34 research outputs found

    radiofrequency echographic multi spectrometry for the prediction of incident fragility fractures a 5 year follow up study

    Get PDF
    Abstract Purpose To investigate the effectiveness of the T-score values provided by Radiofrequency Echographic Multi Spectrometry (REMS) in the identification of patients at risk for incident osteoporotic fractures. Methods A population of Caucasian women (30–90 years), enrolled from 2013 to 2016, underwent dual X-ray absorptiometry (DXA) and REMS scans at axial sites. The incidence of fragility fractures was assessed during a follow-up period up to 5 years. Afterwards, patients with and without incident fractures were stratified in two age-matched groups with a 1: 2 proportion (Group F' and Group NF', respectively). The performance of REMS T-score in discriminating between the two groups was quantitatively assessed and compared with DXA. Results 1516 patients were enrolled and 1370 completed the follow-up (mean ± SD: 3.7 ± 0.8 years; range: 1.9–5.0 years). Fracture incidence was 14.0%. Age-matched groups included 175 fractured patients and 350 non-fractured ones, respectively (median age 70.2 [interquartile range: 61.0–73.3] and 67.3 [65.4–69.8] years, p-value ns). The groups resulted also balanced for height, weight and BMI (p-values ns). As expected, the differences in REMS T-score (for vertebral site, −2.9 [−3.6 to −1.9] in Group F', −2.2 [−2.9 to −1.2] in Group NF') and DXA T-score (−2.8 [−3.3 to −1.9] in Group F', −2.2 [−2.9 to −1.4] in Group NF') were statistically significant (p-value Conclusions REMS T-score resulted an effective predictor for the risk of incident fragility fractures in a population-based sample of female subjects, representing a promising parameter to enhance osteoporosis diagnosis in the clinical routine

    SerpinB3 and Yap Interplay Increases Myc Oncogenic Activity

    Get PDF
    SerpinB3 has been recently described as an early marker of liver carcinogenesis, but the potential mechanistic role of this serpin in tumor development is still poorly understood. Overexpression of Myc often correlates with more aggressive tumour forms, supporting its involvement in carcinogenesis. Yes-associated protein (Yap), the main effector of the Hippo pathway, is a central regulator of proliferation and it has been found up-regulated in hepatocellular carcinomas. The study has been designed to investigate and characterize the interplay and functional modulation of Myc by SerpinB3 in liver cancer. Results from this study indicate that Myc was up-regulated by SerpinB3 through calpain and Hippo-dependent molecular mechanisms in transgenic mice and hepatoma cells overexpressing human SerpinB3, and also in human hepatocellular carcinomas. Human recombinant SerpinB3 was capable to inhibit the activity of Calpain in vitro, likely reducing its ability to cleave Myc in its non oncogenic Myc-nick cytoplasmic form. SerpinB3 indirectly increased the transcription of Myc through the induction of Yap pathway. These findings provide for the first time evidence that SerpinB3 can improve the production of Myc through direct and indirect mechanisms that include the inhibition of generation of its cytoplasmic form and the activation of Yap pathway

    GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities

    Get PDF
    As shown in previous work, malware authors often reuse portions of code in the development of their samples. Especially in the mobile scenario, there exists a phenomena, called piggybacking, that describes the act of embedding malicious code inside benign apps. In this paper, we leverage such observations to analyze mobile malware by looking at its similarities. In practice, we propose a novel approach that identifies and extracts code similarities in mobile apps. Our approach is based on static analysis and works by computing the Control Flow Graph of each method and encoding it in a feature vector used to measure similarities. We implemented our approach in a tool, GroupDroid, able to group mobile apps together according to their code similarities. Armed with GroupDroid, we then analyzed modern mobile malware samples. Our experiments show that GroupDroid is able to correctly and accurately distinguish different malware variants, and to provide useful and detailed information about the similar portions of malicious code

    An Experimental Security Analysis of an Industrial Robot Controller

    Get PDF
    Industrial robots, automated manufacturing, and efficient logistics processes are at the heart of the upcoming fourth industrial revolution. While there are seminal studies on the vulnerabilities of cyber-physical systems in the industry, as of today there has been no systematic analysis of the security of industrial robot controllers. We examine the standard architecture of an industrial robot and analyze a concrete deployment from a systems security standpoint. Then, we propose an attacker model and confront it with the minimal set of requirements that industrial robots should honor: precision in sensing the environment, correctness in execution of control logic, and safety for human operators. Following an experimental and practical approach, we then show how our modeled attacker can subvert such requirements through the exploitation of software vulnerabilities, leading to severe consequences that are unique to the robotics domain. We conclude by discussing safety standards and security challenges in industrial robotics

    Reinforcing and neurochemical effects of cannabinoid CB1 receptor agonists, but not cocaine, are altered by an adenosine A2A receptor antagonist

