Introduction: In general, abdominal emergencies are urgent situations that require a prompt and correct diagnosis and treatment. They involve a broad spectrum of diagnoses and can occur in all age groups. The situation is often modified in oncologic patients according to the extent and level of progression of the primary oncological disease.
View Article and Find Full Text PDFBackground: For highly selected patients with peritoneal metastases (PM) from colorectal cancer (CRC), an aggressive surgical approach with intraperitoneal chemotherapy may be beneficial. This management may prolong overall survival, which is well documented by the results of a number of clinical trials. In the Czech Republic, five specialized centers of surgical oncology are able to perform cytoreductive surgery (CRS) in combination with hyperthermic intraperitoneal chemotherapy (HIPEC).
View Article and Find Full Text PDFBackground: Since numerous pathological conditions are evoked by unwanted dendritic cell (DC) activity, therapeutic agents modulating DC functions are of great medical interest. In regenerative medicine, cellular secretomes have gained increasing attention and valuable immunomodulatory properties have been attributed to the secretome of γ-irradiated peripheral blood mononuclear cells (PBMCs). Potential effects of the PBMC secretome (PBMCsec) on key DC functions have not been elucidated so far.
View Article and Find Full Text PDFThe Density-Functional Tight Binding (DFTB) method is a popular semiempirical approximation to Density Functional Theory (DFT). In many cases, DFTB can provide comparable accuracy to DFT at a fraction of the cost, enabling simulations on length and time scales that are unfeasible with first-principles DFT. At the same time (and in contrast to empirical interatomic potentials and force fields), DFTB still offers direct access to electronic properties such as the band structure.
View Article and Find Full Text PDFResearch in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols.
View Article and Find Full Text PDF