40 research outputs found

    US Cancer Centers of Excellence Strategies for Increased Inclusion of Racial and Ethnic Minorities in Clinical Trials

    Get PDF
    PURPOSE:: Participation of racial and ethnic minority groups (REMGs) in cancer trials is disproportionately low despite a high prevalence of certain cancers in REMG populations. We aimed to identify notable practices used by leading US cancer centers that facilitate REMG participation in cancer trials. METHODS:: The National Minority Quality Forum and Sustainable Healthy Communities Diverse Cancer Communities Working Group developed criteria by which to identify eligible US cancer centers-REMGs comprise 10% or more of the catchment area; a 10% to 50% yearly accrual rate of REMGs in cancer trials; and the presence of formal community outreach and diversity enrollment programs. Cancer center leaders were interviewed to ascertain notable practices that facilitate REMG accrual in clinical trials. RESULTS:: Eight cancer centers that met the Communities Working Group criteria were invited to participate in in-depth interviews. Notable strategies for increased REMG accrual to cancer trials were reported across five broad themes: commitment and center leadership, investigator training and mentoring, community engagement, patient engagement, and operational practices. Specific notable practices included increased engagement of health care professionals, the presence of formal processes for obtaining REMG patient/caregiver input on research projects, and engagement of community groups to drive REMG participation. Centers also reported an increase in the allocation of resources to improving health disparities and increased dedication of research staff to REMG engagement. CONCLUSION:: We have identified notable practices that facilitate increased participation of REMGs in cancer trials. Wide implementation of such strategies across cancer centers is essential to ensure that all populations benefit from advances in an era of increasingly personalized treatment of cancer

    Pyoderma gangrenosum and ulcerative colitis in the tropics

    No full text
    Pyoderma gangrenosum is a rare inflammatory skin condition, characterized by progressive and recurrent skin ulceration. There may be rapidly enlarging, painful ulcers with undermined edges and a necrotic, hemorrhagic base. Disorders classically associated with pyoderma gangrenosum include rheumatoid arthritis, inflammatory bowel disease, paraproteinemia and myeloproliferative disorders. There have been some reports of the occurrence of pyoderma gangrenosum in Africa, and in Nigeria, but only one specifically reported pyoderma gangrenosum in association with ulcerative colitis. We report on a 45-year-old man who presented with pyoderma gangrenosum associated with ulcerative colitis; the second report in Nigeria. The skin lesions were managed with daily honey wound dressings. Oral dapsone and prednisolone were started. The frequency of the bloody diarrhea decreased, and was completely resolved by the second week after admission. The ulcers also showed accelerated healing. The goal of therapy is directed towards the associated systemic disorder, if present

    Gamified Cyber-Crime Monitoring and Control Framework in a Computer Network Environment

    No full text
    Recent advancements in cybercrime are continually emerging, with the estimated damages to the global economy reaching the billion dollar mark. In the past, people acting alone or in small groups were the main perpetrators of cybercrime. Complex cybercriminal networks are now bringing people from all over the world together in real time to commit crimes on a never-before-seen scale. Game theory gives a formal vocabulary for the description and study of interacting situations in which a number of "entities," known as players, take actions that have an effect on one another. The field of cyber security could benefit from problem-solving techniques based on games theory to protect assets. In this article, we suggest a conceptual framework for a system for monitoring and controlling cybercrime

    Game-theoretical Approaches to Cyber-crime Monitoring

    No full text
    Our society's diploma of reliance on IT and our online world is developing daily. Cyberspace, the call given to the worldwide and dynamic domain, composed of the infrastructure of the statistics era consisting of the net networks and statistics and telecommunications structures has supplied extraordinary globalization that gives new opportunities, but additionally includes new challenges, risks, and threats. Knowledge of its threats, dealing with the risks, and constructing suitable prevention, defense, detection, evaluation, investigation, and recuperation is essential. Given the present-day assessment of the statistics safety and intrusion detection, there's without a doubt a want for a choice and manipulation framework to cope with problems like assault modeling, evaluation of detected threats, and choice of reaction actions. We look at the goals of designing a mathematical version for gamified cybercrime tracking in a community environment

    A Fine-Grained Data Access Control System in Wireless Sensor Network

    No full text
    The evolving realities of Wireless Sensor Network (WSN) deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE) to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed
    corecore