Search results for "bsc"

showing 10 items of 378 documents

Trattamento medico dell'ascesso peritonsillare

2012

Antibiotic treatmentPeritonsillar abscessSteroid treatment
researchProduct

Use of transoesophageal echocardiography in the diagnosis of abscess in infective endocarditis

1995

Transoesophageal echocardiography is invaluable clinically since it accurately images abscess cavities or aneurysms. It provides the information about the site and extension of abscesses which is needed by surgeons to time and define surgical intervention. Early diagnosis is advantageous, and abscesses should be expected in 5%-30% of patients with echocardiographically discernible vegetations. Since there is no 'abscess typical' organism, transoesophageal echocardiographic examination is helpful at the first indication of infective endocarditis, to identify high-risk patients. Involvement of the aortic valve, growth in the size of vegetations, and the presence of spontaneous echo contrast a…

Aortic valvemedicine.medical_specialtySpontaneous echo contrastbusiness.industryEndocarditis Bacterialmedicine.diseaseTransoesophageal echocardiographyAbscessSurgeryAneurysmmedicine.anatomical_structureBacterial endocarditisInfective endocarditismedicineHumansEndocarditisRadiologyCardiology and Cardiovascular MedicineAbscessbusinessEchocardiography TransesophagealEuropean Heart Journal
researchProduct

Temporal aspects of copper homeostasis and its crosstalk with hormones

2015

To cope with the dual nature of copper as being essential and toxic for cells, plants temporarily adapt the expression of copper homeostasis components to assure its delivery to cuproproteins while avoiding the interference of potential oxidative damage derived from both copper uptake and photosynthetic reactions during light hours. The circadian clock participates in the temporal organization of coordination of plant nutrition adapting metabolic responses to the daily oscillations. This timely control improves plant fitness and reproduction and holds biotechnological potential to drive increased crop yields. Hormonal pathways, including those of abscisic acid, gibberellins, ethylene, auxin…

Arabidopsis thalianaEstrès oxidatiuCircadian clockFisiologiahormone signallinghormone signalingMetal toxicityOryza sativaReviewPlant ScienceBiologyCircadian clocklcsh:Plant culturechemistry.chemical_compoundAuxinhormone biosynthesisoxidative stresslcsh:SB1-1110Abscisic acidchemistry.chemical_classificationGeneticsfood and beveragescopper homeostasiscopper transportersCell biologyOxidative stress.Crosstalk (biology)chemistryGibberellinHomeostasisHormoneFrontiers in Plant Science
researchProduct

Documenting carved stones from 3D models. Part II - Ambient occlusion to reveal carved parts.

2021

10 pages; International audience; Revealing carved parts in rock art is of primary importance and remains a major challenge for archaeological documentation. Computational geometry applied to 3D imaging provides a unique opportunity to document rock art. This study evaluates five algorithms and derivatives used to compute ambient occlusion and sky visibility on 3D models of Mongolian stelae, also known as deer stones. By contrast with the previous companion work, models are processed directly in 3D, without preliminary projection. Volumetric obscurance gives the best results for the identification of carved figures. The effects of model resolution and parameters specific to ambient occlusio…

Archeology[SHS.ARCHEO]Humanities and Social Sciences/Archaeology and PrehistoryComputer scienceMaterials Science (miscellaneous)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologyConservationDocumentation01 natural sciencesSoftwareComputer graphics (images)Rock artVolumetric obscuranceProjection (set theory)Deer stoneSpectroscopyComputingMethodologies_COMPUTERGRAPHICSbusiness.industry010401 analytical chemistryVisibility (geometry)Mongolia021001 nanoscience & nanotechnologyComputational geometry0104 chemical sciencesIdentification (information)ArchaeologyChemistry (miscellaneous)Late bronze ageAmbient occlusionRock art0210 nano-technologyScale (map)businessGeneral Economics Econometrics and Finance
researchProduct

Non-cooperative available bandwidth estimation towards ADSL links

2008

Existing tools for the estimation of the end- to-end available bandwidth require control of both end hosts of the path and this significantly limits their usability. In this paper we present ABwProbe, a single-ended tool for available bandwidth estimation against non-cooperative hosts. Although ABwProbe is general enough to be used on any Internet path, we focus our attention on ADSL links exploring the possibility of measuring the downlink available bandwidth of a non-cooperative ADSL host. We study the effect of cross-traffic on the uplink, finding that only large packets may deteriorate ABwProbe's measurements and we present two techniques to detect and filter the effect of uplink cross-…

