WorldWideScience

Sample records for bep protocol bleomycin

  1. Randomized phase III study comparing paclitaxel-bleomycin, etoposide, and cisplatin (BEP) to standard BEP in intermediate-prognosis germ-cell cancer : intergroup study EORTC 30983

    DEFF Research Database (Denmark)

    de Wit, Ronald; Skoneczna, Iwona

    2012-01-01

    To compare the efficacy of four cycles of paclitaxel-bleomycin, etoposide, and cisplatin (T-BEP) to four cycles of bleomycin, etoposide, and cisplatin (BEP) in previously untreated patients with intermediate-prognosis germ-cell cancer (GCC).

  2. Extensive deep vein thrombosis as a complication of testicular cancer treated with the BEP protocol (bleomycin, etoposide and cisplatin): case report / Trombose venosa profunda extensa como complicação de um tumor do testículo tratado com o protocolo BEP (cisplatina, bleomicina e etoposide): relato de caso

    Scientific Electronic Library Online (English)

    Max Senna, Mano; José Luiz Miranda, Guimarães; Sören Franz Marian Chicata, Sutmöller; André Borba, Reiriz; Christian Sandor Svend Chicata, Sutmöller; Angelo, Di Leo.

    2006-11-01

    Full Text Available CONTEXTO: Não há relatos na literatura de trombose venosa profunda (TVP) extensa associada ao protocolo de quimioterapia cisplatina, bleomicina e etoposite (BEP). RELATO DO CASO: O paciente era um adolescente de 18 anos com um tumor germinativo não-seminomatoso no testículo direito, com metástases p [...] ulmonares, hepáticas e retroperitoneais. Após orquiectomia radical, o paciente começou a receber quimioterapia de acordo com o protocolo BEP (sem profilaxia rotineira para TVP). No quarto dia do ciclo, TVP massiva foi diagnosticada, estendendo-se das veias poplíteas até o segmento inferior da veia cava torácica. Tratamento trombolítico foi iniciado imediatamente com estreptoquinase. No segundo dia da terapia trombolítica, o paciente desenvolveu insuficiência renal aguda, devido ao acometimento das veias renais pela trombose. Estroptoquinase foi mantida por seis dias e o paciente teve evolução surpreendentemente favorável. Abstract in english CONTEXT: There are no reports in the literature of massive deep venous thrombosis (DVT) associated with cisplatin, bleomycin and etoposide (BEP) cancer treatment. CASE REPORT: The patient was a 18-year-old adolescent with a nonseminomatous germ cell tumor of the right testicle, with the presence of [...] pulmonary, liver, and massive retroperitoneal metastases. Following radical orchiectomy, the patient started chemotherapy according to the BEP protocol (without routine prophylaxis for DVT). On day 4 of the first cycle, massive DVT was diagnosed, extending from both popliteal veins up to the thoracic segment of the inferior vena cava. Thrombolytic therapy with streptokinase was immediately started. On day 2 of thrombolytic therapy, the patient developed acute renal failure, due to extension of the thrombosis to the renal veins. Streptokinase was continued for six days and the outcome was remarkably favorable.

  3. The effects of chemotherapy with bleomycin, etoposide, and cis-platinum (BEP) on rat sperm chromatin remodeling, fecundity and testicular gene expression in the progeny.

    Science.gov (United States)

    Maselli, Jennifer; Hales, Barbara F; Robaire, Bernard

    2013-10-01

    During spermiogenesis, histones are replaced first by transition proteins and then by protamines, resulting in a very condensed sperm DNA structure that is absolutely critical for normal sperm function. We have demonstrated previously that, despite a 9-wk recovery period, mature sperm from rats treated for 9 wk with bleomycin, etoposide, and cis-platinum (BEP), the drugs used to treat testicular cancer, have reduced levels of protamine 1 and a concomitant upregulation of specific histones, highlighting a problem in histone eviction. Here, we demonstrate that regulators of histone removal are increased in elongating spermatids following recovery; however, Ac-H4 and gamma H2AX histones remain elevated in elongating spermatids or caudal epididymal spermatozoa 9 wk post-BEP treatment. This indicates that chromatin remodelers and effector proteins that respond to histone removal cues may be a target of BEP treatment. A decrease in the expression of SMARCE1 in elongating spermatids may explain the persistent retention of histones in cauda epididymal sperm 9 wk after the cessation of BEP treatment. Remarkably, proteins implicated in the translational control and posttranslational processing of protamine 1 are also significantly elevated 9 wk post-BEP treatment, suggesting that histone eviction may dictate the DNA availability for protamine binding. Males mated to control females 9 wk after BEP treatment have reduced litter sizes; moreover, the profile of gene expression in the developing testes of their pups is altered. Altering the proportion of histones to protamine in mature spermatozoa has an adverse impact on male fecundity, with modifications to epigenetic marks potentially threatening normal progeny development. PMID:23986570

  4. Radioiodinated bleomycin

    International Nuclear Information System (INIS)

    Radioiodinated bleomycin is a useful imaging agent for body tissues. Its production by iodination of bleomycin with radioactive iodide ions in the presence of an oxidizing agent is described. 7 claims, no drawings

  5. Bleomycin--electrical pulse delivery: electroporation therapy-bleomycin--Genetronics; MedPulser-bleomycin--Genetronics.

    Science.gov (United States)

    2004-01-01

    Genetronics Biomedical is using its electroporation therapy technology to deliver bleomycin to tumour cells for the treatment of cancer. Genetronics have developed the MedPulser Electroporation Therapy System, which consists of an electrical pulse generator and disposable electrode applicators. The MedPulser system enables the delivery of large molecules into cells by briefly applying an electric field to the cell. This causes a transient permeability in the cell's outer membrane characterised by the appearance of pores across the membrane. After the field is discontinued, the pores close, trapping the therapeutic molecules inside the target cells. Genetronics is using the MedPulser System in conjunction with bleomycin, an antineoplastic antibiotic that binds to DNA causing strand scissions. Genetronics is seeking a licensing partner for the use of electroporation for the delivery of drugs in chemotherapy. In 1998, Genetronics entered a licensing and development agreement with Ethicon for electroporation and electrofusion. Under the terms of this agreement, Ethicon was to develop and clinically test the Genetronics electroporation delivery system and conduct all regulatory activities throughout the world except Canada. Ethicon would also market the products once regulatory approval has been obtained and Genetronics was to receive a percentage of the net sales and as license fees. However, in July 2000, Ethicon exercised its rights to terminate the agreement without cause. All rights were returned to Genetronics in January 2001. In 1997, Genetronics entered an agreement with Abbott Laboratories for the manufacture of bleomycin for use in the US in its MedPulsar system after regulatory approval had been granted for its use in the treatment of solid tumours. In a separate supply agreement, Faulding Inc. has agreed to manufacture bleomycin for Genetronic for use in Canada after regulatory approval had been granted. The MedPulsar Electroporation Therapy System with bleomycin is currently in phase III pivotal studies in the US as a treatment for recurrent and second primary squamous cell carcinomas of the head and neck. Genetronics received approval for the Electroporation Therapy system as a device in March 1999 when it achieved CE Mark certification. In February 2004, Genetronics announced that it had completed a Special Protocol Assessment review process with the US FDA for two new trials that will compare bleomycin electroporation therapy to surgery. The primary endpoint will be tissue and function preservation rather than survival. One proposal is for recurrent head and neck cancer, and the other is for disfiguring cutaneous cancer. Three Institutional Review Boards in the US have approved the two protocols and Genetronics has initiated enrollment. In June 2004, Genetronics was granted fast-track status for its MedPulsar Electroporation Therapy System clinical development programme for patients with head and neck cancer. Shifting from a primary endpoint of survival to a quality-of-life outcome will enable those clinical trials to be carried out faster with less cost and with a higher likelihood of success. As a result, Genetronic's phase III trials focussing on survival as a primary endpoint have been discontinued. This includes a phase III trial for late-stage, recurrent head and neck cancer in combination with the normal standard of treatment compared with normal standard of treatment alone. Interim results from this trial had suggested bleomycin electroporation therapy demonstrated local tumour control and preservation of organ function, as well as non-inferiority when compared with surgery. This trial was initiated in May 2002. In March 2004, Genetronics initiated a post-European regulatory approval clinical study in patients with primary or recurrent squamous cell carcinoma of the head and neck (SCCHN). This study aims to enroll approximately 100 patients at 12-15 hospitals located in the UK, Germany, Italy, France, Austria and other western European countries. The study is designed to support the commercialisation o

  6. Bleomycin-induced flagellate dermatitis

    Scientific Electronic Library Online (English)

    Guilherme Devidé, Mota; Adriana Marques Damasco, Penna; Regina Cláudia, Soares; Otávio Carvalho Guimarães, Baiocchi.

    2014-07-01

    Full Text Available A 29-year-old woman with stage IVB Hodgkin's lymphoma was treated with doxorubicin, bleomycin, vinblastine, and dacarbazine. Two weeks after the first cycle was completed, she developed pruritic, linear erythematous lesions in a flagellate-like pattern on the trunk, neck and arms. After oral prednis [...] one therapy and cessation of bleomycin, the lesions started to recede.

  7. Bleomycin treatment of brain tumors: an evaluation

    DEFF Research Database (Denmark)

    Linnert, Mette; Gehl, Julie

    2009-01-01

    Bleomycin has been used in the treatment of brain tumors for over 30 years. Currently, we are evaluating electrochemotherapy (the use of electric pulses to enhance uptake of bleomycin) for patients with secondary brain tumors. We, therefore, reviewed the literature with specific reference to the tolerability and toxicity of bleomycin. Using the keywords 'brain' and 'bleomycin', a database search without date restriction was performed and over 500 articles were found. Twenty-five articles were us...

  8. A randomized phase III study comparing standard dose BEP with sequential high-dose cisplatin, etoposide, and ifosfamide (VIP) plus stem-cell support in males with poor-prognosis germ-cell cancer. An intergroup study of EORTC, GTCSG, and Grupo Germinal (EORTC 30974)

    DEFF Research Database (Denmark)

    Daugaard, G; Skoneczna, I

    2011-01-01

    To compare the efficacy of one cycle of standard dose cisplatin, etoposide, and ifosfamide (VIP) plus three cycles of high-dose VIP followed by stem-cell infusion [high-dose chemotherapy (HD-CT arm)] to four cycles of standard cisplatin, etoposide, and bleomycin (BEP) in patients with poor-prognosis germ-cell cancer (GCC). Patient and methods: Patients with poor-prognosis GCC were assigned to receive either BEP or VIP followed by HD-CT. To show a 15% improvement in a 1-year failure-free survival (FFS), the study aimed to recruit 222 patients but closed with 137, due to slow accrual.

  9. Labeled bleomycin as a tumor localizing agent

    International Nuclear Information System (INIS)

    The antitumor antibiotics bleomycins labeled with 57Co are known to possess excellent tumor localizing properties but the rather long halflife of 57Co prevents its use in clinical routine. It is therefore desirable to label cobalt-bleomycin with a more suitable radionuclide, e.g. 123I. This thesis reports on further studies on cobalt-bleomycin. It appears from the studies on the structure of cobalt-bleomycin described in this thesis (Chapter B), that cobalt is able to form different complexes with bleomycin (the forms I and II). The difference in structure is not clear, but the biological behavior of both forms is studied (Chapter C). In Chapter D the iodination of cobalt-bleomycin is described. Iodination of free bleomycin yields a product with bad tumor localizing properties, and straight-on iodination of cobalt-bleomycin is prevented by the presence of cobalt. To retain the good tumor-localizing properties of cobalt-bleomycin, possibilities were explored to incorporate the iodine in the terminal amine (a side chain, not involved in complexation). Alkylation of cobalt-bleomycin demethyl A2 with N-bromoacetyl-3-iodoaniline yielded a product; unfortunately this product possessed bad tumor localizing properties and moreover, was not stable in vivo. The structure of a possibly successful iodinated cobalt-bleomycin is outlined but could not be realized during this research. (Auth.)

  10. Scintigraphy of ORL tumours with cobalt bleomycin

    International Nuclear Information System (INIS)

    Our experiences with cobalt bleomycin scintigraphy in the treatment planning of ORL tumors are described. 142 scintigrams taken from 127 patients have been examined. As is shown by our investigation, cobalt bleomycin scintigraphy is a good examination method, however, too much expenditure is needed to have the necessary data for therapy planning. To our opinion, the information obtained in oto-rhino-laryngology by an exact clinical examination is as good as that of cobalt bleomycin scintigraphy. Our treatment schemes had only to be revised in some exceptional cases. (orig.)

  11. 57Co-bleomycin and *I-bleomycin in Ehrlich's carcinoma model of the mouse

    International Nuclear Information System (INIS)

    The tumour concentration, distribution of activity and whole body retention of bleomycin labeled with iodine-125 or iodine-131 was contrasted with that of 57Co-bleomycin following administration to mice showing tumours. Additional investigations were carried out to determine the stability of iodinated bleomyin in vivo and in vitro. As regards the beahaviour of I-bleomycin in mice showing solid carcinomas according to Ehrlich it was established that its absolute tumour concentration was lower and its relative tumour concentration just slightly less pronounced than that of 57Co-bleomycin during the period between 2 and 48 hours following administration. Investigations into whole body retention showed the elimination of activity to be more rapid for 131I-bleomycin as compared to 57Co-bleomycin. Bleomycin that was radioiodinated according to the iodine monochloride method proved to be more stable in vivo than bleomycin labeled with 57Co. Further studies, in particular clinical trials, will have to be carried out before definite conclusions can be drawn as to the diagnostic value of radioiodinated bleomycin in tumour localisation. (TRV)

  12. Brief Eclectic Psychotherapy for Traumatic Grief (BEP-TG: toward integrated treatment of symptoms related to traumatic loss

    Directory of Open Access Journals (Sweden)

    Geert E. Smid

    2015-07-01

    Full Text Available Background: Traumatic events such as disasters, accidents, war, or criminal violence are often accompanied by the loss of loved ones, and may then give rise to traumatic grief. Traumatic grief refers to a clinical diagnosis of persistent complex bereavement disorder (PCBD with comorbid (symptoms of posttraumatic stress disorder (PTSD and/or major depressive disorder (MDD following confrontation with a traumatic loss. Trauma survivors, who are frequently from different cultural backgrounds, have often experienced multiple losses and ambiguous loss (missing family members or friends. Current evidence-based treatments for PTSD do not focus on traumatic grief. Objective: To develop a treatment for traumatic grief combining treatment interventions for PTSD and PCBD that may accommodate cultural aspects of grief. Method: To provide a rationale for treatment, we propose a cognitive stress model of traumatic grief. Based on this model and on existing evidence-based treatments for PTSD and complicated grief, we developed Brief Eclectic Psychotherapy for Traumatic Grief (BEP-TG for the treatment of patients with traumatic grief. The treatment is presented along with a case vignette. Results: Processes contributing to traumatic grief include inadequately integrating the memory of the traumatic loss, negative appraisal of the traumatic loss, sensitivity to matching triggers and new stressors, and attempting to avoid distress. BEP-TG targets these processes. The BEP-TG protocol consists of five parts with proven effectiveness in the treatment of PCBD, PTSD, and MDD: information and motivation, grief-focused exposure, memorabilia and writing assignments, finding meaning and activation, and a farewell ritual. Conclusion: Tailored to fit the needs of trauma survivors, BEP-TG can be used to address traumatic grief symptoms related to multiple losses and ambiguous loss, as well as cultural aspects of bereavement through its different components.

  13. Brief Eclectic Psychotherapy for Traumatic Grief (BEP-TG): toward integrated treatment of symptoms related to traumatic loss

    Science.gov (United States)

    Smid, Geert E.; Kleber, Rolf J.; de la Rie, Simone M.; Bos, Jannetta B. A.; Gersons, Berthold P. R.; Boelen, Paul A.

    2015-01-01

    Background Traumatic events such as disasters, accidents, war, or criminal violence are often accompanied by the loss of loved ones, and may then give rise to traumatic grief. Traumatic grief refers to a clinical diagnosis of persistent complex bereavement disorder (PCBD) with comorbid (symptoms of) posttraumatic stress disorder (PTSD) and/or major depressive disorder (MDD) following confrontation with a traumatic loss. Trauma survivors, who are frequently from different cultural backgrounds, have often experienced multiple losses and ambiguous loss (missing family members or friends). Current evidence-based treatments for PTSD do not focus on traumatic grief. Objective To develop a treatment for traumatic grief combining treatment interventions for PTSD and PCBD that may accommodate cultural aspects of grief. Method To provide a rationale for treatment, we propose a cognitive stress model of traumatic grief. Based on this model and on existing evidence-based treatments for PTSD and complicated grief, we developed Brief Eclectic Psychotherapy for Traumatic Grief (BEP-TG) for the treatment of patients with traumatic grief. The treatment is presented along with a case vignette. Results Processes contributing to traumatic grief include inadequately integrating the memory of the traumatic loss, negative appraisal of the traumatic loss, sensitivity to matching triggers and new stressors, and attempting to avoid distress. BEP-TG targets these processes. The BEP-TG protocol consists of five parts with proven effectiveness in the treatment of PCBD, PTSD, and MDD: information and motivation, grief-focused exposure, memorabilia and writing assignments, finding meaning and activation, and a farewell ritual. Conclusion Tailored to fit the needs of trauma survivors, BEP-TG can be used to address traumatic grief symptoms related to multiple losses and ambiguous loss, as well as cultural aspects of bereavement through its different components. PMID:26154434

  14. Radiotherapy using bleomycin, ACNU, and vincristine for malignant brain tumors

    International Nuclear Information System (INIS)

    Radiotherapy combined with bleomycin, ACNU, and vincristine was performed on 106 patients with malignant brain tumors. The treatment protocol was based on the concept of combination chemotherapy or chemoradiotherapy and synchronized chemoradiotherapy. For the purpose of synchronized chemoradiotherapy, bleomycin, ACNU, and vincristine were used as G2M cell cycle phase accumulator, and radiation and bleomycin were used as agents to which G2M or G2 phase cells are sensitive. The short-term results of the chemoradiotherapy were evaluated by measuring tumor regression by computerized tomography (CT) in 80 patients with evaluable CT lesions. The response rate (complete response+partial response) was 67% (6/9) for astrocytoma, 29% (7/24) for anaplastic glioma, 67% (4/6) for pontine glioma, 100%(5/5) for malignant lymphoma, 100% (8/8) for germ cell tumors and 65% (15/23) for metastatic tumors. A control study was performed using radiation alone on another 18 patients with metastatic tumors, and the response rate was 50% (9/18). Among the 106 patients treated with chemoradiotherapy, the major side effects observed were as follows: leucopenia in 33 patients (31%), thrombocytopenia in 14 (13%), paralytic ileus in 2 (2%), peripheral neuropathy in 2 (2%), and lung fibrosis in 1 (1%). Contrary to expectation, low-grade astrocytomas responded much better to the chemoradiotherapy than high-grade astrocytomas. Chemoradiotherapy seems to be more effective in causing regression of malignant brain tumors than radiation alone, but further studies on the long-term results of this treatment are necessary. (author)

  15. BLEOMYCIN EFFECTS ON MOUSE MEIOTIC CHROMOSOMES

    Science.gov (United States)

    The effects of a radiomimetic chemical, bleomycin (BLM), on meiotic chromosomes was evaluated in mice. hromosome aberrations were analyzed at meiotic metaphase I, and damage to the synaptonemal complex was analyzed in meiotic prophase cells. n the metaphase aberration studies, an...

  16. BEPS redesign of 168 commercial buildings: summary report

    Energy Technology Data Exchange (ETDEWEB)

    Stoops, J.L.; Deringer, J.J.; Moreno, S.; Misuriello, H.P.

    1984-05-01

    The objective of this report is to present, in usable form, summary data from the Building Energy Performance Standards (BEPS) Phase II commercial buildings energy research conducted in 1978-1979. Summary data presented were obtained from two major research efforts: the BEPS Phase II Redesign experiment; and the related research on ASHRAE Standard 90-75R. The bulk of this report consists of data tabulations of key energy parameters for the 168 sample buildings, which were tabulated from computer-stored files of the 1978-1979 data. Two kinds of tabulations are included: numerical tabulations that extracted information from the computer-stored data base for the 168 sample buildings; and graphic presentations of the computer-generated data, plus data extracted from other sources. The intent is to provide a single data compendium of key energy-related factors from the 1978 redesign experiment and the associated 1978-1979 ASHRAE Standard 90-75R research. This report also supplements the information for which there was not space in the magazine articles. Thus, for some building types, additional analysis, comments, and data tabulations are included that could not be included in the articles because space was limited. These additional analysis items are not consistent across building types because both the energy conservation opportunities and the design strategies applied by the building designers varied considerably by building type. The chapters have been entered individually into EDB and ERA.

  17. Excretion and organic distribution of 57Co-bleomycin emulsions

    International Nuclear Information System (INIS)

    Excretion and organic distributions of 57Co-bleomycin were studied in normal and tumour-bearing mice with the objective of obtaining high 57Co-bleomycin concentrations in the tumour and the regional lymph nodes. Aqueous 57Co-bleomycin and various 57Co-bleomycin emulsions were used for the studies and applied either locally or systemically. Excretion of 57Co-bleomycin was slowest after local administration of 57Co-bleomycin oil-in-water emulsion and fastest after systemic application of aqueous 57Co-bleomycin. Organic distribution studies showed the highest values in the tumour and the regional lymph nodes after local injection of 57Co-bleomycin oil-in-water emulsion while the lowest values were measured after systemic application of aqueous 57Co-bleomycin. These kinetic studies suggest that intratumoral treatment with oil-in-water emulsions of bleomycin may be a new approach in the therapy of epithelial tumours with lymphogenic metastases. (orig.)

  18. Radiation doses from 51Cr-bleomycin

    International Nuclear Information System (INIS)

    Extensive studies were made of long-term whole-body retention, plasma concentration and urinary excretion of 51Cr in rats, rabbits and patients after injection of 51Cr-bleomycin. Integrated whole-body and organ retention, corrected for radioactive decay, is similar in man and rabbit, and higher by a factor of about 2 in the rat. Doses to organs and whole body in man were calculated using the MIRD methodology and assuming conservatively that the kinetic data derived in rats are applicable to man. The organ and whole-body MIRD doses after 51Cr-bleomycin administration are comparable to those after 67Ga-citrate and the effective dose equivalent from a diagnostic amount of 740 MBq of the 51Cr complex amounts to about 6 mSv. However, the subcellular distribution in the liver of 51Cr, administered in the form of 51Cr-bleomycin, indicated a significant enrichment of 51Cr in the nuclei and in the DNA over mean concentrations in the liver cells. Also, the quality factor for Auger electrons, emitted by 51Cr, when assessed on the basis of the Q vs. LET relationship, as proposed by ICRP, was substantially higher than unity. Doses calculated for cell nuclei and the DNA in the liver cells were higher than the cell-averaged values by a factor 2.5 and 5, respectively, and the corresponding dose equivalents by a factor of 9 and 24. The effective dose equivalent, estimated on the basis of dose equivalents to cell nuclei and the DNA, amounted to 33 and 83 mSv per examination (740 MBq of 51Cr-bleomycin), respectively. (orig.)

  19. Four cycles of BEP versus an alternating regime of PVB and BEP in patients with poor-prognosis metastatic testicular non-seminoma; a randomised study of the EORTC Genitourinary Tract Cancer Cooperative Group.

    OpenAIRE

    Wit, R. de; Stoter, G.J.; Sleijfer, D.Th.; Kaye, S.B.; De Mulder, P. H. M.; Bokkel Huinink, W.W. ten; Spaander, P J; de Pauw, M.; Sylvester, R.J.

    1995-01-01

    We have investigated whether an alternating induction chemotherapy regimen of PVB/BEP is superior to BEP in patients with poor-prognosis testicular non-seminoma. A total of 234 eligible patients were randomised to receive an alternating schedule of PVB/BEP for a total of four cycles or four cycles of BEP. Poor prognosis was defined as any of the following: lymph node metastases larger than 5 cm, lung metastases more than four in number or larger than 2 cm, haematogenic spread outside the lung...

  20. BEP-relations for N2 dissociation over stepped transition metal and alloy surfaces

    DEFF Research Database (Denmark)

    Fronczek-Munter, Ture RØnved; Bligaard, Thomas

    2008-01-01

    We present density functional theory (DFT) calculations for N(2) dissociation on stepped face-centred cubic (211) surface slabs. By using the same crystal structure, the same adsorption site for atomic nitrogen, and the same transition-state bond length of N(2) over a range of pure metal surfaces, a perfectly linear Bronsted-Evans-Polanyi (BEP) relation between the transition-state potential energy and the dissociative chemisorption energy is obtained. The perfect BEP relation, which extends over 12 eV in chemisorption energy, suggests that the manifestation of BEP relations for surface reactions is a general electronic structure effect, and that geometric effects are responsible for the scatter which is normally observed around the BEP line. The BEP relation is also shown to be valid for both surface and bulk alloys. The scatter is, however, larger than for the pure elements. This can be understood as a larger geometrical variance. To analyze the accuracy of the DFT calculations a detailed convergence study is performed for several adsorbates on stepped hexagonal close-packed and face-centred cubic Ru slabs.

  1. Distribution of Fe-bleomycin, Co-bleomycin in tumor tissue

    International Nuclear Information System (INIS)

    Ferric bleomycin (Fe-BLM) complex was found stable in the region of BLM excess and in the region of pH greater than 4.8. When this was injected intravenously into a mouse, it did not dissociate during the period of observation. Localization of Fe-BLM complex in mammary carcinoma of the C3H mouse and MC-induced squamous cell carcinoma was investigated by histochemical analysis of iron. In the tumor tissue, the iron as was identified by the Berlin blue reaction was seen localized in the stroma cells, histiocyte-like cells in granulation tissue and hair roots, but not in the tumor nests. On the contrary, Co-BLM was seen localized in the tumor nests, especially in the nuclear part of the tumor cells as investigated by cobalt straining. There was a clear-cut difference in the distribution pattern between 59Fe-BLM and 60Co-BLM. While Fe-BLM retained much of ''bleomycin'' character, the Co-BLM behaved like cobalt itself in vivo in the mouse. Thus, the chelating metal would greatly influence the distribution pattern of bleomycin. (auth.)

  2. Effects of bone marrow depression on the development of bleomycin-induced pulmonary fibrosis

    International Nuclear Information System (INIS)

    The effects of blood leukocyte depression on the development of bleomycin-induced pulmonary fibrosis were studied in F344/N rats injected with 89Sr to destroy bone marrow cells. The 89Sr injections were followed in 7 days by intratracheal instillation of bleomycin. At 3 to 30 days after bleomycin, the lung injury in rats given both 89Sr and bleomycin was compared to animals given bleomycin alone. The 89Sr treated rats had reduced numbers of circulating granulocytes, a less severe pulmonary inflammatory response, and a delayed, but not abrogated, pulmonary fibrosis compared to animals given bleomycin alone. 4 references, 4 figures, 2 tables

  3. Mitochondrial DNA damage by bleomycin induces AML cell death.

    Science.gov (United States)

    Yeung, ManTek; Hurren, Rose; Nemr, Carine; Wang, Xiaoming; Hershenfeld, Samantha; Gronda, Marcela; Liyanage, Sanduni; Wu, Yan; Augustine, Jeevan; Lee, Eric A; Spagnuolo, Paul A; Southall, Noel; Chen, Catherine; Zheng, Wei; Jeyaraju, Danny V; Minden, Mark D; Laposa, Rebecca; Schimmer, Aaron D

    2015-06-01

    Mitochondria contain multiple copies of their own 16.6 kb circular genome. To explore the impact of mitochondrial DNA (mtDNA) damage on mitochondrial (mt) function and viability of AML cells, we screened a panel of DNA damaging chemotherapeutic agents to identify drugs that could damage mtDNA. We identified bleomycin as an agent that damaged mtDNA in AML cells at concentrations that induced cell death. Bleomycin also induced mtDNA damage in primary AML samples. Consistent with the observed mtDNA damage, bleomycin reduced mt mass and basal oxygen consumption in AML cells. We also demonstrated that the observed mtDNA damage was functionally important for bleomycin-induced cell death. Finally, bleomycin delayed tumor growth in xenograft mouse models of AML and anti-leukemic concentrations of the drug induced mtDNA damage in AML cells preferentially over normal lung tissue. Taken together, mtDNA-targeted therapy may be an effective strategy to target AML cells and bleomycin could be useful in the treatment of this disease. PMID:25820141

  4. Development of 67Ga-Bleomycin complex for Tumor Imaging

    International Nuclear Information System (INIS)

    The preparation and condition for optimization of 67Ga-labeled bleomycin complex (67Ga-Bleomycin) were undertaken for evaluation of its in vitro/in vivo tumor imaging behavior. Bleomycin was successively labeled with 67Ga-gallium chloride obtained from an irradiated 68Zn-metal solid target prepared by electrodeposition at 18 MeV. The best results were obtained at the P H in normal saline as the solvent at 100 deg C in 30 min. Radio thin layer chromatography showed an overall radiochemical vi eld of 90-94% at the optimized conditions with a specific activity of about 1.39 mCi/m mole and radiochemical purity greater than 93% in 15 min. The final complex was checked by other chromatographic methods to ensure the formation of only one species followed by filtration through a 0.22? filter

  5. Detection of lung cancer with 55Co-bleomycin using a positron camera

    International Nuclear Information System (INIS)

    57Co-bleomycin is useful in the detection and staging of lung cancer, but the long half-life of 57Co(270 days) has discouraged its widespread acceptance. We investigated the shorter living positron emitting 55Co(half-life 18.2 h) as a label for bleomycin. In eleven patients with proven lung cancer scintigraphy with 55Co-bleomycin, using a positron camera, demonstrated the tumor in ten cases. Tumor to lung ratios were calculated. The results were superior to those obtained with 55Co-bleomycin single photon imaging but inferior to those obtained with 57Co-bleomycin scintigraphy. (orig.)

  6. Irradiation and bleomycin in the treatment of inoperable vulval carcinoma

    Energy Technology Data Exchange (ETDEWEB)

    Iversen, T. (The Norwegian Radium Hospital, Oslo (Norway). Dept. of Gynecology)

    1982-01-01

    Fifteen patients with inoperable squamous cell carcinoma of the vulva were treated with Bleomycin and irradiation. Only 2 patients were also treated with vulvectomy and bilateral lymphadenectomy 2 weeks later. One patient survived more than 4 years without signs of recurrence, another survived 2 1/2 years and 2 more 18 and 12 months respectively. The rest died less than 6 months after the treatment. Three patients developed signs of lung fibrosis. Bleomycin and irradiation may render a tumor operable, but in most cases this regime merely aims at palliation.

  7. Indirect measurement of 9Be(p, ?)6Li reaction by means of Trojan Horse Method

    International Nuclear Information System (INIS)

    The beryllium abundance acts as a key role for understanding the inhomogeneous Big Bang nucleosynthesis. In order to measure the 9Be(p, ?)6Li bare nucleus cross section and S(E) factor at astrophysical energies, the Trojan Horse Method (THM) can be applied. The main feature of the method is that it allows to extract the energy dependence for the astrophysical S(E) factor of bare nuclei at very low energies without any extrapolation, by measuring the cross section of an appropriate three body process. Thus the 9Be(p, ?)6Li has been studied by means of the THM applied to the 2H(9Be, ?6Li)n at INFN-LNS, Catania, Italy. The two body reaction cross section has been studied in the energy range of Ecm=0-1000 keV, Preliminary results are discussed and a comparison with direct data is made. (authors)

  8. Oxidative damage of BEP2D cells irradiated 60Co ?-rays

    International Nuclear Information System (INIS)

    Objective: To study reactive oxygen species (ROS) productions and oxidative DNA damage in HPV-16 immortalized human bronchial epithelial cells (BEP2D) irradiated with 60Co ?-rays. Methods: The measurement of extracellular superoxide anions was based on the reduction of ferricytochrome C as assayed by the increase in its absorbance at 550 nm. Quantitation of extracellular hydrogen peroxides (H2O2) was based on the horseradish peroxidase-dependent oxidation of phenol red which is assayed by its increased absorbance at 620 nm. The determination of extracellular hydroxyl radicals (·OH) was based on de-coloration of safranine T as assayed by the decrease in its absorbance at 520 nm. Ethidium bromide and 2', 7'-dichlorofluorescein, fluorescent products of the membrane-permeable dyes-hydro-ethine and 2', 7'-dichlorofluorescein diacetate, were used to monitor the intracellular production of H2O2 and superoxide anions respectively by flow cytometry. 8-hydroxy-deoxygunosine (OH8dG) was examined with HPLC-ECD from extracted DNA. Results: the ROS production including H2O2, superoxide anions and ·OH, and DNA adduct OH8dG in 60Co ?-rays-irradiated BEP2D cells increased remarkably, and these increments could be inhibited effectively by 1 ?mol/L of selenium. Conclusion: 60Co ?-irradiation causes oxidative damage to BEP2D cells, which can be protected by selenium

  9. Radiosensitising effect of electrochemotherapy with bleomycin in LPB sarcoma cells and tumors in mice

    OpenAIRE

    Sentjurc Marjeta; Grosel Alenka; Cemazar Maja; Kranjc Simona; Sersa Gregor

    2005-01-01

    Abstract Background Bleomycin is poorly permeant but potent cytotoxic and radiosensitizing drug. The aim of the study was to evaluate whether a physical drug delivery system – electroporation can increase radiosensitising effect of bleomycin in vitro and in vivo. Methods LPB sarcoma cells and tumors were treated either with bleomycin, electroporation or ionizing radiation, and combination of these treatments. In vitro, response to different treatments was determined by colony forming assay, w...

  10. Preparation and Quality Control of Scandium-46 Bleomycin as a Possible Therapeutic Agent

    OpenAIRE

    Mohammad Ghannadi-Maragheh; Mohammad Mazidi; Ali Bahrami-Samani; Mohammadreza Pourjavid; Amir Reza Jalilian; Leila Moghaddam-Banaem

    2012-01-01

    Introduction: Due to interesting therapeutic properties of 46Sc and antineoblastic antibiotic, bleomycin (BLM), 46Sc-bleomycin (46Sc-BLM) was developed as a possible therapeutic compound. Methods: In this work, Sc-46 chloride was obtained by thermal neutron flux (4 × 1013 n.cm-2.s-1) of natural metallic scandium sample followed by dissolution in acidic media as a substitute for 47Sc in radiolabeling studies which was further used for labeling of bleomycin (BLM) followed by stability studies ...

  11. 89Strontium-induced bone marrow depression suppresses the early inflammatory response and fibrosis caused by intratracheal bleomycin

    International Nuclear Information System (INIS)

    To investigate the effect of bone marrow depression on the development of bleomycin-induced lung injury, F-344/Crl rats were given an intraperitoneal (IP) injection of 89SrCl2 (2 mCi/kg body weight) 7 days prior to the intratracheal (IT) instillation of 7.0 U/kg body weight bleomycin (Sr-bleomycin group). A second group of rats was given an IP injection of saline followed 7 days later by IT bleomycin (bleomycin group). Additional rats were given 89Sr IP and saline IT (Sr group) or saline IP and saline IT (saline group). Rats were sacrificed at 0, 3, 10, 21, and 30 days after the intratracheal instillations. 89Sr administration resulted in significantly lower numbers of circulating blood neutrophils and monocytes in the Sr-bleomycin group compared with the bleomycin group through at least the first 21 days following the IT instillations. Lymphocyte numbers were also depressed in the Sr-bleomycin group at days 3 and 21. Analysis of bronchoalveolar lavage fluid (BALF) revealed significantly reduced protein and lymphocyte numbers in the BALF from the 89Sr-bleomycin group compared with the bleomycin group at day 3, but not at later time points. Neutrophils in BALF were also lower (though not significantly) in the 89Sr-Bleomycin group at day 3. There was no difference in the number of BALF macrophages between the Sr-bleomycin and bleomycin groups at any time point throughout the study. Histology and morphometry showed the same trends as the BALF data with much less severe lesions in the 89SR-Bleomycin group compared with the bleomycin group at day 3, but not at later time points. At day 10, hydroxyproline values were significantly higher in the bleomycin group (47% increase above saline group) than the Sr-bleomycin group (only 18% increase above Sr group), but by day 21, there was no longer a significant difference between these two groups

  12. Pharmacology and therapeutic efficacy of bleomycin administered by continuous infusion

    International Nuclear Information System (INIS)

    A study was done at Memorial Hospital in which Bleomycin was given by continuous intravenous infusion to radiation therapy patients with a variety of far advanced unresectable malignant neoplastic diseases. Smaller doses than usual were administered initially, approximately 1/10 the dose that had been previously studied. The dose was gradually escalated when it was shown that there was no acute toxicity from the smaller dose. Bleomycin blood levels were measured by bioassay and pulmonary function was studied by measurement of total lung capacity and carbon monoxide diffusing capacity. In this study, therapeutic activity in cervix cancer appeared to be significantly better than in earlier studies by the same group of investigators. However, in vitro and animal studies in the author's own clinical pharmacologic studies support the logic of continuous intravenous administration in the effort to decrease pulmonary toxicity and to improve therapeutic effect

  13. Panax notoginseng Attenuates Bleomycin-Induced Pulmonary Fibrosis in Mice

    OpenAIRE

    Wei Chen; Min-Jen Tseng; Ting-Hui Lin; Chuen-Ming Shih; Ho-Yiu Wong; Jen-Chih Lee; Kuen-Daw Tsai; Shu-Mei Yang

    2011-01-01

    Panax notoginseng (PN) is a traditional Chinese herb experimentally proven to have anti-inflammatory effects, and it is used clinically for the treatment of atherosclerosis, cerebral infarction, and cerebral ischemia. This study aimed to determine the anti-inflammatory effects of PN against bleomycin-induced pulmonary fibrosis in mice. First, in an in vitro study, culture media containing lipopolysaccharide (LPS) was used to stimulate macrophage cells (RAW 264.7 cell line). TNF-? and IL-6 lev...

  14. Superoxide protects Escherichia coli from bleomycin mediated lethality

    OpenAIRE

    Burger, Richard M.; Drlica, Karl

    2009-01-01

    Superoxide and its products, especially hydroxyl radical, were recently proposed to be instrumental in cell death following treatment with a wide range of antimicrobials. Surprisingly, bleomycin lethality to Escherichia coli was ameliorated by a genetic deficiency of superoxide dismutase or by furnishing the superoxide generator plumbagin. Rescue by plumbagin was similar in strains containing or lacking recA or with inactive, inducible, or constitutive soxRS regulons. Thus, superoxide interfe...

  15. Antioxidant ability and radiosensitivity in malignant transformed human bronchial epithelial cell line BEP2D induced by ?-particle irradiation

    International Nuclear Information System (INIS)

    Objective: To investigate the antioxidant ability and radiosensitivity in the malignant transformed human bronchial epithelial cell line BEP2D induced by ?-particle exposure. Methods: Glutathione Peroxidase (GPX), Catalase (CAT) and Glutathione (GSH) assay kits were employed to detect GPX and CAT enzyme abilities and the levels of GSH in BEP2D, RH21 (passage 21 of ?-particle-irradiated BEP2D cells), and BERP35T-1 cells (derived from nude mice bearing malignant transformed cells generated from cells of passage 35 of ?-particle-irradiated BEP2D cells). MTT assay were used to test the growth rate of BEP2D, RH21 and BERP35T-1 cells treated with 0, 30, 60, 90, 120, and 150 ?moL/L H2O2. Colony-forming test and MTT assay were used to examine the cell survival fraction and the growth rate of BEP2D, RH21 and BERP35T-1 cells exposed to 0, 2, 4, and 8 Gy of ?-rays,respectively. Results: GPX and CAT enzyme activities in RH21 and BERP35T-1 cells were obviously lower than in BEP2D (t=5.75-67.92, P<0.05). CAT enzyme activity in BERP35T-1 was lower than that in RH21 cells (t=22.25, P<0.01). Compared to BEP2D cells, decreased level of GSH was detected in BERP35T-1 cells (t=7.76, P<0.05), but there was no change in RH21. After treatment with 30, 60, 90, 120, and 150 ?mol/L H2O2, the growth rates of BEP2D were all higher than those of BERP35T-1 cells (t=10.37-58.36, P<0.01). Meanwhile,the growth rates of BEP2D were all higher than those of RH21 cells after treatment with 60, 90, 120, and 150 ? mol/L H2O2 (t =29.90-84.68, P<0.01). In addition,compared to BEP2D cells,decreased cell survival fraction and growth rate of BERP35T-1 cells were observed after irradiation with 2, 4, and 8 Gy of y-rays (t=5.87-34.17, P<0.05). The cell survival fraction and growth rate of RH21 were all lower than those of BEP2D cells at 4 and 8 Gy post-irradiation (t=6.33- 45.00, P<0.05). Conclusion: The function of antioxidant system decreased in the ?-particle-induced transformed cells, which could contribute to the acceleration of cellular malignant transforming process and radiosensitivity. (authors)

  16. Trojan horse method applied to 9Be(p,?)6Li at astrophysical energies

    International Nuclear Information System (INIS)

    The low-energy bare-nucleus cross section for 9Be(p,?)6Li has been extracted by means of the Trojan horse method (THM) applied to the 2H(9Be, ?,6Li)n reaction at a beam energy of 9Be of 22.35 MeV. For the first time, we assume an intermediate process, 9Be+2H?9Be+p+n, and considered this process as one criterion of the quasifree condition. Accordingly, sequential decay processes were eliminated. The derived astrophysical S(E) factor for the two-body process 9Be(p,?)6Li is compared with that obtained from direct experiments. We have found good agreement between the two results, leading to an improved determination of the S(E) with S(0)=21.0±0.8 MeV b. Furthermore, the electron screening potential energy Ue=676±86 eV has also been extracted in a model-independent way by comparing the direct and THM data. The value is significantly higher than that predicted by current theoretical models, whereas it is lower than Ue?830 eV, which was extracted from direct measurements with inclusion of the Ec.m.=-23 keV subthreshold resonance

  17. Effects of intratracheal instillation of bleomycin on phospholipid synthesis in hamster lung tissue slices

    International Nuclear Information System (INIS)

    Bleomycin, an antineoplastic drug, is known to produce interstitial pulmonary fibrosis (IPF). As a result, it is commonly employed in various species to produce animal models of fibrosis. We have examined the uptake of [14C] acetate by lung slices and its incorporation into lipids in the slices at various times following intratracheal administration of a fibrogenic dose of bleomycin in hamsters. As compared to saline controls, bleomycin had no effect on [14C] acetate uptake at 4 and 7 days but it increased the uptake at 2 and 14 days after treatment. The incorporation of [14C] acetate into total lipid was significantly reduced to 44, 62, 62, and 75% of the control at 2, 4, 7, and 14 days after bleomycin treatment, respectively. The incorporation into lipid as a percentage of the uptake was 12.2 in control animals whereas in bleomycin-treated animals, it was 4.7, 8.0, 7.3, and 6.9 at the corresponding times. Separation of lipids into various fractions revealed that bleomycin treatment specifically inhibited the synthesis of phosphatidylcholine and neutral lipid at all times of the study. The synthesis of all other phospholipids except phosphatidylethanolamine was depressed at 2 days. The latter was, however, depressed at 7 and 14 days after bleomycin treatment. It was concluded from the present study that bleomycin treatment inhibits the synthesis of phospholipid and neutral lipid and this may eventually lead to decreased surfactant production

  18. Effects of intratracheal instillation of bleomycin on phospholipid synthesis in hamster lung tissue slices

    Energy Technology Data Exchange (ETDEWEB)

    Giri, S.N.

    1987-12-01

    Bleomycin, an antineoplastic drug, is known to produce interstitial pulmonary fibrosis (IPF). As a result, it is commonly employed in various species to produce animal models of fibrosis. We have examined the uptake of (/sup 14/C) acetate by lung slices and its incorporation into lipids in the slices at various times following intratracheal administration of a fibrogenic dose of bleomycin in hamsters. As compared to saline controls, bleomycin had no effect on (/sup 14/C) acetate uptake at 4 and 7 days but it increased the uptake at 2 and 14 days after treatment. The incorporation of (/sup 14/C) acetate into total lipid was significantly reduced to 44, 62, 62, and 75% of the control at 2, 4, 7, and 14 days after bleomycin treatment, respectively. The incorporation into lipid as a percentage of the uptake was 12.2 in control animals whereas in bleomycin-treated animals, it was 4.7, 8.0, 7.3, and 6.9 at the corresponding times. Separation of lipids into various fractions revealed that bleomycin treatment specifically inhibited the synthesis of phosphatidylcholine and neutral lipid at all times of the study. The synthesis of all other phospholipids except phosphatidylethanolamine was depressed at 2 days. The latter was, however, depressed at 7 and 14 days after bleomycin treatment. It was concluded from the present study that bleomycin treatment inhibits the synthesis of phospholipid and neutral lipid and this may eventually lead to decreased surfactant production.

  19. Mutation of p53 gene in human bronchial epithelial cells BEP2D induced by ?-particles

    International Nuclear Information System (INIS)

    Objective: To detect p53 gene mutation in BEP2D cells induced by ?-particles. Methods: Analysis of genomic DNA from the transformed cells using PCR amplification and single strand conformation polymorphism (SSCP). Results: SSCP and restriction enzyme analysis demonstrated a point mutation at codon 249 of tumor suppressor gene p53 which has been thought to be the 'hotspot' of mutation in transformation induced by ?-particles. Southern blot analysis showed a deletion in exon 5/6 of p53 gene, but there was no mutation in the exon 8/9 of p53 gene. Conclusion: p53 gene is the 'target' of DNA lesions induced by ?-particles. It plays an important role in the process of transformation of bronchial epithelial cells induced by ?-irradiation

  20. Nitric Oxide Mediates Bleomycin-induced Angiogenesis and Pulmonary Fibrosis via Regulation of VEGF.

    Science.gov (United States)

    Iyer, Anand Krishnan V; Ramesh, Vani; Castro, Carlos A; Kaushik, Vivek; Kulkarni, Yogesh M; Wright, Clayton A; Venkatadri, Rajkumar; Rojanasakul, Yon; Azad, Neelam

    2015-11-01

    Pulmonary fibrosis is a progressive lung disease hallmarked by increased fibroblast proliferation, amplified levels of extracellular matrix deposition and increased angiogenesis. Although dysregulation of angiogenic mediators has been implicated in pulmonary fibrosis, the specific rate-limiting angiogenic markers involved and their role in the progression of pulmonary fibrosis remains unclear. We demonstrate that bleomycin treatment induces angiogenesis, and inhibition of the central angiogenic mediator VEGF using anti-VEGF antibody CBO-P11 significantly attenuates bleomycin-induced pulmonary fibrosis in vivo. Bleomycin-induced nitric oxide (NO) was observed to be the key upstream regulator of VEGF via the PI3k/Akt pathway. VEGF regulated other important angiogenic proteins including PAI-1 and IL-8 in response to bleomycin exposure. Inhibition of NO and VEGF activity significantly mitigated bleomycin-induced angiogenic and fibrogenic responses. NO and VEGF are key mediators of bleomycin-induced pulmonary fibrosis, and could serve as important targets against this debilitating disease. Overall, our data suggests an important role for angiogenic mediators in the pathogenesis of bleomycin-induced pulmonary fibrosis. J. Cell. Biochem. 116: 2484-2493, 2015. © 2015 Wiley Periodicals, Inc. PMID:25919965

  1. Radiosensitising effect of electrochemotherapy with bleomycin in LPB sarcoma cells and tumors in mice

    International Nuclear Information System (INIS)

    Bleomycin is poorly permeant but potent cytotoxic and radiosensitizing drug. The aim of the study was to evaluate whether a physical drug delivery system – electroporation can increase radiosensitising effect of bleomycin in vitro and in vivo. LPB sarcoma cells and tumors were treated either with bleomycin, electroporation or ionizing radiation, and combination of these treatments. In vitro, response to different treatments was determined by colony forming assay, while in vivo, treatment effectiveness was determined by local tumor control (TCD50). Time dependence of partial oxygen pressure in LPB tumors after application of electric pulses was measured by electron paramagnetic oxyimetry. Electroporation of cells in vitro increased radiosensitising effect of bleomycin for 1.5 times, in vivo radiation response of tumors was enhanced by 1.9 fold compared to response of tumors that were irradiated only. Neither treatment of tumors with bleomycin nor application of electric pulses only, affected radiation response of tumors. Application of electric pulses to the tumors induced profound but transient reduction of tumor oxygenation. Although tumor oxygenation after electroporation partially restored at the time of irradiation, it was still reduced at the level of radiobiologically relevant hypoxia. Our study shows that application of electric pulses to cells and tumors increases radiosensitising effect of bleomycin. Furthermore, our results demonstrate that the radiobiologically relevant hypoxia induced by electroporation of tumors did not counteract the pronounced radiosensitising effect of electrochemotherapy with bleomycin

  2. Radiosensitising effect of electrochemotherapy with bleomycin in LPB sarcoma cells and tumors in mice

    Directory of Open Access Journals (Sweden)

    Sentjurc Marjeta

    2005-09-01

    Full Text Available Abstract Background Bleomycin is poorly permeant but potent cytotoxic and radiosensitizing drug. The aim of the study was to evaluate whether a physical drug delivery system – electroporation can increase radiosensitising effect of bleomycin in vitro and in vivo. Methods LPB sarcoma cells and tumors were treated either with bleomycin, electroporation or ionizing radiation, and combination of these treatments. In vitro, response to different treatments was determined by colony forming assay, while in vivo, treatment effectiveness was determined by local tumor control (TCD50. Time dependence of partial oxygen pressure in LPB tumors after application of electric pulses was measured by electron paramagnetic oxyimetry. Results Electroporation of cells in vitro increased radiosensitising effect of bleomycin for 1.5 times, in vivo radiation response of tumors was enhanced by 1.9 fold compared to response of tumors that were irradiated only. Neither treatment of tumors with bleomycin nor application of electric pulses only, affected radiation response of tumors. Application of electric pulses to the tumors induced profound but transient reduction of tumor oxygenation. Although tumor oxygenation after electroporation partially restored at the time of irradiation, it was still reduced at the level of radiobiologically relevant hypoxia. Conclusion Our study shows that application of electric pulses to cells and tumors increases radiosensitising effect of bleomycin. Furthermore, our results demonstrate that the radiobiologically relevant hypoxia induced by electroporation of tumors did not counteract the pronounced radiosensitising effect of electrochemotherapy with bleomycin.

