Disruption of type III secretion in Salmonella enterica serovar Typhimurium by external gui
- 格式:pdf
- 大小:183.07 KB
- 文档页数:7
韩美娟1,2 1. 河北北方学院药学院,2. 河北北方学院附属第一医院药学部,【摘要】铜绿假单胞菌或获得性耐药。
究PA分泌系统毒力因子的致病机制对预防和治疗其引起的感染具有重要意义。
【关键词】铜绿假单胞菌;【中图分类号】Research Progress on the Secretion System and Virulence Factors of Pseudomonas Aeruginosa外膜中的促胰液素复合物组成。
其中促胰液素所包含的结构已知的膜嵌入C 端结构域和模块化的周质N 端结构域,又与聚集底物和连接内膜配置有关。
其独特的结构组成有利于PA 将结构化的效应蛋白经细胞周表1 I 型分泌系统分泌的毒力因子毒力因子分类活性功能AprA 碱性蛋白酶[3]胞外酶锌依赖性金属蛋白酶破坏已形成的嗜中性粒细胞加重宿主感染;切割宿主免疫补体C2和C3;降解细胞因子干扰素(INF )-λ和肿瘤坏死因子(TNF )- αHasAp [4] 铁卟啉化合物血红素获得蛋白获取建立感染的必需营养素-铁;血红素的获取和代谢对慢性和急性感染至关重要AprX 碱性胞外酶锌依赖性金属尚不明确蛋白酶[5]蛋白酶表2 Ⅱ型分泌系统分泌的毒力因子T2SS 亚型毒力因子分类活性功能Xcp 系统LasA 弹性蛋白酶(金属蛋白酶)[9]胞外酶β-裂解金属肽酶/丝氨酸蛋白酶切割甘氨酸-甘氨酸肽键;分解宿主细胞表面蛋白多糖,影响信号转导;增强LasB 弹性蛋白酶的裂解活性LasB 弹性蛋白酶[10]胞外酶M4热熔素肽酶家族/锌依赖性金属蛋白酶对宿主防御系统具有强降解性(例如表面活性蛋白a 和D 、补体和粘蛋白);降解宿主细胞组织蛋白(例如弹性蛋白和胶原蛋白);阻碍体内离子转运并损伤天然免疫系统,还可能释放利于细菌存活的营养素,在初始发病阶段发挥重要作用PlcH [11]胞外酶溶血性磷脂酶C 降解磷脂酰胆碱或鞘磷脂,破坏真核细胞结构,为细菌生长提供营养PlcN [12]胞外酶非溶血性磷脂酶C 降解磷脂酰丝氨酸和磷脂酰胆碱产生磷酸酯PlcB [13]胞外酶磷脂酰乙醇胺-磷脂酶C水解磷脂酰胆碱和磷脂酰乙醇胺;破坏宿主细胞外膜和遗传物质完整性CbpD 几丁质结合蛋白[14]胞内酶裂解性多糖单加氧酶为细菌在血液中存活提供条件,其催化活性对毒力有实质贡献;影响先天免疫和后天免疫外毒素A (ToxA )[15]胞外酶ADP -核糖基转移酶参与宿主蛋白合成,突出细胞毒性作用;破坏宿主固有免疫和获得性免疫;损伤细胞组织PrpL[16]胞外酶赖氨酸特异性内肽酶(蛋白酶Ⅳ)降解纤溶酶原免疫球蛋白和补体成分;抑制成纤细胞、角质形成细胞和内皮细胞的生成;切割白细胞介素(IL -22),破坏先天防御屏障LipA [17] 胞外酶三酰基甘油酰水解酶通过静电作用与细菌外膜基质中的多糖海藻酸盐相互作用,促进生物膜的形成LipC[18]胞外酶脂肪酶促进细胞聚集,影响细菌生物膜的遗传特性,直接或间接的影响黏液性生物膜的形成;可能还与细菌游动以及鼠李糖脂的形成有关PhoA [19] 胞外酶碱性磷酸酶去除核苷酸、蛋白质以及生物碱中的磷酸基团;在碱性条件下发挥出更强的作用PaAP [20]胞外酶氨肽酶满足细菌利用蛋白质作为营养供应的需求;与细菌外膜囊泡形成有关;影响细菌生物膜的形成绿脓素(PCN )[21]次级代谢产物,三环吩嗪氧化-还原活性两性离子具有肠道吸收、血浆蛋白结合潜力和跨生物膜通透性;重要的氧化还原性毒力因子;诱导中性粒细胞凋亡,破坏免疫调节功能,增加细胞毒性Hxc 系统LapA 磷酸结合蛋白[22]胞外酶碱性磷酸酶在细菌生物膜的形成中至关重要Txc 系统CbpE [23]膜蛋白甲壳素结合蛋白与CbpD 具有部分同源性;与细菌的发育、黏附和信号转导有关;可当作碳源质分泌到宿主细胞的外环境,进而导致一系列的细胞损伤[7]。
S ECURITY E NGINEERING WITH P ATTERNSMarkus Schumacher1and Utz Roedig2Darmstadt University of TechnologyDepartment of Computer Science1IT Transfer Office(ITO)markus.schumacher@ito.tu-darmstadt.de2Industrial Process and System Communications(KOM)utz.roedig@kom.tu-darmstadt.de6th March2002AbstractConducting digital business requires secure network and application architectures.The recently increasing occurrence of severe attacks has shown,however,that we will still need quite some time and effort to reachsecurity standards of IT systems alike the standard already usual in otherfields.At present,there is a huge gapbetween theory and the code of practice.Whereas scientists work on formal approaches for the specification andverification of security requirements,practitioners have to meet the users’requirements.The Pattern Communityrecognized this problem,too.Patterns literally capture the experience from experts in a structured way.Thusnovices can benefit from know-how and skills of experts.Hence,we propose to apply the pattern approach to thesecurity problem.We show that recent security approaches are not sufficient and describe how Security Patternscontribute to the overall process of security engineering.A Security Pattern System provides linkage betweenSecurity Patterns.Thus dependencies between specific security problems can be considered in a comprehensiveway.1IntroductionConducting digital business requires secure network and application architectures.The result of a well-engineered security system must be an architecture that ensures specific security aspects such as privacy,confidentiality, integrity and availability.The occurrence of the Love Letter virus or the Distributed Denial-of-Service attacks against famous web sites in the beginning of2000has shown,however,that we will still need quite some time and effort to reach security standards of IT systems alike the standard already usual in otherfields.The following examples show that we obviously do not learn from past security incidents and that we make the same mistakes over and over again:1.Virus Attacks.In March1999,the Melissa macro virus within a Microsoft Word document having beendistributed via the email program Microsoft Outlook,caused severe damage(about80million dollars).The reason was that Microsoft Word was able to(mis)use the e-mail interface of Microsoft Outlook.In March2000,the Love Letter virus caused a damage of10billion dollars.This virus used almost the same methods as thefirst one,i.e.the e-mail functions of Microsoft Outlook could be used to spread all around the world.2.Virtual Private Networks(VPN).The specification of the Point to Point tunneling Protocol(PPTP)isconsidered to be secure.During the implementation for the Windows NT platform some basic mistakes have been made though[SM98].The establishment of an encrypted link requires a shared secret between both VPN endpoints.Unfortunately,the chosen shared secret based on the Windows password scheme, which is known to be breakable and insecure.As a consequence,the overall implementation of PPTP was insecure.A very important issue is a more comprehensive view of security since security obeys the rule that a chain is as weak as its weakest link.At present,there is a huge gap between theory and the code of practice.Scientists develop formal approaches for the specification and verification of security requirements of IT-systems.The prac-titioners follow specific methodologies in order to meet the users’requirements such as performance,usability, and reliability.Unfortunately,security is merely treated as add-on.Furthermore,today’s software engineering practices don’t consider security sufficiently.The Pattern Community is aware of this problem,too.Patterns are a concept to solve recurring design prob-lems in a literary form.As written in[Cop97]”each pattern is a relationship between a certain context,a certain system of forces which occurs repeatedly in that context,and a certain spatial configuration which allows these forces to resolve themselves.”Patterns capture the experience from experts in a structured way.Thus novices can benefit from know-how and skills of people who have put more effort into understanding contexts,forces,and solutions than novices have done or want to do.As there is a visible deficit in security engineering,we propose to apply the pattern approach to the security problem.A Security Pattern System provides linkage between various Security Patterns.Thus dependencies between specific security problems can be considered in a comprehensive way.As shown in this paper Security Patterns have several advantages:•Novices can act as security experts.•Security experts can identify,name and discuss both problems and solutions more efficiently.•Problems are solved in a structured way.•Dependencies of components can be identified and considered appropriately.The remainder of this paper is organized as follows:in Section2we describe basic reasons for the problems in thefield of IT-security.In Section3we compare some well-known methodological approaches for establishing security.We have a look at the benefits and drawbacks of each concept.In Section4the concept of security patterns is introduced.We redefine a template for security patterns,present some basic definitions and the related work.In Section5we envision the possibilities of security engineering with patterns.In order to underline this we show the benefits of this approach with a real world scenario.Finally,a summary of the contribution of this document and an outlook into the future work is given in Section6.Appendix A contains the pattern system we used in this document.2Security and the Human FactorThe main reason for the existing problems is that security engineering is no technical problem in thefirst place. Security is always implemented by humans on request of humans.Thus the human factor influences IT-security in significant ways:•Security engineering by non security experts.With the exception of cryptography,the science of IT security is quite new and covers multiple disciplines such as operating systems,computer networks and software engineering.It is very difficult to make IT-systems secure as there are many different components and mechanisms involved.In addition,trust relationships change frequently,which makes an analysis of all security requirements very hard.One cannot assume that the average system developer or architect isa skilled security expert,too.We should notice that in most cases security engineering is done by non-security experts.For example,the developer of an IT-system has to implement the necessary security features to some extent as an add-on.In most cases the developer is an expert regarding the system’s functionality,but not regarding its security.•Structured problem solution.When people try tofind a solution for a problem,they often follow an ad-hoc approach.The impact on elements aside the adopted solution are overseen in most cases[Dor97].A good example is the handling of system passwords:a system administrator wants to prevent that theusers chose weak passwords.Thus he configures the system to enforce strong passwords,i.e.a user cannot enter passwords that don’t meet certain criteria(password must not be contained in a dictionary).This solution is straight forward.Unfortunately,the administrator doesn’t realize that nobody can remember strong passwords any longer.As a consequence,users might start to write their passwords on a slip of paper that could be found under their keyboard,or even worse,pinned on their monitor.•Scope dependencies and completeness.IT-security is a very complex area with manifold dependencies.Even if all dependencies are identified,it might be difficult to consider all of them appropriately.A Web server serves as a good example:the administrator canfigure out whether the Web server software is secure or not.But probably he cannot decide whether the combination of Web server,operating system and hardware components is secure.The overall system is too complex to be considered as a whole.Often, the developer or administrator of a specific component doesn’t even want to worry about security outside his area of responsibility,e.g.the Webmaster only cares about his Web server.Security engineering making sense should be possible without knowledge of the whole security scope and all its dependencies.•Time dependencies.IT-Security is also time-dependent.A system that is considered to be secure today may be insecure tomorrow.Statements about the system’s security are only valid with time references.For instance,the strength of cryptographic algorithms typically is founded on difficult mathematical problems.If a geniusfinds a solution for such a problem,security suddenly disappears.Security engineering could be done more efficiently if people get support with handling the aspects described above.This support should comprise appropriate methods and tools.3Methodologies for Security EngineeringIn recent years a number of security methodologies have been developed to assist organizations in establishing and maintaining security.These methods differ regarding their structure,granularity,flexibility,usability,costs, or whether they are formal or informal.In this section we outline the characteristics of some well known methods. Then we describe how the aspects stated in the previous Section are addressed.3.1Security PolicySecurity activities usually begin with the development of a security policy.In general policies describe the use of an institution’s information.At a system level,the security policy enumerates objects and assets as well as threats targeted on them.Furthermore,the security-level envisaged is described[CZ95].Subsequently this security policy is applied to IT-systems.In practice,the security policy is a simple informal text document.Regarding the problems stated in Section2,an informal security policy has several serious drawbacks:it does not help to recognize dependencies between various aspects,it contains a monolithic and linear description of problems and solutions,interferences of different sections are not obvious.Furthermore,real-world security policies never reflect the actual security situation and are always out-dated,as many parameters(e.g.requirements or attacks)change frequently.Besides,the person writing the document has to know a lot about security,as no aspect of security should be missed.3.2Evaluation CriteriaThe evaluation of the security of IT-systems is very important for military,intelligence and more and more public organizations.Thus a variety of evaluation criteria and security guideline documents have been developed by various governments in cooperation with some large organizations.Prominent examples are the Trusted Computer System Evaluation Criteria(also known as“Orange Book”)and the Common Criteria.All criteria define different levels at which IT-systems can be evaluated and compared.The levels represent different sets of functionality and an increasing level of assurance.The primary goal is to prove that the system fulfills certain requirements regarding its protection mechanisms and that the correctness of the implementation meets a certain assurance level.However,evaluation criteria have the following drawbacks:they focus on individual targets of evaluation (TOE).Therefore dependencies to other IT-systems and components could be missed easily.Besides,the evalu-ation of IT-systems according to any criteria is a costly and time-consuming task.Thus it is difficult to keep the evaluation results of a TOE up-to-date.Furthermore,it is difficult for the layman to perform such evaluations as the process very complex and requires a lot of background knowledge.3.3Tree RepresentationsSeveral approaches with symbolic tree representations have been developed.Typically they are often based on AND/OR trees that allow some basic calculations if values are assigned to the nodes such as the cost of an attack. The values can be propagated up the tree to the root.Another result could be which attack would be the most likely one,if the values possible and impossible are assigned to the tree nodes.There are Fault Trees(determine system failures that could stop the functionality of a system,see[KM94]),Threat Trees(identify threats to a system,see[Amo94])and Attack Trees(identify possible attacks to a system,see[Sch99]).As the tree approaches cover only single aspects,they can only be a part of an overall security methodology. Tree approaches are a good way to identify threats,faults,or attacks in a systematic way.On the other hand the process of creating any of these trees still requires a lot of security know-how.If you are a novice in thefield of security,it is very likely that you will forget some aspects but as written in[Sch00]“creating(attack)trees requires a certain mindset and takes practice”and“you’ll get better with time”.As a sufficient coverage of all considered aspects(e.g.attacks or threats)is desired,something like a(e.g.public)tree repository is needed. Furthermore,periodical reviews have to defined in order to keep the trees up-to-date.3.4Formal MethodsSecurity is a current hot topic in the formal methods community.Typically formal methods are applied to proto-cols for authentication,fair exchange,electronic commerce,and electronic auctions.Policies in a formal way and especially authorization policies are used in the area of management of dis-tributed systems.There exists different languages[DDLS01]to describe policies in a formal way and also mechanisms to check consistency and conflicts[SX01].Typically formal methods are applied only to specific problem areas such as smart-cards or cryptographic rger