Comparative Ultrastructural Analyses of Platelets and fibrin Networks Using the Murine Model of Asthma

In: Science

Submitted By vishwanathz
Words 5920
Pages 24

Experimental and Toxicologic Pathology 59 (2007) 105–114

Comparative ultrastructural analyses of platelets and fibrin networks using the murine model of asthma
E. PretoriusÃ, O.E. Ekpo, E. Smit
Department of Anatomy, School of Health Sciences, Faculty of Health Sciences, University of Pretoria, BMW Building, P.O. Box 2034, Pretoria 0001, South Africa Received 10 October 2006; accepted 13 February 2007

The murine Balb/c asthma model has been used successfully for a number of in vivo immunological applications and for testing novel therapeutics, and it is a reliable, clinically relevant facsimile of the human disease. Here we investigate whether this model can be used to study other components of the human body, e.g. ultrastrucure. In particular, we investigate the effect of the phytomedicine Euphorbia hirta (used to treat asthma), on the ultrastructure of fibrin as well as platelets, cellular structures that both play an important role in the coagulation process. Hydrocortisone is used as positive control. Ultrastructure of the fibrin networks and platelets of control mice were compared to mice that were asthmatic, treated with two concentrations of hydrocortisone and one concentration of the plant material. Results indicate control mice possess major, thick fibers and minor thin fibers as well as tight round platelet aggregates with typical pseudopodia formation. Minor fibers of asthmatic mice have a netlike appearance covering the major fibers, while the platelets seem to form loosely connected, granular aggregates. Both concentrations of hydrocortisone make the fibrin more fragile and that platelet morphology changes form a tight platelet aggregate to a more granular aggregate not closely fused to each other. We conclude that E. hirta does not impact on the fragility of the fibrin and that it prevents the minor fibers…...

Similar Documents

Osi Model and How It Relates to a Network

...Question: Write a 2-3 page paper describing the OSI model and how it relates to a network. Your response should include answers to the following: • On which layers of the OSI model do WAN protocols operate? • What are some of these protocols? • On which OSI layers do switches and routers operate? • If routers reside at more than one layer, what is the difference between the OSI layers? Introduction: The OSI model was introduced in 1984. Although it was designed to be an abstract model, the OSI model remains a practical framework for today's key network technologies like Ethernet and protocols like IP. The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper layers of the OSI model represent software that implements network services like encryption and connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control. In the OSI model, data communication starts with the top layer at the sending side, travels down the OSI model stack to the bottom layer, then traverses the network connection to the bottom layer on the receiving side, and up its OSI model stack. How OSI model relates to a network: Information being transferred from a software application in one computer system to a software application in another must pass through the OSI layers. For example, if a software application in System A has information to transmit to a software......

Words: 845 - Pages: 4

Using Uml to Model System

...INTRODUCTION This IDoc describes use of the Unified Modeling Language (UML) to model and document Accounting Information Systems (AIS). The objective of modeling AIS is multifaceted and can be to: visualize, understand, summarize, detail, analyze, design, develop, implement, operate, secure, control, or audit the AIS. UML is a powerful modeling language and technique for all of these modeling tasks and is more robust and semantically superior to the commonly used Structured Analysis (SA) modeling tools of flowcharts (FC), data flow diagrams (DFD), and entity-relationship diagrams (ERD). Dr. White suggests that using UML diagrams as a tool to document AIS is a viable alternative to the Structured Analysis’s diagrams of FC, DFD, and ERD. What follows in Section II is a brief comparison of the two alternative approaches to systems documentation: Structured Analysis (SA) and Object Orientation (OO). Section III presents the definition and description of the major structural and behavioral elements used in UML including classifiers, instances, relationships, collaborations, activities, interactions, and states. Section IV discusses the organization and presentation of UML documentation of AIS as a collection of diagrams and packages. Section V contains various UML diagrams of the business revenue cycle (system) as examples of how to use UML to document a business system. Section VI contains examples of UML models of two special systems of great importance to accountants:......

Words: 9812 - Pages: 40

A Comparative Study of "Fuzzy Logic, Genetic Algorithm & Neural Network" in Wireless Network Security

...A COMPARATIVE STUDY OF "FUZZY LOGIC, GENETIC ALGORITHM & NEURAL NETWORK" IN WIRELESS NETWORK SECURITY (WNS) ABSTRACT The more widespread use of networks meaning increased the risk of being attacked. In this study illustration to compares three AI techniques. Using for solving wireless network security problem (WNSP) in Intrusion Detection Systems in network security field. I will show the methods used in these systems, giving brief points of the design principles and the major trends. Artificial intelligence techniques are widely used in this area such as fuzzy logic, neural network and Genetic algorithms. In this paper, I will focus on the fuzzy logic, neural network and Genetic algorithm technique and how it could be used in Intrusion Detection Systems giving some examples of systems and experiments proposed in this field. The purpose of this paper is comparative analysis between three AI techniques in network security domain. 1 INTRODUCTION This paper shows a general overview of Intrusion Detection Systems (IDS) and the methods used in these systems, giving brief points of the design principles and the major trends. Hacking, Viruses, Worms and Trojan horses are various of the main attacks that fear any network systems. However, the increasing dependency on networks has increased in order to make safe the information that might be to arrive by them. As we know artificial intelligence has many techniques are widely used in this area such as fuzzy logic,......

