2,213 research outputs found

    The safety and efficacy of hypothermia combining mechanical thrombectomy or thrombolysis in the treatment of ischemic stroke: A systematic meta-analysis

    Get PDF
    Background: Stroke is a major global public health problem, affecting 13.7 million people worldwide. Previous studies have found a neuroprotective effect of hypothermia therapy and the efficacy and safety of combined hypothermia and mechanical thrombectomy or thrombolysis in the treatment of ischemic stroke have also attracted attention. Objective: In the present research, the authors conducted a meta-analysis to comprehensively assess the safety and efficacy of hypothermia combining mechanical thrombectomy or thrombolysis in the treatment of ischemic stroke. Methods: Articles published from January 2001 to May 2022 were searched from Google Scholar, Baidu Scholar and PubMed to evaluate the clinical significance of hypothermia treatment in ischemic stroke. Complications, short-term mortality, and the modified Rankin Scale (mRS) in the full text was extracted. Results: 89 publications were selected and 9 among them were included in this study with sample size of 643. All selected studies are in accordance with the inclusion criteria. Forest plot of clinical characteristics was as follows: complications (RR = 1.132, 95% CI 0.942‒1.361, p = 0.186, I2 = 37.2%), mortality within 3 months (RR = 1.076, 95% CI 0.694‒1.669, p = 0.744, I2 = 0.00%), mRS ≤ 1 at 3 months (RR = 1.138, 95% CI 0.829‒1.563, p = 0.423, I2 = 26.0%), mRS ≤ 2 at 3 months (RR = 1.672, 95% CI 1.236‒2.263, p = 0.001, I2=49.6%) and mRS ≤ 3 at 3 months (RR = 1.518, 95% CI 1.128‒2.043, p = 0.006, I2 = 0.00%). The funnel plot suggested that there was no significant publication bias in the meta-analysis on complications, mortality within 3 months, mRS ≤ 1 at 3 months and mRS ≤ 2 at 3 months. Conclusion: In summary, the results showed that hypothermia treatment was correlated with mRS ≤ 2 at 3 months, but not linked with complications and mortality within 3 months

    Tomato TERF1 modulates ethylene response and enhances osmotic stress tolerance by activating expression of downstream genes

    Get PDF
    AbstractThe interaction between ethylene and osmotic stress pathways modulates the expression of the genes relating to stress adaptation; however, the mechanism is not well understood. In this paper, we report a novel ethylene responsive factor, tomato ethylene responsive factor 1 (TERF1), that integrates ethylene and osmotic stress pathways. Biochemical analysis indicated that TERF1 binds to the GCC box (an element responsive to ethylene) and to the dehydration responsive element, which is responsive to the osmoticum. Expression of TERF1 was induced by ethylene and NaCl treatment. Under normal growth conditions, overexpression of TERF1 in tobacco activated the expression of GCC box-containing pathogen related genes and also caused the typical ethylene triple response. Further investigation indicated that transgenic TERF1 tobacco exhibited salt tolerance, suggesting that TERF1 might function as a linker between the ethylene and osmotic stress pathways

    CornerFormer: Boosting Corner Representation for Fine-Grained Structured Reconstruction

    Full text link
    Structured reconstruction is a non-trivial dense prediction problem, which extracts structural information (\eg, building corners and edges) from a raster image, then reconstructs it to a 2D planar graph accordingly. Compared with common segmentation or detection problems, it significantly relays on the capability that leveraging holistic geometric information for structural reasoning. Current transformer-based approaches tackle this challenging problem in a two-stage manner, which detect corners in the first model and classify the proposed edges (corner-pairs) in the second model. However, they separate two-stage into different models and only share the backbone encoder. Unlike the existing modeling strategies, we present an enhanced corner representation method: 1) It fuses knowledge between the corner detection and edge prediction by sharing feature in different granularity; 2) Corner candidates are proposed in four heatmap channels w.r.t its direction. Both qualitative and quantitative evaluations demonstrate that our proposed method can better reconstruct fine-grained structures, such as adjacent corners and tiny edges. Consequently, it outperforms the state-of-the-art model by +1.9\%@F-1 on Corner and +3.0\%@F-1 on Edge

    Study on catalytic removal of toluene by metal oxides derived from hydrotalcite

    Get PDF
    Hydrotalcite (HT) precursor was synthesized by coprecipitation method, and the surface of HT precursor was modified. The mixed metal oxide (MO) catalyst was prepared by calcination of HT precursor, which was used to remove toluene from VOCs assisted by NTP technology. The catalytic performance of MO catalyst was investigated. The results show that the MO catalyst with good structure can be obtained after calcination of HT precursor before and after modification. The results of catalytic performance test showed that the initial concentration of toluene was 700 ppm, the gas flow rate was 600 mL/min, and the reaction time was 30 min, SIE of NTP was above 3.0 kJ/L, the toluene conversion rate reached above 90%. MO assisted NTP had better catalytic performance with lower energy consumption. The toluene treatment capacity per unit energy consumption increased from 15.3% to 20.6%, which had an increase of 34.6%

    An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks

    Get PDF
    How to efficiently search over encrypted data is an important and interesting problem in the cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with keyword search (PEKS), in 2004. However, in almost all the PEKS schemes an inside adversary may recover the keyword from a given trapdoor by exhaustively guessing the keywords offline. How to resist the inside keyword guessing attack in PEKS remains a hard problem. In this paper we propose introduce the notion of Public-key Authenticated Encryption with Keyword Search (PAEKS) to solve the problem, in which the data sender not only encrypts a keyword, but also authenticates it, so that a verifier would be convinced that the encrypted keyword can only be generated by the sender. We propose a concrete and efficient construction of PAEKS, and prove its security based on simple and static assumptions in the random oracle model under the given security models. Experimental results show that our scheme enjoys a comparable efficiency with Boneh et al.\u27s scheme
    • …
    corecore