systems cannot be handled with formal methods due to increased complexity and dependencies. They deliver important contributions to thefield of security.But the layman cannot be expected to have the required mathematical background.The verification of a system can be only as good as the assumptions that have been postulated.Thus the biggest challenges of the formal method community will always be to improve the specification capabilities.This could be a difficult task as systems become more and more complex.Other exercises will be to push the integration of formal methods into the overall process of engineering,to obtain tool support,and to cope with partial specifications.3.5Semi-formal ApproachesData-,function-and object-oriented modeling methods are counted among the semi-formal approaches.They are characterized through different graphical elements but also linguistic elements.An example of data modeling techniques is Entity Relationship Modeling(ERM),for object-oriented modeling the Unified Modeling Language (UML).The usage of UML class diagrams offer the possibility to describe a role,his characteristics and relations between roles.Statecharts can be used to describe the behavior of elements or roles.Activity graphs,sequence diagrams,and collaboration diagrams are used to describe the cooperation of the different elements of the whole system.Condensed,regarding to the aspects from Section2,semi-formal approaches,especially UML,offer a struc-tured way to describe systems and possibilities to show dependencies between elements.The disadvantage of these methods is that an automated validation isn’t possible.However,UML can be made more formal by writing constraints in Object Constraint Language(OCL)as part of the model.The advantages of these methods espe-cially of UML over the formal methods are that they are human-readable,depict and useful for non-modeling experts also.4Security PatternsPatterns are a hot topic in the software community.They describe recurring solutions to common problems in a given context and system of forces[Ale79].Meanwhile patterns can be found in many problem domains,e.g. Human Computer Interaction(HCI)or Teaching and Learning.In this section we define some basic terms and concepts of security patterns.Furthermore,we present the related work.4.1Template for Security PatternsPatterns are a literary format for capturing insights and experience of expert designers and communicating it to novices.Both the definitions of a security pattern and a security pattern system that are presented below are based on the descriptions that are given in[BMR+96].We show what additional aspects are necessary to make a pattern to a security pattern.Definition1(Security Pattern)A security pattern describes a particular recurring security problem that arises in specific contexts and presents a well-proven generic scheme for its solution.The more information a pattern has,the more important structure becomes[Vli96].Structure leads to uni-formity of patterns.Thus people can compare them easily and search for information in a systematic way.Less structure means more informal text,which might befine for casual reading but unacceptable for comparison and reference purposes.Introducing the key elements of security patterns we follow the Mandatory Elements Present pattern[MD96].We make use of the terminology given in the Common Criteria[CC99].•Name:Certainly security patterns aren’t different to“normal”patterns with regard to their name.The name of the pattern becomes a part of the vocabulary of the community.It should be easy to remember and refer to.A good name should be evocative and give an image what the pattern might be about.•Context(and Related Patterns):Based on a scenario the context of the security pattern is illustrated.The general conditions under which the problem does occur and which forces do emerge are described.It is useful to list context setting security patterns,too.As some countermeasures may introduce other vulnerabilities,additional security patterns should be considered in the related patterns section,too.The same is valid for problems that are solved partly or couldn’t be considered within the given security pattern.That way a pattern hierarchy will be formed.•Problem:The Problem statement defines the problem that will be solved by the security pattern.The major aspects of the problem are elaborated by the viewpoint of the Forces to be solved.In thefield of security a problem occurs whenever a system component is protected in an insufficient way against abuse.Generally spoken we have to deal with generic Threats i.e.a potential for the violation of security.A threat is a possible danger that exploit Vulnerabilities.A typical threat action is an Attack that lead to security violations such as disclosure,deception,disruption and usurpation.Thus we propose to use Attack Trees (see section3.3)in order to identify attacks in a systematic way.Other Forces could be trade-offs between security and other aspects such as usability and performance,too.The perception of threats is determined by certain Security Objectives that may be written down as Security Policy Statements.•Solution:This section describes the Solution of the Problem.Appropriate solutions are determined by the Context of the pattern.Countermeasures have to be applied in order to reduce the Risk.For each Threat/Attack there should be at least one countermeasure.It is useful to warn from pitfalls(how does this pattern become an Anti-Pattern)and refer to variants of the pattern.There are also some optional elements that can be applied if they improve the comprehension of a security pattern.The Aliases section lists other names by which this security pattern might be known.Certain diagrams can be used to illustrate Structure of and Interactions between the participants of a security pattern.Security has impacts on many other requirements such as performance and usability.Thus it could be helpful to enlist the Consequences of the application of an security pattern.The benefits and drawbacks of a security pattern can be discussed.In order to illustrate the application of the pattern,concrete Examples could be provided[MD96]. Useful are code or configuration samples as well as some sketches.Analogies to real-world scenarios are also suitable such as the Running Example of a military base that were used in[YB97].As we have already denoted, security is always hard to proof.In fact it’s much more easier to show that something went wrong.We can use a Counterexamples section in order to show how the Security pattern can be applied in the wrong way,i.e.it becomes an Anti-Security pattern.Analogous to[BMR+96]we prefer the notion of a security pattern system.A security pattern doesn’t exist in isolation,there are many interactions with other security patterns.The security pattern system describes the relationships and the linkage between individual security patterns.Thus dependencies between specific security problems can be considered in a comprehensive way.As thefield of security is very broad,we cannot speak of a pattern language,that implies the complete coverage of every aspect of the problem rmally a security pattern system can be defined as follows:Definition2(Security Pattern System)A security pattern system is a collection of security patterns,together with guidelines for their implementation,combination and practical use in security engineering.A formal model of a pattern system,that is independent of a problem domain,has been introduced in[Bor00]. In[Sch01a]we applied a slightly modified version of this model.It turned out that it is sufficient to refer only to mandatory elements of patterns[MD96].These elements allows to represent pattern systems as directed acyclic graphs and to perform basic reasoning,e.g.if a cycle occurs there must be something wrong with the process of abstraction.Many pattern practitioners think that formal approaches should not be applied to patterns [BMR+96].Formal models are,however,especially required in thefield of security to proof that certain security requirements are met.In5.2we describe what we expect from the usage of a formal model in the context of security patterns.As a security pattern system covers only certain aspects of security,it should meet at least the following requirements[BMR+96]:it should comprise a sufficient base of security patterns;all its security patterns should be described uniformly;the relationships between security patterns have to be exposed;it must support the security engineering process;its own evolution must be supported.4.2Related WorkWe are aware of the following contributions which focus on security related patterns.An up-to-date list of patterns related to security can be found at[Sch01b].In order to reflect the evolution of security patterns they are presented in chronological order.•Application Security.In[YB97]a framework to build secure applications is introduced.In order to take advantage of the security of underlying systems,an interface for a Secure Access Layer is described.The Single Access Point restricts the entries into the application.The Check Point allows to make appropriate decisions when dealing with security breaches.In order to achieve access control,Roles that grant or deny rights are assigned to groups of users.A Session allows to distribute global user information such as the user’s identity.Eventually two patterns that deal with human computer interface(HCI)aspects are provided.According to their Role the user’s possibilities are restricted with a Limited View of legal options or they are given a Full View With Errors,when their privileges are not sufficient to perform certain actions.Although the secure access layer is introduced the linkage to low-level security services such as cryptog-raphy isn’t stated explicitly.•Cryptographic Software.Cryptography is the classic area of IT-security.In[BRD98]a set of nine pat-terns for building cryptographic software components is introduced.The focus is on the traditional aspects of security,i.e.confidentiality,integrity,authentication and non-repudiation.The Information Secrecy pattern describes how to keep messages secret from an attacker(confidentiality).The Message Integrity pattern shows how to prevent that an attacker modifies or replaces messages without the sharing of cryp-tographic keys.The Sender Authentication pattern illustrates how messages can be authenticated with the usage of cryptographic keys.The Signature pattern describes how it can be prevented that communicating parties cannot repudiate a message(non-repudiation).Based on this four generic cryptographic patterns, the remaining ones are derived,such as Secrecy with Integrity and Secrecy with Sender Authentication.Together they form a Generic Object-Oriented Cryptographic Architecture(GOOCA).•The Authenticator Pattern.The work presented in[BDdVF99]describes a single Pattern that“performs authentication of a requesting process before deciding access to distributed objects.”With respect to secu-rity the authors identified relationships to patterns for authorization as introduced in[FH97]and[NG98]•Authorization Patterns.Several contributions deal with authorization.In[HLF00]the security func-tions of authentication,access control and datafiltering in a distributed environment are combined in a framework.This framework consists of the following patterns:Data Filter[FF99],Bodyguard[NG98], RPC Client[HF99]and Authenticator[BDdVF99].These patterns and a security model structure build the Object Filter and Access Control Framework.In[Fer00]some authorization patterns are discussed,namely Authorization Rules and Role-Based Access Control.The clue is that metadata constraints are used to define authorization.Furthermore,architectural levels(based on the Layer pattern[BMR+96])are defined whereas each level has its own security mech-anism and security enforcement.The combination of a layered architecture that includes a metalevel and patterns are a promising approach for a security pattern system.Picking up this work,a pattern language for security models is given in[FP01].There are patterns for established security models:the Authorization pattern(access matrix),Role-Based Access Control pattern and Multilevel Security Pattern(Bell-LaPadula).It is suggested how these abstract patterns can be applied to all levels of the layered architecture.The work on security patterns has evolved over the past years.Today a mixture of single patterns,frameworks and pattern languages is available.The following topics are,however,left for future work:•As written in[MM97],a sense of scale is missing from most software design patterns.Especially in thefield of security it is very important to have several levels of abstraction and different views on IT-systems.It is left for future work to identify a suitable classification scheme for security patterns.Good starting points are the pattern categories that are introduced in[BMR+96]:architectural patterns,design patterns and idioms.Other promising work is the Layer model described in[Fer00]and the OM-AM framework introduced in[San00].Such approaches help to“put things in perspective and to emphasize the encompassing nature of security[FP01].•The application of security patterns at other layers has to be considered.For example the Check Point pattern[YB97]does also apply at the system and distribution layer:firewalls are in fact check points.•Besides,the pattern approach can be applied to many other security concepts such as cryptographic keys, protocols(e.g.SSL)and algorithms(such as hashes,signatures,and encryption)that could be included ina security pattern system(mining and refactoring of security patterns).•All security patterns have certain commonalities,or“junction points”where they could be grouped to-gether,to form“the”pattern language(or as we prefer to say pattern system)for the security domain.In future we should think about suitable junction points and concepts for merging security patterns should be developed.The layer approach given in[Fer00]and[FP01]provides a good starting point in this direction.5Security Engineering with PatternsIn this Section we explain why security patterns are a suitable approach for security engineering.Then we envision the possibilities of tool supported security engineering with patterns.We introduce our latest activities in this area,too.Then we discuss the benefits of this approach with the aid of a real world scenario in the area of secure networks.The patterns used in this Section can be found in Appendix A.Finally we discuss research topics that aren’t covered in a satisfactory way.5.1Patterns and IT SecuritySecurity patterns are a suitable approach for security engineering.As shown in the following all important aspects that were given in the problem statement in Section2can be covered:•Security engineering by non security experts.Security patterns capture the know-how and skills of security experts.Thus Security Patterns enable novices to act as security experts.Experts use the security patterns as a common and powerful vocab-ulary in order to deal with security problems and solutions.The members of a security pattern community can identify,name and discuss both problems and solutions more efficiently.The systematic analysis of known security breaches will reveal bad practices(anti-patterns).Based on this,refactored solutions can be developed and published as best practice security patterns.•Structured problem solution.Security patterns prevent ad-hoc problem solutions,as they help tofind proven solutions in a systematic and structured way.As security patterns are linked to related security patterns,the impact of certain decisions becomes evident.Side-effects and alternative solutions can be identified easily.•Scope dependencies and scope completeness.。