  3. 57Co-bleomycin and 67Ga-citrate in detecting and staging lung cancer

    International Nuclear Information System (INIS)

    In the investigation of suspected lung cancer, bleomycin labelled with cobalt-57, and gallium-67 labelled with citrate are currently used to detect the primary tumour and to establish the presence of metastases in the lung hilum and mediastinum. A comparative study of these radiopharmaceuticals was performed in 63 patients with proved lung cancer. 57Co-bleomycin showed the primary tumour in 58 patients (92%) and 67Ga-citrate in 34 (54%) (p 57Co-bleomycin and 1.5 with 67Ga-citrate. Proved metastases in the hilum or the mediastinum were visualised with 57Co-bleomycin scintigraphy in 16 out of 18 patients (89%) and with 67Ga-citrate scintigraphy in only eight (45%) (p 57Co-bleomycin scintigraphy is more suitable for detecting and staging lung cancer than is 67Ga-citrate. 57Co-bleomycin is valuable in the detection of peripheral lesions, in which a pathological diagnosis is difficult to achieve, since a positive scintigram indicates malignancy. When 57Co-bleomycin scintigraphy suggests hilar or mediastinal metastases mediastinoscopy should be carried out; but when no metastases are apparent it is reasonable to proceed directly to thoracotomy without mediastinoscopy. (author)

  4. Effect of bleomycin and irradiation on G2 progression

    International Nuclear Information System (INIS)

    The interaction of bleomycin and x-irradiation on the induction of G2 delay in Chinese hamster ovary cells was investigated utilizing the mitotic selection procedure for cell cycle analysis. Following the addition of BLM, the number of cells selected in mitosis remained at control level for a refractory period and then decreased. The location of the transition point, i.e., the age in G2 at which cells become refractory to a progression blockade, was concentration-dependent, ranging from the S/G2 boundary at low concentrations to the G2/M boundary at high concentrations. Depending upon the concentration of the drug used and the duration of exposure, the mitotic rate either decreased to zero or else leveled off at some intermediate value and then recovered to the control level. The duration of BLM-induced division delay was thus dependent upon the concentration used and the duration of exposure. When cells were treated with pulses of bleomycin (10-500 ?g/ml) in addition to x-irradiation, the mitotic rate declined as with exposure to x-ray alone. However, the recovery from radiation-induced division delay and the subsequent reappearance of mitotic cells in the selection window was delayed until the cells had recovered from their BLM-induced division delay. This implies that, in contrast to the synergistic effects observed for cell lethality, BLM and radiation do not interact in the production of a progression blockade and the resultant division delay

  5. Synthesis of samarium binding bleomycin - a possible NCT radiosensitizer

    Energy Technology Data Exchange (ETDEWEB)

    Mendes, B.M., E-mail: bmm@cdtn.b [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil); Mendes, T.M.; Campos, T.P.R., E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil)

    2011-07-01

    Bleomycin (BLM) is a drug that has attractive features for the development of a new radiopharmaceutical, particularly with regard to neutron capture therapy (NCT) sensitized by Sm-149. It has the ability to chelate many metal ions. In vitro studies have shown that up to 78% of BLM present in a cell is accumulated inside the nucleus or in the nuclear membrane. In addition, this drug has higher affinity for tumor tissues than for normal tissues. Radioactive isotopes carried by this antibiotic would be taken preferentially to one important cellular targets DNA. Besides, BLM displays intrinsic anti-tumor activity - it is a chemotherapic antibiotic clinically used against some cancers. This study aimed to obtain bleomycin molecules bound to samarium (BLM-Sm) for NCT studies in vitro and in vivo. The binding technique employed in this work has great simplicity and low cost. Thin layer chromatography, high performance liquid chromatography, fast protein liquid chromatography and analysis by ICP-AES were applied to verify the binding molecule. ICP-AES results showed the presence of samarium in the sample peaks related to BLM-Sm. However, efficiency and stability of this bond needs to be investigated. (author)

  6. Synthesis of samarium binding bleomycin - a possible NCT radiosensitizer

    International Nuclear Information System (INIS)

    Bleomycin (BLM) is a drug that has attractive features for the development of a new radiopharmaceutical, particularly with regard to neutron capture therapy (NCT) sensitized by Sm-149. It has the ability to chelate many metal ions. In vitro studies have shown that up to 78% of BLM present in a cell is accumulated inside the nucleus or in the nuclear membrane. In addition, this drug has higher affinity for tumor tissues than for normal tissues. Radioactive isotopes carried by this antibiotic would be taken preferentially to one important cellular targets DNA. Besides, BLM displays intrinsic anti-tumor activity - it is a chemotherapic antibiotic clinically used against some cancers. This study aimed to obtain bleomycin molecules bound to samarium (BLM-Sm) for NCT studies in vitro and in vivo. The binding technique employed in this work has great simplicity and low cost. Thin layer chromatography, high performance liquid chromatography, fast protein liquid chromatography and analysis by ICP-AES were applied to verify the binding molecule. ICP-AES results showed the presence of samarium in the sample peaks related to BLM-Sm. However, efficiency and stability of this bond needs to be investigated. (author)

  7. No effect of pirfenidone treatment in fulminant bleomycin-induced pneumonitis

    Directory of Open Access Journals (Sweden)

    Elisabeth Bendstrup

    2014-01-01

    Full Text Available Bleomycin-induced pneumonitis (BIP is a serious and potentially fatal adverse effect of bleomycin. Currently, BIP is treated on an empirical basis with high dose steroid. Pirfenidone is a new antifibrotic drug, which has been proven beneficial in idiopathic pulmonary fibrosis and is able to inhibit or reverse BIP in animal models. Here, the first two cases of human BIP treated with pirfenidone in addition to steroid therapy are presented. Unfortunately, both patients died, which may be explained by the initiation of therapy at a late stage. Therefore, studies of early or prophylactic treatment with pirfenidone in relation to bleomycin-containing chemotherapy regimens are needed.

  8. No effect of pirfenidone treatment in fulminant bleomycin-induced pneumonitis

    OpenAIRE

    Bendstrup, Elisabeth; Hyldgaard, Charlotte; Agerbæk, Mads; Andersen, Charlotte U.; Hilberg, Ole

    2014-01-01

    Bleomycin-induced pneumonitis (BIP) is a serious and potentially fatal adverse effect of bleomycin. Currently, BIP is treated on an empirical basis with high dose steroid. Pirfenidone is a new antifibrotic drug, which has been proven beneficial in idiopathic pulmonary fibrosis and is able to inhibit or reverse BIP in animal models. Here, the first two cases of human BIP treated with pirfenidone in addition to steroid therapy are presented. Unfortunately, both patients died, which may be expla...

  9. Preventing cleavage of Mer promotes efferocytosis and suppresses acute lung injury in bleomycin treated mice

    International Nuclear Information System (INIS)

    Mer receptor tyrosine kinase (Mer) regulates macrophage activation and promotes apoptotic cell clearance. Mer activation is regulated through proteolytic cleavage of the extracellular domain. To determine if membrane-bound Mer is cleaved during bleomycin-induced lung injury, and, if so, how preventing the cleavage of Mer enhances apoptotic cell uptake and down-regulates pulmonary immune responses. During bleomycin-induced acute lung injury in mice, membrane-bound Mer expression decreased, but production of soluble Mer and activity as well as expression of disintegrin and metalloproteinase 17 (ADAM17) were enhanced . Treatment with the ADAM inhibitor TAPI-0 restored Mer expression and diminished soluble Mer production. Furthermore, TAPI-0 increased Mer activation in alveolar macrophages and lung tissue resulting in enhanced apoptotic cell clearance in vivo and ex vivo by alveolar macrophages. Suppression of bleomycin-induced pro-inflammatory mediators, but enhancement of hepatocyte growth factor induction were seen after TAPI-0 treatment. Additional bleomycin-induced inflammatory responses reduced by TAPI-0 treatment included inflammatory cell recruitment into the lungs, levels of total protein and lactate dehydrogenase activity in bronchoalveolar lavage fluid, as well as caspase-3 and caspase-9 activity and alveolar epithelial cell apoptosis in lung tissue. Importantly, the effects of TAPI-0 on bleomycin-induced inflammation and apoptosis were reversed by coadministration of specific Mer-neutralizing antibodies. These findings suggest that restored membrane-bound Mer expression by TAPI-0 treatment may help resolve lung inflammation and apoptosis after bleomycin treatment. -- Highlights: ?Mer expression is restored by TAPI-0 treatment in bleomycin-stimulated lung. ?Mer signaling is enhanced by TAPI-0 treatment in bleomycin-stimulated lung. ?TAPI-0 enhances efferocytosis and promotes resolution of lung injury.

  10. Preventing cleavage of Mer promotes efferocytosis and suppresses acute lung injury in bleomycin treated mice

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Ye-Ji [Department of Physiology, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Tissue Injury Defense Research Center, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Lee, Seung-Hae [Department of Physiology, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Youn, Young-So; Choi, Ji-Yeon [Department of Physiology, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Tissue Injury Defense Research Center, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Song, Keung-Sub [Department of Physiology, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Cho, Min-Sun [Department of Pathology, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Kang, Jihee Lee, E-mail: jihee@ewha.ac.kr [Department of Physiology, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of); Tissue Injury Defense Research Center, School of Medicine, Ewha Womans University, Seoul (Korea, Republic of)

    2012-08-15

    Mer receptor tyrosine kinase (Mer) regulates macrophage activation and promotes apoptotic cell clearance. Mer activation is regulated through proteolytic cleavage of the extracellular domain. To determine if membrane-bound Mer is cleaved during bleomycin-induced lung injury, and, if so, how preventing the cleavage of Mer enhances apoptotic cell uptake and down-regulates pulmonary immune responses. During bleomycin-induced acute lung injury in mice, membrane-bound Mer expression decreased, but production of soluble Mer and activity as well as expression of disintegrin and metalloproteinase 17 (ADAM17) were enhanced . Treatment with the ADAM inhibitor TAPI-0 restored Mer expression and diminished soluble Mer production. Furthermore, TAPI-0 increased Mer activation in alveolar macrophages and lung tissue resulting in enhanced apoptotic cell clearance in vivo and ex vivo by alveolar macrophages. Suppression of bleomycin-induced pro-inflammatory mediators, but enhancement of hepatocyte growth factor induction were seen after TAPI-0 treatment. Additional bleomycin-induced inflammatory responses reduced by TAPI-0 treatment included inflammatory cell recruitment into the lungs, levels of total protein and lactate dehydrogenase activity in bronchoalveolar lavage fluid, as well as caspase-3 and caspase-9 activity and alveolar epithelial cell apoptosis in lung tissue. Importantly, the effects of TAPI-0 on bleomycin-induced inflammation and apoptosis were reversed by coadministration of specific Mer-neutralizing antibodies. These findings suggest that restored membrane-bound Mer expression by TAPI-0 treatment may help resolve lung inflammation and apoptosis after bleomycin treatment. -- Highlights: ?Mer expression is restored by TAPI-0 treatment in bleomycin-stimulated lung. ?Mer signaling is enhanced by TAPI-0 treatment in bleomycin-stimulated lung. ?TAPI-0 enhances efferocytosis and promotes resolution of lung injury.

  11. Intercellular Adhesion Molecule-1 and L-Selectin Regulate Bleomycin-Induced Lung Fibrosis

    OpenAIRE

    Hamaguchi, Yasuhito; Nishizawa, Yoriko; Yasui, Masahide; Hasegawa, Minoru; Kaburagi, Yuko; Komura, Kazuhiro; Nagaoka, Tetsuya; Saito, Eriko; Shimada, Yuka; Takehara, Kazuhiko; Kadono, Takafumi; Douglas A. Steeber; Tedder, Thomas F; Sato, Shinichi

    2002-01-01

    The development of bleomycin-induced lung injury, a model of pulmonary fibrosis, results from inflammatory cell infiltration, a process highly regulated by the expression of multiple adhesion molecules. At present, the identity and role of the adhesion molecules involved in the fibrotic process are unknown. Therefore, bleomycin-induced pulmonary fibrosis was examined in mice lacking L-selectin (L-selectin?/?) expression, intercellular adhesion molecule-1 (ICAM-1) expression, or both. After 16...

  12. Increased and Prolonged Pulmonary Fibrosis in Surfactant Protein C-Deficient Mice Following Intratracheal Bleomycin

    OpenAIRE

    Lawson, William E; Polosukhin, Vasiliy V.; Stathopoulos, Georgios T.; Zoia, Ornella; Wei HAN; Lane, Kirk B.; Li, Bo; Donnelly, Edwin F.; Holburn, George E.; Lewis, Kenneth G.; Collins, Robert D.; Hull, William M.; Glasser, Stephan W.; Whitsett, Jeffrey A; Blackwell, Timothy S

    2005-01-01

    Recent reports have linked mutations in the surfactant protein C gene (SFTPC) to familial forms of pulmonary fibrosis, but it is uncertain whether deficiency of mature SP-C contributes to disease pathogenesis. In this study, we evaluated bleomycin-induced lung fibrosis in mice with genetic deletion of SFTPC. Compared with wild-type (SFTPC+/+) controls, mice lacking surfactant protein C (SFTPC?/?) had greater lung neutrophil influx at 1 week after intratracheal bleomycin, greater weight loss d...

  13. Different Cell Viability Assays Reveal Inconsistent Results After Bleomycin Electrotransfer In Vitro.

    Science.gov (United States)

    Jakštys, Baltramiejus; Ruzgys, Paulius; Tamoši?nas, Mindaugas; Šatkauskas, Saulius

    2015-10-01

    The aim of this study was to compare different and commonly used cell viability assays after CHO cells treatment with anticancer drug bleomycin (20 nM), high voltage (HV) electric pulses (4 pulses, 1200 V/cm, 100 µs, 1 Hz), and combination of bleomycin and HV electric pulses. Cell viability was measured using clonogenic assay, propidium iodide (PI) assay, MTT assay, and employing flow cytometry modality to precisely count cells in definite volume of the sample (flow cytometry assay). Results showed that although clonogenic cell viability drastically decreased correspondingly to 57 and 3 % after cell treatment either with HV pulses or combination of bleomycin and HV pulses (bleomycin electrotransfer), PI assay performed ~15 min after the treatments indicated nearly 100 % cell viability. MTT assay performed at 6-72 h time points after these treatments revealed that MTT cell viability is highly dependent on evaluation time point and decreased with later evaluation time points. Nevertheless, in comparison to clonogenic cell viability, MTT cell viability after bleomycin electrotransfer at all testing time points was significantly higher. Flow cytometry assay if used at later times, 2-3 days after the treatment, allowed reliable evaluation of cell viability. In overall, our results showed that in order to estimate cell viability after cell treatment with combination of the bleomycin and electroporation the most reliable method is clonogenic assay. Improper use of PI and MTT assays can lead to misinterpretation of the experimental results. PMID:26077843

  14. Differential expression of extracellular matrix remodeling genes in a murine model of bleomycin-induced pulmonary fibrosis.

    OpenAIRE

    Swiderski, R. E.; Dencoff, J. E.; Floerchinger, C. S.; Shapiro, S. D.; Hunninghake, G.W.

    1998-01-01

    Exposure to the chemotherapeutic drug bleomycin leads to pulmonary fibrosis in humans and has been widely used in animal models of the disease. Using C57BL/6 bleomycin-sensitive mice, pulmonary fibrosis was induced by multiple intraperitoneal injections of the drug. An increase in the relative amounts of steady-state alpha1(I) procollagen, alpha1(III) procollagen, and fibronectin mRNA as well as histopathological evidence of fibrosis was observed. The effect of bleomycin on the expression of ...

  15. Statistical theory of light nucleus reaction and application to $^9$Be(p, xn) reaction

    CERN Document Server

    Sun, Xiaojun

    2015-01-01

    A statistical theory of light nucleus reaction (STLN) is proposed to describe both neutron and light charged particle induced nuclear reactions with 1p-shell light nuclei involved. The dynamic of STLN is described by the unified Hauser-Feshbach and exciton model, of which the angular momentum and parity conservations are considered in equilibrium and pre-equilibrium processes. The Coulomb barriers of the incident and outgoing charged particles, which seriously influence the open reaction channels, could be reasonably considered in the incident channel and the different outgoing channels. In kinematics, the recoiling effects in various emission processes are taken strictly into account. Taking $^9$Be(p, xn) reaction as an example, we calculate the double-differential cross sections of outgoing neutrons and charged particles using PUNF code in the frame of STLN. The calculated results agree very well with the existing experimental neutron double-differential cross sections at $E_p=18$ MeV, and indicate that PUN...

  16. Amelioration of Bleomycin-induced Pulmonary Fibrosis of Rats by an Aldose Reductase Inhibitor, Epalrestat.

    Science.gov (United States)

    Li, Xianwei; Shen, Yuanyuan; Lu, Yining; Yang, Jieren

    2015-09-01

    Aldose reductase (AR) is known to play a crucial role in the mediation of diabetic and cardiovascular complications. Recently, several studies have demonstrated that allergen-induced airway remodeling and ovalbumin-induced asthma is mediated by AR. Epalrestat is an aldose reductase inhibitor that is currently available for the treatment of diabetic neuropathy. Whether AR is involved in pathogenesis of pulmonary fibrosis and whether epalrestat attenuates pulmonary fibrosis remains unknown. Pulmonary fibrosis was induced by intratracheal instillation of bleomycin (5 mg/kg) in rats. Primary pulmonary fibroblasts were cultured to investigate the proliferation by BrdU incorporation method and flow cytometry. The expression of AR, TGF-?1, ?-SMA and collagen I was analyzed by immunohistochemisty, real-time PCR or western blot. In vivo, epalrestat treatment significantly ameliorated the bleomycin-mediated histological fibrosis alterations and blocked collagen deposition concomitantly with reversing bleomycin-induced expression up-regulation of TGF-?1, AR, ?-SMA and collagen I (both mRNA and protein). In vitro, epalrestat remarkably attenuated proliferation of pulmonary fibroblasts and expression of ?-SMA and collagen I induced by TGF-?1, and this inhibitory effect of epalrestat was accompanied by inhibiting AR expression. Knockdown of AR gene expression reversed TGF-?1-induced proliferation of fibroblasts, up-regulation of ?-SMA and collagen I expression. These findings suggest that AR plays an important role in bleomycin-induced pulmonary fibrosis, and epalrestat inhibited the progression of bleomycin-induced pulmonary fibrosis is mediated via inhibiting of AR expression. PMID:26330752

  17. Treatment of hypovascular hepatic cavernous hemangiomas by percutaneous intratumoral bleomycin injection after selective hepatic arterial embolization

    International Nuclear Information System (INIS)

    Objective: To assess the safety and effectiveness of treatment of cavernous hemangiomas of liver(CHL) by percutaneous intratumoral bleomycin injection after transarterial embolization (TAE). Methods: 9 cases of hypovascular CHL treated by percutaneous intratumoral bleomycin injection after TAE were studied prospectively. All the cases were diagnosed as hypovascular CHL(diameter > 5 cm) by CT/MRI. With only spotty or few patchy enhancement in arterial phase persisting into the delayed phase were shown on enhanced CT. TAE with emulsion of ultra-fluid lipiodol(10 ml) and bleomycin(8 mg) was performed in every patient, with dosage of 5-10 ml depending on the vascular space of different lesions. Percutaneous intratumoral multi- point injection with bleomycin (8-16 mg) solution was undertaken 4 days after TAE, and repeated every 3-4 days for 2-3 times. Each case undertook upper abdominal CT scan 1 month later, and then with 3, 6 month to 1 year periodic follow-up. Results: DSA features of all the 9 cases demonstrated as same as those on enhanced CT scanning with dispersion of lipiodol within the lesions. All the lesions decreased in volume markedly 1 month after the therapy, and kept on until 1 year later. 2 patients developed post-TAE acute cholecystitis and one intrahepatic biloma. Conclusion: TAE combined with percutaneous intra-tumoral bleomycin injection is a safe and effective method in treating hypovascular CHL. (authors)

  18. 111In-bleomycin breast and axilla imaging

    International Nuclear Information System (INIS)

    111Indium-Bleomycin (111In-Blm), a new radiopharmaceutical, was administered intravenously to 37 patients with benign and malignant breast lesions. Early and delayed images of both the breasts and axillae were made, and results were correlated with physical examination, histopathology of the excised lesion, mammography, and thermography. In 18 patients with malignant disease, clinical examination of the breast and axilla correlated with histopathology in 78 and 54 percent of the cases, respectively. Images of the breast were accurate (true positives) in 83 percent of the cases. Images of the axilla were accurate in 62 percent of the cases. Mammography was correct and suggested malignancy in 88 percent, and thermography in 73 percent of the cases. In 19 patients with benign breast lesions, clinical examination of the breast and axilla correlated with histopathology in 68 and 95 percent of the cases, respectively. Scans of the breast and axilla were correct (true negative) 79 and 95 percent of the time, respectively. Mammography was correct, and suggested benignancy, in 53 percent and thermography in 25 percent of the cases. Imaging of the breasts using 111In-Blm appears to be as accurate as physical examination and mammography for palpable benign and malignant breast tumors

  19. Labelling of bleomycin with cobalt-57, indium-111, technetium-99m, mercury-197, lead-203, and copper-67

    International Nuclear Information System (INIS)

    The radiochemical purity of the cobalt-57 complex of bleomycin could be enhanced by adjusting the pH of the final product to a value between 5 and 6. This radiopharmaceutical appeared to have better tumor visualizing properties compared to the not neutralized preparation. The clinical use of the cobalt-57 bleomycin complex is however limited by the long physical half-life of the label, causing a risk of radioactive contamination. It appeared to be possible to label bleomycin with radioactive cations (111In3+, sup(99m)Tc4+, 197Hg2+ and 67Cu2+) having suitable gamma ray energies and short half-lifes. These bleomycin complexes showed a high radiochemical purity judged by their behaviour on thin layer chromatography, paper chromatography, and electrophoresis, but their application as tumor visualizing radiopharmaceutical turned out to be disappointing compared with cobalt-57 bleomycin. (orig.)

  20. The effect of bleomycin on DNA synthesis in ataxia telangiectasia lymphoid cells

    International Nuclear Information System (INIS)

    Bleomycin, a radiomimetic glycopeptide, inhibits de novo DNA synthesis in ataxia telangiectasia lymphoblastoid B cells to a markedly lesser extent than in normal and xeroderma pigmentosum lymphoid cells. This observation is similar to that following ionizing radiation; however, the effect is slower following the chemical treatment. Recovery of the normal cells occurs 15-18 hours after treatment, whereas the ataxia telangiectasia lines do not attain normal levels of DNA synthesis during the entire 24-hour observation period. Similar differences were not observed following treatment with mitomycin C, a bifunctional alkylating agent, indicating a specific effect of bleomycin on DNA synthesis in ataxia telangiectasia cells. Following bleomycin treatment and preincubation with hydroxyurea, residual DNA synthesis in ataxia telangiectasia cells was similar to that in both normal and xeroderma pigmentosum lymphoid lines, suggesting that the capacity to repair the induced DNA lesion is present

  1. Pulmonary complications of irradiation and bleomycin after radical surgery for esophageal cancer

    International Nuclear Information System (INIS)

    From 1978 to 1980, 52 patients underwent radical surgery for esophageal cancer, and they given radiotherapy of 300-500 rads and/or 50-100 mg of bleomycin prophylatically during the postoperative period. Of the total cases, five patients developed acute interstitial pneumonitis. All cases were controlled successfully by the administration of prednisolone, but one patient died of a complication of systemic aspergillosis. Pneumonitis occurred during the early course of irradiation, i.e.two cases during irradiation and one cases three days after irradiation. Pneumonitis also occurred with a low dose of bleomycin (70 mg) in two cases. Clinical signs of radiation pneumonitis were more severe in cases of esophageal cancer than in cases of lung cancer and breast cancer as had been previously reported. These results suggest that surgery for esophageal cancer tends to sensitize the lung and leads to pulmonary complications after radiotherapy and chemotherapy employing bleomycin. (author)

  2. Enhanced pulmonary toxicity with bleomycin and radiotherapy in oat cell lung cancer

    International Nuclear Information System (INIS)

    In a recently completed study, combination chemotherapy consisting of bleomycin, adriamycin, cyclophosphamide, and vincristine was given to 29 patients with oat cell lung cancer. There were no cases of pulmonary fibrosis in these 29 patients. Although several of these patients had prior radiotherapy, none had concomitant radiotherapy and chemotherapy. This same four-drug chemotherapy regimen was combined with concomitant radiotherapy in 13 patients with oat cell lung cancer. There were three cases of fatal pulmonary fibrosis and two other cases of clinically significant pulmonary fibrosis. All five cases of pulmonary fibrosis occurred several weeks after completion of a six-week course of bleomycin (total dosage 90 units). It is concluded that bleomycin cannot be safely administered while patients are receiving radiotherapy of the lung

  3. Contribution of cobalt 57 labelled bleomycin in the diagnosis of pulmonary round intraparenchymatous lesions

    International Nuclear Information System (INIS)

    One hundred and eleven patients with a round lesion within the lung parenchyma were submitted to a lung scan using cobalt 57 labelled bleomycin. In all cases, the diagnosis of benign or malignant disease was made definitely by bronchoscopy, fiber endoscopy, transparietal needle biopsy or thoracotomy. Out of 89 neoplasic foci, 87 took up labelled bleomycin with a fixation ratio greater than 13. On the other hand, the 22 benign round foci, except for the large silico-tuberculous nodule, remained silent on radio-isotope scanning. The great value of scanning using cobalt 57 labelled bleomycin in the detection of the malignant or benign nature of round images within the lung is emphasized, the clinical and radiological pre-operative diagnosis remains one of the most difficult in lung disease problems

  4. Enhanced cough reflex in a model of bleomycin-induced lung fibrosis in guinea pigs.

    Science.gov (United States)

    Fernández-Blanco, Joan Antoni; Aguilera, Mònica; Domènech, Anna; Tarrasón, Gema; Prats, Neus; Miralpeix, Montse; De Alba, Jorge

    2015-12-01

    Fibrotic lung diseases, such as idiopathic pulmonary fibrosis, are associated with spontaneous dry cough and hypersensitivity to tussive agents. Understanding the pathophysiology driving enhanced cough may help us to define better therapies for patients. We hypothesized that lung fibrosis induced by intratracheal bleomycin would exacerbate the cough reflex induced by tussive agents in guinea pigs. Disease progression in the lungs was characterized at days 1, 7, 14, 21 and 28 after bleomycin administration. Inflammatory and fibrotic markers, as well as neurotrophin levels, were assessed in bronchoalveolar lavage fluid and/or lung tissue. Cough sensitivity to citric acid, capsaicin and allylisothiocyanate was evaluated in conscious animals at days 14 and 21 after bleomycin administration. Pulmonary lesions evolved from an early inflammatory phase (from day 1 to day 7) to a fibrotic stage (between days 14 and 28). Fibrosis was related to increased levels of matrix metalloproteinase-2 in bronchoalveolar lavage fluid (day 21: saline, 0.26 ng/ml; bleomycin, 0.49 ng/ml). At day 14, we also observed increased cough reflexes to citric acid (163%), capsaicin (125%) and allylisothiocyanate (178%). Cough exacerbation persisted, but at a lower extent, by day 21 for capsaicin (100%) and allylisothiocyanate (54%). Moreover, bronchoalveolar lavage fluid concentrations of brain-derived neurotrophic factor, suggested to induce nerve remodelling in chronic cough, were also enhanced (day 1: saline, 14.21 pg/ml; bleomycin, 30.09 pg/ml). In summary, our model of bleomycin-induced cough exacerbation may be a valuable tool to investigate cough hypersensitivity and develop antitussive therapies for fibrotic lung diseases. PMID:26275723

  5. Changes in pulmonary surfactant function and composition in bleomycin-induced pneumonitis and fibrosis

    International Nuclear Information System (INIS)

    Bleomycin is a widely accepted cancer drug but may induce life-threatening interstitial lung disease in a subset of patients. We evaluated the effect of bleomycin administration on pulmonary surfactant function and composition in rabbit lungs. In order to obtain a uniform response to bleomycin, aerosol technology was employed for bronchoalveolar delivery of 1.8 U/kg b.w. bleomycin. On days 4, 8, 16, 24, 32, and 64 after challenge, bronchoalveolar lavages were performed. Sham-aerosolized rabbits served as controls. In the early acute respiratory distress syndrome (ARDS)-like post-bleomycin period (4-16 days), marked loss of surface activity of the large surfactant aggregate (LA) fraction of surfactant was noted. In parallel, reduced percentages of LA, but only minor changes in surfactant apoproteins (SP)-A, SP-B, and SP-C, were encountered. Analysis of the surfactant lipid profile showed impressively enhanced cholesterol and significantly decreased phosphatidylglycerol (PG) levels. The relative content of dipalmitoyl-PC (DPPC) was slightly increased, and a several-fold increase within the 1-O-alkyl-2-acyl subclass of PC was observed. During the prolonged fibroproliferative period, a highly significant downregulation of SP-B and SP-C levels was observed. This was paralleled by an upregulation of the total extracellular phospholipid pool, with a far-reaching normalization of the (phospho)-lipid profile. The biophysical surfactant function never fully normalized within the 64-day observation period. In conclusion, bleomycin caused marked abnormalities of pulmonary surfactant, with the profile of changes being different between the early ARDS and the late fibrotic phase

  6. Diagnostic potentialities of gamma-topography with 111In-bleomycin in malignant orbital tumors

    International Nuclear Information System (INIS)

    Despite the fact that 111-indium-bleomycin is not an absolute tumorotropic RP, the results of the investigation have shown that its use is of great diagnostic importance for the recognition of orbital tumors and for the evaluation of their dissemination. True-positive results of gamma-topography were noted in 90% of cases. In some cases 111-indium-bleomycin permitted differential diagnosis between certain tumor types and inflammatory orbital processes. This RP was mainly accumulated in lymphosarcoma, primary and secondary orbital melonoma

  7. Effects of radiotherapy combined with daily intramuscular injection of bleomycin for uterine cervical cancer

    International Nuclear Information System (INIS)

    A total of 103 cases of cancer of the uterine cervix, untreated previously, were treated with radiotherapy combined with daily intramuscular injection of Bleomycin 30 minutes before irradiation (BR therapy) in 12 institutions. Result showed that especially in cases of stage III, BR therapy was superior in primary local control rate (89.6%), recurrence rate (20.8%) and crude 5-year survival rate (56.5%) to that of nationwide statistics. No severe side effects were found. It was concluded that external radiotherapy could control advanced cancers of uterine cervix combining with intramuscular injection of Bleomycin. (author)

  8. Evaluation of cold areas on the thyroid scan with sup(99m)Tc-bleomycin

    International Nuclear Information System (INIS)

    The value of sup(99m)Tc-bleomycin scintigraphy in the evaluation of cold areas on a sup(99m)Tc-pertechnetate scan was investigated in 35 patients. A histological diagnosis was obtained in 31 patients. Only one of the six malignant lesions was considered as positive and two as doubtful. Of the remaining 25 patients with non-toxic colloid goitre, one was clearly positive and four were doubtful. These results indicate that sup(99m)Tc-bleomycin scintigraphy is not a valuable procedure in the further evaluation of patients with cold lesions. (orig.)

  9. Long term follow-up in patients with a naso-pharynx carcinoma after induction chemotherapy by cisplatin, 5-fluoro-uracil and bleomycin (pbf) followed by a bi-fractionated radiotherapy and a consolidation chemotherapy

    International Nuclear Information System (INIS)

    The purpose of this study was to evaluate the efficiency and the long term survival after neoadjuvant chemotherapy by cisplatin, 5-fluoro-uracil and bleomycin, followed by a bi fractionated radiotherapy and an adjuvant chemotherapy. The protocol associating a P.B.F. type chemotherapy in the locally evolved disease is justified by its efficiency in terms of objective response rate and local control rate, that expressed by an improvement of the global survival rate and survival without disease at five and ten years. The adjuvant chemotherapy is very toxic and did not show any benefit. (N.C.)

  10. Oral N-acetylcysteine reduces bleomycin-induced lung damage and mucin Muc5ac expression in rats.

    Science.gov (United States)

    Mata, M; Ruíz, A; Cerdá, M; Martinez-Losa, M; Cortijo, J; Santangelo, F; Serrano-Mollar, A; Llombart-Bosch, A; Morcillo, E J

    2003-12-01

    Oxidative stress is involved in the pathogenesis of pulmonary fibrosis, therefore antioxidants may be of therapeutic value. Clinical work indicates that N-acetylcysteine (NAC) may be beneficial in this disease. The activity of this antioxidant was examined on bleomycin-induced lung damage, mucus secretory cells hyperplasia and mucin Muc5ac gene expression in rats. NAC (3 mmol x kg(-1) x day(-1)) or saline was given orally to Sprague-Dawley rats for 1 week prior to a single intratracheal instillation of bleomycin (2.5 U x kg(-1)) and for 14 days postinstillation. NAC decreased collagen deposition in bleomycin-exposed rats (hydroxyproline content was 4,257+/-323 and 3,200+/-192 microg x lung(-1) in vehicle- and NAC-treated rats, respectively) and lessened the fibrotic area assessed by morphometric analysis. The bleomycin-induced increases in lung tumour necrosis factor-alpha and myeloperoxidase activity were reduced by NAC treatment. The numbers of mucus secretory cells in airway epithelium, and the Muc5ac messenger ribonucleic acid and protein expression, were markedly augmented in rats exposed to bleomycin. These changes were significantly reduced in NAC-treated rats. These results indicate that bleomycin increases the number of airway secretory cells and their mucin production, and that oral N-acetylcysteine improved pulmonary lesions and reduced the mucus hypersecretion in the bleomycin rat model. PMID:14680076

  11. Effects of a combined Bleomycin/radiotherapy on the increase of cell numbers in Ehrlich ascitic carcinoma

    International Nuclear Information System (INIS)

    The effects of separate and combined application of the cytostatic Bleomycin and X-radiation on the multiplication of the Ehrlich ascitic tumour cells in vivo and on the survival time of tumourous mice was examined by applying automatic, electronic cell counting. If this cytostatic is administered alone up to 100 mg/kg the growth curve of the EAT-cells shows, after a 24 hours' delay, hardly any difference to that of untreated tumour cells. The separate administration of such Bleomycin doses and the separate X-radiation of the EAT cells with doses of up to 1000 rad had no significant influence on the survival time of tumourous mice. The combined application of Bleomycin and X-radiation elongates the 50%-survival time of the tumourous mice. If the X-radiation takes place 12 hours after the Bleomycin treatment the animals survive longer than is the case with simultaneous treatment. Although no dose effect curves could be set up the results obtained let assume a synergistic effect of Bleomycin and irradiation which is especially significant if the radiation is carried out 12 hours after a Bleomycin treatment. The reasons of this are assumed to lie in the increased radiation sensitivity of the tumour cells caused by the bleomycin-induced partial synchronisation of the EAT cells. (orig.)

  12. Effects of turmeric and its active principle, curcumin, on bleomycin-induced chromosome aberrations in Chinese hamster ovary cells

    Directory of Open Access Journals (Sweden)

    Araújo Maria Cristina P.

    1999-01-01

    Full Text Available Naturally occurring antioxidants have been extensively studied for their capacity to protect organisms and cells from oxidative damage. Many plant constituents including turmeric and curcumin appear to be potent antimutagens and antioxidants. The effects of turmeric and curcumin on chromosomal aberration frequencies induced by the radiomimetic agent bleomycin (BLM were investigated in Chinese hamster ovary (CHO cells. Three concentrations of each drug, turmeric (100, 250 and 500 mg/ml and curcumin (2.5, 5 and 10 mg/ml, were combined with BLM (10 mg/ml in CHO cells treated during the G1/S, S or G2/S phases of the cell cycle. Neither turmeric nor curcumin prevented BLM-induced chromosomal damage in any phases of the cell cycle. Conversely, a potentiation of the clastogenicity of BLM by curcumin was clearly observed in cells treated during the S and G2/S phases. Curcumin was also clastogenic by itself at 10 µg/ml in two protocols used. However, the exact mechanism by which curcumin produced clastogenic and potentiating effects remains unknown.

  13. Studies on bleomycin-induced repair DNA synthesis in permeable mouse ascites sarcoma cells.

    Directory of Open Access Journals (Sweden)

    Mori,Shigeru

    1989-04-01

    Full Text Available To study the mechanism of DNA excision repair, a DNA repair system employing permeable mouse sarcoma (SR-C3H/He cells was established and characterized. SR-C3H/He cells were permeabilized with a 0.0175% Triton X-100 solution. The permeable cells were treated with 1 mM ATP and 0.11 mM bleomycin, and then washed thoroughly to remove ATP and bleomycin. Repair DNA synthesis occurred in the bleomycin-damaged, permeable SR-C3H/He cells when incubated with ATP and four deoxyribonucleoside triphosphates. The repair nature of the DNA synthesis was confirmed by the BrdUMP density shift technique, and by the reduced sensitivity of the newly synthesized DNA to Escherichia coli exonuclease III. The DNA synthesis was optimally enhanced by addition of 0.08 M NaCl. Studies using selective inhibitors of DNA synthesis showed that aphidicolin-sensitive DNA polymerase (DNA polymerase alpha and/or delta and DNA polymerase beta were involved in the repair process. The present DNA repair system is thought to be useful to study nuclear DNA damage by bleomycin, removal of the damaged ends by an exonuclease, repair DNA synthesis by DNA polymerases and repair patch ligation by DNA ligase(s.

  14. Comparison of gamma radiation and radiomimmetic chemical, bleomycin in leukocytes from certain genetic disorders

    International Nuclear Information System (INIS)

    Full text: To compare the frequency and distribution pattern of bleomycin and gamma radiation induced chromosomal aberrations in human genetic disorders. To study if the induced chromosomal break points are specific for specific human genetic disorders. Human genetics disorders such as; retinitis pigmentosa, retinoblastoma, xeroderma pigmentosa and gonadal dysgenesis were used in our study. Suitable controls were maintained. The frequency and distribution pattern of chromosomal break points in individual chromosomes were determined in lymphocytes exposed to 50r of gamma radiation and 10?g/ml of bleomycin for 3h at G2. In normal individuals none of the unirradiated leukocyte cultures of any syndrome showed any accountable number of chromosomal aberrations. The frequency of radiation induced chromosomal break points showed a non random distribution pattern and frequently clustered at some specific chromosome regions to form hot spots. Lack of linear-quadratic dose response was observed in the lymphocyte exposed to bleomycin in normal individual. The frequency of chromosomal aberrations in the whole genome for the genetic disorders were higher than the controls and a varying distribution pattern of bleomycin induced breaks per cell was observed

  15. Study of the reactions 9Be(p, ?)6Li, 9Be(p,d)8Be from 300 keV to 900 keV

    International Nuclear Information System (INIS)

    The experimental results concerning the two reactions 9Be(p,?)6Li and 9Be(p,d)8Be from 300 to 900 keV are presented. The angular distribution, excitation and total cross-section curves are expressed in absolute values after a normalization carried out using results given by Weber, Davis and Marion. (authors)

  16. 2-methoxyestradiol attenuates bleomycin-induced pulmonary hypertension and fibrosis in estrogen-deficient rats.

    Science.gov (United States)

    Tofovic, Stevan P; Zhang, Xinchen; Jackson, Edwin K; Zhu, Hong; Petrusevska, Gordana

    2009-01-01

    Pulmonary hypertension (PH) is a common and life-threatening complication of pulmonary fibrosis. Estradiol (E2) is protective in experimental PH, and its non-estrogenic metabolite 2-methoxyestradiol (2ME) prevents the development and retards the progression of monocrotaline-induced PH in male and female rats. However, the effects of E2 and 2ME on pulmonary fibrosis and associated PH have not been examined. Therefore, we compared the growth inhibitory effects of E2 and 2ME in human lung fibroblasts (hLFs) and pulmonary vascular smooth muscle cells (hPASMCs), and we investigated the effects of estrogen deficiency and 2ME on bleomycin-induced pulmonary fibrosis and PH. Intact and ovariectomized (OVX) female Sprague-Dawley rats were administered intratracheally either saline or bleomycin (15IU/kg), and a subset of OVX bleomycin-treated rats received 2ME (10microg/kg/h) for 21days. Estradiol had only limited inhibitory effects on growth in hPASMCs and no effect in hLFs, whereas 2ME exhibited strong and concentration-dependent (1-10microM) antimitogenic effects in both cell types. Bleomycin caused lung injury/PH (significantly increased lung and right ventricle (RV) weights, RV peak systolic pressure (RVPSP), and RV/left ventricle + septum ratio (RV/LV + S); caused medial hypertrophy and adventitial widening of pulmonary arteries; induced marked focal/diffuse fibrosis with diffuse infiltration of inflammatory (ED1+) cells; and resulted in 30% mortality). OVX exacerbated the disease and increased mortality (to 75%); whereas 2ME tended to reduce mortality (55.5%) and in surviving animals reduced RVPSP and RV/LV + S ratio, and attenuated vascular remodeling, pulmonary inflammation and fibrosis. This study suggests that 2ME may have protective effects in bleomycin-induced PH and fibrosis. Further investigation of 2ME in pulmonary fibrosis and PH is warranted. PMID:19540933

  17. Beamed-Energy Propulsion (BEP): Considerations for Beaming High Energy-Density Electromagnetic Waves Through the Atmosphere

    Science.gov (United States)

    Manning, Robert M.

    2015-01-01

    A study to determine the feasibility of employing beamed electromagnetic energy for vehicle propulsion within and outside the Earth's atmosphere was co-funded by NASA and the Defense Advanced Research Projects Agency that began in June 2010 and culminated in a Summary Presentation in April 2011. A detailed report entitled "Beamed-Energy Propulsion (BEP) Study" appeared in February 2012 as NASA/TM-2012-217014. Of the very many nuances of this subject that were addressed in this report, the effects of transferring the required high energy-density electromagnetic fields through the atmosphere were discussed. However, due to the limitations of the length of the report, only a summary of the results of the detailed analyses were able to be included. It is the intent of the present work to make available the complete analytical modeling work that was done for the BEP project with regard to electromagnetic wave propagation issues. In particular, the present technical memorandum contains two documents that were prepared in 2011. The first one, entitled "Effects of Beaming Energy Through the Atmosphere" contains an overview of the analysis of the nonlinear problem inherent with the transfer of large amounts of energy through the atmosphere that gives rise to thermally-induced changes in the refractive index; application is then made to specific beamed propulsion scenarios. A brief portion of this report appeared as Appendix G of the 2012 Technical Memorandum. The second report, entitled "An Analytical Assessment of the Thermal Blooming Effects on the Propagation of Optical and Millimeter- Wave Focused Beam Waves For Power Beaming Applications" was written in October 2010 (not previously published), provides a more detailed treatment of the propagation problem and its effect on the overall characteristics of the beam such as its deflection as well as its radius. Comparisons are then made for power beaming using the disparate electromagnetic wavelengths of 1.06 microns and 2.0 millimeters..

  18. Possibility to determine the astrophysical S factor for the 7Be(p,?)8B radiative capture from analysis of the 7Be(3He,d)8B reaction

    International Nuclear Information System (INIS)

    At very low energies of astrophysical interest, the 7Be(p,?)8B reaction is almost totally peripheral. Consequently, the overall normalization of the cross section for this reaction is defined by the asymptotic normalization coefficient of the bound-state wave function of 8B in the two-body channel 7Be+p. The reaction 7Be(3He,d)8B is suggested as a tool to measure this asymptotic normalization coefficient thereby allowing one to define the absolute value of the astrophysical factor, S17(0), for the 7Be(p,?)8B reaction

  19. Comparison of therapeutic response of keloids and hypertrophic scars to cryotherapy plus intralesional steroid and bleomycin tattoo

    OpenAIRE

    Farahnaz Fatemi; Jamshid Najafian; Koroush Ahmadpour

    2005-01-01

    Keloids and hypertrophic scars are abnormal responses of body to skin injuries. Overproduction of compacted fibrous tissue is the basic cause of these lesions. In this study the result of treatment of these skin conditions with bleomycin tattoo are compared with cryotherapy and triamcinolone injection. This study involved 45 patients with hypertrophic scar or keloid. Patients were divided into two groups consecutively. Group A (23 patients) was treated with bleomycin tattoo and the group B ...

  20. PGI synthase overexpression protects against bleomycin-induced mortality and is associated with increased Nqo 1 expression

    OpenAIRE

    Zhou, Weisong; Dowell, Dustin R.; Mark W. Geraci; Timothy S. Blackwell; Collins, Robert D.; Polosukhin, Vasiliy V.; Lawson, William E.; Wu, Pingsheng; Sussan, Thomas; Biswal, Shyam; Goleniewska, Kasia; O'Neal, Jamye; Newcomb, Dawn C; Toki, Shinji; Morrow, Jason D.

    2011-01-01

    The mortality rate for acute lung injury (ALI) is reported to be between 35–40%, and there are very few treatment strategies that improve the death rate from this condition. Previous studies have suggested that signaling through the prostaglandin (PG) I2 receptor may protect against bleomycin-induced ALI in mice. We found that mice that overexpress PGI synthase (PGIS) in the airway epithelium were significantly protected against bleomycin-induced mortality and had reduced parenchymal consolid...

  1. Preparation of [6lCu]Bleomycin Complexes as a Potential PET radiopharmaceutical and it's biological evaluation in normal and tumor-bearing rodents

    International Nuclear Information System (INIS)

    [61Cu]Bleomycin ([61Cu]Bleomycin) was prepared using [61Cu]CuCl2, produced via natZn(p,x)61Cu (180?A proton irradiation, 22 MeV, 3.2 h), purified by ion chromatography method. [61Cu]Bleomycin was prepared at optimized conditions (room temperature, 45 min, 0.1 mg bleomycin for 2-10 mCi 61CuCl2) with radiochemical purity over 98% determined by HPLC and radio-thin layer chromatography. [61Cu]Bleomycin was administered into the normal and tumor bearing rodents up to 210 minutes followed by biodistribution and co incidence imaging studies. A significant tumor/non tumor accumulation was observed either by animal scarification or imaging method. [61Cu] Bleomycin can be a potential PET radiotracer for tumor imaging.

  2. CD19 Regulates Skin and Lung Fibrosis via Toll-Like Receptor Signaling in a Model of Bleomycin-Induced Scleroderma

    OpenAIRE

    Yoshizaki, Ayumi; Iwata, Yohei; Komura, Kazuhiro; Ogawa, Fumihide; Hara, Toshihide; Muroi, Eiji; Takenaka, Motoi; Shimizu, Kazuhiro; Hasegawa, Minoru; Fujimoto, Manabu; Tedder, Thomas F; Sato, Shinichi

    2008-01-01

    Mice subcutaneously injected with bleomycin, in an experimental model of human systemic sclerosis, develop cutaneous and lung fibrosis with autoantibody production. CD19 is a general “rheostat” that defines signaling thresholds critical for humoral immune responses, autoimmunity, and cytokine production. To determine the role of CD19 in the bleomycin-induced systemic sclerosis model, we investigated the development of fibrosis and autoimmunity in CD19-deficient mice. Bleomycin-treated wild-ty...

  3. Suppression of a DNA base excision repair gene, hOGG1, increases bleomycin sensitivity of human lung cancer cell line

    International Nuclear Information System (INIS)

    Bleomycin (BLM) has been found to induce 8-oxoguanine and DNA strand breaks through producing oxidative free radicals, thereby leading to cell cycle arrest, apoptosis and cell death. Cellular DNA damage repair mechanisms such as single strand DNA break repair/base excision repair (BER) are responsible for removing bleomycin-induced DNA damage, therefore confer chemotherapeutic resistance to bleomycin. In this study, we have investigated if down-regulation of human 8-oxoguanine DNA glycosylase (hOGG1), an important BER enzyme, could alter cellular sensitivity to bleomycin, thereby reducing chemotherapeutic resistance in human tumor cell. A human lung cancer cell line with hOGG1 deficiency (A549-R) was created by ribozyme gene knockdown technique. Bleomycin cellular sensitivity and DNA/chromosomal damages were examined using MTT, colony forming assay, comet assay as well as micronucleus assay. We demonstrated that hOGG1 gene knockdown enhanced bleomycin cytotoxicity and reduced the ability of colony formation of the lung cancer cell lines. We further demonstrated that bleomycin-induced DNA strand breaks resulted in an increase of micronucleus rate. hOGG1 deficiency significantly reduced DNA damage repair capacity of the lung cancer cell lines. Our results indicated that hOGG1 deficiency allowed the accumulation of bleomycin-induced DNA damage and chromosomal breaks by compromising DNA damage repair capacity, thereby increasing cellular sensitivity to bleomycin

  4. 51Cr-bleomycin in the diagnosis of tumours of the chest

    International Nuclear Information System (INIS)

    51Cr-bleomycin was used for the scintigraphic diagnosis of primary and secondary tumours of the thorax. The study was based on observations in 104 patients. The scintigraphy was performed using a gamma camera coupled to an on-line computer. Active lesions were scored using a semiquantitative scale of scores 0 to 5. Images were subdivided into 222 regions considered. In 72 of these, the presence of disease was diagnosed (64 malignant, 8 non-malignant) and 150 regions were classified as free from disease. At the decision threshold of score 2, over-all sensitivity and specificity of the scintigraphic detection of malignant tumours amounted to 97 and 79%, respectively. Inflammatory changes displaced some detectable accumulation of 51Cr-bleomycin but scores attributed to these lesions did not exceed the value of 2. (orig.)

  5. Radiogenic male breast cancer with in vitro sensitivity to ionizing radiation and bleomycin

    Energy Technology Data Exchange (ETDEWEB)

    Greene, M.H.; Goedert, J.J.; Bech-Hansen, N.T.; McGuire, D.; Paterson, M.C.; Fraumeni, J.F. Jr.

    1983-01-01

    A cytogenetically normal man with gynecomastia and a family history of diverse cancers developed adenocarcinoma of the breast 30 years following thymic irradiation. In vitro experiments measuring colony-forming ability of cultured skin fibroblasts from family members implied that the patient had a small but significant increase in sensitivity to ionizing radiation, and a moderate increase in sensitivity to bleomycin, a radiomimetic drug. Enhanced radiosensitivity of fibroblasts from the patient's mother, and bleomycin sensitivity of fibroblasts from the sister suggested, but did not prove, that genetic susceptibility affected the risk of radiogenic cancer in this individual. In vitro studies of cancer-prone kindreds are a useful research strategy in delineating mechanisms of carcinogenesis.

  6. Local delivery of biodegradable pirfenidone nanoparticles ameliorates bleomycin-induced pulmonary fibrosis in mice

    Science.gov (United States)

    Trivedi, Ruchit; Redente, Elizabeth F.; Thakur, Ashish; Riches, David W. H.; Kompella, Uday B.

    2012-12-01

    Our purpose was to assess sustained delivery and enhanced efficacy of pirfenidone-loaded nanoparticles after intratracheal instillation. Poly(lactide-co-glycolide) nanoparticles containing pirfenidone (NPs) were prepared and characterized. Biodistribution of NPs and solution was assessed using LC-MS after intratracheal administration in C57Bl/6 mice at 3 and 24 h and 1 week post-administration. Efficacy was tested in C57Bl/6 mice in a bleomycin-induced pulmonary fibrosis model. Mice received 10 ?g pirfenidone intratracheally in solution or NPs, once a week, for 3 weeks after bleomycin administration. Drug effects were monitored on day 28. Lung hydroxyproline content, total number of cells, and numbers of macrophages, lymphocytes, and neutrophils in bronchoalveolar lavage (BAL) were assessed. Numbers of macrophages, lymphocytes, and neutrophils were assessed in the lung as well. NPs sustained significantly higher levels of pirfenidone in the lungs and BAL at 24 h and 1 week, compared to the solution group. Pirfenidone solution and NPs significantly reduced hydroxyproline levels by 57 and 81%, respectively, compared to bleomycin alone. At the end of 4 weeks, BAL cellularity was reduced by 25.4% and 56% with solution and NP treatment, respectively. The numbers of lymphocytes and neutrophils in the BAL were also reduced by 58.9 and 82.4% for solution and 74.5% and 89.7% for NPs, respectively. The number of inflammatory macrophages in the lung was reduced by 62.8% and the number of neutrophils was reduced by 59.1% in the NP group and by 37.7% and 44.5%, respectively, in the solution group, compared to bleomycin alone. In conclusion, nanoparticles sustain lung pirfenidone delivery and enhance its anti-fibrotic efficacy.

