Objective This study aims to review the pharmacology, efficacy, and safety of the soluble guanyla... more Objective This study aims to review the pharmacology, efficacy, and safety of the soluble guanylate cyclase stimulator, vericiguat, in patients with symptomatic congestive heart failure with ejection fraction less than 45% for the reduction of cardiovascular deaths. Also, to evaluate heart failure–related hospitalization in patients following a hospital discharge secondary to heart failure or those that require outpatient intravenous diuretics. Data source MEDLINE/Pubmed and National Institutes of Health Clinical Trial Registry were searched between January 1989 to February 2021 using the following terms: vericiguat, soluble guanylate cyclase stimulator, heart failure, (was also known as) BAY 1021189. Study Selection and Data Extraction The following study designs were included in the analysis: phase I, II, and III clinical trials; systematic reviews; and meta-analyses. Articles were included if they were published in English and evaluated vericiguat pharmacology, pharmacokinetics, ...
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Energy is required for networking and computation and is a valuable resource for unplugged embedd... more Energy is required for networking and computation and is a valuable resource for unplugged embedded systems. Energy DoS a ack where a remote a acker exhausts the victim's ba ery by sending networking requests remains a critical challenge for the device availability. While prior literature proposes mitigation-and detectionbased solutions, we propose to eliminate the vulnerability entirely by o oading the power requirements to the entity who makes the networking requests. To do so, we build communication channels using wireless charging signals, so that the communication and the power transfer are simultaneous and inseparable, and use the channels to build power-positive networking (PPN). PPN also o oads the computation-based costs to the requester, enabling authentication and other tasks considered too power-hungry for ba ery-operated devices. Furthermore, because we use the charging signal for bidirectional networking, the design requires no additional hardware beyond that for wireless charging. In this paper, we present PPN, implement a Qi-compatible prototype, and use the prototype to analyze the performance. 1 INTRODUCTION Wireless networking and wireless power transfer enable device connectivity in broad applications by le ing the devices be free of cables and are the driving forces behind the Internet of ings (IoT). For example, both technologies are used in mobile phones, implantable medical devices, wearable devices, sensors for environment and structure monitoring, electric vehicles, and so on. For unplugged devices which operate on ba eries and do not have a stable power supply source, energy (generally required for networking, computations, and other operations of electronic devices) is a valuable resource and its constraint is o en the fundamental bo leneck to
Nghiên cứu cắt ngang mô tả nhằm mục đích nghiên cứu tình trạng kiệt sức và các yếu tố liên quan đ... more Nghiên cứu cắt ngang mô tả nhằm mục đích nghiên cứu tình trạng kiệt sức và các yếu tố liên quan đến tình trạng kiệt sức của nhân viên chẩn đoán hình ảnh tại Bệnh viện Hữu nghị Việt Tiệp, Hải Phòng. Kết quả nghiên cứu cho thấy tỷ lệ nhân viên bị kiệt sức cao là 20,2%, trung bình là 32,9% và thấp là 46,9%. Mức độ kiệt sức của đối tượng nghiên cứu ở mức độ trung bình (3,09 ± 1,42). Theo đặc điểm cá nhân, yếu tố ảnh hưởng nhiều đến tình trạng kiệt sức của nhân viên là số ngày trực trong tuần (β = 0,45; p = 0,001). Một số yếu tố ảnh hưởng một phần đến tình trạng kiệt sức của nhân viên như tuổi hay trình độ chuyên môn, thời gian công tác. Yếu tố giới không ảnh hưởng đến tình trạng kiệt sức của nhân viên chẩn đoán hình ảnh.
Ung thư vú - bệnh lý ác tính, phát triển từ biểu mô tuyến vú. Khi bị kích thích bởi tác nhân sinh... more Ung thư vú - bệnh lý ác tính, phát triển từ biểu mô tuyến vú. Khi bị kích thích bởi tác nhân sinh ung thư, tế bào tuyến vú tăng sinh vô hạn độ, vô tổ chức, hình thành khối u. Unti-K - dược liệu được sản xuất từ thảo dược thiên nhiên gồm bột tam thất, cao khô phylamin, cao khô xạ đen, cao tỏi đen, cao trinh nữ hoàng cung,… chứa các saponin, flavonoid, S-allyl-L-Cystein, alkaloid … gây độc tế bào ung thư, gây alkyl hóa nucleotide, cản trở DNA sao chép, trì hoãn di căn. Nanocurcumin giúp ngừng tân tạo mạch, hoạt hóa protein kháng ung thư. Tinh chất curcumin được bảo vệ khi gắn kết với nano, dễ di chuyển và không bị hao tổn trên đường đi đến tế bào đích. Trong nghiên cứu này chúng tôi đã xây dựng mô hình phòng và chữa trị ung thư vú (DMBA gây ung thư vú) nhờ tác động cộng gộp của unti-k với nanocurcumin trên chuột (Mus musculus var. Albino). Sau 40 tuần phòng và chữa bệnh, các chỉ số về trọng lượng cơ thể, lượng bạch cầu trong máu chuột bị bệnh dần trở về mức bình thường. Hiệu quả phối...
Analyzing the impact of cyber-physical attacks is important for railway operators to help them in... more Analyzing the impact of cyber-physical attacks is important for railway operators to help them in assessing and prioritizing their efforts of securing the infrastructures. Since railways consist of several complex cyber-physical systems operating in tandem, it is difficult to assess the impact of an attack without a simulator. Commercially available simulators are intended to support operational design and lack the flexibility to incorporate different attack scenarios. Furthermore, many commercial tools are prohibitively expensive. To address the need for an open and extensible simulator, we propose to build SecureRails, an open source simulator for railway cyber-security analysis. SecureRails consists of two basic building blocks, a train motion simulator built on OpenRails platform, and a model based railway traction power flow simulator built on Matlab. In order to simulate the operation of a railway system, the two simulators interact with each other continuously during their simulation runtime using the JSON-RPC protocol. We have included several novel features in this simulator such as improving the timetable schedule and passenger flow modeling. We propose to develop a generic API framework on OpenRails and Matlab to allow users to specify their attack scenarios and call these APIs for their studies. While this work is in an early stage, we illustrate the utility of such a simulator using a case study for the Shenzhen metro system.
Cyber security has emerged as an important issue for urban railway systems (URS) due to the incre... more Cyber security has emerged as an important issue for urban railway systems (URS) due to the increasing usage of information and communication technologies (ICT). As a safety-critical public infrastructure with complex, interconnected, and often legacy systems, URS pose challenges for stakeholders seeking to understand cyber threats and their impact, and prioritize investments and hardening efforts. However, other critical infrastructure industries such as the energy sector offer best practices, risk assessment methodologies, and tools that may be both useful and transferable to the railway domain. In this work we consider one successful security initiative from the energy sector in North America, the development of common failure scenarios and impact analysis (NESCOR failure scenarios), and assess their applicability and utility in URS. We use a publicly-available software tool that supports failure scenario analysis to assess example failures on railway supervisory control systems ...
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017
The components and systems involved in railway operation are subject to stringent reliability and... more The components and systems involved in railway operation are subject to stringent reliability and safety requirements, but up until now the cyber security of those same systems has been largely under-explored. In this work, we examine a widely-used railway technology, track beacons or balises, which provide a train with its position on the track and often assist with accurate stopping at stations. Balises have been identified as one potential weak link in train signalling systems. We evaluate an automatic train stop controller that is used in real deployment and show that attackers who can compromise the availability or integrity of the balises' data can cause the trains to stop dozens of meters away from the right position, disrupting train service. To address this risk, we have developed a novel countermeasure that ensures the correct stopping of the trains in the presence of attacks, with only a small extra stopping delay.
This is an open access article under the terms of the Creative Commons Attribution License, which... more This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
Modern trains rely on balises (communication beacons) located on the track to provide location in... more Modern trains rely on balises (communication beacons) located on the track to provide location information as they traverse a rail network. Balises, such as those conforming to the Eurobalise standard, were not designed with security in mind and are thus vulnerable to cyber attacks targeting data availability, integrity, or authenticity. In this work, we discuss data integrity threats to balise transmission modules and use high-fidelity simulation to study the risks posed by data integrity attacks. To mitigate such risk, we propose a practical two-layer solution: At the device level, we design a lightweight and low-cost cryptographic solution to protect the integrity of the location information; at the system layer, we devise a secure hybrid train speed controller to mitigate the impact under various attacks. Our simulation results demonstrate the effectiveness of our proposed solutions.
This study investigated the safety and efficacy of the sodium-glucose co-transporter-2 (SGLT2) in... more This study investigated the safety and efficacy of the sodium-glucose co-transporter-2 (SGLT2) inhibitor luseogliflozin with differing carbohydrate intakes in Japanese individuals with type 2 diabetes (T2D). Participants were randomly assigned to 3 carbohydrate-adjusted meals for 14 days (days 1-14; a high carbohydrate [HC; 55% total energy carbohydrate] and high glycaemic index [HGI] meal; an HC [55% total energy carbohydrate] and low glycaemic index [LGI] meal; or a low carbohydrate [LC; 40% total energy carbohydrate] and HGI meal). All participants received luseogliflozin for the last 7 days (days 8-14), continuous glucose monitoring (CGM) before and after luseogliflozin treatment (days 5-8 and days 12-15) and blood tests on days 1, 8 and 15. Luseogliflozin significantly decreased the area under the curve and mean of CGM values in all 3 groups similarly. Fasting plasma glucose, insulin and glucagon were similar at all time points. Ketone bodies on day 15 were significantly higher...