The Four Stages of Bee GrowthThe life cycle of a bee is a fascinating journey that unfolds through four distinct stages: egg, larva, pupa, and adult. Each phase contributes to the development of a fully functional bee, essential for the survival and prosperity of the hive.The journey begins with the egg stage, the first and most fundamental phase of bee growth. The queen bee, the reproductive heart of the colony, is responsible for laying these eggs. She selects a cell within the honeycomb, a hexagonal structure built by the worker bees, as the perfect incubator for the next generation. The eggs are tiny, yet they carry the genetic blueprint for the future bees. Once laid, the eggs are incubated by the surrounding worker bees, who maintain a constant temperature within the hive to ensure optimal conditions for growth.After about three days, the eggs hatch into larvae, the second stage of bee development. These larvae are tiny, white, and worm-like, completely dependent on the worker bees for nourishment. The larvae are fed a diet of royal jelly, a nutrient-rich secretion produced by the glands of worker bees. This diet is crucial for the larvae's growth and development, particularly for those destined to become queens, as theyrequire a higher concentration of royal jelly to reach their full potential.As the larvae grow and molt several times, they enter the pupal stage, a transitional phase between larva and adult. During this time, the larva undergoes profound physical changes, transforming from a legless grub into a recognizable bee. The pupal stage lasts for approximately eight to ten days, during which the bee's eyes, antennae, legs, and wings develop. This is a critical period, as any disruption to the pupal chamber or changes in environmental conditions can fatally impact the developing bee.Finally, the bee emerges from the pupal case as a fully formed adult. This emergence, known as eclosion, marks the beginning of the bee's adult life. Depending on its caste, the bee will assume different roles within the hive. Worker bees, the most numerous caste, are responsible for a wide range of tasks, including foraging for food, caring for the young, and maintaining the hive. Queen bees are the reproductive queens of the colony, while drone bees, the male members of the hive, are primarily involved in mating with queens.Each bee, regardless of its role, contributes to the overall health and success of the hive. The intricate dance theyperform to communicate the location of food sources, their tireless efforts to gather nectar and pollen, and their dedication to the care of the young are all essential components of the hive's survival.The four stages of bee growth are not only fascinating in their complexity but also serve as a testament to the resilience and adaptability of these remarkable creatures. From the delicate egg to the fully functional adult bee, each phase represents a crucial step in the continuation of the bee species. The hive, a bustling metropolis of activity and cooperation, is a testament to the power of collective effort and the beauty of nature's design.Moreover, the bee's lifecycle offers valuable insights into the natural world and the interconnectedness of all life. Bees play a crucial role in pollination, a process that is essential for the reproduction of many plant species and, ultimately, the maintenance of our ecosystems. Their decline, due to factors such as habitat loss, pesticide use, and climate change, has sparked global concern over the impact on biodiversity and agricultural productivity.Understanding the stages of bee growth, therefore, not only enhances our appreciation for these insects but alsohighlights the importance of protecting them and their habitats. As we learn more about the intricate lives of bees, we gain a deeper understanding of the natural world and our role in preserving it for future generations.In conclusion, the four stages of bee growth represent a remarkable journey from the minuteness of the egg to the vibrancy of the adult bee. Each phase is essential for the development of a healthy and functional bee, crucial for the survival and prosperity of the hive. By understanding and respecting the lifecycle of bees, we can better appreciate their role in nature and work towards safeguarding their future.。
Unit 11. constituent (components): component part 成分2. conceive (conceptualize): To form or hold an idea: 构想出:构想出或持有一种想法3. synthesis (making a complex whole by combining ideas): The combining of separate elements or substances to form a coherent whole. 综合:把分别的元素或物质连接成连贯的一个整体4.evolve (develop): To develop or achieve gradually: 使发展:逐渐发展或完成5. venom (poison): A poisonous secretion 毒液:一种诸如蛇、蜘蛛等动物的有毒的分泌物6.matriculation (admission): to be formally admitted to study at a university or college 入学7.proprietary (with the exclusive legal right):专有的8.highlight (emphasize):underline 使…显得重要;强调Unit 21.ill-bred (badly behaved): rude or behaving badly,没教养的2.break down (destroy): 损坏3.conceited (self-important): Holding or characterized by an unduly high opinion of oneself; vain. 自负的4.malicious (hateful): very unkind and cruel 充满憎恨;有恶意的pliment (praise): An expression of praise, admiration, or congratulation. 恭维:赞美6.opponent (rival): One that competes 竞争对手7.be entitled to (be worthy of配得上): have the right to do [entitle 有资格]8.alight (get off): To come down and settle, as after flight: 下来9.seniority (high standing through long service):资历深的人, 年资高的人.Unit 31.scramble (hasty movement):move quickly 快速移动hasty 急速的2.expertise (knowledge):Skill or knowledge in a particular area. 专门知识3.disruption (disturbance):a situation in which something is prevented from continuing in its usual way 扰乱4.renaissance (revival):A rebirth or revival. 复苏;复兴5.assumption (supposition):Something taken for granted or accepted as true without proof; 假定,假设6.dexterity (skill of the hand):Skill and grace in physical movement, especially in the use of the hands; adroitness. 灵巧,敏捷:体育运动熟练或动作优雅,尤指手的使用;灵活7.manipulate (handle with skill):To operate or control by skilled use of the hands; 通过用手的技巧来操纵或控制8.sleight (skill):Skillfulness in the use of the hands or body 技巧9.autism (self-absorption):Abnormal introversion and egocentricity; acceptance of fantasy rather than reality. 孤独症,自我中心主义.10.g et to grip with (cope with): to begin to understand and deal with sth difficult 开始理解并着手处理难题Unit 41.hypothetical (theoretical): based on a situation that is not real, but that might happen 假定的2.put a premium on (encourage): 奖励,鼓励,重视3.demography (scientists in the field of vital [生命的] and social statistics): 人口统计学4.primal (fundamental): Of first importance; 最重要的;主要的5.nascent (burgeoning): Coming into existence; emerging: 开始形成的;出现的/出芽6.prognosis (prediction): A prediction of the probable course and outcome of a disease. 预测:判病7.scalded (burnt): 烫伤的8.convulse (shook violently):To shake or agitate violently 使…强烈地震动或狂躁不安9.undeterred (not discouraged):not discouraged 未受挫折的[un 否定+deter 阻止v. + [r] ed =undeterred 未被阻止的] 10.p erforate (penetrate):To pierce, punch, or bore a hole or holes in; 刺穿11.u nflappable [flap恐慌] (composed):having the ability to stay calm and not become upset, even in difficult situations 镇定的12.i ncur (invite):To become liable or subject to as a result of one's actions; bring upon oneself: 招惹Unit 51. phenomenal (extraordinary):outstanding: 非凡的;杰出的2. unveil (uncovered):To remove a veil or covering from. 把面纱或覆盖物从…上拿下3. wane (decline):To decrease gradually in size, amount, intensity, or degree. 衰退4. confide (tell confidentially):To tell (something) in confidence. 吐露:告知秘密的(事物)5. repel (defeat):To ward off or keep away; drive back: 击退:击退或赶回;驱除6. give away (reveal):disclose 揭露泄露7. macabre (frightful):Suggesting the horror of death and decay; gruesome: 恐怖的,阴森的8. chart (map):To make a map of 绘制…的图表9. mesmerized (fascinated):To spellbind; enthrall: 迷人的10. succumb (die from):由于……死亡11. autopsy (examination of a dead body):尸体解剖12.piece together (assemble):To bring together;拼凑Unit 61.awry (wrong):Away from the correct course; amiss偏差地,错误地2.overblow (exaggerated):Done to excess; overdone:做过头的;过分的3.churn out (produce in large amounts):大量生产4.dearth (shortage):A scarce supply; a lack. 不足;缺乏5.reprimand (reproach):To reprove severely, especially in a formal or official way;严厉训斥,尤指以正式的或官方的形式6.be attributed to (be due to) :归因于7.fatal (deadly):Causing or capable of causing death;致命的:引起死亡的8.vendor (seller):someone who sells things, especially on the street 街边摊贩9.voluntary (unforced):Arising from or acting on one's own free will;自愿的10.s ubmit (send):give sth (to sb/sth) 递交11.o versight (supervision):Watchful care or management; 照管,监督12.c ounsel (advise):to advise someone. 建议Unit 71.avarice (greed):Immoderate desire for wealth; cupidity. 贪婪2.memoir (records of one`s life and experiences):An account of the personal experiences of an author. 自传3.anecdote (short narratives concerning interesting events) : 轶事,趣闻:4.register (records of names or events): A formal or official recording of items, names, actions or events 正式记录,官方登记5.whisk away (going lightly and quickly):轻,迅速地走6.poach (hunt illegally):非法捕猎7.agog (eager):Full of keen anticipation or excitement;渴望的8.on the sly (sneakily):in a manner intended to avoid notice;秘密地9.lust (desired passionately):An overwhelming desire or craving: 强烈的欲望10.on the track (close upon) :步入正轨,接近11.croon (sing in a low, soothing sound):To hum or sing softly or soothingly 轻柔地哼,轻柔地唱12.wizard (magician): One who practices magic; a sorcerer or magician. 巫师:从事妖术的人;魔术师Unit 81. specified (stated exactly): To state explicitly, exactly or in detail: 明确说明或详明指明2. panorama (vista): An unbroken view of an entire surrounding area; 全景3. buoyant (cheerful):Lighthearted; gay 轻松的,轻快的4. impairment (loss):the fact that a part of your body is unable to do something fully 缺陷5. incredulous (dubious):Skeptical; disbelieving;dubious 怀疑的;不相信的6.convolution (twisting):a fold or twist in something which has many of them 盘旋结构7. pageant (spectacle):a series of historical events that are interesting 壮观8. chronic (constant):Of long duration; continuing:长期的;持续的Unit 91.tangible (perceptible):Discernible by the touch; palpable;可感知的2.on the same plane (on the same level)在同一水平上3.sporadically (occasionally):happening fairly often, but not regularly 偶然地4.paradoxical (self-contradictory):a statement that seems impossible because it contains two opposing ideas that are both true;自相矛盾的5.in a position (well-grounded) : fully trained in an activity or skill; 精通的6.localize (locate):To make local 使……具有地方性7.live (act out) : To practice in one's life 实行8.inhibition (restraint):The act of inhibiting or the state of being inhibited;禁止9.primordial (primeval):Being or happening first in sequence of time; original; 原始的10.i ntrigue (fascinate) : To arouse the interest or curiosity; 激起…的兴趣或好奇心11.s ynthesize (combine) : To combine so as to form a new, complex product: 综合Unit 101.agonize over (suffered painfully because of sth) : 为……所煎熬2.tied up (busy): not available 忙碌的3.meekly (gently and uncomplainingly) : very quietly and gently and unwilling to argue with people 温顺的4.give sb a black eye (beat sb very hard) : 揍某人一顿5.stark (bare) : blunt 生硬的:不加掩饰的6.plain (clear) : Free from obstructions; open; 清晰的,清楚的:毫无阻碍的7.to the letter (exactly) : 严格地不择不扣地8.zest (eagerness): Flavor or interest; piquancy; 兴趣:爱好或兴趣;刺激9.follow through (carry out exactly to the end):坚持到底10.stall (delay) : to deliberately delay because you are not ready to do something, answer questions 拖延11.e xasperating (irritate): extremely annoying or irritating 使人恼怒的12.m ediocre (not very good):Moderate to inferior in quality; ordinary; average 普通的:质量中等偏下的Unit 111.stricken (sorrowful): very badly affected by trouble, illness, unhappiness; 受打击的2.plod (trudge):To move or walk heavily or laboriously; 沉重缓慢地行走arre (strange): very unusual or strange; odd 古怪的4.attire (clothes): Clothing or array; apparel. 服装,衣着5.evoke (produce): to produce a strong feeling or memory in someone 使人产生6.novice (inexperienced):someone who has no experience ina skill, subject, or activity;beginner 新手7.demeanor (behavior):The way in which a person behaves 举止,行为8.adroit (skillful):Dexterous; deft; 熟练的;灵巧的9.spontaneous (unpremeditated): Happening or arising without apparent external cause; self-generated. 自然产生的,未计划的10.u pstage (overshadow):to do something that takes people's attention away from someone else who is more important; 分散注意力;使……显得不重要11.g auge (estimate): To evaluate or judge; estimate 评估,判断12.d isconcerting (embarrassing): making you feel slightly confused, embarrassed, or worried 窘迫的13.b lank (expressionless): Lacking expression; expressionless; 茫然的,没有表情的Unit 121.wind (end): to bring an activity, meeting and so on to an end 结束2.bicker (quarrel):to argue, quarrel especially about something very unimportant 发生口角3.malleable (easily train): Capable of being shaped or formed; easily trained or changed可锻炼的4.provoke (stir up):To stir to action or feeling.煽动:激起行动或感情5.quest (pursuit): The act or an instance of seeking or pursuing something 追求6.trait (characteristics): A distinguishing feature, as of a person's character; quality 特征7.scrap (throw away): To discard as worthless; junk; 废弃:因为无用而丢掉;抛弃8.pool (collect): to combine and collect your money, ideas, skills etc. 聚集9.screen (examine): To examine (a job applicant, for example) systematically in order to determine suitability. 检查:系统地测试10.a ppraisal (evaluation): a statement or opinion judging the worth, value, or condition of something; 评价11.s trand (part): one of the parts of a story, idea, plan etc. 部分12.r emediate (make up for): To deal with a problem or make a bad situation better; 弥补13.b oost (increase): To increase; raise 增加;拔高Unit 131.warrant (justify): To provide adequate grounds for; 证明…正当:为…提供充足根据2.altruistically (in an unselfish way): showing concern for the happiness and welfare of other people rather than for yourself; selflessly 无私地3.inhibit (hold back): To hold back; restrain 抑制;限制4.groom (cleaning the fur and skin for): If an animal grooms itself or another animal, it cleans its own fur and skin or that of the other animal 把皮毛弄干净5.intriguing (interesting): very interesting because it is strange, mysterious, or unexpected 有趣的6.convention (generally accepted practice): General agreement on or acceptance of certain practices or attitudes: 惯例,习俗7.presumably (probably): say that you think something is probably true 可能,大概8.alleviate (ease): To make (pain, for example) more bearable; 减轻9.entwine (entangled): To twist around or together; entangle 缠绕:缠在周围或一起10.v alor (personal courage): Courage and boldness, as in battle; bravery. 勇气;胆量Unit 141.irrelevant (not related): Unrelated to the matter at hand. 不相干的,离题的2.succinct (concisely): clearly expressed in a few words; concise 简明扼要的3.mediocrity (commonplaceness): The state or quality of being mediocre; 平庸,平凡4.amateurish (not professional): Characteristic of an amateur; 业余的;非专业的5.abdicate (resignation): to give up the position;resign 辞职6.conversely (on the other hand): used when one situation is the opposite of another 相反地,另一方面7.effulgent (bright): Shining brilliantly; resplendent; bright 耀眼的;光彩照人的8.depravity (degradation): Moral corruption or degradation. 堕落:道德败坏9.salvation (deliverance): Preservation or deliverance from destruction, difficulty, or evil. 救助;解救10.o bdurate (obstinate): very determined not to change your beliefs, actions, or feelings, in a way that seems unreasonable; stubborn 固执的,顽固的11.i mmutable (permanent):Not subject or susceptible to change; 永恒的:不可改变的Unit 151.wince (shrink): To shrink or start involuntarily, as in pain or distress; flinch. 畏缩,退缩2.savor (flavor): The taste or smell of something; 味道3.exertion (energetic use): the energetic use, especially a strenuous effort. 发挥,全力以赴的努力4.pronounced (conspicuous): Strongly marked; distinct; conspicuous 明显的:有很强烈的特征的5.sediment (settlings): Material that settles to the bottom of a liquid; lees. 沉淀物6.crevice (cleft): A narrow crack or opening; a fissure or cleft. 裂隙,裂缝7.remorseless (ruthless): Having no compassion or pity; merciless; 无情的,残忍的8.ravenous (gluttonous):Extremely hungry; voracious;极饿的9.bellicose (pugnacious): Warlike in manner or temperament; belligerent 好战的10.e vict (force out): eject 武力驱逐;逐出11.g ermane (relate): an idea, remark etc that is germane to something is related to it in an important and suitable way; relevant 相关联的12.a ppall (shock): to make someone feel very shocked and upset; dismay 使……惊骇,震惊13.。
