Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 13 de 13
Filtrar
Mais filtros











Base de dados
Intervalo de ano de publicação
1.
J Pers Med ; 13(7)2023 Jun 28.
Artigo em Inglês | MEDLINE | ID: mdl-37511671

RESUMO

BACKGROUND: Port-wine stains (PWS) are congenital low-flow vascular malformations of the skin. PWS tend to become thicker and darker with time. Laser therapy is the gold standard and the first-line therapy for treating PWS. However, some resistant PWS, or PWS that have tissue hypertrophy, do not respond to this therapy. Our aim is to evaluate the role of surgery in the treatment of PWS birthmarks. METHODS: A literature search was performed in PubMed, Scopus, Web of Science (WOS) and Google Scholar for all papers dealing with surgery for port-wine stains, from January 2010 to December 2020 using the search strings: (capillary vascular malformation OR port-wine stains OR Sturge Weber Syndrome OR sws OR pws) AND (surgical OR surgery). RESULTS: Ten articles were identified and used for analysis. They were almost all case series with a short follow up period and lacked an objective-systematic score of evaluation. CONCLUSIONS: Delay in treatment of port wine stains may result in soft tissue and bone hypertrophy or nodules with disfiguring or destructive characteristics. The correction of PWS-related facial asymmetry often requires bone surgery followed by soft tissue corrections to achieve a more harmonious, predictable result.

2.
J Pers Med ; 13(5)2023 May 21.
Artigo em Inglês | MEDLINE | ID: mdl-37241037

RESUMO

The effect of multiple general anesthesia (mGA) procedures administered in early life is a critical theme and has led the Food and Drug Administration (FDA) to issue an alert. This systematic review seeks to explore the potential effects on neurodevelopment of mGA on patients under 4 years. The Medline, Embase and Web of Science databases were searched for publications up to 31 March 2021. The databases were searched for publications regarding "children multiple general anesthesia OR pediatric multiple general anesthesia". Case reports, animal studies and expert opinions were excluded. Systematic reviews were not included, but they were screened to identify any possible additional information. A total of 3156 studies were identified. After removing the duplicates, screening the remaining records and analyzing the systematic reviews' bibliography, 10 studies were considered suitable for inclusion. Comprehensively, a total cohort of 264.759 unexposed children and 11.027 exposed children were assessed for neurodevelopmental outcomes. Only one paper did not find any statistically significant difference between exposed and unexposed children in terms of neurodevelopmental alterations. Controlled studies on mGA administered before 4 years of age support that there might be a greater risk of neurodevelopmental delay in children receiving mGA, warranting the need for careful risk/benefit considerations.

4.
Risk Anal ; 40(10): 1900-1912, 2020 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-32654208

RESUMO

For some critical applications, successfully accomplishing the mission or surviving the system through aborting the mission and performing a rescue procedure in the event of certain deterioration condition being satisfied are both pivotal. This has motivated considerable studies on mission abort policies (MAPs) to mitigate the risk of system loss in the past several years, especially for standby systems that use one or multiple standby sparing components to continue the mission when the online component fails, improving the mission success probability. The existing MAPs are mainly based on the number of failed online components ignoring the status of the standby components. This article makes contributions by modeling standby systems subject to MAPs that depend not only on the number of failed online components but also on the number of available standby components remaining. Further, dynamic MAPs considering another additional factor, the time elapsed from the mission beginning in the event of the mission abort decision making, are investigated. The solution methodology encompasses an event-transition based numerical algorithm for evaluating the mission success probability and system survival probability of standby systems subject to the considered MAPs. Examples are provided to demonstrate the benefit of considering the state of standby components and elapsed operation time in obtaining more flexible MAPs.

5.
Risk Anal ; 39(12): 2732-2743, 2019 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-31287588

RESUMO

Many real-world systems use mission aborts to enhance their survivability. Specifically, a mission can be aborted when a certain malfunction condition is met and a risk of a system loss in the case of a mission continuation becomes too high. Usually, the rescue or recovery procedure is initiated upon the mission abort. Previous works have discussed a setting when only one attempt to complete a mission is allowed and this attempt can be aborted. However, missions with a possibility of multiple attempts can occur in different real-world settings when accomplishing a mission is really important and the cost-related and the time-wise restrictions for this are not very severe. The probabilistic model for the multiattempt case is suggested and the tradeoff between the overall mission success probability (MSP) and a system loss probability is discussed. The corresponding optimization problems are formulated. For the considered illustrative example, a detailed sensitivity analysis is performed that shows specifically that even when the system's survival is not so important, mission aborting can be used to maximize the multiattempt MSP.