Journal of the Dermatology Nurses’ Association, 2017
Segmental neurofibromatosis is a rare condition that most commonly affects women and presents as ... more Segmental neurofibromatosis is a rare condition that most commonly affects women and presents as neurofibromas, café au lait spots, and freckling. The neurofibromas usually occur in a dermatomal pattern, whereas the café au lait spots may follow Blaschko’s lines. There is often no family history. The etiology is due to a postzygotic mutation in the gene encoding neurofibromin. Histopathology reveals a tumorwith haphazardlyarranged spindle cells andapalemyxoid stroma frommucin deposition and fibroplasia. There have been few reported cases of segmental neurofibromatosis. In this case report, wewill discuss the clinical features, histopathology, differential diagnosis, and management of segmental neurofibromatosis.
Basal cell carcinoma (BCC) is the most common type of human malignancy. It is a slow-growing skin... more Basal cell carcinoma (BCC) is the most common type of human malignancy. It is a slow-growing skin cancer with little ability to metastasize, but it is aggressive and can cause local tissue destruction. Descriptions of Basal Cell Nevus Syndrome (BCNS), characterized by a predisposition to the formation of BCC and other neoplasms, and identification of the genetic defect in this syndrome, has led to significant advancement in our understanding of the pathogenesis of BCC. Unregulated expression of target genes in the sonic Hedgehog (SHH) signaling pathway plays a prominent role in the pathogenesis of BCC. An understanding of the signaling components has allowed for the development of pharmacologic agents that inhibit the SHH pathway. The first inhibitor of the SHH pathway approved by the Food and Drug Administration (FDA) for the treatment of BCC is vismodegib. In this review, we will discuss the biochemical pathways involved in BCC as targets of novel pharmacologic therapies.
Objective This study aims to review the pharmacology, efficacy, and safety of the soluble guanyla... more Objective This study aims to review the pharmacology, efficacy, and safety of the soluble guanylate cyclase stimulator, vericiguat, in patients with symptomatic congestive heart failure with ejection fraction less than 45% for the reduction of cardiovascular deaths. Also, to evaluate heart failure–related hospitalization in patients following a hospital discharge secondary to heart failure or those that require outpatient intravenous diuretics. Data source MEDLINE/Pubmed and National Institutes of Health Clinical Trial Registry were searched between January 1989 to February 2021 using the following terms: vericiguat, soluble guanylate cyclase stimulator, heart failure, (was also known as) BAY 1021189. Study Selection and Data Extraction The following study designs were included in the analysis: phase I, II, and III clinical trials; systematic reviews; and meta-analyses. Articles were included if they were published in English and evaluated vericiguat pharmacology, pharmacokinetics, ...
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Energy is required for networking and computation and is a valuable resource for unplugged embedd... more Energy is required for networking and computation and is a valuable resource for unplugged embedded systems. Energy DoS a ack where a remote a acker exhausts the victim's ba ery by sending networking requests remains a critical challenge for the device availability. While prior literature proposes mitigation-and detectionbased solutions, we propose to eliminate the vulnerability entirely by o oading the power requirements to the entity who makes the networking requests. To do so, we build communication channels using wireless charging signals, so that the communication and the power transfer are simultaneous and inseparable, and use the channels to build power-positive networking (PPN). PPN also o oads the computation-based costs to the requester, enabling authentication and other tasks considered too power-hungry for ba ery-operated devices. Furthermore, because we use the charging signal for bidirectional networking, the design requires no additional hardware beyond that for wireless charging. In this paper, we present PPN, implement a Qi-compatible prototype, and use the prototype to analyze the performance. 1 INTRODUCTION Wireless networking and wireless power transfer enable device connectivity in broad applications by le ing the devices be free of cables and are the driving forces behind the Internet of ings (IoT). For example, both technologies are used in mobile phones, implantable medical devices, wearable devices, sensors for environment and structure monitoring, electric vehicles, and so on. For unplugged devices which operate on ba eries and do not have a stable power supply source, energy (generally required for networking, computations, and other operations of electronic devices) is a valuable resource and its constraint is o en the fundamental bo leneck to
Nghiên cứu cắt ngang mô tả nhằm mục đích nghiên cứu tình trạng kiệt sức và các yếu tố liên quan đ... more Nghiên cứu cắt ngang mô tả nhằm mục đích nghiên cứu tình trạng kiệt sức và các yếu tố liên quan đến tình trạng kiệt sức của nhân viên chẩn đoán hình ảnh tại Bệnh viện Hữu nghị Việt Tiệp, Hải Phòng. Kết quả nghiên cứu cho thấy tỷ lệ nhân viên bị kiệt sức cao là 20,2%, trung bình là 32,9% và thấp là 46,9%. Mức độ kiệt sức của đối tượng nghiên cứu ở mức độ trung bình (3,09 ± 1,42). Theo đặc điểm cá nhân, yếu tố ảnh hưởng nhiều đến tình trạng kiệt sức của nhân viên là số ngày trực trong tuần (β = 0,45; p = 0,001). Một số yếu tố ảnh hưởng một phần đến tình trạng kiệt sức của nhân viên như tuổi hay trình độ chuyên môn, thời gian công tác. Yếu tố giới không ảnh hưởng đến tình trạng kiệt sức của nhân viên chẩn đoán hình ảnh.
