19 research outputs found

    DAI (Disease Aggressiveness Index) Implementation

    Get PDF
    Although the basic concept of disease aggressiveness has always been used to describe several pathologies, especially defining cancer, a general mathematic formula associated to such a parameter is still lacking. Interestingly, only within the discipline of Plant Pathology investigators were able to develop a Composite Aggressiveness Index (CAI) relative to Phytophora infestans activity on potatoes. This very index was used as a template to develop the formula of DAI (Disease Aggressiveness Index). Taking together all the above evaluations and results, it can be inferred that DAI (Disease Aggressiveness Index) could become a very useful tool to mathematically compare diseases and thus set economical prioritization strategies. Nevertheless, such an index could be very useful and supportive to act as a correction coefficient for predictive algorithms

    MuSER (Multiple Sclerosis Expected Rate) Predictive Model Development

    Get PDF
    Multiple Sclerosis (MS) is the most diffused among rare neurological pathologies, as it affects about 0.031% people all over the world. Its prevalence in the United States (US) was calculated to be around 0.14%, but according to National Multiple Sclerosis Society (NMSS) MS is not properly monitored and registered within American territory and the creation of a MS archive is expected to ameliorate the calculus accuracy. The aim of this work is to develop a simple but reliable biostatistical predictive model called MuSER (Multiple Sclerosis Expected Rate); it was projected based on the ascending trend that was observed during previous studies, although not dependable, is theoretically reliable, at least considering R2 coefficients. Efficiency of MuSER model will be assessed at the end of 2019. In order to predict MS incidence within an ethnically homogeneous population. Although not absolutely dependable, is theoretically reliable, at least considering R2 coefficients. Efficiency of MuSER model will be assessed at the end of 2019

    Exploratory study on the associations between lifetime post-traumatic stress spectrum, sleep, and circadian rhythm parameters in patients with bipolar disorder

    Get PDF
    : The present study aimed at exploring whether lifetime post-traumatic stress spectrum symptoms are associated with chronotype in patients with bipolar disorder (BD). Moreover, we explored whether the chronotype can moderate the potential associations between lifetime post-traumatic stress spectrum symptoms and rest-activity circadian and sleep-related parameters. A total of 74 BD patients were administered the Trauma and Loss Spectrum Self-Report (TALS-SR) lifetime version for lifetime post-traumatic stress spectrum symptoms, the Pittsburgh Sleep Quality Index (PSQI) for self-reported sleep quality, and the Reduced Morningness-Eveningness Questionnaire (rMEQ) to discriminate evening chronotypes (ETs), neither chronotype (NT), and morning chronotype (MT). Actigraphic monitoring was used to objectively evaluate sleep and circadian parameters. Patients classified as ET reported significantly higher scores in the re-experiencing domain, as well as poorer sleep quality, lower sleep efficiency, increased wake after sleep onset, and delayed mid-sleep point compared with both NT and MT (p-value ≤ 0.05). Moreover, ET presented significantly higher scores in the TALS-SR maladaptive coping domain than NT and lower relative amplitude than MT (p-value ≤ 0.05). Moreover, higher TALS-SR total symptomatic domains scores were significantly correlated with poor self-reported sleep quality. Regression analyses showed that the PSQI score maintained the association with the TALS total symptomatic domains scores after adjusting for potentially confounding factors (age and sex) and that no interaction effect was observed between the chronotype and the PSQI. Conclusions: This exploratory study suggests that patients with BD classified as ET showed significantly higher lifetime post-traumatic stress spectrum symptoms and more disrupted sleep and circadian rhythmicity with respect to other chronotypes. Moreover, poorer self-reported sleep quality was significantly associated with lifetime post-traumatic stress spectrum symptoms. Further studies are required to confirm our results and to evaluate whether targeting sleep disturbances and eveningness can mitigate post-traumatic stress symptoms in BD

    Fermentacija mlijeka obogaćenog mljevenom kominom grožđa s pomoću bakterije Lactobacillus acidophilus

    Get PDF
    Some by-products of wine industry still contain nutrients and functional compounds that make them potential ingredients to formulate new high value-added food products. The aim of this study is to develop milk fermented with Lactobacillus acidophilus fortified with marc flour of different cultivars of Vitis vinifera from wine production and to evaluate their influence on fermentation kinetics, probiotic counts, phenolic compounds, sugar content and antioxidant activity. The acidification time was significantly shortened by these enrichments (by up to 2.7 h), and the bacterial count during cold storage resulted in stronger fortification of samples (up to 4.13 %) when compared to control tests. Fermented milk containing grape marc showed considerable amounts of phenolic compounds with notable antioxidant activity, as well as significant amounts of total sugars. The most important aspect of this paper is the feasibility of using winery by-products, rich in phenolic compounds, as natural supplements to fortify probiotic-fermented milk.Neki nusproizvodi u proizvodnji vina sadržavaju hranjive i funkcionalne tvari, pa se mogu upotrijebiti za razvoj novih prehrambenih proizvoda s dodanom vrijednošću. Svrha je ovoga rada bila proizvesti mlijeko obogaćeno mljevenom kominom različitih sorata grožđa i fermentirano s pomoću bakterije Lactobacillus acidophilus, te odrediti utjecaj dodatka komine na kinetiku fermentacije, broj probiotičkih mikroorganizama, udjele fenolnih spojeva i šećera, te antioksidativnu aktivnost fermentiranog mlijeka. Vrijeme fermentacije obogaćenog mlijeka znatno se smanjilo (do 2,7 h), a broj bakterija tijekom skladištenja u hladnjaku povećao (do 4,13 %) u usporedbi s kontrolnim uzorkom. Fermentirano je mlijeko obogaćeno mljevenom kominom grožđa imalo veće udjele fenolnih spojeva i ukupnih šećera, te izraženiju antioksidativnu aktivnost. Najveći je značaj ovog istraživanja u tome što dokazuje da se nusproizvodi vinske industrije bogati fenolnim spojevima mogu upotrijebiti kao prirodni dodaci mlijeku fermentiranom s pomoću probiotika

