598 research outputs found
Recommended from our members
Residual Tumor Confers a 10-Fold Increased Risk of Regrowth in Clinically Nonfunctioning Pituitary Tumors.
ObjectiveWe evaluated tumor recurrence and regrowth rates following endoscopic transnasal transsphenoidal (TNTS) surgical removal in a consecutive series of clinically nonfunctioning pituitary adenomas (CNFTs).DesignRetrospective chart review of clinical, biochemical, and sellar MRI findings in all TNTS surgeries in patients with CNFT, performed by a single surgeon, between 2008 and 2015 (n = 280).PatientsNinety-three patients met eligibility criteria, with complete clinical, biochemical, and imaging follow-up for a 3-year minimum.ResultsOf 85 patients who were not irradiated, 3-month postsurgical MRI demonstrated no residual tumor in 58 of 85 (68.2%), equivocal findings in 12 of 85 (14.1%), and definite residual tumor in 15 of 85 (17.6%) patients. Six of 85 (7.1%) demonstrated tumor regrowth by 3 years, and 2 further patients demonstrated true tumor recurrence at 3 and 6 years after surgery, respectively, for a total recurrence rate of 9.4% (8 of 85). Eight of the 93 patients were irradiated between 3 months and 4 years after pituitary surgery. In 3 patients with tumor regrowth, 2 exhibited residual tumor and 1 had no residual findings at the 3-month postoperative imaging. Overall, Ki-67 labeling index or Knosp grading did not predict recurrence.ConclusionTumor recurrence at 3 years was low (1 of 58; 1.7%) if the 3-month postoperative MRI showed no residual tumor. The findings support a less frequent imaging schedule for this group. Patients with definite residual tumor visible at 3 months harbor the greatest risk for tumor growth, but regrowth does not occur in all patients (6 of 15; 40%)
Utilization of heat precipitated whey protein
The purpose of this study was to coagulate whey protein by heat denaturation, recover it, and use it in food products. Fresh liquid whey at pH 4.5 was heated at 90°C for 20 minutes. Heated whey was cooled to room temperature (about 25°C) and centrifuged 15 minutes at 750xg. About 42 percent of the protein was recovered. The mean particle diameter of the sedimented material was 29.5μ. Electrophoresis indicated that blood serum albumin and 3-lactoglobulin were essentially precipitated while some a-lactalbumin remained in suspension. The sediment was collected and used as a basic matrix in sandwich spread and as a partial replacement of NFDM in ice cream. The products showed desirable quality when examined by sensory panels. Up to 30 per-cent of the NFDM in ice cream could be replaced
The effects of acylation on the functionality and performance of cottonseed flour
The purposes of this study were to acylate glandless cottonseed flour by using succinic anhydride and then to study the functionality and performance of acylated flour. Glandless cottonseed flour was acylated by adding one-tenth gram of succinic anhydride per gram flour. The anhydride was added to the flour suspension over a period of 60 minutes with constant stirring at room temperature (23-24°C.). The pH of the reaction was maintained at pH 8 (±0.5) by addition of 50 percent NaOH. After the reaction was finished, the pH of the flour suspension was lowered to pH 4 (±0.5). The acylated flour was recovered by centrifugation, washed with water to remove residual succinate, and freeze-dried. Physical functionality of acylated cottonseed flour was measured, Water and oil holding capacities were increased while emulsifying capacity was reduced. Acylated cottonseed flour and untreated cottonseed flour were used as a replacement for 6 or 12 percent of the wheat flour in white layer cakes. The quality of these cakes was inferior to controls made with all wheat flour
Diffraction Symmetry in Crystalline, Close-Packed C60
We have grown crystals of the carbon structure C60 by sublimation. In contrast to solution-grown crystals, the sublimed crystals have long range order with no evidence of solvent inclusions. Sublimed C60 forms three dimensional, faceted crystals with a close-packed, face-centered cubic unit cell. We have refined a crystal structure using the "soccer ball" model of the C60 molecule. The results indicate that the C60 molecule has the expected spherical shape, however the data are not sufficiently accurate to unambiguously determine atomic positions
Where Next for Microbiome Research?