Maingot腹部手术学(第12版)_第29章肠梗阻---目录第五篇小肠和结肠┈┈┈┈┈┈383第十七章肠梗阻┈┈┈┈┈┈385第一节定义一、机械性肠梗阻二、功能性肠梗阻三、术后早期(机械性)肠梗阻第二节流行病学┈┈┈┈┈┈386第三节病理生理学┈┈┈┈┈┈387一、扩张、吸收和分泌二、肠道蠕动功能三、循环改变┈┈┈┈┈┈388四、菌群移位第四节病因学┈┈┈┈┈┈388一、粘连┈┈┈┈┈┈388二、疝┈┈┈┈┈┈389三、恶性肠梗阻┈┈┈┈┈┈390四、肉芽肿性疾病和克罗恩病五、肠套叠六、肠扭转七、其他病因┈┈┈┈┈┈390第五节诊断┈┈┈┈┈┈392一、病史与体格检查二、实验室检查三、影像学表现(一)立位腹平片┈┈┈┈┈┈393(二)对比剂检查┈┈┈┈┈┈394(三)CT检查┈┈┈┈┈┈395(四)超声检查┈┈┈┈┈┈395(五)MRE(磁共振肠动描记)检查(六)视频胶囊内镜检查四、缺血检测第六节治疗┈┈┈┈┈┈1275一、小肠梗阻┈┈┈┈┈┈1275(一)非手术治疗┈┈┈┈┈┈1276(二)何时中转手术治疗┈┈┈┈┈┈1278(三)手术治疗┈┈┈┈┈┈1279(四)旁路与切除决择┈┈┈┈┈┈1280(四)复发性小肠梗阻(五)粘连预防(六)术后早期小肠梗阻(七)放射性肠病(八)癌肿以及恶性肠梗阻二、大肠梗阻┈┈┈┈┈┈400三、肠麻痹┈┈┈┈┈┈401四、急性结肠假性便阻┈┈┈┈┈┈403 参考文献┈┈┈┈┈┈404第五篇小肠和结肠第十七章肠梗阻Hippocrates, the father of medicine, recognized, described, and treated bowel obstruction many years ago.医学之父希波克拉底在很多年以前就认识、阐述和治疗了肠梗阻。
Praxagoras appears to have performed the earliest recorded operation for bowel obstruction circa 350 BC when he relieved the obstruction of a bowel segment by creating a decompressive, diverting enterocutaneous fistula. 有记载的最早的治疗肠梗阻的手术是由Praxagoras 在公元前350 年完成的,他通过建立一个有趣的、减压的肠外瘘来缓解肠段的梗阻。
肚子突然咕噜咕噜叫拉肚子英语作文Abdominal Discomfort and Diarrhea: A Gastrointestinal Distress.The human digestive system, a marvel of biological engineering, is responsible for the intricate process of nutrient absorption and waste elimination. However, this complex system is susceptible to a wide range of disturbances, one of the most common being gastrointestinal distress, which manifests as a spectrum of symptoms, including abdominal discomfort and diarrhea.Abdominal Discomfort: A Harbinger of Gastrointestinal Disruption.Abdominal discomfort, a pervasive symptom of gastrointestinal distress, encompasses a range of sensations that can vary in intensity and character. From mild abdominal cramps to excruciating pain, this discomfort can significantly impair quotidiana and disrupt the qualityof life.The underlying mechanisms of abdominal discomfort are often multifactorial, stemming from various etiologieswithin the gastrointestinal tract. Common causes include:Gas accumulation: The fermentation of undigested carbohydrates by gut bacteria produces gas, which, when excessive, can distend the intestines, leading todiscomfort and bloating.Irritable bowel syndrome (IBS): A prevalent functional bowel disorder characterized by intermittent abdominal pain, altered bowel habits, and varying stool consistency.Gastroesophageal reflux disease (GERD): The reflux of stomach contents into the esophagus, often causing heartburn, acid regurgitation, and abdominal discomfort.Inflammatory bowel disease (IBD): A chronicinflammatory condition affecting the digestive tract, resulting in abdominal pain, diarrhea, and other symptoms.Infection: Viral, bacterial, or parasitic infections of the gastrointestinal tract can generate abdominal discomfort, diarrhea, and other gastrointestinal manifestations.Diarrhea: A Disconcerting Symptom of Intestinal Disturbance.Diarrhea, defined as the passage of loose or watery stools, represents a common gastrointestinal symptom that can have both acute and chronic presentations. This condition arises from various disruptions within the intestinal milieu, affecting its absorptive capacity, fluid secretion, and motility.The underlying causes of diarrhea are as diverse as its manifestations. Common etiologies include:Infectious agents: Viral, bacterial, or parasitic infections, often acquired through contaminated food or water, can lead to acute diarrhea as part of the body'simmune response.Food intolerances: The inability to digest certain food components, such as lactose or gluten, can trigger diarrhea as the body attempts to expel the offending substance.Irritable bowel syndrome (IBS): As with abdominal discomfort, diarrhea can be a prominent symptom of IBS, characterized by alternating bouts of diarrhea and constipation.Medications: Certain medications, including antibiotics and nonsteroidal anti-inflammatory drugs (NSAIDs), can disrupt normal intestinal function, resulting in diarrhea.Malabsorption disorders: Conditions that impair the absorption of nutrients, such as celiac disease or Crohn's disease, can lead to diarrhea as undigested material is expelled from the body.Management of Gastrointestinal Distress: Seeking Relief from Discomfort.The management of gastrointestinal distress, encompassing both abdominal discomfort and diarrhea, rests on a multifaceted approach, aiming to alleviate symptoms, address underlying etiologies, and prevent complications.Dietary modifications: Identifying and avoiding trigger foods, particularly in cases of food intolerances or IBS, can significantly reduce abdominal discomfort and diarrhea.Medications: Over-the-counter medications, such as antidiarrheals and antacids, can provide temporary relief from symptoms. In cases of severe or persistent diarrhea, prescription medications may be necessary.Lifestyle adjustments: Regular exercise, stress reduction techniques, and adequate sleep can positively impact gut health and mitigate gastrointestinal symptoms.Underlying condition management: If an underlying medical condition, such as IBS or IBD, is identified as the cause of gastrointestinal distress, specific treatments andlifestyle modifications may be recommended to manage the condition and alleviate symptoms.Conclusion: Regaining Gastrointestinal Harmony.Gastrointestinal distress, characterized by abdominal discomfort and diarrhea, is a common affliction that can significantly impact daily life. Understanding the underlying causes of these symptoms is essential for effective management. Through a combination of dietary modifications, medications, lifestyle adjustments, and targeted treatment of underlying conditions, individuals can regain gastrointestinal harmony and alleviate the discomfort and distress associated with these common gastrointestinal ailments.。
干燥综合征中文:干燥综合征(Sjogren’s syndmme,ss)是一种以侵犯外分泌腺为主、并可伴有其他系统受累的慢性炎症性自身免疫性疾病。
其病理特征是全身外分泌腺大量淋巴细胞的炎症浸润导致腺体破坏、导管狭窄阻塞,最终造成腺体分泌功能下降和缺乏。
口、眼干燥为其常见症状,常同时伴有内脏损害并出现多种临床表现。
本病分为原发性和继发性两类,不合并其他自身免疫性疾病者称为原发性干燥综合征;继发于类风湿关节炎(RA)、系统性红斑狼疮(sLE)、系统性硬化症(ssc)等称为继发性于燥综合征。
于燥综合征女性多发,特别是绝经后的妇女,发病年龄集中于30一60岁。
流行病学调查显示,该病在我国的人群患病率为O.3%一0.7%(随不同诊断标准而有差异),在老年人群中患病率为3%一4%,其患病率明显高于系统性红斑狼疮,与类风湿关节炎相似(0.36%),目前被认为是最常见的结缔组织病之一。
对于干燥综合征目前尚无有效的根治方法。
治疗的目的在于减轻口眼干燥的症状,预防因长期干燥而造成的口眼局部损伤,密切观察病情的变化,防治系统性损害。
治疗的方法主要是补充、替代和对症处理。
出现严重内脏损害者,可应用糖皮质激素,病情进展迅速者可加用免疫抑制剂。
干燥综合征患者病情进展缓慢,如病变仅局限于唾液腺、泪腺等外分泌腺者预后良好,即使有内脏损害者经恰当的治疗后大多数可以控制病情。
若累及重要脏器而未进行积极的治疗,也可危及生命。
故合理及有效的治疗对改善预后是极其重要的。
由于我的门诊病人很多,异地患者可以事先与我电话咨询,做好就诊准备。
英文:Sjogren's syndrome ( Sjogren ' s syndmme, SS ) is a kind of violation to the exocrine glands, and may be accompanied by other systemic involvement in the chronic inflammatory autoimmune diseases. The pathological characteristics of systemic exocrine gland lymphocytic inflammatory infiltration leads to disruption of glands, ducts stenosis occlusion, eventually causing glandular secretion function decline and lack of. Export, dry eyes are common symptoms, often accompanied by visceral damage and the emergence of a variety of clinical manifestations. The disease is divided into primary and secondary two classes, not associated with other autoimmune disease called primary Sjogren syndrome; secondary to rheumatoid arthritis ( RA ), systemic lupus erythematosus ( sLE ), systemic sclerosis ( SSC ), known as secondary to dryness syndrome. In the dryness syndrome in a female with multiple, especially in women after menopause, age of onset is focused on 30 60 year old. Epidemiological survey of the disease in our country, the prevalence rates of O.3% 0.7% ( with different diagnostic criteria and have difference) in the elderly population, the prevalence rate is 3% 4%, its prevalence was significantly higher in systemic lupus erythematosus, and resembling rheumatoid arthritis ( 0.36%), now considered to be the most common connective tissue disease.For Sjogren syndrome at present there is no effective cure method. The goal of treatment is to alleviate the symptoms of dry mouth and dry eyes, for the prevention of long-term drying caused by local damage of eyes and mouth, close observation of changes, prevention system damage. Treatment is the main method of complementary, alternative and symptomatic treatment. Serious damage of internal organs, but application of glucocorticoids, rapid disease progression can be combined with immunosuppressants.Sjogren's syndrome patients progresses slowly, as the lesions confined to the salivary glands, lacrimal glands were as good prognosis, even with visceral damage after appropriate treatment after most can control the disease. If the involved organs without active treatment, can also be life threatening. Therefore, reasonable and effective treatment to improve the prognosis is extremely important. Because of my patients in outpatient clinic of many different patients, can advance with my telephone advice, do medical preparation.本文由/整理转载。
347Downloaded from at Library of Medical Center of Fudan University on April 21, 2014/348Bartlett et al.CID2000;31(August)is not available initially but is subsequently reported,changing to the antimicrobial agent that is most cost-effective,least toxic, and most narrow in spectrum is encouraged.Recommendations for treating patients who require empirical antibiotic selection are based on severity of illness,pathogen probabilities,resis-tance patterns of S.pneumoniae(the most commonly implicated etiologic agent),and comorbid conditions.The recommendation for outpatients is administration of a macrolide,doxycycline,orfluoroquinolone with enhanced ac-tivity against S.pneumoniae.For patients who are hospitalized, the recommendation is administration of afluoroquinolone alone or an extended-spectrum cephalosporin(cefotaxime or ceftriaxone)plus a macrolide.Patients hospitalized in the in-tensive care unit(ICU)should receive ceftriaxone,cefotaxime, ampicillin-sulbactam,or piperacillin-tazobactam in combina-tion with afluoroquinolone or macrolide.b-lactams,other than those noted,are not recommended.Intravenous antibiotics may be switched to oral agents when the patient is improving clin-ically,is hemodynamically stable,and is able to ingest drugs. Most patients show a clinical response within3–5days. Changes evident on chest radiographs usually lag behind the clinical response,and repeated chest radiography is generally not indicated for patients who respond.The failure to respond usually indicates an incorrect diagnosis;host failure;inappro-priate antibiotic;inappropriate dose or route of administration; unusual or unanticipated pathogen;adverse drug reaction;or complication,such as pulmonary superinfection or empyema. Prognosis.The most frequent causes of lethal community-acquired pneumonia are S.pneumoniae and Legionella.The most frequent reason for failure to respond is progression of pathophysiological changes,despite appropriate antibiotic treatment.Pneumococcal pneumonia.S.pneumoniae,the most com-mon identifiable etiologic agent of pneumonia in virtually all studies,accounts for about two-thirds of bacteremic pneumonia cases,and pneumococci are the most frequent cause of lethal community-acquired pneumonia.Management has been com-plicated in recent years by the evolution of multidrug resistance. b-lactams(amoxicillin,cefotaxime,and ceftriaxone)are gen-erally regarded as the drugs of choice,although pneumonia caused by resistant strains(MIC,у2m g/mL)may not respond as readily as pneumonia caused by more susceptible strains. The activity of macrolides and doxycycline or other b-lactams, including cefuroxime,is good against penicillin-susceptible strains but less predictable with strains that show reduced pen-icillin-susceptibility.Vancomycin,linezolid,and quinupristin/ dalfopristin are the only drugs with predictable in vitro activity. Fluoroquinolones are generally active against strains that are susceptible or resistant to penicillin,but recent reports indicate increasing resistance in selective locations that correlate with excessivefluoroquinolone use.Prevention.The major preventive measures are use of in-fluenza vaccine and use of pneumococcal vaccine,according to guidelines of the Advisory Council on Immunization Practicesof the Centers for Disease Control and Prevention(CDC). Performance indicators.Recommendations for perform-ance indicators include the collection of blood culture speci-mens before antibiotic treatment and the institution of anti-biotic treatment within8h of hospitalization,since both aresupported on the basis of evidence-based trials.Additional per-formance indicators recommended are laboratory tests for Le-gionella in patients hospitalized in the ICU,demonstration ofan infiltrate on chest radiographs of patients with an ICD-9 (International Classification of Diseases,9th edition)code for pneumonia,and measurement of blood gases or pulse oximetrywithin24h of admission.IntroductionLower respiratory tract infections are the major cause ofdeath in the world and the major cause of death due to infec-tious diseases in the United States.Recent advances in thefieldinclude the identification of new pathogens(Chlamydia pneu-moniae and hantavirus),new methods of microbial detection (PCR),and new antimicrobial agents(macrolides,b-lactamagents,fluoroquinolones,oxazolidinones,and streptogramins).Despite extensive studies,there are few conditions in medicinethat are so controversial in terms of management.Guidelinesfor management were published in1993by the American Tho-racic Society[1],the British Thoracic Society[2],and the Ca-nadian Infectious Disease Society[3],as well as the InfectiousDiseases Society of America(IDSA)in1998[4].The presentguidelines represent revised recommendations of the IDSA. Compared with previous guidelines,these guidelines are in-tended to reflect updated information,provide more extensive recommendations in selected areas,and indicate an evolutionof opinion.These therapeutic guidelines are restricted to com-munity-acquired pneumonia(CAP)in immunocompetentadults.Recommendations are given alphabetical ranking to reflecttheir strength and a Roman numeral