    Acute Delta Hepatitis in Italy spanning three decades (1991–2019): Evidence for the effectiveness of the hepatitis B vaccination campaign

    Get PDF
    Updated incidence data of acute Delta virus hepatitis (HDV) are lacking worldwide. Our aim was to evaluate incidence of and risk factors for acute HDV in Italy after the introduction of the compulsory vaccination against hepatitis B virus (HBV) in 1991. Data were obtained from the National Surveillance System of acute viral hepatitis (SEIEVA). Independent predictors of HDV were assessed by logistic-regression analysis. The incidence of acute HDV per 1-million population declined from 3.2 cases in 1987 to 0.04 in 2019, parallel to that of acute HBV per 100,000 from 10.0 to 0.39 cases during the same period. The median age of cases increased from 27 years in the decade 1991-1999 to 44 years in the decade 2010-2019 (p < .001). Over the same period, the male/female ratio decreased from 3.8 to 2.1, the proportion of coinfections increased from 55% to 75% (p = .003) and that of HBsAg positive acute hepatitis tested for by IgM anti-HDV linearly decreased from 50.1% to 34.1% (p < .001). People born abroad accounted for 24.6% of cases in 2004-2010 and 32.1% in 2011-2019. In the period 2010-2019, risky sexual behaviour (O.R. 4.2; 95%CI: 1.4-12.8) was the sole independent predictor of acute HDV; conversely intravenous drug use was no longer associated (O.R. 1.25; 95%CI: 0.15-10.22) with this. In conclusion, HBV vaccination was an effective measure to control acute HDV. Intravenous drug use is no longer an efficient mode of HDV spread. Testing for IgM-anti HDV is a grey area requiring alert. Acute HDV in foreigners should be monitored in the years to come

    Blood-Brain Barrier Disruption as a Key Role Problem in Multiple Sclerosis: A Novel Primary Prevention Strategy

    Get PDF
    Blood-barrier disruption is known to be a typical feature of Multiple Sclerosis. Such a vasal permeability let lymphocytes infiltration, with consequent central nervous system inflammation and demyelination. It has been demonstrated that blood-brain barrier disruption also occurs with aging and among pathology like Alzheimer\u2019s Disease and Cognitive Dysfunction. With this in mind, it is clear that such phenomenon is a common trait between vey important and severe neurodegenerative diseases, letting happen neurological damages such as harmful cytokine diffusion within central nervous system and inlet of autoreactive immune cells. Interestingly, research about primary prevention of blood-brain barrier disruption is still lacking, so that the aim of this work is to propose a novel strategy to forestall this important etiological event. As it has been discussed throughout the paper, many risk factors have been identified, i.e. smoking habits, juvenile obesity, low vitamin D and oxidative stress. Since the above cited disorders onsets occurs at least after 20 years of age, a preventive strategy has been designed to be employed since the early childhood. Such plan includes eliminating smoking habits, the employment of a Mediterranean diet supplemented with vitamin D rich foods, introducing physical activity and the consumption of food containing antioxidants

    Social engineering 2.0: A foundational work

    No full text
    During the past few years, social engineering has rapidly evolved and has become a mainstream technique in cybercrime and terrorism. It is used especially in targeted attacks involving complex human and technological exploits, aimed at deceiving humans and IT systems. Building on the work carried out in the DOGANA project, funded by the European Union, this paper provides an overview of the evolution and of the current landscape of social engineering, and introduces as its main contribution a theoretical model of how human exploits are built, named the Victim Communication Stack

    A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps

    No full text
    We describe the roadmapping method developed in the context of the CyberROAD EU FP7 project, the aim of which was to develop a research roadmap for cybercrime and cyberterrorism. To achieve this aim we build on state-of-the-art methodologies and guidelines, as well as related projects, and adapt them to the specific characteristics of cybercrime and cyberterrorism. The distinctive feature is that cybercrime and cyberterrorism co-evolve with their contextual environment (i.e., technology, society, politics and economy). This poses specific challenges to a roadmapping effort. Our approach could become a best practice in the field of cybersecurity, and could also be generalised to phenomena that exhibit a similar, strong co-evolution with their contextual environment. In this chapter, we define our route to developing the CyberROAD research roadmap and contextualise it with an example of Enterprise 2.0

    Yet Another Cybersecurity Roadmapping Methodology

    No full text
    In this paper we describe the road mapping methodology we developed in the context of the CyberROAD EU FP7 project, whose aim is to develop a research roadmap for cybercrime and cyber terrorism. To this aim we built on state-of-the-art methodologies and available guidelines, including related projects, and adapted them to the peculiarities of our road mapping subject. In particular, its distinctive feature is that cybercrime and cyber terrorism co-evolve with their contextual environment (i.e., Technology, society, politics and economy), which poses specific challenges to a road mapping effort. Our approach can become a best practice in the field of cyber security, and can be also generalised to phenomena that exhibit a similar, strong co-evolution with their contextual environment. We aim to describe here the road mapping methodology that will lead to the roadmap but not the roadmap itself (this one being, incidentally, still under construction at the time of writing this paper)
    corecore