6.
Ophthalmology ; 126(5): 759-763, 2019 05.
Artigo em Inglês | MEDLINE | ID: mdl-30537484

RESUMO

PURPOSE: GNAQ mutations have been identified in port wine stains (both syndromic and nonsyndromic) and melanocytic ocular neoplasms. This study investigates the presence of GNAQ mutations in diffuse (those associated with Sturge-Weber syndrome [SWS]) and solitary choroidal hemangiomas. PARTICIPANTS: Tissue from 11 patients with the following diagnoses: port wine stain (n = 3), diffuse choroidal hemangioma (n = 1), solitary choroidal hemangioma (n = 6), and choroidal nevus (n = 1). METHODS: Ten specimens were interrogated with Memorial Sloan Kettering-Integrated Mutation Profiling of Actionable Cancer Targets, a hybridization capture-based next-generation sequencing assay for targeted deep sequencing of all exons and selected introns of 468 key cancer genes in formalin-fixed, paraffin-embedded tumors. Digital polymerase chain reaction was used to detect GNAQ Q209 mutation in 1 specimen. MAIN OUTCOME MEASURES: Detection of GNAQ codon-specific mutation. RESULTS: Activating somatic GNAQ mutations (c.547C > T; p.Arg183Cys) were found in 100% (3 of 3) of the port wine stain and in the diffuse choroidal hemangioma. Somatic GNAQ mutations (c.626A > T; p.Gln209Leu) were found in 100% (6 of 6) of the solitary choroidal hemangiomas and (c.626A > C; p.Gln209Pro) in the choroidal nevus. CONCLUSIONS: GNAQ mutations occur in both diffuse and solitary hemangiomas, although at distinct codons. An R183 codon is mutant in diffuse choroidal hemangiomas, consistent with other Sturge-Weber vascular malformations. By contrast, solitary choroidal hemangiomas have mutations in the Q209 codon, similar to other intraocular melanocytic neoplasms.


Assuntos
Neoplasias da Coroide/genética , DNA de Neoplasias/genética , Subunidades alfa Gq-G11 de Proteínas de Ligação ao GTP/genética , Hemangioma/genética , Mutação , Biomarcadores Tumorais/genética , Biomarcadores Tumorais/metabolismo , Corioide/patologia , Neoplasias da Coroide/diagnóstico , Neoplasias da Coroide/metabolismo , Análise Mutacional de DNA , Feminino , Seguimentos , Subunidades alfa Gq-G11 de Proteínas de Ligação ao GTP/metabolismo , Hemangioma/diagnóstico , Hemangioma/metabolismo , Humanos , Masculino , Estudos Retrospectivos
7.
Risk Anal ; 39(4): 846-858, 2019 04.
Artigo em Inglês | MEDLINE | ID: mdl-30312478

RESUMO

Empowered by virtualization technology, service requests from cloud users can be honored through creating and running virtual machines. Virtual machines established for different users may be allocated to the same physical server, making the cloud vulnerable to co-residence attacks where a malicious attacker can steal a user's data through co-residing their virtual machines on the same server. For protecting data against the theft, the data partition technique is applied to divide the user's data into multiple blocks with each being handled by a separate virtual machine. Moreover, early warning agents (EWAs) are deployed to possibly detect and prevent co-residence attacks at a nascent stage. This article models and analyzes the attack success probability (complement of data security) in cloud systems subject to competing attack detection process (by EWAs) and data theft process (by co-residence attackers). Based on the suggested probabilistic model, the optimal data partition and protection policy is determined with the objective of minimizing the user's cost subject to providing a desired level of data security. Examples are presented to illustrate effects of different model parameters (attack rate, number of cloud servers, number of data blocks, attack detection time, and data theft time distribution parameters) on the attack success probability and optimization solutions.

8.
Risk Anal ; 38(4): 795-803, 2018 04.
Artigo em Inglês | MEDLINE | ID: mdl-28853176

RESUMO

Many real-world critical systems, e.g., aircrafts, manned space flight systems, and submarines, utilize mission aborts to enhance their survivability. Specifically, a mission can be aborted when a certain malfunction condition is met and a rescue or recovery procedure is then initiated. For systems exposed to external impacts, the malfunctions are often caused by the consequences of these impacts. Traditional system reliability models typically cannot address a possibility of mission aborts. Therefore, in this article, we first develop the corresponding methodology for modeling and evaluation of the mission success probability and survivability of systems experiencing both internal failures and external shocks. We consider a policy when a mission is aborted and a rescue procedure is activated upon occurrence of the mth shock. We demonstrate the tradeoff between the system survivability and the mission success probability that should be balanced by the proper choice of the decision variable m. A detailed illustrative example of a mission performed by an unmanned aerial vehicle is presented.

