60 research outputs found

    Effects of 92% oxygen administration on cognitive performance and physiological changes of intellectually and developmentally disabled people

    Get PDF
    Background: The present study addressed how 92% oxygen administration affects cognitive performance, blood oxygen saturation (SpO(2)), and heart rate (HR) of intellectually and developmentally disabled people. Methods: Seven males (28.9 +/- 1.8 years) and seven females (34.4 +/- 8.3 years) with intellectual and developmental disabilities (disabled level 2.1 +/- 0.5) completed an experiment consisting a 0-back task with normal air (21% oxygen) administered in one run and hyperoxic air (92% oxygen) administered in the other run. The experimental sequence in each run consisted of a 1-min adaptation phase, 2-min control phase, and 2-min 0-back task phase, where SpO(2) and HR were gauged for each phase. Results: The administration of 92% oxygen increased 0-back task performance of intellectually and developmentally disabled people, in association with increased SpO(2) and decreased HR. Our results demonstrate that sufficient oxygen supply subserving cognitive functions, even as a short-term effect, could increase cognitive ability for the intellectually and developmentally disabled people. Conclusions: It is concluded that enriched oxygen can positively affect, at least in the short-term, the working memory of those with intellectual and developmental disabilityopen0

    Successful Retrieval of a Fractured and Entrapped 0.035-Inch Terumo Wire in the Femoral Artery Using Biopsy Forceps

    Get PDF
    A 0.035-inch guide wire fracture and entrapment in a peripheral artery is a very rare complication, but when it does occur it may lead to life-threatening complications, such as perforation, thrombus formation, embolization, and subsequent limb ischemia. We describe our experience of successfully retrieving a fractured 0.035-inch Terumo guide wire in the external iliac artery using a biopsy forcep

    Protective Effects of Gabapentin on Allodynia and α2δ1-Subunit of Voltage-dependent Calcium Channel in Spinal Nerve-Ligated Rats

    Get PDF
    This study was designed to determine whether early gabapentin treatment has a protective analgesic effect on neuropathic pain and compared its effect to the late treatment in a rat neuropathic model, and as the potential mechanism of protective action, the α2δ1-subunit of the voltage-dependent calcium channel (α2δ1-subunit) was evaluated in both sides of the L5 dorsal root ganglia (DRG). Neuropathic pain was induced in male Sprague-Dawley rats by a surgical ligation of left L5 nerve. For the early treatment group, rats were injected with gabapentin (100 mg/kg) intraperitoneally 15 min prior to surgery and then every 24 hr during postoperative day (POD) 1-4. For the late treatment group, the same dose of gabapentin was injected every 24 hr during POD 8-12. For the control group, L5 nerve was ligated but no gabapentin was administered. In the early treatment group, the development of allodynia was delayed up to POD 10, whereas allodynia was developed on POD 2 in the control and the late treatment group (p<0.05). The α2δ1-subunit was up-regulated in all groups, however, there was no difference in the level of the α2δ1-subunit among the three groups. These results suggest that early treatment with gabapentin offers some protection against neuropathic pain but it is unlikely that this action is mediated through modulation of the α2δ1-subunit in DRG

    Clinical outcomes of balloon-occluded retrograde transvenous obliteration for the treatment of gastric variceal hemorrhage in Korean patients with liver cirrhosis: a retrospective multicenter study

    Get PDF
    Background/AimsThis study evaluated the clinical outcomes of balloon-occluded retrograde transvenous obliteration (BRTO) for the treatment of hemorrhage from gastric varices (GV) in Korean patients with liver cirrhosis (LC).MethodsWe retrospectively analyzed data from 183 LC patients who underwent BRTO for GV bleeding in 6 university-based hospitals between January 2001 and December 2010.ResultsOf the 183 enrolled patients, 49 patients had Child-Pugh (CP) class A LC, 105 had CP class B, and 30 had CP class C at the time of BRTO. BRTO was successfully performed in 177 patients (96.7%). Procedure-related complications (e.g., pulmonary thromboembolism and renal infarction) occurred in eight patients (4.4%). Among 151 patients who underwent follow-up examinations of GV, 79 patients (52.3%) achieved eradication of GV, and 110 patients (72.8%) exhibited marked shrinkage of the treated GV to grade 0 or I. Meanwhile, new-appearance or aggravation of esophageal varices (EV) occurred in 54 out of 136 patients who underwent follow-up endoscopy (41.2%). During the 36.0±29.2 months (mean±SD) of follow-up, 39 patients rebled (hemorrhage from GV in 7, EV in 18, nonvariceal origin in 4, and unknown in 10 patients). The estimated 3-year rebleeding-free rate was 74.8%, and multivariate analysis showed that CP class C was associated with rebleeding (odds ratio, 2.404; 95% confidence-interval, 1.013-5.704; P=0.047).ConclusionsBRTO can be performed safely and effectively for the treatment of GV bleeding. However, aggravation of EV or bleeding from EV is not uncommon after BRTO; thus, periodic endoscopy to follow-up of EV with or without prophylactic treatment might be necessary in LC patients undergoing BRTO