  7. Cellular Response to Bleomycin-Induced DNA Damage in Human Fibroblast Cells in Space

    Science.gov (United States)

    Lu, Tao; Zhang, Ye; Wong, Michael; Stodieck, Louis; Karouia, Fathi; Wu, Honglu

    2015-01-01

    Living organisms are constantly exposed to space radiation that consists of energetic protons and other heavier charged particles. Whether spaceflight factors, microgravity in particular, affects on the cellular response to DNA damage induced by exposures to radiation or other toxic chemicals will have an impact on the radiation risks for the astronauts, as well as on the mutation rate in microorganisms, is still an open question. Although the possible synergistic effects of space radiation and other spaceflight factors have been investigated since the early days of the human space program, the published results were mostly conflicting and inconsistent. To investigate the effects of spaceflight on the cellular response to DNA damages, human fibroblast cells flown to the International Space Station (ISS) were treated with bleomycin for three hours in the true microgravity environment, which induces DNA damages including the double strand breaks (DSB) similar to the ionizing radiation. Damage in the DNA was measured by the phosphorylation of a histone protein H2AX (-H2AX), which showed slightly more foci in the cells on ISS than in the ground control. The expression of genes involved in the DNA damage response was also analyzed using the PCR array. Although a number of the genes, including CDKN1A and PCNA, were significantly altered in the cells after bleomycin treatment, no significant difference in the expression profile of DNA damage response genes was found between the flight and ground samples. At the time of the bleomycin treatment, the cells on the ISS were found to be proliferating faster than the ground control as measured by the percentage of cells containing positive Ti-67 signals. Our results suggested that the difference in -H2AX between flight and ground was due to the faster growth rate of the cells in space, but spaceflight did not affect the response of the DNA damage response genes to bleomycin treatment.

  8. In vivo antioxidant treatment protects against bleomycin-induced lung damage in rats

    OpenAIRE

    Serrano-Mollar, Anna; Closa, Daniel; Morcillo, E. J.; Bulbena, Oriol

    2003-01-01

    This study examines the activity of the antioxidant N-acetylcysteine on bleomycin-induced pulmonary fibrosis in rats with emphasis on the early inflammatory phase. Rats receiving N-acetylcysteine (300 mg kg?1 day?1, intraperitoneal) had less augmented lung wet weight, and lower levels of proteins, lactate dehydrogenase, neutrophil and macrophage counts in bronchoalveolar lavage fluid and lung myeloperoxidase activity with a betterment of histological score at 3 days postbleomycin. A dim...

  9. Expression and Role of the Hyaluronan Receptor RHAMM in Inflammation after Bleomycin Injury

    OpenAIRE

    Zaman, Aisha; Cui, Zheng; Foley, Joseph P; Zhao, Hengjiang; Grimm, Paul C.; DeLisser, Horace M.; Savani, Rashmin C.

    2005-01-01

    Lung injury is associated with increased concentrations of hyaluronan (hyaluronic acid, HA). HA modifies cell behavior through interaction with cell-associated receptors such as receptor for HA-mediated motility (RHAMM, CD168). Using a function blocking anti-RHAMM antibody (R36), we investigated the expression and role of RHAMM in the inflammatory response to intratracheal bleomycin in rats. Immunostaining showed increased expression of RHAMM in macrophages 4–7 d after injury. Surface biotin ...

  10. Blockade of advanced glycation end product formation attenuates bleomycin-induced pulmonary fibrosis in rats

    OpenAIRE

    Liu Dai-Shun; Li Ji-Qiong; Sun Bei-Bei; Wang Xun; Wang Tao; Chen Lei; Zhang Shang-Fu; Liu Lin; Xu Dan; Chen Ya-Juan; Wen Fu-Qiang

    2009-01-01

    Abstract Background Advanced glycation end products (AGEs) have been proposed to be involved in pulmonary fibrosis, but its role in this process has not been fully understood. To investigate the role of AGE formation in pulmonary fibrosis, we used a bleomycin (BLM)-stimulated rat model treated with aminoguanidine (AG), a crosslink inhibitor of AGE formation. Methods Rats were intratracheally instilled with BLM (5 mg/kg) and orally administered with AG (40, 80, 120 mg/kg) once daily for two we...

  11. Scanning electron microscopic study of capillary change in bleomycin-induced pulmonary fibrosis.

    OpenAIRE

    Kwon, K. Y.; Park, K. K.; Chang, E S

    1991-01-01

    The architectural changes which occur in the capillaries are difficult to illustrate without a three-dimensional tool, such as scanning electron microscopy. Therefore, a scanning electron microscopic study was occasionally undertaken to show the capillary changes of lung fibrosis. Fibrosis was induced in twenty rats by an intratracheal injection of bleomycin. After 30 days the rats were sacrificed, and light microscopy and scanning electron microscopy were performed. The vascular trees of bot...

  12. Bleomicina: un modelo de fibrosis pulmonar / Bleomycin: a lung fibrosis animal model

    Scientific Electronic Library Online (English)

    Sandra, Cabrera Benítez.

    2006-03-01

    Full Text Available La bleomicina es un glicopéptido utilizado para el tratamiento del cáncer cuyo potencial terapéutico está limitado por su toxicidad pulmonar. El efecto citotóxico depende de la dosis e involucra el desarrollo de neumonitis que progresa a fibrosis; las células epiteliales alveolares son el blanco pri [...] ncipal del daño inducido por la bleomicina. Se considera que la muerte de células epiteliales alveolares por apoptosis es un evento clave en el inicio y la progresión de la fibrosis pulmonar (FP) que se caracteriza por el depósito excesivo de moléculas de la matriz extracelular, principalmente de colágenas fibrilares en el parénquima pulmonar. En la investigación básica de la FP, la bleomicina se ha utilizado como el principal agente fibrogénico en modelos animales. Durante los últimos años, el modelo de bleomicina desarrollado en ratones trasgénicos se ha empleado para elucidar in vivo el papel de un gran número de biomoléculas involucradas en la FP. Abstract in english Bleomycin is a glycopeptide used for cancer treatment, but the therapeutic potencial of this drug is limited by its lung toxicity. The cytotoxic effect of bleomycin is dose-dependent and involves pneumonitis that proceeds to lung fibrosis (LF). Alveolar epithelial cells are the main target of bleomy [...] cin induced injury. Alveolar epithelial cell death by apoptosis is considered as a key event in the initiation and progression of LF, that is characterized by excessive deposition of extracellular matrix, mainly fibrilar collagens in the lung parenchyma. Bleomycin has been used as the main fibrogenic agent in animal models in LF basic research; in recent years, a bleomycin model developed in transgenic mice has been used to elucidate the in vivo role of a great number of biomolecules involved in LF.

  13. Vascular disrupting action of electroporation and electrochemotherapy with bleomycin in murine sarcoma

    OpenAIRE

    Sersa, G.; Jarm, T.; Kotnik, T; Coer, A; Podkrajsek, M; Sentjurc, M.; Miklavcic, D.; Kadivec, M; Kranjc, S; Secerov, A; Cemazar, M

    2008-01-01

    Electrochemotherapy has a direct cytotoxic effect on tumour cells, and presumably, a vascular disrupting effect. In this study, on the basis of the prediction of the mathematical model, histological evaluation and physiological measurements of the tumours were carried out to confirm that electroporation and electrochemotherapy of tumours have a vascular disrupting action. In the study, SA-1 solid subcutaneous sarcoma tumours in A/J mice were treated by bleomycin (BLM) given intravenously (1?m...

  14. Electrochemotherapy with intravenous bleomycin in the local treatment of skin melanoma metastases

    OpenAIRE

    BERNENGO, Maria Grazia; OSELLA ABATE, Simona; SAVOIA, Paola; QUAGLINO, Pietro

    2008-01-01

    BACKGROUND: Electrochemotherapy (ECT) combines chemotherapy and electroporation to increase drug uptake. Its role in cutaneous melanoma metastasis treatment is not well defined; indeed, few studies have been reported, without complete follow-up data. AIM: To prospectively evaluate clinical activity and tolerability of ECT with i.v. bleomycin, and to analyze the response increase associated to repeated sessions, in the largest series of cutaneous melanoma metastases reported to date (n = 233)....

  15. Angiotensin-converting enzyme: an indicator of bleomycin-induced pulmonary toxicity in humans?

    DEFF Research Database (Denmark)

    Sørensen, Peter G; Rømer, F K; Cortes, Dina

    1984-01-01

    In order to evaluate bleomycin-associated lung damage in humans, lung function parameters and serum levels of the endothelial-bound angiotensin-converting enzyme (ACE) were determined by serial measurements in 11 patients who were treated for testicular cancer. None developed clinical or radiological evidence of pulmonary damage. While the static and dynamic lung function parameters were unchanged, carbon monoxide diffusion capacity (DLCO) decreased significantly (P less than 0.01) during a tota...

  16. Cellular Response to Bleomycin-Induced DNA Damage in Human Fibroblast Cells in Space

    Science.gov (United States)

    Lu, Tao; Zhang, Ye; Wong, Michael; Stodieck, Louis; Karouia, Fathi; Wu, Honglu

    2015-01-01

    Outside the protection of the geomagnetic field, astronauts and other living organisms are constantly exposed to space radiation that consists of energetic protons and other heavier charged particles. Whether spaceflight factors, microgravity in particular, have effects on cellular responses to DNA damage induced by exposure to radiation or cytotoxic chemicals is still unknown, as is their impact on the radiation risks for astronauts and on the mutation rate in microorganisms. Although possible synergistic effects of space radiation and other spaceflight factors have been investigated since the early days of the human space program, the published results were mostly conflicting and inconsistent. To investigate effects of spaceflight on cellular responses to DNA damages, human fibroblast cells flown to the International Space Station (ISS) were treated with bleomycin for three hours in the true microgravity environment, which induced DNA damages including double-strand breaks (DSB) similar to the ionizing radiation. Damages in the DNA were measured by the phosphorylation of a histone protein H2AX (g-H2AX), which showed slightly more foci in the cells on ISS than in the ground control. The expression of genes involved in DNA damage response was also analyzed using the PCR array. Although a number of the genes, including CDKN1A and PCNA, were significantly altered in the cells after bleomycin treatment, no significant difference in the expression profile of DNA damage response genes was found between the flight and ground samples. At the time of the bleomycin treatment, the cells on the ISS were found to be proliferating faster than the ground control as measured by the percentage of cells containing positive Ki-67 signals. Our results suggested that the difference in g-H2AX focus counts between flight and ground was due to the faster growth rate of the cells in space, but spaceflight did not affect initial transcriptional responses of the DNA damage response genes to bleomycin treatment.

  17. Time course of matrix metalloproteases and tissue inhibitors in bleomycin-induced pulmonary fibrosis

    OpenAIRE

    Fenoglio, C; Vitulo, P.; G Palladini; R. Tozzi; S Inghilleri; MORBINI, P.; T Oggionni

    2006-01-01

    To investigate simultaneously localization and relative activity of MMPs during extracellular matrix (ECM) remodeling in bleomycin-induced pulmonary fibrosis in rat, we analyzed the time course of the expression, activity and/or concentration of gelatinases MMP-2 and MMP-9, collagenase MMP-1, matrylisin MMP-7, TIMP-1 and TIMP-2, both in alveolar space (cellular and extracellular compartments) and in lung tissue. MMP and TIMP expression was detected (immunohistochemistry) in lung tissue. MMP a...

  18. Complete Resolution of Cystic Hygroma with Single Session of Intralesional Bleomycin

    OpenAIRE

    Fadi Atwan; Isam Elamin Elsiddig; Muhammad Sharif

    2012-01-01

    Intralesional sclerotherapy as a primary modality of management for cystic hygroma is successfully described in literature. It has many benefits over surgical approach; recurrence being the concern of as much as 20% of patients in which apparent complete excision has been performed. Bleomycin is one of sclerosing agents used as intralesional therapy in cystic hygroma. Complete response usually occurs in multiple sessions of sclerotherapy. Rarely, complete resolution occurs with single session...

  19. Low dose irradiation, tegafur and bleomycin in oil for rectal cancer

    International Nuclear Information System (INIS)

    A histopathological survey of surgical materials from 143 patients with rectal carcinoma subjected to chemotherapy or to low-dose radiotherapy combined with tegafur and bleomycin in oil was carried out. The radiotherapy brought about better results than chemotherapy alone. In 4 out of the 58 patients treated with the radiochemotherapy, no cancer cells could be found. Exfoliation of cohorts of cancer cells may occur into the rectal lumina in selected cases of rectal carcinoma thus treated, resulting in cancer cell elimination. (author)

  20. Fasudil, a Rho-Kinase Inhibitor, Attenuates Bleomycin-Induced Pulmonary Fibrosis in Mice

    Directory of Open Access Journals (Sweden)

    Zuojun Xu

    2012-07-01

    Full Text Available The mechanisms underlying the pathogenesis of idiopathic pulmonary fibrosis (IPF involve multiple pathways, such as in?ammation, epithelial mesenchymal transition, coagulation, oxidative stress, and developmental processes. The small GTPase, RhoA, and its target protein, Rho-kinase (ROCK, may interact with other signaling pathways known to contribute to pulmonary ?brosis. This study aimed to determine the beneficial effects and mechanisms of fasudil, a selective ROCK inhibitor, on bleomycin-induced pulmonary fibrosis in mice. Our results showed that the Aschcroft score and hydroxyproline content of the bleomycin-treated mouse lung decreased in response to fasudil treatment. The number of infiltrated inflammatory cells in the bronchoalveolar lavage fluid (BALF was attenuated by fasudil. In addition, fasudil reduced the production of transforming growth factor-?1 (TGF-?1, connective tissue growth factor (CTGF, alpha-smooth muscle actin (?-SMA, and plasminogen activator inhibitor-1 (PAI-1 mRNA and protein expression in bleomycin-induced pulmonary fibrosis. These findings suggest that fasudil may be a potential therapeutic candidate for the treatment of pulmonary ?brosis.

  1. Biological studies of samarium-153 bleomycin complex in human breast cancer murine xenografts for therapeutic applications

    International Nuclear Information System (INIS)

    In this work, a potential therapeutic DNA targeting agent, 153Sm-bleomycin complex (153Sm-BLM), was developed and the tumor accumulation studies were performed using single photon emission computed tomography (SPECT) and scarification studies. 153Sm-BLM was prepared at optimized conditions (room temperature, 4-8 h, 0.1 mg bleomycin for 740-3700 MBq 153SmCl3, radiochemical purity over 98%, HPLC, specific activity = 55 TBq/mmol). 153Sm-BLM was administered into human breast cancer murine xenografts and the biodistribution and imaging studies were performed up to 48 h. 153Sm-BLM demonstrated superior tumor accumulation properties in contrast with the other radiolabeled bleomycins with tumor:blood ratios of 41, 72 and 182 at 4, 24 and 48 h, respectively, and tumor:muscle ratios of 23, 33 and > 1490 at 4, 24 and 48 h, respectively, while administered intravenously. The SPECT images also demonstrated the obvious tumor uptake at the chest region of the breast-tumor bearing mice. These initial experiments demonstrate significant accumulation of 153Sm-BLM in tumor tissues. (orig.)

  2. Expression and Role of the Hyaluronan Receptor RHAMM in Inflammation after Bleomycin Injury

    Science.gov (United States)

    Zaman, Aisha; Cui, Zheng; Foley, Joseph P.; Zhao, Hengjiang; Grimm, Paul C.; DeLisser, Horace M.; Savani, Rashmin C.

    2005-01-01

    Lung injury is associated with increased concentrations of hyaluronan (hyaluronic acid, HA). HA modifies cell behavior through interaction with cell-associated receptors such as receptor for HA-mediated motility (RHAMM, CD168). Using a function blocking anti-RHAMM antibody (R36), we investigated the expression and role of RHAMM in the inflammatory response to intratracheal bleomycin in rats. Immunostaining showed increased expression of RHAMM in macrophages 4–7 d after injury. Surface biotin labeling of cells isolated by lavage confirmed increased surface expression of a 70-kD RHAMM after lung injury, and in situ hybridization demonstrated increased RHAMM mRNA in macrophages responding to injury. Time-lapse cinemicrography demonstrated a 5-fold increase in motility of alveolar macrophages from bleomycin-treated animals that was completely blocked by R36 in vitro. Further, HA-stimulated macrophage chemotaxis was also inhibited by R36. Daily administration of R36 to injured animals resulted in a 40% decrease in macrophage accumulation 7 d after injury. Further, H&E staining of tissue sections showed that bleomycin-mediated changes in lung architecture were improved with R36 treatment. Taken together with previous results showing the inhibitory effects of HA-binding peptide on inflammation and fibrosis, we conclude that the interaction of RHAMM with HA is a critical component of the recruitment of inflammatory cells to the lung after injury. PMID:16037485

  3. Time course of matrix metalloproteases and tissue inhibitors in bleomycin-induced pulmonary fibrosis

    Directory of Open Access Journals (Sweden)

    T Oggionni

    2009-06-01

    Full Text Available To investigate simultaneously localization and relative activity of MMPs during extracellular matrix (ECM remodeling in bleomycin-induced pulmonary fibrosis in rat, we analyzed the time course of the expression, activity and/or concentration of gelatinases MMP-2 and MMP-9, collagenase MMP-1, matrylisin MMP-7, TIMP-1 and TIMP-2, both in alveolar space (cellular and extracellular compartments and in lung tissue. MMP and TIMP expression was detected (immunohistochemistry in lung tissue. MMP activity (zymography and TIMP concentration (ELISA were evaluated in lung tissue homogenate (LTH, BAL supernatant (BALs and BAL cell pellet (BALp 3, 7, 14, and 28 days after bleomycin intratracheal instillation. Immunohistochemistry showed an extensive MMP and TIMP expression from day 7 in a wide range of structural and inflammatory cells in treated rats. MMP-2 was present mainly in epithelia, MMP-9 in inflammatory cells. MMP-2 and MMP-9 activity was increased respectively in BAL fluid and BAL cells, with a peak at day 7. TIMP-1 and TIMP-2 concentration (ELISA enhancement was delayed at day 14. In conclusion gelatinases and their inhibitors are significantly activated during bleomycin-induced pulmonary fibrosis. Marked changes in gelatinases activity are observed early in the alveolar compartment, with a prevailing extracellular activity of MMP-2 and a predominant intracellular distribution of MMP-9, while enzyme activity changes in lung parenchyma were less evident. In the repairing phase the reduction of gelatinases activity is synchronous with a peak of alveolar concentration of their inhibitors.

  4. Bleomycin delivery by osmotic minipump: similarity to human scleroderma interstitial lung disease.

    Science.gov (United States)

    Lee, Rebecca; Reese, Charles; Bonner, Michael; Tourkina, Elena; Hajdu, Zoltan; Riemer, Ellen C; Silver, Richard M; Visconti, Richard P; Hoffman, Stanley

    2014-04-15

    The interstitial lung diseases (ILD) include a large number of chronic, progressive, irreversible respiratory disorders involving pulmonary fibrosis, the most common of which are idiopathic pulmonary fibrosis and scleroderma lung disease (SSc ILD). Because bleomycin causes lung fibrosis when used in cancer chemotherapy, it is used to model human ILD in rodents. In most studies, bleomycin has been delivered directly into the lung by intratracheal or intraoral administration. Here we have compared the effects in mice of bleomycin delivered directly into the lungs (direct model) or systemically using osmotic minipumps (pump model) to determine which more closely resembles human ILD. The pump model is more similar to human SSc ILD in that: 1) lung injury/fibrosis is limited to the subpleural portion of the lung in the pump model and in SSc ILD, whereas the entire lung is affected in the direct model; 2) conversely, there is massive inflammation throughout the lung in the direct model, whereas inflammation is limited in the pump model and in SSc ILD; 3) hypertrophic type II alveolar epithelial cells are present at high levels in SSc ILD and in the pump model but not in the direct model; and 4) lung fibrosis is accompanied by dermal fibrosis. The pump model is also move convenient and humane than the direct model because there is less weight loss and mortality. PMID:24583879

  5. New tumor imaging agent--111In-bleomycin complex. Comparison with 67Ga-citrate and 57Co-bleomycin in tumor-bearing animals

    International Nuclear Information System (INIS)

    A new 111In-bleomycin complex (BLMC) has been found which has high affinity to tumor, does not bind to transferrin and is stable in vivo. Distribution in animals bearing glioma, hepatoma, or mammary adenocarcinoma at 48 hours showed: the ratios of tumor to blood, brain, heart, lung, liver, pancreas, stomach, and femur were 1.4-22.4 times as high for 111In-BLMC as for 67Ga-citrate. In mammary adenocarcinoma, 111In-BLMC bound more to viable and 57Co-Bleomycin (BLM) more to necrotic tumor. In viable tumor, the concentration of 111In-BLMC was similar to that of 57Co-BLM. The ratios of tumor to stomach and pancreas were higher, to blood, brain, muscle, heart, and femur were lower for 111In-BLMC than those for 57Co-BLM. The ratios of tumor to lung, liver, spleen, skin, and kidney were similar for the two compounds. Tumors were imaged more distinctly with the new 111In-BLMC and 57Co-BLM than with 67Ga-citrate. 111In-BLMC is promising for tumor imaging

  6. Phylogenomic Analyses of Nuclear Genes Reveal the Evolutionary Relationships within the BEP Clade and the Evidence of Positive Selection in Poaceae

    OpenAIRE

    ZHAO, LEI; Zhang, Ning; Ma, Peng-Fei; Qi LIU; Li, De-Zhu; Guo, Zhen-Hua

    2013-01-01

    BEP clade of the grass family (Poaceae) is composed of three subfamilies, i.e. Bambusoideae, Ehrhartoideae, and Pooideae. Controversies on the phylogenetic relationships among three subfamilies still persist in spite of great efforts. However, previous evidence was mainly provided from plastid genes with only a few nuclear genes utilized. Given different evolutionary histories recorded by plastid and nuclear genes, it is indispensable to uncover their relationships based on nuclear genes. Her...

  7. Precision measurement of the $^{7}$Be(p, $\\gamma$)$\\,^{8}$B cross section with an implanted $^{7}$Be target

    CERN Document Server

    Baby, L T; Goldring, G; Hass, M; Weissman, L; Fedosseev, V; Köster, U; Nir-El, Y; Haquin, G; Gäggeler, H W; Weinreich, R

    2003-01-01

    The $^{7}$Be(p, $\\gamma$) $\\,^{8}$B reaction plays a central role in the evaluation of solar neutrino fluxes. We report on a new precision measurement of the cross section of this reaction, following our previous experiment with an implanted $^{7}$Be target, a raster- scanned beam, and the elimination of the backscattering loss. The new measurement incorporates a more abundant $^{7}$Be target and a number of improvements in design and procedure. The point at E$_{lab}$ = 991 keV was measured several times under varying experimental conditions, yielding a value of S$_{17}$(E$_{c.m.}$ = 850 keV) = 24.0 $\\pm$ 0.5 eV b. Measurements were carried out at lower energies as well. Because of the precise knowledge of the implanted $^{7}$Be density profile, it was possible to reconstitute both the off- and on-resonance parts of the cross section and to obtain from the entire set of measurements an extrapolated value of S$_{17}$(0)=21.2 $\\pm$ 0.7 eV b.

  8. Structure of the excited states of 11Be reached through the reaction d(10Be,p)11Be

    International Nuclear Information System (INIS)

    The one-neutron transfer reaction d(10Be,p)11Be has been studied at 32 A.MeV at GANIL with a 10Be secondary beam. Protons were detected by the silicon strip array MUST. The ground state and excited states of 11Be at 0.32, 1.78 and 3.41 MeV were populated, demonstrating the feasibility of transfer reactions induced by radioactive beams leading to bound and unbound states. A DWBA (distorted wave born approximation) analysis indicates for the 3.41 MeV state spin and parity 3/2+ or 5/2+ and a spectroscopic factor of 0.18 or 0.11, respectively. A broad structure centered at 10 MeV is also observed and corresponds to transfer to the 1d sub-shells. If one assumes that only the 1d3/2 orbital contributes to this structure, the splitting of the 1d neutron states in 11Be is estimated to be 6.3 MeV. Using a 2-particle-RPA (random phase approximation) model, we have shown that neutron-neutron correlations play an important role in the inversion between the 2s1/2 and 1p1/2 neutron states in 11Be. (author)

  9. Calcium electroporation in three cell lines : a comparison of bleomycin and calcium, calcium compounds, and pulsing conditions

    DEFF Research Database (Denmark)

    Frandsen, Stine Krog; Gissel, Hanne

    2014-01-01

    BACKGROUND: Electroporation with calcium (calcium electroporation) can induce ATP depletion-associated cellular death. In the clinical setting, the cytotoxic drug bleomycin is currently used with electroporation (electrochemotherapy) for palliative treatment of tumors. Calcium electroporation offers several advantages over standard treatment options: calcium is inexpensive and may readily be applied without special precautions, as is the case with cytostatic drugs. Therefore, details on the use of calcium electroporation are essential for carrying out clinical trials comparing calcium electroporation and electrochemotherapy. METHODS: The effects of calcium electroporation and bleomycin electroporation (alone or in combination) were compared in three different cell lines (DC-3F, transformed Chinese hamster lung fibroblast; K-562, human leukemia; and murine Lewis Lung Carcinoma). Furthermore, the effects of electrical pulsing parameters and calcium compound on treatment efficacy were determined. RESULTS: Electroporation with either calcium or bleomycin significantly reduced cell survival (p<0.0001), without evidence of a synergistic effect. Cellular death following calcium or bleomycin treatment occurred at similar applied voltages, suggesting that similar parameters should be applied. At equimolar concentrations, calcium chloride and calcium glubionate resulted in comparable decreases in cell viability. CONCLUSIONS: Calcium electroporation and bleomycin electroporation significantly reduce cell survival at similar applied voltage parameters. The effect of calcium electroporation is independent of calcium compound. GENERAL SIGNIFICANCE: This study strongly supports the use of calcium electroporation as a potential cancer therapy and the results may aid in future clinical trials.

  10. Arginase inhibition prevents bleomycin-induced pulmonary hypertension, vascular remodeling, and collagen deposition in neonatal rat lungs.

    Science.gov (United States)

    Grasemann, Hartmut; Dhaliwal, Rupinder; Ivanovska, Julijana; Kantores, Crystal; McNamara, Patrick J; Scott, Jeremy A; Belik, Jaques; Jankov, Robert P

    2015-03-15

    Arginase is an enzyme that limits substrate L-arginine bioavailability for the production of nitric oxide by the nitric oxide synthases and produces L-ornithine, which is a precursor for collagen formation and tissue remodeling. We studied the pulmonary vascular effects of arginase inhibition in an established model of repeated systemic bleomycin sulfate administration in neonatal rats that results in pulmonary hypertension and lung injury mimicking the characteristics typical of bronchopulmonary dysplasia. We report that arginase expression is increased in the lungs of bleomycin-exposed neonatal rats and that treatment with the arginase inhibitor amino-2-borono-6-hexanoic acid prevented the bleomycin-induced development of pulmonary hypertension and deposition of collagen. Arginase inhibition resulted in increased L-arginine and L-arginine bioavailability and increased pulmonary nitric oxide production. Arginase inhibition also normalized the expression of inducible nitric oxide synthase, and reduced bleomycin-induced nitrative stress while having no effect on bleomycin-induced inflammation. Our data suggest that arginase is a promising target for therapeutic interventions in neonates aimed at preventing lung vascular remodeling and pulmonary hypertension. PMID:25595650

  11. A cell-free system for studying a priming factor involved in repair of bleomycin-damaged DNA.

    Directory of Open Access Journals (Sweden)

    Seki,Shuji

    1989-04-01

    Full Text Available A simple cell-free system for studying a priming factor involved in the repair of bleomycin-damaged DNA was established. The template-primer used for the repair DNA synthesis was prepared by treating the closed circular, superhelical form of pUC19 plasmid DNA with 2.2 microM bleomycin and 20 microM ferrous ions. Single-strand breaks were introduced into pUC19 DNA by the bleomycin treatment, and the DNA was consequently converted largely into the open circular form. A system for repair of this bleomycin-damaged DNA was constructed with a priming factor, DNA polymerase (DNA polymerase beta or Klenow fragment of DNA polymerase I, ATP, T4 DNA ligase and four deoxynucleoside triphosphates. After incubation, the conformation of the DNA was analyzed by agarose gel electrophoresis and electron microscopy. The open circular DNA was largely converted to the closed circular DNA, indicating that the single-strand breaks of DNA were repaired. When the priming factor was omitted, DNA repair did not occur. The present system seemed to be applicable to the study of priming factors involved in the repair of DNA with single-strand breaks caused not only by bleomycin but also by ionizing radiation or active oxygen.

  12. Comparing the Effect of Physical Modalities on Permeabilisation of Cells to Bleomycin in Balb/C Mice

    Directory of Open Access Journals (Sweden)

    Bahram Yousefian

    2012-07-01

    Full Text Available Background: Some physical factors may facilitate the entry of chemotherapeutic drugs to the cells. In this study, permeability level of tumor cells of murine breast adenocarcinoma to Bleomycin was compared with 5 minutes ultrasonic exposure vs. magnetic field of 3.5 Tesla in Balb/c mice.Materials and Methods: In this experimental-applied study, 80 five-week female Balb/c mice were purchased from Pasteur Institute of Tehran. After 10 days, skin tumors of mice were induced through Homograft, and they were randomly classified after tumor reached a treatable size. In ultrasound combination group, intratumoral injection of bleomycin was performed on anesthetized mice and three minutes later, the mice, which were placed in the sonication chamber, were put in a water tank in the exposure position, and the tumor was exposed to ultrasound for 5 minutes. In the magnetic field group, mice were placed in a handmade chamber after intratumoral injection of bleomycin. Three minutes after injection of bleomycin, eight pulses of 3.5 Tesla magnetic fields with 1Hz frequency were applied to each one of the tumors.Results: It yield that, eight 3.5 Tesla pulses of magnetic field, was slightly more effective than 5 min ultrasonic irradiation in cells permeability to bleomycin, but these two physical factors had no statistically significant difference.Conclusion: Tests showed that these two physical factors have similar effects and use of each depends on the position of the patient and the medical center's facilities.

  13. Stimulation of toll-like receptor 2 with bleomycin results in cellular activation and secretion of pro-inflammatory cytokines and chemokines

    International Nuclear Information System (INIS)

    The clinical use of bleomycin results in systemic and pulmonary inflammatory syndromes that are mediated by the production of cytokines and chemokines. In this study, we demonstrate that cell activation is initiated upon the recognition of bleomycin as a pathogen-associated molecular pattern by toll-like receptor (TLR) 2. The THP1 human monocytic cell line, which constitutively expresses high levels of TLR2, secretes interleukin (IL)-1?, IL-8, and tumor necrosis factor (TNF)-? during bleomycin exposure. The TLR2-dependent nature of cell activation and cytokine secretion is supported by (1) the inability of TLR2-deficient human embryonic kidney (HEK) 293 cells to exhibit nuclear factor-kappa B (NF-?B) activation and secrete IL-8 in response to bleomycin; (2) the acquired ability of HEK293 to exhibit NF-?B activation and secrete IL-8 upon experimental expression of TLR2; and (3) the inhibition of cell activation in TLR2-expressing HEK293 and THP1 by anti-TLR2 monoclonal antibody. Collectively, these observations identify TLR2 activation as a critical event that triggers NF-?B activation and secretion of cytokines and chemokines during bleomycin exposure. Our in vitro findings could serve as a molecular mechanism underlying the pro-inflammatory toxicity associated with bleomycin. Whether bleomycin engages with other cellular receptors that results in activation of alternate signaling pathways and whether the TLR2-agonist activity of bleomycin contribute to its anti-neoplastic property deserve further study

  14. Bleomycin-induced DNA synthesis in a cell-free system using a permeable mouse sarcoma cell Extract.

    Directory of Open Access Journals (Sweden)

    Seki,Shuji

    1987-10-01

    Full Text Available To investigate factors involved in excision repair DNA synthesis, a soluble extract was prepared from permeable mouse sarcoma (SR-C3H/He cells by homogenization and ultracentrifugation. DNA synthesis measured by using native calf thymus DNA as the template-primer and the extract as the polymerase source showed low activity. The DNA synthesis was enhanced more than ten-fold by the addition of an appropriate concentration of bleomycin, a radiomimetic DNA-damaging drug. Using selective inhibitors of DNA polymerases, it was shown that the DNA polymerase involved in the bleomycin-induced DNA synthesis was DNA polymerase beta. In addition to DNA polymerase beta, an exonuclease which converts bleomycin-damaged DNA into suitable template-primers for repair DNA synthesis appeared to be present in the permeable cell extract.

  15. Attenuating endogenous Fgfr2b ligands during bleomycin-induced lung fibrosis does not compromise murine lung repair.

    Science.gov (United States)

    MacKenzie, BreAnne; Henneke, Ingrid; Hezel, Stefanie; Al Alam, Denise; El Agha, Elie; Chao, Cho-Ming; Quantius, Jennifer; Wilhelm, Jochen; Jones, Matthew; Goth, Kerstin; Li, Xiaokun; Seeger, Werner; Königshoff, Melanie; Herold, Susanne; Rizvanov, Albert A; Günther, Andreas; Bellusci, Saverio

    2015-05-15

    Fibroblast growth factors (Fgfs) mediate organ repair. Lung epithelial cell overexpression of Fgf10 postbleomycin injury is both protective and therapeutic, characterized by increased survival and attenuated fibrosis. Exogenous administration of FGF7 (palifermin) also showed prophylactic survival benefits in mice. The role of endogenous Fgfr2b ligands on bleomycin-induced lung fibrosis is still elusive. This study reports the expression of endogenous Fgfr2b ligands, receptors, and signaling targets in wild-type mice following bleomycin lung injury. In addition, the impact of attenuating endogenous Fgfr2b-ligands following bleomycin-induced fibrosis was tested by using a doxycycline (dox)-based inducible, soluble, dominant-negative form of the Fgfr2b receptor. Double-transgenic (DTG) Rosa26(rtTA/+);tet(O)solFgfr2b mice were validated for the expression and activity of soluble Fgfr2b (failure to regenerate maxillary incisors, attenuated recombinant FGF7 signal in the lung). As previously reported, no defects in lung morphometry were detected in DTG (+dox) mice exposed from postnatal days (PN) 1 through PN105. Female single-transgenic (STG) and DTG mice were subjected to various levels of bleomycin injury (1.0, 2.0, and 3.0 U/kg). Fgfr2b ligands were attenuated either throughout injury (days 0-11; days 0-28) or during later stages (days 6-28 and 14-28). No significant changes in survival, weight, lung function, confluent areas of fibrosis, or hydroxyproline deposition were detected in DTG mice. These results indicate that endogenous Fgfr2b ligands do not significantly protect against bleomycin injury, nor do they expedite the resolution of bleomycin-induced lung injury in mice. PMID:25820524

  16. Alveolar Surfactant Protein D Content Modulates Bleomycin-induced Lung Injury

    Science.gov (United States)

    Casey, John; Kaplan, Jennifer; Atochina-Vasserman, Elena N.; Gow, Andrew J.; Kadire, Helchem; Tomer, Yaniv; Fisher, James H.; Hawgood, Samuel; Savani, Rashmin C.; Beers, Michael F.

    2005-01-01

    Rationale: Surfactant protein D (SP-D) is a collectin family member with demonstrated immunomodulatory properties in vitro. We hypothesized that SP-D modulates inflammation during noninfectious lung injury in vivo. Objectives: To investigate the association of alveolar SP-D and injury, we studied the responses of transgenic mice expressing varying levels of SP-D to intratracheal bleomycin (ITB). Methods: Eight-week old C57/BL6 SP-D–deficient (?/?) mice and syngeneic wild-type (WT) controls or Swiss Black SP-D–overexpressing (SP-D OE) mice and littermate controls received either ITB or saline and were followed for up to 21 d. Measurements and Results: Kaplan-Meier analysis demonstrated a dose-dependent decrease in survival in ITB SP-D (?/?) mice receiving 2 U/kg bleomycin, with a 14-d mortality of 100% versus 0% mortality for WT receiving 2 U/kg ITB or SP-D (?/?) mice given saline (p < 0.05). At 8 d, ITB SP-D (?/?) mice had greater respiratory distress (frequency/tidal volume) and weight loss than ITB WT mice. Furthermore, bronchoalveolar lavage cellularity, pulmonary parenchymal inflammation, and tissue 3-nitrotyrosine (NO2 Y) were increased to a greater extent in ITB SP-D (?/?) mice. By 21 d, compared with all groups, ITB SP-D (?/?) survivors had increased Trichrome staining and tissue hydroxyproline levels. As proof of principle, SP-D OE mice were highly resistant to bleomycin-induced morbidity and mortality at doses up to 3 U/kg. Conclusions: These data provide new in vivo evidence for an antiinflammatory role for SP-D in response to noninfectious, subacute lung injury via modulation of oxidative-nitrative stress. PMID:15994463

  17. Tissue uptakes of 67 Ga-bleomycin and carrier free 67 Ga in fibrosarcoma-bearing mic

    International Nuclear Information System (INIS)

    67Gallium-bleomycin complex was prepared using Thakour method. Radio-thin-layer-chromatography of prepared complex showed A2 and B2 radio peaks with Rf at 0.7 and 0.4 respectively with a purity of above % 95. Tissue uptake of 67 Gallium-bleomycin complex and 67GaCl3 in twelve tissues including tumor, blood, liver, lung, spleen, muscle, skin, heart, kidney, colon, colon content, bladder and the total body were counted by well counter at 1,2,4,24 and 48 hours post injection of radiopharmaceuticals. Uptakes of tissues are expressed as percent injected dose per gram of tissue. The clearance rate of 67 Gallium-bleomycin complex was 1.75 - 1.95 times faster than 67GaCl3 at all time intervals. Bladder uptakes of 67 Gallium-bleomycin complex were highest among twelve tissues at 1,2 and 4 hours after injection, then falling rapidly after 24 and 48 hours. Blood uptake of 67 Gallium-bleomycin complex was lower than 67GaCl3 in all time intervals. Colon content uptake of 67 Gallium-bleomycin complex was highest among twelve tissues at 2 and 4 hours post injection. Tumor to tissue activity ratios were also calculated, showing an increase of tumor to blood and muscle ratios. Tumor to blood ratio increased from 0.3 at 1 hour to 5.3 at 48 hours. Activity ratios of muscle increased from 0.5 at 1 hour to 5.5 at 48 hours. Whole body counting of animals showed that effective half lives of 67 Gallium-bleomycin complex and 67GaCl3 were about 1 and 15 hours respectively, which renders faster excretion of 67 Gallium-bleomycin complex. Biodistribution data clearly indicates that prepared complex in comparison with carrier free 67Ga (67GaCl3) has two main advantages: 1) high tumor to soft tissue uptake ratio that make it suitable for tumor imaging. 2) faster excretion specially at first three hours post injection.In addition complex is stable in vitro and in vivo

  18. Cisplatin, vinblastine, and bleomycin in inoperable non-small cell lung cancer.

    OpenAIRE

    Stuart-Harris, R.; Fox, R. M.; D. Raghavan; Coates, A S; Hedley, D; Levi, J. A.; Woods, R L; Tattersall, M H

    1985-01-01

    Forty two patients with inoperable non-small cell lung cancer were entered into a phase II study of the combination chemotherapy regimen PVB (cisplatin 60 mg/m2 by intravenous infusion over two hours on day 1, vinblastine 4 mg/m2 by intravenous bolus on days 1 and 2, and bleomycin 15 mg intramuscularly on days 1, 8, and 15), repeated at three weekly intervals. Twelve of 40 evaluable patients (30%) achieved partial responses; there were no complete responses. The median duration of response wa...

  19. Bleomycin in Octaarginine-modified Fusogenic Liposomes Results in Improved Tumor Growth Inhibition

    OpenAIRE

    Koshkaryev, Alexander; Piroyan, Aleksandr; Torchilin, Vladimir P.

    2012-01-01

    Bleomycin (BLM) is an example of an anticancer drug that should be delivered into cytosol for its efficient therapeutic action. With this in mind, we developed octaarginine (R8)-modified fusogenic DOPE-liposomes (R8-DOPE-BLM). R8-modification dramatically increased (up to 50-fold) the cell-liposome interaction. R8-DOPE-liposomes were internalized via macropinocytosis and did not end up in the lysosomes. R8-DOPE-BLM led to a significantly stronger cell death and DNA damage in vitro relative to...

  20. Antifibrotic effects of crocetin in scleroderma fibroblasts and in bleomycin-induced sclerotic mice

    Scientific Electronic Library Online (English)

    Yinghua, Song; Lubing, Zhu; Ming, Li.

    2013-10-01

    Full Text Available OBJECTIVE: To investigate the antifibrotic effects of crocetin in scleroderma fibroblasts and in sclerotic mice. METHODS: Skin fibroblasts that were isolated from three systemic scleroderma (SSc) patients and three healthy subjects were treated with crocetin (0.1, 1 or 10 ?M). Cell proliferation [...] was measured with an MTT assay. Alpha-smooth muscle actin was detected via an immunohistochemical method. Alpha 1 (I) procollagen (COL1A1), alpha 1 (III) procollagen (COL3A1), matrix metalloproteinase (MMP)-1 and tissue inhibitor of matrix metalloproteinase (TIMP)-1 mRNA levels were measured using real-time PCR. SSc mice were established by the subcutaneous injection of bleomycin. Crocetin (50 mg/kg/d) was injected intraperitoneally for 14 days. Dermal thickness and lung fibrosis were assessed with Masson's trichrome staining. Plasma ET-1 was detected with an enzyme-linked immunosorbent assay (ELISA). Skin and lung ET-1 and COL1A1 mRNA levels were measured via real-time PCR. RESULTS: Crocetin inhibited the proliferation of SSc and normal fibroblasts, an effect that increased with crocetin concentration and incubation time. Crocetin decreased the expression of ?-SMA and the levels of mRNA for COL1A1, COL3A1 and matrix metalloproteinase-1, while crocetin increased TIMP-1 mRNA levels in both SSc and normal fibroblasts. Skin and lung fibrosis was induced, and the levels of ET-1 in the plasma, skin and lungs were elevated in bleomycin-injected mice. Crocetin alleviated the thickening of the dermis and lung fibrosis; decreased COL1A1 mRNA levels in the skin and lung; and simultaneously decreased ET-1 concentrations in the plasma and ET-1 mRNA levels in the skin and lungs of the bleomycin-induced sclerotic mice, especially during the early phase (weeks 1-3). CONCLUSION: Crocetin inhibits cell proliferation, differentiation and collagen production in SSc fibroblasts. Crocetin alleviates skin and lung fibrosis in a bleomycin-induced SSc mouse model, in part due to a reduction in ET-1.

  1. Bleomycin enhances the efficacy of sonodynamic therapy using aluminum phthalocyanine disulfonate.

    Science.gov (United States)

    Osaki, Tomohiro; Yokoe, Inoru; Uto, Yoshihiro; Ishizuka, Masahiro; Tanaka, Toru; Yamanaka, Nobuyasu; Kurahashi, Tsukasa; Azuma, Kazuo; Murahata, Yusuke; Tsuka, Takeshi; Ito, Norihiko; Imagawa, Tomohiro; Okamoto, Yoshiharu

    2016-01-01

    Sonodynamic therapy (SDT), or ultrasound combined with sonosensitization, is a promising approach because it is noninvasive and penetrates deeper than light does in photodynamic therapy. We examined whether bleomycin (BLM) could improve the efficacy of SDT. We performed an in vitro study using Colon-26 cells, which are derived from mouse colon cancer. SDT with BLM was significantly more cytotoxic than SDT alone both in vitro and in vivo. We also observed an ultrasound intensity-dependent cytotoxic effect of SDT with BLM. These findings suggest that SDT with BLM might provide a novel noninvasive treatment for deep-seated tumors. PMID:26384895

  2. Advanced and rapidly progressing head and neck cancer: good palliation following intralesional bleomycin.

    LENUS (Irish Health Repository)

    Quintyne, Keith Ian

    2011-09-01

    The authors herein report the case of a 61-year-old man undergoing adjuvant therapy for locally advanced laryngeal cancer, who developed parastomal recurrence in his radiation field around his tracheotomy site, while he was undergoing radiation therapy, and compromised the secure placement of his tracheotomy tube and maintenance of his upper airway. MRI restaging and biopsy confirmed recurrence and progressive disease in his mediastinum. He underwent local therapy with intralesional bleomycin with good palliation, and ability to maintain the patency of his upper airway.

  3. Consolidation electrochemotherapy with bleomycin in metastatic melanoma during treatment with dabrafenib

    International Nuclear Information System (INIS)

    Small molecules that inhibit V600 mutated BRAF protein, such as vemurafenib and dabrafenib, are effective in treatment of metastatic melanoma. We here describe the clinical course of a V600E BRAF mutated metastatic melanoma patient with systemic disease, who developed tumor progression on superficial soft-tissue metastases during treatment with dabrafenib. Bleomycin electrochemotherapy during dabrafenib treatment was administered to control the soft-tissue progressing metastases and ensured sustained local control without significant toxicity. The new combined approach maintained the patient quality of life and allowed for the prosecution of the target therapy, which proved to be still effective on systemic disease, up to 17 months

  4. Bleomycin/interleukin-12 electrochemogene therapy for treating naturally occurring spontaneous neoplasms in dogs

    OpenAIRE

    Reed, Scott D; Fulmer, Amanda; Buckholz, Julia; Zhang, Boyu; CUTRERA, JEFFRY; Shiomitsu, Kiejiro; LI, SHULIN

    2010-01-01

    Based on superior outcomes from electrochemogene therapy (ECGT) compared to electrochemotherapy (ECT)in mice, we determined the efficacy of ECGT applied to spontaneous canine neoplasms. Intralesional bleomycin (BLM) and feline interleukin-12 DNA (fIL-12 DNA) injection combined with trans-lesional electroporation resulted in complete cure of two recurrent World Health Organization (WHO) stageT2bN0M0 oral squamous cell carcinomas (SCCs)and one T2N0M0acanthomatous ameloblastoma. Three remaining ...

  5. Catalytic Mechanism of Bleomycin N-Acetyltransferase Proposed on the Basis of Its Crystal Structure*

    OpenAIRE

    Oda, Kosuke; MATOBA, Yasuyuki; Noda, Masafumi; Kumagai, Takanori; Sugiyama, Masanori

    2009-01-01

    Bleomycin (Bm) N-acetyltransferase, BAT, is a self-resistance determinant in Bm-producing Streptomyces verticillus ATCC15003. In our present study, we crystallized BAT under both a terrestrial and a microgravity environment in the International Space Station. In addition to substrate-free BAT, the crystal structures of BAT in a binary complex with CoA and in a ternary complex with Bm and CoA were determined. BAT forms a dimer structure via interaction of its C-terminal domains in the monomers...

  6. Biphasic pulses enhance bleomycin efficacy in a spontaneous canine genital tumor model of chemoresistance: Sticker sarcoma

    Directory of Open Access Journals (Sweden)

    Citro Gennaro

    2008-11-01

    Full Text Available Abstract Sticker's sarcoma (also known as transmissible venereal tumor is a horizontally transmitted neoplasm of the dog, that is passed with coitus. It is a locally aggressive tumor with a low tendency to metastatic spread. The most common locations are the genitals, the nose, the perianal area. Standard treatment consists with chemotherapy with vincristine, however other therapies such as, cryotherapy, immunotherapy or, in selected cases, radiation therapy, have been reported. In this article we describe the outcome of a small cohort of canine patients, with chemotherapy resistant transmissible venereal tumor (TVT, treated with bleomycin selectively driven by trains of biphasic pulses (electrochemotherapy. Three canine patients, with refractory TVT, entered the study and received two sessions of ECT under sedation. The pets had local injection of bleomycin at the concentration of 1.5 mg/ml and five minutes after the chemotherapy, trains of 8 biphasic electric pulses lasting 50 + 50 ?s each, with 1 ms interpulse intervals, were delivered by means of modified caliper or, for difficult districts, through paired needle electrode. All the patients responded to the treatment and are still in remission at different times. Electrochemotherapy appears as a safe and efficacious modality for the treatment of TVT and warrants further investigations.

  7. Effect of 0.25 ppm Ozone exposure on pulmonary damage induced by bleomycin

    Scientific Electronic Library Online (English)

    MANUEL, OYARZÚN; NELSON, DUSSAUBAT; SERGIO, GONZÁLEZ.

    Full Text Available To study the effect of ozone in a chronically damaged lung, we used a bleomycin (BLM) induced pulmonary fibrosis model. Both endotracheal instillation of BLM and O3 exposure both produce lung inflammation and fibrosis. Oxidative stress would be a common mechanism of damage for both BLM and O3. Our a [...] im was to assess lung injury induced by 5 and 60 days of intermittent exposure to 0.25 ppm O3 in rats with bleomycin-induced pulmonary fibrosis. Thirty-day-old Sprague Dawley rats were endotracheally instilled with BLM (1 U/100 g body weight) and, 30 days later, exposed to 0.25 ppm O3 (0.25 ppm 4 h per day, 5 days a week). Histopatology controls were instilled with saline and breathing room air. Histopathological evaluation of lungs was done 5 and 60 days after O3 exposure. BLM-induced lung damage did not change after 60 days of intermittent O3 exposure. Five days of O3 exposure increased the mean score of BLM-induced pulmonary inflammation and fibrosis (p=0.06). Frequency of bronchopneumonia increased from 1/7 to 6/6 (p

  8. Effect of 0.25 ppm Ozone exposure on pulmonary damage induced by bleomycin

    Directory of Open Access Journals (Sweden)

    MANUEL OYARZÚN

    2005-01-01

    Full Text Available To study the effect of ozone in a chronically damaged lung, we used a bleomycin (BLM induced pulmonary fibrosis model. Both endotracheal instillation of BLM and O3 exposure both produce lung inflammation and fibrosis. Oxidative stress would be a common mechanism of damage for both BLM and O3. Our aim was to assess lung injury induced by 5 and 60 days of intermittent exposure to 0.25 ppm O3 in rats with bleomycin-induced pulmonary fibrosis. Thirty-day-old Sprague Dawley rats were endotracheally instilled with BLM (1 U/100 g body weight and, 30 days later, exposed to 0.25 ppm O3 (0.25 ppm 4 h per day, 5 days a week. Histopatology controls were instilled with saline and breathing room air. Histopathological evaluation of lungs was done 5 and 60 days after O3 exposure. BLM-induced lung damage did not change after 60 days of intermittent O3 exposure. Five days of O3 exposure increased the mean score of BLM-induced pulmonary inflammation and fibrosis (p=0.06. Frequency of bronchopneumonia increased from 1/7 to 6/6 (p <0.001, suggesting that a short-term exposure to O3 in a previously damaged lung might be a risk factor for developing further lung injury

  9. Serum bleomycin-detectable iron in patients with thalassemia major with normal range of serum iron.

    Directory of Open Access Journals (Sweden)

    Han,Khin Ei

    1995-06-01

    Full Text Available "Free" iron, a potentially radical-generating low mass iron, and not found in normal human blood, was increased in the serum of blood-transfused thalassemia major patients seen in the Yangon General Hospital, Yangon, Myanmar (Burma. The low mass iron was detected by the bleomycin assay. Fifty-one blood samples were analyzed (from 28 males and 23 females. High "free" iron was detected in 47 sera samples from thalassemia patients. Serum ferritin, which reflects the body store iron, was higher than the normal range (10-200 ng/ml in 49 patients. On the other hand, serum iron of 39 sera samples fell within the normal range (50-150 micrograms/dl. Four were less than 50 micrograms/dl and eight were more than 150 micrograms/dl. Almost all the patients' sera of normal or higher serum iron level contained "free" iron. Thus, almost all the sera from thalassemic patients from Myanmar contain bleomycin-detectable iron, even when serum iron is within the normal range. In developing countries where undernutrition is prevalent (serum albumin in these patients was 3.6 +/- 0.4 g/dl, P < 0.0001 vs. control value of 4.0 - 4.8 g/dl, normal serum iron does not preclude the presence of free iron in the serum.