Words: 2853 - Pages: 12

Platelet Rich Plasma in Treatment Ofskin Scars

...Guidelines for the Use of Platelet Rich Plasma The International Cellular Medical Society Presented by DRAFT Version 1.0 Committee Members Kim Harmon, MD Ron Hanson, MD Jay Bowen, MD Scott Greenberg, MD Ed Magaziner, MD James Vandenbosch David Harshfield, MD Brian Shiple, MD David Audley The International Cellular Medical Society (ICMS) asserts that a need exists to create standards for platelet rich plasma (PRP) protocols, preparations, techniques and tracking. We believe that physicianled organizations will serve the needs and interests of both patients and physicians toward achieving the best outcomes. In order to advance PRP in particular (and autologous cellular medicine therapies in general), we have developed these guidelines to assist physicians in performing safe therapies, promote patient education, encourage robust clinical research and begin to define the scope and anticipated effects of these procedures. Platelet Rich Plasma: Historical Perspective The application of PRP has been documented in many fields. First promoted by M. Ferrari in 1987 (1) as an autologous transfusion component after an open heart operation to avoid homologous blood product transfusion, there are now over 5200 entries in the NCBI for PRP ranging in fields from orthopedics, sports medicine, dentistry, otolaryngology, neurosurgery, ophthalmology, urology, wound healing, cosmetic, cardiothoracic and maxillofacial surgery. The initial popularity of PRP grew from its promise as a safe...

Words: 4519 - Pages: 19

Model Checking Using Pat

...Automatic Model Checking of State Machines A seminar report submitted to MANIPAL UNIVERSITY For Partial Fulfillment of the Requirement for the Award of the Degree of Master of Technology in Software Engineering by Anusha A Reg. No. 130928001 February 2014 Abstract The idea of Model Driven Development (MDD) is to specify requirements of systems in a formal (usually graphical) notation. UML is the initial and dominant modelling phase in software engineering arena. If errors are occurring in this phase of software development itself, it will cost a lot. Hence it is crucial to detect model level errors in the initial phase rather than later stages of software development. An approach to automatically verifying models composed of UML state machines. This approach helps in checking safety/liveness, properties, trace refinement, relationships and so on with the help of PAT (Process Analysis Toolkit) and CSP (communicating sequential programs). 1 1 1.1 Introduction State Machines The concepts behind state machines are about organizing the way a device, computer program, or other (often technical) process works such that an entity or each of its sub-entities is always in exactly one of a number of possible states and where there are well-defined conditional transitions between these states. The UML state diagrams are directed graphs in which nodes denote states and connectors denote state transitions. In UML, states are represented as rounded rectangles......

Words: 2632 - Pages: 11

Tra Using Advice Model

...Introduction TRA is an acronym that means Transfer, Retention and Application. TRA could be done using ADVISE model. ADVISE is an acronym that means: • A for analytical learning. • D for Descriptive learning. • V for Visualization of ideas. • I for Interactive assessment. • S for Split testing. • E for Experiential learning. TRA Transfer Knowledge is being transfer to the student using different methods as video and case studies and presentations. Presentations and videos are powerful tools that helped me in the past to gain the knowledge I need. Retention Group discussion in my opinion is useful method that helps retaining knowledge and information. Application I found through practice the best way to retain knowledge is to apply it in real situation or teaching it to others. ADVICE Model I recently encountered at work an incident that I had to investigate the reason for failing proficiency. Using Root cause analysis method (RCA) I first analyze the steps being involved in processing the proficiency samples starting from receiving to reporting the results to NYSDOH. I also had to interact with the people who handled the specimens. I found out the specimens was stored correctly upon receiving than was ordered in the system and labeled correctly. I looked at all variables that could affect testing process, from temperature, human error, reagents and quality controls. I questioned the technologist who ran the specimen on the steps he did to analyze the......

Words: 403 - Pages: 2

Segmentation Using Neural Networks

...SEGMENTATION WITH NEURAL NETWORK B.Prasanna Rahul Radhakrishnan Valliammai Engineering College Valliammai Engineering College Abstract: Our paper work is on Segmentation by Neural networks. Neural networks computation offers a wide range of different algorithms for both unsupervised clustering (UC) and supervised classification (SC). In this paper we approached an algorithmic method that aims to combine UC and SC, where the information obtained during UC is not discarded, but is used as an initial step toward subsequent SC. Thus, the power of both image analysis strategies can be combined in an integrative computational procedure. This is achieved by applying “Hyper-BF network”. Here we worked a different procedures for the training, preprocessing and vector quantization in the application to medical image segmentation and also present the segmentation results for multispectral 3D MRI data sets of the human brain with respect to the tissue classes “ Gray matter”, “ White matter” and “ Cerebrospinal fluid”. We correlate manual and semi automatic methods with the results. Keywords: Image analysis, Hebbian learning rule, Euclidean metric, multi spectral image segmentation, contour tracing. Introduction: Segmentation can be defined as the identification of meaningful image components. It is a fundamental task in image processing providing the basis for any kind......

Words: 2010 - Pages: 9

A Comparative Analysis of the Effectiveness of Three Solvency Management Models

...A Comparative Analysis Of The Effectiveness Of Three Solvency Management Models By Enyi, Patrick Enyi Ph.D, MBA, B.Sc, ACA, ACCA, MFP, RFS. Fellow, American Academy of Financial Management (AAFM) Member, American Accounting Association (AAA) Head, Department of Accounting, Covenant University, Ota, Nigeria A Comparative Analysis Of The Effectiveness Of Three Solvency Management Models Abstract The introduction of the Altman’s Z-score model in 1983 and much recently the Enyi’s Relative Solvency Ratio model in 2005 has divergently provided financial analysts with alternative methods of analyzing corporate solvency which hitherto was exclusively done using the traditional historical record based ratio analysis, with particular reference to the current ratio. To test the relevance and effectiveness of the three models, real life performance data were extracted from the annual reports of 7 quoted companies, analyzed using the three models and the results compared to show the strengths and weaknesses of each. The result revealed that the current ratio and the Z-score models suffer from many limitations including imprecision while the Relative Solvency Ratio combines the capability of an effective indicator with the precision required of a true predictor. Keywords: Solvency, Liquidity, Ratio Analysis, Bankruptcy, Performance, Relative Solvency, Working Capital, Current Ratio, Current Assets, Balance Sheet 1. Introduction It is a proven fact over and......

Words: 6174 - Pages: 25

Relfective Using Gibbs Model

...reflection is important whereby it helps to identify strengths and weaknesses. Jarvis (1992) mentioned that reflective practice can also be known as a learning process through and from the experiences towards gaining new ideas. The two type of reflective practice by Schon (1987) are the capacity in reflecting in action and on reflecting on action. Based on Schon (1987) theory reflection in action is a process which allows us to reshape what we are working on, while we are working on it. On the other hand, reflecting on action and thinking back on what we have done in order to discover how our knowing in action may have contributed to an unexpected outcome. There are many types of reflective theory to reflect on action. Gibbs Model of Reflection is a common model of reflection that is used within the health professions. It consists of 6 stages which are descriptive, feelings, evaluation, analysis, conclusion and action plan. Description Since graduation till date, I have been working in multidisciplinary ward in a private hospital in southern of Malaysia. I was the team leader for that day and upon taking over report, I felt anxious and worried as I have to work with two junior staff nurse and hospital aide on that particular day. There were a total of 20 patients on that day. Two patients were planned for operation and one patient was to be discharged and three patients were planned for admission. At 1700H, I received call from the operation theatre (OT) and therefore......

Words: 1006 - Pages: 5

Network Reference Models

...NT1210 Unit 3 Lab 3.1: Network Reference Models 1. Why would a three- layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication? The three-layer model of communication would be insufficient to adequately describe network communication because because it would not have the ability to transport data to any other network. 2. What is the history of the OSI reference model? How did it come about and why was it created? Use your textbook and Internet research to support your answer. In the late 1970s, two projects began independently, with the same goal: to define a unifying standard for the architecture of networking systems. One was administered by the International Organization for Standardization (ISO), while the other was undertaken by the International Telegraph and Telephone Consultative Committee, or CCITT (the abbreviation is from the French version of the name). These two international standards bodies each developed a document that defined similar networking models. In 1983, these two documents were merged together to form a standard called The Basic Reference Model for Open Systems Interconnection. 3. What is the history of the TCP/ IP model? Why was it created? Use your textbook and Internet research to support your answer. TCP/IP originated out of the investigative research into networking protocols that the US Department of Defense (DoD) initiated in 1969. In 1968...

