Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 34
Filtrar
Más filtros

Banco de datos
País/Región como asunto
Tipo del documento
Intervalo de año de publicación
1.
Network ; : 1-29, 2024 Mar 03.
Artículo en Inglés | MEDLINE | ID: mdl-38433470

RESUMEN

As the number of patients increases, physicians are dealing with more and more cases of degenerative spine pathologies on a daily basis. To reduce the workload of healthcare professionals, we propose a modified Swin-UNet network model. Firstly, the Swin Transformer Blocks are improved using a residual post-normalization and scaling cosine attention mechanism, which makes the training process of the model more stable and improves the accuracy. Secondly, we use the log-space continuous position biasing method instead of the bicubic interpolation position biasing method. This method solves the problem of performance loss caused by the large difference between the resolution of the pretraining image and the resolution of the spine image. Finally, we introduce a segmentation smooth module (SSM) at the decoder stage. The SSM effectively reduces redundancy, and enhances the segmentation edge processing to improve the model's segmentation accuracy. To validate the proposed method, we conducted experiments on a real dataset provided by hospitals. The average segmentation accuracy is no less than 95%. The experimental results demonstrate the superiority of the proposed method over the original model and other models of the same type in segmenting the spinous processes of the vertebrae and the posterior arch of the spine.

2.
J Oncol Pharm Pract ; 29(6): 1374-1380, 2023 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-36112905

RESUMEN

BACKGROUND: Painful paronychia and pseudopyogenic granuloma (PG) are common adverse drug reactions (ADRs) associated with the use of epidermal growth factor receptor tyrosine kinase inhibitors (EGFR-TKIs) to treat non-small cell lung cancer (NSCLC). Multiple local management approaches have been tested with unsatisfactory results. We have introduced an occlusion therapy technique through which available topical drugs for longer than 2 years. METHODS: Based on the cancer registry and case management system of our hospital, from July 2019 to July 2020, we retrospectively enrolled patients with NSCLC who were treated with EGFR-TKIs and received applications of 0.5% timolol ophthalmic solution (TIMOPTOL XE 0.5%®) combined with a neomycin/tyrothricin ointment (Biomycin®) using the occlusion method to treat paronychia or PG. RESULTS: A total of 22 patients were enrolled, with a mean age of 66.5 years, most of whom were women (72.7%). Periungual lesion-related pain was reported by all patients, and periungual bleeding and PG were reported in 14% (3/22) and 64% (14/22) of patients, respectively. After the occlusion therapy application of timolol ophthalmic solution combined with neomycin/tyrothricin ointment twice daily, the overall response rate was 83.3%, including complete response in 18% (4/22) of cases and partial response in 68% (15/22) of cases. CONCLUSION: We presented an occlusion method using available topical beta-blockers and antibiotic ointment for EGFR-TKI-induced paronychia and PG in Taiwan. The result is favorable. Further randomized control trial is urgent to validate our findings.


Asunto(s)
Hiperplasia Angiolinfoide con Eosinofilia , Carcinoma de Pulmón de Células no Pequeñas , Neoplasias Pulmonares , Paroniquia , Humanos , Femenino , Anciano , Masculino , Carcinoma de Pulmón de Células no Pequeñas/tratamiento farmacológico , Neoplasias Pulmonares/tratamiento farmacológico , Timolol/efectos adversos , Hiperplasia Angiolinfoide con Eosinofilia/inducido químicamente , Hiperplasia Angiolinfoide con Eosinofilia/tratamiento farmacológico , Estudios Retrospectivos , Antibacterianos/efectos adversos , Paroniquia/inducido químicamente , Paroniquia/tratamiento farmacológico , Pomadas/efectos adversos , Taiwán , Inhibidores de Proteínas Quinasas/efectos adversos , Neomicina/efectos adversos , Receptores ErbB , Tirotricina/efectos adversos , Soluciones Oftálmicas/efectos adversos , Mutación
3.
Sensors (Basel) ; 23(13)2023 Jul 04.
Artículo en Inglés | MEDLINE | ID: mdl-37447987