  10. The Effect of Bleomycin to the Mitotic Index who were Exposed to Radiation Chronically

    Directory of Open Access Journals (Sweden)

    Hilmi ?si

    2004-01-01

    Full Text Available Beginning with the therapeutic dose and increasing three differentdoses and three different periods of time Bleomycin (Bleomycin 0.3 ?g/ml, 3?g/ml and 30 ?g/ml, 6, 24, 48 hours were added to blood which was beingcultured on 5 samples who were exposed to radiation chronically.The mitotic index in the lymphocyte culture was determined by means ofcounting 1000 cells from preparations belong to control and experimentgroups.The mitotic index was showed difference value to the differencebleomycin dose and the between difference samples. As the mitotic indexvalue (Per 1000 cell 10.86 for the control group, this value fall to 8.73 at0.3 ?g/ml, 5.0 at 3 ?g/ml and 3.93 at 30 ?g/ml. There were no significantdifferences between control group and 0.3 ?g/ml, 3 ?g/ml and 30 ?g/ml(P>0.05. An important fall was seen between control group and 3 ?g/mland 30 ?g/ml, 0.3 ?g/ml group and 3 ?g/ml, 30 ?g/ml (P<0.01.

  11. Protective effect of dexpanthenol on bleomycin-induced pulmonary fibrosis in rats.

    Science.gov (United States)

    Ermis, Hilal; Parlakpinar, Hakan; Gulbas, Gazi; Vardi, Nigar; Polat, Alaadin; Cetin, Asli; Kilic, Talat; Aytemur, Zeynep Ayfer

    2013-12-01

    Despite extensive studies, there is no effective treatment currently available other than pirfenidone for idiopathic pulmonary fibrosis. A protective effect of pantothenic acid and its derivatives on cell damage produced by oxygen radicals has been reported, but it has not been tested in bleomycin (BLM)--induced pulmonary fibrosis in rats. Therefore, we aimed to investigate the preventive effect of dexpanthenol (Dxp) on pulmonary fibrosis. Thirty-two rats were assigned to four groups as follows: (1) control group, (2) dexpanthenol (Dxp) group; 500 mg/kg Dxp continued intraperitoneally for 14 days, (3) bleomycin (BLM) group; a single intratracheal injection of BLM (2.5 mg/kg body weight in 0.25-ml phosphate buffered saline), and (4) BLM + Dxp-treated group; 500 mg/kg Dxp was administered 1 h before the intratracheal BLM injection and continued for 14 days i.p. The histopathological grades of lung inflammation and collagen deposition, tissue levels of malondialdehyde (MDA), superoxide dismutase (SOD), catalase (CAT), glutathione peroxidase (GPx), and myeloperoxidase (MPO) were measured. BLM provoked inflammation and collagen deposition (p 0.05). We showed that Dxp significantly prevents BLM-induced lung fibrosis in rats. Further studies are required to evaluate the role of Dxp in the treatment of lung fibrosis. PMID:23995256

  12. Radio-isotope scanning using labelled bleomycin in positive and differential diagnosis of primary and secondary malignant pulmonary lesions

    International Nuclear Information System (INIS)

    A lung scan using bleomycin labelled with cobalt 57 was carried out in 308 patients representing 191 primary malignant tumours, 48 pulmonary metastases and 69 benign lesions. The primary and secondary malignant lesions always gave rise to a hyperactive focus except in 8 cases of primary lung tumour. The negative examination may be explained, either by the small size of the lesion or by radiotherapy in progress. Among the benign lesions, only advanced tuberculosis and very inflammatory lung diseases frequently took up labelled bleomycin (15 hyperactive foci out of 69 benign lesions). Quantitative measurements, i.e. ratio of the lesional activity/activity of healthy lung tissue, were carried out in all patients. The malignant lesions were usually more active than the benign lesions. There was no definite correlation between the uptake of labelled bleomycin and the histological nature of the lesion. However, undifferentiated and anaplastic carcinomas were often more active. One should emphasize that these results show that a hyperactive focus has a 94% chance of being a carcinoma. The absence of bleomycin uptake means that there is a 92% chance of a benign lesion

  13. Effects and possible anti-tumor immunity of electrochemotherapy with bleomycin on human colon cancer xenografts in nude mice

    OpenAIRE

    Zheng, Min-hua; Feng, Bo; Li, Jian-Wen; Lu, Ai-Guo; Wang, Ming-Liang; Hu, Wei-guo; Sun, Ji-Yuan; Hu, Yan-Yan; Ma, Jun-Jun; Yu, Bao-Ming

    2005-01-01

    AIM: To evaluate the anti-tumor effects and possible involvement of anti-tumor immunity of electrochemotherapy (ECT) employing electroporation and bleomycin in human colon cancer xenografts in nude mice, and to establish the experimental basis for clinical application of ECT.

  14. Association of the emerging carbapenemase NDM-1 with a bleomycin resistance protein in Enterobacteriaceae and Acinetobacter baumannii.

    Science.gov (United States)

    Dortet, Laurent; Nordmann, Patrice; Poirel, Laurent

    2012-04-01

    The carbapenemase NDM-1 has been identified recently in Enterobacteriaceae and Acinetobacter baumannii as a source of multidrug resistance, including resistance to carbapenems. By analyzing the immediate genetic environment of the bla(NDM-1) carbapenemase gene among a series of NDM-1-producing enterobacterial isolates, a novel gene (ble(MBL), for ble gene associated with the metallo-?-lactamase NDM-1) was identified. The ble(MBL) gene encodes a novel bleomycin resistance protein (BRP), named BRP(MBL), that shares weak similarities with known BRPs (less than 60% amino acid identity). The expression of BRP(MBL) conferred resistance to bleomycin and to bleomycin-like molecules in Enterobacteriaceae and A. baumannii. The bla(NDM-1) and ble(MBL) genes were coexpressed under the control of the same promoter, located upstream of the bla(NDM-1) gene and at the extremity of the insertion sequence ISAba125. Most of the NDM producers possessed the ble(MBL) gene. Although BRP(MBL) did not modify the growth or death rates of Escherichia coli under experimental conditions, it suppressed the mutation rate of hypermutable E. coli and therefore may stabilize the plasmid-borne bla(NDM-1) gene. This study suggests that the emerging carbapenemase NDM-1 is selected by bleomycin-like molecules, and that BRP(MBL) producers (and consequently NDM producers) are better suited to various environments. PMID:22290943

  15. Effects of turmeric and its active principle, curcumin, on bleomycin-induced chromosome aberrations in Chinese hamster ovary cells

    Scientific Electronic Library Online (English)

    Maria Cristina P., Araújo; Francisca da Luz, Dias; Sergio N., Kronka; Catarina S., Takahashi.

    1999-09-01

    Full Text Available Antioxidantes de ocorrência natural têm sido exaustivamente estudados quanto a sua capacidade de proteger organimos e células contra danos oxidativos. Muitos constituintes das plantas, incluindo cúrcuma e curcumina, parecem ser potentes antimutágenos e antioxidantes. Os efeitos de cúrcuma e curcumin [...] a na freqüência de aberrações cromossômicas induzidas pelo agente radiomimético bleomicina (BLM) foram investigados em células do ovário de hamster chinês (CHO). Três concentrações de cada droga, cúrcuma (100, 250 e 500 mg/ml) e curcumina (2,5, 5,0 e 10 mg/ml), foram combinadas com BLM (10 mg/ml) em células CHO tratadas durante as fases G1/S, S ou G2/S do ciclo celular. Nem cúrcuma nem curcumina evitaram o dano cromossômico induzido pela BLM em fase alguma do ciclo celular. Ao contrário, a potenciação da clastogenicidade da BLM pelo curcumina foi nitidamente observada em células tratadas durante as fases S e G2/S. A curcumina também se mostrou clastogênica na dose de 10 mg/ml nos protocolos de tratamento de 9 e 13 h. Contudo, o mecanismo exato pelo qual a curcumina produziu efeitos potenciadores e clastogênicos permanece desconhecido. Abstract in english Naturally occurring antioxidants have been extensively studied for their capacity to protect organisms and cells from oxidative damage. Many plant constituents including turmeric and curcumin appear to be potent antimutagens and antioxidants. The effects of turmeric and curcumin on chromosomal aberr [...] ation frequencies induced by the radiomimetic agent bleomycin (BLM) were investigated in Chinese hamster ovary (CHO) cells. Three concentrations of each drug, turmeric (100, 250 and 500 mg/ml) and curcumin (2.5, 5 and 10 mg/ml), were combined with BLM (10 mg/ml) in CHO cells treated during the G1/S, S or G2/S phases of the cell cycle. Neither turmeric nor curcumin prevented BLM-induced chromosomal damage in any phases of the cell cycle. Conversely, a potentiation of the clastogenicity of BLM by curcumin was clearly observed in cells treated during the S and G2/S phases. Curcumin was also clastogenic by itself at 10 µg/ml in two protocols used. However, the exact mechanism by which curcumin produced clastogenic and potentiating effects remains unknown.

  16. Phylogenomic analyses of nuclear genes reveal the evolutionary relationships within the BEP clade and the evidence of positive selection in Poaceae.

    Science.gov (United States)

    Zhao, Lei; Zhang, Ning; Ma, Peng-Fei; Liu, Qi; Li, De-Zhu; Guo, Zhen-Hua

    2013-01-01

    BEP clade of the grass family (Poaceae) is composed of three subfamilies, i.e. Bambusoideae, Ehrhartoideae, and Pooideae. Controversies on the phylogenetic relationships among three subfamilies still persist in spite of great efforts. However, previous evidence was mainly provided from plastid genes with only a few nuclear genes utilized. Given different evolutionary histories recorded by plastid and nuclear genes, it is indispensable to uncover their relationships based on nuclear genes. Here, eleven species with whole-sequenced genome and six species with transcriptomic data were included in this study. A total of 121 one-to-one orthologous groups (OGs) were identified and phylogenetic trees were reconstructed by different tree-building methods. Genes which might have undergone positive selection and played important roles in adaptive evolution were also investigated from 314 and 173 one-to-one OGs in two bamboo species and 14 grass species, respectively. Our results support the ((B, P) E) topology with high supporting values. Besides, our findings also indicate that 24 and nine orthologs with statistically significant evidence of positive selection are mainly involved in abiotic and biotic stress response, reproduction and development, plant metabolism and enzyme etc. from two bamboo species and 14 grass species, respectively. In summary, this study demonstrates the power of phylogenomic approach to shed lights on the evolutionary relationships within the BEP clade, and offers valuable insights into adaptive evolution of the grass family. PMID:23734211

  17. Cell adhesion molecules regulate fibrotic process via Th1/Th2/Th17 cell balance in a bleomycin-induced scleroderma model

    OpenAIRE

    Yoshizaki, Ayumi; Yanaba, Koichi; Iwata, Yohei; Komura, Kazuhiro; Ogawa, Asako; Akiyama, Yuichiro; Muroi, Eiji; Hara, Toshihide; Ogawa, Fumihide; Takenaka, Motoi; Shimizu, Kazuhiro; Hasegawa, Minoru; Fujimoto, Manabu; Tedder, Thomas F; Sato, Shinichi

    2010-01-01

    Mice subcutaneously injected with bleomycin, an experimental model for human systemic sclerosis, develop skin and lung fibrosis, which is mediated by inflammatory cell infiltration. This process is highly regulated by multiple adhesion molecules. To assess the role of adhesion molecules in this pathogenetic process, the bleomycin-induced fibrosis was examined in mice lacking adhesion molecules. In addition, this model does not require antigen sensitization. Therefore, we can exclude the possi...

  18. Bleomycin-induced lung injury in the rat: effects of the platelet-activating factor (PAF) receptor antagonist BN 52021 and platelet depletion.

    OpenAIRE

    EVANS, T. W.; McAnulty, R. J.; Rogers, D F; CHUNG, K. F.; BARNES, P. J.; Laurent, G. J.

    1990-01-01

    Bleomycin is a highly effective antitumor agent, but pulmonary toxicity, characterized by an acute inflammatory reaction and associated pulmonary edema, limits clinical use of the drug. Platelets and platelet-activating factor (PAF), a membrane-derived phospholipid, have been implicated in the mechanisms that can mediate pulmonary microvascular injury. We sought to investigate the role of PAF in bleomycin-induced lung injury in the rat, using the PAF receptor antagonist BN 52021; and the role...

  19. Cyclotron production of carrier-free cobalt-55, a new positron-emitting label for bleomycin

    International Nuclear Information System (INIS)

    A method for producing carrier-free 55Co (18.5 h) by proton bombardment of natural iron targets is presented. 55Co is formed primarily by means of the 56Fe (p, 2n)55Co reaction. Thin-target and thick-target yields as well as cross-section calculations are given in the 15-MeV to 40-MeV proton-energy range. Half-life measurements indicate a value of 18.5 h for 55Co. Chemical purification of the 55Co from the iron target is described 56Co, 52Mn, and 54Mn were found as radionuclidic impurities in the final preparation. The 55Co solution contains less than 0.5 ?g/ml of iron contamination. Synthesis of 55Co-bleomycin results in better than 99% labelling yield. (author)

  20. Chromosome aberrations by a new /sup 111/In-Bleomycin complex

    International Nuclear Information System (INIS)

    A new /sup 111/In-Bleomycin Complex (/sup 111/In-BLMC) was prepared and was effective for tumor imaging and therapy in mouse glioma and for killing human small cell lung cancer (SCLC) cells. Human SCLC cells (N417 or H526, NCI) were exposed to 0.9% NaCl, BLM (10-20 ?g/ml) or /sup 111/In-BLMC (24-50 ?Ci carried by 10-20 ?g BLM/ml) at 370C for 60 min. Cells were washed with fresh medium, treated with colcemid, hypotonic solution and fixer. Slides were stained with Giemsa solution and Q-binding stain. The karyotpe of the cells was analyzed. Experimental data is given. The results indicate that the /sup 111/In-BLMC causes chromosome damage which contributes to the tumor cell killing. The radiation dose from Auger electrons is small but concentrated and greatly increased chromosomal effects over that caused by BLM alone

  1. Lung cancer detection using a miniature sodium iodide detector and cobalt-57 bleomycin

    International Nuclear Information System (INIS)

    A small sodium iodide scintillation detector was designed for insertion through a fiberoptic bronchoscope to detect and localize sites of deposition of cobalt-57 bleomycin in lung cancer. The detector was used in 40 diagnostic studies of 34 patients; 21 of the patients had tumors. We compared the sensitivity, specificity, accuracy, and predictive value of the detector to those of plain chest x-ray films and bronchoscopy in detecting tumors. Sensitivity and specificity for the detector were 68 percent and 80 percent, respectively; for bronchoscopy, 72 percent and 100 percent; and for roentgenograms, 80 percent and 53 percent. Sensitivity for the detector and bronchoscopy combined was 92 percent. The detector succeeded in locating nonvisible submucosal and extraluminal tumors, and may contribute to early diagnosis and more accurate staging of lung cancer

  2. Labelling of bleomycin with technetium-99m for diagnosis in nuclear medicine

    International Nuclear Information System (INIS)

    A study about the behavior of the labelling yield of an antineoplastic drug (bleomycin) with a short-leved radionuclide (99 sup(m) Tc), using An(II) as a reductor agent, is presented. Parameters like the pH in the labelling, influence of the reaction time and mass of tin on the labelling yield were analysed. To simplify the labelling,, a lyofilized kit of Sn(II)/BLM in evacuated vials was prepared. The quality control involving paper chromatography, sterility and 'in vivo' test was made. The 'in vivo' tests were made both in healthy rats and in those with tumorous tissues, under barbituric action. The biological distribution, the concentration time of the products in tumors, the excretion time and excretion via were studied by means of scintigraphy and scintiphotos. (Author)

  3. Scintigraphy with 67Ga-citrate and 3In-bleomycin in rectal cancer

    International Nuclear Information System (INIS)

    Scintigraphy with 67Cs-citrate and 111In-bleomycin was performed in 26 patients with primary rectal cancer, 176 patients with suspected tumors, and in 34 patients without clinicoroentgenological signs of cancer recurrence. A focus of higher accumulation of these radionuclides in the rectal area was recorded in all 26 patients. Of 176 patients with symptoms of recurrence tumors were detected by means of ultrasonic and computed tomography of the small pelvis in 158 patients. False-positive results were marked in 18 (10.2%) patients with chronic infalmmatory processes at the site of the resected rectum, in anastomositis, and prostatic adenoma. In the control group of 34 patients false-positive results were marked in 8.8%. Positive scintigraphy used in combined diagnosis of rectal cancer recurrence holds promise

  4. Minimally Invasive Treatment of Giant Haemangiomas of the Liver: Embolisation With Bleomycin

    Energy Technology Data Exchange (ETDEWEB)

    Bozkaya, Halil, E-mail: halilbozkaya@yahoo.com; Cinar, Celal, E-mail: celalcinar@hotmail.com [Ege University, Division of Interventional Radiology, Department of Radiology, School of Medicine (Turkey); Besir, Fahri Halit, E-mail: drfhbesir@gmail.com [Duzce University, Department of Radiology, School of Medicine (Turkey); Par?ldar, Mustafa, E-mail: mparildar@yahoo.com; Oran, Ismail, E-mail: ismailoran@gmail.com [Ege University, Division of Interventional Radiology, Department of Radiology, School of Medicine (Turkey)

    2013-04-12

    PurposeThe management of patients with giant haemangioma of the liver remains controversial. Although the usual treatment method for symptomatic giant haemangioma is surgery, the classical paradigm of operative resection remains. In this study, we evaluated the symptomatic improvement and size-reduction effect of embolisation with bleomycin mixed with lipiodol for the treatment of symptomatic giant hepatic haemangioma.MethodsThis study included 26 patients [21 female, five male; age 41–65 years (mean 49.83 ± 1.53)] with symptomatic giant haemangioma unfit for surgery and treated with selective embolisation by bleomycin mixed with lipiodol. The patients were followed-up (mean 7.4 ± 0.81 months) clinically and using imaging methods. Statistical analysis was performed using SPSS version 16.0, and p < 0.05 was considered to indicate statistical significance.ResultsEmbolisation of 32 lesions in 26 patients was performed. The mean volume of the haemangiomas was 446.28 ± 88 cm{sup 3} (range 3.39–1559 cm{sup 3}) before intervention and 244.43 ± 54.38 cm{sup 3} (range 94–967 cm{sup 3}) after intervention. No mortality or morbidity related to the treatment was identified. Symptomatic improvement was observed in all patients, and significant volume reduction was achieved (p = 0.001).ConclusionThe morbidity of surgical treatment in patients with giant liver hemangioma were similar to those obtained in patients followed-up without treatment. Therefore, follow-up without treatment is preferred in most patients. Thus, minimally invasive embolisation is an alternative and effective treatment for giant symptomatic haemangioma of the liver.

  5. Discovery in PET/CT of an acute pulmonary toxicity with rapidly fatal bleomycin; Decouverte en TEP/TDM d'une toxicite pulmonaire aigue a la bleomycine rapidement fatale

    Energy Technology Data Exchange (ETDEWEB)

    Le Dortz, L.; Ben Fredj, M.; Lenoir, L.; Bahri, H.; Devillers, A.; Garin, E. [Centre Eugene-Marquis, Service de medecine nucleaire, 35 - Rennes (France)

    2010-07-01

    Purpose: we report the case of a patient treated by chemotherapy for a Hodgkin disease showing after treatment an important pulmonary uptake that appears bilateral and symmetric on PET in connection with an acute toxicity at the preclinical stage. Conclusions: an intense and diffuse pulmonary uptake of the {sup 18}F.D.G. during the chemotherapy, including particularly the bleomycin, can reveal an acute serious pulmonary toxicity and potentially deadly at the pre-symptomatic stage. (N.C.)

  6. Assessment of the tumourigenic and metastatic properties of SK-MEL28 melanoma cells surviving electrochemotherapy with bleomycin

    International Nuclear Information System (INIS)

    Electrochemotherapy is a local treatment combining chemotherapy and electroporation and is highly effective treatment approach for subcutaneous tumours of various histologies. Contrary to surgery and radiation, the effect of electrochemotherapy on metastatic potential of tumour cells has not been extensively studied. The aim of the study was to evaluate the effect of electrochemotherapy with bleomycin on the metastatic potential of human melanoma cells in vitro. Viable cells 48 hours after electrochemotherapy were tested for their ability to migrate and invade through Matrigel coated porous membrane. In addition, microarray analysis and quantitative Real-Time PCR were used to detect changes in gene expression after electrochemotherapy. Cell migration and invasion were not changed in melanoma cells surviving electrochemotherapy. Interestingly, only a low number of tumourigenesis related genes was differentially expressed after electrochemotherapy. Our data suggest that metastatic potential of human melanoma cells is not affected by electrochemotherapy with bleomycin, confirming safe role of electrochemotherapy in the clinics

  7. Therapeutic use of fisetin, curcumin, and mesoporous carbaon nanoparticle loaded fisetin in bleomycin-induced idiopathic pulmonary fibrosis

    Directory of Open Access Journals (Sweden)

    Srabani Kar

    2015-04-01

    Full Text Available Idiopathic pulmonary fibrosis (IPF is a devastating disease of unknown etiology, for which there is no curative pharmacological therapy. Bleomycin, an anti-neoplastic agent that causes lung fibrosis in human patients has been used extensively in rodent models to mimic IPF. The conventional therapy has been steroids and immunosuppressive agents. But only a minority of patients responds to such a therapy. IPF is a progressive, ultimately fatal disorder for which substantive medical therapy is desperately needed. Fisetin is a flavonol which inhibits the activity of several pro-inflammatory cytokines. The polyphenol curcumin is used to treat inflammatory diseases, abdominal disorders, and a variety of other ailments. The aim of this study was to evaluate the beneficial effect of fistine, curcumin and mesoporous carbaon nanoparticle (MCN loaded fisetin as an anti-inflammatory agents against bleomycin-induced changes in mice with IPF. In our study, flavonoids showed their anti fibrotic action. The inflammatory cell count was greatly increased for bleo treated individuals and effectiveness of fisein was increased after addition of MCN particles with it, curcumin also showed anti- inflammatory effects. In another experiment, bleomycin effectively inhibits the cellular recruitment to the spleen and treatment with fisetin, and curcumin increases the cellular recruitment in spleen. Colony count was also increased in MCN+fisetin treated groups, and it was statistically significant. We also observed the increased level of cytokines with fisetin treatment, with curcumin treatment and with MCN +fisetin treatment as compared to the bleo treated sample. In conclusion, the present research suggests that fisetin and curcumin and MCN loaded fisetin may be a promising therapeutic agent for bleomycin-induced changes in mice with IPF. This will open up new perspectives for a potential role of these drugs as a molecular target in Idiopathic pulmonary fibrosis. [Biomed Res Ther 2015; 2(4.000: 250-262

  8. Effectiveness of rosiglitazone on bleomycin-induced lung fibrosis: Assessed by micro-computed tomography and pathologic scores

    International Nuclear Information System (INIS)

    Peroxisome proliferator-activated receptor-? (PPAR?) agonists exhibit potent anti-fibrotic effects in the lung and other tissues. Recently, micro-computed tomography (CT) has been a useful tool for the investigation of lung diseases in small animals and is now increasingly applied to visualize and quantify the pulmonary structures. However, there is little information on the assessment for therapeutic effects of PPAR? agonists on the pulmonary fibrosis in mice using micro-CT. This study was aimed to determine the capability of micro-CT in examining the effects of rosiglitazone on pulmonary fibrosis. We used a murine model of bleomycin-induced lung fibrosis to evaluate the feasibility of micro-CT in evaluating the therapeutic potential of rosiglitazone on pulmonary fibrosis, comparing with pathologic scores. On micro-CT findings, ground glass opacity (80%) and consolidation (20%) were observed predominantly at 3 weeks after the instillation of bleomycin, and the radiologic features became more complex at 6 weeks. In bleomycin-instilled mice treated with rosiglitazone, the majority (80%) showed normal lung features on micro-CT. Radiological-pathologic correlation analyses revealed that ground glass opacity and consolidation were correlated closely with acute inflammation, while reticular opacity was well correlated with histological honeycomb appearance. These results demonstrate that rosiglitazone displays a protective effect on pulmonary fibrosis in mice and that the visualization of bleomycin-induced pulmonary fibrosis using micro-CT is satisfactory to assess the effects of rosiglitazone. It implies that micro-CT can be applied to evaluate therapeutic efficacies of a variety of candidate drugs for lung diseases.

  9. Calcium electroporation in three cell lines; a comparison of bleomycin and calcium, calcium compounds, and pulsing conditions

    DEFF Research Database (Denmark)

    Frandsen, Stine Krog; Gissel, Hanne

    2013-01-01

    Electroporation with calcium (calcium electroporation) can induce ATP depletion-associated cellular death. In the clinical setting, the cytotoxic drug bleomycin is currently used with electroporation (electrochemotherapy) for palliative treatment of tumors. Calcium electroporation offers several advantages over standard treatment options: calcium is inexpensive and may readily be applied without special precautions, as is the case with cytostatic drugs. Therefore, details on the use of calcium electroporation are essential for carrying out clinical trials comparing calcium electroporation and electrochemotherapy.

  10. Calcium electroporation in three cell lines; a comparison of bleomycin and calcium, calcium compounds, and pulsing conditions

    DEFF Research Database (Denmark)

    Frandsen, Stine Krog; Gissel, Hanne; Hojman, Pernille; Eriksen, Jens; Gehl, Julie

    2013-01-01

    Electroporation with calcium (calcium electroporation) can induce ATP depletion-associated cellular death. In the clinical setting, the cytotoxic drug bleomycin is currently used with electroporation (electrochemotherapy) for palliative treatment of tumors. Calcium electroporation offers several advantages over standard treatment options: calcium is inexpensive and may readily be applied without special precautions, as is the case with cytostatic drugs. Therefore, details on the use of calcium e...

  11. Effectiveness of rosiglitazone on bleomycin-induced lung fibrosis: Assessed by micro-computed tomography and pathologic scores

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Gong Yong; Bok, Se Mi; Han, Young Min [Department of Radiology, Chonbuk National University Medical School, Jeonju (Korea, Republic of); Chung, Myung Ja [Department of Pathology, Chonbuk National University Medical School, Jeonju (Korea, Republic of); Yoon, Kwon-Ha [Department of Radiology, Iksan Hospital, Iksan (Korea, Republic of); Kim, So Ri [Department of Internal Medicine and Research Center for Pulmonary Disorders, Chonbuk National University Medical School, Jeonju (Korea, Republic of); Lee, Yong Chul, E-mail: leeyc@jbnu.ac.kr [Department of Internal Medicine and Research Center for Pulmonary Disorders, Chonbuk National University Medical School, Jeonju (Korea, Republic of)

    2012-08-15

    Peroxisome proliferator-activated receptor-{gamma} (PPAR{gamma}) agonists exhibit potent anti-fibrotic effects in the lung and other tissues. Recently, micro-computed tomography (CT) has been a useful tool for the investigation of lung diseases in small animals and is now increasingly applied to visualize and quantify the pulmonary structures. However, there is little information on the assessment for therapeutic effects of PPAR{gamma} agonists on the pulmonary fibrosis in mice using micro-CT. This study was aimed to determine the capability of micro-CT in examining the effects of rosiglitazone on pulmonary fibrosis. We used a murine model of bleomycin-induced lung fibrosis to evaluate the feasibility of micro-CT in evaluating the therapeutic potential of rosiglitazone on pulmonary fibrosis, comparing with pathologic scores. On micro-CT findings, ground glass opacity (80%) and consolidation (20%) were observed predominantly at 3 weeks after the instillation of bleomycin, and the radiologic features became more complex at 6 weeks. In bleomycin-instilled mice treated with rosiglitazone, the majority (80%) showed normal lung features on micro-CT. Radiological-pathologic correlation analyses revealed that ground glass opacity and consolidation were correlated closely with acute inflammation, while reticular opacity was well correlated with histological honeycomb appearance. These results demonstrate that rosiglitazone displays a protective effect on pulmonary fibrosis in mice and that the visualization of bleomycin-induced pulmonary fibrosis using micro-CT is satisfactory to assess the effects of rosiglitazone. It implies that micro-CT can be applied to evaluate therapeutic efficacies of a variety of candidate drugs for lung diseases.

  12. Comparison of therapeutic response of keloids and hypertrophic scars to cryotherapy plus intralesional steroid and bleomycin tattoo

    Directory of Open Access Journals (Sweden)

    Farahnaz Fatemi

    2005-01-01

    Full Text Available Keloids and hypertrophic scars are abnormal responses of body to skin injuries. Overproduction of compacted fibrous tissue is the basic cause of these lesions. In this study the result of treatment of these skin conditions with bleomycin tattoo are compared with cryotherapy and triamcinolone injection. This study involved 45 patients with hypertrophic scar or keloid. Patients were divided into two groups consecutively. Group A (23 patients was treated with bleomycin tattoo and the group B with cryotherapy and triamcinolone injection. There were four therapeutic sessions one month apart. All patients were followedup for three month after the end of treatment .The therapeutic response was determined as reduction of lesion size or flattening relative to initial size. Therapeutic response was 88.3±14% in group A and 67.4 ±22.5% in group B (p<0.001. In group A 69%, but in group B only 49% of patients were asymptomatic after the end of treatment. In group A there was no relation between therapeutic response and lesion size (p=0.58 but in group B lesions those were smaller (<100mm2 had better therapeutic response than larger ones (p=0.007. It was concluded that bleomycin tattoo is more effective in treatment of hypertrophic scar and keloid than traditional treatment, cryotherapy plus triamcinolone injection especially in larger ones.

  13. PGI synthase overexpression protects against bleomycin-induced mortality and is associated with increased Nqo 1 expression.

    Science.gov (United States)

    Zhou, Weisong; Dowell, Dustin R; Geraci, Mark W; Blackwell, Timothy S; Collins, Robert D; Polosukhin, Vasiliy V; Lawson, William E; Wu, Pingsheng; Sussan, Thomas; Biswal, Shyam; Goleniewska, Kasia; O'Neal, Jamye; Newcomb, Dawn C; Toki, Shinji; Morrow, Jason D; Peebles, R Stokes

    2011-10-01

    The mortality rate for acute lung injury (ALI) is reported to be between 35-40%, and there are very few treatment strategies that improve the death rate from this condition. Previous studies have suggested that signaling through the prostaglandin (PG) I(2) receptor may protect against bleomycin-induced ALI in mice. We found that mice that overexpress PGI synthase (PGIS) in the airway epithelium were significantly protected against bleomycin-induced mortality and had reduced parenchymal consolidation, apoptosis of lung tissue, and generation of F(2)-isoprostanes compared with littermate wild-type controls. In addition, we show for the first time in both in vivo and in vitro experiments that PGI(2) induced the expression of NADP (H): quinoneoxidoreductase 1 (Nqo 1), an enzyme that prevents the generation of reactive oxygen species. PGI(2) induction of Nqo 1 provides a possible novel mechanism by which this prostanoid protects against bleomycin-induced mortality and identifies a potential therapeutic target for human ALI. PMID:21764988

  14. Serial micro-CT assessment of the therapeutic effects of rosiglitazone in a bleomycin-induced lung fibrosis mouse model

    International Nuclear Information System (INIS)

    The aim of this study was to assess the therapeutic effects of rosiglitazone with serial micro-CT findings before and after rosiglitazone administration in a lung fibrosis mouse model induced with bleomycin. We instilled the bleomycin solution directly into the trachea in twenty mice (female, C57BL/6 mice). After the instillation with bleomycin, mice were closely observed for 3 weeks and then all mice were scanned using micro-CT without sacrifice. At 3 weeks, the mice were treated with rosiglitazone on days 21 to 27 if they had abnormal CT findings (n = 9, 45%). For the mice treated with rosiglitazone, we performed micro-CT with mouse sacrifice 2 weeks after the rosiglitazone treatment completion. We assessed the abnormal CT findings (ground glass attenuation, consolidation, bronchiectasis, reticular opacity, and honeycombing) using a five-point scale at 3 and 6 weeks using Wilcoxon-signed ranked test. The micro-CT findings were correlated with the histopathologic results. One out of nine (11.1%) mice improved completely. In terms of consolidation, all mice (100%) showed marked decrease from 3.1 ± 1.4 at 3 weeks to 0.9 ± 0.9 at 6 weeks (p = 0.006). At 6 weeks, mild bronchiectasis (n = 6, 66.7%), mild reticular opacity (n 7, 77.8%) and mild honeycomb patterns (n = 3, 33.3%) appeared. A serial micro-CT enables the evaluation of drug effects in a lung fibrosis mouse model.

  15. Serial micro-CT assessment of the therapeutic effects of rosiglitazone in a bleomycin-induced lung fibrosis mouse model

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Eun Jung; Jin, Gong Yong; Bok, Se Mi; Han, Young Min; Lee, Young Sun; Jung, Myung Ja; Kwon, Keun Sang [Research Institute of Clinical Medicine of Chonbuk National University, Biomedical Research Institute of Chonbuk National University Hospital, Institute for Medical Sciences, Jeonju (Korea, Republic of)

    2014-08-15

    The aim of this study was to assess the therapeutic effects of rosiglitazone with serial micro-CT findings before and after rosiglitazone administration in a lung fibrosis mouse model induced with bleomycin. We instilled the bleomycin solution directly into the trachea in twenty mice (female, C57BL/6 mice). After the instillation with bleomycin, mice were closely observed for 3 weeks and then all mice were scanned using micro-CT without sacrifice. At 3 weeks, the mice were treated with rosiglitazone on days 21 to 27 if they had abnormal CT findings (n = 9, 45%). For the mice treated with rosiglitazone, we performed micro-CT with mouse sacrifice 2 weeks after the rosiglitazone treatment completion. We assessed the abnormal CT findings (ground glass attenuation, consolidation, bronchiectasis, reticular opacity, and honeycombing) using a five-point scale at 3 and 6 weeks using Wilcoxon-signed ranked test. The micro-CT findings were correlated with the histopathologic results. One out of nine (11.1%) mice improved completely. In terms of consolidation, all mice (100%) showed marked decrease from 3.1 ± 1.4 at 3 weeks to 0.9 ± 0.9 at 6 weeks (p = 0.006). At 6 weeks, mild bronchiectasis (n = 6, 66.7%), mild reticular opacity (n 7, 77.8%) and mild honeycomb patterns (n = 3, 33.3%) appeared. A serial micro-CT enables the evaluation of drug effects in a lung fibrosis mouse model.

  16. Bleomycin sensitivity in patients with familial and sporadic polyposis: a pilot study

    Directory of Open Access Journals (Sweden)

    Magaly M. Sales

    1999-03-01

    Full Text Available Human peripheral blood lymphocytes from 10 patients with familial adenomatous polyposis (FAP showed a significantly higher incidence of chromatid breaks when compared to cells from 10 normal individuals, after exposure to bleomycin (BLM during the G2 phase. However, no significant increase in bleomycin sensitivity was observed in lymphocytes from 10 patients with sporadic adenomatous polyps (AP vs. 10 normal individuals (P = 0.67. Individuals that exhibited an average number of chromatid breaks per cell higher than 0.80 were considered sensitive to the drug. No control showed susceptibility to BLM, as compared to 3 out of 20 patients.Inúmeros estudos têm mostrado que fibroblastos de pacientes com adenomatose hereditária de cólon e reto, que inclui polipose adenomatosa familial (FAP e a síndrome de Gardner, apresentam uma freqüência aumentada de aberrações cromossômicas após exposição a agentes físicos ou químicos, quando comparados aos controles normais. Para determinar a sensibilidade de linfócitos de pacientes com FAP e também com pólipos adenomatosos esporádicos (AP usou-se o radiomimético bleomicina (BLM. Foram estudados citogeneticamente 10 indivíduos com AP, 10 com FAP e 20 controles normais, pareados por sexo e idade. Indivíduos que apresentaram valores médios de quebras cromatídicas por célula superiores a 0,80 foram considerados sensíveis à droga. Observou-se uma diferença significativa entre pacientes com FAP e controles quanto às freqüências de quebras cromatídicas nos linfócitos tratados na fase G2. Entretanto, nenhuma diferença significativa foi observada entre pacientes com AP e controles quanto às freqüências de quebras cromatídicas nos linfócitos tratados. Nenhum indivíduo do grupo controle foi sensível à BLM e, entre os 20 pacientes, três mostraram suscetibilidade à droga. Não foi encontrada diferença significativa quanto a resposta à bleomicina entre indivíduos do sexo masculino e feminino. Entretanto, a distribuição de quebras induzidas por bleomicina em cada grupo cromossômico não foi similar nos pacientes do sexo feminino e controles normais. É possível que a sensibilidade cromossômica à BLM encontrada nos pacientes com FAP esteja relacionada a deficiência de reparo de DNA.

  17. Effects of phosphodiesterase 4 inhibition on bleomycin-induced pulmonary fibrosis in mice

    Directory of Open Access Journals (Sweden)

    Ghofrani Hossein A

    2010-05-01

    Full Text Available Abstract Background Pulmonary fibrosis (PF is a group of devastating and largely irreversible diseases. Phosphodiesterase (PDE 4 is involved in the processes of remodeling and inflammation, which play key role in tissue fibrosis. The aim of the study was, therefore, to investigate the effect of PDE4 inhibition in experimental model of PF. Methods PF was induced in C57BL/6N mice by instillation of bleomycin. Pharmacological inhibition of PDE4 was achieved by using cilomilast, a selective PDE4 inhibitor. Changes in either lung inflammation or remodeling were evaluated at different stages of experimental PF. Lung inflammation was assessed by bronchoalveolar lavage fluid (BALF differential cell count and reverse transcription quantitative polymerase chain reaction (RT-qPCR for inflammatory cytokines. Changes in tissue remodeling were evaluated by pulmonary compliance measurement, quantified pathological examination, measurement of collagen deposition and RT-qPCR for late remodeling markers. Survival in all groups was analyzed as well. Results PDE4 inhibition significantly reduced the total number of alveolar inflammatory cells in BALF of mice with bleomycin-induced PF at early fibrosis stage (days 4 and 7. Number of macrophages and lymphocytes, but not neutrophils, was significantly reduced as well. Treatment decreased lung tumor necrosis factor (TNF-? mRNA level and increased mRNA level of interleukin (IL-6 but did not influence IL-1?. At later stage (days 14 and 24 cilomilast improved lung function, which was shown by increase in lung compliance. It also lowered fibrosis degree, as was shown by quantified pathological examination of Hematoxilin-Eosin stained lung sections. Cilomilast had no significant effect on the expression of late remodeling markers such as transforming growth factor (TGF-?1 and collagen type Ia1 (COL(I?1. However, it tended to restore the level of lung collagen, assessed by SIRCOL assay and Masson's trichrome staining, and to improve the overall survival. Conclusions Selective PDE4 inhibition suppresses early inflammatory stage and attenuates the late stage of experimental pulmonary fibrosis.

  18. Radiotherapy and bleomycin-containing chemotherapy in the treatment of advanced head and neck cancer: report of six patients and review of the literature

    International Nuclear Information System (INIS)

    In an effort to improve the complete remission rate achievable with bleomycin and cisplatin, administered prior to radiotherapy in previously untreated patients with unresectable epidermoid carcinoma of the head and neck, we initiated a pilot study employing simultaneous chemotherapy and radiotherapy. Six patients were treated with bleomycin (B) 15 mg i.m. t.i.w. 30-60 minutes prior to radiotherapy (RT) treatment with conventional fractionation, 180-200 rad/fx, 5 fx/week. During interruptions in B + RT for healing of mucocutaneous reactions, patients received cisplatin 40 mg/mg m2 once weekly. Toxicity included severe mucositis within the radiation port in all patients, three episodes of infection, and significant myelosuppression in one patient. Transient mild serum creatinine elevation occurred in four patients. Three patients did not complete treatment because of severity of toxicity. Response was: primary--4/6CR, 1/6 PR; regional nodes--1/5 CR, 4/5 PR. Review of the literature of concurrent bleomycin and radiotherapy trials in head and neck cancer indicates that other investigators have encountered severe toxicity using bleomycin dose and radiation fractionation schedules similar to ours. Toxicity may be reduced when lower doses of concurrent bleomycin and/or alternative radiation fractionation schedules are employed. Although results of uncontrolled trials suggest a possible therapeutic advantage to treatment with the combination compared to radiotherapy alone, this has not clearly been established in the four randomized trials reviewed

  19. Paracetamol Supplementation Does Not Alter The Antitumor Activity and Lung Toxicity of Bleomycin

    Directory of Open Access Journals (Sweden)

    Ghada M. Suddek

    2014-01-01

    Full Text Available Bleomycin (BLM is well known by its antitumor activity both in vitro and in vivo. However, pulmonary fibrosis has been considered the dose limiting toxicity of the drug. Hyperpyrexia following injection of BLM was reported thus, paracetamol is sometimes administered with BLM as antipyretic drug. Actually, paracetamol was found to interfere with cytotoxicity of some drugs. This study was conducted to investigate the effect of paracetamol administration on the antitumor and lung toxicity of BLM. The antitumor activity was evaluated both in vitro and in vivo using Ehrlich ascites carcinoma (EAC cells. Paracetamol did not alter the antitumor effect of BLM in vitro or in vivo. The lung toxicity of BLM was evidenced by decrease in the body weight, increase in the lung/body weight ratio, decrease in the response of pulmonary arterial rings to 5-hydroxytryptamine (5-HT and increase in the contractility of tracheal smooth muscles induced by acetylcholine (ACh. The toxicity was also confirmed biochemically by marked increases in hydroxyproline and lipid peroxidation in rat lung and the decrease in reduced glutathione (GSH level. Pretreatment with paracetamol did not significantly change lipid peroxidation, GSH level, percent survival of rats or the response of pulmonary arterial rings and tracheal smooth muscles to 5-HT and ACh respectively. The results of the present study indicated that paracetamol neither modified the antitumor effect of BLM nor changed drug-induced lung toxicity.

  20. Development of an in vivo radionuclide generator by labeling bleomycin with 191Os

    International Nuclear Information System (INIS)

    Bleomycin (BLM) has been labeled with various radioisotopes and widely used in therapy and diagnosis. 191Os is a parent radionuclide with 15.4 day half-life and decays by beta emission to 191mIr, which is a radionuclide with 4.96 s half-life. BLM was labeled with 191Os-hexachloro-osmate and its distribution and stability in wild-type mice was determined. The complex was obtained at the pH 2 in normal saline at 90 deg C in 48 h. Radio-TLC showed an overall radiochemical yield of 93-97%, radio-chemical purity > 97%. The biodistribution study for 191Os-hexachloro-osmate and 191Os-BLM were carried in wild type-mice up to 14 days. Lungs, liver and spleen uptake increased 24-72 h after administration of 1910s-BLM. 24 h after administration, the radioactivity of the kidney increased and remained constant. (author)

  1. Effective treatment of Kaposi's sarcoma by electrochemotherapy and intravenous bleomycin administration.

    Science.gov (United States)

    Latini, A; Bonadies, A; Trento, E; Bultrini, S; Cota, C; Solivetti, F M; Ferraro, C; Ardigò, M; Amorosi, B; Palamara, G; Bucher, S; Giuliani, M; Cordiali-Fei, P; Ensoli, F; Di Carlo, A

    2012-01-01

    The present prospective study was aimed at evaluating the long-term efficacy of local electrochemotherapy (ECT) with the intravenous administration of bleomycin, on disease progression and viral activity in classic Kaposi's sarcoma (cKS), a vascular tumor related to human herpes virus-8 infection. Eighteen patients affected by isolate or multiple cutaneous lesions, refractory to conventional treatments, although in the absence of visceral involvement, were enrolled in a study. Follow-up visits were performed after 4 weeks and every 6 months for up to 48 months. A more extensive exploration of the immunologic status as well as of virological parameters was performed in nine patients. The results showed a significant clinical improvement in all patients after 4 weeks. A complete regression was observed in 12 patients after the first ECT, while four patients required a second treatment on the residual lesions after 4 weeks from the first intervention. The positive outcome persisted during the subsequent clinical control visits. Two patients, that showed rapidly evolving did not improve and relapsed despite a second round of ECT treatment. Effective treatment was associated with the reduction of viral load to undetectable levels. These data support the conduct of larger studies directed at validating the efficacy of ECT as a first-line therapy for cKS. PMID:22741941

  2. Internal parameters monitored during intraarterial cytostatic therapy with methotrexate and bleomycin combined with radiotherapy

    International Nuclear Information System (INIS)

    Over a period of ten years, i.e., 1973 to 1983, the Vienna Clinic of Mandibular and Facial Surgery treated 109 patients with primary inoperable malignant tumors using regional chemotherapy, i.e., a combination of methotrexate and bleomycin. 95 patients in the groups were also irradiated. The aim of the internal examinations was to assess whether from the beginning of cytostatic therapy it would be possible to deduct from laboratory chemical examinations some prognostic factors, or whether changes in internal parameters during therapy correspond to the further development of the growth. The examination of chemical parameters showed that the permanently reduced levels of Fe and anemia are demonstrably adverse factors for prognosis. The drop in leukocyte and thrombocyte counts and the toxic damage of bone marrow also proved to be such an adverse factor. On the other hand the rise in serum levels of LDH, AST and ALT in the process of therapy may be assessed as favourable factors for the prognosis of the disease. (author). 1 fig., 12 refs

  3. Induction of complete and incomplete chromosome aberrations by bleomycin in human lymphocytes

    Energy Technology Data Exchange (ETDEWEB)

    Benkhaled, L.; Xuncla, M.; Caballin, M.R. [Universitat Autonoma de Barcelona, Unitat d' Antropologia Biologica, Departament de Biologia Animal, Biologia Vegetal i Ecologia, E-08193 Bellaterra (Spain); Barrios, L. [Universitat Autonoma de Barcelona, Unitat de Biologia Cel.lular, Departament de Biologia Cel.lular, Fisiologia i Immunologia (Spain); Barquinero, J.F. [Universitat Autonoma de Barcelona, Unitat d' Antropologia Biologica, Departament de Biologia Animal, Biologia Vegetal i Ecologia, E-08193 Bellaterra (Spain)], E-mail: Francesc.Barquinero@uab.es

    2008-01-01

    Bleomycin (BLM) is a clastogenic compound, which due to the overdispersion in the cell distribution of induced dicentrics has been compared to the effect of high-LET radiation. Recently, it has been described that in fibroblast derived cell lines BLM induces incomplete chromosome elements more efficiently than any type of ionizing radiation. The objective of the present study was to evaluate in human lymphocytes the induction of dicentrics and incomplete chromosome elements by BLM. Peripheral blood samples have been treated with different concentrations of BLM. Two cytogenetic techniques were applied, fluorescence plus Giemsa (FPG) and FISH using pan-centromeric and pan-telomeric probes. The observed frequency of dicentric equivalents increases linearly with the BLM concentration, and for all BLM concentrations the distribution of dicentric equivalents was overdispersed. In the FISH study the ratio between total incomplete elements and multicentrics was 0.27. The overdispersion in the dicentric cell distribution, and the linear BLM-concentration dependence of dicentrics can be compared to the effect of high-LET radiation, on the contrary the ratio of incomplete elements and multicentrics is similar to the one induced by low-LET radiation ({approx}0.40). The elevated proportion of interstitial deletions in relation to total acentric fragments, higher than any type of ionizing radiation could be a characteristic signature of the clastogenic effect of BLM.

  4. Angiotensin II type 2 receptor antagonist reduces bleomycin-induced pulmonary fibrosis in mice

    Directory of Open Access Journals (Sweden)

    Tagami Atsuro

    2008-05-01

    Full Text Available Abstract Background The role of angiotensin II type 2 receptor (AT2 in pulmonary fibrosis is unknown. To evaluate the influence of angiotensin II type 1 receptor (AT1 and AT2 antagonists in a mouse model of bleomycin (BLM-induced pulmonary fibrosis. Methods We examined effects of the AT1 antagonist (AT1A olmesartan medoxomil (olmesartan and the AT2 antagonist (AT2A PD-123319 on BLM-induced pulmonary fibrosis, which was evaluated by Ashcroft's pathological scoring and hydroxyproline content of lungs. We also analyzed the cellular composition and cytokine levels in bronchoalveolar lavage fluid (BALF. Results With olmesartan, the lung fibrosis score and hydroxyproline level were significantly reduced, and lymphocyte and neutrophil counts and tumor necrosis factor (TNF-? levels in BALF were reduced on day 7. On day 14, macrophage and lymphocyte counts in BALF were reduced, accompanied by a reduction in the level of transforming growth factor (TGF-?1. With PD-123319, the lung fibrosis score and hydroxyproline level were reduced. On day 7, macrophage, lymphocyte, and neutrophil counts in BALF were reduced, accompanied by reductions in TNF-? and monocyte chemoattractant protein (MCP-1 levels. On day 14, macrophage, lymphocyte, and neutrophil counts in BALF were also reduced, accompanied by a reduction in the level of macrophage inflammatory protein (MIP-2 level but not TGF-?1. Conclusion Both AT1 and AT2 are involved in promoting interstitial pneumonia and pulmonary fibrosis via different mechanisms of action.

  5. Involvement of Kruppel-like factor 9 in bleomycin-induced pulmonary toxicity.

    Science.gov (United States)

    Gu, Yue; Wu, Yan-Bing; Wang, Li-Hui; Yin, Jia-Ning

    2015-10-01

    Oxidative stress or the production of reactive oxygen species (ROS) has been implicated as an important factor in the development of bleomycin (BLM)-induced pulmonary toxicity; however, the mechanism behind the toxicity remains to be elucidated. The present study aimed to investigate the key factor involved in BLM?induced toxicity. The study was conducted in human pulmonary fibroblast (HPF) cells and in a mouse model. The ROS level, cell death assay, protein and gene expression levels of Kruppel?like factor 9 (Klf9) and other associated factors were assessed. A dose?dependent increase in ROS, lipid peroxidation, cell death, and protein and mRNA expression levels of NF?E2?related transcription factor 2 (Nrf2) and Klf9 were observed in BLM?treated cells. However, the expression levels of the other antioxidant proteins assessed, including catalase, super oxide dismutase, glutathione reductase and thioredoxin reductase 2, were decreased. The expression levels of Nrf2 were decreased in cells treated with a higher concentration (>200 µM) of BLM. These results suggested that in response to increased intracellular levels of ROS, above a critical threshold, Nrf2 stimulates the expression of Klf9, resulting in a further increase in Klf9?mediated ROS production and subsequent cell death. Furthermore, the data suggested that Klf9 may be considered as an adjunctive therapeutic target for BLM-induced pulmonary toxicity. PMID:26133229

  6. Indium-111 bleomycin complex for radiochemotherapy of head and neck cancer - dosimetric and biokinetic aspects

    International Nuclear Information System (INIS)

    Bleomycin (BLM) is used for the treatment of head and neck cancer. In order to improve the effectiveness of this chemotherapeutic drug, BLM was combined with indium-111. A complex of these agents (111In-BLMC), formed at low pH, was injected intravenously into ten head and neck cancer patients in escalating activities of 75, 175 and 375 MBq. The internally delivered dose to the tumours varied from 0.20 to 2.73 mGy at 75 MBq, from 0.33 to 2.51 mGy at 175 MBq, and from 0.87 to 31.3 mGy at the 375 MBq activity level. Uptake of radioactivity was 0.45±0.24x10-3% ID/g in primary tumours and 0.52±0.20x10-3% ID/g in metastases (at 48 h). Tumour volumes varied from 0.51 to 49.0 cm-3. The radioactivity half-lives in the tumours were 30±7 h. The activity distribution and penetration into tumour tissue were not affected by increasing the injected activity. There was a positive correlation between BLMC uptake and Ki-67/Mib activity as well as number of mitoses in tumour tissue. These data indicate that 111In-BLMC has potential as a radiochemotherapeutic agent in head and neck cancer and that adjuvant Auger-electron therapy is possible using 114mIn-labelled BLMC. (orig.)

