupted thrust sheets within the Bear-Bassit Melange. Two overall composite successions are identified. The first comprises mainly sedimentary successions ranging from Late Triassic to Late Cretaceous (Cenomanian) in age. The second is dominated by Middle Jurassic-Lower Cretaceous alkaline/ per-alkaline volcanic and minor intrusive igneous rocks. The extrusives are intercalated with radiolarian sediments and capped by Cenomanian ferromanganese-rich pelagic limestone. Facies comparisons and the regional setting suggest that the Triassic to Cenomanian, mainly sedimentary units, formed in deep water near the base of the slope of the Arabian continental margin. The contrasting volcanogenic successions developed in a more distal off-margin setting. Regional comparisons (e.g. with southwestern Cyprus and southwestern Turkey) suggest that continental break-up to form a South-Tethyan oceanic basin took place in Late Triassic time, associated with alkaline volcanism. Similar alkaline volcanism of Middle Jurassic to Early Cretaceous age could reflect the activity of a mantle plume beneath the Arabian plate. Overall, sedimentation was mainly controlled by an interplay of post-rift thermal subsidence, plume-related uplift, siliceous oceanic productivity, climatic change and eustatic sea-level change. The South-Tethyan marginal to oceanic units in northern Syria were detached from an inferred oceanic basement in latest Cretaceous time, emplaced onto the Arabian continental margin, then transgressed by Maastrichian and younger autochthonous successions

    Telenomus nizwaensis (Hymenoptera : Scelionidae), an important egg parasitoid of the pomegranate butterfly Deudorix livia Klug (Lepidoptera: Lycaenidae) in Oman

    Get PDF
    The pomegranate butterfly Deudorix (= Virachola) livia is the major pest of pomegranate, a crop of economic importance, in Oman. A species of parasitoid wasp in the hymenopteran family Scelionidae is responsible for high levels of mortality of its eggs. This wasp is described herein as Telenomus nizwaensis Polaszek sp. n., based on morphology and DNA sequence data. T. nizwaensis is currently known only from D. livia, which is also a pest of economic importance on other crops in North Africa, the Arabian Peninsula, and the Mediterranean. We summarise current knowledge of T. nizwaensis life-history and its potential to provide biological pest control.Peer reviewe

    Clinical Pathways for Non-ST Elevation Acute Coronary Syndrome in Oman: An Oman Heart Association Protocol for Hospital Quality Improvement Initiative

    Get PDF
    In 2012, Oman Heart Association (OHA) published its own guidelines for the management of patients with unstable angina/non–ST-elevation myocardial infarction, the aim was not to be comprehensive but rather simplified and practical in order to reduce the gap between the long comprehensive guidelines and our actual practice. However, we still feel that the busy registrars and residents need simpler and direct clinical pathways or protocol to be used in the emergency departments, coronary care units and in the wards. Clinical pathways are now one of the main tools used to manage the quality in healthcare concerning the standardization of care processes. It has been shown that their implementation reduces the variability in clinical practice and improves outcomes in acute care

    Home exposure to Arabian incense (bakhour) and asthma symptoms in children: a community survey in two regions in Oman

