36 research outputs found

    Graft-vs-tumor effect in patients with advanced nasopharyngeal cancer treated with nonmyeloablative allogeneic PBSC transplantation

    Get PDF
    While nonmyeloablative peripheral blood stem cell transplantation (NST) has shown efficacy against several solid tumors, it is untested in nasopharyngeal cancer (NPC). In a phase II clinical trial, 21 patients with pretreated metastatic NPC underwent NST with sibling PBSC allografts, using CY conditioning, thymic irradiation and in vivo T-cell depletion with thymoglobulin. Stable lymphohematopoietic chimerism was achieved in most patients and prophylactic CYA was tapered at a median of day +30. Seven patients (33%) showed partial response and three (14%) achieved stable disease. Four patients were alive at 2 years and three showed prolonged disease control of 344, 525 and 550 days. With a median follow-up of 209 (4–1147) days, the median PFS was 100 days (95% confidence interval (CI), 66–128 days), and median OS was 209 days (95% CI, 128–236 days). Patients with chronic GVHD had better survival—median OS 426 days (95% CI, 194–NE days) vs 143 days (95% CI, 114–226 days) (P=0.010). Thus, NST may induce meaningful clinical responses in patients with advanced NPC

    2017 International Consensus on Cardiopulmonary Resuscitation and Emergency Cardiovascular Care Science With Treatment Recommendations Summary

    Get PDF
    The International Liaison Committee on Resuscitation has initiated a near-continuous review of cardiopulmonary resuscitation science that replaces the previous 5-year cyclic batch-and-queue approach process. This is the first of an annual series of International Consensus on Cardiopulmonary Resuscitation and Emergency Cardiovascular Care Science With Treatment Recommendations summary articles that will include the cardiopulmonary resuscitation science reviewed by the International Liaison Committee on Resuscitation in the previous year. The review this year includes 5 basic life support and 1 paediatric Consensuses on Cardiopulmonary Resuscitation and Emergency Cardiovascular Care Science With Treatment Recommendations. Each of these includes a summary of the science and its quality based on Grading of Recommendations, Assessment, Development, and Evaluation criteria and treatment recommendations. Insights into the deliberations of the International Liaison Committee on Resuscitation task force members are provided in Values and Preferences sections. Finally, the task force members have pri-oritised and listed the top 3 knowledge gaps for each population, intervention, comparator, and outcome question. (C) 2017 European Resuscitation Council and American Heart Association, Inc. Published by Elsevier B.V. All rights reserved.Peer reviewe

    2019 International Consensus on Cardiopulmonary Resuscitation and Emergency Cardiovascular Care Science With Treatment Recommendations

    Get PDF
    The International Liaison Committee on Resuscitation has initiated a continuous review of new, peer-reviewed, published cardiopulmonary resuscitation science. This is the third annual summary of the International Liaison Committee on Resuscitation International Consensus on Cardiopulmonary Resuscitation and Emergency Cardiovascular Care Science With Treatment Recommendations. It addresses the most recent published resuscitation evidence reviewed by International Liaison Committee on Resuscitation Task Force science experts. This summary addresses the role of cardiac arrest centers and dispatcher-assisted cardiopulmonary resuscitation, the role of extracorporeal cardiopulmonary resuscitation in adults and children, vasopressors in adults, advanced airway interventions in adults and children, targeted temperature management in children after cardiac arrest, initial oxygen concentration during resuscitation of newborns, and interventions for presyncope by first aid providers. Members from 6 International Liaison Committee on Resuscitation task forces have assessed, discussed, and debated the certainty of the evidence on the basis of the Grading of Recommendations, Assessment, Development, and Evaluation criteria, and their statements include consensus treatment recommendations. Insights into the deliberations of the task forces are provided in the Justification and Evidence to Decision Framework Highlights sections. The task forces also listed priority knowledge gaps for further research

    On the security of a robust watermarking scheme based on RDWT-SVD

    No full text
    Image watermarking schemes allow a cover image to be embedded with a watermark for diverse applications, such as copyright protection and covert communication. Recently, a hybrid image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition is proposed by Lagzian et al. This scheme demonstrates high robustness against common image processing attacks such as geometric attack, JPEG compression, Gaussian noise and histogram equalization. In this paper, we present a fundamental flaw in the scheme that leads to false-positive detection problem and hence, undermines the robustness and suitability of the scheme to be used as a proof of ownership application. Future Generation Information Technology Future Generation Information Technology Look Insid

    Comment on “Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition”

    No full text
    It is shown that the robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition proposed by Makbol and Khoo in this AEÜ journal has a fundamental flaw in its design that undermines the security of its scheme against the false-positive problem. More crucially, this result therefore invalidates the objective of the scheme that is to achieve ownership protection, so the scheme cannot be used. In more detail, an adversary is able to claim ownership of a watermarked image by extracting his watermark from the image, although his watermark has never been inserted into the image in the first place. We then verified the flaw through experimental results and thus, proved that the Makbol and Khoo scheme was not able to solve the false-positive problem as claimed and should not be used for proof of ownership applications. In discussing ways to mitigate the problem, we investigate an approach that would have worked quite efficiently if Discrete Wavelet Transform was used instead of Redundant Discrete Wavelet Transform

    Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001

    No full text
    We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be watermarked. In this paper, we show that the trusted third party who signs the image blindly could be falsely led by an attacker to sign an image that is entirely different from the original. Besides, another well-known attack based on the multiplicative property of the RSA also applies her

    On the security of a hybrid SVD-DCT watermarking method based on LPSNR

    No full text
    Watermarking schemes allow a cover image to be embedded with a watermark, for diverse applications including proof of ownership and covert communication. In this paper, we present attacks on watermarking scheme proposed by Huang and Guan. This scheme is hybrid singular value decomposition (SVD) based scheme in the sense that they employ both SVD and other techniques for watermark embedding and extraction. By attacks, we mean that we show how the designers’ security claim, related to proof of ownership application can be invalidated. Our results are the first known attacks on this hybrid SVD-based watermarking scheme. Advances in Image and Video Technology Advances in Image and Video Technology Look Inside Share Share this content on Facebook Share this content on Twitter Share this content on LinkedIn Other actions Export citations About this Book Reprints and Permission

    On an optimal robust digital image watermarking based on SVD using differential evolution algorithm

    No full text
    It is shown that the optimal robust digital image watermarking based on singular value decomposition using differential evolution algorithm proposed by Veysel Aslantas [Opt. Commun. 282(5):769-777 (2009)] has a serious fundamental flaw and should not be used for proof of ownership application. (C) 2011 Elsevier B.V. All rights reserve
    corecore