120 research outputs found
Cell therapy in patients with critical limb ischemia
Critical limb ischemia (CLI) represents the most advanced stage of peripheral arterial obstructive disease (PAOD) with a severe obstruction of the arteries which markedly reduces blood flow to the extremities and has progressed to the point of severe rest pain and/or even tissue loss. Recent therapeutic strategies have focused on restoring this balance in favor of tissue survival using exogenousmolecular and cellular agents to promote regeneration of the vasculature.These are based on stimulation of angiogenesis by extracellular and cellular components. This review article carries out a systematic analysis of the most recent scientific literature on the application of stem cells in patients with CLI. The results obtained from the detailed analysis of the recent literature data have confirmed the beneficial role of cell therapy in reducing the rate of major amputations in patients with CLI and improving their quality of life
Elderly Care and Digital Services: Toward a Sustainable Sociotechnical Transition
The elderly care system’s sustainability is one of the largest societal challenges of our time. Digitalization and the implementation of technologies in elderly care are viewed as offering possible solutions to the social and economic challenges of sustainability. This study’s objective is to examine the development, implementation, and diffusion of technologies in elderly care from a sociotechnical perspective, leaning on the concepts of sociotechnical transitions. The focus mainly is on sustainable niche development, including interactions between niches and regimes in terms of sustainable sociotechnical transitions, how niches are developed in relation to sustainability, and in which conditions and circumstances promising niches can contribute to regime change in elderly care. Through a multiple-case study in different living environments of elderly residents in Finland, we identify factors that facilitate or hinder sustainable development and the implementation and diffusion of technologies in elderly care. The three case studies concern various types of development: introduction of tablet computers in senior housing, construction of a multisensory room in a care home, and the use of a care robot in care homes and in a rehabilitation hospital. Critical factors for sustainable niche development include involving users in the development processes, as well as simultaneous development of technologies and services. The multifaceted and effective use of technologies requires time and resources. Critical factors in niche-regime interaction are, for example, factors relating to attitudes, as well as technologies’ maturity. The need to consider a wider perspective, rather than a singular disruption, is key.Post-print / Final draf
Verifying for Compliance to Data Constraints in Collaborative Business Processes.
Production processes are nowadays fragmented across different companies and organized in global collaborative networks. This is the result of the first wave of globalization that, among the various factors, was enabled by the diffusion of Internet-based Information and Communication Technologies (ICTs) at the beginning of the years 2000. The recent wave of new technologies possibly leading to the fourth industrial revolution – the so-called Industry 4.0 – is further multiplying opportunities. Accessing global customers opens great opportunities for organizations, including small and medium enterprises (SMEs), but it requires the ability to adapt to different requirements and conditions, volatile demand patterns and fast-changing technologies. Regardless of the industrial sector, the processes used in an organization must be compliant to rules, standards, laws and regulations. Non-compliance subjects enterprises to litigation and financial fines. Thus, compliance verification is a major concern, not only to keep pace with changing regulations but also to address the rising concerns of security, product and service quality and data privacy. The software, in particular process automation, used must be designed accordingly. In relation to process management, we propose a new way to pro-actively check the compliance of current running business processes using Descriptive Logic and Linear Temporal Logic to describe the constraints related to data. Related algorithms are presented to detect the potential violations
Insight from an Italian Delphi Consensus on EVAR feasibility outside the instruction for use: the SAFE EVAR Study
BACKGROUND: The SAfety and FEasibility of standard EVAR outside the instruction for use (SAFE-EVAR) Study was designed to define the attitude of Italian vascular surgeons towards the use of standard endovascular repair (EVAR) for infrarenal abdominal aortic aneurysm (AAA) outside the instruction for use (IFU) through a Delphi consensus endorsed by the Italian Society of Vascular and Endovascular Surgery (Societa Italiana di Chirurgia Vascolare ed Endovascolare - SICVE). METHODS: A questionnaire consisting of 26 statements was developed, validated by an 18 -member Advisory Board, and then sent to 600 Italian vascular surgeons. The Delphi process was structured in three subsequent rounds which took place between April and June 2023. In the first two rounds, respondents could indicate one of the following five degrees of agreement: 1) strongly agree; 2) partially agree; 3) neither agree nor disagree; 4) partially disagree; 5) strongly disagree; while in the third round only three different choices were proposed: 1) agree; 2) neither agree nor disagree; 3) disagree. We considered the consensus reached when >70% of respondents agreed on one of the options. After the conclusion of each round, a report describing the percentage distribution of the answers was sent to all the participants. RESULTS: Two -hundred -forty-four (40.6%) Italian Vascular Surgeons agreed to participate the first round of the Delphi Consensus; the second and the third rounds of the Delphi collected 230 responders (94.3% of the first -round responders). Four statements (15.4%) reached a consensus in the first rounds. Among the 22 remaining statements, one more consensus (3.8%) was achieved in the second round. Finally, seven more statements (26.9%) reached a consensus in the simplified last round. Globally, a consensus was reached for almost half of the proposed statements (46.1%). CONCLUSIONS: The relatively low consensus rate obtained in this Delphi seems to confirm the discrepancy between Guideline recommendations and daily clinical practice. The data collected could represent the source for a possible guidelines' revision and the proposal of specific Good Practice Points in all those aspects with only little evidence available
SAT-based Model Checking for Security Protocols Analysis
We present a model checking technique for
security protocols based on a reduction to propositional logic.
At the core of our approach is a procedure that, given a
description of the protocol in a multi-set rewriting formalism
and a positive integer k, builds a propositional formula
whose models (if any) correspond to attacks on the protocol.
Thus, finding attacks on protocols boils down to checking
a propositional formula for satisfiability, problem that
is usually solved very efficiently by modern SAT solvers.
Experimental results indicate that the approach scales up to
industrial strength security protocols with performance comparable
with (and in some cases superior to) that of other
state-of-the-art protocol analysers
Bulwark: Holistic and verified security monitoring of web protocols
Modern web applications often rely on third-party services to provide their functionality to users. The secure integration of these services is a non-trivial task, as shown by the large number of attacks against Single Sign On and Cashier-as-a-Service protocols. In this paper we present Bulwark, a new automatic tool which generates formally verified security monitors from applied pi-calculus specifications of web protocols. The security monitors generated by Bulwark offer holistic protection, since they can be readily deployed both at the client side and at the server side, thus ensuring full visibility of the attack surface against web protocols. We evaluate the effectiveness of Bulwark by testing it against a pool of vulnerable web applications that use the OAuth 2.0 protocol or integrate the PayPal payment system
- …