RESUMEN

Distributed Denial of Service (DDoS) attacks pose a significant threat to internet and cloud security. Our study utilizes a Poisson distribution model to efficiently detect DDoS attacks with a computational complexity of O(n). Unlike Machine Learning (ML)-based algorithms, our method only needs to set up one or more Poisson models for legitimate traffic based on the granularity of the time periods during preprocessing, thus eliminating the need for training time. We validate this approach with four virtual machines on the CDX 3.0 platform, each simulating different aspects of DDoS attacks for offensive, monitoring, and defense evaluation purposes. The study further analyzes seven diverse DDoS attack methods. When compared with existing methods, our approach demonstrates superior performance, highlighting its potential effectiveness in real-world DDoS attack detection.


Asunto(s)
Algoritmos , Internet , Aprendizaje Automático
4.
Sensors (Basel) ; 23(23)2023 Dec 02.
Artículo en Inglés | MEDLINE | ID: mdl-38067952

RESUMEN

Due to frequent traffic accidents around the world, people often take out car insurance to mitigate their losses and receive compensation in a traffic accident. However, in the existing car insurance claims process, there are problems such as insurance fraud, inability to effectively track and transmit insurance data, cumbersome insurance procedures, and high insurance data storage costs. Since the immutability and traceability features of blockchain technology can prevent data manipulation and trace past data, we have used the Elliptic Curve Digital Signature Algorithm (ECDSA) to sign and encrypt car insurance data, ensuring both data integrity and security. We propose a blockchain and IPFS-based anticounterfeiting and traceable car insurance claims system to improve the above problems. We incorporate the Interplanetary File System (IPFS) to reduce the cost of storing insurance data. This study also attempts to propose an arbitration mechanism in the event of a car insurance dispute.

5.
Sensors (Basel) ; 22(14)2022 Jul 10.
Artículo en Inglés | MEDLINE | ID: mdl-35890848

RESUMEN

Smart devices have become an essential part of the architectures such as the Internet of Things (IoT), Cyber-Physical Systems (CPSs), and Internet of Everything (IoE). In contrast, these architectures constitute a system to realize the concept of smart cities and, ultimately, a smart planet. The adoption of these smart devices expands to different cyber-physical systems in smart city architecture, i.e., smart houses, smart healthcare, smart transportation, smart grid, smart agriculture, etc. The edge of the network connects these smart devices (sensors, aggregators, and actuators) that can operate in the physical environment and collects the data, which is further used to make an informed decision through actuation. Here, the security of these devices is immensely important, specifically from an authentication standpoint, as in the case of unauthenticated/malicious assets, the whole infrastructure would be at stake. We provide an updated review of authentication mechanisms by categorizing centralized and distributed architectures. We discuss the security issues regarding the authentication of these IoT-enabled smart devices. We evaluate and analyze the study of the proposed literature schemes that pose authentication challenges in terms of computational costs, communication overheads, and models applied to attain robustness. Hence, lightweight solutions in managing, maintaining, processing, and storing authentication data of IoT-enabled assets are an urgent need. From an integration perspective, cloud computing has provided strong support. In contrast, decentralized ledger technology, i.e., blockchain, light-weight cryptosystems, and Artificial Intelligence (AI)-based solutions, are the areas with much more to explore. Finally, we discuss the future research challenges, which will eventually help address the ambiguities for improvement.


Asunto(s)
Cadena de Bloques , Internet de las Cosas , Inteligencia Artificial , Ciudades , Seguridad Computacional
6.
Sensors (Basel) ; 22(2)2022 Jan 11.
Artículo en Inglés | MEDLINE | ID: mdl-35062490

RESUMEN

Internet of Things (IoT) device security is one of the crucial topics in the field of information security. IoT devices are often protected securely through firmware update. Traditional update methods have their shortcomings, such as bandwidth limitation and being attackers' easy targets. Although many scholars proposed a variety of methods that are based on the blockchain technology to update the firmware, there are still demerits existing in their schemes, including large storage space and centralized stored firmware. In summary, this research proposes a highly secure and efficient protection mechanism that is based on the blockchain technology to improve the above disadvantages. Therefore, this study can reduce the need of storage space and improve system security. The proposed system has good performance in some events, including firmware integrity, security of IoT device connection, system security, and device anonymity. Furthermore, we confirm the high security and practical feasibility of the proposed system by comparing with the existing methods.