  7. Blockade of advanced glycation end product formation attenuates bleomycin-induced pulmonary fibrosis in rats

    Directory of Open Access Journals (Sweden)

    Liu Dai-Shun

    2009-06-01

    Full Text Available Abstract Background Advanced glycation end products (AGEs have been proposed to be involved in pulmonary fibrosis, but its role in this process has not been fully understood. To investigate the role of AGE formation in pulmonary fibrosis, we used a bleomycin (BLM-stimulated rat model treated with aminoguanidine (AG, a crosslink inhibitor of AGE formation. Methods Rats were intratracheally instilled with BLM (5 mg/kg and orally administered with AG (40, 80, 120 mg/kg once daily for two weeks. AGEs level in lung tissue was determined by ELISA and pulmonary fibrosis was evaluated by Ashcroft score and hydroxyproline assay. The expression of heat shock protein 47 (HSP47, a collagen specific molecular chaperone, was measured with RT-PCR and Western blot. Moreover, TGF?1 and its downstream Smad proteins were analyzed by Western blot. Results AGEs level in rat lungs, as well as lung hydroxyproline content and Ashcroft score, was significantly enhanced by BLM stimulation, which was abrogated by AG treatment. BLM significantly increased the expression of HSP47 mRNA and protein in lung tissues, and AG treatment markedly decreased BLM-induced HSP47 expression in a dose-dependent manner (p Conclusion These findings suggest AGE formation may participate in the process of BLM-induced pulmonary fibrosis, and blockade of AGE formation by AG treatment attenuates BLM-induced pulmonary fibrosis in rats, which is implicated in inhibition of HSP47 expression and TGF?/Smads signaling.

  8. Electrochemotherapy with intravenous bleomycin injection: an observational study in superficial squamous cell carcinoma in cats.

    Science.gov (United States)

    Tozon, Natasa; Pavlin, Darja; Sersa, Gregor; Dolinsek, Tanja; Cemazar, Maja

    2014-04-01

    The aim of this study was to evaluate the efficacy and safety of electrochemotherapy (ECT) with bleomycin for treatment of squamous cell carcinoma (SCC) in cats. Between March 2008 and October 2011, 11 cats with 17 superficial SCC nodules in different clinical stages (ranging from Tis to T4), located on nasal planum (6/11), pinnae (3/11) and both locations (2/11), were included in a prospective non-randomised study. Sixteen of 17 SCC nodules were treated with ECT (15/16 with single session and in one case with two sessions); one nodule was surgically removed. Altogether, complete response (CR) was achieved for 81.8% (9/11) cats and 87.5% (14/16) nodules, lasting from 2 months up to longer than 3 years. Only 2/9 cats in which CR was initially observed, had recurrence 2 and 8 months after the ECT procedure. In the remaining two cats with highly infiltrative spread into adjacent tissues, progression of the disease was observed, despite ECT, and both were euthanased 4 and 5 months after the procedure. ECT in cats was well tolerated and no evident local or systemic side effects were observed. The results of this study suggest that ECT is a highly effective and safe method of local tumour control of feline cutaneous SCCs. It should be considered as an alternative treatment option, especially when other treatment approaches are not acceptable by the owners, owing to their invasiveness, mutilation or high cost. PMID:24127456

  9. Nondysgerminomatous tumors of the ovary treated with cisplatin, vinblastine, and bleomycin: long-term results.

    Science.gov (United States)

    De Palo, G; Zambetti, M; Pilotti, S; Rottoli, L; Spatti, G; Fontanelli, R; Musumeci, R; Kenda, R; Bombardieri, E; Stefanon, B

    1992-11-01

    Twenty-four consecutive patients with nondysgerminomatous germ cell tumor of the ovary were treated after surgery with cisplatin, vinblastine, and bleomycin (PVB regimen). The cycle was repeated every 3 weeks for three to five courses. Fourteen patients had endodermal sinus tumor, and 10 had mixed germ cell tumors. Stage of disease (FIGO, 1986) was as follows: stage I, 6; stage IIc-IV, 17; and recurrence, 1 patient. All patients were monitored by alpha-fetoprotein and human chorionic gonadotropin. Only 1 patient had received previous chemotherapy. All 5 patients without residual disease and with negative marker levels in which PVB was used as adjuvant treatment were free of disease for a median duration of 59 months from the start of PVB. Of the 19 patients with measurable disease (evident disease or positive marker levels), complete remission was obtained in 16 (84%), but 5 of these relapsed. Therefore, treatment with PVB failed in 8 out of 19 patients (42%) with measurable disease. Toxicity was evident, but no patient died of it. Menses were regular in 11 patients whose initial surgery was conservative. PVB regimen is an effective but not a satisfactory treatment. The considerable failure rate of PVB treatment suggests the investigation of other regimens. PMID:1281804

  10. Hirsutella sinensis mycelium attenuates bleomycin-induced pulmonary inflammation and fibrosis in vivo

    Science.gov (United States)

    Huang, Tsung-Teng; Lai, Hsin-Chih; Ko, Yun-Fei; Ojcius, David M.; Lan, Ying-Wei; Martel, Jan; Young, John D.; Chong, Kowit-Yu

    2015-01-01

    Hirsutella sinensis mycelium (HSM), the anamorph of Cordyceps sinensis, is a traditional Chinese medicine that has been shown to possess various pharmacological properties. We previously reported that this fungus suppresses interleukin-1? and IL-18 secretion by inhibiting both canonical and non-canonical inflammasomes in human macrophages. However, whether HSM may be used to prevent lung fibrosis and the mechanism underlying this activity remain unclear. Our results show that pretreatment with HSM inhibits TGF-?1–induced expression of fibronectin and ?-SMA in lung fibroblasts. HSM also restores superoxide dismutase expression in TGF-?1–treated lung fibroblasts and inhibits reactive oxygen species production in lung epithelial cells. Furthermore, HSM pretreatment markedly reduces bleomycin–induced lung injury and fibrosis in mice. Accordingly, HSM reduces inflammatory cell accumulation in bronchoalveolar lavage fluid and proinflammatory cytokines levels in lung tissues. The HSM extract also significantly reduces TGF-?1 in lung tissues, and this effect is accompanied by decreased collagen 3?1 and ?-SMA levels. Moreover, HSM reduces expression of the NLRP3 inflammasome and P2X7R in lung tissues, whereas it enhances expression of superoxide dismutase. These findings suggest that HSM may be used for the treatment of pulmonary inflammation and fibrosis. PMID:26497260

  11. Malformaciones linfáticas: tratamiento percutáneo con bleomicina / Lymphatic malformations: percutaneus treatment with bleomycin

    Scientific Electronic Library Online (English)

    José Luis, Cuervo; Eduardo, Galli; Guillermo, Eisele; Erica, Johannes; Alejandro, Fainboim; Silvia, Tonini; Walter, Joaquin; Bettina, Viola; Miguel, Nazar.

    2011-10-01

    Full Text Available Las malformaciones linfáticas son anomalías del desarrollo del sistema linfático que tienden a sufrir complicaciones en su evolución. En la última década, la terapia con agentes esclerosantes ha ido ganando popularidad sobre la cirugía, por su eficacia, sus menores complicaciones y sus excelentes re [...] sultados estéticos. Presentamos una serie de 24 pacientes tratados mediante esclerosis percutánea con bleomicina. Los resultados fueron excelentes (reducción de volumen ? 95% y asintomáticos) en 12 pacientes, buenos (reducción de volumen entre 50% y 95% y asintomáticos) en 5 pacientes, regulares (reducción de volumen Abstract in english Lymphatic malformations are developmental abnormalities of the lymphatic system, which tend to complicate during their evolution. In the last decade, therapy with sclerosing agents has gained popularity over surgery due to its effectiveness, fewer complications, and excellent cosmetic results. We pr [...] esent a series of 24 patients treated with percutaneous bleomycin injection. Results were excellent (volume reduction ? 95%, without symptoms) in 12 patients, good (volume reduction between 50% and 95%, without symptoms) in 5 patients, fair (volume reduction

  12. Airway epithelial progenitors are region specific and show differential responses to bleomycin-induced lung injury.

    Science.gov (United States)

    Chen, Huaiyong; Matsumoto, Keitaro; Brockway, Brian L; Rackley, Craig R; Liang, Jiurong; Lee, Joo-Hyeon; Jiang, Dianhua; Noble, Paul W; Randell, Scott H; Kim, Carla F; Stripp, Barry R

    2012-09-01

    Mechanisms that regulate regional epithelial cell diversity and pathologic remodeling in airways are poorly understood. We hypothesized that regional differences in cell composition and injury-related tissue remodeling result from the type and composition of local progenitors. We used surface markers and the spatial expression pattern of an SFTPC-GFP transgene to subset epithelial progenitors by airway region. Green fluorescent protein (GFP) expression ranged from undetectable to high in a proximal-to-distal gradient. GFP(hi) cells were subdivided by CD24 staining into alveolar (CD24(neg)) and conducting airway (CD24(low)) populations. This allowed for the segregation of three types of progenitors displaying distinct clonal behavior in vitro. GFP(neg) and GFP(low) progenitors both yielded lumen containing colonies but displayed transcriptomes reflective of pseudostratified and distal conducting airways, respectively. CD24(low)GFP(hi) progenitors were present in an overlapping distribution with GFP(low) progenitors in distal airways, yet expressed lower levels of Sox2 and expanded in culture to yield undifferentiated self-renewing progeny. Colony-forming ability was reduced for each progenitor cell type after in vivo bleomycin exposure, but only CD24(low) GFP(hi) progenitors showed robust expansion during tissue remodeling. These data reveal intrinsic differences in the properties of regional progenitors and suggest that their unique responses to tissue damage drive local tissue remodeling. PMID:22696116

  13. Autoradiographic and histological findings in vulva carcinomas with local bleomycin therapy

    International Nuclear Information System (INIS)

    Bleomycin was administered to 25 female patients with vulva carcinoma with problematic location of high operation risk. Macroscopically, in 75% of the cases, there was a tumour reduction of more than 50%. In addition to an immediate effect, at a later date (tau- = 21 days) the tumour was observed to have diminished. Histologically, in the well-reacting tumours a higher differentiation, foreign body granulomas, tumour decomposition, tumour-giant cells, and proliferation of the connective tissue. The histological changes were accompanied by a significant restriction of the proliferation which could be proven autoradiographically. The reaction of the carcinomas depended on the stage of the tumour, the degree of differentiation of the tumours, on the initial proliferation activity, and the age of the patients, however not on the sort of pre-treatment and the extent of the carcinoma. The local application of BLM should be reserved exclusively for cases with problematic location and high operation risk. The application of BLM in connection with a radiotherapy or poly-chemotherapy is discussed for these cases. (orig.) 891 MG/orig. 892 RDG

  14. Combined bleomycin and irradiation in preoperative treatment of advanced squamous cell carcinoma of the vulva

    Energy Technology Data Exchange (ETDEWEB)

    Scheistroeen, M. (Norwegian Radium Hospital, Oslo (Norway)); Trope, C. (Norwegian Radium Hospital, Oslo (Norway))

    1993-01-01

    Forty-two patients with advanced squamous cell carcinoma of the vulva were treated with a combination regimen of bleomycin 180 mg and external irradiation 30-45 Gy. Twenty patients had primary lesions, and 22 patients had recurrent disease. Fifteen (75%) of the patients with primary disease showed objective response (five complete and ten partial response). Four underwent surgery. Of these, one is alive after 60 months with no evidence of disease. Two have died of unrelated causes without signs of recurrence. Seventeen relapsed and died of carcinoma of the vulva. Median survival for patients treated for primary disease was 8.0 months. Thirteen (59%) of 22 patients treated for recurrence showed objective response (two complete and eleven partial responses). None underwent surgery. All these patients died of carcinoma of the vulva. Median survival was 6.4 months. Toxicity was acceptable, and there were no treatment-related deaths. Even taking into account that our patients had very advanced disease, the results are disappointing. An increase of the radiation dose beyond the maximum of 45 Gy given, and more aggressive surgery, might have improved the results. (orig.).

  15. Combined bleomycin and irradiation in preoperative treatment of advanced squamous cell carcinoma of the vulva

    International Nuclear Information System (INIS)

    Forty-two patients with advanced squamous cell carcinoma of the vulva were treated with a combination regimen of bleomycin 180 mg and external irradiation 30-45 Gy. Twenty patients had primary lesions, and 22 patients had recurrent disease. Fifteen (75%) of the patients with primary disease showed objective response (five complete and ten partial response). Four underwent surgery. Of these, one is alive after 60 months with no evidence of disease. Two have died of unrelated causes without signs of recurrence. Seventeen relapsed and died of carcinoma of the vulva. Median survival for patients treated for primary disease was 8.0 months. Thirteen (59%) of 22 patients treated for recurrence showed objective response (two complete and eleven partial responses). None underwent surgery. All these patients died of carcinoma of the vulva. Median survival was 6.4 months. Toxicity was acceptable, and there were no treatment-related deaths. Even taking into account that our patients had very advanced disease, the results are disappointing. An increase of the radiation dose beyond the maximum of 45 Gy given, and more aggressive surgery, might have improved the results. (orig.)

  16. Induction of complete and incomplete chromosome aberrations by bleomycin in human lymphocytes

    International Nuclear Information System (INIS)

    Bleomycin (BLM) is a clastogenic compound, which due to the overdispersion in the cell distribution of induced dicentrics has been compared to the effect of high-LET radiation. Recently, it has been described that in fibroblast derived cell lines BLM induces incomplete chromosome elements more efficiently than any type of ionizing radiation. The objective of the present study was to evaluate in human lymphocytes the induction of dicentrics and incomplete chromosome elements by BLM. Peripheral blood samples have been treated with different concentrations of BLM. Two cytogenetic techniques were applied, fluorescence plus Giemsa (FPG) and FISH using pan-centromeric and pan-telomeric probes. The observed frequency of dicentric equivalents increases linearly with the BLM concentration, and for all BLM concentrations the distribution of dicentric equivalents was overdispersed. In the FISH study the ratio between total incomplete elements and multicentrics was 0.27. The overdispersion in the dicentric cell distribution, and the linear BLM-concentration dependence of dicentrics can be compared to the effect of high-LET radiation, on the contrary the ratio of incomplete elements and multicentrics is similar to the one induced by low-LET radiation (?0.40). The elevated proportion of interstitial deletions in relation to total acentric fragments, higher than any type of ionizing radiation could be a characteristic signature of the clastogenic effect of BLM

  17. Thymoquinone blocks lung injury and fibrosis by attenuating bleomycin-induced oxidative stress and activation of nuclear factor Kappa-B in rats

    International Nuclear Information System (INIS)

    Pulmonary fibrosis is one of the most common chronic interstitial lung diseases with high mortality rate after diagnosis and limited successful treatment. The present study was designed to assess the potential antifibrotic effect of thymoquinone (TQ) and whether TQ can attenuate the severity of oxidative stress and inflammatory response during bleomycin-induced pulmonary fibrosis. Male Wister rats were treated intraperitoneally with either bleomycin (15 mg/kg, 3 times a week for 4 weeks) and/or thymoquinone (5 mg/kg/day, 1 week before and until the end of the experiment). Bleomycin significantly increased lung weight and the levels of Lactate dehydrogenase, total leucocytic count, total protein and mucin in bronchoalveolar lavage and these effects were significantly ameliorated by TQ treatment. As markers of oxidative stress, bleomycin caused a significant increase in the levels of lipid peroxides and nitric oxide accompanied with a significant decrease in the antioxidant enzyme activity of superoxide dismutase and glutathione transferase. TQ treatment restored these markers toward normal values. TQ also counteracted emphysema in air alveoli, inflammatory cell infiltration, lymphoid hyperplastic cells activation surrounding the bronchioles and the over expression of activated form of nuclear factor kappa-B (NF-B) in lung tissue that was induced by bleomycin. Fibrosis was assessed by measuring hydroxyproline content, which increased markedly in the bleomycin group and significantly reduced by concurrent treatment with TQ. Furthermore, histopathological examination confirmed the antifibrotic effect of TQ. Collectively these findings indicate that TQ has potential antifibrotic effect beside its antioxidant activity that could be through NF-?B inhibition.

  18. Investigation of the interacorporcal decay, elimination rate and diagnostic confidence of 57Co-bleomycine in patients with the uterine cervix cancer

    International Nuclear Information System (INIS)

    In 20 women with diagnosed squamous carcinoma of the uterine cervix the 57Co-Bleomycine was used for the estimation of the intracorporeal decay, elimination rate and neoplasmic tissue storage of the complex. Whole body scanner ''Scan modus'' type and gamma chamber were used. A rapid elimination of the examined complex with urine was noted, the blood concentration was significantly higher (p57Co-Bleomycine) can be applied as diagnostic means in cases of uterine squamous carcinoma and in its metastases. (author)

  19. Chromosomal aberrations in the peripheral lymphocytes of cancer patients treated with high-energy electrons and bleomycin

    International Nuclear Information System (INIS)

    5 patients with inoperable bronchogenic carcinomas on a weekly therapy with a low dose of bleomycin (BL) plus irradiation with high-energy electrons, were analysed cytogenetically by cultivating peripheral lymphocytes taken immediately before the BL treatments and some hours before the irradiations. For the induction of dicentric chromosomes, linear dose-effect relationships were found: 3 of the patients responded with similar dose-effect relationships. The other 2 were different: they were not comparable with those 3 or with each other. These results were unexpected because all 5 patients received similar types of treatment. (orig.)

  20. Comprehensive microRNA analysis in bleomycin-induced pulmonary fibrosis identifies multiple sites of molecular regulation

    OpenAIRE

    Xie, TING; LIANG, JIURONG; Guo, Rishu; Liu, Ningshan; Noble, Paul W.; Jiang, Dianhua

    2011-01-01

    The molecular mechanisms of lung injury and fibrosis are incompletely understood. MicroRNAs (miRNAs) are crucial biological regulators that act by suppressing their target genes and are involved in a variety of pathophysiological processes. To gain insight into miRNAs in the regulation of lung fibrosis, total RNA was isolated from mouse lungs harvested at different days after bleomycin treatment, and miRNA array with 1,810 miRNA probes was performed thereafter. MiRNAs expressed in lungs with ...

  1. Experimental studies on the radiation-modifying effect of bleomycin in malignant and normal mouse tissue in vivo

    DEFF Research Database (Denmark)

    Molin, J; Søgaard, P E; Overgaard, Jens

    1981-01-01

    The interaction between bleomycin (BLM) and radiation was studied in a C3H mammary carcinoma and its surrounding normal skin. In the skin, single and fractionated doses of sequential treatment with BLM (25 mg/kg) 24 hours prior to radiation therapy did not influence the response to irradiation, whereas simultaneous treatment with BLM given 15 minutes before radiation therapy enhanced the reaction to irradiation by a factor of 1.2 or 1.4 following treatment with one fraction or five fractions, re...

  2. Bleomycin-resistance gene derived from the transposon Tn5 confers selective advantage to Escherichia coli K-12.

    OpenAIRE

    Blot, M.; Meyer, J.; Arber, W

    1991-01-01

    The plasmid pRAB2 contains a silent operon derived from the transposon Tn5 and carrying the gene neo for neomycin-kanamycin resistance and a truncated ble gene (ble333) for bleomycin resistance. Spontaneous mutants that express the two resistances provide Escherichia coli cells an improved fitness during the phase of decline in the absence of the antibiotics. It is shown that the ble333 gene product is responsible for this better fitness. These results can explain a previously described selec...

  3. Geneva protocols

    International Nuclear Information System (INIS)

    The First Protocol Additional to the Geneva Conventions of 1949 and relating to the Protection of Victims of International Armed Conflicts contains provisions prohibiting indiscriminate attacks. Nuclear warfare as such is not mentioned in the Protocol. It has been asserted that the Protocol does not apply to nuclear weapons for several reasons. However, close analysis shows that the rules governing the application of means and methods of warfare cannot exempt the nuclear weapons. If nuclear weapons are applied in a manner not consistent with article 51 of Protocol I, their use is forbidden by this article even in situations in which general international law might grant an exception from the ban on nuclear weapons, as in the case of reprisal. (orig./HSCH)

  4. SPECT quantitation of cobalt-57 bleomycin delivery to human brain tumors

    International Nuclear Information System (INIS)

    A newly developed and validated noninvasive quantitative SPECT method was used to measure the in vivo uptake of [57Co]bleomycin (Co-bleo) in 13 human brain tumors and the uptake of [/sup 99m/Tc]glucoheptonate (GH) in 23 brain tumors. Significant differences in tumor uptake were found. The tumor concentration over time, the tumor to blood radioactivity at 30 min and the tumor cumulative concentration of radioactivity showed marked differences even between tumors with the same histology. Only a weak correlation was found between tumor concentration of Co-bleo and of GH. Therefore, a simple imaging agent such as GH cannot, at the present time, serve as an indicator of individual tumor uptake and further experience with other agents is still necessary. Contrary to the generally held view, no correlation was found between the concentration of drug in the blood and its tumor concentration. It is suggested, therefore, that the level of a drug in the blood cannot be used as a criterion of the amount that will penetrate the tumor. Direct SPECT measurement of the concentration of the drug in the tumor itself should be performed. The bioavailability of a drug is critical in order for it to exert it tumoricidal effect. The results, showing marked differences in uptake between brain tumors, suggest that before chemotherapy is administered, uptake of the chemotherapeutic drug in the individual tumor to be treated should be assessed and comparisons should be made between the uptake of a series of drugs to determine which drug would be most efficacious on the basis of its uptake as well as its tumor cell killing potential

  5. T regulatory cells and attenuated bleomycin-induced fibrosis in lungs of CCR7-/- mice

    Directory of Open Access Journals (Sweden)

    Trujillo Glenda

    2010-09-01

    Full Text Available Abstract Background C-C chemokine receptor (CCR7 is a regulator of dendritic cell and T cell migration, and its role in tissue wound healing has been investigated in various disease models. We have previously demonstrated that CCR7 and its ligand, chemokine (C-C motif ligand (CCL21, modulates wound repair in pulmonary fibrosis (PF but the mechanism of this is unknown. The objective of this study was to investigate whether the absence of CCR7 protects against bleomycin (BLM-induced PF. CCR7-/- mice failed to mount a fibrotic pulmonary response as assessed by histologic collagen staining and quantification by hydroxyproline. We hypothesized that the prominent characteristics of CCR7-/- mice, including elevated levels of cytokine and chemokine mediators and the presence of bronchus-associated lymphoid tissue (BALT might be relevant to the protective phenotype. Results Pulmonary fibrosis was induced in CCR7+/+ and CCR7-/- mice via a single intratracheal injection of BLM. We found that the lung cytokine/chemokine milieu associated with the absence of CCR7 correlated with an increase in BALT, and might be attributable to regulatory T cell (Treg homeostasis and trafficking within the lungs and lymph nodes. In response to BLM challenge, CCR7-/- mice exhibited an early, steady increase in lung CD4+ T cells and increased CD4+ CD25+ FoxP3+ Tregs in the lungs 21 days after challenge. These findings are consistent with increased lung expression of interleukin-2 and indoleamine 2,3-dioxygenase in CCR7-/- mice, which promote Treg expansion. Conclusions Our study demonstrates that the protective phenotype associated with BLM-treated CCR7-/- mice correlates with the presence of BALT and the anchoring of Tregs in the lungs of CCR7-/- mice. These data provide novel evidence to support the further investigation of CCR7-mediated Treg trafficking in the modulation of BLM-induced PF.

  6. Preventive and therapeutic effects of physical exercise on bleomycin-induced lung injury and oxidative stress

    Directory of Open Access Journals (Sweden)

    Ricardo Aurino Pinho

    2009-09-01

    Full Text Available Studies have shown that regular physical exercise of moderate intensity is an important tool for the control of pulmonary oxidative stress. The objective of this study was to examine the preventive and therapeutic effect of physical exercise on oxidative stress in the lungs of mice exposed to bleomycin (BLM. Thirty-six male mice (CF1, 30-35 g received a single endotracheal dose of BLM (2.5 U/kg body weight dissolved in 0.25 mL 0.9% NaCl or saline (0.9% NaCl and were divided into six groups (n=6: untrained saline or BLM, preventive training saline or BLM, and therapeutic training saline or BLM. The trained groups underwent a program of progressive exercise on a treadmill for 8 weeks (up to 17 m.min-1, 50 min.day-1. The preventive group started the exercise program 62 days before the administration of BLM and the therapeutic group 62 days after the administration of BLM. All animals were killed by decapitation 48 hours after the experimental period, and the right lung was surgically removed for the determination of biochemical parameters. Hydroxyproline content, TBARS level, protein carbonylation, and superoxide dismutase (SOD and catalase (CAT activities were analyzed. The results showed that preventive and therapeutic training led to a significant reduction in hydroxyproline content and inhibited the increase in oxidative damage to lipids and proteins. However, only therapeutic training decreased SOD and CAT activities in mice exposed to BLM. The results suggest that preventive and therapeutic physical exercise is able to minimize pulmonary oxidative stress induced by BLM.

  7. Astrophysical Impact of the Updated 9Be(p,?)6Li and 10B(p,?)7Be Reaction Rates As Deduced By THM

    Science.gov (United States)

    Lamia, L.; Spitaleri, C.; Tognelli, E.; Degl'Innocenti, S.; Pizzone, R. G.; Prada Moroni, P. G.

    2015-10-01

    The complete understanding of the stellar abundances of lithium, beryllium, and boron represents one of the most interesting open problems in astrophysics. These elements are largely used to probe stellar structure and mixing phenomena in different astrophysical scenarios, such as pre-main-sequence or main-sequence stars. Their different fragility against (p,?) burning reactions allows one to investigate different depths of the stellar interior. Such fusion mechanisms are triggered at temperatures between T ? (2-5) × {10}6 K, thus defining a corresponding Gamow energy between ? 3-10 keV, where S(E)-factor measurements need to be performed to get reliable reaction rate evaluations. The Trojan Horse Method is a well defined procedure to measure cross sections at Gamow energies overcoming the uncertainties due to low-energy S(E)-factor extrapolation as well as electron screening effects. Taking advantage of the {\\mathtt{THM}} measure of the 9Be(p,?)6Li and 10B(p,?)7Be cross sections, the corresponding reaction rates have been calculated and compared with the evaluations by the NACRE collaboration, widely used in the literature. The impact on surface abundances of the updated 9Be and 10B (p,?) burning rates is discussed for pre-MS stars.

  8. Low-magnification image analysis of Giemsa stained, electroporation and bleomycin treated endothelial monolayers provides reliable monolayer integrity data.

    Science.gov (United States)

    Meulenberg, Cécil J W; Cemazar, Maja

    2014-06-01

    The aim of this study was to develop an in vitro cell model for studying the in vivo observed vascular effect, induced by exposing blood vessels to changing electric field strengths. Human microvascular endothelial cells (HMEC-1) were cultured as monolayers on 8 chamber glass slides as a model of capillary wall. Exposed to electric pulses alone, or in the presence of bleomycin (electrochemotherapy), monolayers were incubated with culture medium, fixed with methanol, stained with Giemsa, and photographed. Images of high-contrast low-magnification monolayers made under identical optimal light exposure were converted to greyscale, and the use of a threshold tool yielded a binary distribution, from which we determined two parameters of monolayer integrity: the covered surface area and the number of cells. We show that this low-magnification image analysis method for attached endothelial cells provides reliable control parameters of monolayer integrity, representing capillary wall. Besides, already within 2h post-treatment the data show distinct effects in the monolayer integrity parameters for electric pulses alone, or in the presence of bleomycin. The present method can be readily introduced to short and long-term toxicity assays with a variety of treatment conditions. PMID:24412537

  9. Atorvastatin Attenuates Bleomycin-Induced Pulmonary Fibrosis via Suppressing iNOS Expression and the CTGF (CCN2/ERK Signaling Pathway

    Directory of Open Access Journals (Sweden)

    Bo Zhu

    2013-12-01

    Full Text Available Pulmonary fibrosis is a progressive and fatal lung disorder with high mortality rate. To date, despite the fact that extensive research trials are ongoing, pulmonary fibrosis continues to have a poor response to available medical therapy. Statins, 3-hydroxy-3-methylglutaryl-coenzyme A reductase inhibitors, known for its broad pharmacological activities, remains a remedy against multiple diseases. The present study investigated the antifibrotic potential of atorvastatin against bleomycin-induced lung fibrosis and to further explore the possible underlying mechanisms. Our results showed that atorvastatin administration significantly ameliorated the bleomycin mediated histological alterations and blocked collagen deposition with parallel reduction in the hydroxyproline level. Atorvastatin reduced malondialdehyde (MDA level and lung indices. Atorvastatin also markedly decreased the expression of inducible nitric oxide synthase (iNOS in lung tissues and, thus, prevented nitric oxide (NO release in response to bleomycin challenge. Furthermore, atorvastatin exhibited target down-regulation of connective tissue growth factor (CTGF (CCN2 and phosphorylation extracellular regulated protein kinases (p-ERK expression. Taken together, atorvastatin significantly ameliorated bleomycin-induced pulmonary fibrosis in rats, via the inhibition of iNOS expression and the CTGF (CCN2/ERK signaling pathway. The present study provides evidence that atorvastatin may be a potential therapeutic reagent for the treatment of lung fibrosis.

  10. Bleomycin sensitivity in patients with familial and sporadic polyposis: a pilot study

    Scientific Electronic Library Online (English)

    Magaly M., Sales; Edmundo J. de, Lucca; Seizo, Yamashita; Luis Henrique Cury, Saad.

    1999-03-01

    Full Text Available Inúmeros estudos têm mostrado que fibroblastos de pacientes com adenomatose hereditária de cólon e reto, que inclui polipose adenomatosa familial (FAP) e a síndrome de Gardner, apresentam uma freqüência aumentada de aberrações cromossômicas após exposição a agentes físicos ou químicos, quando compar [...] ados aos controles normais. Para determinar a sensibilidade de linfócitos de pacientes com FAP e também com pólipos adenomatosos esporádicos (AP) usou-se o radiomimético bleomicina (BLM). Foram estudados citogeneticamente 10 indivíduos com AP, 10 com FAP e 20 controles normais, pareados por sexo e idade. Indivíduos que apresentaram valores médios de quebras cromatídicas por célula superiores a 0,80 foram considerados sensíveis à droga. Observou-se uma diferença significativa entre pacientes com FAP e controles quanto às freqüências de quebras cromatídicas nos linfócitos tratados na fase G2. Entretanto, nenhuma diferença significativa foi observada entre pacientes com AP e controles quanto às freqüências de quebras cromatídicas nos linfócitos tratados. Nenhum indivíduo do grupo controle foi sensível à BLM e, entre os 20 pacientes, três mostraram suscetibilidade à droga. Não foi encontrada diferença significativa quanto a resposta à bleomicina entre indivíduos do sexo masculino e feminino. Entretanto, a distribuição de quebras induzidas por bleomicina em cada grupo cromossômico não foi similar nos pacientes do sexo feminino e controles normais. É possível que a sensibilidade cromossômica à BLM encontrada nos pacientes com FAP esteja relacionada a deficiência de reparo de DNA. Abstract in english Human peripheral blood lymphocytes from 10 patients with familial adenomatous polyposis (FAP) showed a significantly higher incidence of chromatid breaks when compared to cells from 10 normal individuals, after exposure to bleomycin (BLM) during the G2 phase. However, no significant increase in bleo [...] mycin sensitivity was observed in lymphocytes from 10 patients with sporadic adenomatous polyps (AP) vs. 10 normal individuals (P = 0.67). Individuals that exhibited an average number of chromatid breaks per cell higher than 0.80 were considered sensitive to the drug. No control showed susceptibility to BLM, as compared to 3 out of 20 patients.

  11. Optimal moderator materials at various proton energies considering photon dose rate after irradiation for an accelerator-driven (9)Be(p, n) boron neutron capture therapy neutron source.

    Science.gov (United States)

    Hashimoto, Y; Hiraga, F; Kiyanagi, Y

    2015-12-01

    We evaluated the accelerator beam power and the neutron-induced radioactivity of (9)Be(p, n) boron neutron capture therapy (BNCT) neutron sources having a MgF2, CaF2, or AlF3 moderator and driven by protons with energy from 8MeV to 30MeV. The optimal moderator materials were found to be MgF2 for proton energies less than 10MeV because of lower required accelerator beam power and CaF2 for higher proton energies because of lower photon dose rate at the treatment position after neutron irradiation. PMID:26272165

  12. Histology protocols

    OpenAIRE

    CarloAlberto Redi

    2010-01-01

    Tim D. Hewitson & Ian A. Darby (Eds) Humana press, Totowa, New Jersey (USA) Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together wha...

  13. Changes in sensitivity to radiation and to bleomycin occurring during the life history of monolayer cultures of a mouse tumour cell line

    International Nuclear Information System (INIS)

    The response to X-radiation and to bleomycin has been measured at a number of times during the life of monolayer cultures of EMT6 mouse tumour cells. Little change in radiation sensitivity was seen at any time and no loss of the shoulder to the survival curve occurred. Cultures in early plateau phase (where a considerable amount of cell proliferation is balanced by cell loss) showed a reduced sensitivity to bleomycin when compared with cells in exponential growth. However, after a longer period in plateau phase, when proliferation had virtually ceased, the sensitivity became greater than that of exponential phase cells. These findings are discussed with reference to the conflicting results of other workers. (author)

  14. Diallylsulfide attenuates excessive collagen production and apoptosis in a rat model of bleomycin induced pulmonary fibrosis through the involvement of protease activated receptor-2

    Energy Technology Data Exchange (ETDEWEB)

    Kalayarasan, Srinivasan, E-mail: kalaivasanbio@gmail.com; Sriram, Narayanan; Soumyakrishnan, Syamala; Sudhandiran, Ganapasam, E-mail: sudhandiran@yahoo.com

    2013-09-01

    Pulmonary fibrosis (PF) can be a devastating lung disease. It is primarily caused by inflammation leading to severe damage of the alveolar epithelial cells. The pathophysiology of PF is not yet been clearly defined, but studying lung parenchymal injury by involving reactive oxygen species (ROS) through the activation of protease activated receptor-2 (PAR-2) may provide promising results. PAR-2 is a G-protein coupled receptor is known to play an important role in the development of PF. In this study, we investigated the inhibitory role of diallylsulfide (DAS) against ROS mediated activation of PAR-2 and collagen production accompanied by epithelial cell apoptosis. Bleomycin induced ROS levels may prompt to induce the expression of PAR-2 as well as extracellular matrix proteins (ECM), such as MMP 2 and 9, collagen specific proteins HSP-47, ?-SMA, and cytokines IL-6, and IL-8RA. Importantly DAS treatment effectively decreased the expression of all these proteins. The inhibitory effect of DAS on profibrotic molecules is mediated by blocking the ROS level. To identify apoptotic signaling as a mediator of PF induction, we performed apoptotic protein expression, DNA fragmentation analysis and ultrastructural details of the lung tissue were performed. DAS treatment restored all these changes to near normalcy. In conclusion, treatment of PF bearing rats with DAS results in amelioration of the ROS production, PAR-2 activation, ECM production, collagen synthesis and alveolar epithelial cell apoptosis during bleomycin induction. We attained the first evidence that treatment of DAS decreases the ROS levels and may provide a potential therapeutic effect attenuating bleomycin induced PF. - Highlights: • DAS inhibits PAR-2 activity; bleomycin stimulates PAR-2 activity. • Increase in PAR-2 activity is correlated with pulmonary fibrosis • DAS reduces pro-inflammatory activity linked to facilitating pulmonary fibrosis. • DAS inhibits apoptosis of alveolar epithelial cells.

  15. Structure elucidation of meroterpenoid habiterpenol, a novel abrogator of bleomycin-induced G2 arrest in Jurkat cells, produced by Phytohabitans suffuscus 3787_5.

    Science.gov (United States)

    Uchida, Ryuji; Yokota, Sayaka; Tomoda, Hiroshi

    2014-11-01

    A novel abrogator of bleomycin-induced G2 arrest in Jurkat cells, habiterpenol (1), was isolated from the culture broth of Phytohabitans suffuscus 3787_5. The planar structure of 1 was elucidated by spectroscopic study (1D and 2D NMR, MS, UV and IR), and the relative stereochemistry was elucidated by ROESY experiments. Compound 1 belongs to a pentacyclic meroterpenoid having a labdan-type diterpene connecting to an indane moiety. PMID:24916894

  16. Escleroterapia con bleomicina en malformaciones vasculares de bajo flujo: Experiencia y revisión del tema Bleomycin sclerotherapy for low-flow vascular malformations: our experience and literature review

    Directory of Open Access Journals (Sweden)

    F. Lobo Bailón

    2012-12-01

    Full Text Available Las anomalías vasculares son lesiones típicas de los pacientes pediátricos y se dividen en dos categorías: tumores vasculares y malformaciones vasculares de alto y bajo flujo. Estas últimas pueden tratarse de diversos modos: laserterapia, drenaje, aspiración, cirugía o escleroterapia, dependiendo del tipo de lesión y de su localización. Entre los agentes esclerosantes utilizados, la bleomicina ha demostrado tener buenos resultados en el tratamiento de estas lesiones. En este artículo presentamos nuestra experiencia en el tratamiento de las malformaciones vasculares de bajo flujo mediante escleroterapia con bleomicina intralesional. Desarrollamos un estudio descriptivo retrospectivo sobre 30 pacientes que presentaban malformación vascular de bajo flujo y fueron tratados con bleomicina intralesional. Los resultados fueron buenos o excelentes en 22 pacientes y regulares o malos en los 8 restantes. De acuerdo a nuestra casuística y a la literatura revisada, la escleroterapia con bleomicina es una alternativa terapéutica eficaz y segura en el tratamiento de las malformaciones vasculares de bajo flujo.Vascular anomalies are common in children and can be divided into two categories, vascular tumours and vascular malformations: high-flow or low-flow. The latter can be treated in different ways such as lasertherapy, drainage, aspiration, surgery or sclerotherapy depending on the type and location of the lesion. Among the accepted sclerosing agents, bleomycin has proven good results in the treatment of this condition. Herein we present our experience in the treatment of low-flow vascular malformations with intralesional bleomycin injection. This is a retrospective, descriptive study with 30 patients presenting a low-flow vascular malformation treated with intralesional bleomycin injection. Our results are good or excellent in 22 patients and poor in the other 8. According to our case series and the consulted literature, sclerotherapy with intralesional bleomycin injection is an effective and safe treatment for low-flow vascular malformations.

  17. Escleroterapia con bleomicina en malformaciones vasculares de bajo flujo: Experiencia y revisión del tema / Bleomycin sclerotherapy for low-flow vascular malformations: our experience and literature review

    Scientific Electronic Library Online (English)

    F., Lobo Bailón; B., Berenguer Fröhner; B., González Meli; C., Marín Molina; E., De Tomás y Palacios; C., Alonso Bañuelos.

    2012-12-01

    Full Text Available Las anomalías vasculares son lesiones típicas de los pacientes pediátricos y se dividen en dos categorías: tumores vasculares y malformaciones vasculares de alto y bajo flujo. Estas últimas pueden tratarse de diversos modos: laserterapia, drenaje, aspiración, cirugía o escleroterapia, dependiendo de [...] l tipo de lesión y de su localización. Entre los agentes esclerosantes utilizados, la bleomicina ha demostrado tener buenos resultados en el tratamiento de estas lesiones. En este artículo presentamos nuestra experiencia en el tratamiento de las malformaciones vasculares de bajo flujo mediante escleroterapia con bleomicina intralesional. Desarrollamos un estudio descriptivo retrospectivo sobre 30 pacientes que presentaban malformación vascular de bajo flujo y fueron tratados con bleomicina intralesional. Los resultados fueron buenos o excelentes en 22 pacientes y regulares o malos en los 8 restantes. De acuerdo a nuestra casuística y a la literatura revisada, la escleroterapia con bleomicina es una alternativa terapéutica eficaz y segura en el tratamiento de las malformaciones vasculares de bajo flujo. Abstract in english Vascular anomalies are common in children and can be divided into two categories, vascular tumours and vascular malformations: high-flow or low-flow. The latter can be treated in different ways such as lasertherapy, drainage, aspiration, surgery or sclerotherapy depending on the type and location of [...] the lesion. Among the accepted sclerosing agents, bleomycin has proven good results in the treatment of this condition. Herein we present our experience in the treatment of low-flow vascular malformations with intralesional bleomycin injection. This is a retrospective, descriptive study with 30 patients presenting a low-flow vascular malformation treated with intralesional bleomycin injection. Our results are good or excellent in 22 patients and poor in the other 8. According to our case series and the consulted literature, sclerotherapy with intralesional bleomycin injection is an effective and safe treatment for low-flow vascular malformations.

  18. Detection of epithelial to mesenchymal transition in airways of a bleomycin induced pulmonary fibrosis model derived from an ?-smooth muscle actin-Cre transgenic mouse

    OpenAIRE

    Yang Xiao; Cheng Xuan; Zhang Min; Cai Lin; Yang Leilei; Wu Zhuang; Xu Jun

    2007-01-01

    Abstract Background Epithelial to mesenchymal transition (EMT) in alveolar epithelial cells (AECs) has been widely observed in patients suffering interstitial pulmonary fibrosis. In vitro studies have also demonstrated that AECs could convert into myofibroblasts following exposure to TGF-?1. In this study, we examined whether EMT occurs in bleomycin (BLM) induced pulmonary fibrosis, and the involvement of bronchial epithelial cells (BECs) in the EMT. Using an ?-smooth muscle actin-Cre transge...

  19. Effect of apurinic/apyrimidinic endonucleases and polyamines on DNA treated with bleomycin and neocarzinostatin: specific formation and cleavage of closely opposed lesions in complementary strands

    International Nuclear Information System (INIS)

    Bleomycin and neocarzinostatin induce modified apurinic/apyrimidinic (AP) sites by oxidation of the sugar moiety in DNA. In order to quantitatively assess the susceptibility of these lesions to repair endonucleases, drug-treated 3H-labeled colE1 DNA was mixed with 14C-labeled heat-depurinated DNA, and endonuclease-susceptible sites in the mixture were titrated with various AP endonucleases or with polyamines. Single- and double-strand breaks were quantitated by determining the fractions of supercoiled, nicked circular, and linear molecules. Exonuclease III and endonucleases III and IV of Escherichia coli, indicating cleavage of drug-induced AP sites. Bleomycin-induced AP sites were much more sensitive to cleavage by putrescine than heat-induced sites. Treatment with putrescine or very high concentrations of endonuclease III also increased the number of double-strand breaks in bleomycin-treated DNA, suggesting a minor class of lesion consisting of an AP site accompanied by a closely opposed break in the complementary strand. These complex lesions were resistant to cleavage by endonuclease IV. These results suggest that virtually all neocarzinostatin-induced AP sites are accompanied by a closely opposed strand break. Several characteristics of the putative AP site/strand break lesions induced by neocarzinostatin suggest that they may correspond to certain AP-like lesions which were previously detected on DNA sequencing gels as endonuclease IV susceptible sites and which have been strongly implicated in neocarzinostatin-induced mutagenesis

  20. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implemen...

  1. Analysis of spontaneous and bleomycin-induced chromosome damage in peripheral lymphocytes of long-haul aircrew members from Argentina

    International Nuclear Information System (INIS)

    Spontaneous and bleomycin (BLM)-induced chromosomal aberrations in G0 and G2 stages of the cell cycle have been analyzed in peripheral lymphocytes of 21 long-haul aircrew members from Argentina in order to assess BLM-induced clastogenesis as a first approach to determine the DNA repair capacity and thereby the susceptibility to environmental cancers in aircrew. The possibility that occupational exposure of flight personnel to cosmic radiation can induce an adaptive response in their peripheral lymphocytes that can be detected by a subsequent in vitro treatment with BLM was also investigated. For comparison, aberrations were also scored in the lymphocytes of 15 healthy volunteers matched by age, health, sex, drinking and smoking habits to the flight personnel group. Aircrew exhibited a higher frequency of spontaneous dicentrics and ring chromosomes than the control population (p 0.05). However, the aircrew sampled population was almost two times more sensitive to BLM G0 clastogenic effects than controls (p < 0.05). Therefore, our data suggest that chronic exposure of aircrew to cosmic radiation increases the in vitro chromosomal sensitivity of their peripheral lymphocytes to BLM (at least in the G0 stage of the cell cycle), and that occupational exposure of flight personnel to cosmic radiation does not induce an adaptive response to this radiomimetic compound. Our results justify further studies aimed at determine if those aircrew members hypersensitive to BLM are more prone to develop environmental cancer than BLM-insensitive individuals

  2. Topics in free radical-mediated DNA damage: purines and damage amplification - superoxic reactions - bleomycin, the incomplete radiomimetic

    International Nuclear Information System (INIS)

    Only a small percentage of the DNA damage set by ionizing radiation in the living cell manifests itself as lethal. It is now increasingly accepted that clustered lesions may constitute the kind of damage that the repair enzymes cannot adequately deal with. The question is raised as to whether damage amplification reactions (radical transfer reactions) may contribute to these clustered lesions, and examples of such damage amplification reactions are given. In one example a purine is involved. With 2'-deoxy adenosine and 2'-deoxy guanosine it is shown that these purine nucleosides undergo unexpected radical reactions. Evidence for the radical transfer from the purine to the sugar moiety is provided by the formation of the 5'-aldehydes. These products have been assayed with 2-thiobarbituric acid (TBA), a reagent commonly applied to the detection of malonaldehyde. TBA-reactive material has also been assayed in ?-irradiated DNA, about one-third of this is free malonaldehyde, while the major part of the TBA-reactive material remains bound to the DNA. In contrast, bleomycin-treated DNA yields practically no free malonaldehyde, and the major TBA-reactive products are identified as the thymine and adenine base propenals. (Author)

  3. Neoadjuvant chemotherapy with bleomycin, ifosfamide and nedaplatin (NAC-BIN) followed by radiotherapy in locoregionally advanced uterine cervical cancer

    Energy Technology Data Exchange (ETDEWEB)

    Toita, Takafumi; Ogawa, Kazuhiko; Kakinohana, Yasumasa; Adachi, Genki; Nishikuramori, Yukiko; Murayama, Sadayuki [Ryukyus Univ., Nishihara, Okinawa (Japan). School of Medicine

    2000-06-01

    Twelve patients with locoregionally advanced uterine cervical cancer (IIIB: 10, IVA: 2) were treated with neoadjuvant chemotherapy consisting of bleomycin, ifosfamide, and nedaplatin (NAC-BIN) and full dose radical radiotherapy. NAC-BIN achieved one complete response and seven partial responses, for a response rate of 67%. Hematologic toxicity was the most common side effect. Five experienced grade 3{<=}leukopenia, and three had grade 3{<=}anemia. With the mean follow-up of 25 months (range: 9-52 months), nine of 12 patients developed recurrence. Eight had pelvic recurrence alone, and one had both pelvic recurrence and distant metastases. The 2-year pelvic control rate, disease-free survival rate (DFS), and absolute survival rate (AS) were 25%, 25%, and 42%, respectively. The 2-year DFS and AS for patients who responded well to NAC-BIN (CR+PR) was 38% and 63%, whereas for those with a poor response (NC) were 0%. From these results, we consider that preoperative NAC-BIN should not be indicated for patients with unresectable stage (stage III{<=}) uterine cervical cancer, because poor responders must subsequently be treated with definitive radiotherapy and may suffer poor prognosis. (author)

  4. In vivo biodistribution of 131I labeled bleomycin (BLM) and isomers (A2 and B2) on experimental animal models

    International Nuclear Information System (INIS)

    Bleomycins (BLMs; BLM, A2, and B2) were labeled with 131I and radiopharmaceutical potentials were investigated using animal models in this study. Quality control procedures were carried out using thin layer radiochromatography (TLRC), high performance liquid chromatography (HPLC), and liquid chromatography (LC/MS/MS). Labeling yields of radiolabeled BLMs were found to be 90, 68, and 71%, respectively. HPLC chromatograms were taken for BLM and cold iodinated BLM (127I-BLM). Five peaks were detected for BLM and three peaks for 127I-BLM in the HPLC studies. Two peaks belong to isomers of BLM. The isomers of BLM were purified with using HPLC. Biological activity of BLM was determined on male Albino Wistar rats by biodistribution and scintigraphic studies were performed for BLMs by using New Zealand rabbits. The biodistribution results of 131I-BLM showed high uptake in the stomach, the bladder, the prostate, the testicle, and the spinal cord in rats. Scintigraphic results on rabbits agrees with that of biodistributional studies on rats. The scintigraphy of radiolabeled isomers (131I-A2 and 131I-B2) are similarly found with that of 131I-BLM. (author)

  5. Do human lymphocytes exposed to the fallout of the Chernobyl accident exhibit an adaptive response? Part 2. Challenge with bleomycin

    International Nuclear Information System (INIS)

    The present study concerns the possible adaptive response, induced in vivo by a continuous exposure to ionizing radiations, to a challenge treatment with the radiomimetic glycopeptide bleomycin (BLM). Lymphocytes from children contaminated as a consequence of Chernobyl accident were treated for the last 5 h of culture with 2.5 ?g/ml BLM. The induced chromosome damage was significantly lower than that found with the same treatment in lymphocytes from control children. This hyposensitivity to BLM was still present if, 1 h after the addition of the drug, inhibitors of the enzymes involved in DNA repair, such as 3-aminobenzamide (2 mM), or aphidicolin (0.4 ?M) or 3-dideoxythymidine (5 mM) were added to the cultures. The resistance to BLM in lymphocytes from contaminated children seems to be related to a mechanism upstream in respect to the activities of enzymes involved in the DNA repair and specifically linked to the action of this drug. This is consistent with the different response found when the cells were challenged with ionizing radiation in vitro, as reported in another accompanying paper in this issue

  6. The Wireless Application Protocol

    OpenAIRE

    Dave Singelee; Bart Preneel

    2005-01-01

    The Wireless Application Protocol WAP is a protocol stack for wireless communication networks. WAP uses WTLS, a wireless variant of the SSL/TLS protocol, to secure the communication between the mobile phone and other parts of the WAP architecture. This paper describes the security architecture of WAP and some important properties of the WTLS protocol. There are however some security problems with WAP and the WTLS protocol. Privacy, data protection and integrity are not always provided. Users ...

  7. Delivery of antifibroblast agents as adjuncts to filtration surgery. Part I--Periocular clearance of cobalt-57 bleomycin in experimental drug delivery: pilot study in the rabbit

    International Nuclear Information System (INIS)

    Antitumor and antifibroblast agents show promise as adjuncts after glaucoma filtration surgery in reducing postoperative scarring and failure. We used nuclear imaging in rabbits to investigate periocular clearance of one such agent (57Co-bleomycin). Sub-Tenon injection was compared to other delivery techniques. Our results showed that a collagen sponge and a silastic disc implant with a microhole prolonged drug delivery when compared to sub-Tenon injection alone or injection with a viscosity enhancing agent (0.5% sodium hyaluronate). We theorize that if an antifibroblast agent can be delivered in small and sustained amounts after filtration surgery, this may prolong bleb longevity and avoid unnecessary drug toxicity

  8. Chromatin condensation and differential sensitivity of mammalian and insect cells to DNA strand breaks induced by bleomycin

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Larraza, Daniel M. [IMBICE, C.C. 403, 1900 La Plata (Argentina)]. E-mail: danielop@imbice.org.ar; Padron, Juan [IMBICE, C.C. 403, 1900 La Plata (Argentina); Ronci, Natalia E. [IMBICE, C.C. 403, 1900 La Plata (Argentina); Vidal Rioja, Lidia A. [IMBICE, C.C. 403, 1900 La Plata (Argentina)

    2006-08-30

    Bleomycin (BLM) induces DNA damage in living cells. In this report we analyzed the role of chromatin compactness in the differential response of mosquito (ATC-15) and mammalian (CHO) cells to DNA strand breaks induced by BLM. We used cells unexposed and exposed to sodium butyrate (NaB), which induces chromatin decondensation. By nucleoid sedimentation assay and digestions of nuclei with DNAse I, untreated mosquito cells (no BLM; no NaB) were shown to have more chromatin condensation than untreated CHO cells. By alkaline unwinding ATC-15 cells treated with NaB showed more BLM-induced DNA strand breaks than NaB-untreated CHO cells. The time-course of BLM-induced DNA damage to nuclear DNA was similar for NaB-untreated mammalian and insect cells, but with mosquito cells showing less DNA strand breaks, both at physiological temperatures and at 4 {sup o}C. However, when DNA repair was inhibited by low temperatures and chromatin was decondensed by NaB treatments, differences in BLM-induced DNA damage between these cells lines were no longer observed. In both cell lines, NaB did not affect BLM action on cell growth and viability. On the other hand, the low sensitivity of ATC-15 cells to BLM was reflected in their better growth efficiency. These cells exhibited a satisfactory growth at BLM doses that produced a permanent arrest of growth in CHO cells. The data suggest that mosquito cells might have linker DNAs shorter than those of mammalian cells, which would result in the observed both greater chromatin condensation and greater resistance to DNA damage induced by BLM as compared to CHO cells.