9.
Risk Anal ; 32(2): 304-18, 2012 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-21801189

RESUMO

This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.


Assuntos
Terrorismo , Humanos , Probabilidade , Estados Unidos
10.
Risk Anal ; 31(10): 1632-45, 2011 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-21388424

RESUMO

The article considers the optimal resource distribution in a parallel system between increasing protection and providing redundancy in a situation when the attacker's and defender's resources are stockpiling and the resource increment rate is constant. It is assumed that the system must perform within an exogenously given time horizon and the attack time probability is uniformly distributed along this horizon. The defender optimizes the resource distribution in order to minimize the system destruction probability during the time horizon. First, we find the optimal pace of construction of the new redundant elements assuming that the construction must start in the initial stage of the stockpiling process. We show that starting construction of new elements in the beginning of the system's existence results in its high initial vulnerability. Introducing the time delay before starting the construction can reduce the initial system vulnerability and the entire system destruction probability. The problem of optimization of time delay and new element construction pace is considered with and without constraint on the initial system vulnerability. Examples illustrating the methodology of the optimal defense strategy analysis are presented.

11.
Risk Anal ; 30(8): 1231-9, 2010 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-20412523

RESUMO

A target is protected by the defender and attacked by an attacker launching sequential attacks. For each attack, a contest intensity measures whether the agents' efforts have low or high impact on the target vulnerability (low vs. high contest intensity). Both the defender and the attacker have limited resources. It is assumed that the attacker can observe the outcome of each attack and stop the sequence of attacks when the target is destroyed. Two attacker objectives are considered, that is, to maximize the target vulnerability or to minimize the expected attacker resource expenditure. The article addresses the following three questions: whether the attacker should allocate its entire resource into one large attack or distribute it among several attacks; whether geometrically increasing or decreasing resource distribution into a fixed number of sequential attacks is more beneficial than equal resource distribution; and how the optimal attack strategy depends on the contest intensity.

12.
Arch Otolaryngol Head Neck Surg ; 136(2): 134-7, 2010 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-20157057

RESUMO

OBJECTIVE: To report our experience in and our surgical technique of treating vascular anomalies of the buccofacial region using an intraoral buccomucosal flap approach. DESIGN: Retrospective medical record review and illustration of a specific surgical procedure. SETTING: Academic tertiary care center. PATIENTS: Thirty-two patients with vascular anomalies of the buccofacial region who have been treated using the intraoral buccomucosal flap approach. INTERVENTION: Surgical therapy using an intraoral buccomucosal flap approach. MAIN OUTCOME MEASURES: Surgical outcomes and complications. RESULTS: Thirty-two patients were treated using the intraoral buccomucosal flap approach. The vascular anomalies treated at this site were venous malformations (17 [53.1%]), lymphatic malformations (13 [40.6%]), and hemangiomas (2 [6.3%]). Surgical removal was accomplished without occurrence of facial nerve dysfunction or other morbidity. The most frequent postoperative problem encountered was scarring with lymphatic malformation treatment. CONCLUSION: The intraoral buccomucosal flap procedure is an effective surgical technique for treating vascular anomalies of the buccofacial region.


Assuntos
Hemangioma/cirurgia , Anormalidades Linfáticas/cirurgia , Retalhos Cirúrgicos , Malformações Vasculares/cirurgia , Adolescente , Adulto , Criança , Pré-Escolar , Feminino , Hemangioma/patologia , Humanos , Lactente , Anormalidades Linfáticas/patologia , Masculino , Mucosa Bucal/cirurgia , Estudos Retrospectivos , Malformações Vasculares/patologia , Adulto Jovem
13.
Risk Anal ; 28(5): 1477-86, 2008 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-18631300

RESUMO

The article considers strategic defense and attack of a system that can be separated into parallel elements. The defender distributes its resource between separation and protecting the elements from outside attacks. The vulnerability of each element is determined by an attacker-defender contest success function, which depends on a contest intensity that may increase or decrease through the separation process. The article determines criteria of separation efficiency for systems without performance redundancy and 1-out-of-N and Q-out-of-N systems with performance redundancy. For the systems with performance redundancy the cases of expected damage proportional to the probability that the demand is not met, and expected damage proportional to the unsupplied demand, are considered.


Assuntos
Gestão de Riscos/estatística & dados numéricos , Modelos Estatísticos , Gestão de Riscos/métodos , Terrorismo , Estados Unidos
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA