373 resultados para prevalence function
Resumo:
Background Summarizing the epidemiology of major depressive disorder (MDD) at a global level is complicated by significant heterogeneity in the data. The aim of this study is to present a global summary of the prevalence and incidence of MDD, accounting for sources of bias, and dealing with heterogeneity. Findings are informing MDD burden quantification in the Global Burden of Disease (GBD) 2010 Study. Method A systematic review of prevalence and incidence of MDD was undertaken. Electronic databases Medline, PsycINFO and EMBASE were searched. Community-representative studies adhering to suitable diagnostic nomenclature were included. A meta-regression was conducted to explore sources of heterogeneity in prevalence and guide the stratification of data in a meta-analysis. Results The literature search identified 116 prevalence and four incidence studies. Prevalence period, sex, year of study, depression subtype, survey instrument, age and region were significant determinants of prevalence, explaining 57.7% of the variability between studies. The global point prevalence of MDD, adjusting for methodological differences, was 4.7% (4.4–5.0%). The pooled annual incidence was 3.0% (2.4–3.8%), clearly at odds with the pooled prevalence estimates and the previously reported average duration of 30 weeks for an episode of MDD. Conclusions Our findings provide a comprehensive and up-to-date profile of the prevalence of MDD globally. Region and study methodology influenced the prevalence of MDD. This needs to be considered in the GBD 2010 study and in investigations into the ecological determinants of MDD. Good-quality estimates from low-/middle-income countries were sparse. More accurate data on incidence are also required.
Resumo:
Objectives Directly measuring disease incidence in a population is difficult and not feasible to do routinely. We describe the development and application of a new method of estimating at a population level the number of incident genital chlamydia infections, and the corresponding incidence rates, by age and sex using routine surveillance data. Methods A Bayesian statistical approach was developed to calibrate the parameters of a decision-pathway tree against national data on numbers of notifications and tests conducted (2001-2013). Independent beta probability density functions were adopted for priors on the time-independent parameters; the shape parameters of these beta distributions were chosen to match prior estimates sourced from peer-reviewed literature or expert opinion. To best facilitate the calibration, multivariate Gaussian priors on (the logistic transforms of) the time-dependent parameters were adopted, using the Matérn covariance function to favour changes over consecutive years and across adjacent age cohorts. The model outcomes were validated by comparing them with other independent empirical epidemiological measures i.e. prevalence and incidence as reported by other studies. Results Model-based estimates suggest that the total number of people acquiring chlamydia per year in Australia has increased by ~120% over 12 years. Nationally, an estimated 356,000 people acquired chlamydia in 2013, which is 4.3 times the number of reported diagnoses. This corresponded to a chlamydia annual incidence estimate of 1.54% in 2013, increased from 0.81% in 2001 (~90% increase). Conclusions We developed a statistical method which uses routine surveillance (notifications and testing) data to produce estimates of the extent and trends in chlamydia incidence.
Resumo:
This paper investigates why entrepreneurs experience stigma after firm failure and what can be done to reduce it. We use attribution theory as an overarching theoretical framework and hypothesize that entrepreneurs are held more accountable than employees for their unemployment after firm failure irrespective of the circumstances causing the failure. To test this hypothesis we conduct a between group, 2x2 full factorial experiment where the cause of the failure is manipulated. We find that entrepreneurs are held more accountable for firm failure irrespective of the circumstances causing the failure and that respondents who view failure as an inherent risk of firm ownership are less likely to stigmatize failed entrepreneurs.
Resumo:
Background Diabetic foot ulceration (DFU) is a multifactorial process and is responsible for considerable morbidity and contributes to the increasing cost of health care worldwide. The diagnosis and identification of these ulcers remains a complex problem. Bacterial infection is promoted in the diabetic foot wound by decreased vascular supply and impaired host immune response. As conventional clinical microbiological methods are time-consuming and only identifies about 1% of the wound microbiota, detection of bacteria present in DFUs using molecular methods is highly advantageous and efficient. The aim of this study was to assess the virulence and methicillin resistance profiles of Staphylococcus aureus detected in DFUs using DNA-based methods. Methods A total of 223 swab samples were collected from 30 patients from March to October 2012. Bacterial DNA was extracted from the swab samples using standard procedures and was used to perform polymerase chain reaction (PCR) using specific oligonucleotide primers. The products were visualized using agarose gel electrophoresis. Results S. aureus was detected in 44.8% of samples. 25% of the S. aureus was methicillin-resistant S. aureus harboring the mecA gene. The alpha-toxin gene was present in 85% of the S. aureus positive samples. 61% of the S. aureus present in DFU samples harbored the exfoliatin factor A gene. Both the fibronectin factor A and fibronectin factor B gene were detected in 71% and 74% of the S. aureus positive samples. Conclusions DNA-based detection and characterization of bacteria in DFUs are rapid and efficient and can assist in accurate, targeted antibiotic therapy of DFU infections. The majority of S. aureus detected in this study were highly virulent and also resistant to methicillin. Further studies are required to understand the role of S. aureus in DFU trajectory.
