133 research outputs found

    Applications of serum amino acid levels in identification of cancer

    Get PDF
    Chemometric method of uncorrelated linear discriminant analysis (ULDA) was applied to the data of amino acid levels in serum of lung cancer patients and healthy people, eventually successfully classifies the samples of cancer patients and healthy people. Simultaneously, several potential amino acid biomarkers were possibly chosen. So the method of amino acid levels combined with ULDA algorithm could be applied to the identification of cancer and exploration of tumor biomarker, which has certain practical value and application prospects

    Efficacy of autologous bone marrow buffy coat grafting combined with core decompression in patients with avascular necrosis of femoral head: a prospective, double-blinded, randomized, controlled study

    Get PDF
    Introduction Avascular necrosis of femoral head (ANFH) is a progressive disease that often leads to hip joint dysfunction and even disability in young patients. Although the standard treatment, which is core decompression, has the advantage of minimal invasion, the efficacy is variable. Recent studies have shown that implantation of bone marrow containing osteogenic precursors into necrotic lesion of ANFH may be promising for the treatment of ANFH. Methods A prospective, double-blinded, randomized controlled trial was conducted to examine the effect of bone-marrow buffy coat (BBC) grafting combined with core decompression for the treatment of ANFH. Forty-five patients (53 hips) with Ficat stage I to III ANFH were recruited. The hips were allocated to the control group (core decompression + autologous bone graft) or treatment group (core decompression + autologous bone graft with BBC). Both patients and assessors were blinded to the treatment options. The clinical symptoms and disease progression were assessed as the primary and secondary outcomes. Results At the final follow-up (24 months), there was a significant relief in pain (P \u3c0.05) and clinical joint symptoms as measured by the Lequesne index (P \u3c0.05) and Western Ontario and McMaster Universities Arthritis Index (P \u3c0.05) in the treatment group. In addition, 33.3% of the hips in the control group have deteriorated to the next stage after 24 months post-procedure, whereas only 8% in the treatment group had further deterioration (P \u3c0.05). More importantly, the non-progression rates for stage I/II hips were 100% in the treatment group and 66.7% in the control group. Conclusion Implantation of the autologous BBC grafting combined with core decompression is effective to prevent further progression for the early stages of ANFH. Trial registration ClinicalTrials.gov identifier NCT01613612. Registered 13 December 2011

    CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis

    Full text link
    The misunderstanding and incorrect configurations of cryptographic primitives have exposed severe security vulnerabilities to attackers. Due to the pervasiveness and diversity of cryptographic misuses, a comprehensive and accurate understanding of how cryptographic misuses can undermine the security of an Android app is critical to the subsequent mitigation strategies but also challenging. Although various approaches have been proposed to detect cryptographic misuses in Android apps, seldom studies have focused on estimating the security risks introduced by cryptographic misuses. To address this problem, we present an extensible framework for deciding the threat level of cryptographic misuses in Android apps. Firstly, we propose a unified specification for representing cryptographic misuses to make our framework extensible and develop adapters to unify the detection results of the state-of-the-art cryptographic misuse detectors, resulting in an adapter-based detection toolchain for a more comprehensive list of cryptographic misuses. Secondly, we employ a misuse-originating data-flow analysis to connect each cryptographic misuse to a set of data-flow sinks in an app, based on which we propose a quantitative data-flow-driven metric for assessing the overall risk of the app introduced by cryptographic misuses. To make the per-app assessment more useful in the app vetting at the app-store level, we apply unsupervised learning to predict and classify the top risky threats, to guide more efficient subsequent mitigations. In the experiments on an instantiated implementation of the framework, we evaluate the accuracy of our detection and the effect of data-flow-driven risk assessment of our framework. Our empirical study on over 40,000 apps as well as the analysis of popular apps reveals important security observations on the real threats of cryptographic misuses in Android apps
    corecore