  9. Chromatin condensation and differential sensitivity of mammalian and insect cells to DNA strand breaks induced by bleomycin

    International Nuclear Information System (INIS)

    Bleomycin (BLM) induces DNA damage in living cells. In this report we analyzed the role of chromatin compactness in the differential response of mosquito (ATC-15) and mammalian (CHO) cells to DNA strand breaks induced by BLM. We used cells unexposed and exposed to sodium butyrate (NaB), which induces chromatin decondensation. By nucleoid sedimentation assay and digestions of nuclei with DNAse I, untreated mosquito cells (no BLM; no NaB) were shown to have more chromatin condensation than untreated CHO cells. By alkaline unwinding ATC-15 cells treated with NaB showed more BLM-induced DNA strand breaks than NaB-untreated CHO cells. The time-course of BLM-induced DNA damage to nuclear DNA was similar for NaB-untreated mammalian and insect cells, but with mosquito cells showing less DNA strand breaks, both at physiological temperatures and at 4 oC. However, when DNA repair was inhibited by low temperatures and chromatin was decondensed by NaB treatments, differences in BLM-induced DNA damage between these cells lines were no longer observed. In both cell lines, NaB did not affect BLM action on cell growth and viability. On the other hand, the low sensitivity of ATC-15 cells to BLM was reflected in their better growth efficiency. These cells exhibited a satisfactory growth at BLM doses that produced a permanent arrest of growth in CHO cells. The data suggest that mosquito cells might have linker DNAs shorter than those of mammalian cells, which would result in the observed both greater chromatin condensation and greater resistance to DNA damage induced by BLM as compared to CHO cells

  10. Protective effects of 1-[(aminopropyl)amino] ethanethiol against bleomycin and nitrogen mustard-induced mutagenicity in V79 cells

    International Nuclear Information System (INIS)

    The effects of the radioprotector 2-[(aminopropyl)amino] ethanethiol (WR1065) on bleomycin (BLM) and nitrogen mustard- (HN2) induced cytotoxicity, DNA damage, and mutagenesis at the hypoxanthine-guanine phosphoribosyl transferase (HGPRT) locus in V79 Chinese hamster cells were examined. The antimutagenic effect of WR1065 on cis-diamminedichloroplatinum (cis-DDP) and radiation- (XRT) induced HGPRT mutations was also evaluated for comparative purposes. Cell survival and mutagenesis were assayed after a 30-min exposure of WR1065 (4 mM) to the cells and a subsequent 30-min exposure to therapy agents. WR1065 effectively protected against both effects. The induction of mutants corrected for background by BLM, HN2, cis-DDP or XRT was linear in all cases. Mutation frequencies without WR1065 were 78 x 10-6 per unit BLM; 66 x 10-7 per ?g HN2; 25 x 10-7 per ?g cis-DDP; and 87 10-7 per Gy of XRT. With WR1065 these frequencies were reduced to 37 x 10-6 per unit BLM; 40 x 10-7 per ?g HN2; 1 x 10-7 per ?g cis-DDP; and 44 x 10-7 per Gy of XRT. Mutation protection factors (MPF), a ratio of the corresponding slopes of the mutation induction curves, with and without WR1065, were BLM, MPF = 2.8; HN2, MPF = 3.4; cis-DDP, MPF = 7.1; and XRT, MPF = 5.1. WR1065 protected against the formation of single-strand-breaks (SSB) in DNA by BLM or HN2, as assayed by the method of alkaline elution. WR1065 did not induce SSB in control cells. The ability of radioprotectors to reduce the mutagenic effects of agents used in radiation and chemotherapy may be an important additional benefit for consideration in their use in the treatment of human cancer. 18 refs., 6 figs., 1 tab

  11. Modulation of the genotoxicity of bleomycin by amines through noncovalent DNA interactions and alteration of physiological conditions in yeast

    International Nuclear Information System (INIS)

    The effects of amines on the induction of mitotic gene conversion by bleomycin (BLM) were studied at the trp5 locus in Saccharomyces cerevisiae strain D7. BLM induces double-strand breaks in DNA and is a potent recombinagen in this assay. The polyamine spermidine causes concentration-dependent protection against the genotoxicity of BLM, reducing the convertant frequency by over 90% under the most protective conditions. Spermine, diethylenetriamine, ethylenediamine, putrescine, and ethylamine were also antigenotoxic in combined treatments with BLM. There was a general correspondence between the protective effect and the number of amino groups, suggesting that more strongly cationic amines tend to be stronger antirecombinagens. Electrostatic association of the amines with DNA probably hinders BLM access to the 4' position of deoxyribose where it generates a free radical. Other amines interact with BLM differently from these unbranched aliphatic amines. The aminothiol cysteamine inhibits the genotoxicity of BLM under hypoxic conditions but increases it under euoxic conditions. In contrast, pargyline potentiates the genotoxicity of BLM under hypoxic conditions but not under euoxic conditions. The antirecombinagenic effect of cysteamine apparently involves DNA binding and depletion of oxygen needed for BLM activity, whereas its potentiation of BLM entails its serving as an electron source for the activation of BLM. Pargyline may enhance BLM indirectly by preventing the depletion of oxygen by monoamine and polyamine oxidase. The planar 9-aminoacridine weakly induces gene conversion in strain D7, but it is strongly synergistic with BLM. Enhancement of BLM activity by this compound and by the related nitroacridine Entozon is apparently mediated by intercalation of the acridine ring system into DNA. Thus, the influence of amines on the genotoxicity of BLM in yeast encompasses antigenotoxic, potentiating, and synergistic interactions. The underlying mechanisms involve noncovalent association with DNA, altered BLM access to DNA, and modulation of physiological conditions

  12. 111Indium-labeled neutrophil migration into the lungs of bleomycin-treated rabbits assessed noninvasively by external scintigraphy

    International Nuclear Information System (INIS)

    Factors controlling neutrophil migration into the lung are poorly understood, but their identification is important for our understanding of the pathogenesis of inflammatory lung diseases. Pulmonary inflammation is difficult to quantify, and neutrophils in tissues and BAL may not accurately represent cell migration. In this study, intravenously delivered pulses of rabbit neutrophils labeled with Indium-111 (111In-neutrophils) were used to monitor neutrophil migration into the lungs. Radioactivity quantified in the lung region of interest (ROI) of external gamma camera scintigrams recorded 24 h after intravenous 111In-neutrophil injection accurately reflected the actual neutrophil-associated lung tissue radioactivity. ROI radioactivity at 24 h also correlated closely with the percent of 111In-neutrophils that had migrated into lavageable air spaces, and this parameter therefore provided an index of total lung 111In-neutrophil migration. Using 24-h ROI radioactivity and percent of injected 111In-neutrophils recovered in BAL at 24 h as indices of neutrophil migration into the lung, it was found that intratracheal saline caused only a transient neutrophil migration, whereas 10 U/kg intratracheal bleomycin induced migration that persisted for as long as 3 wk. 111In-neutrophil migration into the lung, assessed by external scintigraphy, correlated with total neutrophils quantified in histologic sections (r = 0.71, p = 0.006). The data suggest that this approach will be valuable in investigating mechanisms controlling neutrophil migration in lung inflammation, and that 111In-neutrophil scintigraphy may provide a noninvasive index of total lung neutrophil load that might be useful in staging inflammation in patchy diseases such as idiopathic pulmonary fibrosis

  13. Study on combined effects of radiation and bleomycin on carcinoma of tongue iduced by DMBA in hamster

    International Nuclear Information System (INIS)

    Carcinoma of the tongue (Mostly squamous cell carcinoma) was induced in hamsters by 9,10-dimethyl-1, 2-benzanthracene (DMBA). The amount of various kinds of free radicals, which increased due to radioactive radiation and administration of bleomycin (BLM) in tongue and liver tissues, was determined by an electron spin resonance method. The hamsters were separated into seven groups: BLM administration only (group A1), 60Co-?-ray irradiation only (A2), 60Co-?-ray irradiation 30 min after BLM administration (A3), BLM administration 30 min after 60Co-?-ray irradiation (A4), 60Co-?-ray irradiation 24 h after BLM administration (A5), BLM administration 24 h after 60Co-?-ray irradiation (A6), and the control (A7). Mean free radicals in the groups were compared, using samples fixed 5 min after treatment. The ratio of mean free radicals of carcinoma of the tongue were 2.6, 2.9, 3.7, 3.9, 3.0, 3.2, and 1 in A1, A2, A3, A4, A5, A6, and A7. The ratio of mean free radicals of the liver under the same condition were 1.5, 1.6, 3.3, 3.8, 2.2, 2.6, and 1. A combination of BLM and radioactive radiation increased the amount of free radicals in carcinoma of the tongue and in the liver. Especially BLM administration 30 min after 60Co-?-ray irradiation showed a synergistic effect. Judging from the amount of free radicals determined, the effect of radioactive irradiation increased when combined with BLM administration. BLM was most effective when it was administered 5 min after radioactive irradiation. (Tsunoda, M.)

  14. Renal impairment and late toxicity in germ cell cancer survivors

    DEFF Research Database (Denmark)

    Lauritsen, J; Mortensen, M S; Kier, M G G; Christensen, I J; Agerbaek, M; Gupta, R; Daugaard, G

    2015-01-01

    BACKGROUND: Treatment with bleomycin-etoposide-cisplatin (BEP) impairs renal function and increases the risk of late cardiovascular disease (CVD) and death. We investigated the influence of BEP on glomerular filtration rate (GFR) and assessed the importance of GFR changes on CVD and death in a large cohort of germ cell cancer survivors. PATIENTS AND METHODS: BEP-treated patients (N=1,206) were identified in the Danish DaTeCa database, and merged with national registers to identify late toxicity....

  15. Renal impairment and late toxicity in germ-cell cancer survivors

    DEFF Research Database (Denmark)

    Lauritsen, J.; Mortensen, M. S.; Kier, M. G. G.; Christensen, I. J.; Agerbaek, M.; Gupta, Ramneek; Daugaard, G.

    2015-01-01

    Background Treatment with bleomycin–etoposide–cisplatin (BEP) impairs renal function and increases the risk of late cardiovascular disease (CVD) and death. We investigated the influence of BEP on glomerular filtration rate (GFR) and assessed the importance of GFR changes on CVD and death in a large cohort of germ-cell cancer survivors. Patients and methods BEP-treated patients (N = 1206) were identified in the Danish DaTeCa database, and merged with national registers to identify late toxicity. ...

  16. Renal impairment and late toxicity in germ-cell cancer survivors

    DEFF Research Database (Denmark)

    Lauritsen, J; Mortensen, M S; Kier, M G G; Christensen, I J; Agerbaek, M; Gupta, R; Daugaard, Gedske

    2015-01-01

    BACKGROUND: Treatment with bleomycin-etoposide-cisplatin (BEP) impairs renal function and increases the risk of late cardiovascular disease (CVD) and death. We investigated the influence of BEP on glomerular filtration rate (GFR) and assessed the importance of GFR changes on CVD and death in a large cohort of germ-cell cancer survivors. PATIENTS AND METHODS: BEP-treated patients (N = 1206) were identified in the Danish DaTeCa database, and merged with national registers to identify late toxicity...

  17. Analysis of the dose-response relationships of chromosomal aberrations after irradiation and bleomycin exposure of different human lymphocyte fractions in vitro

    International Nuclear Information System (INIS)

    Cytogenetic analyses could be carried out on whole blood and pure T-cell cultures and also on cells of the 'buffy-coat'. In pure B-cell cultures even after 96 hours no mitogenic stimulation could be achieved. Parameters of radiosensitivity and bleomycin sensitivity were dicentric chromosomes, for which the dose-response relationships were calculated. Chromosomal investigations on the 'buffy-coat' cells did not provide indications referring to a varying radiosensitivity compared to whole blood cultures. In pure T-cell cultures T-lymphocytes, which had been separated after whole blood irradiation exposure, showed lower aberration rates than lymphocytes, which had been cultured after whole blood irradiation without previous separation. In the case of bleomycin exposure the treatment of previously separated leucocytes and T-lymphocytes respectively, led to lower aberration rates than the treatment before separation. Therefore it is apparently not necessary for a cytogenetic dosimetry or mutagenicity to depart from the whole blood culture method. (orig./MG)

  18. Deletions at short direct repeats and base substitutions are characteristic mutations for bleomycin-induced double- and single-strand breaks, respectively, in a human shuttle vector system

    Science.gov (United States)

    Dar, M. E.; Jorgensen, T. J.

    1995-01-01

    Using the radiomimetic drug, bleomycin, we have determined the mutagenic potential of DNA strand breaks in the shuttle vector pZ189 in human fibroblasts. The bleomycin treatment conditions used produce strand breaks with 3'-phosphoglycolate termini as > 95% of the detectable dose-dependent lesions. Breaks with this end group represent 50% of the strand break damage produced by ionizing radiation. We report that such strand breaks are mutagenic lesions. The type of mutation produced is largely determined by the type of strand break on the plasmid (i.e. single versus double). Mutagenesis studies with purified DNA forms showed that nicked plasmids (i.e. those containing single-strand breaks) predominantly produce base substitutions, the majority of which are multiples, which presumably originate from error-prone polymerase activity at strand break sites. In contrast, repair of linear plasmids (i.e. those containing double-strand breaks) mainly results in deletions at short direct repeat sequences, indicating the involvement of illegitimate recombination. The data characterize the nature of mutations produced by single- and double-strand breaks in human cells, and suggests that deletions at direct repeats may be a 'signature' mutation for the processing of DNA double-strand breaks.

  19. Evaluación de implantes de norgestomet reutilizados en protocolos de sincronización del estro en vacas Brahman / Evaluation of reused norgestomet implants in estrus synchronization protocols in Brahman cows

    Scientific Electronic Library Online (English)

    Luis, Uribe-Velásquez; Adriana, Correa-Orozco; Lina, Cuartas-Betancurth; Diego, Villamizar-Ramirez; Santiago, Ángel-Botero.

    2013-01-01

    Full Text Available Objetivo. Evaluar las concentraciones de progesterona, la manifestación de estro y las tasas de preñez en vacas Bos indicus sometidas a varios protocolos de sincronización del estro con un implante de norgestomet usado previamente. Materiales y métodos. Sesenta vacas recibieron un implante auricular [...] de norgestomet reutilizado y fueron distribuidas en uno de cuatro protocolos: (1) benzoato de estradiol (BE) + progesterona (P4) + prostaglandina F2? (PG) (BE+P4+PG); (2) valerato de estradiol (VE) + norgestomet (NG) (VE+NG); (3) el mismo protocolo BE+P4+PG, asociado con 400 UI de gonadotropina coriónica equina (eCG) (BE+P4+PG+eCG); (4) el mismo protocolo VE+NG, asociado con 400 UI de eCG (VE+NG+eCG). El implante fue removido el día 9, con inseminación artificial (IA) 12 horas después de la detección del estro. La preñez fue diagnosticada 45 días después de la IA. Las muestras de sangre fueron tomadas los días 0, 4 y 9 (después de colocar el implante) para el análisis de progesterona por RIA. Resultados. En el día 4, las concentraciones de progesterona fueron menores en vacas tratadas con BE+P4+PG (0.90 ± 0.73 ng/ml; p0.05). Conclusiones. Los implantes de norgestomet reutilizados fueron eficaces para sincronizar el estro y alcanzar tasas de preñez adecuadas en vacas Brahman. Abstract in english Objective. To evaluate progesterone concentrations, occurrence of estrus and pregnancy rates in Bos indicus cows submitted to several estrous synchronization protocols with previously used Norgestomet implants. Materials and methods. Sixty cows were given a reused Norgestomet ear implant on Day 0 an [...] d were assigned to receive one of four protocols: (PROT 1) estradiol benzoate (EB) + progesterone (P4) + prostaglandin F2? (PG) (EB+P4+PG); (PROT 2) estradiol valerate (EV) + norgestomet (NG) (EV+NG); (PROT 3) same as EB+P4+PG protocol, plus a 400 UI equine chorionic gonadotropin (eCG) (EB+P4+PG+eCG); (PROT 4) same as EV+NG protocol, plus a 400 UI eCG (EV+NG+eCG). The implant was removed on Day 9, with artificial insemination (AI) 12 h after detection of estrus. Pregnancy was diagnosed 45 d after AI. Blood samples were collected on Day 0, 4 and 9 (after ear implant was placed), for progesterone analysis by RIA. Results. On day 4, progesterone concentrations were lower in cows treated with EB+P4+PG (0.90 ± 0.73 ng/ml; p0.05). Conclusions. Reusing Norgestomet implants was effective for synchronizing estrus and promote satisfactory pregnancy rates in Brahman cows.

  20. Secretoglobin 3A2 Exhibits Anti-Fibrotic Activity in Bleomycin-Induced Pulmonary Fibrosis Model Mice

    Science.gov (United States)

    Cai, Yan; Kimura, Shioko

    2015-01-01

    Objective Secretoglobin (SCGB) 3A2 is a novel lung-enriched cytokine, previously shown to exhibit anti-inflammatory, growth factor, and anti-fibrotic activities. The latter activity was demonstrated using exogenously-administered recombinant SCGB3A2 in the bleomycin (BLM)-induced pulmonary fibrosis model. Whether SCGB3A2 exhibits anti-fibrotic activity in vivo is not known. Methods Mice null for the Scgb3a2 gene were subjected to the BLM-induced pulmonary fibrosis model, and the severity of pulmonary fibrosis determined using histological and biochemical methods. Results BLM treatment caused weight loss of both Scgb3a2-null and wild-type mice, however, the loss was far more pronounced in BLM-treated Scgb3a2-null than wild-type mice, and the weight of day 21 of BLM-treated Scgb3a2-null mice was about half of that of BLM-treated wild-type mice. Hematoxylin & Eosin, Masson Trichrome, and Sirius Red staining of lung sections, Ashcroft fibrosis scores, hydroxyproline contents, and the levels of mRNAs encoding various collagens demonstrated that BLM-treated Scgb3a2-null mouse lungs had more severe fibrosis than those of wild-type mouse lungs. Total and differential inflammatory cell numbers in bronchoalveolar lavage fluids, and levels of lung mRNAs including those encoding Th2 cytokines such as IL-4 and profibrotic cytokines such as TGF? were higher in BLM-treated Scgb3a2-null mouse lungs as compared to those of wild-type mouse lungs. In contrast, mRNAs encoding surfactant proteins A, B, C, and D, and SCGB1A1 did not differ between BLM-treated Scgb3a2-null and wild-type mouse lungs. Conclusion The role of SCGB3A2 in fibrosis was revisited using Scgb3a2-null mice and littermate controls in the BLM-induced pulmonary fibrosis model. The pulmonary fibrosis in the Scgb3a2-null mice was more severe than the wild-type controls, thus establishing that SCGB3A2 has anti-fibrotic activity in vivo. Importantly, surfactant proteins and SCGB1A1 appear not to be involved in the susceptibility of Scgb3a2-null mice to BLM-induced pulmonary fibrosis. PMID:26559674

  1. Adaptation of TURN protocol to SIP protocol

    CERN Document Server

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  2. Meiotic and Mitotic Phenotypes Conferred by the blm1-1 Mutation in Saccharomyces cerevisiae and MSH4 Suppression of the Bleomycin Hypersusceptibility

    Directory of Open Access Journals (Sweden)

    Carol Wood Moore

    2003-01-01

    Full Text Available Abstract: Oxidative damage can lead to a number of diseases, and can be fatal. The blm1-1 mutation of Saccharomyces cerevisiae confers hypersusceptibility to lethal effects of the oxidative, anticancer and antifungal agent, bleomycin. For the current report, additional defects conferred by the mutation in meiosis and mitosis were investigated. The viability of spores produced during meiosis by homozygous normal BLM1/BLM1, heterozygous BLM1/blm1-1, and homozygous mutant blm1-1/blm1-1 diploid strains was studied and compared. Approximately 88% of the tetrads derived from homozygous blm1-1/blm1-1 mutant diploid cells only produced one or two viable spores. In contrast, just one tetrad among all BLM1/BLM1 and BLM1/blm1-1 tetrads only produced one or two viable spores. Rather, 94% of BLM1/BLM1 tetrads and 100% of BLM1/blm1-1 tetrads produced asci with four or three viable spores. Thus, at least one copy of the BLM1 gene is essential for the production of four viable spores after meiosis. During mitotic growth, mutant blm1-1 strains grew at reduced rates and produced cells with high frequencies of unusual morphologies compared to wild-type strains. These results indicated BLM1 is also essential for normal mitotic growth. We also investigated the suppression by the MSH4 gene, a meiosis-specific MutS homolog, of the bleomycin hypersusceptibility of blm1-1 mutant cells, and the relationship of MSH4 to BLM1. We screened a genomic library, and isolated the MSH4 gene on the basis of its ability to suppress lethal effects of bleomycin in blm1-1 cells. However, genetic mapping studies indicated that BLM1 and MSH4 are not the same gene. The possibility that chromosomal nondisjunction could be the basis for the inability of blm1-1/blm1-1 mutant cells to produce four viable spores after meiosis is discussed.

  3. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main ...

  4. Vertical Protocol Composition

    OpenAIRE

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secu...

  5. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, ...

  6. Combined chemotherapy and radiotherapy in diffuse large cell immunoblastic lymphoma: a phase II study of CHOP/bleomycin/methotrexate alternating with ifosfamide/methotrexate/etoposide

    International Nuclear Information System (INIS)

    The clinical outcome of 23 patients with high grade diffuse large cell immunoblastic lymphoma (Working Formulation, category H) treated by an intensive shortened schedule regimen of chemotherapy is described. Alternating cycles of cyclophosphamide, doxorubicin, vincristine, bleomycin and prednisolone, and ifosfamide, etoposide and methotrexate were given over an 18-week (range 16.0-20.8) period. External beam radiotherapy was administered as consolation therapy to sites of original bulky disease in 17 patients. Treatment was well tolerated, though there were two toxic deaths. A 90% response rate was obtained. Sixteen of 18 patients followed for a minimum of 36 months are alive and in complete remission, representing a disease free survival of 69.5%; two further patients are alive following autologous bone marrow transplant. The 3-year disease free survival was 73% (±9%) and the overall 3-year survival 78% (±9%). (author)

  7. Phase I/II trial of carboplatin dose escalation in combination chemotherapy with etoposide, bleomycin and GM-CSF support for poor prognosis nonseminomatous germ cell tumors patients

    International Nuclear Information System (INIS)

    To determine the maximum tolerated dose (MTD), and therapeutic efficacy of carboplatin (CBDCA) in combination with etoposide and bleomycin (CEB) as initial chemotherapy for poor prognosis germ cell tumors, a CBDCA dose escalation supported with GM-CSF had been performed. Twenty four untreated patients were treated with CBDCA 400 mg/m2 on day 1, etoposide 100 mg/m2 on days 1 to 5 and bleomycin 30 mg on days 1,3, 5. Four cycles were scheduled at 21-day interval. The first cohort of 6 patients received only initial chemotherapy regimen. In the subsequent cohorts of six patients, the CBDCA dose was increased by 100 mg?m2. A fixed dose and schedule of GM-CSF at 5 ?g/kg subcutaneously was given on days 6 though 15. Myelosuppression, with neutropenic fever and hemorrhages, was the dose-limiting toxicity at the 600 mg/m2 dose level. The recommended dose of CBDCA is 500 mg/m2. Overall complete response (CR) rate was 71% and with median follow up of 25 (16-34) months, 58% of patients are alive and have no evidence of disease (NED). A higher number of CR was achieved with CBDCA dose higher than 400 mg/m2 compared with CBDCA dose of 400 mg/m2 (92 vs. 50%, p=0.03), as well as a higher proportion of patients who alive and with NED (75 vs. 42%, p=0.1). Despite GM-CSF support, the MTD of CBDCA could not be increased beyond 500 mg/m2 (50% of the dose escalation of the dose escalation), due to severe myelosuppression. The treatment outcomes obtained with CEB in our study are no better than the standard cisplatin-based chemotherapy. Further studies of this regimen, where CBDCA dose should be calculated according to to the patients glomerular filtration rate are warranted. (author)

  8. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we provea composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application protocols that fulfills a number of sufficient preconditions. These preconditions are satisfied for many practically relevant protocols such as TLS.

  9. Transforming Password Protocols to Compose

    OpenAIRE

    C\\xe9line Chevalier; St\\xe9phanie Delaune; Steve Kremer

    2011-01-01

    Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. They improved our understanding of security protocols, allowed to discover flaws, and also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided when the protocol is executed in a more complex environment. In this paper, we study whether...

  10. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  11. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  12. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  13. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise implementations that closely correspond to their legal specification, thereby increasing trust.

  14. Influência do biofármaco DNA-hsp65 na lesão pulmonar induzida por bleomicina / Influence of a DNA-hsp65 vaccine on bleomycin-induced lung injury

    Scientific Electronic Library Online (English)

    Adriana Ignacio de, Padua; Célio Lopes, Silva; Simone Gusmão, Ramos; Lúcia Helena, Faccioli; José Antônio Baddini, Martinez.

    2008-11-01

    Full Text Available OBJETIVO: Avaliar a influência do biofármaco DNA-hsp65 em um modelo de distúrbio fibrosante pulmonar experimental. MÉTODOS: Foram estudados 120 camundongos machos C57BL/6, divididos em quatro grupos: grupo SS, animais tratados com salina (placebo) e injetados com salina intratraqueal (IT); grupo SB, [...] tratados com salina (placebo) e injetados com bleomicina IT; grupo PB, tratados com plasmídeo, sem gene bacteriano, e injetados com bleomicina IT; e grupo BB, tratados com DNA-hsp65 e injetados com bleomicina IT. A bleomicina foi injetada 15 dias após a última imunização, e os animais sacrificados seis semanas após o uso da droga IT. O pulmão esquerdo retirado foi utilizado para análise morfológica, e o pulmão direito para dosagens de hidroxiprolina. RESULTADOS: A proporção de camundongos que apresentaram morte não-programada depois de 48 h da injeção IT foi maior no grupo SB em comparação ao grupo SS (57,7% vs. 11,1%). A área percentual média de interstício septal foi maior nos grupos SB e PB (53,1 ± 8,6% e 53,6 ± 9,3%, respectivamente) em comparação aos grupos SS e BB (32,9 ± 2,7% e 34,3 ± 6,1%, respectivamente). Os grupos SB, PB e BB mostraram aumentos nos valores médios da área de interstício septal corada por picrosirius em comparação ao grupo SS (SS: 2,0 ± 1,4%; SB: 8,2 ± 4,9%; PB: 7,2 ± 4,2%; e BB:6,6±4,1%).O conteúdo pulmonar de hidroxiprolina no grupo SS foi inferior ao dos demais grupos (SS: 104,9 ± 20,9 pg/pulmão; SB: 160,4 ±47,8 pg/pulmão; PB:170,0 ± 72,0 pg/pulmão; e BB: 162,5 ± 39,7 pg/pulmão). CONCLUSÕES: A imunização com o biofármaco DNA-hsp65 interferiu na deposição de matriz não-colágena em um modelo de lesão pulmonar induzida por bleomicina. Abstract in english OBJECTIVE: To evaluate the effects of immunization with a DNA-hsp65 vaccine in an experimental model of pulmonary fibrosis. METHODS: A total of 120 male C57BL/6 mice were distributed into four groups: SS, injected with saline (placebo) and then receiving intratracheal (IT) instillation of saline; SB [...] , injected with saline (placebo) and then receiving IT instillation of bleomycin; PB, treated with plasmid only, without bacterial genome, and then receiving IT instillation of bleomycin; and BB, treated with the vaccine and then receiving IT instillation of bleomycin. Bleomycin was instilled 15 days after the last immunization, and the animals were killed six weeks thereafter. The left and right lungs were removed, the former for morphological analysis and the latter for hydroxyproline measurements. RESULTS: The proportion of deaths within the first 48 h after the IT instillation (deaths attributed to the surgical procedure) was higher in the SB group than in the SS group (57.7% vs. 11.1%). The mean area of pulmonary interstitial septa was greater in the SB and PB groups (53.1 ± 8.6% and 53.6±9.3%, respectively) than in the SS and BB groups (32.9 ± 2.7% and 34.3 ± 6.1%, respectively). The mean area of interstitial septa stained by picrosirius was greater in the SB, PB and BB groups than in the SS group (8.2 ± 4.9%, 7.2 ± 4.2% and 6.6 ± 4.1%, respectively, vs. 2.0±1.4%). The total hydroxyproline content in the lung was significantly lower in the SS group (104.9 ± 20.9 pg/lung) than in the other groups (SB: 160.4 ± 47.8 pg/lung; PB: 170.0 ± 72.0 pg/lung; and BB: 162.5 ± 39.7 pg/lung). CONCLUSIONS: Immunization with the DNA-hsp65 vaccine reduced the deposition of noncollagen matrix in a model of bleomycin-induced lung lesion.

  15. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuges Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  16. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and ...

  17. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  18. Biomodelos para la inducción de micronúcleos en células de la médula ósea por ciclofosfamida y bleomicina / Biomodels for micronucleis induction on bone marrow cells by cyclophosphamide and bleomycin

    Scientific Electronic Library Online (English)

    Daniel Francisco, Arencibia; Alexis, Vidal; Luis Alfredo, Rosario; Yolanda Emilia, Suárez; Livan, Delgado.

    2011-04-01

    Full Text Available En este trabajo se evaluó la línea de ratones Balb/c, de ambos sexos, como biomodelo en la inducción de micronúcleos en células de la médula ósea por ciclofosfamida y bleomicina. Se formaron cinco grupos experimentales/sexo: al primero se le administró NaCl al 0,9%, al segundo y al tercero ciclofosf [...] amida y al cuarto y quinto bleomicina. Todos los medicamentos fueron suministrados por vía intraperitoneal, con diseños de tratamientos diferentes y dosis de 50 mg/kg en los tres primeros grupos y de 20 mg/kg en los dos últimos. Se obtuvo como resultado una mayor inducción de micronúcleos en eritrocitos policromáticos y un mayor índice de citotoxicidad por el uso de la ciclofosfamida, administrada en dos ocasiones antes del sacrificio, con intervalos de 24 horas entre ambas administraciones. Esto constituyó, bajo nuestras condiciones experimentales, el mejor diseño para inducir un número considerable de micronúcleos en células de la médula ósea de ratones, siendo estos resultados útiles para evaluar drogas con efecto antigenotóxico y pudiera servir también como control positivo en estudios de mutagénesis o genotoxicidad. Abstract in english Balb/c mice of both sexes were evaluated as biomodel in the induction of micronucleis in bone marrow cells by cyclophosphamide and bleomycin. They were divided into five experimental groups per sex. The first one was administered with NaCl 0.9% by intraperitoneal (i.p) route, the second and third gr [...] oups were administered with cyclophosphamide by i.p route, with designs of different treatments at doses of 50 mg/kg. The fourth and fifth groups were administered with bleomycin by i.p route, equally in two designs of different treatments at 20 mg/kg doses. This resulted in a higher micronucleis induction of polychromatic erythrocytes and in a higher citotoxicity index with the use of cyclophosphamide administered twice before the sacrifice, with a 24-hours interval between administrations. According to our experimental conditions, this is the best design to induce a considerable number of micronucleis in bone marrow cells of mice, being useful in experimental designs to evaluate drugs with antigenotoxic effect. In addition, it implies its use according to the best found experimental design as positive control in mutagenesis and genotoxicity studies.

  19. Developing security protocols in ?-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introdu...

  20. Stream Control Transmission Protocol Steganography

    OpenAIRE

    Fraczek, Wojciech; Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SC...

  1. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    2013-01-01

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS (covered in Chapter 3 and 4), and how they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small O(1) internal memory to store N pieces of data on a server while revealing nothing more than the size of the memory N, and the number of accesses. This specifically includes hiding the access pattern. We construct an oblivious RAM that hides the client’s access pattern with information theoretic security with an amortized log3 N query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to log2 N, while also avoiding the bottleneck of sorting networks. And we show how to utilize this construction for four-playerMPC. Another line of work (covered in Chapter 2) has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two-player functionalities where only one player receives output (sender-receiver functionalities) with perfect security. We also show protocols for some specific sender-receiver tasks with both optimal communication and small preprocessing. We show lower bounds on the amount of communication and show the impossibility of general perfect protocols when both parties receive output. Also we show how to use the sender-receiver protocols with perfect security given correlated randomness to construct secure protocols in the plain model with perfect correctness.

  2. Preparation, distribution, stability and tumour imaging properties of [62Zn] bleomycin complex in normal and tumour-bearing mice as a molecular pet generator

    International Nuclear Information System (INIS)

    PET is a powerful imaging technique with many advantages over single photon imaging. Nowadays, several positron emitter radioisotopes and their radio-labeled complexes have been developed for imaging. 62Zn/62Cu positron generator system has been widely proposed as a source of perfusion tracers (Green, 1987 and Green et al, 1988). In this study we have developed a 62Zn/62Cu-bleomycin tracer system as a biological generator for PET. The radiochemical separation of the 62Zinc (Neirinckx 1977) from natural copper target (electroplated over Ni layer) was carried out with a method described by (Green et al, 1990 and Okazawa et al, 1994) with slight modification. After dissolving of the irradiated target, solution was heated under a flow of nitrogen to dry up until a precipitate was formed. The precipitate was rinsed 2 times by distilled water (10 ml) and a portion of 2N HCl was added and mixed gently. The solution was pumped through a column 10x100mm filled with BioRad AG-1X8 resin and preconditioned with 2N HCl. For the elution of 62Zn in anion exchange resin, 0.005 N HCl was adopted instead of water used by (Green et al, 1990, Qaim 2001), because [62Zn] chloride form is suitable for the BLM labeling The samples were taken for the gamma spectroscopy analysis, using HPGe Canberra detector, in each steps. [62Zn]Zinc chloride (0.25-2.5 mCi) dissolved in acidic media obtained above (0.5-2 ml) was transferred to a 2 ml-vial and pH was adjusted using HCl 1M and/or NaOH 1M (pH=1-7). The mixture was evaporated by slight warming, under a nitrogen flow. A mixture of BLM (0.25-2.5 mg,) in normal saline (0.1 mL) was then added. This mixture was heated at different temperatures (25, 50, 80 and 100 deg. C). The mixture was cooled in an ice bath and rapidly sent for use. The active solution was checked for radiochemical purity by polymer-backed silica gel layer using a mixture of ammonium acetate 10%-methanol as the mobile phase. These analyses were carried out every 30 min after labeling step. The final solution was then passed through a 0.22 m filter and pH adjusted to 5-7 by the addition of sodium acetate (1M) buffer. Pyrogen test was performed using a commercial LAL kit. Stability of [62Zn]BLM complex in final product and human/mice serum in vitro. A sample of [62Zn]BLM (0.5 mCi) was kept at room temperature for 48 hrs while checked by RTLC at various time intervals (2, 4, 8, 12 and 24). A micropipette sample (50 mL) was taken from the shaking mixture and the ratio of free radiozinc to [62Zn]BLM was checked by radio thin layer chromatography (eluent: 10% NH4OAc and methanol 1:1). The patterns for [62Zn]ZnCl2 and [62Zn]BLM were not changed in 24 hrs. Animal studies: Fibrosarcoma cells (about 104) of were injected SC to the dorsal area of Balb C mice weighing 20-25 g. After 14 days the tumour weighed 0.7 g and was not grossly necrotic. The distribution of [62Zn]-ZnCl2 and [62Zn]-BLM among tissues were determined for untreated mice and for mice with fibrosarcoma. A volume (0.1 ml) of final [62Zn]-BLM solution containing 20-40 uCi radioactivity (6 mg bleomycin in 50 mL) was injected into the dorsal tail vein. The total amout of radioactivity injected into each mouse was measured by counting the 1-ml syringe before and after injection in a radiometer with a fixed geometry. The animals were sacrificed by ether asyxphycation at selected times after injection, the tissues weighed and their specific activities determined with a gamma-ray scintillation as percentage of injected dose per gram of tissues (data not shown here) No unlabelled and/or labeled by-products were observed upon RTLC analysis of the final preparations. In contrast to other labeled bleomycins, [62Zn]bleomycin, has a lower half life causing less undesirable irradiation and it also benefits from PET radiopharmacutical advantages. Its rather higher half-life in contrast to other PET radioisotopes and high chemical stability of radiopharmaceutical form makes it a suitable possible PET tracer for use in neighborhood PET centers. [62Zn]-BLM can be used in PET oncology studies due to

  3. "RAPID AND SIMULTANEOUS DETERMINATION OF ADRIAMYCIN, BLEOMYCIN, VINBLASTINE AND DACARBAZINE IN PLASMA OF HODGKIN'S LYMPHOMA PATIENTS BY A REVERSED PHASE HPLC METHOD"

    Scientific Electronic Library Online (English)

    MUHAMMAD, ZUBAIR MALIK; MAHMOOD, AHMAD; SALEH, MUAHAMMAD.

    Full Text Available The RP-HPLC analytical method with UV detection at 230nm with ODS Hypersil C18 column (250mm x 4.6mm, 5µ particle size) was developed for simultaneous determination of Adriamycin, Bleomycin, Vinblastine and Dacarbazine in plasma of lymphoma patients using mobile phase composition of 300 volumes Acet [...] onitrile and 700 volumes 0.05M Disodium Hydrogen Phosphate containing 0.5ml TEA and pH of the mobiles phase was maintained at 3.7 with 2M Phosphoric acid at a flow rate of 0.75ml/minute with linearity ranges of 0.05-50, 0.06-50, 0.075-50 and 0.09-50 µg/ml respectively with LOD and LOQ of 0.020, 0.050; 0.045, 0.060; 0.060, 0.075 and 0.040, 0.090 respectively. % recovery of DOX, BLM, VBL and DTIC were 99.24, 99.23, 99.08 and 99.09 respectively.

  4. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  5. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  6. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  7. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    2012-01-01

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly successful Methods in Molecular Biology? series format, the chapters include the kind of detailed description and implementation advice that is crucial for getting optimal results in the laboratory. Thorough and intuitive, DNA Repair Protocols, Third Edition provides expert guidance for DNA repair, recombination, and replication.

  8. Radioisotopic generators: work protocol

    International Nuclear Information System (INIS)

    This work proposes the valuation of radioisotope generator behaviour from the users. Such as in Molybdenum 99 and Technetium 99 the present protocol treat three methodology aspects:(1) Leaching profile of 99mTc determination;(2) chemical purity controls, and radiochemical and radionuclides in Tc99 leaching;(3)99mTc leaching efficiency determination

  9. Security Protocol Design: A Case Study Using Key Distribution Protocols

    OpenAIRE

    Reiner Dojen; Tom Coffey; Anca Jurcut; Robert Gyorodi

    2009-01-01

    Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities th...

  10. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  11. Synchronizing internet protocol security (SIPSec)

    CERN Document Server

    Shoniregun, Charles A

    2007-01-01

    Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This volume identifies the security problems facing internet communication protocols along with the risks associated with internet connections. It also includes an investigative case study regarding the vulnerabilities that impair IPSec and proposes a SIPSec

  12. Composite Protocols and Networking Services

    OpenAIRE

    Minden, Gary

    2005-01-01

    Active Networking is concerned with the rapid definition and deployment of innovative, but reliable and robust, networking services. Towards this end we have developed a composite protocol and networking services architecture that encourages re-use of protocol functions, is well defined, and facilitates automatic checking of interfaces and protocol component properties. The architecture has been used to implement common Internet protocols and services. We will report on this work at the works...

  13. Validation of survivability validation protocols

    Energy Technology Data Exchange (ETDEWEB)

    Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

    1993-05-01

    Issues associated with the validation of survivability protocols are discussed. Both empirical and analytical approaches to protocol validation are included. The use of hybrid simulations (hardware-in-the-loop, scene generators, software generators, man-in-the-loop, etc.) for the validation of survivability protocols is discussed.

  14. Password Guessing Resistant Protocol

    OpenAIRE

    Arya Kumar; Gupta, A.K.

    2014-01-01

    Attacks on passwords are increasing day by day. Brute force attack and dictionary attacks are the well known attacks. Automated Turing Test is effective approach to minimize such attacks and identify malicious logins. But sometimes it may create inconvenience to the authorized user as the user always has to cross or go through the ATTs. So to avoid such inconvenience, a new technique called Password Guessing Resistant Protocol (PGRP) is introduced. It overcomes the drawbacks o...

  15. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    2013-01-01

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the si...

  16. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    2012-01-01

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third...

  17. Adaptive Latency Insensitive Protocols

    OpenAIRE

    Casu, Mario Roberto; Macchiarulo, Luca

    2007-01-01

    Latency-insensitive design copes with excessive delays typical of global wires in current and future IC technologies. It achieves its goal via encapsulation of synchronous logic blocks in wrappers that communicate through a latency-insensitive protocol (LIP) and pipelined interconnects. Previously proposed solutions suffer from an excessive performance penalty in terms of throughput or from a lack of generality. This article presents an adaptive LIP that outperforms previous static implementa...

  18. Specifying agent interaction protocols

    OpenAIRE

    Rueda, Sonia Vivian; Martínez, María Vanina; Simari, Guillermo Ricardo

    2005-01-01

    Argumentation-based negotiation is an adequate alternative for modelling situations in which agents have limited information and bounded capacities. In this research line, each agent elaborates arguments as part of its own planning process and also to justify its proposals, counter-proposals and rejections during the negotiation process. Our proposal analyzes and compares three tools for the specification of interaction protocols: finite state machines, UML, and dialogues games.

  19. Atomic resolution structure of EhpR: phenazine resistance in Enterobacter agglomerans Eh1087 follows principles of bleomycin/mitomycin C resistance in other bacteria

    Directory of Open Access Journals (Sweden)

    Itzen Aymelt

    2011-08-01

    Full Text Available Abstract Background The phenazines are redox-active secondary metabolites that a large number of bacterial strains produce and excrete into the environment. They possess antibiotic activity owing to the fact that they can reduce molecular oxygen to toxic reactive oxygen species. In order to take advantage of this activity, phenazine producers need to protect themselves against phenazine toxicity. Whereas it is believed that phenazine-producing pseudomonads possess highly active superoxide dismutases and catalases, it has recently been found that the plant-colonizing bacterium Enterobacter agglomerans expresses a small gene ehpR to render itself resistant towards D-alanyl-griseoluteic acid, the phenazine antibiotic produced by this strain. Results To understand the resistance mechanism installed by EhpR we have determined its crystal structure in the apo form at 2.15 Å resolution and in complex with griseoluteic acid at 1.01 Å, respectively. While EhpR shares a common fold with glyoxalase-I/bleomycin resistance proteins, the ligand binding site does not contain residues that some related proteins employ to chemically alter their substrates. Binding of the antibiotic is mediated by ?-stacking interactions of the aromatic moiety with the side chains of aromatic amino acids and by a few polar interactions. The dissociation constant KD between EhpR and griseoluteic acid was quantified as 244 ± 45 ?M by microscale thermophoresis measurements. Conclusions The data accumulated here suggest that EhpR confers resistance by binding D-alanyl-griseoluteic acid and acting as a chaperone involved in exporting the antibiotic rather than by altering it chemically. It is tempting to speculate that EhpR acts in concert with EhpJ, a transport protein of the major facilitator superfamily that is also encoded in the phenazine biosynthesis operon of E. agglomerans. The low affinity of EhpR for griseoluteic acid may be required for its physiological function.

  20. Response of S180 murine tumor to bleomycin in combination with radiation and hyperthermia using micronucleus assay: a multimodality approach for therapeutic augmentation

    International Nuclear Information System (INIS)

    Response of a transplantable tumor, S180, grown intradermally in inbred Balb/c mice, was assessed by using micronucleus assay after treating the solid tumors with bleomycin (BLM), radiation (RT) and hyperthermia (HT) vis-a-vis multimodality approach. The frequency of micronuclei (MN) though did not vary greatly during the one week of observation in untreated tumors, it significantly increased in the drug and RT groups at 24 hr post-treatment. However, MN frequency was non-significant in the HT group from the control. A drug dose dependent linear increase in the frequency of MN induction was evident in 10, 15 and 20 mg/kg body weight BLM alone treated groups. Combination of radiation with BLM or HT further increased the MN counts in the bimodality groups. But, MN induction at 24 hr post-treatment in the tri- modality group (BLM+RT+HT) was non-significant from that of the bimodality treatments. However, the tumors treated with trimodality treatment presented severe tumor necrosis, indicating increased cell loss, and resulting in immediate tumor regression. In all the bi-modality groups MN counts though declined 3 or 5 days post-treatment, the values remained significantly higher than the control, on day 7 post-treatment. Micronucleus assay could be used as a predictive parameter for the assessment of post-irradiation tumor regression response. However, the tumor response assessment with MN assay alone may not be sufficient and the role of other parameters, such as apoptosis and necrosis, in immediate tumor regression, especially radiosensitive/thermosensitive tumors can not be ignored while taking multi modality approach into consideration for cancer therapy. (author)

  1. A protected password change protocol

    CERN Document Server

    Wang, R C; Mo, K R; Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru

    2005-01-01

    Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password change protocol. At the same time, authors shall propose a new password change protocol to withstand all the threats of security.

  2. Safety and efficacy of resistance training in germ cell cancer patients undergoing chemotherapy

    DEFF Research Database (Denmark)

    Christensen, Jesper Frank; Jones, L W; Tolver, Anders; Jørgensen, L W; Andersen, J.L.; Adamsen, L; Højman, P.; Nielsen, R. H.; Rørth, Mikkel; Daugaard, Gedske

    2014-01-01

    Abstract Background: Bleomycin–etoposid–cisplatin (BEP) chemotherapy is curative in most patients with disseminated germ cell cancer (GCC) but also associated with toxic actions and dysfunction in non-targeted tissues. We investigated changes in muscle function during BEP and the safety and efficacy of resistance training to modulate these changes. Methods: Thirty GCC patients were randomly assigned to resistance training (resistance training group (INT), n=15) or usual care (CON, n=15) during 9...

  3. Multidrug chemotherapy (vincristine-bleomycin-methotrexate) followed by radiotherapy in inoperable carcinomas of the head and neck: preliminary report of a pilot study of the Radiation Therapy Oncology Group

    International Nuclear Information System (INIS)

    This is a preliminary report on the Radiation Therapy Oncology Group (RTOG) pilot study 77-08, of a combination of chemotherapy with vincristine-bleomycin-methotrexate, followed by radiotherapy, for inoperable carcinomas of the head and neck. The main objectives of the study were to determine toxicity and tumor control. Patients who were included had untreated carcinomas, with no distant metastases, and with adequate pulmonary, renal, and liver function. Forty patients were registered for the study. Chemotherapy started with vincristine--1.5 mgs/m2 (maximum of 2 mgs) by I.V. injection, followed by bleomycin drip for 48 hours (15 units/day), and then methotrexate (200 mgs/m2 divided in equal doses 6 hours apart) with folinic acid rescue. Eleven patients received one course of the stated chemotherapy; 28 were given two courses with one week rest period between them. Radical curative radiotherapy was started usually two weeks after chemotherapy. A surgical procedure was considered if the patient was found operable after receiving a dose of 5000 rad with continuous therapy or at 3000 rad with split-course therapy. The level of toxicity that resulted from this combined therapy was considered acceptable. The percentage of complete response of the primary tumor was 6% with chemotherapy; this increased to 46% after irradiation, and to 65% when surgery was added

  4. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  5. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  6. Address Resolution Protocol Optimization

    Directory of Open Access Journals (Sweden)

    Nor Adnan Yahaya

    2009-09-01

    Full Text Available This paper proposes an improved Address Resolution Protocol (ARP for Ethernet-based networks. Inthe proposed alternative method, the ARP request packets are not broadcasted but instead unicastedto an ARP server which will have all the mappings of all the hosts connected to the network.This significantly reduces ARP signaling and processing overhead. The ARP server obtains the mappingsthrough a novel passive method that does not introduce additional overhead in the network. Furthermore,the use of the ARP server makes it much easier to secure the network against certain attacks like ARPpoisoning.

  7. Results of a combination of bleomycin and triamcinolone acetonide in the treatment of keloids and hypertrophic scars / Resultados de uma combinacao de bleomicina e triamcinolone acetonide no tratamento de queloides e cicatrizes hipertroficas

    Scientific Electronic Library Online (English)

    Francisco Miguel, Camacho-Martinez; Elena Rodriguez, Rey; Francisco Camacho, Serrano; Adriana, Wagner.

    2013-06-01

    Full Text Available Enquanto normalmente o tratamento de queloides e cicatrizes hipertróficas mostra resultados moderados, o tratamento com bleomicina revelou resultados mais promissores. Este estudo foi dividido em duas partes. Na primeira parte, o objetivo foi mostrar os resultados da utilização de uma combinação de [...] bleomicina e acetonido de triancinolona por cm2 (BAT). Na segunda parte, o objetivo foi determinar a resposta aos dois medicamentos em queloides grandes, que foram divididos em quadrados de 1 cm2, tratando cada quadrado com a dose utilizada anteriormente. Na primeira parte do estudo, a resposta clínica de 37 queloides de 0,3 to 1,8 cm2 tratados com BAT foi monitorada por um período de 1 a 2 anos. Injeções de 0,375 UI de bleomicina e 4 mg de acetonido de triancinolona foram aplicadas a cada 3 meses. Na segunda parte do estudo, revisamos a resposta clínica em 6 pacientes com queloides grandes. A dose mensal administrada nunca excedeu 3 UI de bleomicina. O primeiro estudo mostrou que 36 queloides (97,29%) amoleceram após a primeira dose. No segundo estudo, 5 mostraram diferentes respostas (a resposta foi completa nos quatro queloides menores). O queloide maior necessitou de 9 doses para apresentar melhora de 70%. Concluindo, o tratamento combinado com 0,375 UI de bleomicina e 4 mg de acetonido de triancinolona por cm2foi considerado um procedimento aceitável para o tratamento de queloides. Os melhores resultados foram obtidos em queloides com mais de 1 cm2 ou divididos em áreas de 1cm2. Estudos mais amplos deveriam ser realizados, para confirmar esses resultados. Abstract in english While treatment of keloids and hypertrophic scars normally shows modest results, we found that treatment with bleomycin was more promising. The present study was divided into two parts. In the first part the aim was to show the results using a combination of bleomycin and triamcinolone acetonide per [...] cm2 (BTA). In the second part the objective was to determine the response to both drugs in large keloids that were divided into 1 cm2 squares, treating each square with the dose previously used. In the first part of the study, the clinical response of 37 keloids ranging from 0.3 to 1.8 cm2 treated with BTA were followed up over a period of 1- 2 years. 0.375 IU bleomycin and 4 mg triamcinolone acetonide were injected every 3 months. In the second part of the study we reviewed the clinical response in six patients with large keloids. The monthly dose administered never exceeded 3 IU of bleomycin. The first study showed 36 keloids (97.29%) softening after the first dose. In the second study, 5 showed different responses (the response was complete in the four smaller keloids). The largest keloid needed 9 doses to achieve an improvement of 70%. In conclusion, combined treatment with 0.375 IU of bleomycin and 4mg of triamcinolone acetonide to 1 cm2 was considered to be an acceptable procedure for the treatment of keloids. The best results were obtained in keloids over 1 cm2 or when divided into 1 cm2 square areas. Larger series need to be performed in order to confirm these results..