7.
Sensors (Basel) ; 22(3)2022 Jan 29.
Artículo en Inglés | MEDLINE | ID: mdl-35161818

RESUMEN

WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it's vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs' success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The lack of a clear and unified study in terms of signcryption solutions can offer a bird's eye view of WBANs. Based on the most recent signcryption papers, we analyzed WBAN's communication architecture, security requirements, and the primary problems in WBANs to meet the aforementioned objectives. This survey also includes the most up to date signcryption security techniques in WBANs environments. By identifying and comparing all available signcryption techniques in the WBANs sector, the study will aid the academic community in understanding security problems and causes. The goal of this survey is to provide a comparative review of the existing signcryption security solutions and to analyze the previously indicated solution given for WBANs. A multi-criteria decision-making approach is used for a comparative examination of the existing signcryption solutions. Furthermore, the survey also highlights some of the public research issues that researchers must face to develop the security features of WBANs.


Asunto(s)
Seguridad Computacional , Tecnología Inalámbrica , Algoritmos , Confidencialidad , Humanos
8.
Sensors (Basel) ; 22(12)2022 Jun 13.
Artículo en Inglés | MEDLINE | ID: mdl-35746256

RESUMEN

Wireless Underground Sensor Networks (WUSNs) have been showing prospective supervising application domains in the underground region of the earth through sensing, computation, and communication. This paper presents a novel Deep Learning (DL)-based Cooperative communication channel model for Wireless Underground Sensor Networks for accurate and reliable monitoring in hostile underground locations. Furthermore, the proposed communication model aims at the effective utilization of cluster-based Cooperative models through the relay nodes. However, by keeping the cost effectiveness, reliability, and user-friendliness of wireless underground sensor networks through inter-cluster Cooperative transmission between two cluster heads, the determination of the overall energy performance is also measured. The energy co-operative channel allocation routing (ECCAR), Energy Hierarchical Optimistic Routing (EHOR), Non-Cooperative, and Dynamic Energy Routing (DER) methods were used to figure out how well the proposed WUSN works. The Quality of Service (QoS) parameters such as transmission time, throughput, packet loss, and efficiency were used in order to evaluate the performance of the proposed WUSNs. From the simulation results, it is apparently seen that the proposed system demonstrates some superiority over other methods in terms of its better energy utilization of 89.71%, Packet Delivery ratio of 78.2%, Average Packet Delay of 82.3%, Average Network overhead of 77.4%, data packet throughput of 83.5% and an average system packet loss of 91%.


Asunto(s)
Redes de Comunicación de Computadores , Aprendizaje Profundo , Algoritmos , Comunicación , Estudios Prospectivos , Reproducibilidad de los Resultados , Tecnología Inalámbrica
9.
Sensors (Basel) ; 22(3)2022 Feb 02.
Artículo en Inglés | MEDLINE | ID: mdl-35161893

RESUMEN

Internet of Things (IoT) technology is now widely used in energy, healthcare, services, transportation, and other fields. With the increase in industrial equipment (e.g., smart mobile terminals, sensors, and other embedded devices) in the Internet of Things and the advent of Industry 4.0, there has been an explosion of data generated that is characterized by a high volume but small size. How to manage and protect sensitive private data in data sharing has become an urgent issue for enterprises. Traditional data sharing and storage relies on trusted third-party platforms or distributed cloud storage, but these approaches run the risk of single-node failure, and third parties and cloud storage providers can be vulnerable to attacks that can lead to data theft. To solve these problems, this paper proposes a Hyperledger Fabric blockchain-based secure data transfer scheme for enterprises in the Industrial Internet of Things (IIOT). We store raw data in the IIoT in the InterPlanetary File System (IPFS) network after encryption and store the Keyword-index table we designed in Hyperledger Fabric blockchain, and enterprises share the data by querying the Keyword-index table. We use Fabric's channel mechanism combined with our designed Chaincode to achieve privacy protection and efficient data transmission while using the Elliptic Curve Digital Signature Algorithm (ECDSA) to ensure data integrity. Finally, we performed security analysis and experiments on the proposed scheme, and the results show that overall the data transfer performance in the IPFS network is generally better than the traditional network, In the case of transferring 5 MB file size data, the transmission speed and latency of IPFS are 19.23 mb/s and 0.26 s, respectively, and the IPFS network is almost 4 times faster than the TCP/IP network while taking only a quarter of the time, which is more advantageous when transferring small files, such as data in the IIOT. In addition, our scheme outperforms the blockchain systems mainly used today in terms of both throughput, latency, and system overhead. The average throughput of our solution can reach 110 tps (transactions are executed per second), and the minimum throughput in experimental tests can reach 101 tps.