    Get PDF
    Several recent studies suggest functional and molecular interactions between striatal adenosine A2A and cannabinoid CB1 receptors. Here, we demonstrate that A2A receptors selectively modulate reinforcing effects of cannabinoids. We studied effects of A2A receptor blockade on the reinforcing effects of delta‐9‐tetrahydrocannabinol (THC) and the endogenous CB1 receptor ligand anandamide under a fixed‐ratio schedule of intravenous drug injection in squirrel monkeys. A low dose of the selective adenosine A2A receptor antagonist MSX‐3 (1 mg/kg) caused downward shifts of THC and anandamide dose‐response curves. In contrast, a higher dose of MSX‐3 (3 mg/kg) shifted THC and anandamide dose‐response curves to the left. MSX‐3 did not modify cocaine or food pellet self‐administration. Also, MSX‐3 neither promoted reinstatement of extinguished drug‐seeking behavior nor altered reinstatement of drug‐seeking behavior by non‐contingent priming injections of THC. Finally, using in vivo microdialysis in freely‐moving rats, a behaviorally active dose of MSX‐3 significantly counteracted THC‐induced, but not cocaine‐induced, increases in extracellular dopamine levels in the nucleus accumbens shell. The significant and selective results obtained with the lower dose of MSX‐3 suggest that adenosine A2A antagonists acting preferentially at presynaptic A2A receptors might selectively reduce reinforcing effects of cannabinoids that lead to their abuse. However, the appearance of potentiating rather than suppressing effects on cannabinoid reinforcement at the higher dose of MSX‐3 would likely preclude the use of such a compound as a medication for cannabis abuse. Adenosine A2A antagonists with more selectivity for presynaptic versus postsynaptic receptors could be potential medications for treatment of cannabis abuse

    Facies created by the yellow coral Dendrophyllia cornigera (Lamarck, 1816): Origin, substrate preferences and habitat complexity

    Get PDF
    The yellow coral Dendrophyllia cornigera (Lamarck, 1816) is a NE Atlantic-Mediterranean scleractinian. It is considered a typical hard bottom species, generally reported on outcropping rocks from mesophotic to upper bathyal depths. Several evidences suggest that this species is able to tolerate a broad range of temperatures, which allows it to colonize numerous environments in a wide depth range. In the present study, we first provided a detailed ecological characterization of the D. cornigera dense aggregation thriving on the Mantice Shoal (NW Ligurian Sea, Mediterranean Sea). Information on substrate type and inclination, average extension and density, colonies size-class frequency distribution and associated fauna are reported. Then, we presented an extensive review of the available information on the ecology of this species, including 142 new ROV records from the Italian coast (40–1820 m). Results indicated that D. cornigera occurs on a wide range of substrates, including soft bottoms and hardgrounds (outcropping rocks, coralligenous rock and dead cold-water coral frameworks), with significant differences in colony density and size among different substrates. Dendrophyllia cornigera creates three main facies, each characterized by a specific combination of substrate, inclination, depth, and associated fauna. Scattered living colonies, as well as large thanatocoenoses, display a wide geographical and bathymetric distribution. Differently, the facies represented by dense meadows on horizontal soft-bottoms results rare, being reported only from the Mantice Shoal and the Amendolara Bank (Ionian Sea). The radiocarbon age of the thanatocoenoses varies between 400 (Corsica Channel) and 13000 (Vercelli Seamount) years before present. This study highlights the wide adaptability of D. cornigera in terms of environmental settings, changing the current view on the ecology of this species and providing essential insights for the implementation of international deep-sea habitat classification schemes and conservation measures

    The Efficacy of Sodium Channel Blockers to Prevent Phencyclidine-Induced Cognitive Dysfunction in the Rat: Potential for Novel Treatments for Schizophrenia □ S

    Get PDF
    ABSTRACT Sodium channel inhibition is a well precedented mechanism used to treat epilepsy and other hyperexcitability disorders. The established sodium channel blocker and broad-spectrum anticonvulsant lamotrigine is also effective in the treatment of bipolar disorder and has been evaluated in patients with schizophrenia. Double-blind placebo-controlled clinical trials found that the drug has potential to reduce cognitive symptoms of the disorder. However, because of compound-related side-effects and the need for dose titration, a conclusive evaluation of the drug's efficacy in patients with schizophrenia has not been possible. In this series of studies in the rat, we compared the efficacy of the two new molecules to prevent a cognitive deficit induced by the N-methyl-D-aspartic acid receptor antagonist phencyclidine (PCP) in the reversal-learning paradigm in the rat. We also explored the effects of the drugs to prevent brain activation and neurochemical effects of PCP. We found that, like lamotrigine, both GSK2 and GSK3 were able to prevent the deficit in reversal learning produced by PCP, thus confirming their potential in the treatment of cognitive symptoms of schizophrenia. However, higher doses than those required for anticonvulsant efficacy of the drugs were needed for activity in the reversal-learning model, suggesting a lower therapeutic window relative to mechanism-dependent central side effects for this indication

    Tarnhelm: Isolated, transparent and confidential execution of arbitrary code in ARM’s TrustZone

    No full text

    Security of controlled manufacturing systems in the connected factory: the case of industrial robots

    Get PDF
    In modern factories, “controlled” manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study—indeed, robots are the most representative instance of a complex automatically controlled industrial device. Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines; then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers
    corecore