  8. Formal Verification of Quantum Protocols

    CERN Document Server

    Nagarajan, R; Nagarajan, Rajagopal; Gay, Simon

    2002-01-01

    We propose to analyse quantum protocols by applying formal verification techniques developed in classical computing for the analysis of communicating concurrent systems. One area of successful application of these techniques is that of classical security protocols, exemplified by Lowe's discovery and fix of a flaw in the well-known Needham-Schroeder authentication protocol. Secure quantum cryptographic protocols are also notoriously difficult to design. Quantum cryptography is therefore an interesting target for formal verification, and provides our first example; we expect the approach to be transferable to more general quantum information processing scenarios. The example we use is the quantum key distribution protocol proposed by Bennett and Brassard, commonly referred to as BB84. We present a model of the protocol in the process calculus CCS and the results of some initial analyses using the Concurrency Workbench of the New Century (CWB-NC).

  9. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  10. Protocol Architecture Model Report

    Science.gov (United States)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  11. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  12. A protected password change protocol

    OpenAIRE

    Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru

    2005-01-01

    Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work...

  13. Impersonation with the Echo Protocol

    CERN Document Server

    Chung, Y; Chung, Yoo; Lee, Dongman

    2005-01-01

    The Echo protocol tries to do secure location verification using physical limits imposed by the speeds of light and sound. While the protocol is able to guarantee that a certain object is within a certain region, it cannot ensure the authenticity of further messages from the object without using cryptography. This paper describes an impersonation attack against the protocol based on this weakness. It also describes a couple of approaches which can be used to defend against the attack.

  14. Protocol Composition Frameworks, A Header Driven Model

    OpenAIRE

    Bünzli, Daniel C.; Mena, Sergio; Nestmann, Uwe

    2005-01-01

    Protocol composition frameworks provide off-the-shelf composable protocols to simplify the development of custom protocol stacks. All recent protocol frameworks use a general-purpose event-driven model to manage the interactions between protocols. In complex compositions, where protocols offer their service to more than one other protocol, the one-to-many interaction scheme of the event-driven model introduces composition problems by mixing up the targets to which data (list of headers) shoul...

  15. Licklider Transmission Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional round trip while the lost data are retransmitted; even multiple retransmission cycles may be necessary. LTP's possible multiplicity of sessions per association makes it necessary for each segment of application data to include an additional demultiplexing token: a session ID that uniquely identifies the session in which the segment was issued and, implicitly, the block of data being conveyed by this session. This software comprises a prototype implementation developed by Johns Hopkins University APL in cooperation with JPL, together with adaptations that improve the robustness, correctness, and operability of that implementation.

  16. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  17. Mobile Multilayer IPsec protocol

    Directory of Open Access Journals (Sweden)

    T.Gayathri

    2009-08-01

    Full Text Available A mobile user moves around and switches between wireless cells, subnets and domains, it needs to maintain the session continuity. At the same time security of signaling and transport media should not be compromised. A multi-layer security framework involving user authentication, packet based encryption and access control mechanism can provide the desired level of security to the mobile users. Supporting streaming traffic in a mobile wireless Internet is faced with several challenges due to continuous handoff experienced by a mobile user. These challenges include dynamic binding, location management, quality of service and end-to-end security for signaling and transport. Mobile users will use heterogeneous radio access networking technologies. Mobile multilayer IPsec protocol (MML IPSec extends ML-IPSec to deal with mobility and make it suitable for wireless networks. MML-IPSec is integration of ML-IPSec and mobile IP.

  18. A Comparison of Effects of ABVD and ChlVPP Chemotherapeutic Protocols for Hodgkin's Disease on Rats’ Epididiymal and Testicular Tissues

    Directory of Open Access Journals (Sweden)

    S. Zare

    2010-01-01

    Full Text Available The goal of this study was to determine the effects of ABVD and ChlVPP chemotherapeutic protocols for Hodgkin's disease on the structure of testis and epididymis of male rat. After determining tolerance dose of drugs in pilot study, 24 male rats were divided to four groups: ABVD (doxorubicin, bleomycine, vinblastin, dacarbazine group, ChlVPP (chlorambucil, vinblastin, procarbazine, prednisolone group and two control groups one for each treatment group. One half of the lethal dose for 50% of population (LD50 was used for treatment of animals in each protocol. Testes and epididymis tissues were examined for structural changes and serum testosterone level was measured by Lission (chemiluminescence method. Body weight, testis and epididymis weights, in treated rats were significantly less than their control groups specifically in ABVD group was less than ChlVPP group. Decreasing of mean diameter of seminiferous tubules, height of spermatogenic cells and diameter of epididymis in caput, corpus and cauda in ABVD group were significantly more than ChlVPP and control group. The serum testosterone level in ABVD group was significantly less than ChlVPP and control group. According to this study results, the ChlVPP had fewer impairment effects than ABVD on testis and epididymis tissue in tolerance doses on male rats' reproductive system. More clinical trial studies are suggested on Hodgkin's patients. With equal treatment effectiveness, it will be better to use the most reliable and safe treatment especially in young patients.

  19. Data Link Layer Protocol Simulator User Guide

    OpenAIRE

    Nataf, Emmanuel

    2008-01-01

    The data link layer protocol simulator allows to write protocol and to see them in execution. This guide describes a step by step approach from simple information communication without any control to windows protocols. A protocol oriented java API is defined to write protocol algorithms.

  20. A Streaming Protocol for Memcached

    Directory of Open Access Journals (Sweden)

    W. Li

    2012-01-01

    Full Text Available Memcached is a general-purpose distributed memory caching system that was originally developed by Danga Interactive for Live Journal but is now used by many other sites and It is thought to be one of the most effective solutions to speed up dynamic database-driven websites by caching data and objects in RAM to reduce the number of times that an external data source must be read. Memcached system uses a client-server architecture, it provides its standard memcached protocol to support any types of programming languages. The memcached protocol is simple and very efficient, while it doesn’t support big data objects very well. In this study, the memcached systems were firstly illustrated and then a detailed introduction was provided for the memcached protocol and then the issues of the stock protocol were specified. After that, a new streaming protocol was illustrated which was well designed for big data objects and could be easily integrated into original memcached protocols. Finally, some experiments were done to evaluate the new streaming protocol and finally the new protocol was proved to be very efficient for big data objects storage and it explored new application fields for memcached.

  1. NCI Mouse Repository- Protocol Information

    Science.gov (United States)

    The iDct-GFP mice (01XT4) contain two transgenes, so two genotyping PCR reactions need to be run for each mouse. The genotyping PCR protocol 1 is used to type the Dct-rtTA gene and protocol 2 is forTRE-H2BGFP gene.

  2. An Improved Resource Reservation Protocol

    Directory of Open Access Journals (Sweden)

    Desire Oulai

    2007-01-01

    Full Text Available The classical resource reservation protocol (RSVP is a ?ow-based signaling protocol used for reserving resources in the network for a given session. RSVP maintains state information for each reservation at every router along the path. Even though this protocol is very popular, he has some weaknesses. Indeed, RSVP does not include a bidirectional reservation process and it requires refresh messages to maintain the soft states in the routers for each session. In this paper, we propose a sender-oriented version of RSVP that can reserve the resources in both directions with only one message, thus reducing the delay for establishing the reservations. We also suggest a refreshment mechanism without any refresh message which could be applied to any soft states protocol. Simulation results show that the proposed protocol is approximately twice faster than RSVPv2 for establishing bidirectional reservations with almost no control overhead during the session.

  3. Analysis of Two Types Deniable Authentication Protocols

    OpenAIRE

    Haibo Tian; Xiaofeng Chen; Yong Ding

    2009-01-01

    Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In this paper, we present the security analysis of a class of interactive deniable authentication protocols and a noninteractive one. For interactive protocols, we focus on a serial of pairings based protocols proposed by Chou et al and repaired by Lim et al. We point out that their repaired protocols are still not secure under Key Compromise Impersonation (KCI) attack ...

  4. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  5. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  6. What compound should be used for the detection of brain metastases. Comparison of sup(99m)Tc-gluconate with four other technetium-containing compounds (pertechnetate, DTPA, citrate, bleomycine

    International Nuclear Information System (INIS)

    This comparative study shows that sup(99m)Tc-gluconate and sup(99m)Tc-DTPA give the best results in the diagnosis of brain metastases, on condition that the examinations are not carried out until 4 to 6 hours after injection. They far outclass pertechnetate and appear more efficient than technetium-containing citrate and bleomycine. The only disadvantages of these compounds are their fast elimination by the kidneys, exposing the kidneys and bladder to higher irradiation doses and the length of the examinations which must be performed 3 to 6 hours after injection with relatively low count rates. However these disadvantages are more than offset by the superiority of the data supplied

  7. Bleomycin, methotrexate and vincristine before irradiation of stage III and IV laryngeal and pharyngeal squamous cell carcinoma. A study initiated by the Danish Society of Head and Neck Cancer

    DEFF Research Database (Denmark)

    Hansen, H S; Rygård, J

    2013-01-01

    Primary treatment with bleomycin, methotrexate and vincristine for two weeks followed by curatively intended 60Co irradiation was administered to 153 patients consecutively referred to the three main treatment centres in Denmark over more than a two-year period. Seventy-one laryngeal and 82 pharyngeal squamous cell carcinomas were evaluated. According to the TNM classification (UICC) 76 patients had stage III and 77 patients stage IV disease. The immediate response (complete + partial) to chemotherapy was 20 per cent. Judging from frequency of local recurrence, metastases as well as survival the treatment results were not obviously improved. A high frequency of complications was observed after this combination of chemotherapy and irradiation, and it was often impossible to fulfil the irradiation to the planned dose in appropriate time.

  8. Do human lymphocytes exposed to the fallout of the Chernobyl accident exhibit an adaptive response? Part 3. Challenge with bleomycin in lymphocytes from children hit by the initial acute dose of ionizing radiation

    International Nuclear Information System (INIS)

    In the present paper, we report data on the possible adaptive response, induced in vivo by exposure to ionizing radiation to a challenge treatment with the radiomimetic glycopeptide bleomycin (BLM). Lymphocytes from children living in Pripjat at the time of the Chernobyl accident, and thus hit by the initial acute dose of ionizing radiation, were treated for the last 5 h of culture with 0.004 U/ml BLM. Significantly lower chromosome damage was found only in lymphocytes from children who, independently of the initial acute exposure to ionizing radiation, still showed a 137Cs internal contamination, due to persistent continuous exposure to low doses of radiation. The present results indicate that past exposure to acute high dose of ionizing radiation does not interfere with resistance to BLM which is related to internal contamination

  9. Automatic Sequencing for Experimental Protocols

    Science.gov (United States)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  10. Assessment of Established Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — A form and instructions for quickly and briefly assessing a previously prior to 2013 reviewed or approved survey protocol for use as a National or Regional survey...

  11. Multilevel Security Protocol using RFID

    OpenAIRE

    Syed Faiazuddin; S.Venkat Rao; S.C.V. Ramana Rao; M.V.Sainatha Rao; P. Sathish Kumar

    2011-01-01

    Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats

  12. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S.

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  13. Secure E-payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2009-11-01

    Full Text Available The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now one of the most centralresearch areas in e-commerce, mainly regarding online and offline paymentscenarios. In this paper, we will discuss an important e-payment protocol namelyKim and Lee scheme examine its advantages and delimitations, whichencourages the author to develop more efficient scheme that keeping allcharacteristics intact without concession of the security robustness of theprotocol. The suggest protocol employs the idea of public key encryption schemeusing the thought of hash chain. We will compare the proposed protocol with Kimand Lee protocol and demonstrate that the proposed protocol offers moresecurity and efficiency, which makes the protocol workable for real worldservices.

  14. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 ?g/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x107 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x107 spleen cells to 1x106 myeloma cells (ratio 10:1). Centrifuge the mixture of cells at 300g for 10 minutes. While the cells are centrifuging, set aside 30 ml of serum-free RPMI 1640 in another 50-ml tube. Prepare the 50% PEG and place the timer in the hood. 6. Remove all the supernatant from the cell pellet. Overlay the pellet of cells with 0.5 ml of 50% PEG with a Pasteur pipet during 1 minute. Then add 5 ml of serum-free RPMI 1640 during 3 minutes. At the end of 3 minutes, add during a minute 15 ml of the same medium. 7. Centrifuge at 250g for 10 minutes. Gently resuspend the fused cells at a concentration of 5 x104 cells/ml, in a RPMI medium containing serum at 20%, HAT (selective growth) and antibiotics. 8. Distribute the cell suspension into 96-well-flat-bottom-tissue-culture plates add 0.2 ml per well. Incubate the plates at 37 deg. C in 5% CO2. Three to 4 days in HAT medium is sufficient for arresting the proliferation of unfused myeloma cells. Screening and establishing a Hybridorna line. The screening could be perform using different immunoassay alternatives (ELISA, RIA, etc). The principal requisite is have been developed a reproducible method before to make the fusion. These method could be improve using the serum of mice immunized as sample. Approximately 1 week after the fusion, colonies of hybrid cells will be ready to screen. During the screening, samples of tissue culture media are removed from wells that have growing hybridomas and are tested for the presence of the desired antibodies. Successful fusions will produce between 2000 and 5000 hybridomas colonies. Depending on the fusion, individual wells will become ready to screening over 2 to 6 day period. Typically, the first wells could be ready to screen in day 7 or 8, and most of the wells will need to be screened within the next 4 or 5 days. When you detected a possible positive clone, you could transfer hybrids of interest to 24-plates adding 1 ml of HAT medium (RPMI 1640) supplemented with serum at 20%. Cryopreserve each culture of cells when they have reached at least 3/4 confluency, 2 ampules/cell culture. Save the supernatants for further studies. Re

  15. More Robust Multiparty Protocols with Oblivious Transfer

    CERN Document Server

    Müller-Quade, J

    2001-01-01

    With oblivious transfer multiparty protocols become possible even in the presence of a faulty majority. But all known protocols can be aborted by just one disruptor. This paper presents more robust solutions for multiparty protocols with oblivious transfer. This additional robustness against disruptors weakens the security of the protocol such that we can observe a trade off between robustness and security. We give an application to quantum multiparty protocols. These allow the implementation of oblivious transfer and the protocols of this paper relative to temporary assumptions, i.e., the security increases after the termination of the protocol.

  16. The Classically-Enhanced Father Protocol

    CERN Document Server

    Hsieh, Min-Hsiu

    2008-01-01

    The classically-enhanced father protocol is an optimal protocol for a sender to transmit both classical and quantum information to a receiver by exploiting preshared entanglement and a large number of independent uses of a noisy quantum channel. We detail the proof of a quantum Shannon theorem that gives the three-dimensional capacity region containing all achievable rates that the classically-enhanced father protocol obtains. Points in the capacity region are rate triples consisting of the classical communication rate, the quantum communication rate, and the entanglement consumption rate of a particular coding scheme. The classically-enhanced father protocol is more general than any other protocol in the family tree of quantum Shannon theoretic protocols. Several previously known quantum protocols are now child protocols of the classically-enhanced father protocol. Interestingly, the classically-enhanced father protocol gives insight for constructing optimal classically-enhanced entanglement-assisted quantum...

  17. Analyzing security of Authenticated Routing Protocol (ARAN)

    OpenAIRE

    Seema Mehla; Bhawna Gupta; Preeti Nagrath,

    2010-01-01

    Ad hoc network allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol for ad hoc network operate in an ad hoc fashion, as on demand routing protocol often have low overhead and faster reaction time than other type of routingbased on periodic protocol. However variety of attacks targeting routing protocol have been identified. By attacking the routing protocol attacker can absorb network t...

  18. SILC-A Secured Internet Chat Protocol

    OpenAIRE

    ANINDITA SINHA; SAUGATA SINHA

    2013-01-01

    The Secure Internet Live Conferencing (SILC) protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this pap...

  19. Superselection rules and quantum protocols

    Science.gov (United States)

    Kitaev, Alexei; Mayers, Dominic; Preskill, John

    2004-05-01

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system—in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n -party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties—by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

  20. Defensive forecasting for linear protocols

    CERN Document Server

    Vovk, V; Takemura, A; Shafer, G; Vovk, Vladimir; Nouretdinov, Ilia; Takemura, Akimichi; Shafer, Glenn

    2005-01-01

    We consider a general class of forecasting protocols, called "linear protocols", and discuss several important special cases, including multi-class forecasting. Forecasting is formalized as a game between three players: Reality; Forecaster, whose goal is to predict Reality's next move; and Skeptic, who tries to make money on any lack of agreement between Forecaster and Reality. Our main mathematical result is that for any continuous strategy for Skeptic in a linear protocol there exists a strategy for Forecaster that does not allow Skeptic's capital to grow. This result is a meta-theorem that allows one to transform any constructive law of probability in a linear protocol into a forecasting strategy whose predictions are guaranteed to satisfy this law. We apply this meta-theorem to a weak law of large numbers in inner product spaces to obtain a version of the K29 prediction algorithm for linear protocols and show that this version also satisfies the attractive properties of proper calibration and resolution u...

  1. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  2. Cryptographic Protocols: : Theory and Implementation

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    2010-01-01

    The art of keeping messages secret is ancient. It must have been invented only shortly after the invention of the messages themselves. Merchants and generals have always had a need to exchange critical messages while keeping them secret from the prying eyes of competitors or the enemy. Classical cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality with a variant of the classic BGW protocol. The protocol is secure against a semi-honest adversary. In Chapter 4 we describe a new protocol for VIFF that is secure against malicious adversaries. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting less than n=3 players. Following the presentation of VIFF, we turn to a more theoretical subject. Chapter 5 investigates the notion of a covert adversary — an adversary type that intuitively lies in between semi-honest and malicious adversaries. The main idea is that we accept that a cheating adversary may succeed with a given probability, which need not be negligible. The reasoning is that in many real-world cases, a large probability of being caught is sufficient to prevent the adversary from trying to cheat. We show how to compile a passively secure protocol for honest majority into a protocol that is secure against covert attacks, again for honest majority. The transformed protocol catches cheating with probability 1/4 . Though we present no implementation of this compiler, we believe it will be very efficient and practical to implement using, say, VIFF. The cost of the modified protocol is essentially twice that of the original plus an overhead that only depends on the number of inputs. We round off this dissertation with Chapter 6. There we return to the practical side of things and consider how users of online collaboration tools and network storage services place considerable trust in their providers. We presents a novel approach for protecting data integrity in revision control systems hosted by an untrusted provider. It guarantees atomic read and write operations on the shared data when the service is correct and preserves fork-linearizability when the service is faulty. A prototype has been implemented on top of the Subversion revision control system; benchmarks show that the approach is practical.

  3. Modified LAR Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Reham Abdellatif Abouhogail

    2012-10-01

    Full Text Available Today there is a widening in digital technologies and increasing in new multimedia services like: pay-per-view TV, interactive simulations, teleconferencing. So there is an increasing demand for multicast communication. There is a number of security issues in multicast communication directly related to the specific nature of multicast. In this paper, we propose a new scheme for authenticating streamed data delivered in real-time over an insecure network we concentrate on the multicast authentication problem. Important requirements of multicast communication protocols are: to perform authentication in real-time, to resist packet loss to have low communication and computation overheads. In the present paper, a scheme for authenticating multicast data applications is proposed. The proposed protocol can be viewed as an improvement of LAR protocol (proposed by R.Latif et al in Jan 2011 [1]. The modified LAR doesn't assume the group members are honest as in LAR with lower communication overhead.

  4. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  5. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  6. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  7. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.

  8. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  9. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob LØvstad

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based security is not possible. However, putting a natural constraint on the adversary, we show a non-trivial example of a protocol that can indeed be simulated.

  10. SILC-A Secured Internet Chat Protocol

    Directory of Open Access Journals (Sweden)

    ANINDITA SINHA

    2013-05-01

    Full Text Available The Secure Internet Live Conferencing (SILC protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this paper we have studied about different keys which have been used to achieve security in the SILC protocol. The main function of SILC is to achieve SECURITY which is most important in any chat protocol. We also have studied different command for communication in chat protocols.

  11. A New Evaluation Model for Security Protocols

    Directory of Open Access Journals (Sweden)

    Xuewen DONG

    2011-09-01

    Full Text Available Till today, the study of performance of security protocols of WLAN has been one of research focuses. Whereas, owing to enormous complexity and low efficiency of modeling security protocols, there has been by now no uniform method or technology that can be used generally to simulate and evaluate security protocols, and no simulation system available that can well support research on performance of security protocols. So in view of the status quo, we, in this paper, mainly propose a novel security protocol simulation architecture and a simulation extending method for simulating security protocols of WLAN, and then set up a simulation platform for modeling such protocols based on OPNET, a famous simulation software. Finally, with an instance of extending and simulating a security protocol of WLAN, the validity and the universality of the simulation architecture and the extending method as well as the feasibility and correctness of the simulation platform are demonstrated.

  12. DSTC Layering Protocols in Wireless Cooperative Networks

    CERN Document Server

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  13. Performance Evaluation of MANET Routing Protocols Based on Internet Protocols

    Directory of Open Access Journals (Sweden)

    Hilal Bello Said,

    2015-11-01

    Full Text Available The topology of mobile ad hoc network (MANET changes rapidly and unpredictably due to nodes mobility. This makes routing protocols very important to analyze so as to communicate efficiently between the wireless nodes. Another important issue in the MANET is the internet protocols IPv4 and IPV6. The former which have been conventionally in use for long and the latter which is seen as the future standard for network architecture is studied due to its improved protection and huge address space support. In this paper, performance of AODV, DYMO, OLSRv2 and OLSR are analyzed under the IPv4 and IPv6 standards using the Qualnet simulator. Distinct performance metrics viz. Packet delivery ratio, Throughput, Average End-to-End Delay, and Average jitter are selected for the experiment. The results are then analyzed and scrutinized to provide qualitative assessment of their performances.

  14. Entangled and sequential quantum protocols with dephasing

    OpenAIRE

    Boixo, Sergio; Heunen, Chris

    2011-01-01

    Sequences of commuting quantum operators can be parallelized using entanglement. This transformation is behind some optimal quantum metrology protocols and recent results on quantum circuit complexity. We show that dephasing quantum maps in arbitrary dimension can also be parallelized. This implies that for general dephasing noise the protocol with entanglement is not more fragile than the corresponding sequential protocol and, conversely, the sequential protocol is not less...

  15. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  16. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    2003-01-01

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events...

  17. Quantum bit commitment protocol without quantum memory

    OpenAIRE

    Ramos, Rubens Viana; Mendonca, Fabio Alencar

    2008-01-01

    Quantum protocols for bit commitment have been proposed and it is largely accepted that unconditionally secure quantum bit commitment is not possible; however, it can be more secure than classical bit commitment. In despite of its usefulness, quantum bit commitment protocols have not been experimentally implemented. The main reason is the fact that all proposed quantum bit commitment protocols require quantum memory. In this work, we show a quantum bit commitment protocol th...

  18. Adaptation Process for Ad hoc Routing Protocol

    OpenAIRE

    Yawut, Cholatip; Paillassa, Beatrice; Dhaou, Riadh

    2010-01-01

    Because of several constraints in ad hoc networks, an adaptive ad hoc routing protocol is increasingly required. In this paper, we propose a synopsis of an adaptation process for an adaptive ad hoc routing protocol. Next, we put into practice the analysis of the process of adaptation to mobility by realizing an adaptive routing protocol: CSR (Cluster Source Routing) which is an extension of a widely used ad hoc routing protocol: DSR (Dynamic source Routing). Mobility and density metrics are c...

  19. Modelling Attacker's Knowledge for Cascade Cryptographic Protocols

    OpenAIRE

    Benaissa, Nazim

    2008-01-01

    We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocols requires precise modelling of the attacker's knowledge. In this paper we use the event B modelling language to model the knowledge of the attacker for a class of cryptographic protocols called \\textit{cascade protocols}. The attacker's behaviour conforms to the Dolev-Yao model. In the Dolev-Yao model, the attacker...

  20. Analysis of security protocols as open systems

    OpenAIRE

    Martinelli, Fabio

    2003-01-01

    We propose a methodology for the formal analysis of security protocols. This originates from the observation that the verification of security protocols can be conveniently treated as the verification of {em open} systems, i.e. systems which may have unspecified components. These might be used to represent a hostile environment wherein the protocol runs and whose behavior cannot be predicted a priori. We define a language for the description of security protocols, namely Crypto-CCS, and a log...

  1. A father protocol for quantum broadcast channels

    OpenAIRE

    Dupuis, Frédéric; Hayden, Patrick; Li, Ke

    2006-01-01

    A new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol is presented. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted c...

  2. Efficient Transport Protocol for Networked Haptics Applications

    OpenAIRE

    Wirz, Raul; Ferre Perez, Manuel; Marin, Raul; Barrio Gragera, Jorge; Claver, Jose M.; Ortego, Javier

    2008-01-01

    The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. This paper describes a new internet protocol called Efficient Transport Protocol (ETP), which aims at developing distributed interactive applications. TCP and UDP are transport protocols commonly used in any kind of networked communication, but they are not focused on real time application. This new protocol is focuse...

  3. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the ...

  4. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    2011-01-01

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication....

  5. A New Evaluation Model for Security Protocols

    OpenAIRE

    Xuewen DONG; Ma, Jianfeng; Yang, Chao

    2011-01-01

    Till today, the study of performance of security protocols of WLAN has been one of research focuses. Whereas, owing to enormous complexity and low efficiency of modeling security protocols, there has been by now no uniform method or technology that can be used generally to simulate and evaluate security protocols, and no simulation system available that can well support research on performance of security protocols. So in view of the status quo, we, in this paper, mainly propose a novel secur...

  6. Automatic Verification of Security Protocols Using Approximations

    OpenAIRE

    Boichut, Yohan; Héam, Pierre-Cyrille; Kouchnarenko, Olga

    2005-01-01

    Security protocols are widely used in open modern networks to ensure safe communications. It is now recognized that formal analysis can provide the level of assurance required by both developers and users of the protocols. Unfortunately it is generally undecidable to certify whether a protocol is safe or not. However the automatic verification of security protocols can be attempted using abstraction-based approximation. For this purpose, tree automata approximations were introduced by Genet a...

  7. The exacerbating roles of CCAAT/enhancer-binding protein homologous protein (CHOP) in the development of bleomycin-induced pulmonary fibrosis and the preventive effects of tauroursodeoxycholic acid (TUDCA) against pulmonary fibrosis in mice.

    Science.gov (United States)

    Tanaka, Yuta; Ishitsuka, Yoichi; Hayasaka, Marina; Yamada, Yusei; Miyata, Keishi; Endo, Motoyoshi; Kondo, Yuki; Moriuchi, Hiroshi; Irikura, Mitsuru; Tanaka, Ken-Ichiro; Mizushima, Tohru; Oike, Yuichi; Irie, Tetsumi

    2015-09-01

    The purpose of this study was to evaluate the role of CCAAT/enhancer-binding protein homologous protein (CHOP), an important transcription factor that regulates the inflammatory reaction during the endoplasmic reticulum (ER) stress response, in the development of pulmonary fibrosis induced by bleomycin (BLM) in mice. An intratracheal injection of BLM transiently increased the expression of CHOP mRNA and protein in an early phase (days 1 and 3) in mice lungs. BLM-induced pulmonary fibrosis was significantly attenuated in Chop gene deficient (Chop KO) mice, compared with wild-type (WT) mice. Furthermore, the inflammatory reactions evaluated by protein concentration, the total number of leucocytes and neutrophils in the bronchoalveolar lavage fluid (BALF), the mRNA expression of interleukin 1b and caspase 11, and the apoptotic cell death were suppressed in Chop KO mice compared with those in WT mice. In addition, administration of tauroursodeoxycholic acid (TUDCA), a pharmacological agent that can inhibit CHOP expression, inhibited the BLM-induced pulmonary fibrosis and inflammation, and the increase in Chop mRNA expression in WT mice in a dose-dependent manner. These results suggest that the ER stress-induced transcription factor, CHOP, at least in part, plays an important role in the development of BLM-induced pulmonary fibrosis in mice, and that the inhibition of CHOP expression by a pharmacological agent, such as TUDCA, may be a promising strategy for the prevention of pulmonary fibrosis. PMID:26005208

  8. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  9. CDTP Chain Distributed Transfer Protocol

    CERN Document Server

    Vagner, S

    2004-01-01

    The rapid growth of the internet in general and of bandwidth capacity at internet clients in particular poses increasing computation and bandwidth demands on internet servers. Internet access technologies like ADSL [DSL], Cable Modem and Wireless modem allow internet clients to access the internet with orders of magnitude more bandwidth than using traditional modems. We present CDTP a distributed transfer protocol that allows clients to cooperate and therefore remove the strain from the internet server thus achieving much better performance than traditional transfer protocols (e.g. FTP [FTP]). The CDTP server and client tools are presented also as well as results of experiments. Finally a bandwidth measurement technique is presented. CDTP tools use this technique to differentiate between slow and fast clients.

  10. Neonatal euthanasia: The Groningen Protocol*

    Science.gov (United States)

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  11. Neonatal euthanasia: The Groningen Protocol.

    Science.gov (United States)

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  12. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  13. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero

  14. New protocol supporting collaborative simulation

    OpenAIRE

    Nguyen Trong, Khanh; Marilleau, Nicolas; Ho, Tuong Vinh; Fallah-Seghrouchni, Amal El

    2011-01-01

    Major researches in the domain of complex systems are interdisciplinary, collaborative and geographically distributed. The purpose of our work is to explore a new methodology that facilitates scientist's interactions during the simulation process. Through the analysis of the collaboration and pluridisciplinary in a simulation project, we have identified the needs of a common representation about models and simulators. Then, we provide an extension of ODD protocol including new features dedica...

  15. NCI Mouse Repository- Protocol Information

    Science.gov (United States)

    This mouse strain was produced by site directed mutagenesis of amino acid 858 of the human EGFR gene. This was followed by subsequent cloning into a vector containing the tetracycline operon (tetO) and the mouse protamine 1 poly-adenylation signal (mP1 pA). The goal of this genotyping protocol is to detect the junction between hEGFR and mP1 with primers that span that junction.

  16. Implicit Simulations using Messaging Protocols

    OpenAIRE

    Kohring, G.A.

    2002-01-01

    A novel algorithm for performing parallel, distributed computer simulations on the Internet using IP control messages is introduced. The algorithm employs carefully constructed ICMP packets which enable the required computations to be completed as part of the standard IP communication protocol. After providing a detailed description of the algorithm, experimental applications in the areas of stochastic neural networks and deterministic cellular automata are discussed. As an ...

  17. On using Mobile IP Protocols

    OpenAIRE

    Fayza A. Nada

    2006-01-01

    The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4) with its major components: agent discovery, registration and...

  18. Active Virtual Network Management Protocol

    OpenAIRE

    Bush, Stephen F.

    1999-01-01

    This paper introduces a novel algorithm, the Active Virtual Network Management Protocol (AVNMP), for predictive network management. It explains how the AVNMP facilitates the management of an active network by allowing future predicted state information within an active network to be available to network management algorithms. This is accomplished by coupling ideas from optimistic discrete event simulation with active networking. The optimistic discrete event simulation metho...

  19. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    2003-01-01

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfu...

  20. NCI Mouse Repository- Protocol Information

    Science.gov (United States)

    This strain carries a chimeric promyelocytic leukemia-retinoic acid receptor alpha transgene (PML-RARa) under the of the human cathepsin G gene. The strategy of this genotyping protocol is to detect the human cathepsin G gene with primers P005 and P006. Primers P007 and P008 are included as an internal PCR control and amplify the endogenous mouse colony stimulating factor 3 receptor gene (csf3r).

  1. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  2. Analysing ZigBee Key Establishment Protocols

    CERN Document Server

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  3. Password-Based Key Agreement Protocol

    OpenAIRE

    Chunbo Ma; Jun Ao; Jianhua Li

    2007-01-01

    In this study, we will review Kim et al.’s protocol and Lee et al.’s protocol respectively and show that their protocols are not secure as they have claimed. Then, we firstly present our improved password-based key agreement protocol based on Kim et al.’s scheme and show that it withstands password guessing attack and illegal modification. Then we propose an improved Verifier-based key agreement protocol based on Lee et al.’s scheme and demonstrate that it is secure against Stolen-verifier at...

  4. Performance Comparison of Mobile Ad Hoc Network Routing Protocol and Transmission Control Protocol

    OpenAIRE

    Akinwole A.K.; Emuoyibofarhe O. J.

    2012-01-01

    In this work the Performance Comparison of Mobile Ad Hoc Network (MANET) Routing Protocols and Transmission Control Protocol (TCP) was investigated in order to evaluate the performance of Routing Protocols (AODV, DSR and TORA) and TCP (Tahoe, Reno and New Reno). The Model that represented the hypothetical network was developed and simulated using OMNet++ 4.1. The three Routing protocols were tested upon each of the three variants of Transmission Control Protocol. End to end throughput was the...

  5. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  6. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  7. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncompromised subset of the participants are still guar- anteed that their interaction will respect sessions. A protocol transfor- mation turns any protocol into a session-respecting protocol. We do this via a general theory of separability. Our main theorem ap- plies to different separability requirements, and characterizes when we can separate protocol executions sufficiently to meet a particular require- ment. This theorem also gives direct proofs of some old and new protocol composition results. Thus, our theory of separability appears to cover protocol composition and session-like behavior within a uniform frame- work, and gives a general pattern for reasoning about independence.

  8. Analysis of protection spanning-tree protocol ?????? ???????????? spanning-tree protocol ?????? ??????????? SPANNING-TREE PROTOCOL

    Directory of Open Access Journals (Sweden)

    ?.?. ?????????

    2007-01-01

    Full Text Available

     Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

     ????????????? ???????? ?????????????? ?????????? ???????? ? ????????? ??? ???????? ????? ??????????? ? ????, ???????????? ??? ??????????. ??????? ?????????? ?????? (? ?????? ? ???????? ??????? ????????????? ????? ????????? ?????? ??????????, ? ????? ???????????????? ??????. ??????????? Spanning-Tree Protocol - ????? ?????? ????, ??? ????????? ???????????? ??????, ???????? ???? ??????-?????, ??????? ?????? ?????.

     ???????? ???????? ????????????? ?????????? ????????? ????? ?????? ??????? ????????? ???????????? ?? ????, ?? ?????????????? ?? ???????????. ???? ?????????? ?????? (?, ?????, ? ???????????? ????? ???????????? ???? ????????? ??????? ??????????, ? ????? ?????????????? ?????. ?????????? Spanning-Tree Protocol – ???????? ??????? ????, ?? ????????? ??????? ?????, ?????????? ???? ???????????, ?????????? ?????? ?????.

  9. Generalized quarantine disinfestation research protocol

    International Nuclear Information System (INIS)

    The purpose of a quarantine disinfestation treatment is to prevent the establishment of a pest associated with a commodity to be imported into a country or region where it does not already occur or where its presence is restricted. Irradiation is particularly suited to this purpose with applications over a wide range of commodities and pests. It meets the current consumer requirement of freedom from chemical residues that are associated with fumigation and insecticide treatments. Disinfestation treatments may need to gain the specific approval of quarantine authorities in each importing country. Therefore the supporting data required may differ from country to country. Such differences are usually minor and this generalised protocol will provide most of the information required by most importing countries. This protocol is intended to meet the broad quarantine treatment requirements of the following countries: Japan, USA, Australia and New Zealand. At present irradiation is likely to prove acceptable only to USA. This can be expected to change as public perception of irradiation matures and confidence develops. Additional countries for which the methodology should prove generally acceptable include the other ASEAN countries, China, Korea, Taiwan, India, South Africa and most South American and Central American countries. Signatories to GATT have agreed to abide by the principle of equivalence so there should be some flexibility in how the work is done including existing data obtained in an equivalent manner. This protocol applies particularly to pests of fresh horticultural produce that can be maintained in laboratory cultures (e.g. fruit flies and mites), but it can be adapted for use with field-collected insects provided that adequate numbers of known stages can be obtained

  10. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  11. Secure E-Commerce Protocol

    Directory of Open Access Journals (Sweden)

    Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin

    2011-04-01

    Full Text Available E-commerce has presented a new way of doing business all over the world using internet.Organizations have changed their way of doing business from a traditional approach to embrace ecommerceprocesses. As individuals and businesses increase information sharing, a concernregarding the exchange of money securely and conveniently over the internet increases. Therefore,security is a necessity in an e-commerce transaction. The purpose of this paper is to present atoken based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm thatis capable of satisfying security objectives by using token based security mechanism.

  12. Trypanosoma spp. ring test protocol

    International Nuclear Information System (INIS)

    Test material will be chosen by the coordinating lab for incorporation into a proficiency panel after repeated testing by more than one analyst on multiple PCR runs on different days. Test material: suitable test material will be provided. Protocol and laboratory procedures: Each laboratory is allowed to use their own 'in-house' test procedure (SOPs will nevertheless be provided by the respective laboratories for comparison and evaluation). Each PCR should be executed on two separate occasions. Test material used will be coded and sent as a blind panel to the participants. Each participating laboratory will be given a unique set of codes

  13. Design of Open Core Protocol

    OpenAIRE

    NayabRasool Shaik; Srikanth Pothula

    2011-01-01

    As more and more IP cores are integrated intoan SOC design, the communication flow between IP cores has increased drastically and the efficiency of the on-chip bus has become a dominant factor for the performance of a system. The on-chip bus design can be divided into two parts, namely the interface and the internal architecture of the bus. In this work we adopt the well-defined interface standard, the Open Core Protocol and focus on the design of the internal bus architecture. We develop an ...

  14. DAQ architecture and read-out protocole

    CERN Document Server

    Harris, F; Jost, B; Mato, P; Mato, Pere

    1998-01-01

    The proposed LHCb readout architecture is overviewed, followed by discussion and comparison of two candidate readout protocols, namely the 'Full Readout' and'Phased Readout' protocols.The philosophy of the Full Readout protocol is to send all of the event data to a processor before commencing the high level trigger algorithms.This results in simplicity in the protocol at the cost of the bandwidth requirement for the readout network. This is our preferred approach if the network costs are not prohibitive. Using the Phased Readout protocol the event data is sent in portions according to the demands of the trigger algorithms. This results in a more complex protocol, but in a reduction on the readout network bandwidth requirement.The effect of transmission errors on the behaviour of the system, and the implementation of system partitioning, are also discussed.1

  15. Test order effects in simultaneous protocols.

    Science.gov (United States)

    Imam, Abdulrazaq A; Warner, Timothy A

    2014-03-01

    Simultaneous protocols typically yield poorer stimulus equivalence outcomes than do other protocols commonly used in equivalence research. Two independent groups of three 3-member equivalence sets of stimuli were used in conditional discrimination procedures in two conditions, one using the standard simultaneous protocol and the other using a hybrid simultaneous training and simple-to-complex testing. Participants completed the two conditions in one long session in Experiment 1, but in separate sessions in Experiment 2. The same stimulus sets used in Experiment 1 were randomized for the two conditions in Experiment 2. Overall, accuracy was better with the hybrid than with the standard protocol in both experiments. The equivalence yield was also better under the hybrid than under the standard protocol in each experiment. The results suggest that the order of testing for emergent relations may account for the difficulty often encountered with the standard simultaneous protocol. PMID:24272620

  16. Merging Multiparty Protocols in Multiparty Choreographies

    Directory of Open Access Journals (Sweden)

    Fabrizio Montesi

    2013-02-01

    Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.

  17. Superselection rules and quantum protocols

    CERN Document Server

    Kitaev, A; Preskill, J; Kitaev, Alexei; Mayers, Dominic; Preskill, John

    2004-01-01

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system -- in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties -- by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this...

  18. Design of Open Core Protocol

    Directory of Open Access Journals (Sweden)

    NayabRasool Shaik

    2011-11-01

    Full Text Available As more and more IP cores are integrated intoan SOC design, the communication flow between IP cores has increased drastically and the efficiency of the on-chip bus has become a dominant factor for the performance of a system. The on-chip bus design can be divided into two parts, namely the interface and the internal architecture of the bus. In this work we adopt the well-defined interface standard, the Open Core Protocol and focus on the design of the internal bus architecture. We develop an efficient bus architecture to support most advanced bus functionalities defined in open core protocol , including burst transactions, lock transactions, pipelined transactions, and out-of-order transactions. We first model and design the on-chip bus with transaction level modeling for the consideration of design flexibility and fast simulation speed. We then implement the RTL models of the bus for synthesis and gate-level simulation. Experimental results show that the proposed TLM model is quite efficient for the whole system simulation and the real implementation can significantly save the communication time.

  19. A Robust Zone Disjoint Multipath Routing Protocol

    OpenAIRE

    Arvind, M; Dr. M. Sugumaran

    2011-01-01

    A new multipath routing protocol which is disjoint at the zone level is proposed. The proposed routing protocol is based on the hybrid Zone based Hierarchical Link State Routing Protocol (ZHLS). The proposed work establishes multiple zone disjoint paths between the source and the destination zones. The establishment of multiple paths between the source and the destination zones helps in increasing the network lifetime and also in reducing the network congestion and overhead. The proposed prot...

  20. Traffic Performance Analysis of MANET Routing Protocol

    OpenAIRE

    Rajeswari, S.; Venkataramani, Y.

    2011-01-01

    The primary objective of this research work is to study and investigate the performance measures of Gossip Routing protocol and Energy Efficient and Reliable Adaptive Gossip routing protocols. We use TCP and CBR based traffic models to analyze the performance of above mentioned protocols based on the parameters of Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in the simulation time and Number of nodes for the MANET r...

  1. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  2. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  3. Analysing ZigBee Key Establishment Protocols

    OpenAIRE

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Pr...

  4. Wireless sensors networks MAC protocols analysis

    OpenAIRE

    Lamia CHAARI; Lotfi KAMOUN

    2010-01-01

    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in or...

  5. Desynchronization Attacks on RFID Security Protocols

    OpenAIRE

    Miaolei Deng; Weijun Zhu

    2013-01-01

    The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These ...

  6. Inferring compact models of communication protocol entities

    OpenAIRE

    Bohlin, Therese; Jonsson, Bengt; Soleimanifard, Siavash

    2010-01-01

    Our overall goal is to support model-based approaches to verification and validation of communication protocols by techniques that automatically generate models of communication protocol entities from observations of their external behavior, using techniques based on regular inference (aka automata learning). In this paper, we address the problem that existing regular inference techniques produce "flat" state machines, whereas practically useful protocol models structure the internal state in...

  7. Hybrid Technique For Secure Sum Protocol

    OpenAIRE

    Priyanka Jangde; Gajendra Singh Chandel; Durgesh Kumar Mishra

    2011-01-01

    Secure Multiparty Computation (SMC) allows parties to compute the combine result of their individual data without revealing their data to others. Secure sum computation is one of the important tool of the SMC. On SMC many eminent researchers give their protocols especially in secure sum computation, researchers show their interest. In this paper we provide unique hybrid protocol for secure sum computation which is the combination of Ideal and Real Model. This protocol provides zero data leaka...

  8. Optimizing One Fair Document Exchange Protocol

    OpenAIRE

    Alaraj, Abdullah M.

    2012-01-01

    This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document's key. This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will be able to recover the key if the other party misbehaves. The protocol also incor...

  9. Control protocols for the UNK control system

    Energy Technology Data Exchange (ETDEWEB)

    Elin, A. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation)); Kopylov, L. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation)); Matyushin, A. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation)); Mikheev, M. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation)); Scherbakov, E. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation)); Trofimov, N. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation)); Yourpalov, V. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation)); Zelepoukin, S. (Institute for High Energy Physics, 142284 Protvino, Moscow region (Russian Federation))

    1994-12-15

    Conceptual studies on control protocols have been carried out for a few years in the framework of the CERN-IHEP collaboration on accelerator control. Generalized equipment models were used for the control protocol definition for the UNK control system. The paper presents a general approach to the implementation of the protocol adopted for the UNK control system and first results of prototyping on the UNK beam transfer line equipment. ((orig.))

  10. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    OpenAIRE

    Amit Rana; Dr. Rajender Singh Chhillar

    2012-01-01

    The Internet Engineering Task Force (IETF) has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol) [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service). The proposedprotocol - PEAP provides for ...

  11. Emission trading under the Kyoto Protocol

    OpenAIRE

    Holtsmark, Bjart; Hagem, Cathrine

    2003-01-01

    On 11 December 1997, delegates to the third conference of the Parties to the UN Framework Convention on Climate Change agreed upon the Kyoto Protocol. The protocol sets binding emission targets for developed nations (Annex B countries). The Protocol states that Annex B countries may participate in emission trading. The rules for emission trading are to be discussed at the fourth Conference of the Parties in November 1998. differentiation of targets among countries, but not in any systematic...

  12. Comparison of on Demand Routing Protocols

    OpenAIRE

    Bharat Bhushan; Shailender Gupta; C.K.Nagpal

    2013-01-01

    A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirement...

  13. The Nagoya Protocol: Fragmentation or Consolidation?

    OpenAIRE

    Carmen Richerzhagen

    2014-01-01

    In October, 2010, a protocol on access and benefit-sharing (ABS) of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conse...

  14. Privacy-Preserving Protocols for Eigenvector Computation

    OpenAIRE

    Manas A. Pathak; Raj, Bhiksha

    2010-01-01

    In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints. Our proposed protocol is based on secure multi-party computation with a semi-honest arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We augment the protocol with randomization and obfuscation to make it difficult for any party to estimate prope...

  15. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David; Procaccia, Ariel

    2013-01-01

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computational model and reasoning about the game-theoretic properties of algorithms that operate in this model. Specifically, we show that each protocol in the class of generalized cut and choose (GCC) protocol...

  16. Pneumomediastinum, subcutaneous emphysema, and pneumothorax after a pulmonary function testing in a patient with bleomycin-induced interstitial pneumonitis / Pneumomediastino, enfisema subcutâneo e pneumotórax após prova de função pulmonar em paciente com pneumopatia intersticial por bleomicina

    Scientific Electronic Library Online (English)

    Mariana Sponholz, Araujo; Frederico Leon Arrabal, Fernandes; Fernando Uliana, Kay; Carlos Roberto Ribeiro, Carvalho.

    2013-09-01

    Full Text Available O pneumomediastino espontâneo é um evento incomum, cujo quadro clínico inclui dor pleurítica retroesternal, enfisema subcutâneo, dispneia e disfonia. O mecanismo fisiopatológico implicado é o surgimento de uma diferença de pressão entre os alvéolos e estruturas adjacentes, ocasionando ruptura alveol [...] ar com posterior dissecção da bainha peribroncovascular e infiltração do mediastino e do tecido subcutâneo pelo ar. Desencadeantes conhecidos incluem exacerbação aguda de asma e situações que exigem a realização de manobra de Valsava. Descrevemos e documentamos por imagens tomográficas a ocorrência de pneumomediastino após a realização de prova de função pulmonar em um paciente com pneumopatia intersticial induzida por bleomicina. Apesar de incomum, a associação entre provas de função pulmonar e síndromes de vazamento de ar tem sido relatada cada vez mais na literatura, e doenças pulmonares, como as pneumopatias intersticiais, contemplam alterações estruturais que facilitam a ocorrência da complicação. Abstract in english Spontaneous pneumomediastinum is an uncommon event, the clinical picture of which includes retrosternal chest pain, subcutaneous emphysema, dyspnea, and dysphonia. The pathophysiological mechanism involved is the emergence of a pressure gradient between the alveoli and surrounding structures, causin [...] g alveolar rupture with subsequent dissection of the peribronchovascular sheath and infiltration of the mediastinum and subcutaneous tissue with air. Known triggers include acute exacerbations of asthma and situations that require the Valsalva maneuver. We described and documented with HRCT scans the occurrence of pneumomediastinum after a patient with bleomycin-induced interstitial lung disease underwent pulmonary function testing. Although uncommon, the association between pulmonary function testing and air leak syndromes has been increasingly reported in the literature, and lung diseases, such as interstitial lung diseases, include structural changes that facilitate the occurrence of this complication.

  17. Modularizing and Specifying Protocols among Threads

    Directory of Open Access Journals (Sweden)

    Farhad Arbab

    2013-02-01

    Full Text Available We identify three problems with current techniques for implementing protocols among threads, which complicate and impair the scalability of multicore software development: implementing synchronization, implementing coordination, and modularizing protocols. To mend these deficiencies, we argue for the use of domain-specific languages (DSL based on existing models of concurrency. To demonstrate the feasibility of this proposal, we explain how to use the model of concurrency Reo as a high-level protocol DSL, which offers appropriate abstractions and a natural separation of protocols and computations. We describe a Reo-to-Java compiler and illustrate its use through examples.

  18. Traffic Performance Analysis of Manet Routing Protocol

    CERN Document Server

    Rajeswari, S; 10.5121/ijdps.2011.2306

    2011-01-01

    The primary objective of this research work is to study and investigate the performance measures of Gossip Routing protocol and Energy Efficient and Reliable Adaptive Gossip routing protocols. We use TCP and CBR based traffic models to analyze the performance of above mentioned protocols based on the parameters of Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in the simulation time and Number of nodes for the MANET routing protocols. For Simulation, we have used ns-2 simulator.

  19. Entangled and sequential quantum protocols with dephasing

    CERN Document Server

    Boixo, Sergio

    2011-01-01

    Sequences of commuting quantum operators can be parallelized using entanglement. This transformation is behind some optimal quantum metrology protocols and recent results on quantum circuit complexity. We show that dephasing quantum maps in arbitrary dimension can also be parallelized. This implies that for general dephasing noise the protocol with entanglement is not more fragile than the corresponding sequential protocol and, conversely, the sequential protocol is not less effective than the entangled one. We derive this result diagrammatically, in the language of string diagrams in dagger compact closed categories. Therefore, it applies verbatim to other theories.

  20. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  1. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    2006-01-01

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what...

  2. Wireless sensors networks MAC protocols analysis

    CERN Document Server

    Chaari, Lamia

    2010-01-01

    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in order to categorize them and to compare their performances. Furthermore we have implemented some of WSN MAC protocol under OMNET++ with the purpose to evaluate their performances.

  3. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  4. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  5. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  6. A Survey On Mac Protocols For Wireless Multimedia Networks

    OpenAIRE

    Subba Rao, S.P.V; S. Venkata Chalam; D. Sreenivasa RAO

    2011-01-01

    This article presents a survey on medium access control protocols for wireless multimedia networks. Abasic overview of MAC protocol concepts is presented, and a framework is developed for comparisons.The MAC protocols covered in this article include Random Access protocols, Contention less protocols,TDMA CDMA, third-generation WCDMA schemes and Hybrid protocols proposed for wirelessMultimedia Networks. The operation of each protocol is explained, and its advantages and disadvantagesare presen...

  7. A Method of Proactive MANET Routing Protocol Evaluation Applied to the OLSR Protocol

    OpenAIRE

    DA SILVA, LUIZ

    2011-01-01

    Traditional evaluation studies of MANET routing protocols have concentrated on quantitative, traffic-based metrics like throughput and packet loss. These metrics provide a lim- ited evaluation of protocol performance because they do not measure how well the protocol finds and maintains routes, only how well functional routes perform, once established. This work proposes a method for assessing how well a proac- tive MANET routing protocol tracks the network topology by ...

