Risk Assessment Methodology: Maximum Tolerated Dose and Two-Stage Carcinogenesis Models

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Regulatory cancer risk assessment based on a quick estimate of a benchmark dose derived from the maximum tolerated dose.

The proposed U.S. Environmental Protection Agency carcinogen risk assessment guidelines employ a benchmark dose as a point of departure (POD) for low-dose risk assessment. If information on the carcinogenic mode of action for a chemical supports a nonlinear dose-response curve below the POD, a margin-of-exposure ratio between the POD and anticipated human exposure would be considered. The POD w...

متن کامل

Pulmonary carcinogenicity of inhaled particles and the maximum tolerated dose.

Chronic inhalation bioassays in rodents are used to assess pulmonary carcinogenicity for purposes of hazard identification and potentially for risk characterization. The influence of high experimental doses on tumor development has been recognized for some time and has led to the concept of maximum tolerated dose (MTD) for dose selection, with the highest dose being at the MTD. Exposure at the ...

متن کامل

Beyond Two-Stage Models for Lung Carcinogenesis in the Mayak Workers: Implications for Plutonium Risk

Mechanistic multi-stage models are used to analyze lung-cancer mortality after Plutonium exposure in the Mayak-workers cohort, with follow-up until 2008. Besides the established two-stage model with clonal expansion, models with three mutation stages as well as a model with two distinct pathways to cancer are studied. The results suggest that three-stage models offer an improved description of ...

متن کامل

Correction: Beyond Two-Stage Models for Lung Carcinogenesis in the Mayak Workers: Implications for Plutonium Risk

to correct formatting errors in the figures and tables. The publisher apologizes for the errors. Please download this article again to view the correct version. The originally published, uncorrected article and the republished, corrected article are provided here for reference. open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricte...

متن کامل

The Security-specific Eight Stage Risk Assessment Methodology

Existing security risk assessment methodologies have three major flaws: they rely on the assessor to formulate the chain of events that describe each of its threat scenarios, their models cause a combinatorial explosion of calculations due to analysis of the effectiveness of each countermeasure against each threat/vulnerability pair, and they do not spotlight the specific area of improvement ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Toxicologic Pathology

سال: 1994

ISSN: 0192-6233,1533-1601

DOI: 10.1177/019262339402200213