ranking to reflect thequality of supporting evidence(table1).This is customary forquality standards from the IDSA[5].It should be acknowledgedthat no set of standards can be constructed to deal with themultitude of variables that influence decisions regarding site ofcare,diagnostic evaluation,and selection of antibiotics.Thus,these standards should not supplant good clinical judgement.EpidemiologyMagnitudeCAP is commonly defined as an acute infection of the pul-monary parenchyma that is associated with at least some symp-toms of acute infection,accompanied by the presence of anacute infiltrate on a chest radiograph or auscultatoryfindingsconsistent with pneumonia(such as altered breath sounds and/at Library of Medical Center of Fudan University on April 21, 2014/Downloaded fromCID2000;31(August)IDSA Guidelines for CAP in Adults349Table1.Categories for ranking recommendations in the therapeutic guidelines.Category DescriptionStrength of recommendationA Good evidence to support a recommendation for useB Moderate evidence to support a recommendation for useC Poor evidence to support a recommendationD Moderate evidence to support a recommendation against useE Good evidence to support a recommendation against useQuality of evidenceI Evidence from at least1randomized,controlled trialII Evidence from at least1well-designed clinical trial without randomizationIII Evidence from opinions of respected authorities,based on clinical experi-ence,descriptive studies,or reports of expert committeesor localized rales),in a patient not hospitalized or residing in a long-term-care facility forу14days before onset of symp-toms.Symptoms of acute lower respiratory infection may in-clude several(in most studies,at least2)of the following:fever or hypothermia,rigors,sweats,new cough with or without sputum production or change in color of respiratory secretions in a patient with chronic cough,chest discomfort,or the onset of dyspnea.Most patients also have nonspecific symptoms, such as fatigue,myalgias,abdominal pain,anorexia,and headache.Pneumonia is the sixth most common cause of death in the United States.From1979through1994,the overall rates of death due to pneumonia and influenza increased by59%(on the basis of ICD-9codes on death certificates)in the United States[6].Much of this increase is due to a greater proportion of persons agedу65years;however,age-adjusted rates also increased by22%,which suggests that other factors may have contributed to a changing epidemiology of pneumonia,includ-ing a greater proportion of the population with underlying med-ical conditions at increased risk of respiratory infection. Annually,2–3million cases of CAP result in∼10million physician visits,500,000hospitalizations,and45,000deaths in the United States[7,8].The incidence of CAP that requires hospitalization is estimated to be258persons per100,000pop-ulation and962per100,000persons agedу65years[8].Al-though mortality has ranged from2%to30%among hospi-talized patients in a variety of studies,the average is∼14%[9]. Mortality is estimated to be!1%for patients not hospitalized [9,10].The incidence of CAP is heavily weighted toward the winter months.Prognosis,Risk Stratification,and the Initial Site-of-Treatment DecisionKnowledge about the prognosis of a disease allows physi-cians to inform their patients about the expected natural history of an illness,the likelihood of potential complications,and the probability of successful treatment.Understanding the prog-nosis of CAP is of particular clinical relevance,since it ranges from rapid recovery from symptoms without functional im-pairment to serious morbid complications and death.The abil-ity to accurately predict medical outcomes in cases of CAP hasa major impact on management.The decision to hospitalize apatient or to treat him or her as an outpatient(figure1)isperhaps the single most important clinical decision made by physicians during the entire course of illness,which has directbearing on the location and intensity of laboratory evaluation,antibiotic therapy,and costs.The estimated total treatment costfor an episode of CAP managed in the hospital is$7500(USdollars)[11],120-fold higher than the cost of outpatient treatment.Numerous studies have identified risk factors for death incases of CAP[9,10,12].These factors were well-defined in thepre–penicillin era;studies of adults showed an increased riskwith alcohol consumption,increasing age,the presence of leu-kopenia,the presence of bacteremia,and radiographic changes[12].More recent studies have confirmed thesefindings[2,13–18].Independent associations with increased mortality havealso been demonstrated for a variety of comorbid illnesses,suchas active malignancies[10,16,19],immunosuppression[20,21], neurological disease[19,22,23],congestive heart failure[10,17,19],coronary artery disease[19],and diabetes mellitus[10,19,24].Signs and symptoms independently associated with in-creased mortality consist of dyspnea[10],chills[25],alteredmental status[10,19,23,26],hypothermia or hyperthermia[10,16,17,20],tachypnea[10,19,23,27],and hypotension(diastolic and systolic)[10,19,26–28].Laboratory and radiographicfindings independently asso-ciated with increased mortality are hyponatremia[10,19],hy-perglycemia[10,19],azotemia[10,19,27,28],hypoalbumi-nemia[16,19,22,25],hypoxemia[10,19],liver function test abnormalities[19],and pleural effusion[29].Infections due togram-negative bacilli or S.aureus,postobstructive pneumonia,and aspiration pneumonia are also independently associatedwith higher mortality[30].Despite our knowledge regarding the associations of clinical, laboratory,and radiographic factors and patient mortality,there is wide geographic variation in hospital admission ratesfor CAP[31,32].This variation suggests that physicians donot use a uniform strategy to relate the decision to hospitalizeto the prognosis.In fact,physicians often overestimate the riskof death for patients with CAP,and the degree of overesti-at Library of Medical Center of Fudan University on April 21, 2014/Downloaded from350Bartlett et al.CID2000;31(August)Figure1.Evaluation for diagnosis and management of community-acquired pneumonia,including site,duration,and type of treatment. b-Lactam:cefotaxime,ceftriaxone,or a b-lactam/b-lactamase inhibitor.Fluoroquinolone:levofloxacin,moxifloxacin,or gatifloxacin or another fluoroquinolone with enhanced antipneumococcal activity.Macrolide:erythromycin,clarithromycin,or azithromycin.CBC,complete blood cell count;ICU,intensive care unit.*Other tests for selected patients:see text,Diagnostic Evaluation:Etiology.**See table15for special considerations.mation is independently associated with the decision to hos-pitalize[30].Over the past10years,at least13studies have used multi-variate analysis to identify predictors of prognosis for patients with CAP[10,16–20,25–27,33–35].The Pneumonia PORT developed a methodologically sound clinical prediction rule that quantifies short-term mortality for patients with this illness [10].Used as a guideline,this rule may help physicians make decisions about the initial location and intensity of treatment for patients with this illness(table2).The Pneumonia PORT prediction rule was derived with 14,199inpatients with CAP;it was independently validated with 38,039inpatients with CAP and2287inpatients and outpatients prospectively enrolled in the Pneumonia PORT cohort study. With this rule,patients are stratified into5severity classes by means of a2-step process.In step1,patients are classified as risk class I(the lowest severity level)if they are agedр50years,have none of5important comorbid conditions(neoplastic dis-ease,liver disease,congestive heart failure,cerebrovascular dis-ease,or renal disease),and have normal or only mildly derangedvital signs and normal mental status.In step2,all patients whoare not assigned to risk class I on the basis of the initial historyand physical examinationfindings alone are stratified into clas-ses II–V,on the basis of points assigned for3demographicvariables(age,sex,and nursing home residence),5comorbidconditions(listed above),5physical examinationfindings(al-tered mental status,tachypnea,tachycardia,systolic hypoten-sion,hypothermia,or hyperthermia),and7laboratory or ra-diographicfindings(acidemia,elevated blood urea nitrogen, hyponatremia,hyperglycemia,anemia,hypoxemia,or pleuraleffusion;table3).Point assignments correspond with the fol-lowing classes:р70,class II;71–90,class III;91–130,class IV;and1130,class V.In the derivation and validation of this rule,mortality wasat Library of Medical Center of Fudan University on April 21, 2014/Downloaded fromCID2000;31(August)IDSA Guidelines for CAP in Adults351 parison of risk class–specific mortality rates in the derivation and validation cohorts.Risk class a (total points)MedisGroups MedisGroupsPneumonia PORT validation cohortderivation cohort validation cohort Inpatients Outpatients All patientsn Mortality,%n Mortality,%n Mortality,%n Mortality,%n Mortality,%I13720.430340.11850.55870.07720.1II(р70)24120.757780.62330.92440.44770.6III(71–90)2632 2.86790 2.8254 1.2720.03260.9IV(91–130)46978.513,1048.24469.04012.54869.3V(1130)308631.1933329.222527.110.022627.0 Total14,19910.238,03910.613438.09440.62287 5.2 NOTE.No statistically significant differences in overall mortality or mortality within risk class existed among patients in the MedisGroups derivation,MedisGroups validation,and overall Pneumonia Patient Outcome Research Team(PORT)validation cohorts(n denotes the no.of patients within each risk class in the derivation and validation cohorts).P values for the comparisons of mortality across risk classes are as follows:class I,;class II,;class III,;class IV,;and class V,.P p.22P p.67P p.12P p.69P p.09a Risk class I was determined by the absence of all predictors identified in step1of the prediction rule.Risk classes II–V were determined by a patient’s total risk score,which is computed by use of the point scoring system shown in table3.low for risk classes I–III(0.1%–2.8%),intermediate for class IV(8.2%–9.3%),and high for class V(27.0%–31.1%).Increases in risk class were also associated with subsequent hospitaliza-tion and delayed return to usual activities for outpatients and with rates of admission to the ICU and length of stay for inpatients in the Pneumonia PORT validation cohort.On the basis of these observations,Pneumonia PORT investigators suggest that patients in risk classes I or II generally are can-didates for outpatient treatment,risk class III patients are po-tential candidates for outpatient treatment or brief inpatient observation,and patients in classes IV and V should be hos-pitalized(table4).Estimates from the Pneumonia PORT cohort study suggest that these recommendations would reduce the proportion of patients receiving traditional inpatient care by 31%and that there would be a brief observational inpatient stay for an additional19%.The effectiveness and safety of applying the Pneumonia PORT prediction rule to the initial site of care for an indepen-dent population of patients with CAP have been examined with use of a modified version of the Pneumonia PORT prediction rule[36].Emergency room physicians were educated about the rule and were encouraged to treat those in risk classes I–III as outpatients,with close,structured follow-up and provision of oral clarithromycin at no cost to the patient,if desired.The outcomes for those treated at home during this intervention phase were compared with the outcomes for historical control subjects from the time period immediately preceding the intervention.During the intervention period,there were166eligible pa-tients classified as“low risk”for short-term mortality(risk classes I–III)for comparison with147control subjects.The percentage treated initially as outpatients was higher during the intervention period than during the control period(57%vs. 42%;relative increase of36%;).When initial plus sub-P p.01sequent hospitalization was used as the outcome measure,there was a trend toward more outpatient care during the interven-tion period,but the difference was no longer statistically sig-nificant(52%vs.42%;).None of those initially treatedP p.07in the outpatient setting during the intervention period diedwithin4weeks of presentation.A second multicenter controlled trial subsequently assessedthe effectiveness and safety of using the Pneumonia PORT pre-diction rule for the initial site-of-treatment decision[37].In thistrial,19emergency departments were randomly assigned eitherto continue conventional management of CAP or to implementa critical pathway that included the Pneumonia PORT predic-tion rule to guide the admission decision.Emergency room physicians were educated about the rule and were encouragedto treat those in risk classes I–III as outpatients with oral levo-floxacin.Overall,1743patients with CAP were enrolled in this6-month e of the prediction rule resulted in an18%reduction in the admission of low-risk patients(31%vs.49%;).Use of the rule did not result in an increase in mor-P p.013tality or morbidity and did not compromise patients’30-dayfunctional status.These studies support use of the PneumoniaPORT prediction rule to help physicians identify low-risk pa-tients who can be safely treated in the outpatient setting.The IDSA panel endorses thefindings of the PneumoniaPORT prediction rule,which identifies valid predictors for mor-tality and provides a rational foundation for the decision re-garding hospitalization.However,it should be emphasized thatthe PORT prediction rule is validated as a mortality predictionmodel and not as a method to triage patients with CAP.Newstudies are required to test the basic premise underlying the useof this rule in the initial site-of-treatment decision,so that pa-tients classified as“low risk”and treated in the outpatient set-ting will have outcomes equivalent to or better than those ofsimilar“low-risk”patients who are hospitalized.It is important to note that prediction rules are meant tocontribute to rather than to supersede physicians’judgment.Another limitation is that factors other than severity of illnessmust also be considered in determining whether an individualpatient is a candidate for outpatient care.Patients designatedas“low risk”may have important medical and psychosocial contraindications to outpatient care,including expected com-pliance problems with medical treatment or poor social supportat Library of Medical Center of Fudan University on April 21, 2014/Downloaded from352Bartlett et al.CID 2000;31(August)Table 3.Scoring system for step 2of the prediction rule:assignment to risk classes II–V .Patient characteristicPoints assignedaDemographic factor Age Male No.of years of age FemaleNo.of years of age Ϫ10Nursing home resident ϩ10Comorbid illnessesNeoplastic diseasebϩ30Liver diseasecϩ20Congestive heart failuredϩ10Cerebrovascular diseaseeϩ10Renal diseasefϩ10Physical examination findingAltered mental statusgϩ20Respiratory rate 130breaths/min ϩ20Systolic blood pressure !90mm Hg ϩ20Temperature !35ЊC or 140ЊC ϩ15Pulse 1125beats/minϩ10Laboratory or radiographic finding Arterial pH !7.35ϩ30Blood urea nitrogen 130mg/dL ϩ20Sodium !130mEq/L ϩ20Glucose 1250mg/dL ϩ10Hematocrit !30%ϩ10Arterial partial pressure of oxygen !60mm Hg hϩ10Pleural effusionϩ10aA total point score for a given patient is obtained by adding the patient’s age in years (age Ϫ10,for females)and the points for each applicable patient