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Incense burning has been reported to adversely affect respiratory health. The aim of this study was to explore whether exposure to bakhour contributes to the prevalence of asthma and/or triggers its symptoms in Omani children by comparing two Omani regions with different prevalence of asthma.</p> <p>Methods</p> <p>A randomly selected sample of 10 years old schoolchildren were surveyed using an Arabic version of ISAAC Phase II questionnaires with the addition of questions concerning the use and effect of Arabian incense on asthma symptoms. Current asthma was defined as positive response to wheeze in the past 12 months or positive response to "ever had asthma" together with a positive response to exercise wheeze or night cough in the past 12 months. Simple and multivariable logistic regression analyses were performed to estimate the effect of bakhour exposure and other variables on current asthma diagnosis and parents' response to the question: "Does exposure to bakhour affect your child breathing?"</p> <p>Results</p> <p>Of the 2441 surveyed children, 15.4% had current asthma. Bakhour use more than twice a week was three times more likely to affect child breathing compared to no bakhour use (adjusted OR 3.01; 95% CI 2.23–4.08) and this effect was 2.55 times higher in asthmatics (adjusted OR 2.55; 95% CI 1.97–3.31) compared to non-asthmatics. In addition, bakhour caused worsening of wheeze in 38% of the asthmatics, making it the fourth most common trigger factor after dust (49.2%), weather (47.6%) and respiratory tract infections (42.2%). However, there was no significant association between bakhour use and the prevalence of current asthma (adjusted OR 0.87; 95% CI 0.63–1.20).</p> <p>Conclusion</p> <p>Arabian incense burning is a common trigger of wheezing among asthmatic children in Oman. However, it is not associated with the prevalence asthma.</p

    Acute Effects of Exogenous Hormone Administration on Postprandial Acylation Stimulating Protein Levels in Ovariectomized Rats after a Fat Load

    Get PDF
    Background. ASP, a potent lipogenic factor, was linked to female fat metabolism in association studies. Aim. To investigate acute effects of sex hormone treatment on postprandial ASP levels in vivo. Methods. 24 female rats were randomly divided into 4 groups including controls. The rats were ovariectomized and injected with progesterone, estrogen, or testosterone. An hour later, olive oil was administered orally. Plasma ASP and triglycerides were measured at several postprandial time points. Area under the curve (TG-AUC) represented TG clearance. Results. Only the progesterone treated group had a significant postprandial ASP increase at two hours compared to basal levels (439.8 ± 62.4 versus 253.4 ± 59.03 μg/mL, P=0.04). Interestingly, increased ASP levels coordinated negatively with corresponding TG levels and TG-AUC postprandially, mostly evident in the opposite effects in the progesterone and testosterone treated groups. ASP levels increased 3-fold in the progesterone versus testosterone treated groups, whereas TG-AUC was significantly lower. Conclusion. These findings suggest that progesterone enhances ASP production and TG clearance simultaneously, supporting the notion of a stimulatory role for progesterone on ASP-mediated TG clearance. This is the first functional study demonstrating a cause-effect relationship between hormone treatment and ASP levels in vivo and may contribute to understanding the mechanism of progesterone function as a female lipogenic hormone

    The association of Human Leukocyte Antigens Complex with Type 1 Diabetes in Omanis

    Get PDF
    Background: Identifying the human leukocyte antigens (HLA) high risk alleles, genotypes and haplotypes in different populations is beneficial for understanding their roles in type 1 diabetes (T1D) pathogenesis and intervention practices. Objective: The aim of this study was to identify T1D associated HLA gene alleles in the Omani population. Methods: Our case-control study included 73 diabetic seropositive children (mean age 9.08±3.27 years) and 110 healthy controls. HLA–A, -B, -C, -DRB1, and -DQB1 genes were genotyped using sequence specific primer polymerase chain reaction (SSP-PCR). Results: Two HLA class I alleles (B*08, B*58) and three class II alleles (DQB1*02, DRB1*03 and DRB1*04) were associated with T1D susceptibility, while one class I (B*51) and three class II (DQB1*05, DQB1*06, and DRB1*16) alleles were associated with T1D protection. HLA- DRB1*03 and DQB1*02 alleles showed the strongest risk association among all alleles. Six DRB1 residues (E9, S11, S13, Y30, V70 and K71) were significantly associated with T1D susceptibility. Heterozygous genotypes, HLA-DRB1*03/*04 and DQB1*02/*03 were significantly associated with T1D susceptibility (P=4.29E-07, OR=63.2 and P=0.02, OR=3.6, respectively). Furthermore, we detected a significant combined action of DRB1*03-DQB1*02 haplotype in T1D risk (P=1.76E-05, OR=15), and DRB1*16-DQB1*05 haplotype in protection (P=3.12E-2, OR=0.48). Conclusion: Known HLA class II gene alleles are associated with T1D in Omani children

