1,330 research outputs found

    Contraceptive use and sexual function: a comparison of Italian female medical students and women attending family planning services

    Get PDF
    Objectives: The aims of the study were to understand how education relates to contraceptive choice and how sexual function can vary in relation to the use of a contraceptive method. Methods: We surveyed female medical students and women attending a family planning service (FPS) in Italy. Participants completed an online questionnaire which asked for information on sociodemographics, lifestyle, sexuality and contraceptive use and also included items of the Female Sexual Function Index (FSFI). Results: The questionnaire was completed by 413 women (362 students and 51 women attending the FPS) between the ages of 18 and 30 years. FSFI scores revealed a lower risk of sexual dysfunction among women in the control group who did not use oral hormonal contraception. The differences in FSFI total scores between the two study groups, when subdivided by the primary contraceptive method used, was statistically significant (p < 0.005). Women using the vaginal ring had the lowest risk of sexual dysfunction, compared with all other women, and had a positive sexual function profile. In particular, the highest FSFI domain scores were lubrication, orgasm and satisfaction, also among the control group. Expensive contraception, such as long-acting reversible contraception, was not preferred by this young population, even though such methods are more contemporary and manageable. Compared with controls, students had lower compliance with contraception and a negative attitude towards voluntary termination of pregnancy. Conclusion: Despite their scientific knowledge, Italian female medical students were found to need sexual and contraceptive assistance. A woman's sexual function responds to her awareness of her body and varies in relation to how she is guided in her contraceptive choice. Contraceptive counselling is an excellent means to improve female sexuality

    A formal methodology to design and deploy dependable wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) are being increasingly adopted in critical applications, where verifying the correct operation of sensor nodes is a major concern. Undesired events may undermine the mission of the WSNs. Hence their effects need to be properly assessed before deployment to obtain a good level of expected performance and during the operation in order to avoid dangerous unexpected results. In this paper we propose amethodology that aims at assessing and improving the dependability level of WSNs by means of an event-based formal verification technique. The methodology includes a process to guide designers towards the realization of dependable WSN and a tool ("ADVISES") to simplify its adoption. The tool is applicable to homogeneous WSNs with static routing topologies. It allows to generate automatically formal specifications used to check correctness properties and evaluate dependability metrics at design time and at runtime for WSNs where an acceptable percentage of faults can be defined. During the runtime we can check the behavior of the WSN accordingly to the results obtained at design time and we can detect sudden and unexpected failures, in order to trigger recovery procedures. The effectiveness of the methodology is shown in the context of two case studies, as proof-of-concept, aiming to illustrate how the tool is helpful to drive design choices and to check the correctness properties of the WSN at runtime. Although the method scales up to very large WSNs, the applicability of the methodology maybe compromised by the state space explosion of the reasoning model, which must be faced partitioning large topologies into sub-topologies

    Static verification of wireless sensor networks with formal methods

    Get PDF
    Wireless Sensor Networks (WSNs) are widely recognized as a solution to build monitoring systems, even in critical environments. WSNs, however, are subjected to faults due to several causes (i.e. rain, EMF radiations, vibrations, etc..) and tools and methodologies for the design of dependable WSN-based systems are needed. Formal methods partially meet such needs by assessing the degree of correctness of design models and identifying potential system bottlenecks. The aim of this paper is to define a methodology for the static verification of WSN based systems using a formal language (Event Calculus). In particular we show how the formal specification can be used to verify the design of a WSN in terms of its dependability properties. To this aim, we define a set of correctness specifications that apply to a generic WSN, coupled with specific structural specifications describing the target network topology to evaluate. Finally, after having presented an automatic tool, designed to support the designer, we adopt this methodology to a case study

    The heuristic strategies for assessing wireless sensor network: an event-based formal approach

    Get PDF
    Wireless Sensor Networks (WSNs) are increasingly being adopted in critical applications. In these networks undesired events may undermine the reliability level; thus their effects need to be properly assessed from the early stages of the development process onwards to minimize the chances of unexpected problems during use. In this paper we propose two heuristic strategies: what-if analysis and robustness checking. They allow to drive designers towards optimal WSN deployment solutions, from the point of view of the connection and data delivery resiliency, exploiting a formal approach based on the event calculus formal language. The heuristics are backed up by a support tool aimed to simplify their adoption by system designers. The tool allows to specify the target WSN in a user-friendly way and it is able to elaborate the two heuristic strategies by means of the event calculus specifications automatically generated. The WSN reliability is assessed computing a set of specific metrics. The effectiveness of the strategies is shown in the context of three case studies

    Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities

    Full text link
    Critical Infrastructures (CIs), such as smart power grids, transport systems, and financial infrastructures, are more and more vulnerable to cyber threats, due to the adoption of commodity computing facilities. Despite the use of several monitoring tools, recent attacks have proven that current defensive mechanisms for CIs are not effective enough against most advanced threats. In this paper we explore the idea of a framework leveraging multiple data sources to improve protection capabilities of CIs. Challenges and opportunities are discussed along three main research directions: i) use of distinct and heterogeneous data sources, ii) monitoring with adaptive granularity, and iii) attack modeling and runtime combination of multiple data analysis techniques.Comment: EDCC-2014, BIG4CIP-201

    Identification and characterization of citrus concave gum-associated virus infecting citrus and apple trees by serological, molecular and high-throughput sequencing approaches

    Get PDF
    Citrus concave gum-associated virus (CCGaV) is a negative-stranded RNA virus, first reported a few years ago in citrus trees from Italy. It has been reported in apple trees in the USA and in Brazil, suggesting a wider host range and geographic distribution. Here, an anti-CCGaV polyclonal antiserum to specifically detect the virus has been developed and used in a standard double antibody sandwich enzyme-linked immunosorbent assay (DAS-ELISA) that has been validated as a sensitive and reliable method to detect this virus both in citrus and apple trees. In contrast, when the same antiserum was used in direct tissue-blot immunoassay, CCGaV was efficiently detected in citrus but not in apple. Using this antiserum, the first apple trees infected by CCGaV were identified in Italy and the presence of CCGaV in several apple cultivars in southern Italy was confirmed by field surveys. High-throughput sequencing (HTS) allowed for the assembling of the complete genome of one CCGaV Italian apple isolate (CE-c3). Phylogenetic analysis of Italian CCGaV isolates from apple and citrus and those available in the database showed close relationships between the isolates from the same genus (Citrus or Malus), regardless their geographical origin. This finding was further confirmed by the identification of amino acid signatures specific of isolates infecting citrus or apple hosts. Analysis of HTS reads also revealed that the CE-c3 Italian apple tree, besides CCGaV, was simultaneously infected by several viruses and one viroid, including apple rubbery wood virus 2 which is reported for the first time in Italy. The complete or almost complete genomic sequences of the coinfecting agents were determined

    Ultrasound delivery of Surface Enhanced InfraRed Absorption active gold-nanoprobes into fibroblast cells: a biological study via Synchrotron-based InfraRed microanalysis at single cell level

    Get PDF
    Ultrasound (US) induced transient membrane permeabilisation has emerged as a hugely promising tool for the delivery of exogenous vectors through the cytoplasmic membrane, paving the way to the design of novel anticancer strategies by targeting functional nanomaterials to specific biological sites. An essential step towards this end is the detailed recognition of suitably marked nanoparticles in sonoporated cells and the investigation of the potential related biological effects. By taking advantage of Synchrotron Radiation fourier transform infrared micro-spectroscopy (SR-microftiR) in providing highly sensitive analysis at the single cell level, we studied the internalisation of a nanoprobe within fibroblasts (NIH-3T3) promoted by low-intensity US. To this aim we employed 20 nm gold nanoparticles conjugated with the IR marker 4-aminothiophenol. The significant Surface Enhanced Infrared Absorption provided by the nanoprobes, with an absorbance increase up to two orders of magnitude, allowed us to efficiently recognise their inclusion within cells. Notably, the selective and stable SR- microftiR detection from single cells that have internalised the nanoprobe exhibited clear changes in both shape and intensity of the spectral profile, highlighting the occurrence of biological effects. Flow cytometry, immunofluorescence and murine cytokinesis-block micronucleus assays confirmed the presence of slight but significant cytotoxic and genotoxic events associated with the US-nanoprobe combined treatments. our results can provide novel hints towards US and nanomedicine combined strategies for cell spectral imaging as well as drug delivery-based therapies

    A combined Rayleigh-Raman lidar for measurements of tropospheric water vapour and aerosol profiles

    Get PDF
    The receiver of the Differential Absorption Lidar system of the University of L’Aquila (Italy) has been upgraded for the detection of Raman scattering from nitrogen and water vapour induced by XeCl and XeF excimer laser lines. In this configuration, only the XeF source is activated, so we can measure the tropospheric water vapour mixing ratio profiles with a height resolution of 300 m and 10 min in time. The lower limit sensitivity for the mixing ratio of water vapour is about 2 Q1024 and the precision ranges between 5% at 2 km and 50% at 9 km. The aerosol back-scattering ratio profiles can be measured with the same altitude and time resolution up to the lower stratosphere, the relative error is below 5% in the troposphere and about 30% at the highest altitudes. Comparisons with coincident PTU balloon-sondes show that the performances of the system in measuring the tropospheric water vapour are well calibrated for studying the water vapour evolution and cloud formation in the troposphere
    • …
    corecore