char-acteristic.Points assigned to each predictor variable were based on coefficients obtained from the logistic regression model used in step 2of the prediction rule.bAny cancer except basal or squamous cell cancer of the skin that was active at the time of presentation or diagnosed within 1year of presentation.cA clinical or histologic diagnosis of cirrhosis or other form of chronic liver disease such as chronic active hepatitis.dSystolic or diastolic ventricular dysfunction documented by history and physical examination,as well as chest radiography,echocardiography,Muga scanning,or left ventriculography.eA clinical diagnosis of stroke,transient ischemic attack,or stroke docu-mented by MRI or computed axial tomography.fA history of chronic renal disease or abnormal blood urea nitrogen and creatinine values documented in the medical record.gDisorientation (to person,place,or time,not known to be chronic),stupor,or coma.hIn the Pneumonia Patient Outcome Research Team cohort study,an oxygen saturation value !90%on pulse oximetry or intubation before admission was also considered abnormal.Table 4.Risk-class mortality rates.Risk class No.of points Validation cohortRecommended site of care No.of patientsMortality,%I —a30340.1Outpatient II р7057780.6Outpatient III 71–906790 2.8Outpatient or brief inpatient IV 91–13013,1048.2Inpatient V1130933329.2InpatientNOTE.Table is adapted from [10].aAbsence of predictors.at home.Ability to maintain oral intake,history of substance abuse,cognitive impairment,and ability to perform activities of daily living must be considered.In addition,patients may have rare conditions,such as severe neuromuscular disease or immunosuppression,which are not included as predictors in these prediction rules but increase the likelihood of a poor prognosis.Prediction rules may also oversimplify the way physicians interpret important predictor variables.For example,extreme alterations in any one variable have the same effect on risk stratification as lesser changes,despite obvious differences in clinical import (e.g.,a systolic blood pressure of 40mm Hg vs.one of 88mm Hg).Furthermore,such rules discount the cu-mulative importance of multiple simultaneous physiological de-rangements,especially if each derangement alone does not reach the threshold that defines an abnormal value (e.g.,systolicblood pressure of 90/40mm Hg,respiratory rate of 28breaths/min,and pulse of 120beats/min).Finally,prediction rules often neglect the importance of patients’preferences in clinical de-cision-making.This point is highlighted by the observation that the vast majority of low-risk patients with CAP do not have their preferences for site of care solicited,despite strong pref-erences for outpatient care [38].Role of Specific Pathogens in CAPProspective studies evaluating the causes of CAP in adults have failed to identify the cause of 40%–60%of cases of CAP and have detected у2etiologies in 2%–5%[2,7,26,39,40].The most common etiologic agent identified in virtually all studies of CAP is S.pneumoniae,which accounts for about two-thirds of all cases of bacteremic pneumonia cases [9].Other pathogens implicated less frequently include H.influenzae (most strains of which are nontypeable),Mycoplasma pneumoniae,C.pneumoniae,S.aureus,Streptococcus pyogenes,N.meningitidis,Moraxella catarrhalis,Klebsiella pneumoniae and other gram-negative rods,Legionella species,influenza virus (depending on the season),respiratory syncytial virus,adenovirus,parainflu-enza virus,and other microbes.The frequency of other etiol-ogies is dependent on specific epidemiological factors,as with Chlamydia psittaci (psittacosis),Coxiella burnetii (Q fever),Francisella tularensis (tularemia),and endemic fungi (histo-plasmosis,blastomycosis,and coccidioidomycosis).Comparisons of relative frequency of each of the etiologies of pneumonia are hampered by the varying levels of sensitivity and specificity of the tests used for each of the pathogens that they detect;for example,in some studies,tests used for legi-onella infections provide a much higher degree of sensitivity and possibly specificity than do tests used for pneumococcal infections.Thus,the relative contribution of many causes to the incidence of CAP is undoubtedly either exaggerated or un-derestimated,depending on the sensitivity and specificity of tests used in each of the studies.Etiology-Specific Diagnoses and the Clinical SettingNo convincing association has been demonstrated between individual symptoms,physical findings,or laboratory test re-sults and specific etiology [39].Even time-honored beliefs,suchat Library of Medical Center of Fudan University on April 21, 2014/Downloaded fromCID2000;31(August)IDSA Guidelines for CAP in Adults353Table5.Diagnostic studies for evaluation of community-acquired pneumonia.Baseline assessmentChest radiography to substantiate diagnosis of pneumonia,to detect associated lung diseases,to gain insightinto causative agent(in some cases),to assess severity,and as baseline to assess responseOutpatientsSputum Gram stain and culture for conventional bacteria are optionalInpatientsDetermination of complete blood cell and differential countsSerum creatinine,urea nitrogen,glucose,electrolyte,bilirubin,and liver enzyme valuesHIV serological status for persons aged15–54yearsO2saturation arterial blood gas values for selected patientsBlood cultures(ϫ2;before treatment)Gram stain and culture of sputum aTest for Mycobacterium tuberculosis,with acid-fast bacilli staining and culture for selected patients,especiallythose with cough for11mo,other common symptoms,or suggestive radiographic changesTest for Legionella in selected patients,including all seriously ill patients without an alternative diagnosis,es-pecially if aged140years,immunocompromised,or nonresponsive to b-lactam antibiotics,if clinicalfeatures are suggestive of this diagnosis,or in outbreak settingsThoracentesis with stain,culture,and determination of pH and leukocyte count differential(pleuralfluid)Alternative specimens to expectorated sputumAspirates of intubated patients,tracheostomy aspirates,and nasotracheal aspirates:manage as with expec-torated sputumInduced sputum:recommended for detection of M.tuberculosis or Pneumocystis cariniiBronchoscopy(see text under Special Considerations:Pnemococcal Pneumonia)Transtracheal aspiration:recommended only in cases of enigmatic pneumonia,to be done by personsskilled in the technique,preferably before antibiotic treatmentOptionalAdditional cytological or microbiological tests,as listed in table8,depending on clinical features,availableresources,underlying conditions,and/or epidemiological associations of the patientSerum:to be frozen and saved for serological analysis,if needed ba Should be deep-cough specimen obtained before antibiotic therapy.Gram stain should be interpreted by trainedpersonnel and culture done only if specimen is adequate by cytological criteria,except for Legionella and myco-bacteria.Consider diagnostic studies for endemic fungi and mycobacteria when clinical features suggest infectionwith these.For hospitalized patients with severe pneumonia or clinical features that suggest legionnaires’disease,perform culture and urinary antigen testing for Legionella.Inability to obtain specimens for diagnostic studiesshould not delay antibiotic treatment of acutely ill patients.b Serological tests would include those for Mycoplasma pneumoniae,Legionella pneumophila,Chlamydia pneu-moniae,or others(i.e.,viruses,Chlamydia psittaci,or Coxiella burnetii),depending on the circumstances.as the absence of productive cough or inflammatory sputum in pneumonia due to Mycoplasma,Legionella,or Chlamydia species,have not withstood close inspection.On the other hand, most comparisons have involved relatively small numbers of patients and have not evaluated the potential for separating causes by use of constellations of symptoms and physical findings.In one study,as yet unconfirmed,that compared patients identified in a prospective standardized fashion,a scoring sys-tem using5symptoms and laboratory abnormalities was able to differentiate most patients with legionnaires’disease from the other patients[41].A similar type of system has been devised for identifying patients with hantavirus pulmonary syndrome (HPS)[42].If validated,such scoring systems may be useful for identifying patients who should undergo specific diagnostic tests(which are too expensive to use routinely for all patients with CAP)and be empirically treated with specific antimicrobial drugs while test results are pending.Certain pathogens cause pneumonia more commonly among persons with specific risk factors.For instance,pneumococcal pneumonia is especially likely to occur in the elderly and in patients with a variety of medical conditions,including alco-holism,chronic cardiovascular disease,chronic obstructed air-way disease,immunoglobulin deficiency,hematologic malig-nancy,and HIV infection.However,outbreaks occur amongyoung adults under conditions of crowding,such as in armycamps or prisons.S.pneumoniae is second only to Pneumocystiscarinii as the most common identifiable cause of acute pneu-monia in patients with AIDS[43–45].Legionella is an oppor-tunistic pathogen;legionella pneumonia is rarely recognized inhealthy young children and young adults.It is an importantcause of pneumonia in organ transplant recipients and in pa-tients with renal failure and occurs with increased frequency inpatients with chronic lung disease,smokers,and possibly thosewith AIDS[46].Although M.pneumoniae historically has beenthought primarily to involve children and young adults,someevidence suggests that it causes pneumonia in healthy adultsof any age[8].There are seasonal differences in incidence of many of thecauses of CAP.Pneumonia due to S.pneumoniae,H.influenzae,and influenza occurs predominantly in winter months,whereasC.pneumoniae appears to cause pneumonia year-round.Al-though there is a summer prevalence of outbreaks of legion-naires’disease,sporadic cases occur with similar frequency dur-ing all seasons[8,46].Some studies suggest that there is noseasonal variation in mycoplasma infection;however,otherdata suggest that its incidence is greatest during the fall andwinter months[47].at Library of Medical Center of Fudan University on April 21, 2014/Downloaded from。
新视野大学英语读写教程第三册课文翻译1. The Realities of War战争的现实War is a brutal and deadly affair. It brings about death, destruction, and misery on a massive scale. Beyond the physical toll, war also inflicts deep psychological wounds that can last a lifetime. Despite the horrific nature of war, it has been a persistent feature of human history. Wars have been fought for many reasons, such as territorial expansion, ideological differences, and resource competition.战争是一种残酷而致命的事。
它带来的死亡、破坏和悲惨是巨大的。
除了物质上的损失,战争也会产生深刻的心理创伤,可能会持续一生。
尽管战争的可怕性质,它一直是人类历史上的一个持久特征。
战争有很多原因,例如领土扩张、意识形态差异和资源竞争。
In recent times, wars have become more complex and deadly due to advancements in technology and the rise of non-stateactors. Modern warfare is no longer restricted to uniformed soldiers on a conventional battlefield. Instead, it often involves asymmetric warfare, which involves non-state actors using unconventional tactics and weapons to destabilize established governments and societies.近年来,由于技术的进步和非国家行动者的崛起,战争变得更加复杂和致命。
我的奇思妙想作文的三个层次英文回答:Introduction.In the realm of human ingenuity, where imagination soars, I present my extraordinary thesis statement. Through the captivating lens of creative thought, I will elucidate three distinct levels of my whimsical conception. This profound journey will explore the depths of my mind, unraveling the intricate tapestry of my extraordinary idea.Level 1: The Genesis of a Notion.The inception of my extraordinary concept commenced with a primordial spark, a glimmer of inspiration that ignited the embers of my imagination. This nascent idea, fragile and unformed, held the potential for greatness. I nurtured it with meticulous care, allowing it to flourish and evolve within the fertile soil of my mind.Level 2: The Evolution of Form.As my idea matured, it began to take on tangible form. Through a continuous process of refinement and elaboration, I molded and shaped it, infusing it with substance and structure. The once-amorphous notion transformed into a coherent and articulate expression, ready to captivate and inspire.Level 3: The Unveiling of Brilliance.In this final phase, I unveil the full glory of my extraordinary idea to the world. With a profound sense of accomplishment, I share its inherent brilliance and captivating potential. This is the moment when my creation transcends the confines of my own mind and becomes a beacon of innovation and wonder, forever etched in the annals of creative thought.中文回答:引言。
熬夜对健康无益英语作文Title: The Adverse Effects of Staying Up Late on Health。
Staying up late has become a prevalent lifestyle choice for many individuals, especially in this fast-paced modern society. However, it is imperative to recognize that the habit of burning the midnight oil poses significant threats to our health and well-being. In this essay, we will delve into the detrimental effects of staying up late and explore why it is crucial to prioritize adequate sleep for overall health.First and foremost, staying up late disrupts the body's natural circadian rhythm, which regulates various physiological processes such as sleep-wake cycles, hormone secretion, and metabolism. Our bodies are designed tofollow a rhythm that aligns with the day-night cycle, and when we deviate from this pattern by staying awake into the late hours of the night, we throw our internal clock out of balance. This disruption can lead to sleep disorders suchas insomnia, where individuals struggle to fall asleep or stay asleep throughout the night.Moreover, insufficient sleep resulting from staying up late can have a profound impact on cognitive function and mental health. Adequate sleep is crucial for memory consolidation, learning, and decision-making processes. When we deprive ourselves of sleep, our cognitive abilities become impaired, leading to difficulties in concentration, problem-solving, and emotional regulation. Chronic sleep deprivation has also been linked to an increased risk of mood disorders such as depression and anxiety.Furthermore, staying up late often goes hand in hand with unhealthy lifestyle habits such as poor dietary choices and lack of exercise. Late-night snacking and consumption of caffeinated beverages to stay awake can disrupt digestion and contribute to weight gain. Additionally, the sedentary behavior that accompanies late-night activities such as watching TV or scrolling through social media can lead to a more sedentary lifestyle, which is associated with various health issues such as obesity,cardiovascular disease, and metabolic disorders.In addition to the physical and mental health implications, staying up late can also have detrimental effects on interpersonal relationships and productivity. Sleep deprivation can make individuals irritable, moody,and less able to effectively communicate with others. Moreover, it impairs judgment and decision-making abilities, leading to decreased productivity and performance at workor school.It is crucial to recognize the importance ofprioritizing sleep and establishing healthy sleep habits to mitigate the adverse effects of staying up late. This includes maintaining a consistent sleep schedule, creatinga relaxing bedtime routine, and creating a conducive sleep environment free from distractions such as electronic devices.In conclusion, while staying up late may seem like a harmless habit, it can have significant repercussions onour health and well-being. From disrupting our naturalcircadian rhythm to impairing cognitive function and mental health, the consequences of sleep deprivation are far-reaching. Therefore, it is essential to prioritize adequate sleep and establish healthy sleep habits to safeguard our health in the long run.。