    An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA

    Full text link
    [EN] Maude-NPA is an analysis tool for cryptographic security protocols that takes into account the algebraic properties of the cryptosystem. Maude-NPA can reason about a wide range of cryptographic properties. However, some algebraic properties, and protocols using them, have been beyond Maude-NPA capabilities, either because the cryptographic properties cannot be expressed using its equational unification features or because the state space is unmanageable. In this paper, we provide a protocol transformation that can safely get rid of cryptographic properties under some conditions. The time and space difference between verifying the protocol with all the crypto properties and verifying the protocol with a minimal set of the crypto properties is remarkable. We also provide, for the first time, an encoding of the theory of bilinear pairing into Maude-NPA that goes beyond the encoding of bilinear pairing available in the Tamarin toolPartially supported by the EU (FEDER) and the Spanish MCIU under grant RTI2018-094403-B-C32, by the Spanish Generalitat Valenciana under grant PROMETEO/2019/098, and by the US Air Force Office of Scientific Research under award number FA9550-17-1-0286. Julia Sapiña has been supported by the Generalitat Valenciana APOSTD/2019/127 grantAparicio-Sánchez, D.; Escobar Román, S.; Gutiérrez Gil, R.; Sapiña-Sanchis, J. (2020). An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA. Springer Nature. 230-250. https://doi.org/10.1007/978-3-030-59013-0_12S230250Maude-NPA manual v3.1. http://maude.cs.illinois.edu/w/index.php/Maude_Tools:_Maude-NPAThe Tamarin-Prover Manual, 4 June 2019. https://tamarin-prover.github.io/manual/tex/tamarin-manual.pdfAl-Riyami, S.S., Paterson, K.G.: Tripartite authenticated key agreement protocols from pairings. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 332–359. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40974-8_27Baader, F., Snyder, W.: Unification theory. In: Robinson, J.A., Voronkov, A. (eds.) Handbook of Automated Reasoning, vol. 1, pp. 447–533. Elsevier Science (2001)Baelde, D., Delaune, S., Gazeau, I., Kremer, S.: Symbolic verification of privacy-type properties for security protocols with XOR. In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, pp. 234–248. IEEE Computer Society (2017)Blanchet, B.: Modeling and verifying security protocols with the applied pi calculus and ProVerif. Found. Trends Privacy Secur. 1(1–2), 1–135 (2016)Clavel, M., et al.: Maude manual (version 3.0). Technical report, SRI International, Computer Science Laboratory (2020). http://maude.cs.uiuc.eduComon-Lundh, H., Delaune, S.: The finite variant property: how to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294–307. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-32033-3_22Cremers, C.J.F.: The scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70545-1_38Dreier, J., Duménil, C., Kremer, S., Sasse, R.: Beyond subterm-convergent equational theories in automated verification of stateful protocols. In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 117–140. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_6Escobar, S., Hendrix, J., Meadows, C., Meseguer, J.: Diffie-Hellman cryptographic reasoning in the Maude-NRL protocol analyzer. In: Proceedings of 2nd International Workshop on Security and Rewriting Techniques (SecReT 2007) (2007)Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1–2), 162–202 (2006)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007-2009. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03829-7_1Escobar, S., et al.: Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. In: Proceedings of PPDP 2011, pp. 65–76. ACM (2011)Escobar, S., Meadows, C.A., Meseguer, J., Santiago, S.: State space reduction in the Maude-NRL protocol analyzer. Inf. Comput. 238, 157–186 (2014)Escobar, S., Sasse, R., Meseguer, J.: Folding variant narrowing and optimal variant termination. J. Log. Algebr. Program. 81(7–8), 898–928 (2012)Fabrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: why is a security protocol correct? In: Proceedings of IEEE Symposium on Security and Privacy, pp. 160–171 (1998)Guttman, J.D.: Security goals and protocol transformations. In: Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol. 6993, pp. 130–147. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27375-9_8Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–393. Springer, Heidelberg (2000). https://doi.org/10.1007/10722028_23Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: Dupuy, M., Paradinas, P. (eds.) SEC 2001. IIFIP, vol. 65, pp. 229–244. Springer, Boston, MA (2002). https://doi.org/10.1007/0-306-46998-7_16Küsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: IEEE Computer Security Foundations, pp. 157–171 (2009)Küsters, R., Truderung, T.: Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. J. Autom. Reason. 46(3–4), 325–352 (2011)Meadows, C.: The NRL protocol analyzer: an overview. J. Logic Program. 26(2), 113–131 (1996)Meier, S., Cremers, C., Basin, D.: Strong invariants for the efficient construction of machine-checked protocol security proofs. In: 2010 23rd IEEE Computer Security Foundations Symposium, pp. 231–245 (2010)Meseguer, J.: Conditional rewriting logic as a united model of concurrency. Theoret. Comput. Sci. 96(1), 73–155 (1992)Meseguer, J.: Variant-based satisfiability in initial algebras. Sci. Comput. Program. 154, 3–41 (2018)Meseguer, J.: Generalized rewrite theories, coherence completion, and symbolic methods. J. Log. Algebr. Meth. Program. 110, 100483 (2020)Mödersheim, S., Viganò, L.: The open-source fixed-point model checker for symbolic analysis of security protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007-2009. LNCS, vol. 5705, pp. 166–194. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03829-7_6Sasse, R., Escobar, S., Meadows, C., Meseguer, J.: Protocol analysis modulo combination of theories: a case study in Maude-NPA. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 163–178. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22444-7_11Schmidt, B., Sasse, R., Cremers, C., Basin, D.A.: Automated verification of group key agreement protocols. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, pp. 179–194. IEEE Computer Society (2014)Skeirik, S., Meseguer, J.: Metalevel algorithms for variant satisfiability. J. Log. Algebraic Methods Program. 96, 81–110 (2018)TeReSe: Term Rewriting Systems. Cambridge University Press, Cambridge (2003)Yang, F., Escobar, S., Meadows, C.A., Meseguer, J., Narendran, P.: Theories of homomorphic encryption, unification, and the finite variant property. In: Proceedings of PPDP 2014, pp. 123–133. ACM (2014