Asymmetric digital subscriber lineDynamic bandwidth allocationbusiness.industryNetwork packetComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth throttlingBandwidth allocationDigital subscriber lineADSLTelecommunications linkSymmetric digital subscriber lineBandwidth (computing)businessComputer network
researchProduct

Capacity Estimation of ADSL links

2008

Most tools designed to estimate the capacity of an Internet path require access on both end hosts of the path, which makes them difficult to deploy and use. In this paper we present a single-sided technique for measuring the capacity without the active cooperation of the destination host, focusing particularly on ADSL links. Compared to current methods used on broadband hosts, our approach generates two orders of magnitude less traffic and is much less intrusive. Our tool, DSLprobe, exploits the typical characteristics of ADSL, namely its bandwidth asymmetry and the relatively low absolute bandwidth, in order to measure both downlink and uplink capacities and to mitigate the impact of cross…

Asymmetric digital subscriber lineSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFilter (video)ADSLBroadbandTelecommunications linkBandwidth (computing)The InternetbusinessHost (network)Computer network
researchProduct

Fast Available Bandwidth sampling for ADSL links: rethinking the estimation for larger-scale measurements

2009

Most existing tools for measuring the end-to-end available bandwidth require access to both end-hosts of the measured path, which severely restricts their usability. Few tools have been developed to overcome this limitation, but all of them focus on achieving high precision and are not suitable for large campaigns. In this paper we develop FAB-Probe , a tool aimed at characterizing the available bandwidth of a large number of paths, adapting it particularly for ADSL settings. FAB-Probe is an evolution of ABwProbe , a tool that estimates the available bandwidth in non-cooperative ADSL environments. Analyzing carefully the needs of such a characterization tool, we optimize and rethink ABwProb…

Asymmetric digital subscriber linebusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniScale (chemistry)Sampling (statistics)UsabilityProof of conceptADSLPath (graph theory)Bandwidth (computing)businessFocus (optics)Computer network
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Association between COX-2 rs 6681231 genotype and interleukin-6 in periodontal connective tissue. A pilot study.

2014

[Objectives] The aim of this pilot study was to investigate associations between IL-6 and COX-2 expression in gingival biopsies and both clinical diagnosis and genotypes in the IL-6 and COX-2 genes. [Design] A case-control study included 41 gingival biopsies obtained from Caucasian patients grouped according to clinical diagnosis of gingival health (n = 10), gingivitis (n = 15) or chronic periodontitis (n = 16). Immunohistochemistry analyses were performed to determine COX-2 expression in lamina propria, IL-6 expression in lamina propria and gingival epithelium and level of inflammatory cell infiltrate. Individual DNA was extracted and genotyped by real-time PCR for IL6 SNPs rs 2069827 and …

Bacterial DiseasesMaleBiopsyGingivaDentistryGene ExpressionPilot ProjectsEpitheliumMonocytesGingivitisGenotypehealth care economics and organizationsPlasma cellsMultidisciplinaryGingival AbscessesbiologyQRMiddle AgedGingivitishumanitiesmedicine.anatomical_structureInfectious DiseasesCOX-2 6681231 genotype interleukin-6 periodontitisCytokinesPeriodontal AbscessesMedicineFemalemedicine.symptomPeriodontal IndexConnective tissueImmunohistochemical AnalysisResearch ArticleAdultmedicine.medical_specialtyClinical Research DesignScienceOral MedicineConnective tissueHemorrhagePolymorphism Single NucleotideInternal medicinemedicineGeneticsHumansInterleukin 6PeriodontitisBiologyAgedPeriodontitisClinical GeneticsInflammationbusiness.industryInterleukin-6Case-control studymedicine.diseaseChronic periodontitisHaplotypesCyclooxygenase 2Immune SystemCase-Control StudiesChronic Periodontitisbiology.proteinGenetic PolymorphismImmunologic TechniquesClinical ImmunologybusinessPopulation GeneticsPLoS ONE
researchProduct

Spinal epidural abscess due to acute pyelonephritis

2022

Background: Spinal epidural abscesses are rare and are misdiagnosed in up to 75% of cases. Fever, back pain, and neurological deficits are part of the classical triad. Here, the authors report a patient with a L2–L5 spinal epidural abscess with the left paravertebral extension attributed to acute pyelonephritis. Case Description: A 54-year-old female presented with persistent low back pain and lower extremity weakness accompanied by paresthesias. Previously, she had been hospitalized with the left acute pyelonephritis. The lumbosacral MRI documented a T12/L5 anterior epidural abscess with ring enhancement on the contrast study; the maximum diameter of the abscess at the L2–L3 level contrib…

Batson's plexusPyelonephritisEpiduralPyogenic bacteriaSurgeryNeurology (clinical)Abscess
researchProduct