21 research outputs found

    Clinical use of hyaluronic acid in andrology: A review

    Get PDF
    Hyaluronic acid is a glycosaminoglycan widely used in the fields of orthopedics, ophthalmology, and aesthetic medicine due to its significant ability to reduce the synthesis of pro-inflammatory proteins and its activity against oxidative stress, a feature of many degenerative illnesses

    Chlamydia trachomatis versus common uropathogens as a cause of chronic bacterial prostatitis: Is there any difference? Results of a prospective parallel-cohort study

    Get PDF
    Purpose: The role of Chlamydia trachomatis (CT) infection in chronic bacterial prostatitis (CBP) is well known. What is unclear is whether there are any differences in the course or clinical outcome of the disease when the cause is CT or other uropathogens. Materials and Methods: A series of 311 patients affected by CBP due to CT (cohort A) was compared with a group of 524 patients affected by CBP caused by common uropathogen bacteria (cohort B). All participants completed the following questionnaires: National Institutes of Health Chronic Prostatitis Symptom Index, International Prostate Symptom Score, International Index of Erectile Function-15 erectile function domain (IIEF-15-EFD), Premature Ejaculation Diagnostic Tool (PEDT), and the Short Form 36 (SF-36) Health Survey. All patients were followed with clinical and microbiological evaluations. Results: After a mean follow-up time of 42.3 months, the number of symptomatic episodes was significantly higher in patients in cohort A than in cohort B (4.1±1.1 vs. 2.8±0.8, p<0.001), and the mean time to first symptomatic recurrence was shorter in cohort A than in cohort B (3.3±2.3 months vs. 5.7±1.9 months, p<0.001). Moreover, scores on the SF-36 tool were significantly lower in cohort A (96.5±1.0 vs. 99.7±1.9, p<0.001) at the first symptomatic recurrence. Cohort A also showed significantly lower scores on the IIEF-15-EFD and PEDT questionnaires at the end of the follow-up period (26.8±2.9 vs. 27.3±3.3, p=0.02 and 11.5±2.3 vs. 4.5±2.8, p<0.001, respectively). Conclusions: Patients affected by CBP due to CT infection have a higher number of symptomatic recurrences with a more severe impact on quality of life

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF
    Il presente volume nasce come continuazione del precedente, con l’obiettivo di delineare un insieme di ambiti progettuali e di azioni che la comunità nazionale della ricerca ritiene essenziali a complemento e a supporto di quelli previsti nel DPCM Gentiloni in materia di sicurezza cibernetica, pubblicato nel febbraio del 2017. La lettura non richiede particolari conoscenze tecniche; il testo è fruibile da chiunque utilizzi strumenti informatici o navighi in rete. Nel volume vengono considerati molteplici aspetti della cybersecurity, che vanno dalla definizione di infrastrutture e centri necessari a organizzare la difesa alle azioni e alle tecnologie da sviluppare per essere protetti al meglio, dall’individuazione delle principali tecnologie da difendere alla proposta di un insieme di azioni orizzontali per la formazione, la sensibilizzazione e la gestione dei rischi. Gli ambiti progettuali e le azioni, che noi speriamo possano svilupparsi nei prossimi anni in Italia, sono poi accompagnate da una serie di raccomandazioni agli organi preposti per affrontare al meglio, e da Paese consapevole, la sfida della trasformazione digitale. Le raccomandazioni non intendono essere esaustive, ma vanno a toccare dei punti che riteniamo essenziali per una corretta implementazione di una politica di sicurezza cibernetica a livello nazionale. Politica che, per sua natura, dovrà necessariamente essere dinamica e in continua evoluzione in base ai cambiamenti tecnologici, normativi, sociali e geopolitici. All’interno del volume, sono riportati dei riquadri con sfondo violetto o grigio; i primi sono usati nel capitolo introduttivo e nelle conclusioni per mettere in evidenza alcuni concetti ritenuti importanti, i secondi sono usati negli altri capitoli per spiegare il significato di alcuni termini tecnici comunemente utilizzati dagli addetti ai lavori. In conclusione, ringraziamo tutti i colleghi che hanno contribuito a questo volume: un gruppo di oltre 120 ricercatori, provenienti da circa 40 tra Enti di Ricerca e Università, unico per numerosità ed eccellenza, che rappresenta il meglio della ricerca in Italia nel settore della cybersecurity. Un grazie speciale va a Gabriella Caramagno e ad Angela Miola che hanno contribuito a tutte le fasi di produzione del libro. Tra i ringraziamenti ci fa piacere aggiungere il supporto ottenuto dai partecipanti al progetto FILIERASICURA