熬夜危害英语作文Staying up late has become a common phenomenon in modern society. Many people, especially young people, tend to stay up late for work, study, entertainment, or other reasons. However, staying up late can be very harmful to our health and well-being. In this essay, I will discuss the hazards of staying up late and provide some suggestions to avoid them.Firstly, staying up late can disrupt our biological clock and affect our sleep quality. Our body has a natural rhythm that regulates our sleep-wake cycle, hormone secretion, and other physiological functions. When we stay up late, we override this rhythm and confuse our body. As a result, we may have difficulty falling asleep, staying asleep, or waking up, and experience fatigue, drowsiness, irritability, or other symptoms. Moreover, staying up late can also reduce the production of melatonin, a hormone that helps us sleep and fight against cancer, diabetes, and other diseases.Secondly, staying up late can impair our cognitive performance and mental health. Sleep is essential for our brain to consolidate memories, process information, and regulate emotions. When we lack sleep, our cognitive abilities, such as attention, concentration, memory, and creativity, can be impaired. We may also become more anxious, depressed, or moody, and have a higher risk of developing mental disorders, such as bipolar disorder, schizophrenia, or dementia.Thirdly, staying up late can increase our risk of developing chronic diseases. Sleep deprivation has been linked to various health problems, such as obesity, diabetes, hypertension, cardiovascular diseases, and cancer. These diseases are caused by the disruption of our metabolic, immune, and endocrine systems, which areaffected by our sleep patterns and duration. Moreover, staying up late can also expose us to other risk factors, such as unhealthy diets, sedentary lifestyles, and stress.To avoid the hazards of staying up late, we can takesome measures to improve our sleep hygiene. Firstly, we should establish a regular sleep schedule and stick to it as much as possible, even on weekends or holidays. This can help our body adapt to a consistent rhythm and enhance our sleep quality. Secondly, we should create a sleep-friendly environment, such as a cool, dark, quiet, and comfortable bedroom, with no electronic devices or distractions. This can help us relax and fall asleep faster. Thirdly, we should adopt healthy habits, such as avoiding caffeine, alcohol, and nicotine before bedtime, exercising regularly, and managing stress effectively. These habits can promote our physical and mental health and reduce our risk of chronic diseases.In conclusion, staying up late can be a tempting but dangerous habit that can harm our health and well-being. We should be aware of the hazards of staying up late and take proactive measures to improve our sleep hygiene. By doing so, we can enjoy a better quality of life and achieve our goals more effectively.。
Disruption of type III secretion in Salmonella enterica serovar Typhimurium by external guide sequencesJeffrey S.McKinney 1,2,*,Haifeng Zhang 1,Tomoko Kubori 3,Jorge E.GalaÂn 3and Sidney Altman 11Department of Molecular,Cellular and Developmental Biology,Yale University,New Haven,CT 06520,USA,2Department of Pediatrics,Division of Infectious Diseases,Yale University School of Medicine,New Haven,CT 06520,USA and 3Section of Microbial Pathogenesis,Yale University School of Medicine,New Haven,CT 06536,USAReceived October 15,2003;Revised and Accepted December 16,2003ABSTRACTThe type III secretion system involved in Salmonella enterica serovar Typhimurium invasion of host cells has been disrupted using inducibly expressed oli-gonucleotide external guide sequences (EGSs)complementary to invB or invC mRNA.These EGSs direct single site cleavage in these mRNAs by endo-genous RNase P,and their expression in Salmonella results in invC mRNA and InvC protein depletion,decreased type III secretion and interference with host cell parison of these effects with those from studies of Salmonella invB and invC mutants suggests that invB EGSs have polar effects on invC mRNA.INTRODUCTIONExternal guide sequence (EGS)oligonucleotides target com-plementary mRNA for speci®c cleavage catalyzed by RNase P (1).EGS oligonucleotides require an accessible single-stranded region on their target mRNA to base-pair with and create the stem structure recognized as a cleavage substrate by RNase P (1).Using EGSs complementary to essential genes,Escherichia coli viability can be decreased in a manner which is EGS oligonucleotide sequence speci®c,dose dependent and dependent on time elapsed after EGS expression (2).Here,EGS studies are extended to Salmonella ,using EGSs complementary to two Salmonella pathogenicity island SPI-1genes (3),invB and invC ,neither of which are essential for bacterial viability (4).The invB and invC DNA sequences occur directly adjacent to each other in the multigene pathogenicity island SPI-1of Salmonella ,with the last nucleotide in the ®nal codon of invB also serving as the ®rst nucleotide in the ®rst codon of invC (4).Prior studies of Salmonella invB and invC mutants have shown that invC is required for host cell invasion and that the gene encodes a protein with ATPase activity (4).The ATPase encoded by invC is postulated to provide energy to power the type III secretion system involved in host cell invasion (4)andpathogenesis (5)by Salmonella .In contrast,invB does not appear necessary for invasion.InvB is a type III secretion chaperone speci®c for SipA,a translocated Salmonella protein which facilitates actin rearrangements within infected eukar-yotic cells (6).Mutations in invB do not alter the secretion of other type III secreted proteins (6)and do not disrupt invasion (4).Using a tightly regulated inducible EGS expression system in Salmonella (7),we show that EGSs complementary to either invB or invC mRNA can disrupt type III secretion and Salmonella invasion assayed in vitro .MATERIALS AND METHODS Plasmids and bacterial strainsThe EGSs listed below were cloned as previously described into high copy number EGS expression plasmids,derived from pUC19(2)or into low copy number plasmids derived from pWKS30(8).These plasmids were transformed into the Salmonella enterica serovar Typhimurium strain SB300A#1(7).SB300A#1has a T7RNA polymerase gene integrated with an adjacent araC-P(BAD)control element into the bacterial chromosome of parent strain SB300.SB300A#1allows tightly controlled arabinose-inducible T7promoter-driven transcription of our EGSs in Salmonella (7).The invA -de®cient Salmonella strain SB136(4),which is disrupted for type III secretion,was used as a control.An invC deletionmutant Salmonella (J.E.GalaÂn and Y.Akeda)was used as a negative control strain for studies of InvC intracellular protein level and of type III secretion.Salmonella was grown in 0.3M NaCl Luria±Bertani (LB)medium.Liquid culture incubation conditions and EGS induction with arabinose at 0.2%®nal concentration are as previously described (7).Following addition of arabinose for EGS induction,Salmonella liquid cultures were grown to late log phase prior to northern blot analysis,assay of Salmonella type III secretion or quanti®ca-tion of bacterial entry,as detailed below.Design of external guide sequencesEGS oligonucleotides were designed to be complementary to single-stranded regions of invB and invC mRNA,followed by*To whom correspondence should be addressed.Tel:+13142862912;Fax:+13142862895;Email:McKinney_J@Present address:Jeffrey S.McKinney,Departments of Pediatrics and Molecular Microbiology,Washington University,Saint Louis,MO 63110,USA848±854Nucleic Acids Research,2004,Vol.32,No.2DOI:10.1093/nar/gkh219Nucleic Acids Research,Vol.32No.2ãOxford University Press 2004;all rights reservedPublished online February 3, 2004an additional3¢-ACCA EGS terminal sequence.This strategy allows formation of a duplex EGS±mRNA molecule recognized as a substrate by endogenous RNase P with resultant cleavage of target mRNA(9).The individual EGS oligonucleotide sequences were named according to their predicted site of target mRNA cleavage.For example, invB108EGS(5¢-AAUGCAAAUAAAUCCacca-3¢)is complementary to invB mRNA nucleotides108±122 (5¢-GGAUUUAUUUGCAUU-3¢)and will result in RNase P cleavage of invB mRNA at nucleotide number108. The other invB or invC EGS sequences were:invC98 EGS(5¢-GGCGUGAUUUCACAAacca-3¢),invC269EGS (5¢-ACCGCGCCUAAUACCacca-3¢)and invC293EGS (5¢-ACGAUUUUCCCUGUCacca-3¢).Two previously char-acterized EGSs which are not complementary to invB or invC were also used:synthC5EGS21and synthC5EGS45(2).The EGSs synthC5EGS21and synthC5EGS45are complemen-tary to,and can guide the RNase P cleavage of,mRNA used for the recombinant synthesis of the C5protein subunit of the RNase P holoenzyme of E.coli,but are not complementary (containing at least®ve unpaired nucleotides per EGS)to the mRNA encoding C5in Salmonella.Herein,the EGSs synthC5 EGS21and synthC5EGS45are referred to as synthC5EGS1 and2,respectively.Partial RNase T1digest mapping of invB and invC mRNASingle-stranded regions of invB and invC mRNA were identi®ed using RNase T1digestion(1).Two mRNAs were digested:(i)a joint in vitro transcript containing invC mRNA 3¢to invB mRNA,transcribed from the plasmid pSB553(4) DNA after digestion with BamHI;and(ii)an invC mRNA in vitro transcript alone,expressed from plasmid pIC001(a pSB553derivative,with invB coding sequence removed via KpnI and BspEI excision)DNA after digestion with EcoRI. In vitro RNase P assaysAssays of mRNA cleavage in vitro by RNase P were performed as previously described(10),using the EGS sequences and the invB and invC mRNA targets detailed above.RNase P M1RNA was folded in a buffer containing 10mM magnesium,using a heat block to®rst heat the sample at65°C for5min and then slowly cool the sample to room temperature.For conditions of substrate excess,reagent concentrations were:11fmol labeled substrate(1100c.p.m.), 1,5and10pmol EGS,and1pmol of enzymatically active recombinant E.coli RNase P M1RNA.For conditions of limited substrate,10fmol of labeled substrate RNA (1000c.p.m.)and50,100and500fmol of EGS were used. Samples were electrophoresed in5%polyacrylamide±7M urea gels.Northern blotsNorthern blots were performed on total RNA extracts of Salmonella,using previously published techniques(11).Each lane of a2.5%agarose gel was loaded with4m g of total RNA. The UV transillumination pattern of rRNA bands after separation of each sample on an agarose gel revealed similarity in rRNA band patterns in terms of both gross quantity and quality.Northern blot probes were5¢-end-labeled DNA oligonucleotide probes.They included probes comple-mentary to invC mRNA,5S rRNA and each of the four invB and invC EGS oligonucleotides listed above.In each case, 8pmol of oligonucleotide labeled with4pmol(30m Ci)of [g-32P]ATP was used per40ml of rapid hybridization buffer (Amersham).Signal was detected using a phosphoimager (Fuji)and quantitated using image analysis software(Fuji ImageGauge).Quantitative results are reported as the ratio, expressed as a percentage,of northern blot invC mRNA band signal intensity for the matched culture specimens of a given Salmonella strain with EGS induction versus without EGS induction.Assay of Salmonella type III secretionSalmonella culture supernatant proteins were prepared and analyzed as previously described(12).Western blots were probed with polyclonal antibodies against SipB and SipC and chemiluminescent signals produced using ECL Plus western blotting detection reagents from Amersham Biosciences. Signal was detected using autoradiograph®lm(Kodak)and quantitated using image analysis software(Fuji ImageGauge). Quantitative results are reported as the ratio,expressed as a percentage,of western blot band signal intensity for the matched culture specimens of a given Salmonella strain with EGS induction versus without EGS induction.Matched culture specimens were employed as internal controls for western blots.Speci®cally,a given Salmonella transformant was grown to early log phase in a single liquid culture,then split into paired cultures which were grown simultaneously either with or without arabinose induction of EGS expression.Equal volumes of paired cultures were harvested for protein preparation at the same point of their late log phase growth,as assessed by optical density.Equal volumes of these protein preparations were loaded per well for western blot analysis.Assay of intracellular InvC protein levelSalmonella cultures in liquid media were pelleted and resuspended in one-twentieth volume of phosphate-buffered saline(PBS)±Tris(77mM Tris±HCl,pH8.0).Samples were denatured by boiling with SDS±PAGE loading buffer and separated on a9%polyacrylamide±SDS gel.Western blots were probed with a polyclonal antibody against InvC(J.E. GalaÂn and Y.Akeda),and chemiluminescent signals produced using ECL Plus western blotting detection reagents from Amersham Biosciences.Signals were detected using auto-radiograph®lm(Kodak).Quantitation of results,using matched culture specimens,was performed as described for type III secretion assays,above.Quanti®cation of bacterial entryEntry of different Salmonella strains into Henle-407cells in a gentamicin protection assay of bacterial entry into host tissue culture cell monolayers was performed and quanti®ed as previously described(13).RESULTSDesign of EGSs for invB and invC mRNA in vitroTo design the EGSs reported here,mRNA transcripts of invB and invC made in vitro were mapped using partial RNase T1 Nucleic Acids Research,2004,Vol.32,No.2849nuclease digestion to suggest EGS-accessible single-stranded mRNA regions.The ®rst nucleotide of the start codon of each gene is labeled as nucleotide 1;single-stranded guanine residues of invB mRNA were identi®ed via partial RNase T1nuclease digestion at invB nucleotides 108and 217.For invC mRNA,single-stranded guanines were identi®ed at invC nucleotides 98,237,269and 293.Given uncertainty about whether invC mRNA exists in cells independently from invB mRNA or as a joint transcript with invB ,both possibilities were examined in RNase T1digestion in vitro .RNase T1digestions were performed on two in vitro transcripts:invC mRNA alone,as well as a tandem transcript of invC mRNA immediately 3¢to invB mRNA.Single-stranded regions of invC identi®ed in the joint invB ±invC in vitro transcript were notably also found for the invC in vitro transcript alone (data not shown).EGS oligonucleotides were designed to be complementary to the RNase T1-accessible mRNA sequences invB 108±122,invC 98±112,invC 269±283and invC 293±307,and were named for their predicted nucleotide cleavage sites by RNase P:invB 108,invC 98,invC 269and invC 293,respectively.RNase P-speci®c cleavage of mRNA in vitroRNase P hydrolyzes the phosphodiester bond (in the target mRNAs)that precedes the ®rst base pair in the 5¢end of thetarget mRNA±EGS complex,akin to the site-speci®c cleavage reaction the enzyme catalyzes in the 5¢processing of precursor tRNA (9).The reaction ingredients for RNase P assays in vitro were E.coli RNase P,internally radiolabeled invB and invC mRNA target transcribed in vitro ,and EGSs complementary to portions of invB or invC mRNA.All four EGSs guide RNase P to cleave the mRNA at the predicted sites of EGS mRNA hybridization,yielding appropriately sized 5¢and 3¢cleavage products (Fig.1).RNase P cleavage of mRNA increases with increasing EGS dose,with the EGSs invB 108and invC 293most ef®cient at guiding mRNA cleavage in vitro in conditions of limited substrate (data not shown).Speci®c mRNA targeting in SalmonellaInduction of expression of invB or invC EGSs in Salmonella is followed by a decrease in invC mRNA compared with identical Salmonella transformants lacking EGS induction.Northern blots of equal microgram amounts of total RNA isolated from various Salmonella liquid cultures are shown in Figure 2,where northern blot signals for invC mRNA in matched Salmonella cultures decreased between 27and 50%following relevant EGS induction.The invB or invC EGS expression effects appear speci®c,in that there is no similar change detected in the level of constitutive 5S rRNA after EGS induction (Fig.2).Arabinose was used to induce Salmonella EGS expression.It did not have as pronounced an effect on invC mRNA in the absence of EGS expression plasmids,either in the case of Salmonella which was not transformed with an EGS expression plasmid,or in the case of Salmonella for which the EGS expression plasmid was presumably lost after prolonged culture (Fig.2).PlasmidFigure 1.RNase P±EGS cleavage of mRNA in vitro .Target substrates for cleavage include a joint transcript including both invB and invC mRNA (lane 1),and a transcript of invC mRNA alone (lane 6).The former was incubated with increasing amounts of the invB EGS 108(lanes 2±4);the lat-ter as a target for invC EGSs invC 98(lanes 7±9),invC 269(lanes 10±12)and invC 293(lanes 13±15).Lanes labeled N (lanes 5and 16)lack any EGS,but do have active RNase P with the invB and invC joint transcript (lane 5)or the invC transcript (lane 16)and show no non-speci®c target cleavage in the absence of EGS.Cleavage products were separated by size using electrophoresis in a 5%polyacrylamide±7M urea gel.Cleavage prod-uct sizes are consistent with RNase P cleavage occurring at the predicted site at the 5¢end of the mRNA region to which each EGS hybridizes.Predicted sizes of reaction products following RNase P enzymatic cleavage of in vitro transcripts are listed on the left and right of the image (e.g.invB and invC joint transcript mRNA cleavage products of 585and 123nucleo-tides for EGS invB 108;invC transcript mRNA cleavage products of 485and 198nucleotides for EGS invC 98,etc.).Figure 2.Northern blots in Salmonella with inducible expression of EGS molecules.RNA was isolated from Salmonella ,electrophoresed in a 2.5%agarose gel,and probed for invC mRNA or for constitutively produced non-targeted 5S rRNA.The partial invC in vitro transcript expressed from plas-mid pIC001DNA after digestion with EcoRI (as described for T1digest mapping)serves as a size marker (683nt).The invA mutant is SB136(also used for invasion assays).SB300is the parent Salmonella strain,from which SB300A#1was constructed.Other lanes are paired by SB300A#1Salmonella transformant type,either with (+)or without (±)the addition of arabinose for the induced expression of the EGS molecules listed.Longer term induction (++)was suspected to be accompanied by the loss of EGS expression plasmid invC 293,and an accompanying lack of effect on target mRNA.Note the decrease in invC mRNA after the induction of EGS expression,whereas non-targeted constitutive 5S rRNA levels are independ-ent of EGS expression.850Nucleic Acids Research,2004,Vol.32,No.2maintenance in transformants was assessed by parallel quan-titative plating on LB or LB ampicillin plates as previously reported (2,11).Plasmid loss was considered to have occurred when colony counts on LB plates were greater than on LB ampicillin plates by at least an order of magnitude.As previously demonstrated for other EGS transcription in this Salmonella system (7),northern blot probes complementary to EGS oligonucleotides detected EGS expression only after arabinose induction (data not shown).The effect of expression of EGSs on type III secretion by SalmonellaA standard functional assay of InvC-dependent type III secretion was employed,in which proteins secreted by the type III secretion system were measured in cell culture supernatants (12).These secreted proteins,SipB and SipC,are also encoded in the Salmonella pathogenicity island I gene complex and are reviewed elsewhere (14,15).A panel of Salmonella transformants,containing EGSs in various inducible expression plasmid vectors,was used for InvC-dependent type III secretion assays.The concurrent expression of two EGSs using any one of four high copy number plasmids derived from pUC19(2)consistently decreased SipB secretion by b 65%from that detected for the same Salmonella transformant grown in parallel under non-EGS-inducing conditions,based on the relative signal intensities of SipB western blot bands for a given Salmonella strain with versus without EGS induction (Fig.3).Using the same method of quantitative analysis,induction of the same set of EGS pairs in Salmonella transformed with a low copy number plasmid derived from pWKS30showed a 20±30%decrease in secretion (data not shown),as did any of the four EGSs when expressed alone from pUC19-derived plasmids (data not shown).These ®ndings are consistent with prior studies of EGS dose±response features in E.coli comparing EGS expression plasmids encoding single versus multiple EGSs (2)and comparing EGS expression plasmids with strong versus weak promoters (10).To assess sequence speci®city,the negative control EGSs,synthC5EGS 2and 1,against the synthetic C5component of E.coli RNase P,described above and in McKinney et al .(2),was also used.Induction of this negative control EGS was accompanied by a <10%decrease in SipB secretion as compared with non-induced parallel cultures (Fig.3).In addition,the loss of an invB or invC EGS expression plasmid from a bacterial strain was accompanied by a loss of previously observed inhibitory effects on secretion (data not shown).The effect of EGSs on intracellular InvC protein in SalmonellaA polyclonal antibody (J.E.GalaÂn and Y.Akeda)raised against recombinant InvC protein was used for western blot analysis of cellular InvC protein level as an assessment of EGS effects (Fig.4,top).A band consistent with the 47kDa InvC protein is found in the Salmonella strain SB300A#1with no EGS.An SB300strain (constructed by Y.Akeda)in which InvC expression has been disrupted via an invC deletion mutation serves as a negative control for InvC expression.Intracellular expression of InvC was also assessed in SB300A#1transformed with the EGS expression plasmid for the concurrent expression of either the EGSs invB 108/invC 98or the negative control EGSs synthC5EGS 2and 1(also shown in Fig.3).After the induction of EGS expression,the relevant protein band is not detected for SB300A#1with the invB /invC EGSs.No effect on the detection of this protein band is seen after the induction of the negative control EGS.Figure 4is representative of repeated assays in that the decrease in putative ~47kDa InvC signal cannot be explained by a general decrease in the intensity of other bandsdetectedFigure 3.Western blots of cell culture supernatants from Salmonella with (+)or without (±)the induced expression of EGS molecules listed.Western blot detects the proteins SipB and SipC,secreted into cell culture superna-tant by the type III secretion system and subsequently electrophoresed in a 9%polyacrylamide±SDS gel.The transformants shown contain a pUC19-derived high-copy number plasmid (2)from which two EGSs are concur-rently expressed.InvBB denotes inducible expression of invB 108and invB 108EGSs in tandem,InvBC denotes invB 108and invC 98EGS expression,InvCB denotes invC 293and invB 108EGS expression,and invCC denotes invC 293and invC 98EGS expression.The control concurrently expresses two EGSs targeting the mRNA used for synthetic C5protein over-expres-sion in E.coli .Migration patterns of SipB and SipC bands relative to protein molecular weight 66and 45kDa markers are as shown in Figure4.Figure 4.Western blots for Salmonella intracellular InvC (top)and for SipB and SipC secreted into Salmonella cell culture supernatants (bottom,as for Fig.3).SB300A#1without an EGS expression plasmid (no EGS)and a SB300invC deletion mutant which does not express InvC (D invC )(pro-duced by J.E.GalaÂn and Y.Akeda)are shown to the left of protein mol-ecular weight markers.At right:SB300A#1transformed with the high copy number plasmids for arabinose-inducible expression of either invB 108and invC 98EGSs (InvB/C EGS)or the control EGSs (Control EGS)described for Figure 3.EGS induction status by arabinose addition is shown as (+)or (±).Arrowheads denote the predicted locations of InvC,SipB and SipC after electrophoresis in 9%polyacrylamide±SDS gels.Nucleic Acids Research,2004,Vol.32,No.2851by the polyclonal antibody.Indeed,for the two cases of EGS induction shown here,invB/invC EGS induction is accom-panied by decreased~47kDa InvC signal in the context of strong signals for other bands,whereas negative control EGS induction is accompanied by strong~47kDa InvC signal in the context of relatively weak signals for other bands.Cell supernatants from the same experiment were used for type III secretion assays(Fig.4,bottom)as above.In each case,detection of the band representing intracellular InvC protein correlates with type III secretion.Type III secretion is decreased when intracellular InvC protein levels are de-creased,either by the static invC deletion mutation,or by the dynamic disruption of InvC expression following the induc-tion of the invB/invC EGSs.While the presumptive InvC protein band disappears in both situations,the decrease in type III secretion is more pronounced following the static deletion of the invC gene than following the induction of the invB/invC EGS.This functional assay of InvC cellular activity suggests that our invB/invC EGS system inhibits InvC-dependent type III secretion less completely than does the invC deletion-mediated ablation of InvC expression.Wild-type levels of secretion are observed for SB300A#1with no EGS plasmid, without induction of invB/invC EGSs,or with negative control EGS expression.EGS impact on Salmonella invasion into host cells Salmonella strains containing EGSs in various inducible expression plasmid vectors were also tested for their ability to invade Henle-407cells in tissue culture.In each case,a given Salmonella strain was grown in parallel liquid cultures,either with arabinose added to induce EGS induction or without the addition of arabinose.For invasion,these Salmonella strains were®rst incubated with Henle cells for45min in Hanks buffered salt solution.This was followed by a2h treatment with gentamicin to kill extracellular bacteria,and subsequent washes with tissue culture buffer.Invasion was quanti®ed as the percentage of bacteria inoculated into the tissue culture wells which were recovered from lysed Henle cells.As shown in Table1,a control Salmonella strain,SB136, with a null mutation in invA and a previously documented functional defect in type III secretion and host cell invasion (4),achieves<1%invasion into Henle cells,independent of arabinose addition.Salmonella SB300A#1transformants which express an EGS complementary to mRNA encoding synthetic C5(also shown as a negative control for type III secretion assays,above)have a b20%rate of invasion,with a small decrease in invasion observed after arabinose addition. Salmonella SB300A#1transformants which inducibly express EGSs against invB or invC from a high copy number pUC19-derived plasmid exhibit an8±12%rate of invasion without arabinose addition,which decrease to2.8±3.5%after arabi-nose induction of EGS expression.The same EGS constructs, expressed from low copy number pWKS30-derived plasmids, did not affect invasion rates after EGS induction.DISCUSSIONThe pathogenicity island genes invC and invB of Salmonella provide intriguing targets for gene product disruption.In the case of invC,mutagenesis studies clearly show that the ATPase encoded by invC is required for type III secretion in assays in vitro and is important for pathogenicity in animal models(4,5).Following appropriate EGS expression,we observe a decrease in invC mRNA,InvC intracellular protein, InvC-powered type III secretion and type III secretion-dependent host cell invasion.The inhibition of type III secretion and of Salmonella invasion using EGSs to disrupt invC mRNA is less complete than that resulting from invC deletion mutagenesis.This suggests that a certain critical level of mRNA disruption is able to partially inhibit type III secretion and host cell invasion.The level of mRNA disruption required for phenotypic changes probably varies for different target mRNAs,depending on factors such as the ratio of EGS to target mRNA(2,11),the relative ef®ciency of various EGSs and the functional reserve capacity a cell has for a given target mRNA and the protein that mRNA encodes.The EGSs reported here show greater phenotypic effects when expressed from high copy number,rather than low copy number, plasmids.This is consistent with prior EGS dose±response observations in bacteria.Phenotypic effects in E.coli are greater following EGS expression driven by a strong promoter as compared with a weak promoter(11),and the concomitant expression of different EGSs in E.coli results in phenotypic effects exhibiting additive synergy(2).The application of EGS technologies to regulate gene expression in bacteria in in vivo models of infection may bene®t from EGS expression plasmids which can be stably maintained in bacteria within an animal.We produced the low copy number plasmids reported here in an initial effort toward this end.The fact that EGSs expressed from our low copy number plasmid system did partially inhibit type III secretion but showed no apparent effect on host cell invasion suggests a possible threshold effect,in which inhibition of type III secretion must reach a critical threshold to result in inhibition of cell invasion.In contrast to the static effects on gene product disruption produced by mutagenesis techniques,our techniques of geneTable1.Invasion of Henle-407cells by Salmonella strains Salmonella strain%Invasion%InvasionNo arabinose Plus arabinoseSB136(invA-)0.08T0.040.1T0.06 SB300A#127T4.7SB300A#1transformantspUC synthC5EGS12620pUC synthC5EGS2and129T2.1pUC InvB/B EGS10T1.5 2.9T0.2 pUC InvB/C EGS9.6T1.2 2.9T0.5 pUC InvC/B EGS8.8T1.0 2.8T0.3 pUC InvC/C EGS12 3.5 pWKS InvB/B EGS2519pWKS InvB/C EGS2323pWKS InvC/B EGS1818pWKS InvC/C EGS1313Invasiveness of different Salmonella strains into Henle-407cells,in a standard gentamicin protection assay.The numbers of internalized bacteria are shown as a percentage of bacteria input.Means T SDs are shown for triplicate well assays,with no standard deviations shown for single-well assays.Salmonella strains include SB300A#1,SB300A#1transformants expressing various EGSs described in the text,and the invA-de®cient SB136.852Nucleic Acids Research,2004,Vol.32,No.2。