The development of high-throughput sequencing technologies has transformed our capacity to investigate the composition and dynamics of the microbial communities that populate diverse habitats. Over the past decade, these advances have yielded an avalanche of metagenomic data. The current stage of “van Leeuwenhoek”–like cataloguing, as well as functional analyses, will likely accelerate as DNA and RNA sequencing, plus protein and metabolic profiling capacities and computational tools, continue to improve. However, it is time to consider: what’s next for microbiome research? The short pieces included here briefly consider the challenges and opportunities awaiting microbiome research
Regenerative endodontics: a true paradigm shift or a bandwagon about to be derailed?
Aims: Regenerative endodontic techniques (RETs) have been hailed as a paradigm shift for the management of traumatised non-vital immature permanent anterior teeth. In this article the aim was to critically appraise the literature with regards to the outcome of regenerative endodontics on root development. Methods: Critical review of the literature where regenerative endodontic techniques have been used in the management of immature non-vital teeth with continuation of root development as the main outcome reported. Results: Most studies published were in the form of case reports and series with very few randomised controlled trials with a high risk of bias. Continuation of root development following the use of RET has been shown to be unpredictable at best with lower success in those teeth losing vitality as a result of dental trauma. Conclusions: Despite the high success of regenerative endodontics in terms of periodontal healing including resolution of clinical and radiographic signs and symptoms of infection, continuation of root development remains an unpredictable outcome. The use of a blood clot as a scaffold in regenerative endodontics should be reviewed carefully as that might offer an environment for repair rather than regeneration. In addition, preservation of structures, such as Hertwig’s epithelial root sheath, may have an important bearing on the success of this approach and should be further investigated
New frontiers of managerial training: the LiVES project
The evolution of the Internet allowed the Web to become, among the different media, the most global, inter-active and dynamic medium to share information. Therefore, in the last decades, e-Learning has been widely used not only in the academic community, but also in the business sector. Within this context, thanks to their own competences, people can develop specific characteristics which may provide a competitive advantage for their organizations. The development and use of new technologies for the creation of three-dimensional (3D) Virtual Worlds set new challenges and enlarge the very idea of ‘learning environment’. This paper aims at inves-tigating the characteristics of training activities directed at the managerial class, in such a way as to increase their efficacy; it also analyses how the use of specific innovative technologies may be an effective solution.The evolution of the Internet allowed the Web to become, among the different media, the most global, inter-active and dynamic medium to share information. Therefore, in the last decades, e-Learning has been widely used not only in the academic community, but also in the business sector. Within this context, thanks to their own competences, people can develop specific characteristics which may provide a competitive advantage for their organizations. The development and use of new technologies for the creation of three-dimensional (3D) Virtual Worlds set new challenges and enlarge the very idea of ‘learning environment’. This paper aims at inves-tigating the characteristics of training activities directed at the managerial class, in such a way as to increase their efficacy; it also analyses how the use of specific innovative technologies may be an effective solution.Monograph's chapter
Online collaboration and cooperation : the recurring importance of evidence, rationale and viability
This paper investigates collaboration in teaching and learning and draws out implications for the promotion of collaboration within online environments. It is divided into four sections. First the case for collaboration, including specifically cooperative approaches, is explored. This case revolves around the impact of collaboration on the quality of learning and on learning outcomes. Collaboration is seen as constrained by context but, if structured and rewarded, it will bring important motivational and cognitive benefits. Next, the case for online collaboration is examined. This is based on longstanding arguments about the benefits of working together albeit in an environment which offers greater reach; a mix of media; and archives of interaction. The third section of the paper compares perspectives on online collaboration with a longer tradition of research into collaboration in general; it critiques the idea that online mediation offers a paradigm change in teaching and learning. The fourth section of the paper considers future directions for promoting online collaboration
WEB ATTACKS AND DEFENSES
Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated security safeguards is known as cybersecurity. Threats to cyber security are increasing at times. A flaw or weakness in a computer system, security tactics, internal controls, planning, or implementation that can compromise the security policy of a framework is known as a web vulnerability. The social, economic and political spheres of governments can be disrupted due to a vulnerability in the Internet, which can have an impact on the state. An effort is made to identify the defects and weaknesses while studying the weakness in order to take advantage of these weaknesses. The aim of this study is to identify the types of intrusions, find vulnerabilities, and review regulations for vulnerable systems detected in online applications
- …