Words: 309 - Pages: 2

Ism Model for Analyses

...matrix (RM) and its transitivity is checked. Once transitivity embedding is complete, a matrix model is obtained. Then, the partitioning of the elements and an extraction of the structural model called ISM is derived. In this paper, key concept of ISM approach is discussed in detail. Keywords: ISM, SSIM, RM, variable, modelling. Introduction It is generally felt that individuals or groups encounter difficulties in dealing with complex issues or systems. The complexity of the issues or systems is due to the presence of a large number of elements and interactions among these elements. The presence of directly or indirectly related elements complicates the structure of the system which may or may not be articulated in a clear fashion. It becomes difficult to deal with such a system in which structure is not clearly defined. Hence, it necessitates the development of a methodology which aids in identifying a structure within a system. Interpretive structural modelling (ISM) is such a methodology1. ISM is defined as a process aimed at assisting the human being to better understand what he/she believes and to recognise clearly what he/she does not know. Its most essential function is organisational. The information added (by the process) is zero. The value added is structural2. The ISM process transforms unclear, poorly articulated mental models of systems into visible and well-defined models. Interpretive structural modelling (ISM): ISM is an interactive learning process. In......

Words: 4774 - Pages: 20

Network Model and Review

...Computers and Technology Nt1210 Lab 3 Lab 3.1 Network Reference Models Exercise 3.1.1: What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? If wireless devices had no governance or set of rules to abide by, it would greatly impact everything we do day to day. Think of the hidden security that we have now with wireless. If that was gone it would be easier for someone to acquire your information, such as your social security number, your bank account information. What the Wi-Fi Alliance does is gives us piece of mind. How many people today know about the Wi-Fi Alliance? I believe, unfortunately, not enough people. Exercise 3.1.2: Give another example of a model that is used to visualize something that is difficult to observe or perceive. How does the model make it easier to understand? My example is Mind Mapping. With Mind Mapping it’s very easy to collaborate all your ideas, thoughts, notes, and references all in one place. I think it would be easier to show someone what it is you’re talking about. And by adding all your information into the Mind Map, it’s very easy to explain to someone (like a Lab Partner) where you’re coming from and how you’re seeing the issue or problem at hand. Exercise 3.1.3: Based on what you already know about networks, what are the different layers you think would be......

Words: 354 - Pages: 2

Thermal Power Plant Analysis Using Artificial Neural Network

...Analysis Using Artificial Neural Network Purva Deshpande1, Nilima Warke2, Prakash Khandare3, Vijay Deshpande4 VESIT, Chembur,, 3,4 Mahagenco, Mumbai., 1,2 Abstract--Coal-based thermal power stations are the leaders in electricity generation in India and are highly complex nonlinear systems. The thermal performance data obtained from MAHAGENCO KORADI UNIT 5 thermal power plant shows that heat rate and boiler efficiency is changing constantly and the plant is probably losing some Megawatts of electric power, and more fuel usage thus resulting in much higher carbon footprints. It is very difficult to analyse the raw data recorded weekly during the full power operation of the plant because a thermal power plant is a very complex system with thousands of parameters. Thus there is a need for nonlinear modeling for the power plant performance analysis in order to meet the growing demands of economic and operational requirements. The intention of this paper is to give an overview of using artificial neural network (ANN) techniques in power systems. Here Back Propagation Neural Network (BPNN) and Radial Basis Neural Network (RBNN) are used for comparative purposes to model the thermodynamic process of a coal-fired power plant, based on actual plant data and this works as the internal model for prediction of the Heat Rate and Boiler Efficiency. This......

Words: 3399 - Pages: 14

Using Neural Networks to Forecast Stock Markets

...Using Neural Networks to Forecast Stock Market Prices Abstract This paper is a survey on the application of neural networks in forecasting stock market prices. With their ability to discover patterns in nonlinear and chaotic systems, neural networks offer the ability to predict market directions more accurately than current techniques. Common market analysis techniques such as technical analysis, fundamental analysis, and regression are discussed and compared with neural network performance. Also, the Efficient Market Hypothesis (EMH) is presented and contrasted with chaos theory and neural networks. This paper refutes the EMH based on previous neural network work. Finally, future directions for applying neural networks to the financial markets are discussed. 1 Introduction From the beginning of time it has been man’s common goal to make his life easier. The prevailing notion in society is that wealth brings comfort and luxury, so it is not surprising that there has been so much work done on ways to predict the markets. Various technical, fundamental, and statistical indicators have been proposed and used with varying results. However, no one technique or combination of techniques has been successful enough to consistently "beat the market". With the development of neural networks, researchers and investors are hoping that the market mysteries can be unraveled. This paper is a survey of current market forecasting techniques with an emphasis on why they are......

Words: 6887 - Pages: 28

Introductory Network Concepts, Network Standards, and the Osi Model

...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is......

Words: 845 - Pages: 4