10.
Sensors (Basel) ; 22(24)2022 Dec 10.
Artículo en Inglés | MEDLINE | ID: mdl-36560039

RESUMEN

Everyone should be vaccinated, but the eligibility and safety of the vaccine are always overlooked by most people. The outbreak of COVID-19 has led many countries to intensify the development and production of the COVID-19 vaccine. and some countries have even required universal vaccination against this epidemic. However, such popularization of vaccination has also exposed various flaws in vaccine management that existed in the past, and vaccinators have become more concerned about the effectiveness of their vaccinations. In this paper, we propose a blockchain-based traceable vaccine management system. First, the system uses smart contracts to store the records generated during the whole process, from vaccine production to vaccination. Second, the proposed scheme uses the Edwards-curve digital signature algorithm (EdDSA) to guarantee the security and integrity of these data. Third, the system participants can access the corresponding data according to their authority to ensure the transparency of the whole system operation process. Finally, this paper will also conduct a security analysis of the whole system to ensure that the system can resist potential attacks by criminals.


Asunto(s)
COVID-19 , Vacunas , Humanos , Vacunas contra la COVID-19 , COVID-19/prevención & control , Vacunación , Algoritmos
11.
Sensors (Basel) ; 22(18)2022 Sep 07.
Artículo en Inglés | MEDLINE | ID: mdl-36146106

RESUMEN

As society advances, so does the total number of vehicles on the road, creating a massive consumer market for automobiles. According to statistics, a major portion of today's traffic difficulties are caused by accidents caused by subpar cars and auto parts. As a result, each country has, over time, enacted equivalent rules and regulations to prevent such tragedies. However, in the face of profit, some people are desperate enough to employ illegal parts and illegally modified cars, and auto fraud is rampant. As a result, we employ the blockchain of the symmetrical Blockchain's digital ledger and smart contract technology to build a decentralized supply chain system that can identify specific parts. In this study, we design and discuss the proposed system framework by user functions and the flow of parts based on blockchain, and we discuss communication protocols that use the symmetry and asymmetry cryptography, algorithms, properties, and security of the mechanism while providing related analysis and comparing the properties and costs of the system with other studies. Overall, the proposed method has the potential to successfully address the issue of automobile fraud.


Asunto(s)
Cadena de Bloques , Algoritmos , Humanos , Proyectos de Investigación
12.
Sensors (Basel) ; 22(23)2022 Dec 06.
Artículo en Inglés | MEDLINE | ID: mdl-36502237

RESUMEN

In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the controller from a designated environment via wireless communication technologies. The mobility, flexibility, reliability and energy efficiency of drones makes them more widely used in IoT environments such as commercial, military, entertainment applications, traffic surveillance and aerial photography. In a generalized IoD architecture, we have communications among the drones in a flying zone, among the drones and the control server, and also among the drones and authorized user. IoD still has many critical issues that need to be addressed, such as data access being carried out through a public channel and battery operated drones. To address these concerns in IoD communications, in this paper, an efficient authentication and secure communication scheme with privacy preservation is proposed and it only uses secure one-way hash function and bitwise XOR operations when control server, drone and user mutually authenticate each other. After the successful authentication, both IoD-based participants can agree on a common session key to secure the subsequent communication messages. The widely accepted ProVerif and BAN logic analysis have been used to assure that the proposed scheme is provably secure against existing well-known security attacks and ensures privacy. Finally, a comparative analysis is presented to demonstrate the proposed scheme preserves efficiency when compared to existing competitive schemes.


Asunto(s)
Seguridad Computacional , Privacidad , Humanos , Reproducibilidad de los Resultados , Tecnología Inalámbrica , Comunicación
13.
Sensors (Basel) ; 21(22)2021 Nov 22.
Artículo en Inglés | MEDLINE | ID: mdl-34833841

RESUMEN

With the popularity of the internet 5G network, the network constructions of hospitals have also rapidly developed. Operations management in the healthcare system is becoming paperless, for example, via a shared electronic medical record (EMR) system. A shared electronic medical record system plays an important role in reducing diagnosis costs and improving diagnostic accuracy. In the traditional electronic medical record system, centralized database storage is typically used. Once there is a problem with the data storage, it could cause data privacy disclosure and security risks. Blockchain is tamper-proof and data traceable. It can ensure the security and correctness of data. Proxy re-encryption technology can ensure the safe sharing and transmission of relatively sensitive data. Based on the above situation, we propose an electronic medical record system based on consortium blockchain and proxy re-encryption to solve the problem of EMR security sharing. Electronic equipment in this process is connected to the blockchain network, and the security of data access is ensured through the automatic execution of blockchain chaincodes; the attribute-based access control method ensures fine-grained access to the data and improves the system security. Compared with the existing electronic medical records based on cloud storage, the system not only realizes the sharing of electronic medical records, but it also has advantages in privacy protection, access control, data security, etc.


Asunto(s)
Cadena de Bloques , Nube Computacional , Seguridad Computacional , Registros Electrónicos de Salud , Tecnología
14.
Sensors (Basel) ; 17(12)2017 Dec 15.
Artículo en Inglés | MEDLINE | ID: mdl-29244776

RESUMEN

As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.


Asunto(s)
Internet , Redes de Comunicación de Computadores , Seguridad Computacional , Confidencialidad , Encuestas de Atención de la Salud
15.
Sensors (Basel) ; 17(7)2017 Jun 23.
Artículo en Inglés | MEDLINE | ID: mdl-28644381

RESUMEN

In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.


Asunto(s)
Telemedicina , Algoritmos , Comunicación , Seguridad Computacional , Confidencialidad , Humanos , Internet , Privacidad
16.
ScientificWorldJournal ; 2014: 139435, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-24883351

RESUMEN

The attractive huge prize causes people to adore lotteries. Due to the very small probability of winning prizes, the players can enhance their probability of winning by using the method of joint purchase. In spite of many lottery schemes having been proposed, most e-lottery schemes focus on the players' privacy or computation overhead rather than support a joint purchase protocol on the Internet. In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. The players can check the lottery integrity, and the winning numbers can be verified publicly.


Asunto(s)
Internet , Probabilidad , Juego de Azar/psicología , Humanos , Modelos Estadísticos , Motivación , Distribución Aleatoria , Recompensa
17.
J Med Syst ; 38(9): 112, 2014 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-25037716

RESUMEN

In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.


Asunto(s)
Seguridad Computacional , Almacenamiento y Recuperación de la Información , Internet , Registro Médico Coordinado , Algoritmos , Confidencialidad , Tecnología Inalámbrica
18.
J Med Syst ; 38(11): 143, 2014 Nov.
Artículo en Inglés | MEDLINE | ID: mdl-25315823

RESUMEN

With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.


