21 research outputs found

    Associations between Body Mass and the Outcome of Surgery for Scoliosis in Chinese Adults

    Get PDF
    BACKGROUND: In this study we intended to prove that being overweight has an unfavorable impact on the surgical treatment outcome of adult idiopathic scoliosis (AdIS). METHODS: This is a retrospective study on the surgical treatment of seventy-one more than 30 years old (58 females and 13 males; mean age 42.9±12.2) idiopathic scoliotic patients with a minimum follow up of at least 2 years. The patients were divided into an overweight group (BMI≥23) and a non-overweight group (BMI<23). Preoperative, postoperative first erect and final follow-up radiographic measures, perioperative data, the Oswestry disability index (ODI), and the visual analog scale (VAS) were reviewed and compared. FINDINGS: In the overweight group, no significant differences in radiographic measures, perioperative data, preoperative comorbidities, or postoperative complications, except for the more frequent concomitance of preoperative thoracic kyphosis 37.9±7.7 vs. 26.5±11.8 (P = 0.000) and thoracolumbar kyphosis 14.9±10.1 overweighted group vs. 6.5±9.9 non-overweighted group respectively (P = 0.002) were found. A higher morbidity of hypertension 36.8% vs. 9.6% (P = 0.004) was also observed in the overweight group. Postoperative ODI and VAS improved significantly in both groups compared to pre-operative values. The postoperative ODI of the overweight group (19.6±12.4) was significantly higher than that of the non-overweight group (12.4±7.9) (P = 0.022). CONCLUSIONS: Overweight adult idiopathic scoliotic patients had more frequent concomitance of preoperative thoracic kyphosis and thoracolumbar kyphosis and more serious postoperative pain. However, BMI did not affect the outcomes of surgical correction for coronal and sagittal scoliotic deformity and their postoperative complication rates were not significantly affected

    basic concepts on systems of systems

    Get PDF
    A System of System (SoS) stems from the integration of existing systems (legacy systems), normally operated by different organizations, and new systems that have been designed to take advantage of this integration

    Neuroprotection by adenosine in the brain: From A1 receptor activation to A2A receptor blockade

    Get PDF
    Adenosine is a neuromodulator that operates via the most abundant inhibitory adenosine A1 receptors (A1Rs) and the less abundant, but widespread, facilitatory A2ARs. It is commonly assumed that A1Rs play a key role in neuroprotection since they decrease glutamate release and hyperpolarize neurons. In fact, A1R activation at the onset of neuronal injury attenuates brain damage, whereas its blockade exacerbates damage in adult animals. However, there is a down-regulation of central A1Rs in chronic noxious situations. In contrast, A2ARs are up-regulated in noxious brain conditions and their blockade confers robust brain neuroprotection in adult animals. The brain neuroprotective effect of A2AR antagonists is maintained in chronic noxious brain conditions without observable peripheral effects, thus justifying the interest of A2AR antagonists as novel protective agents in neurodegenerative diseases such as Parkinson’s and Alzheimer’s disease, ischemic brain damage and epilepsy. The greater interest of A2AR blockade compared to A1R activation does not mean that A1R activation is irrelevant for a neuroprotective strategy. In fact, it is proposed that coupling A2AR antagonists with strategies aimed at bursting the levels of extracellular adenosine (by inhibiting adenosine kinase) to activate A1Rs might constitute the more robust brain neuroprotective strategy based on the adenosine neuromodulatory system. This strategy should be useful in adult animals and especially in the elderly (where brain pathologies are prevalent) but is not valid for fetus or newborns where the impact of adenosine receptors on brain damage is different

    WiFire: a firewall for wireless networks.

    No full text
    Firewalls are extremely effective at enforcing security policies in wired networks. Perhaps surprisingly, firewalls are entirely nonexistent in the wireless domain. Yet, the need to selectively control and block radio communication is particularly high in a broadcast environment since any node may receive and send packets. In this demo, we present WiFire, a system that brings the firewall concept to wireless networks. First, WiFire detects and analyzes packets during their transmission, checking their content against a set of rules. It then relies on reactive jamming techniques to selectively block undesired communication. We show the feasibility and performance of WiFire, which is implemented on the USRP2 software-defined radio platform, in several scenarios with IEEE 802.15.4 radios. WiFire is able to classify and effectively block undesired communication without interfering with desired communication

    A Variable-Length Network Encoding Protocol for Big Genomic Data

    No full text
    Part 5: Network ProtocolsInternational audienceModern genomic studies utilize high-throughput instruments which can produce data at an astonishing rate. These big genomic datasets produced using next generation sequencing (NGS) machines can easily reach peta-scale level creating storage, analytic and transmission problems for large-scale system biology studies. Traditional networking protocols are oblivious to the data that is being transmitted and are designed for general purpose data transfer. In this paper we present a novel data-aware network transfer protocol to efficiently transfer big genomic data. Our protocol exploits the limited alphabet of DNA nucleotide and is developed over the hypertext transfer protocol (HTTP) framework. Our results show that proposed technique improves transmission up to 84 times when compared to normal HTTP encoding schemes. We also show that the performance of the resultant protocol (called VTTP) using a single machine is comparable to BitTorrent protocol used on 10 machines
    corecore