Ung thư vú - bệnh lý ác tính, phát triển từ biểu mô tuyến vú. Khi bị kích thích bởi tác nhân sinh... more Ung thư vú - bệnh lý ác tính, phát triển từ biểu mô tuyến vú. Khi bị kích thích bởi tác nhân sinh ung thư, tế bào tuyến vú tăng sinh vô hạn độ, vô tổ chức, hình thành khối u. Unti-K - dược liệu được sản xuất từ thảo dược thiên nhiên gồm bột tam thất, cao khô phylamin, cao khô xạ đen, cao tỏi đen, cao trinh nữ hoàng cung,… chứa các saponin, flavonoid, S-allyl-L-Cystein, alkaloid … gây độc tế bào ung thư, gây alkyl hóa nucleotide, cản trở DNA sao chép, trì hoãn di căn. Nanocurcumin giúp ngừng tân tạo mạch, hoạt hóa protein kháng ung thư. Tinh chất curcumin được bảo vệ khi gắn kết với nano, dễ di chuyển và không bị hao tổn trên đường đi đến tế bào đích. Trong nghiên cứu này chúng tôi đã xây dựng mô hình phòng và chữa trị ung thư vú (DMBA gây ung thư vú) nhờ tác động cộng gộp của unti-k với nanocurcumin trên chuột (Mus musculus var. Albino). Sau 40 tuần phòng và chữa bệnh, các chỉ số về trọng lượng cơ thể, lượng bạch cầu trong máu chuột bị bệnh dần trở về mức bình thường. Hiệu quả phối...
Analyzing the impact of cyber-physical attacks is important for railway operators to help them in... more Analyzing the impact of cyber-physical attacks is important for railway operators to help them in assessing and prioritizing their efforts of securing the infrastructures. Since railways consist of several complex cyber-physical systems operating in tandem, it is difficult to assess the impact of an attack without a simulator. Commercially available simulators are intended to support operational design and lack the flexibility to incorporate different attack scenarios. Furthermore, many commercial tools are prohibitively expensive. To address the need for an open and extensible simulator, we propose to build SecureRails, an open source simulator for railway cyber-security analysis. SecureRails consists of two basic building blocks, a train motion simulator built on OpenRails platform, and a model based railway traction power flow simulator built on Matlab. In order to simulate the operation of a railway system, the two simulators interact with each other continuously during their simulation runtime using the JSON-RPC protocol. We have included several novel features in this simulator such as improving the timetable schedule and passenger flow modeling. We propose to develop a generic API framework on OpenRails and Matlab to allow users to specify their attack scenarios and call these APIs for their studies. While this work is in an early stage, we illustrate the utility of such a simulator using a case study for the Shenzhen metro system.
Cyber security has emerged as an important issue for urban railway systems (URS) due to the incre... more Cyber security has emerged as an important issue for urban railway systems (URS) due to the increasing usage of information and communication technologies (ICT). As a safety-critical public infrastructure with complex, interconnected, and often legacy systems, URS pose challenges for stakeholders seeking to understand cyber threats and their impact, and prioritize investments and hardening efforts. However, other critical infrastructure industries such as the energy sector offer best practices, risk assessment methodologies, and tools that may be both useful and transferable to the railway domain. In this work we consider one successful security initiative from the energy sector in North America, the development of common failure scenarios and impact analysis (NESCOR failure scenarios), and assess their applicability and utility in URS. We use a publicly-available software tool that supports failure scenario analysis to assess example failures on railway supervisory control systems ...