    Molecular characterization of glucose-6-phosphate dehydrogenase deficient variants in Baghdad city - Iraq

    Get PDF
    Background: Although G6PD deficiency is the most common genetically determined blood disorder among Iraqis, its molecular basis has only recently been studied among the Kurds in North Iraq, while studies focusing on Arabs in other parts of Iraq are still absent. Methods: A total of 1810 apparently healthy adult male blood donors were randomly recruited from the national blood transfusion center in Baghdad. They were classified into G6PD deficient and non-deficient individuals based on the results of methemoglobin reduction test (MHRT), with confirmation of deficiency by subsequent enzyme assays. DNA from deficient individuals was studied using a polymerase chain reaction-Restriction fragment length polymorphism (PCR-RFLP) for four deficient molecular variants, namely G6PD Mediterranean (563 C®T), Chatham (1003 G®A), A- (202 G®A) and Aures (143 T®C). A subset of those with the Mediterranean variant, were further investigated for the 1311 (C®T) silent mutation. Results: G6PD deficiency was detected in 109 of the 1810 screened male individuals (6.0%). Among 101 G6PD deficient males molecularly studied, the Mediterranean mutation was detected in 75 cases (74.3%), G6PD Chatham in 5 cases (5.0%), G6PD A- in two cases (2.0%), and G6PD Aures in none. The 1311 silent mutation was detected in 48 out of the 51 G6PD deficient males with the Mediterranean variant studied (94.1%). Conclusions: Three polymorphic variants namely: the Mediterranean, Chatham and A-, constituted more than 80% of G6PD deficient variants among males in Baghdad. Iraq. This observation is to some extent comparable to othe
    • …
    corecore