132 research outputs found

    Migration Intravésicale du Dispositif Intra-Utérin à Propos de Cinq Cas

    Get PDF
    La migration intravésicale du dispositif intra-utérin (DIU) par perforation utérine est une complication rare. Dans cette étude rétrospective monocentrique, nous présentons notre expérience de 5 cas colligés au sein de notre établissement entre 2004 et 2009. L’âge moyen de nos patientes est de 39 ans (32-48 ans). La symptomatologie clinique révélatrice était dominée par le syndrome irritatif vésical. Le diagnostic a été évoqué sur le couple écho/AUSP, puis confirmé par la cystoscopie. Le traitement a consisté en une lithotritie balistique du calcul avec extraction du stérilet par voie endoscopique chez 4 patientes et extraction chirurgicale chez une seule.Mots clés : Calcul vésical, dispositif intra-utérin, lithotritie balistique, migration

    Renal oncocytoma: experience of Clinical Urology A, Urology Department, CHU Ibn Sina, Rabat, Morocco and literature review

    Get PDF
    Renal oncocytoma is a rare and benign renal tumor. Only few cases have been reported in Moroccan populations. In the present study, we reportour experiences in the diagnosis, management and follow-up of this disease. We report on six cases of renal oncocytoma indentified between 1990 and 2008 in the urology department of “CHU Ibn Sina” in Rabat. These six cases are listed among 130 kidney tumors reported during the study period. We assess the clinical, radiological and therapeutic features of the patients and we review literature. Six cases of renal oncocytoma,representing 4.6% of all primitive kidney tumors treated in our institution during the study period. The mean age was 53 ±9.7 years (range 34 to61 years). One patient was asymptomatic at presentation, five patients (83%) had flank pain and two (33%) had macroscopic hematuria. Thetumor was right sided in 4 cases (66%) and left sided in 2 cases (33%). All patients underwent CT scan which showed, in three cases, a centrallylocated stellate area of low attenuation. The clinical suspicion of  oncocytoma was made preoperatively in only 3 patients by imaging studies, but the suspicion of renal cell carcinoma persist and all patients were treated with radical nephrectomy. Definitive diagnosis was made in all cases postoperatively. All the tumors were well circumscribed but unencapsulated. The mean tumor size was 8,75±2,04 cm. Four patients were classified at stage pT2 and two at stage p T1. Most of the pathological features in our patients were typical of this entity.  Predominant cell type was a typical oncocytoma with general low mitotic activity. No extension to peri-nephric fat tissue or lymphovascular invasion was observed. After a mean follow-up of 36 months (range 26-62 months), there was neither recurrence nor death from oncocytoma. Accordingly, the disease-specific survival was 100%. Renal oncocytoma has a benign clinical course with excellent long-term outcomes. In our series, it happened mostly in females and is more frequently symptomatic. Although radical nephrectomy is the usual treatment, a conservative approach should be considered whenever there are signs of clinical and radiological presumptions.Key words: Renal oncocytoma, tumor, diagnosis, treatmen

    Séminome Spermatocytaire: à Propos d’un Cas et Revue de La Littérature Spermatocytic Seminoma

    Get PDF
    Le séminome spermatocytaire est une tumeur rare, représentant moins de 2% des cancers du testicule, survenant essentiellement chez le sujet âgé. Nous rapportons une nouvelle observation d’un patient âgé de 48 ans. La tumeur se présentait comme une prolifération de cellules en nappescompactes, avec 3 types cellulaires, des cellules de petite taille, des cellules intermédiaires et des grandes cellules. Il n’a été retrouvé ni contingent sarcomateux, ni séminome classique. L’analyse en immun histochimie n’a retrouvé aucune expression des cellules tumorales pour les anticorpsclassiques testés, notamment l’Ac anti PLAP et les marqueurs lymphoïdes. Le séminome spermatocytaire doit être reconnu, car son évolution est très favorable et ne nécessite qu’une simple orchidectomie, en l’absence d’un exceptionnel contingent sarcomateux ou de métastase où une chimiothérapie s’impose

    Profiling a decade of information systems frontiers’ research

    Get PDF
    This article analyses the first ten years of research published in the Information Systems Frontiers (ISF) from 1999 to 2008. The analysis of the published material includes examining variables such as most productive authors, citation analysis, universities associated with the most publications, geographic diversity, authors’ backgrounds and research methods. The keyword analysis suggests that ISF research has evolved from establishing concepts and domain of information systems (IS), technology and management to contemporary issues such as outsourcing, web services and security. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of ISF. The analysis has also identified authors published in other journals whose work largely shaped and guided the researchers published in ISF. This research has implications for researchers, journal editors, and research institutions

    Chimerism in Wild Adult Populations of the Broadcast Spawning Coral Acropora millepora on the Great Barrier Reef

    Get PDF
    Chimeras are organisms containing tissues or cells of two or more genetically distinct individuals, and are known to exist in at least nine phyla of protists, plants, and animals. Although widespread and common in marine invertebrates, the extent of chimerism in wild populations of reef corals is unknown.The extent of chimerism was explored within two populations of a common coral, Acropora millepora, on the Great Barrier Reef, Australia, by using up to 12 polymorphic DNA microsatellite loci. At least 2% and 5% of Magnetic Island and Pelorus Island populations of A. millepora, respectively, were found to be chimeras (3% overall), based on conservative estimates. A slightly less conservative estimate indicated that 5% of colonies in each population were chimeras. These values are likely to be vast underestimates of the true extent of chimerism, as our sampling protocol was restricted to a maximum of eight branches per colony, while most colonies consist of hundreds of branches. Genotypes within chimeric corals showed high relatedness, indicating that genetic similarity is a prerequisite for long-term acceptance of non-self genotypes within coral colonies.While some brooding corals have been shown to form genetic chimeras in their early life history stages under experimental conditions, this study provides the first genetic evidence of the occurrence of coral chimeras in the wild and of chimerism in a broadcast spawning species. We hypothesize that chimerism is more widespread in corals than previously thought, and suggest that this has important implications for their resilience, potentially enhancing their capacity to compete for space and respond to stressors such as pathogen infection

    MoniPoly---An Expressive qq-SDH-Based Anonymous Attribute-Based Credential System

    Get PDF
    Modern attribute-based anonymous credential (ABC) systems benefit from special encodings that yield expressive and highly efficient show proofs on logical statements. The technique was first proposed by Camenisch and GroĂź, who constructed an SRSA-based ABC system with prime-encoded attributes that offers efficient AND, OR and NOT proofs. While other ABC frameworks have adopted constructions in the same vein, the Camenisch-GroĂź ABC has been the most expressive and asymptotically most efficient proof system to date, even if it was constrained by the requirement of a trusted message-space setup and an inherent restriction to finite-set attributes encoded as primes. In this paper, combining a new set commitment scheme and a SDH-based signature scheme, we present a provably secure ABC system that supports show proofs for complex statements. This construction is not only more expressive than existing approaches, it is also highly efficient under unrestricted attribute space due to its ECC protocols only requiring a constant number of bilinear pairings by the verifier; none by the prover. Furthermore, we introduce strong security models for impersonation and unlinkability under adaptive active and concurrent attacks to allow for the expressiveness of our ABC as well as for a systematic comparison to existing schemes. Given this foundation, we are the first to comprehensively formally prove the security of an ABC with expressive show proofs. Specifically, we prove the security against impersonation under the qq-(co-)SDH assumption with a tight reduction. Besides the set commitment scheme, which may be of independent interest, our security models can serve as a foundation for the design of future ABC systems
    • …
    corecore