456 research outputs found

    Efficacy of consensus interferon in treatment of HbeAg-positive chronic hepatitis B: a multicentre, randomized controlled trial

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Consensus interferon (CIFN) is a newly developed type I interferon.</p> <p>Aims</p> <p>This multicentre, controlled trial was conducted to determine the efficacy of CIFN and to compare it with alpha-1b-interferon (IFN-α1b) in the treatment of patients with hepatitis B e antigen (HBeAg)-positive chronic hepatitis B.</p> <p>Methods</p> <p>144 Patients were randomly assigned to receive 9 μg CIFN (CIFN group) or 50 μg INF-α1b (IFN-alpha group) subcutaneously 3 times weekly for 24 weeks, followed by 24 weeks of observation. Efficacy was assessed by normalization of serum alanine transaminase (ALT) levels and the non-detectability of serum hepatitis B virus DNA or HBeAg at the end of treatment and 24 weeks after stopping treatment.</p> <p>Results</p> <p>There was no statistically significant difference in the serological, virological and biochemical parameters between CIFN and IFN-α1b groups at the end of the therapy and follow-up period (p > 0.05). Overall, at the end of treatment, 7.0% (5/71) and 35.2% (25/71) of patients in the CIFN group showed a complete or partial response compared with 7.4% (5/68) and 33.8% (23/68) of the IFN-alpha group (p = 0.10). At 24 weeks after stopping treatment, 6.9% (5/72) and 37.5% (27/72) of patients in the CIFN group showed complete response or partial response compared with 7.1% (5/70) and 34.3% (24/70) of the IFN-alpha group (p = 0.10).</p> <p>Conclusion</p> <p>These findings suggest that 9 μg CIFN is effective in the treatment of patients with HBeAg-positive chronic hepatitis B. It can gradually induce ALT normalization and HBV DNA clearance and HBeAg loss or HBeAg/HBeAb seroconversion.</p

    Demonstration of SDN-Based Heterogeneous Quantum Key Distribution Chain Orchestration over Optical Networks

    Full text link
    Heterogeneous quantum key distribution chain orchestration over optical networks is demonstrated with software-defined networking (SDN), achieving the control-layer interoperability for BB84 (Bennett-Brassard-1984) and TF (Twin-Field) based quantum key distribution devices

    Correlations between aesthetic preferences of river and landscape characters

    Get PDF
    Some landscape characters put great influences on the aesthetic preferences of a river. Finding out these characters will provide for river landscape design and management with explicit keystones. In this paper, 23 sample areas of rivers were selected in Xuzhou, China, and 15 landscape characters of rivers were identified. The photos taken at the sample areas were as stimuli, and undergraduate students were respondents. The results demonstrate that the aesthetic preferences of photos judged one-by-one and judged together receive similar results; the preference scores of deflective views are significantly higher than the ones of opposite views; for urban rivers, “river accessibility” and “number of colours” are reliably positive predictors to aesthetic preferences, “wood diversity index” and “plants on water” are negative ones; for rural rivers, “coverage of riparian vegetation”, “perspective” and “wood diversity index” are reliably positive predictors to aesthetic preferences. First published online:&nbsp;14 Dec 201

    Quantum Key Distribution (QKD) over Software-Defined Optical Networks

    Get PDF
    Optical network security is attracting increasing research interest. Currently, software-defined optical network (SDON) has been proposed to increase network intelligence (e.g., flexibility and programmability) which is gradually moving toward industrialization. However, a variety of new threats are emerging in SDONs. Data encryption is an effective way to secure communications in SDONs. However, classical key distribution methods based on the mathematical complexity will suffer from increasing computational power and attack algorithms in the near future. Noticeably, quantum key distribution (QKD) is now being considered as a secure mechanism to provision information-theoretically secure secret keys for data encryption, which is a potential technique to protect communications from security attacks in SDONs. This chapter introduces the basic principles and enabling technologies of QKD. Based on the QKD enabling technologies, an architecture of QKD over SDONs is presented. Resource allocation problem is elaborated in detail and is classified into wavelength allocation, time-slot allocation, and secret key allocation problems in QKD over SDONs. Some open issues and challenges such as survivability, cost optimization, and key on demand (KoD) for QKD over SDONs are discussed
    • …
    corecore