896 research outputs found

    Efficacy of first-line sodium thiosulphate administration in a case of potassium cyanide poisoning

    Get PDF
    Cyanide poisoning may occur following accidental fire-smoke inhalation or deliberate ingestion of salts. Hydroxocobalamin represents a first-line life-saving antidote. Although hydroxocobalamin represents a first-line lifesaving antidote, it is still not promptly available in the emergency department. Sodium thiosulfate can be administered in association with hydroxocobalamin whereas the delayed onset of clinical response makes sodium thiosulfate less suitable for emergency use. We describe a case of cyanide intoxication of a 43-year-old man who ingested an unknown amount of potassium cyanide, purchased via the Internet, in an attempted suicide. At admission to the emergency department, the patient presented GCS 3 with severe lactic acidosis. Orotracheal intubation, gastric lavage and oral activated charcoal were applied. Sodium thiosulfate was available in the emergency department and 10 grams were infused over a 30 minute period. Hydroxocobalamin was prescribed by the poison control centre and 5 grams were infused 2 hours after admission. Following sodium thiosulfate administration the patient was arousable and lactate concentration improved. No adverse effects were noted. Metabolic acidosis completely resolved 12 hours later. Cyanide concentration performed on blood samples collected at admission confirmed high cyanide blood levels (15 mg/L). This report highlights as the first-line administration of sodium thiosulfate, in rapid infusion, resulted effective and safe for cyanide poisoning. Our report suggests that sodium thiosulfate should be considered when hydroxocobalamin is not promptly available in an emergency settin

    SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies

    Get PDF
    Modern blockchains support the execution of application-level code in the form of smart contracts, allowing developers to devise complex Distributed Applications (DApps). Smart contracts are typically written in high-level languages, such as Solidity, and after deployment on the blockchain, their code is executed in a distributed way in response to transactions or calls from other smart contracts. As a common piece of software, smart contracts are susceptible to vulnerabilities, posing security threats to DApps and their users. The community has already made many different proposals involving taxonomies related to smart contract vulnerabilities. In this paper, we try to systematize such proposals, evaluating their common traits and main discrepancies. A major limitation emerging from our analysis is the lack of a proper formalization of such taxonomies, making hard their adoption within, e.g., tools and disfavoring their improvement over time as a community-driven effort. We thus introduce a novel data model that clearly defines the key entities and relationships relevant to smart contract vulnerabilities. We then show how our data model and its preliminary instantiation can effectively support several valuable use cases, such as interactive exploration of the taxonomy, integration with security frameworks for effective tool orchestration, and statistical analysis for performing longitudinal studies

    Inhibition of Multidrug-Resistant Gram-Positive and Gram-Negative Bacteria by a Photoactivated Porphyrin

    Get PDF
    The authors studied the in vitro antibacterial activity of the photo-activated porphyrin meso-tri(N-methyl-pyridyl), mono(N-tetradecyl-pyridyl)porphine (C14) against four multidrug-resistant bacteria: Staphylococcus aureus, Enterococcus faecalis (Gram-positive), Escherichia coli, Pseudomonas aeruginosa (Gram-negative). Using 10 g/ml of porphyrin and 60 sec irradiation we observed the remarkable susceptibility of S. aureus and E. faecalis to treatment while, under the same conditions, E. coli and P. aeruginosa showed very low susceptibility. In a later stage, suspensions of Gram-negative bacteria were processed with EDTA before photo-activation, obtaining a significant decrease in viable counts. In view of the results, if the combination of low porphyrin concentrations and short irradiation times will be effective in vivo also, this approach could be a possible alternative to antibiotics, in particular against localized infections due to multidrug-resistant microorganisms

    Improving Requirements Engineering within the European Space Industry

    Get PDF
    International audienceThe Next Generation Requirements Engineering (NextGenRE) (ESA/ESTEC Contract 4000101353/10/NL/SFe) project seeks to identify possibilities to improve the requirements engineering process within the European Space industry in connection with Model-based System Engineering (MBSE)

    Contrasting roles of SPARC-related granuloma in bacterial containment and in the induction of anti–Salmonella typhimurium immunity

    Get PDF
    The role of matricellular proteins in bacterial containment and in the induction of pathogen-specific adaptive immune responses is unknown. We studied the function of the matricellular protein secreted protein, acidic and rich in cysteine (SPARC/osteonectin) in the dissemination of locally injected Salmonella typhimurium and in the subsequent immune response. We show that SPARC was required for the development of organized acute inflammatory reactions with granuloma-like (GL) features and for the control of bacterial spreading to draining lymph nodes (DLNs). However, SPARC-related GL also inhibited dendritic cell (DC) migration to the DLNs and limited the development of adaptive immune response, thus conferring increased susceptibility to the pathogen. In SPARC-deficient mice, both DC migration and antigen-specific responses were restored against bacteria, leading to protective anti–S. typhimurium immunity. This highlights a new function of matricellular proteins in bacterial infection and suggests that initial containment of bacteria can have drawbacks

    Saildrone: Adaptively Sampling the Marine Environment

    Get PDF
    From 11 April to 11 June 2018 a new type of ocean observing platform, the Saildrone surface vehicle, collected data on a round-trip, 60-day cruise from San Francisco Bay, down the U.S. and Mexican coast to Guadalupe Island. The cruise track was selected to optimize the science team’s validation and science objectives. The validation objectives include establishing the accuracy of these new measurements. The scientific objectives include validation of satellite-derived fluxes, sea surface temperatures, and wind vectors and studies of upwelling dynamics, river plumes, air–sea interactions including frontal regions, and diurnal warming regions. On this deployment, the Saildrone carried 16 atmospheric and oceanographic sensors. Future planned cruises (with open data policies) are focused on improving our understanding of air–sea fluxes in the Arctic Ocean and around North Brazil Current rings

    Do You Trust Your Device? Open Challenges in IoT Security Analysis

    Get PDF
    Several critical contexts, such as healthcare, smart cities, drones, transportation, and agriculture, nowadays rely on IoT, or more in general embedded, devices that require comprehensive security analysis to ensure their integrity before deployment. Security concerns are often related to vulnerabilities that result from inadequate coding or undocumented features that may create significant privacy issues for users and companies. Current analysis methods, albeit dependent on complex tools, may lead to superficial assessments due to compatibility issues, while authoritative entities struggle with specifying feasible firmware analysis requests for manufacturers within operational contexts. This paper urges the scientific community to collaborate with stakeholders—manufacturers, vendors, security analysts, and experts—to forge a cooperative model that clarifies manufacturer contributions and aligns analysis demands with operational constraints. Aiming at a modular approach, this paper highlights the crucial need to refine security analysis, ensuring more precise requirements, balanced expectations, and stronger partnerships between vendors and analysts. To achieve this, we propose a threat model based on the feasible interactions of actors involved in the security evaluation of a device, with a particular emphasis on the responsibilities and necessities of all entities involved
    • …
    corecore