BACKGROUND: Recipient antidonor cytotoxic T-cell activity has been associated with graft loss and acute rejection in renal allograft recipients. The role of immunologic mechanisms in the development of chronic graft rejection is controversial. We analyzed all living related renal transplants performed at Children's Hospital (Boston, MA) from 1983 to 1995 to assess whether cell-mediated cytotoxicity, determined in vitro and measured before transplantation, was predictive of chronic rejection. METHODS: Eighty-three patients were studied retrospectively. Fifty-seven patients with one haplotype-matched renal transplants from living related donors were studied to determine the association between cell-mediated lympholysis (CML) level, acute rejection, chronic rejection, and graft failure. Acute rejection was defined by the decision to treat. Chronic rejection was defined by histology and/or the absolute serum creatinine value using an increasing serum creatinine level >1.0 mg/dl for children less than 3, a creatinine level >1.5 mg/dl for children between 3 and 10 years of age, and a creatinine level >2.0 mg/dl for children above 10 years of age. Return to dialysis or retransplantation was considered graft failure. RESULTS: Of the 57 haploidentical patients, there were 33 males and 24 females. The mean age at transplant was 11.1 years (SD=6.7). Twelve patients developed chronic rejection, 24 patients developed acute rejection, and 7 patients had graft failure. Pretransplant cytotoxic T lymphocyte activity was associated with chronic rejection (P=0.001) and graft failure (P=0.013) but only marginally with acute rejection (P=0.058). Controlling for age and sex, Cox's proportional hazards model revealed that CML level was predictive of time to chronic rejection (P<0.01) but not acute rejection (P=0.11). It was estimated that every 1-unit increase in CML level raises the monthly risk of chronic rejection by 7%. Ten children received HLA-identical kidneys from their siblings. There were no episodes of chronic rejection after 5 years. Two patients with high CML levels had episodes of acute rejection; both patients responded to treatment. CONCLUSION: Our data demonstrate an association between pretransplant cell-mediated cytotoxicity and the occurrence of chronic rejection in living related one-haploidentical renal transplants in pediatric patients. 相似文献
Twenty-two cases of ameloblastoma and ten cases of adenomatoid odontogenic tumour (AOT) were analyzed comparatively by the AgNOR technique. Ameloblastomas were distributed into three groups according to their clinical behaviour: primary lesions without recurrences (PLWTR), 5 cases; primary lesions with recurrences (PLWR), 4 cases; and recurrences, 13 cases. The cases were also regrouped according to their histological pattern: follicular (9 cases), plexiform (7 cases), acanthomatous (4 cases) and unicystic (2 cases). Considering histological patterns, there was a significant statistical difference only between follicular and plexiform types. There were no significant differences between the group of ameloblastomas and the group of AOTs or between the three groups of ameloblastomas with different clinical behaviour. Our results strongly suggest that the distinct clinical behaviour of ameloblastomas and AOT is not correlated with their cellular proliferation ratio. Thus, the infiltrative ability of the ameloblastomas is probably not related to the cellular proliferation index of these tumours. 相似文献
Analyzing videos and images captured by unmanned aerial vehicles or aerial drones is an emerging application attracting significant attention from researchers in various areas of computer vision. Currently, the major challenge is the development of autonomous operations to complete missions and replace human operators. In this paper, based on the type of analyzing videos and images captured by drones in computer vision, we have reviewed these applications by categorizing them into three groups. The first group is related to remote sensing with challenges such as camera calibration, image matching, and aerial triangulation. The second group is related to drone-autonomous navigation, in which computer vision methods are designed to explore challenges such as flight control, visual localization and mapping, and target tracking and obstacle detection. The third group is dedicated to using images and videos captured by drones in various applications, such as surveillance, agriculture and forestry, animal detection, disaster detection, and face recognition. Since most of the computer vision methods related to the three categories have been designed for real-world conditions, providing real conditions based on drones is impossible. We aim to explore papers that provide a database for these purposes. In the first two groups, some survey papers presented are current. However, the surveys have not been aimed at exploring any databases. This paper presents a complete review of databases in the first two groups and works that used the databases to apply their methods. Vision-based intelligent applications and their databases are explored in the third group, and we discuss open problems and avenues for future research.
A robust Fault Diagnosis (FD) scheme for a real quadrotor Unmanned Aerial Vehicle (UAV) is proposed in this paper. Firstly, a novel Adaptive Thau observer (ATO) is developed to estimate the quadrotor system states and build a set of offset residuals to indicate actuators’ faults. Based on these residuals, some rules of Fault Diagnosis (FD) are designed to detect and isolate the faults as well as estimate the fault offset parameters. Secondly, a synthetic robust optimization scheme is presented to improve Fault Estimation (FE) accuracies, three key issues include modeling uncertainties, and magnitude order unbalances as well as noises are addressed. Finally, a typical fault of rotors is simulated and injected into one of four rotors of the quadrotor, and experiments for the FD scheme have been carried out. Unlike former research works on the FD schemes for quadrotors, our proposed FD scheme based on the ATO can not only detect and isolate the failed actuators, but also estimate the fault severities. Regardless of roughness of the real flying data, the FD results still have sufficient FE accuracies. 相似文献
An incubator is an organization that supports new ventures to grow and survive during the early stages. Mainly dedicated to information technology, life science may appear to be the next hot spot for incubators. Are there stabilized good practices? Are the business models in information technology and in life science comparable when it goes to start-ups' incubation? Leveraging our experience as practitioner in this field and using an inductive methodology, this paper tends to propose simple principles to help build robust incubators in life science, and to contribute to disseminate an entrepreneurial approach through an industry still dominated by blue chips. 相似文献
International Journal of Information Security - The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and including many companies located in different... 相似文献
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan. 相似文献
We propose a new formulation of quantum algorithm which allows to distribute amplitudes over two copies of small quantum subsystems. The new method gives a fixed number of copies and applied to the control of multi-qubit system. The analysis for the amount of error due to the distribution process has been presented for a system of 10 qubits with a small quantum subsystems to be copied. The present scheme provides a new way to distribute amplitudes over small quantum subsystems. 相似文献
The main goal of this study is to apply a scientific quantitative approach to the investigation of contextual fit. This is
approached mathematically within the framework of cognitive science and research on categorization and prototypes. Two experiments
investigated two leading mathematical-cognitive approaches for explaining people’s judgment of contextual fit of a new building
with an architectural/urban context: prototype approach and feature frequency approach. The basic concept is that people represent
the built environment via architectural prototypes and/or frequencies of encountered architectural features. In the first
experiment, a group of twelve participants performed rank order tasks on artificially created architectural patterns, for
the purpose of psychological scaling. Perceptual distances among all patterns were mathematically determined. In the second
experiment, three groups of architectural patterns were constructed to represent assumed architectural contexts. The prototype
of each context was mathematically determined according to prototype cognitive model, and based on the distances calculated
in the first experiment. Fifty-six students participated in the main experiment, in which they rank ordered a group of fifteen
architectural patterns in terms of contextual fit to each of the three architectural contexts. Participants’ rank order data
of the fifteen patterns were regressed on both the perceptual distances from prototypes, and numbers of features shared with
each architectural context. Results indicated that both prototype and feature frequency approaches significantly accounted
for important portions of participants’ judgments. However, participants tended to prefer one approach to the other according
to context composition. Results have implications for both research on utilizing cognitive-mathematical models in architectural
research and on urban design guidelines and control. 相似文献