    Generalized Upper Bound of Agreement Probability for Extracting Common Random Bits From Correlated Sources

    No full text
    Suppose that both Alice and Bob receive independent random bits without any bias, which are influenced by an independent noise. From the received random bits, Alice and Bob are willing to extract common randomness, without any communication. The extracted common randomness can be used for authentication or secrets. Recently, Bogdanov and Mossel derived an upper bound of the agreement probability, based on the min-entropy of outputs. In this paper, we derive a generalized upper bound of the probability of extracting common random bits from correlated sources, using the R`enyi entropy of order 1/(1−e ), where e is the error probability of the binary symmetric noise. It is shown that the generalized upper bound is always less than or equal to the previous bound

    Generalized Upper Bound of Agreement Probability for Extracting Common Random Bits From Correlated Sources

    No full text
    Abstract: Suppose that both Alice and Bob receive independent random bits without any bias, which are influenced by an independent noise. From the received random bits, Alice and Bob are willing to extract common randomness, without any communication. The extracted common randomness can be used for authentication or secrets. Recently, Bogdanov and Mossel derived an upper bound of the agreement probability, based on the min-entropy of outputs. In this paper, we derive a generalized upper bound of the probability of extracting common random bits from correlated sources, using the Rènyi entropy of order 1/(1−ε), where ε is the error probability of the binary symmetric noise. It is shown that the generalized upper bound is always less than or equal to the previous bound

    Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks

    No full text
    For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle network anomalies. The statistical characteristics of attacks provide valuable information about the inherent intrusion patterns and behaviors. We employed two real-world attack scenarios from publicly available datasets to record a real-time response against intrusions with increased precision for in-vehicle network environments. Our proposed IDS can exploit malicious patterns by calculating thresholds and using the statistical properties of attacks, making attack detection more efficient. The optimized threshold value is calculated using brute-force optimization for various window sizes to minimize the total error. The reference values of normality require a few legitimate data frames for effective intrusion detection. The experimental findings validate that our suggested method can efficiently detect fuzzy, merge, and denial-of-service (DoS) attacks with low false-positive rates. It is also demonstrated that the total error decreases with an increasing attack rate for varying window sizes. The results indicate that our proposed IDS minimizes the misclassification rate and is hence better suited for in-vehicle networks

    New Reversible Data Hiding Scheme for Encrypted Images using Lattices

    No full text
    Reversible data hiding is a technique to hide arbitrary data, without influencing the original images. In 2011, Zhang proposed a reversible data hiding scheme for encrypted images, by using a spatial correlation of the decrypted original image. Later, Hong et al. proposed an improved scheme by using side-match techniques, and modifying the correlation calculation function. In this paper, we propose an improved reversible data hiding scheme for encrypted images with lower bit error rates with the same PSNR (Peak Signalto- Noise Ratio), by introducing a lattice pattern to confine pixels to be used for embedding, and modifying the correlation calculation function, which extracts more information from neighbor pixels. In the proposed scheme, it is possible to hide more data, because the error probability becomes zero for smaller block sizes, than with previous schemes

    Fabrication of metal nanoparticles in metal-organic frameworks

    No full text
    In this review, we highlight various preparative strategies and characterization methods for metal nanoparticles fabricated in porous metal-organic frameworks (MOFs) or porous coordination polymers (PCPs), and their applications in hydrogen storage and heterogeneous catalysis.close814
    corecore