Resumo:
We report that tumor cells devoid of their mitochondrial genome (mtDNA) show delayed tumor growth and that tumor formation is associated with acquisition of mtDNA from host cells. This leads to partial recovery of mitochondrial function in cells derived from primary tumors grown from cells without mtDNA and a shorter lag in tumor growth. Cell lines from circulating tumor cells showed further recovery of mitochondrial respiration and an intermediate lag to tumor growth, while cells from lung metastases exhibited full restoration of respiratory function and no lag in tumor growth. Stepwise assembly of mitochondrial respiratory supercomplexes was correlated with acquisition of respiratory function. Our findings indicate horizontal transfer of mtDNA from host cells in the tumor microenvironment to tumor cells with compromised respiratory function to re-establish respiration and tumor-initiating efficacy. These results suggest a novel pathophysiological process for overcoming mtDNA damage and support the notion of high plasticity of malignant cells.
Resumo:
We recorded echolocation calls from 14 sympatric species of bat in Britain. Once digitised, one temporal and four spectral features were measured from each call. The frequency-time course of each call was approximated by fitting eight mathematical functions, and the goodness of fit, represented by the mean-squared error, was calculated. Measurements were taken using an automated process that extracted a single call from background noise and measured all variables without intervention. Two species of Rhinolophus were easily identified from call duration and spectral measurements. For the remaining 12 species, discriminant function analysis and multilayer back-propagation perceptrons were used to classify calls to species level. Analyses were carried out with and without the inclusion of curve-fitting data to evaluate its usefulness in distinguishing among species. Discriminant function analysis achieved an overall correct classification rate of 79% with curve-fitting data included, while an artificial neural network achieved 87%. The removal of curve-fitting data improved the performance of the discriminant function analysis by 2 %, while the performance of a perceptron decreased by 2 %. However, an increase in correct identification rates when curve-fitting information was included was not found for all species. The use of a hierarchical classification system, whereby calls were first classified to genus level and then to species level, had little effect on correct classification rates by discriminant function analysis but did improve rates achieved by perceptrons. This is the first published study to use artificial neural networks to classify the echolocation calls of bats to species level. Our findings are discussed in terms of recent advances in recording and analysis technologies, and are related to factors causing convergence and divergence of echolocation call design in bats.
Resumo:
This study examines whether memory of antidepressant direct-to-consumer (DTC) prescription drug advertising is associated with the public stigma attached to depression. Results indicate that those who better remember antidepressant DTC ads tend to have a higher perceived prevalence of depression (i.e., more people suffer from depression). And, the perceived prevalence of depression is inversely associated with the public stigma toward depression. That is, those who have a higher perceived prevalence of depression report that they are more supportive of and comfortable with people who have depression. The results suggest that the perceived prevalence of depression is a mediating variable that accounts for the relationship between memory of antidepressant DTC ads and the public stigma toward depression. The implications and limitations of the study, as an exploratory investigation, are discussed.
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
Resumo:
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.
Resumo:
The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.
Resumo:
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.
Resumo:
The effects of reductions in cell wall lignin content, manifested by RNA interference suppression of coumaroyl 3'-hydroxylase, on plant growth, water transport, gas exchange, and photosynthesis were evaluated in hybrid poplar trees (Populus alba 3 grandidentata). The growth characteristics of the reduced lignin trees were significantly impaired, resulting in smaller stems and reduced root biomass when compared to wild-type trees, as well as altered leaf morphology and architecture. The severe inhibition of cell wall lignification produced trees with a collapsed xylem phenotype, resulting in compromised vascular integrity, and displayed reduced hydraulic conductivity and a greater susceptibility to wall failure and cavitation. In the reduced lignin trees, photosynthetic carbon assimilation and stomatal conductance were also greatly reduced, however, shoot xylem pressure potential and carbon isotope discrimination were higher and water-use efficiency was lower, inconsistent with water stress. Reductions in assimilation rate could not be ascribed to increased stomatal limitation. Starch and soluble sugars analysis of leaves revealed that photosynthate was accumulating to high levels, suggesting that the trees with substantially reduced cell wall lignin were not carbon limited and that reductions in sink strength were, instead, limiting photosynthesis.
Resumo:
It’s commonly assumed that psychiatric violence is motivated by delusions, but here the concept of a reversed impetus is explored, to understand whether delusions are formed as ad-hoc or post-hoc rationalizations of behaviour or in advance of the actus reus. The reflexive violence model proposes that perceptual stimuli has motivational power and this may trigger unwanted actions and hallucinations. The model is based on the theory of ecological perception, where opportunities enabled by an object are cues to act. As an apple triggers a desire to eat, a gun triggers a desire to shoot. These affordances (as they are called) are part of the perceptual apparatus, they allow the direct recognition of objects – and in emergencies they enable the fastest possible reactions. Even under normal circumstances, the presence of a weapon will trigger inhibited violent impulses. The presence of a victim will also, but under normal circumstances, these affordances don’t become violent because negative action impulses are totally inhibited, whereas in psychotic illness, negative action impulses are treated as emergencies and bypass frontal inhibitory circuits. What would have been object recognition becomes a blind automatic action. A range of mental illnesses can cause inhibition to be bypassed. At its most innocuous, this causes both simple hallucinations (where the motivational power of an object is misattributed). But ecological perception may have the power to trigger serious violence also –a kind that’s devoid of motives or planning and is often shrouded in amnesia or post-rational delusions.