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017
The components and systems involved in railway operation are subject to stringent reliability and... more The components and systems involved in railway operation are subject to stringent reliability and safety requirements, but up until now the cyber security of those same systems has been largely under-explored. In this work, we examine a widely-used railway technology, track beacons or balises, which provide a train with its position on the track and often assist with accurate stopping at stations. Balises have been identified as one potential weak link in train signalling systems. We evaluate an automatic train stop controller that is used in real deployment and show that attackers who can compromise the availability or integrity of the balises' data can cause the trains to stop dozens of meters away from the right position, disrupting train service. To address this risk, we have developed a novel countermeasure that ensures the correct stopping of the trains in the presence of attacks, with only a small extra stopping delay.
This is an open access article under the terms of the Creative Commons Attribution License, which... more This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
Modern trains rely on balises (communication beacons) located on the track to provide location in... more Modern trains rely on balises (communication beacons) located on the track to provide location information as they traverse a rail network. Balises, such as those conforming to the Eurobalise standard, were not designed with security in mind and are thus vulnerable to cyber attacks targeting data availability, integrity, or authenticity. In this work, we discuss data integrity threats to balise transmission modules and use high-fidelity simulation to study the risks posed by data integrity attacks. To mitigate such risk, we propose a practical two-layer solution: At the device level, we design a lightweight and low-cost cryptographic solution to protect the integrity of the location information; at the system layer, we devise a secure hybrid train speed controller to mitigate the impact under various attacks. Our simulation results demonstrate the effectiveness of our proposed solutions.
This study investigated the safety and efficacy of the sodium-glucose co-transporter-2 (SGLT2) in... more This study investigated the safety and efficacy of the sodium-glucose co-transporter-2 (SGLT2) inhibitor luseogliflozin with differing carbohydrate intakes in Japanese individuals with type 2 diabetes (T2D). Participants were randomly assigned to 3 carbohydrate-adjusted meals for 14 days (days 1-14; a high carbohydrate [HC; 55% total energy carbohydrate] and high glycaemic index [HGI] meal; an HC [55% total energy carbohydrate] and low glycaemic index [LGI] meal; or a low carbohydrate [LC; 40% total energy carbohydrate] and HGI meal). All participants received luseogliflozin for the last 7 days (days 8-14), continuous glucose monitoring (CGM) before and after luseogliflozin treatment (days 5-8 and days 12-15) and blood tests on days 1, 8 and 15. Luseogliflozin significantly decreased the area under the curve and mean of CGM values in all 3 groups similarly. Fasting plasma glucose, insulin and glucagon were similar at all time points. Ketone bodies on day 15 were significantly higher...
Journal of the Dermatology Nurses’ Association, 2017
Segmental neurofibromatosis is a rare condition that most commonly affects women and presents as ... more Segmental neurofibromatosis is a rare condition that most commonly affects women and presents as neurofibromas, café au lait spots, and freckling. The neurofibromas usually occur in a dermatomal pattern, whereas the café au lait spots may follow Blaschko’s lines. There is often no family history. The etiology is due to a postzygotic mutation in the gene encoding neurofibromin. Histopathology reveals a tumorwith haphazardlyarranged spindle cells andapalemyxoid stroma frommucin deposition and fibroplasia. There have been few reported cases of segmental neurofibromatosis. In this case report, wewill discuss the clinical features, histopathology, differential diagnosis, and management of segmental neurofibromatosis.
Basal cell carcinoma (BCC) is the most common type of human malignancy. It is a slow-growing skin... more Basal cell carcinoma (BCC) is the most common type of human malignancy. It is a slow-growing skin cancer with little ability to metastasize, but it is aggressive and can cause local tissue destruction. Descriptions of Basal Cell Nevus Syndrome (BCNS), characterized by a predisposition to the formation of BCC and other neoplasms, and identification of the genetic defect in this syndrome, has led to significant advancement in our understanding of the pathogenesis of BCC. Unregulated expression of target genes in the sonic Hedgehog (SHH) signaling pathway plays a prominent role in the pathogenesis of BCC. An understanding of the signaling components has allowed for the development of pharmacologic agents that inhibit the SHH pathway. The first inhibitor of the SHH pathway approved by the Food and Drug Administration (FDA) for the treatment of BCC is vismodegib. In this review, we will discuss the biochemical pathways involved in BCC as targets of novel pharmacologic therapies.
Uploads
Papers by Bao anh Tran