Asunto(s)
Teléfono Celular , Seguridad Computacional/instrumentación , Confidencialidad , Registros Electrónicos de Salud/instrumentación , Internet , Microcomputadores , Algoritmos , Intercambio de Información en Salud , Humanos
19.
PLoS One ; 19(4): e0302234, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38625889

RESUMEN

It is challenging to detect arbitrary-shape text accurately and effectively in natural scenes. While many methods have been implemented for arbitrary-shape text detection, most cannot achieve real-time detection or meet practical needs. In this work, we propose a YOLOv6-based detector that can effectively implement arbitrary-shape text detection and achieve real-time detection. We include two additional branches in the neck part of the YOLOv6 network to adapt the network to text detection, and the output side uses the pixel aggregation (PA) algorithm to decouple the PA output to use it as the detection head of the model. Experiments on benchmark Total-Text, CTW1500, ICDAR2015, and MSRA-TD500 showed that the proposed method outperformed competing methods in terms of detection accuracy and running time. Specifically, our method achieved an F-measure of 84.1% at 291.8 FPS for 640 × 640 Total-Text images and an F-measure of 81.5% at 199.6 FPS for 896 × 896 ICDAR2015 incidental text images.


Asunto(s)
Algoritmos , Redes Neurales de la Computación
20.
Kaohsiung J Med Sci ; 40(5): 467-476, 2024 May.
Artículo en Inglés | MEDLINE | ID: mdl-38523603

RESUMEN

Combining epidermal growth factor receptor (EGFR) tyrosine kinase inhibitor (TKI) with an anti- vascular endothelial growth factor (VEGF) agent, bevacizumab or ramucirumab, is indicated for advanced lung adenocarcinoma harboring EGFR mutation. This study aimed to show the real-world data of combination therapy and compare the effectiveness between bevacizumab and ramucirumab in combination with an EGFR-TKI. This retrospective study enrolled 47 patients diagnosed of stage IV lung adenocarcinoma with exon 19 deletion or L858R point mutation, receiving a first-line EGFR-TKI with anti-VEGF agent, including 34 (72%) and 13 (28%) patients receiving bevacizumab and ramucirumab, respectively. The response rate was similar in both groups (p = 0.38). Patients receiving bevacizumab had similar progression free survival (PFS) as those receiving ramucirumab (median PFS: 21.9 vs. 24.2 months, p = 0.4871); similar finding was noted in overall survival (OS) (median OS: 33.5 months vs. not reached, p = 0.4618). Patients receiving ramucirumab experienced a significantly high-grade hypertension compared to those receiving bevacizumab (p = 0.0351). Multivariable Cox regression analysis found independent risk factors for worse PFS included poorer ECOG performance status, multiple (≥3) metastatic sites, brain metastasis, and pleural metastasis/effusion, while the type of anti-VEGF agent was not a risk factor. Pericardial metastasis/effusion was the only one independent risk factor for worse OS. In summary, ramucirumab may have similar effectiveness as bevacizumab in combination with an EGFR-TKI as first line therapy for advanced lung adenocarcinoma harboring susceptible EGFR mutation. Further large-scale registry-based cohort studies may be needed to validate our findings.


Asunto(s)
Anticuerpos Monoclonales Humanizados , Bevacizumab , Carcinoma de Pulmón de Células no Pequeñas , Receptores ErbB , Neoplasias Pulmonares , Mutación , Inhibidores de Proteínas Quinasas , Ramucirumab , Humanos , Masculino , Femenino , Receptores ErbB/genética , Receptores ErbB/antagonistas & inhibidores , Bevacizumab/uso terapéutico , Bevacizumab/administración & dosificación , Anticuerpos Monoclonales Humanizados/uso terapéutico , Persona de Mediana Edad , Anciano , Carcinoma de Pulmón de Células no Pequeñas/tratamiento farmacológico , Carcinoma de Pulmón de Células no Pequeñas/genética , Carcinoma de Pulmón de Células no Pequeñas/patología , Neoplasias Pulmonares/tratamiento farmacológico , Neoplasias Pulmonares/genética , Neoplasias Pulmonares/patología , Inhibidores de Proteínas Quinasas/uso terapéutico , Protocolos de Quimioterapia Combinada Antineoplásica/uso terapéutico , Resultado del Tratamiento , Adulto , Estudios Retrospectivos , Anciano de 80 o más Años , Estadificación de Neoplasias , Adenocarcinoma del Pulmón/tratamiento farmacológico , Adenocarcinoma del Pulmón/genética , Adenocarcinoma del Pulmón/patología
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA