73 research outputs found

    Clinical characteristics and cognitive function in bipolar disorder patients with different onset symptom

    Get PDF
    BackgroundIn recent years, studies on the clinical features and cognitive impairment of patients with different first-episode types of bipolar disorder have received increasing attention. The patients with bipolar disorder may present with different symptoms at first onset. The aim of this study is to assess the cognitive functions of a patient’s index episode of bipolar disorder, depression or mania, on risk factors of effecting on cognitive functions.MethodOne hundred sixty eight patients with bipolar disorder diagnosed for the first time were enrolled in the study. All patients were divided into two groups according to their index episode of bipolar disorder, either depression or mania. Seventy three patients of the cohort had an index episode mania and 95 patients had initial symptoms of depression. Demographic and clinical disease characteristic data of all enrolled patients were collected. Meanwhile, 75 healthy controls were included. Demographic data of controls were collected. The cognitive functions of all patients and controls were detected by continuous performance test (CPT), digital span test (DST) and Wisconsin card sorting test (WCST). The main cognitive functions data were compared among the mania group, depression group and control group. The relevant risk factors affecting cognitive function were analyzed.Results(1) Most patients with bipolar disorder had an index episode depression (56.55% vs. 43.45%). Compared with the depression group, the mania group had later age of onset [(24.01 ± 4.254) vs. (22.25 ± 6.472), t = 2. 122, p = 0.035]. The education level of patient groups was lower than control group (p < 0.001). (2) The healthy control group’s DST, WCST and CPT scores were better than the patient groups (All p < 0.05). The mania group’s DST (forward, reverse, sum), WCST (total responses, completed classifications, correct responses, incorrect responses, percentage of correct responses, completed the number of responses required for classification, the percentage of conceptualization level, the number of persistent responses, non-persistent errors), CPT (2 digit score, 3 digit score, 4 digit score) was better than the depression group (p < 0.05). (3) In mania group, correlation analysis showed that all CPT parameter, inverse digit span, and the sum of DST was negatively correlated with the education level (All p < 0.05). The CPT-4 digit score was negatively correlated with onset age (p < 0.05). In the WCST, the number of correct responses, the percentage of correct responses and the percentage of conceptualization level were positively correlated with the BRMS score (All p < 0.05). The number of false responses and persistent responses were negatively correlated with the BRMS score (All p < 0.05). The number of persistent errors and percentage of persistent errors was positively correlated with education years (All p < 0.05). In depression group, there was a positive correlation between inverse digit span and the education level (p < 0.05).ConclusionIn our study, there were cognitive impairments in attention, memory, and executive function of patients with different onset syndromes of bipolar disorder. Compared with the mania group, the degree of cognitive impairments in bipolar patients with the depressive episode was more severe. The risk factors affecting cognitive impairments included the age of onset, education level, number of hospitalizations and severity of illness

    Macrofauna community of the cold seep area at Site F, South China Sea

    Get PDF
    A cold seep is one of the typical deep-sea chemical energy ecosystems and a hotspot for studying unique life processes and biogeochemical cycles in the deep sea. Macrofauna, which is one of the most important components of the cold seep ecosystem, has not been thoroughly studied. We examined the macrofauna community at Site F using images collected in 2016 by an imaging and laser profiling system and biological samples collected in 2020 and 2021 by TV grab and a remotely operated vehicle. In total, 41 species were found. The overall number of macrofauna identified at Site F (20,000 m2) reached 252,943 individuals, and the biomass reached 726.15 kg by dry weight. As the dominant species, Gigantidas platifrons and Shinkaia crosnieri reached their highest densities of 629 and 396 individuals/m2, respectively. The comparisons between different stations revealed that the diversity and density, even the biomass of dominant species, were much higher in the south than in the north at Site F in 2020. Correlation analysis showed that methane had a positive effect on macrofauna density. Compared with S. crosnieri, G. platifrons seems to be more adapted to the harsh cold seep environment. Methane consumption rates of the dominant species show that macrofauna are important in influencing seafloor methane fluxes. Our findings provide valuable insights into the ecology, community structure, and biota-environment interaction in the cold seep at Site F

