نتایج جستجو برای: dsa method

تعداد نتایج: 1632355  

2018
Byung Ha Chung Jeong Ho Kim Bum Soon Choi Cheol Whee Park Ji-Il Kim In Sung Moon Yong-Soo Kim Yeong Jin Choi Eun-Jee Oh Chul Woo Yang

BACKGROUND/AIMS This study investigated the clinical significance of detecting anti-human leukocyte antigen-donor specific antibody (HLA-DSA) in kidney transplant recipients (KTRs) requiring indication biopsy owing to allograft dysfunction. METHODS We analyzed the presence of HLA-DSA in 210 KTRs who took indication biopsy. We divided these cases into two groups, HLA-DSA (+) (n = 52) and HLA-D...

2015
Fei Wang Feng Chen Hai-Ling Li Peng Sun Xiang-Ming Liu Ting-Jian Yang Hao- Qing Song

The aim of this study was to report a case that underwent a craniotomy after primary pre-operative cerebrovascular and 3D digital subtraction angiography (DSA) showed false results. DSA misdiagnosis and missed diagnosis of aneurysms were found, and the subject was subsequently treated accordingly. This case was analysed to identify: 1) the cause of the false positive and false negative results ...

Journal: :American journal of transplantation : official journal of the American Society of Transplantation and the American Society of Transplant Surgeons 2016
O O Adebiyi J Gralla P Klem B Freed S Davis A C Wiseman J E Cooper

Antibodies to donor-specific HLA antigens (donor-specific antibodies [DSA]) detected by single-antigen bead (SAB) analysis prior to kidney transplant have been associated with inferior graft outcomes. However, studies of pretransplant DSA, specifically in the setting of a negative flow cytometry crossmatch (FCXM) without desensitization therapy, are limited. Six hundred and sixty kidney and kid...

2009
Saman T. Zargar Martin B. H. Weiss

Dynamic Spectrum Access (DSA) systems are being developed to improve spectrum utilization. Most of the research on DSA systems assumes that the participants involved are honest, cooperative, and that no malicious adversaries will attack or exploit the network. Some recent research efforts have focused on studying security issues in cognitive radios but there are still significant security chall...

Journal: :American journal of transplantation : official journal of the American Society of Transplantation and the American Society of Transplant Surgeons 2011
T B Dunn H Noreen K Gillingham D Maurer O G Ozturk T L Pruett R A Bray H M Gebel A J Matas

Single-antigen bead (SAB) testing permits reassessment of immunologic risk for kidney transplantation. Traditionally, high panel reactive antibody (PRA), retransplant and deceased donor (DD) grafts have been associated with increased risk. We hypothesized that this risk was likely mediated by (unrecognized) donor-specific antibody (DSA). We grouped 587 kidney transplants using clinical history ...

Journal: :Journal of Geophysics and Engineering 2023

Abstract In this study, the efficiency of estimating model parameters sheet-shaped single and multiple-sources self-potential (SP) anomaly using Differential Search algorithm (DSA) was investigated. First all, noise-free noisy synthetic anomalies were calculated for a source, its estimated by DSA. The DSA inversion also done consisting three inclined sheets. order to test effectiveness method, ...

2016
Jingjing Cai Dan Wu Yongqian Mo Anxin Wang Shiyu Hu Lijie Ren

Extracranial arteriosclerosis usually indicates a high risk of ischemic stroke. In the past, a clinical decision following diagnosis was dependent on the percentage of vessel stenosis determined by an invasive technique. We aimed to develop a quantitative magnetic resonance (QMR) technique to evaluate artery structure and cerebral hemodynamics noninvasively.QMR and digital subtraction angiograp...

Journal: :Applied sciences 2023

The development of quantum computing systems poses a great threat to the security existing public key-based systems. As result, National Institute Standards and Technology (NIST) started Post-Quantum Cryptography (PQC) standardization project in 2015, currently active research is being conducted apply PQC various cryptographic protocols. Unlike elliptic curve cryptography (ECC)-based schemes, r...

Journal: :IACR Cryptology ePrint Archive 2016
Rosario Gennaro Steven Goldfeder Arvind Narayanan

While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. Due to the properties of DSA, it is far more difficult to create a threshold scheme for it than for other signature algorithms. In this paper, we present a breakthrough scheme that provides a threshold DSA algorithm that is efficient and optimal. We also present a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید