OBJECTIVES:The objective of this study is to analyze the second-trimester fetal autopsies and to reemphasize the role of autopsy by comparing autopsy findings with prenatal ultrasound observations.MATERIALS AND METHODS:Retrospective analysis of second-trimester fetal autopsies over a period of 7.5 years (January 2009–June 2016). A standard protocol of autopsy procedure was followed, which included external examination with photography, X-ray, internal examination, and histopathological examination. In fetuses with congenital malformations (CMs), the findings of prenatal ultrasonogram and autopsy examination were compared.RESULTS:We analyzed a total of 66 fetuses, which includes 17 intrauterine fetal death, 49 terminations for CM, and increased risk for chromosomal abnormality. In fetuses with CM, multiple anomalies were more common than a single anomaly. The most common anomalies were seen involving central nervous system (neural tube defect) followed by the genitourinary system. Autopsy confirmed prenatal ultrasound findings in all cases except three. Complete agreement between USG findings and autopsy were seen in 17 cases (39.7%). Additional findings on autopsy were noted in 25 cases (62.2%). Among these, 15 cases had a significant change of recurrence risk due to altered initial ultrasound diagnosis.CONCLUSION:Fetal autopsy plays an important role in arriving at the final diagnosis and detecting the cause of death. This information is very essential for the clinicians, in genetic counseling of the parents, and management of future pregnancies.
Software-Defined Networking (SDN) simplifies the network management and provides a way to virtualize, configure, and manage the network infrastructure centrally. The central management has been exhibited by reinforcing an SDN controller, which separates the network data plane from the control functions and is responsible for managing the flows. Distributed Denial-of-Service (DDoS) attacks are the most threatening issue among many security attacks, and it makes the services unavailable in a network. The flow management done by the controller is disrupted when one or more malicious host flood User Datagram Protocol (UDP) packets in the network, focusing on exhausting the bandwidth of the controller. It results in degrading the performance of the controller, leading to control plane saturation. A Secure Flow Management model (SFM), which dynamically identifies and mitigates the UDP flooding attack in a multicontroller SDN has been proposed. The proposed model is a practically applicable defense mechanism against volumetric attack, and it tries to secure the control plane bandwidth.The SFM has been experimented as an extension of the RYU controller and has exploited the attack under different traffic scenarios. Further, an analysis has been made on response time and the CPU utilization taken by the controller to recover from the DoS attack. KEYWORDSinterdomain attack, intradomain attack, multicontroller software-defined network (SDN), pushback requests, secure flow management, UDP flooding attack 1 INTRODUCTION Software-Defined Networking (SDN) is an emerging technology in networking where all the control functions are centralized within the SDN controller, and it is done by the logical separation of the control and data planes. 1 SDN applications communicate with the SDN controller via a northbound interface (eg, REST and Java APIs). OpenFlow (OF) acts as a southbound interface that supports the communication between the SDN controller and the OF switches. The controller has the responsibility of transferring the forwarding rules to the flow table of the corresponding switch. 2 OF protocol is the base for the development of SDN architecture. OF has actually been developed to make experiments and innovations with new protocols in networking. The network communication in SDN is abstracted in the form of flows. A sequence of packets with same header fields belongs to a flow. The OF switches consist of flow tables, each containing a set of rules that specify how to forward the packets. Each rule has a matching pattern, action field, priority, and a counter. When there is an incoming packet, the OF switch searches for the matching pattern; if it exists, it continues with that rule. Otherwise, the corresponding switch sends a Packet-In message to the controller. The benefits of SDN such as enhanced configuration of networking devices, reduced cost of management, and improved performance, make this new networking paradigm to be used in enterprises, data centers, and other large-scale networks. 3 Distributed Denial-of-Servi...
Background:Histopathological study of alopecia generally requires both vertical and transverse sections (VS and TS) and this may demand the need for multiple scalp biopsy samples. Here, we suggest a new processing technique which provides both VS and TS from a single biopsy, thus making the interpretation easier.Materials and Methods:All formalin-fixed scalp biopsy specimens were processed routinely. Nine VS were taken and mounted on 3 glass slides. The block was then melted and the tissue reembedded with the subcutaneous tissue facing downward and the epidermal aspect toward the technician to obtain TSs. Serial 4 μ sections were cut until the tissue was exhausted and every 25th section was mounted on glass slides and stained with H and E.Results:100 scalp biopsy specimens with the history of alopecia have been processed using this technique. The technique provides proper visualization of both VS and TS from a single scalp biopsy without compromising the quality. Further, evaluation of the remaining sections with application of special stains can also be possible with this technique which will maximize the information and contribute to the accurate diagnosis of various types of alopecia.Conclusions:This technique can be used to obtain diagnostically satisfactory VS and TS from a single scalp biopsy specimen by modifying the embedding procedure, thereby avoiding the need for a second biopsy. All types of alopecia can be diagnosed by this effective method.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.