    Analysis of Co-Channel Coexistence Mitigation Methods Applied to IEEE 802.11p and 5G NR-V2X Sidelink

    No full text
    Direct communication between vehicles and surrounding objects, called vehicle-to-everything (V2X), is ready for the market and promises to raise the level of safety and comfort while driving. To this aim, specific bands have been reserved in some countries worldwide and different wireless technologies have been developed; however, these are not interoperable. Recently, the issue of co-channel coexistence has been raised, leading the European Telecommunications Standards Institute (ETSI) to propose a number of solutions, called mitigation methods, for the coexistence of the IEEE 802.11p based ITS-G5 and the 3GPP fourth generation (4G) long term evolution (LTE)-V2X sidelink. In this work, several of the envisioned alternatives are investigated when adapted to the coexistence of the IEEE 802.11p with its enhancement IEEE 802.11bd and the latest 3GPP standards, i.e., the fifth generation (5G) new radio (NR)-V2X. The results, obtained through an open-source simulator that is shared with the research community for the evaluation of additional proposals, show that the methods called A and C, which require modifications to the standards, improve the transmission range of one or both systems without affecting the other, at least in low-density scenarios

    Performance Analysis of Sidelink 5G-V2X Mode 2 Through an Open-Source Simulator

    No full text
    International audienceThe Third Generation Partnership Project (3GPP) has recently published a new set of specifications to enable advanced driving applications in fifth generation (5G) vehicle-to-everything (V2X) scenarios, with particular effort dedicated to the sidelink resource allocation in the autonomous mode, named Mode 2. In this paper, we conduct a comprehensive analysis of Mode 2 performance via an open-source system-level simulator, which implements the 5G New Radio (NR) flexible numerology and physical layer aspects together with the newly specified sidelink resource allocation modes for V2X communications and different data traffic patterns. Results collected through extensive simulation campaigns, under a wide variety of vehicle density, data transmission settings and traffic patterns, showcase the effects of the new 5G-V2X features on the sidelink resource allocation performance and provide some insights into possible ways to further improve Mode 2 performance

    Improving Resource Allocation for beyond 5G V2X Sidelink Connectivity

    No full text
    none6siopenC. Campolo, V. Todisco, S. Bartoletti, A. Molinaro, A. O. Berthet, A. Bazzi,C. Campolo, V. Todisco, S. Bartoletti, A. Molinaro, A. O. Berthet, A. Bazzi

    Heterozygous Knock-Out Mice for Brain-Derived Neurotrophic Factor Show a Pathway-Specific Impairment of Long-Term Potentiation But Normal Critical Period for Monocular Deprivation

    No full text
    Genetic deletion of a single allele of the BDNF gene affects hippocampal LTP and causes several behavioral phenotypes, including deficits in spatial learning. In the developing visual cortex, overexpression of BDNF accelerates the time course of the critical period for monocular deprivation (MD), and exogenous administration of BDNF alters the outcome of MD. We asked whether reduced levels of BDNF could affect visual cortex plasticity by studying long-term potentiation (LTP) induction and the effects of MD in heterozygous BDNF knock-out mice. We found that theta burst stimulation that induced LTP in the layer IV-III pathway of wild-type (wt) mice caused only a transient potentiation in BDNF+/- mice, and that this potentiation vanished in 25 min. In contrast, LTP elicited by stimulation of the white matter (WM), a form of LTP that can be induced only during the critical period, occurred normally in wt and BDNF+/- mice. The effects of MD during the critical period were similar in wt and BDNF+/- mice, indicating that layer IV-evoked, layer III LTP is not required for ocular dominance plasticity. We then asked whether reduction of cortical BDNF levels could prolong the critical period for MD and for the WM-evoked, layer III LTP induction. We found that in adult BDNF+/- mice, WM-evoked, layer III LTP was not inducible, and that the critical period for MD terminated normally. We conclude that deletion of one copy of the BDNF gene selectively impairs LTP of the layer IV-III pathway but does not alter ocular dominance plasticity
    corecore