Invasive fungal infections (IFI) pose a significant complication after hematopoietic stem cell transplantation (HSCT). Isavuconazole (ISV) is a new generation azole with a favourable adverse effect and interaction profile approved for the treatment of invasive aspergillosis and mucormycosis. We analyzed the indications, effectiveness, adverse event profile and drug interaction management of ISV in the real-world setting in adults who received allogeneic-HSCT (allo-HSCT) within the Spanish Group of HSCT and Cell Therapy (GETH-TC).
View Article and Find Full Text PDFThe Sitnikov problem is a classical problem broadly studied in physics which can represent an illustrative example of chaotic scattering. The relativistic version of this problem can be attacked by using the post-Newtonian formalism. Previous work focused on the role of the gravitational radius λ on the phase space portrait.
View Article and Find Full Text PDFBackground: Prognostic factors of poor outcome in patients with hematological malignancies and COVID-19 are poorly defined.
Patients And Methods: This was a Spanish transplant group and cell therapy (GETH) multicenter retrospective observational study, which included a large cohort of blood cancer patients with laboratory-confirmed SARS-CoV-2 infection through PCR assays from March 1st 2020 to May 15th 2020.
Results: We included 367 pediatric and adult patients with hematological malignancies, including recipients of autologous (ASCT) (n = 58) or allogeneic stem cell transplantation (allo-SCT) (n = 65) from 41 hospitals in Spain.
PLoS One
June 2016
The FOXP3 gene encodes for a protein (Foxp3) involved in the development and functional activity of regulatory T cells (CD4+/CD25+/Foxp3+), which exert regulatory and suppressive roles over the immune system. After allogeneic stem cell transplantation, regulatory T cells are known to mitigate graft versus host disease while probably maintaining a graft versus leukemia effect. Short alleles (≤(GT)15) for the (GT)n polymorphism in the promoter/enhancer of FOXP3 are associated with a higher expression of FOXP3, and hypothetically with an increase of regulatory T cell activity.
View Article and Find Full Text PDFAs wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks.
View Article and Find Full Text PDFThe improvement of odometry systems in collaborative robotics remains an important challenge for several applications. Social odometry is a social technique which confers the robots the possibility to learn from the others. This paper analyzes social odometry and proposes and follows a methodology to improve its behavior based on cooperative reputation systems.
View Article and Find Full Text PDFPhys Rev E Stat Nonlin Soft Matter Phys
December 2008
By using finite Lyapunov exponent distributions, we get insight into both the local and global properties of a dynamical flow, including its nonhyperbolic behavior. Several distributions of finite Lyapunov exponents have been computed in two prototypical four-dimensional phase-space Hamiltonian systems. They have been computed calculating the growth rates of a set of orthogonal axes arbitrarily pointed at given intervals.
View Article and Find Full Text PDFSecurity in wireless sensor networks is difficult to achieve because of the resource limitations of the sensor nodes. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad reputation feedback to the network.
View Article and Find Full Text PDFThe reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks.
View Article and Find Full Text PDF