    Off-Path TCP Exploits of the Mixed IPID Assignment

    Full text link
    In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate victim TCP connections or inject forged data into victim TCP connections by manipulating the new mixed IPID assignment method, which is widely used in Linux kernel version 4.18 and beyond to help defend against TCP hijacking attacks. The attack has three steps. First, an off-path attacker can downgrade the IPID assignment for TCP packets from the more secure per-socket-based policy to the less secure hash-based policy, building a shared IPID counter that forms a side channel on the victim. Second, the attacker detects the presence of TCP connections by observing the shared IPID counter on the victim. Third, the attacker infers the sequence number and the acknowledgment number of the detected connection by observing the side channel of the shared IPID counter. Consequently, the attacker can completely hijack the connection, i.e., resetting the connection or poisoning the data stream. We evaluate the impacts of this off-path TCP attack in the real world. Our case studies of SSH DoS, manipulating web traffic, and poisoning BGP routing tables show its threat on a wide range of applications. Our experimental results show that our off-path TCP attack can be constructed within 215 seconds and the success rate is over 88%. Finally, we analyze the root cause of the exploit and develop a new IPID assignment method to defeat this attack. We prototype our defense in Linux 4.18 and confirm its effectiveness through extensive evaluation over real applications on the Internet

    Antigen-specific immune responses to influenza vaccine in utero

    Get PDF
    Initial immune responses to allergens may occur before birth, thereby modulating the subsequent development of atopy. This paradigm remains controversial, however, due to the inability to identify antigen-specific T cells in cord blood. The advent of MHC tetramers has revolutionized the detection of antigen-specific T cells. Tetramer staining of cord blood after CMV infection has demonstrated that effective CD8+ antigen-specific immune responses can follow intrauterine viral infections. We hypothesized that sensitization to antigens occurs in utero in humans. We studied cord blood B and T cell immune responses following vaccination against influenza during pregnancy. Anti-Fluzone and anti-matrix protein IgM antibodies were detected in 38.5% (27 of 70) and 40.0% (28 of 70), respectively, of cord blood specimens. Using MHC tetramers, HA-specific CD4+ T cells were detected among 25.0% (3 of 12) and 42.9% (6 of 14) of cord blood specimens possessing DRB1*0101 and DRB1*0401 HLA types, respectively, and were detected even when the DRB1 HLA type was inherited from the father. Matrix protein–specific CD8+ T cells were detected among 10.0% (2 of 20) of HLA-A*0201+ newborns. These results suggest that B and T cell immune responses occur in the fetus following vaccination against influenza and have important implications for determining when immune responses to environmental exposures begin

    31st Annual Meeting and Associated Programs of the Society for Immunotherapy of Cancer (SITC 2016) : part two

    Get PDF
    Background The immunological escape of tumors represents one of the main ob- stacles to the treatment of malignancies. The blockade of PD-1 or CTLA-4 receptors represented a milestone in the history of immunotherapy. However, immune checkpoint inhibitors seem to be effective in specific cohorts of patients. It has been proposed that their efficacy relies on the presence of an immunological response. Thus, we hypothesized that disruption of the PD-L1/PD-1 axis would synergize with our oncolytic vaccine platform PeptiCRAd. Methods We used murine B16OVA in vivo tumor models and flow cytometry analysis to investigate the immunological background. Results First, we found that high-burden B16OVA tumors were refractory to combination immunotherapy. However, with a more aggressive schedule, tumors with a lower burden were more susceptible to the combination of PeptiCRAd and PD-L1 blockade. The therapy signifi- cantly increased the median survival of mice (Fig. 7). Interestingly, the reduced growth of contralaterally injected B16F10 cells sug- gested the presence of a long lasting immunological memory also against non-targeted antigens. Concerning the functional state of tumor infiltrating lymphocytes (TILs), we found that all the immune therapies would enhance the percentage of activated (PD-1pos TIM- 3neg) T lymphocytes and reduce the amount of exhausted (PD-1pos TIM-3pos) cells compared to placebo. As expected, we found that PeptiCRAd monotherapy could increase the number of antigen spe- cific CD8+ T cells compared to other treatments. However, only the combination with PD-L1 blockade could significantly increase the ra- tio between activated and exhausted pentamer positive cells (p= 0.0058), suggesting that by disrupting the PD-1/PD-L1 axis we could decrease the amount of dysfunctional antigen specific T cells. We ob- served that the anatomical location deeply influenced the state of CD4+ and CD8+ T lymphocytes. In fact, TIM-3 expression was in- creased by 2 fold on TILs compared to splenic and lymphoid T cells. In the CD8+ compartment, the expression of PD-1 on the surface seemed to be restricted to the tumor micro-environment, while CD4 + T cells had a high expression of PD-1 also in lymphoid organs. Interestingly, we found that the levels of PD-1 were significantly higher on CD8+ T cells than on CD4+ T cells into the tumor micro- environment (p < 0.0001). Conclusions In conclusion, we demonstrated that the efficacy of immune check- point inhibitors might be strongly enhanced by their combination with cancer vaccines. PeptiCRAd was able to increase the number of antigen-specific T cells and PD-L1 blockade prevented their exhaus- tion, resulting in long-lasting immunological memory and increased median survival

    A Stochastic Analytical Modelling Framework on ISP-P2P Collaborations in Multi-domain Environments

    Get PDF
    Cooperation between peer-to-peer (P2P) overlays and underlying networks has been proposed as an effective approach to improve the efficiency of both the applications and the underlying networks. However, fundamental characteristics with respect to ISP business relationships and inter-ISP routing information are not sufficiently investigated in the context of collaborative ISP-P2P paradigms in multi-domain environments. In this paper, we focus on such issues and develop an analytical modelling framework for analysing optimized inter-domain peer selection schemes concerning ISP policies, with the main purpose of mitigating cross-ISP traffic and enhancing service quality of end users. In addition, we introduce an advanced hybrid scheme for peer selections based on the proposed analytical theory framework, in accordance with practical network scenarios, wherein cooperative and non-cooperative behaviours coexisting. Numerical results show that the proposed scheme incorporating ISP policies is able to achieve desirable network efficiency as well as great service quality for P2P users. Our analytical modelling framework can be used as a guide for analysing and evaluating future network-aware P2P peer selection paradigms in general multi-domain scenarios

    First Principle Study on Atomic Scale Structures of Cathode in Aluminium-ion Battery Using Various van der Waals Corrections

    No full text
    There is still controversy on the atomistic configuration of aluminium-ion batteries (AIB) cathode when using first principle calculation based on density functional theory (DFT). We examined the relevant cathodic structures of Al/graphite battery by employing several van der Waals (vdW) corrections. Among them, DFT-TS method was determined to be a better dispersion correction in correctly rendering structural features already found through experiment investigations. The systematic comparison paved the way to the choice of vdW parameters in first principle calculation of graphitic electrode

    Asymptotic Solution and Numerical Simulation of Lamb Waves in Functionally Graded Viscoelastic Film

    No full text
    To investigate Lamb waves in thin films made of functionally graded viscoelastic material, we deduce the governing equation with respect to the displacement component and solve these partial differential equations with complex variable coefficients based on a power series method. To solve the transcendental equations in the form of a series with complex coefficients, we propose and optimize the minimum module approximation (MMA) method. The power series solution agrees well with the exact analytical solution when the material varies along its thickness following the same exponential function. When material parameters vary with thickness with the same function, the effect of the gradient properties on the wave velocity is limited and that on the wave structure is obvious. The influence of the gradient parameter on the dispersion property and the damping coefficient are discussed. The results should provide nondestructive evaluation for viscoelastic material and the MMA method is suggested for obtaining numerical results of the asymptotic solution for attenuated waves, including waves in viscoelastic structures, piezoelectric semiconductor structures, and so on

    Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks

    Get PDF
    With the renaissance of deep learning, the side-channel community also notices the potential of this technology, which is highly related to the profiling attacks in the side-channel context. Many papers have recently investigated the abilities of deep learning in profiling traces. Some of them also aim at the countermeasures (e.g., masking) simultaneously. Nevertheless, so far, all of these papers work with an (implicit) assumption that the number of time samples in raw traces can be reduced before the profiling, i.e., the position of points of interest (PoIs) can be manually located. This is arguably the most challenging part of a practical black-box analysis targeting an implementation protected by masking. Therefore, we argue that to fully utilize the potential of deep learning and get rid of any manual intervention, the end-to-end profiling directly mapping raw traces to target intermediate values is demanded.In this paper, we propose a neural network architecture that consists of encoders, attention mechanisms and a classifier, to conduct the end-to-end profiling. The networks built by our architecture could directly classify the traces that contain a large number of time samples (i.e., raw traces without manual feature extraction) while whose underlying implementation is protected by masking. We validate our networks on several public datasets, i.e., DPA contest v4 and ASCAD, where over 100,000 time samples are directly used in profiling. To our best knowledge, we are the first that successfully carry out end-to-end profiling attacks. The results on the datasets indicate that our networks could get rid of the tricky manual feature extraction. Moreover, our networks perform even systematically better (w.r.t. the number of traces in attacks) than those trained on the reduced traces. These validations imply our approach is not only a first but also a concrete step towards end-to-end profiling attacks in the side-channel context

    A Stochastic Analytical Modeling Framework on ISP–P2P Collaborations in Multidomain Environments

    No full text
    • …
    corecore