  8. Design and Validation of a Reliable Rate Based Transport Protocol: The Chameleon Protocol

    OpenAIRE

    Lochin, Emmanuel; Jourjon, Guillaume; Ardon, Sebastien

    2009-01-01

    TFRC protocol has not been designed to enable reliability. Indeed, the birth of TFRC results from the need of a congestion controlled and realtime transport protocol in order to carry multimedia traffic. Historically, and following the anarchical deployment of congestion control mechanisms implemented on top of UDP protocol, the IETF decided to standardize such protocol in order to provide to multimedia applications developers a framework for their applications. In this paper, we propose to d...

  9. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  10. E-Cash Payment Protocols

    Directory of Open Access Journals (Sweden)

    Shweta Srivastava

    2012-09-01

    Full Text Available E-cash is a payment system designed and implemented for making purchases over open networks such as the Internet. Need of a payment system which enables the electronic transactions are growing at the same time that the use of Internet is growing in our daily life. Present days electronic payment systems have a major problem, they cannot handle the security and the users anonymity and at the same time these systems are secure on the cost of their users anonymity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be formed by presenting a few of the present days digital cash systems in details. We also provide a comparison and determine them together to see which one of them fulfils the properties for digital cash and the required security level.

  11. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols.

  12. Brain Connectivity and Neuropsychological Functioning in Recently Treated Testicular Cancer Patients

    DEFF Research Database (Denmark)

    Amidi, Ali; Agerbæk, Mads

    Objective Treatment with the combined cytostatic regimens of bleomycin, etoposide, and cisplatin (BEP) has dramatically reduced the mortality rate in testicular cancer (TC). However, evidence suggests that the use of chemotherapy (CT) may be associated with reduced brain connectivity and impaired neuropsychological functioning. Cisplatin-based chemotherapy has well-known neurotoxic side effects and neural populations such as progenitor cells, oligodendrocytes, and hippocampal neurons are exceptionally vulnerable to even small concentrations of cisplatin. The aim of the present study was to investigate the possible adverse effects of BEP on brain white matter connectivity and neuropsychological functioning in recently treated men with TC.

  13. Triangle of Dualities between Quantum Communication Protocols

    Science.gov (United States)

    Devetak, I.

    2006-10-01

    We show that three quantum communication protocols—the “feedback father,” “fully quantum reverse Shannon,” and “fully quantum Slepian-Wolf” protocols—are pairwise related by three different dualities—the resource-reversal, time-reversal, and source-channel dualities.

  14. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  15. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  16. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  17. A simple quantum oblivious transfer protocol

    CERN Document Server

    Ardehali, M

    1995-01-01

    We describe an efficient and simple protocol for quantum oblivious transfer. This protocol can easily be implemented with present technology and is secure against cheaters with unlimited computing power provided they can not store the particles (electrons or photons) for an arbitrarily long period of time.

  18. Secure Geographic Routing Protocols: Issues and Approaches

    Directory of Open Access Journals (Sweden)

    Mehdi sookhak

    2011-09-01

    Full Text Available In the years, routing protocols in wireless sensor networks (WSN have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN and also provide a qualitative comparison of them.

  19. (Approximately) Privacy-Preserving Dissection Protocols

    CERN Document Server

    Comi, Marco; Schapira, Michael; Srinivasan, Venkatakumar

    2011-01-01

    We further investigate the approximate privacy model recently introduced by Feigenbaum et al. We explore the privacy properties of a natural class of communication protocols that we refer to as "dissection protocols". Under a dissection protocol, the communicating parties are restricted to answering questions of the form "Is your input between the values a and b (under a natural order over possible inputs)?". We prove that for a large class of functions, called tiling functions, there always exists a dissection protocol that provides a constant average privacy approximation ratio and that this protocol involves a number of communication rounds that is linear in the number of monochromatic regions of the function. To establish this result we present an interesting connection between the approximate privacy framework and some basic concepts in computational geometry. We show that such a good privacy approximation ratio for tiling functions does not exist in the worst case. We also discuss extensions of the basi...

  20. Experimental requirements for quantum communication complexity protocols

    CERN Document Server

    Galvão, E F

    2000-01-01

    I present a simple two-party quantum communication complexity protocol with higher success rate than the best possible classical protocol for the same task. The quantum protocol is shown to be equivalent to a quantum non-locality test, except that it is not necessary to close the locality loophole. I derive bounds for the detector efficiency and background count rates necessary for an experimental implementation and show that they are close to what can be currently achieved using ion trap technology. I also analyze the requirements for a three-party protocol and show that they are less demanding than those for the two-party protocol. The results can be interpreted as sufficient experimental conditions for quantum non-locality tests using two or three entangled qubits.

  1. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  2. RFID Tag Ownership Transfer Protocol with Backtracking Authorization Ability

    OpenAIRE

    He Lei; Gan Yong; Yin Yi-feng

    2013-01-01

    It was proposed an ownership transfer protocol with backtracking authorization ability to transfer tag ownership among different owners. The protocol is divided into two sub-protocols, ownership transfer sub-protocol and backtracking authorization sub-protocol. The former provides mutual authentication and key update to transfer ownership among different owners. The latter provides limited authorization of tag to old owner. The security of our protocol was ...

  3. A Cryptographic Moving-Knife Cake-Cutting Protocol

    OpenAIRE

    Yoshifumi Manabe; Tatsuaki Okamoto

    2012-01-01

    This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using...

  4. Authentication and Key Agreement Protocols Preserving Anonymity

    Directory of Open Access Journals (Sweden)

    Kumar V. Mangipudi

    2006-11-01

    Full Text Available Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA protocols: the AKA protocol with user anonymity (UAP and the AKA protocol with user and server anonymity (USAP. The proposed protocols have the following advantages: first of all, they preserve anonymity, which is a security feature that was ignored in most of the previously proposed AKA protocols; secondly, they exploit the difference in capabilities between resource constrained clients and highly resourceful servers and thus are suitable for wireless applications; thirdly, they resist known attacks; and finally, they perform better in terms of the number of messages and bits exchanged and computing time as compared to the previously proposed AKA protocols. For example, USAP preserves user and server anonymity, exchanges 3 messages with 1920 bits in total, and requires only 280 msec of processing time on the user side when implemented on Mitsubishis M16C microprocessor. Similarly, the UAP is scalable, preserves user anonymity, requires 440 msec, and exchanges 2560 bits.

  5. Analysis on the Performance of Wireless Protocols

    Directory of Open Access Journals (Sweden)

    A. Malathi

    2013-12-01

    Full Text Available In this paper by concentrating on various wireless technologies like Bluetooth (802.15.1, Ultra wide band (802.15.3 , ZigBee (802.15.4 and Wi-Fi(802.11, their performance was analyzed based on the area of coverage and the data transfer error control mechanism and data error rates ,the frequency range of each wireless protocols and by comparing each with the other protocols, defining a performance report that helps us to implement the appropriate protocol for the differentiated network models. All the above stated wireless protocols are used in the short range communication systems. By concentrating on the various parameters involved in the Wireless protocols data transfer mechanism, we can define the data transfer methodology, mechanism and power consumed by implementing each protocols and the complexity nature occurs in the data transfer mechanism, data carrying potency are measured using various real time network models. Finally one can pick up an appropriate protocol for wireless data transfer based on their network area and the application for which they going to implement.

  6. The Development of Korea Additional Protocol System

    Energy Technology Data Exchange (ETDEWEB)

    Shim, Hye Won; Yeo, Jin Kyun [Korea Institute of nuclear non-proliferation and control (Korea, Republic of)

    2008-10-15

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility.

  7. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis

    2013-01-01

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computational model and reasoning about the game-theoretic properties of algorithms that operate in this model. Specifically, we show that each protocol in the class of generalized cut and choose (GCC) protocols — which includes the most important discrete cake cutting protocols — is guaranteed to have approximate subgame perfect N ash equilibria. Moreover, we observe that the (approximate) equilibria of proportional protocols — which guarantee each of the n agents a 1/n-fraction of the cake — must be (approximately) proportional, and design a GCC protocol where all Nash equilibrium outcomes satisfy the stronger fairness notion of envy-freeness. Finally, we show that under an obliviousness restriction, which still allows the computation of approximately envy-free allocations, GCC protocols are guaranteed to have exact subgame perfect Nash equilibria

  8. Efficient Privacy Preserving Protocols for Similarity Join

    Directory of Open Access Journals (Sweden)

    Bilal Hawashin

    2012-04-01

    Full Text Available During the similarity join process, one or more sources may not allow sharing its data with other sources. In this case, a privacy preserving similarity join is required. We showed in our previous work [4] that using long attributes, such as paper abstracts, movie summaries, product descriptions, and user feedbacks, could improve the similarity join accuracy using supervised learning. However, the existing secure protocols for similarity join methods can not be used to join sources using these long attributes. Moreover, the majority of the existing privacy?preserving protocols do not consider the semantic similarities during the similarity join process. In this paper, we introduce a secure efficient protocol to semantically join sources when the join attributes are long attributes. We provide two secure protocols for both scenarios when a training set exists and when there is no available training set. Furthermore, we introduced the multi?label supervised secure protocol and the expandable supervised secure protocol. Results show that our protocols can efficiently join sources using the long attributes by considering the semantic relationships among the long string values. Therefore, it improves the overall secure similarity join performance.

  9. A Review of Fair Exchange Protocols

    Directory of Open Access Journals (Sweden)

    Abdullah AlOtaibi

    2012-08-01

    Full Text Available Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we review these protocols in detail. In addition, we present a survey of three fair exchange protocols based on online TTP from different application areas. In particular, we review these protocols with regard to certain properties, namely, fairness, correctness of product, customer's anonymity, timeliness and channel requirement.

  10. Performance Analysis of Protocols RIP & EIGRP

    Directory of Open Access Journals (Sweden)

    Jeevan Prasad Adhikari,

    2013-04-01

    Full Text Available The Routing Information Protocol (RIP is one of the Internet's first widely used routing protocol. It is still useful in local and medium area networks. RIP is classified as a distance-vector routing protocol, which employs the hop count as a routing metric, The maximum number of hops allowed for RIP is 15[3]. A hop count of 16 is considered an infinite distance viewing such distance as unreachable and undesirable route in it routing process. This hop count limits the size of network that RIP operate. EIGRP is a Cisco-proprietary routing protocol that is based on IGRP. EIGRP supports CIDR and VLSM, allowing network designers to maximize address space. EIGRP is often described as a hybrid routing protocol that offers the best of distance vector and link-state algorithms. EIGRP is an advanced routing protocol that relies on features commonly associated with link-state protocols. This paper consist of comparisons of RIP and EIGRP, it includes the various trouble resolving techniques and traffic handling techniques during communication in simple as well in bulky networks[5].

  11. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  12. A Survey On Mac Protocols For Wireless Multimedia Networks

    Directory of Open Access Journals (Sweden)

    S.P.V.Subba Rao

    2011-12-01

    Full Text Available This article presents a survey on medium access control protocols for wireless multimedia networks. Abasic overview of MAC protocol concepts is presented, and a framework is developed for comparisons.The MAC protocols covered in this article include Random Access protocols, Contention less protocols,TDMA CDMA, third-generation WCDMA schemes and Hybrid protocols proposed for wirelessMultimedia Networks. The operation of each protocol is explained, and its advantages and disadvantagesare presented. Finally, a qualitative comparative outline of the discussed protocols is provided.

  13. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log2(4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  14. CAN Protocol for dtuSAT2

    OpenAIRE

    Ravnholt, Kristoffer

    2008-01-01

    The title of my examination is ¨CAN Protocol¨ . The final result of this 16weeks examination would be suitable for the department¨Information and Mathematic Modelling¨at Technical University of Denmark¨ . The project is a part of the dtuSat2 project which goal is to send a satellite into space. Here are the planning for the 16 weeks consists 3 parts. • Part 1. Design the protocol • Part 2. Implement the Single threaded version of the protocol • Part 3. Implement the Multi th...

  15. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components to...

  16. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of the protocol. All of this holds hope for what, perhaps, matters most, that the protocol will enter into force within a relatively short period of time. Now that the Vienna Convention has been revised, it is to be expected that, on the one hand, there will be accessions to the revised Vienna Convention by further states, chiefly those which have so far steered clear of its liability regime precisely because of its insufficiencies, and, on the other hand, the present States Party to the Vienna Convention will ratify the protocol or accede to it, thereby causing the 1963 Vienna Convention to eventually lose its effect

  17. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  18. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  19. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ? Two protocols for deterministic secure quantum communication (DSQC) are proposed. ? One of the above protocols is maximally efficient. ? It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ? It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ? Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  20. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modi?cation. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the in?uence of the modi?cation of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol ef?ciency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  1. Performance of coopMAC Protocols over CSMA/CA 802.11 protocols

    Directory of Open Access Journals (Sweden)

    H.Srikanth.Kamath

    2013-06-01

    Full Text Available Wireless communication is very fast becoming the most frequently used form of communication. Ad-Hoc networks can be easily set up anywhere without any infrastructure cost and its mobility adds to its advantage. Hence with increase in its demand the quality of the setup comes under scrutiny, hence calling for its development. This paper presents the concept of Cooperative MAC protocols. Cooperative MAC protocols are found to be more efficient over 802.11 MAC protocols and improve the network performance substantially. Comparison of 802.11 MAC protocols and CoopMAC protocols on NS2 platform is carried out and successfully proved that cooperative MAC protocols offer much higher throughput.

  2. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  3. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  4. Asymmetric Cipher Protocol Using Decomposition Problem

    OpenAIRE

    Raulynaitis, Andrius; Japertas, Saulius

    2008-01-01

    The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security parameters are defined and preliminary security analysis is presented.

  5. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  6. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  7. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  8. Using Image Attributes for Human Identification Protocols

    CERN Document Server

    Jameel, Hassan; Lee, Sungyoung

    2007-01-01

    A secure human identification protocol aims at authenticating human users to a remote server when even the users' inputs are not hidden from an adversary. Recently, the authors proposed a human identification protocol in the RSA Conference 2007, which is loosely based on the ability of humans to efficiently process an image. The advantage being that an automated adversary is not effective in attacking the protocol without human assistance. This paper extends that work by trying to solve some of the open problems. First, we analyze the complexity of defeating the proposed protocols by quantifying the workload of a human adversary. Secondly, we propose a new construction based on textual CAPTCHAs (Reverse Turing Tests) in order to make the generation of automated challenges easier. We also present a brief experiment involving real human users to find out the number of possible attributes in a given image and give some guidelines for the selection of challenge questions based on the results. Finally, we analyze ...

  9. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  10. Authentication Protocol Using Quantum Superposition States

    Directory of Open Access Journals (Sweden)

    Yoshito Kanamori

    2009-09-01

    Full Text Available When it became known that quantum computers could break the RSA (named for its creators -- Rivest, Shamir, and Adleman encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  11. How To Develop Survey Protocols: A Handbook

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...

  12. Enhanced Prolog Remote Predicate Call Protocol

    CERN Document Server

    Suciu, A; Diaconu, A; Suciu, Alin; Pusztai, Kalman; Diaconu, Andrei

    2006-01-01

    Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC). The Prolog RPC protocol facilitates the integration of Prolog code in multi-language applications as well as the development of distributed intelligent applications. One use of the protocol's most important uses could be the development of distributed applications that use Prolog at least partially to achieve their goals. Most notably the Distributed Artificial Intelligence (DAI) applications that are suitable for logic programming can profit from the use of the protocol. After proving its usefulness, we went further, developing a new version of the protocol, making it more reliable and extending its functionality. Because it has a new syntax and the new set of commands, we call this version Enhanced Prolog Remote Procedure Call. This paper describes the new features and modifications this second version introduced.

  13. Cryptanalysis of Two RFID Authentication Protocols

    Directory of Open Access Journals (Sweden)

    Tianjie Cao

    2009-07-01

    Full Text Available Radio frequency identi¯cation (RFID technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protocol cannot resist replay attacks, and therefore an adversary can impersonate a legal tag. Next, we present a full-disclosure attack on the CWH protocol. By sending malicious queries to a tag and collecting the response messages emitted by the tag, the full-disclosure attack allows an adversary to extract the secret information from the tag.

  14. A Protocol for Messaging to Extraterrestrial Intelligence

    CERN Document Server

    Atri, Dimitra; Haqq-Misra, Jacob

    2011-01-01

    Messaging to extraterrestrial intelligence (METI) is a branch of study concerned with constructing and broadcasting a message toward habitable planets. Since the Arecibo message of 1974, the handful of METI broadcasts have increased in content and complexity, but the lack of an established protocol has produced unorganized or cryptic messages that could be difficult to interpret. Here we outline the development of a self-consistent protocol for messaging to extraterrestrial intelligence that provides constraints and guidelines for the construction of a message in order to maximize the probability that the message effectively communicates. A METI protocol considers several factors including signal encoding, message length, information content, anthropocentrism, transmission method, and transmission periodicity. Once developed, the protocol will be released for testing on different human groups worldwide and across cultural boundaries. An effective message to extraterrestrials should at least be understandable ...

  15. A Secure DSDV Protocol for Manets

    Directory of Open Access Journals (Sweden)

    M.Kalavathi

    2013-05-01

    Full Text Available This paper presents a secure destination-sequenced distance-vector routing protocol (SDSDV for ad hoc mobile wireless networks. The proposed protocol is based on the regular DSDV protocol. Within SDSDV, each node maintains two one-way hash chains about each node in the network. Two additional fields, which we call AL (alteration field and AC (accumulation field, are added to each entry of the update packets to carry the hash values. With proper use of the elements of the hash chains, the sequence number and the metric values on a route can be protected from being arbitrarily tampered. In comparison with the secure efficient distance vector (SEAD protocol previously proposed in the literature provides only lower bound protection on the metrics, SDSDV can provide complete protection.

  16. A TRAINING BASED TRANSMISSION PERIOD SETTING PROTOCOL

    Directory of Open Access Journals (Sweden)

    Guangri Jin

    2011-01-01

    Full Text Available We have proposed Intermittent Periodic Tra nsmission (IPT forwarding as packet relay method for wireless backhaul. In IPT forwarding, a source node sends packets to a destination node with a certain time interval (IPT duration so that signal interference between relay nodes that send packets simultaneously are reduced and frequency reuse is realized, which brings about an improvement of system through put. However, the optimum IPT duration setting for each node is a difficult problem which was not solved adequately paper, we propose a new training based duration setting protocol which employs some training packets to search optimum IPT durations for each node. also extend the proposed protocol for wireless backhauls applying antennas. The proposed protocol ated both with computer simulation experiments. Evaluation results show that the proposed protocol is not only very effective but also practical.

  17. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols used in real systems. Our results show that network coding achieves 100% reliability, even for hostile network conditions, while gathering data 10 times faster than standard master-slave schemes.

  18. Rethinking low extra delay background transport protocols

    CERN Document Server

    Carofiglio, Giovanna; Rossi, Dario; Testa, Claudio; Valenti, Silvio

    2010-01-01

    BitTorrent has recently introduced LEDBAT, a novel application-layer congestion control protocol for data exchange. The protocol design starts from the assumption that network bottlenecks are at the access of the network, and that thus user traffic competes creating self-inducing congestion. To relieve from this phenomenon, LEDBAT is designed to quickly infer that self-induced congestion is approaching (by detecting relative changes of the one-way delay in the transmission path), and to react by reducing the sending rate prior that congestion occurs. Prior work has however shown LEDBAT to be affected by a latecomer advantage, where newly arriving connections can starve already existing flows. In this work, we propose modifications to the congestion window update mechanism of the LEDBAT protocol that aim at solving this issue, guaranteeing thus intra-protocol fairness and efficiency. Closed-form expressions for the stationary throughput and queue occupancy are provided via a fluid model, whose accuracy is conf...

  19. Modularizing and Specifying Protocols among Threads

    OpenAIRE

    Farhad Arbab; Sung-Shik T.Q. Jongmans

    2013-01-01

    We identify three problems with current techniques for implementing protocols among threads, which complicate and impair the scalability of multicore software development: implementing synchronization, implementing coordination, and modularizing protocols. To mend these deficiencies, we argue for the use of domain-specific languages (DSL) based on existing models of concurrency. To demonstrate the feasibility of this proposal, we explain how to use the model of concurrency R...

  20. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient ...

  1. Robust Routing Protocol For Digital Messages

    Science.gov (United States)

    Marvit, Maclen

    1994-01-01

    Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.

  2. Probabilistic Model--Checking of Quantum Protocols

    OpenAIRE

    Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While cur...

  3. PERFORMANCE VALUATION OF REACTIVE ROUTING PROTOCOLS

    OpenAIRE

    Ajay Kumar; . Deepak Sharma,; Sunil Kumar; Suneet Shukla

    2013-01-01

    Ad-Hoc Networks are the collection of wireless nodes that can exchange information dynamically among them without pre-fixed infrastructure. Because of highly dynamic in nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing capability and limited memory resources. Other than efficient routing, efficient utilization of battery capacity and Security are also the major concern for ...

  4. Audit of compliance with antenatal protocols.

    OpenAIRE

    Yoong, A. F.; Lim, J.; Hudson, C N; Chard, T.

    1992-01-01

    OBJECTIVE--To assess the implementation of action protocols dictated by antenatal risk factors noted at the initial (booking) antenatal visit. DESIGN--Retrospective study of 2000 women delivered between 1 March 1990 and 29 March 1991. SETTING--Maternity department of a district general hospital supporting a multiethnic population in inner London. MAIN OUTCOME MEASURES--Comparison of clinical actions performed against those dictated by the department's protocols. Analysis according to clinical...

  5. A Secure Mobile IP Registration Protocol

    OpenAIRE

    Cheng-Yeh Shiu; Cheng-Ying Yang

    2005-01-01

    The wireless network develop is support mobility within the Internet at presently. The mobile Internet use Mobile IP technologies in the wireless Internet. This paper is concerned with the security aspect of the registration protocol in Mobile IP. In this paper we publish a new method use the secure-key combine minimal public-key besides produce the communication session key in mobile node registration protocol. The all communication message are encrypt in our propose method. An easy and fast...

  6. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick; Nistor, Maricica; Barros, João

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of ou...

  7. Hybrid long-distance entanglement distribution protocol

    DEFF Research Database (Denmark)

    Brask, Jonatan Bohr; Rigas, I.; Polzik, Eugene Simon; Ansersen, U. L.; Sørensen, Anders Søndberg

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements. Udgivelsesdato...

  8. A Hierarchical Component Model with Interaction Protocols

    OpenAIRE

    Pavel, Sebastien

    2008-01-01

    The component-based Software Engineering (CBSE) represents an important trend in the development of software architectures. The components are the core of the software applications and the recent efforts concentrate on conceiving component models integrating important properties as for example explicit interaction protocols. Interaction protocols allow a component to publish its behavior in terms of message emission and receipt. Thus, component assemblages can be more effective than in the tr...

  9. Cryptanalysis of the RSA-CEGD protocol

    CERN Document Server

    Tapiador, Juan M E; Hernandez-Castro, Julio C; Ribagorda, Arturo

    2008-01-01

    Recently, Nenadi\\'c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encrypted signatures (VRES) to guarantee properties such as strong fairness and non-repudiation, among others. In this paper, we demonstrate how this protocol cannot achieve fairness by presenting a severe attack and also pointing out some other weaknesses.

  10. Computationally Sound Compositional Logic for Security Protocols

    OpenAIRE

    Datta, Anupam; Derek, Ante; Mitchell, John C.; Roy, Arnab; Shmatikov, Vitaly; Turuani, Mathieu; Warinschi, Bogdan

    2006-01-01

    We have been developing a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the actions of a malicious attacker. The approach rests on a probabilistic, polynomial-time semantics for a protocol security logic that was originally developed using nondeterministic symbolic semantics. This workshop presentation will discuss ways in which the computational semantics lead to different reasoning meth...

  11. Deterministic six states protocol for quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Shaari, J.S. [Faculty of Science, International Islamic University of Malaysia (IIUM), Jalan Gombak, 53100 Kuala Lumpur (Malaysia)]. E-mail: jesni_shamsul@yahoo.com; Lucamarini, M. [Cyberspace Security Laboratory, MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur (Malaysia); Wahiddin, M.R.B. [Faculty of Science, International Islamic University of Malaysia (IIUM), Jalan Gombak, 53100 Kuala Lumpur (Malaysia); Cyberspace Security Laboratory, MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur (Malaysia)

    2006-10-09

    We consider a two-way deterministic protocol for quantum communication using six mutually unbiased states in the Poincare sphere. The logical information is encoded by flip or not-flip operations on the states. Despite the nonexistence of a universal flip gate the protocol saturates the bound of a unitary efficiency. Three eavesdropping strategies are analyzed suggesting better probabilities of detecting an unauthorized adversary.

  12. Méthodes algorithmiques de vérification des protocoles cryptographiques

    OpenAIRE

    Lazar (Bozga), Liana

    2004-01-01

    Les protocoles cryptographiques jouent un rôle majeur dans les applications ou l'intégrité des données, la confidentialité, l'authenticité et autres propriétés sont essentielles. Ils sont utilisés par exemple dans le commerce électronique, la téléphonie mobile, le vote électronique. Dans la première partie de la thèse nous montrons que le problème d'atteignabilité pour des protocoles cryptographiques temporisés bornés est décidable est NP-complet. Notre procédure se base sur une logique de Ho...

  13. Noise Analysis for two Quantum Cryptography Protocols

    OpenAIRE

    Chitikela, Sindhu

    2012-01-01

    This paper presents noise analysis for the two-stage and the three-stage quantum cryptographic protocols based on random polarization rotations. The noise model used is that of uniform distribution of error over a certain small range that is associated with each link without regard for the source of the error. The noise in different links is taken to be independent. Advantages of the use of these protocols in low intensity laser systems are given.

  14. Secure Key Management Protocol in WIMAX

    OpenAIRE

    Noudjoud Kahya; Nacira Ghoualmi; Pascal Lafourcade

    2012-01-01

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS) to Subscriber Station (SS). In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. ...

  15. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  16. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of dis...

  17. Stable and Secure AODV protocol for MANET

    OpenAIRE

    A.Ravali; Suresh Babu, K

    2013-01-01

    This paper presents a new Stable and Secure Routing Strategy for AODV protocol. This has been designed to overcome the flaws in basic AODV protocol. The proposed scheme is based on modifications to existing AODV. Two parameters have been used, one for stability and other for security. Security has been achieved using one-way hash chains and stability by using Hello packets. Thus this strategy ensures stable and secure routing over the MANET.

  18. Stable and Secure AODV protocol for MANET

    Directory of Open Access Journals (Sweden)

    A.Ravali

    2013-05-01

    Full Text Available This paper presents a new Stable and Secure Routing Strategy for AODV protocol. This has been designed to overcome the flaws in basic AODV protocol. The proposed scheme is based on modifications to existing AODV. Two parameters have been used, one for stability and other for security. Security has been achieved using one-way hash chains and stability by using Hello packets. Thus this strategy ensures stable and secure routing over the MANET.

  19. Framework Design of Secure Cloud Transmission Protocol

    OpenAIRE

    Dinesha H A; V.K Agrwal

    2013-01-01

    Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, we propose secure cloud transmission protocol design. This framework design details will help us in developing a secure protocol for the customers who...

  20. A Noval Approach on Online Transaction Protocols

    OpenAIRE

    Renu; Ritu

    2014-01-01

    The increase of wireless devices, offering connectivity and convenience, continues to exert marvelous demands on merchants to deploy secure wireless applications including electronic commerce. Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect user’s privacy when they sending data from a client side to a web server, this is an important protocol due to the expansion of Internet. In fact, it is a long way to make the SSL/TL...

  1. RFID Authentification Protocols using Symmetric Cryptography

    OpenAIRE

    Song, Boyeon

    2010-01-01

    Radio Frequency IDentification (RFID) is emerging in a variety of applications as an important technology for identifying and tracking goods and assets. The spread of RFID technology, however, also gives rise to significant user privacy and security issues. One possible solution to these challenges is the use of a privacy-enhancing cryptographic protocol to protect RFID communications. This thesis considers RFID authentication protocols that make use of symmetric cryp...

  2. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.; Andersen, Ulrik Lund; Sorensen, A.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.

  3. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  4. Specifying Dynamic Routing Protocol in a Form of CPN

    OpenAIRE

    Litvin, Dmitry

    2010-01-01

    BGP-E6 dynamic routing protocol is developed for autonomous systems and back-bone networks based on innovative E6 protocol stack. Base algorithms specifications are presented in a form of Colored Petri Nets. Simulation of the model proves the protocol’s correctness.

  5. A Password attack on S-3 PAKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2012-01-01

    Recently Chung et al proposed three party authenticated key exchange protocol. Lo et al demonstrated that Chung et al protocol is vulnerable to undetectable online dictionary attack and proposed a modified protocol. Unfortunately, this paper shows that Lo et al protocol is not secure and suffers from undetectable online password guessing attack.

  6. Protocol Materials: Training Materials for Uniting Theory and Practice.

    Science.gov (United States)

    Burdin, Joel L., Comp.; Cruickshank, Donald R., Comp.

    This publication brings together seven papers by writers who have been extensively involved in the preparation and use of protocol materials in teacher education. These papers are: (a) Protocol Materials: Historical Notes on Protocols Development, by Doris V. Gunderson; (b) The Protocol Materials Movement: An Exemplar of Efforts To Wed Theory and…

  7. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  8. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  9. An Integrated Hierarchical Dynamic Quantum Secret Sharing Protocol

    Science.gov (United States)

    Mishra, Sandeep; Shukla, Chitra; Pathak, Anirban; Srikanth, R.; Venugopalan, Anu

    2015-09-01

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  10. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  11. Adenosine stress protocols for nuclear cardiology imaging

    International Nuclear Information System (INIS)

    The treadmill test combined with myocardial perfusion imaging (MPI) is a commonly used technique in the assessment of coronary artery disease (CAD). However, there is a group of patients who may not be able to undergo the treadmill test. Pharmacologic stress testing is increasingly utilized for stress perfusion imaging and currently accounts for nearly 40% of all nuclear stress testing. The aim of this study was the introduction of adenosine stress in our nuclear laboratory, and the following, recording and comparing of the frequency and severity of side effects. Methods: We performed two kinds of adenosine stress protocols on 186 patients who underwent MPI with radiotracer 99mTc-sestamibi: 1st:47 patients underwent AdenoSCAN abbreviated protocol IV. adenosine 140?g/kg/min for 3 minutes; 2nd: AdenoEX combined with low level 50W bicycle exercise in 139 patients. We followed and compared side-effects (minor and major events) between AdenoSCAN and AdenoEX protocol, and established an adequate time for imaging of boot protocols. Results: Compared with AdenoSCAN, AdenoEX protocol was tolerated by all patients; it reduced all side effects and improved image quality. Using AdenoEX protocol we fount that the heart-to-liver ratio was significantly better, and we established a time of imaging of 15 minutes after stress, compared to the AdenoSCAN time of imaging was a minimum of 45 minutes after stress. Conclusion: This study gives advantages to AdenoEX protocol, because it had fewer side-effects, improved patients' tolerance, improved image quality, and enhanced efficiency and throughput given the opportunity for earlier imaging.

  12. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  13. Progressive Resistance Training and Cancer Testis (PROTRACT) - Efficacy of resistance training on muscle function, morphology and inflammatory profile in testicular cancer patients undergoing chemotherapy: design of a randomized controlled trial

    DEFF Research Database (Denmark)

    Christensen, Jesper F; Andersen, Jesper L; Adamsen, Lis; Lindegaard, Birgitte; Mackey, Abigail; Nielsen, Rie H; Rørth, Mikael Rahbek; Daugaard, Gedske

    2011-01-01

    ABSTRACT: BACKGROUND: Standard treatment for patients with disseminated germ cell tumors is combination chemotherapy with bleomycin, etoposide and cisplatin (BEP). This treatment is highly effective, but the majority of patients experience severe adverse effects during treatment and are at risk of developing considerable long-term morbidity, including second malignant neoplasms, cardiovascular disease, and pulmonary toxicity. One neglected side effect is the significant muscular fatigue mentione...

  14. Efficient detection of failure modes in electronic commerce protocols

    OpenAIRE

    Gürgens, S.; Lopez, J; Peralta, R.

    1999-01-01

    The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols. Our method relies on automatic theorem proving tools. Among others we present our analysis of a pr...

  15. Rate Control Protocol for Fast Flows: A Survey

    OpenAIRE

    Mr. Gaganpreet Singh,; Sukhvir Singh

    2014-01-01

    In today’s world, congestion control is a main objective to maximize fairness, utilization and throughput of the Internet. Every protocol has its own features to handle the congestion. The most widely used protocol over the Internet is Transfer Control Protocol. It aims at reliable and in order delivery of bytes to the higher layer and it also protect the network from congestive control. Other congestion control protocols are XCP and RCP. These new protocols are advancement ov...

  16. EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK

    OpenAIRE

    Puja Kumari Sharma

    2012-01-01

    MANET is a collection of self-configurable mobile nodes. Several routing protocols are proposed for ad hoc network among which DSR and AODV On demand routing protocols are mostly used. Existing Dynamic source routing protocol is not suitable for large network because packet size gets increased according to the number of nodes travelled by route discovery packet. In this paper, extended DSR routing protocol is proposed to eliminate the above limitation of existing DSR. Proposed protocol will b...

  17. A New Route Maintenance in Dynamic Source Routing Protocol

    OpenAIRE

    Shukla, Ashish; Tyagi, Neeraj

    2010-01-01

    Mobile ad-hoc network (MANET) is infrastructureless, self-organizable, multi hop packet switched network. A number of routing protocols for MANETs have been proposed in recent years. Dynamic Source Routing (DSR) protocol is one of the most popular routing protocol for ad hoc networks. This paper presents a novel method to enhance route maintenance part of DSR protocol. Our proposed route maintenance significantly increases the efficiency of the protocol at the time of route ...

  18. Blind Collective Signature Protocol Based on Discrete Logarithm Problem

    OpenAIRE

    Nikolay A. Moldovyan; Alexander A. Moldovyan

    2010-01-01

    Using Schnorr's digital signature (DS) scheme as the underlying scheme there is designed the collective DS protocol. In the proposed collective DS protocol the signature is formed simultaneously by all signers, therefore using this protocol leads to natural solution of the problem of signing simultaneously a contract. Using the proposed collective DS protocol the blind collective DS protocol has been designed, which is a new type of the multi-signature schemes. For simultaneous signing a pack...

  19. A Comparative Analysis of Tools for Verification of Security Protocols

    OpenAIRE

    Nitish Dalal; Jenny Shah; Khushboo Hisaria; Devesh Jinwala

    2010-01-01

    The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have indeed helped correct the protocols even after being standardized. However, the standard protocol verification tools and techniques do not verify the security properties of a cryptographic protocol. This has resulted in the emergence of the security protocol verifiers to fill the nee...

  20. A New Route Maintenance in Dynamic Source Routing Protocol

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Mobile ad-hoc network (MANET) is infrastructureless, self-organizable, multi hop packet switched network. A number of routing protocols for MANETs have been proposed in recent years. Dynamic Source Routing (DSR) protocol is one of the most popular routing protocol for ad hoc networks. This paper presents a novel method to enhance route maintenance part of DSR protocol. Our proposed route maintenance significantly increases the efficiency of the protocol at the time of route failures.

  1. Novel Secure Communication Protocol for Conditional Access System

    OpenAIRE

    Liu Yongliang; Xiaolin Yang; Hongxun Yao; Wen Gao

    2007-01-01

    A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to achieve the authentication of smart card to set-top box and uses an asymmetric cryptosystem to achieve the authentication of set-top box to smart card. Both security and performance of the proposed protocol are analyzed and a comparison between the proposed protocol and a previous protocol is provided. The result shows...

  2. Side-Channel Analysis for Detecting Protocol Tunneling

    OpenAIRE

    Harakrishnan Bhanu; Jason Schwier; Ryan Craven; Richard R. Brooks; Kathryn Hempstalk; Daniele Gunetti; Christopher Griffin

    2011-01-01

    Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools. We then show how to infer Hidden Markov models (HMMs) of network protocols from timing data and use the HMMs to detect when protocols are active. Unlike previous work, the HMM approach we present requires no a...

  3. Formal analysis of some timed security properties in wireless protocols

    OpenAIRE

    Vaccarelli, Anna; Martinelli, Fabio

    2003-01-01

    We show how a recent language for the description of cryptographic protocols in a real time setting may be suitable to formally verify security aspects of wireless protocols. We define also a compositional proof rule for establishing security properties of such protocols. The effectiveness of our approach is shown by defining and studying the timed integrity property for muTESLA, a well-known protocol for wireless sensor networks. We are able to deal with a protocol specifications with an arb...

  4. Hiding Information in a Stream Control Transmission Protocol

    OpenAIRE

    Fraczek, Wojciech; Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The STCP (Stream Control Transmission Protocol) is a candidate for a new transport layer protocol that may replace the TCP (Transmission Control Protocol) and the UDP (User Datagram Protocol) protocols in future IP networks. Currently, the SCTP is implemented in, or can be added to, many popular operating systems (Windows, BSD, Linux, HPUX or Sun Solaris). This paper identifies and presents all possible "places" where hidden information can be exchanged using an SCTP. The pa...

  5. Verification of Session Initiation Protocol Using Timed Colored Petri Net

    OpenAIRE

    Mürvet K?rc?; Safiye K?zmaz

    2011-01-01

    In this work, Session Initiation Protocol model is established by using Timed Colored Petri Nets (TCPN). SIP (Session Initiation Protocol) is a protocol developed to assist in providing advanced telephony services across the Internet. The Session Initiation Protocol (SIP) has become the quasi-standard for Voiceover-Internet Protocol (VoIP) communications. SIP is based on a client–server infrastructure in which user agents represent the end-terminals as clients, proxy servers handle SIP messag...

  6. Analysing routing protocols: four nodes topologies are sufficient

    OpenAIRE

    V\\xe9ronique Cortier; Jan Degrieck; St\\xe9phanie Delaune.

    2012-01-01

    Routing protocols aim at establishing a route between nodes on a network. Secured versions of routing protocols have been proposed in order to provide more guarantees on the resulting routes. Formal methods have proved their usefulness when analysing standard security protocols such as confidentiality or authentication protocols. However, existing results and tools do not apply to routing protocols. This is due in particular to the fact that all possible topologies (infinitely many) have to b...

  7. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    OpenAIRE

    Niekerk, T.G.C.M., van; Gunnink, H.; Reenen, C.G. van

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  8. A Survey of Routing Protocols and Geographic Routing protocol Using GPS in MANET

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2013-01-01

    Full Text Available The wireless associations in this network are highly error level and can go down usually due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA. This review paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance. The objective is to make observations about how the performance of these protocols can be improved. The limited battery energy is an important consideration in the effective operation of an Ad- hoc network. We propose a protocol named as Energy Saving Geographic Routing protocol (ESGRP using with GPS that provides a lower energy cost effective routing solution. With peer to peer communication with using GPS in MANET. The perform evaluation of our protocol is agreed out using a statistically composed data over Dynamic Source Routing (DSR and Ad-Hoc On-Demand Distance Vector (AODV protocol. Analysis exhibits a clear edge over the existing protocol.

  9. Sensitive localized surface plasmon resonance multiplexing protocols.

    Science.gov (United States)

    Jia, Kun; Bijeon, Jean L; Adam, Pierre M; Ionescu, Rodica E

    2012-09-18

    Herein are reported two new protocols to obtain different zones of localized surface plasmon resonance (LSPR) gold nanostructures on single glass substrate by using a vacuum evaporation technique followed by a high-temperature annealing (550 °C). The thickness of the gold film, considered as the essential parameter to determine specific LSPR properties, is successfully modulated. In the first protocol, a metal mask is integrated onto the glass substrate during vacuum evaporation to vary the gold film thickness by a "shadowing effect", while in the second protocol several evaporation cycles (up to four cycles) at predefined areas onto the single substrate are performed. The resulting gold-modified samples are characterized using a transmission UV-vis extinction optical setup and scanning electron microscopy (SEM). The size distribution histograms of nanoparticles are also acquired. By employing the first protocol, thanks to the presence of different zones of gold nanoparticles on a single substrate, optimized LSPR responses to different (bio)functionalization zones are rapidly screened. Independently, the second protocol exhibited an excellent correlation between the nominative evaporated gold film thickness, gold nanoparticle sizes, and plasmonic properties (resonant wavelength and peak amplitude). Such substrates are further used in the construction of LSPR immunosensors for the detection of atrazine herbicide. PMID:22894648

  10. Manet Load Balancing Parallel Routing Protocol

    Directory of Open Access Journals (Sweden)

    Hesham Arafat Ali

    2012-07-01

    Full Text Available In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path routing, but it always has a problem that the discovered paths may be not 100% disjoint and sending data is done in only one path until it's broken; the discovery of multiple paths also generates more overhead on the network. Load Balancing Parallel Routing Protocol [LBPRP] tried to solve previous multi path problems, distributing traffic among multiple paths sending data in parallel form as it uses all paths in the same time. We employed a simple test scenario to be sure of proposed model efficiency and to validate the proposed Load Balancing Parallel Routing Protocol. [LBPRP] will achieve load balancing in sending data, decreasing the end-to-end delay and increasing the packet delivery ratio and throughput, thus the performance of multi-path routing protocols can be improved consequently.

  11. Semen cryopreservation protocols of Mangalarga Marchador stallions

    Scientific Electronic Library Online (English)

    Marcela Leite, Candeias; Marco Antonio, Alvarenga; Márcio Teoro do, Carmo; Heder Nunes, Ferreira; Mônica Russo Souto, Maior; Rodolpho de Almeida, Torres Filho; André Luís Rios, Rodrigues; Felipe Zandonadi, Brandão.

    2012-09-01

    Full Text Available The effect of the utilization of three semen protocols (Inra 82®, Merck Gema and Botu-crio®) and two filling techniques (0.25 and 0.50 mL straws) in Mangalarga Marchador stallions were studied in this experiment. Sperm parameters were assessed during processing and post-freezing. No interactions bet [...] ween the protocols and type of filling were observed, so they were assessed separately. Sperm parameters were not altered when the extender was added to the centrifugation; however, there was reduction of motility and strength when freezing extenders were added. The Botu-crio® protocol preserved the parameters of total and progressive sperm motility, smoothed path velocity (µm/s), straight line velocity (µm/s), track velocity (µm/s) and the average and fast spermatozoa percentage better than the others. No difference between the extenders for the percentage of sperm integrity was observed. There was no difference in the responses studied on the filling techniques. The stallions presented better freezing with the use of the Botu-crio® protocol. The best post-freezing viability results were found for semen frozen using the Botu-crio® protocol and there were no differences concerning the sperm quality comparing 0.25 and 0.50 mL straws.

  12. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  13. Semen cryopreservation protocols of Mangalarga Marchador stallions

    Directory of Open Access Journals (Sweden)

    Marcela Leite Candeias

    2012-09-01

    Full Text Available The effect of the utilization of three semen protocols (Inra 82®, Merck Gema and Botu-crio® and two filling techniques (0.25 and 0.50 mL straws in Mangalarga Marchador stallions were studied in this experiment. Sperm parameters were assessed during processing and post-freezing. No interactions between the protocols and type of filling were observed, so they were assessed separately. Sperm parameters were not altered when the extender was added to the centrifugation; however, there was reduction of motility and strength when freezing extenders were added. The Botu-crio® protocol preserved the parameters of total and progressive sperm motility, smoothed path velocity (µm/s, straight line velocity (µm/s, track velocity (µm/s and the average and fast spermatozoa percentage better than the others. No difference between the extenders for the percentage of sperm integrity was observed. There was no difference in the responses studied on the filling techniques. The stallions presented better freezing with the use of the Botu-crio® protocol. The best post-freezing viability results were found for semen frozen using the Botu-crio® protocol and there were no differences concerning the sperm quality comparing 0.25 and 0.50 mL straws.

  14. Eccentricity in Zone Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    Mrs Komal Nair

    2012-06-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a decentralized network of autonomous mobile nodes, able to communicate with each other over wireless links. Due to the mobility of the nodes, the topology ofthe network changes spontaneously, therefore use of conventional routing tables maintained at fixed points (routers is not suggested. Such a network may operate in a standalone fashion. There are variousrouting protocols available for MANETs. The most popular ones are DSR, DSDV and ZRP .The zone routing protocol (ZRP is a hybrid routing protocol that proactively maintains routes within a localregion of the network. ZRP can be configured for a particular network through adjustment of a single parameter, the routing zone radius. In this paper, we address the issue of configuring the ZRP to providethe best performance for a particular network at any time with the concept of eccentricity. The results illustrate the important characteristics of different protocols based on their performance and thus suggest some improvements in the respective protocol. The tools used for the simulation are NS2 which is the main simulator, NAM (Network Animator and Tracegraph which is used for preparing the graphs from the trace files.

  15. Two New Protocols for Fault Tolerant Agreement

    Directory of Open Access Journals (Sweden)

    Poonam Saini

    2011-02-01

    Full Text Available The paper attempts to handle failures effectively, while reaching agreement, in a distributed transaction processing system. The standard protocols such as BFTDC [3], Zyzzyva [4] and PBFT [5] handle the problem to a greater extent. However, the limitation with these protocols is that they incur increased message overhead as well as large latency. Moreover, the nodes are evacuated from the transactionsystem after being declared faulty. We propose a novel proactive based agreement which identifies the tentative failures in the system. To improve the failure resiliency with minimum execution overhead, we also propose an optimized reactive view change mechanism. Both mechanisms have been analyzed and compared. The dynamic analysis of the protocol reflects that, in a faulty scenario, the proactive approach is computationally more efficient with reduced latency as compared to reactive one. Moreover, unlike PBFT and BFTDC, our agreement protocol runs in two phases, which leads to reduced message overhead and total execution time. The protocol treats the fail-silent (i.e. crashed nodes in the system.

  16. MRI protocols for imaging paediatric brain tumours

    International Nuclear Information System (INIS)

    Aims: To establish whether paediatric centres within the Children's Cancer and Leukaemia Group (CCLG) network employ magnetic resonance imaging (MRI) protocols for brain tumours according to the revised guidance. Materials and methods: Questionnaires were sent to both consultants and superintendent radiographers in the 21 centres within the CCLG network that perform MRI on paediatric brain tumour patients. Information was requested as to whether the centre had a protocol for imaging paediatric brain tumours, which sequences were performed, and whether these were used by all consultants. Results: Twenty-seven completed questionnaires out of the 42 sent were returned, which included responses from 17 of the 21 UK centres. The majority of centres had a protocol for MRI of paediatric brain tumours at all stages of treatment. The standardized CCLG MRI sequences were incorporated in full at only five of the 17 centres. Conclusion: The standard sequences of the CCLG brain imaging protocol are poorly adhered to nationally. Further awareness of the revised protocol is needed, with improved access to the guidelines for non-CCLG members on the CCLG and Royal college of Radiologists website.

  17. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    Pervasive computing systems are inherently running on unstable networks and devices, subject to constant topology changes, network failures, and high churn. For this reason, pervasive computing infrastructures need to handle these issues as part of their design. This is, however, not feasible, since this increases the complexity of the software architectures making them more difficult to design, implement, deploy, and maintain. In this paper, we suggest to move the handling of these volatile properties of pervasive environments to the protocol level. Specifically, we suggest utilizing epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result is lower complexity of building pervasive systems and higher robustness.

  18. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    International Nuclear Information System (INIS)

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols. Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 ± 0.41 cm vs. 1.66 ± 0.21 cm, P = 0.77; area: 2.1 ± 0.48 cm2 vs. 1.99 ± 0.62 cm2, P = 0.7; and circularity: 0.95 ± 0.04 vs. 0.96 ± 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.

  19. Effect of early treatment with transcutaneous electrical diaphragmatic stimulation (TEDS) on pulmonary inflammation induced by bleomycin / Efeito do tratamento precoce com estimulacao diafragmatica eletrica transcutanea (EDET) na inflamacao pulmonar provocada pela Bleomicina

    Scientific Electronic Library Online (English)

    Laisa A., Santos; Carlos A., Silva; Maria L. O., Polacow.

    2013-12-01

    Full Text Available CONTEXTUALIZAÇÃO: A bleomicina é um antineoplásico que tem como efeito colateral fibrose pulmonar. Há poucos estudos experimentais dos efeitos do tratamento fisioterapêutico nesse quadro. OBJETIVO: Estudar pulmões de ratos tratados com bleomicina e intervenção precoce com estimulação diafragmát [...] ica elétrica transcutânea (EDET). MÉTODO: Ratos Wistar foram divididos em quatro grupos (n=5): controle; estimulado; tratado com dose única de bleomicina 2,5 mg/Kg, via intratraqueal, e tratado com bleomicina e estimulação elétrica 24 horas após a instilação da bleomicina, durante sete dias, por 20 minutos. Fragmentos de pulmão foram tratados para coloração em hematoxilina e eosina (HE) e 8-isoprostane-PGF2? (8-iso-PGF2 ?). A densidade de área alveolar foi obtida por planimetria; o perfil inflamatório, por quantificação do número de células, e os níveis de estresse oxidativo no tecido pulmonar, pela análise do marcador 8-iso-PGF2 ?. Utilizou-se teste de normalidade Shapiro-Wilk seguido de ANOVA one-way+Bonferroni (p Abstract in english BACKGROUND : Bleomycin (B) is an antineoplastic drug that has pulmonary fibrosis as a side effect. There are few experimental studies about the effects of physical therapy treatment in this case. OBJECTIVE: The objective was to study rat lungs treated with B and precocious intervention by trans [...] cutaneous electrical diaphragmatic stimulation (TEDS). METHOD : Wistar rats were divided into 4 groups (n=5): a control group (C); a stimulated group (TEDS); a group treated with a single dose of B (intratracheally, 2.5 mg/kg) (B); and a group treated with B and electric stimulation (B + TEDS). After the B instillation, the electrical stimulation was applied for 7 days, for a duration of 20 minutes. Lung fragments were histologically processed with hematoxylin and eosin (HE) and 8-isoprostane-PGF2? (8-iso-PGF2?). The density of the alveolar area was determined by planimetry, the inflammatory profile was defined by the number of cells, and the level of oxidative stress in the pulmonary tissue was evaluated by 8-iso-PGF2?. For statistical analysis of the data, the Shapiro-Wilk test was used, followed by a one-way ANOVA with the post-hoc Bonferroni test (p?0.05). RESULTS : The B group exhibited a significant reduction in the area density, and the acute treatment with B + TEDS prevented this reduction. There were increased numbers of fibroblasts, leukocytes, and macrophages in the B group, as well as increased lipid peroxidation, which was observed only in this group. CONCLUSION : B promoted a reduction in the alveolar density area, thereby inducing the inflammatory process and increasing the production of free radicals. These effects were minimized by the application of TEDS at the initial treatment stage.

  20. A Review: Multi Protocol Label Switching (Mpls

    Directory of Open Access Journals (Sweden)

    Rashed Qayoom Shawl,

    2014-01-01

    Full Text Available The demand for technology called MPLS is increasing day by day in most internet service provider networks. Majority of the carriers are deploying MPLS in their backbone networks to facilitate a number of services and applications such as virtual private networks, quality of service (QoS and traffic engineering. MPLS is a scalable, protocol-independent protocol. MPLS allows for creating end-to-end circuits across any type of transport medium using any protocol. The primary benefit of MPLS is to eliminate the dependence on a particular OSI model data-link layer technology such as asynchronous transfer mode (ATM, Frame Relay or Ethernet and eliminates the need for multiple layer-2 networks to satisfy different types of traffic. This paper reflects a detailed overview on MPLS with its architectural terminology, working and the services that it offers.