395 resultados para stress analyses
Resumo:
It is unclear which theoretical dimension of psychological stress affects health status. We hypothesized that both distress and coping mediate the relationship between socio-economic position and tooth loss. Cross-sectional data from 2915 middle-aged adults evaluated retention of < 20 teeth, behaviors, psychological stress, and sociodemographic characteristics. Principal components analysis of the Perceived Stress Scale (PSS) extracted 'distress' (a = 0.85) and 'coping' (a =0.83) factors, consistent with theory. Hierarchical entry of explanatory variables into age- and sex-adjusted logistic regression models estimated odds ratios (OR) and 95% confidence intervals [95% CI] for retention of < 20 teeth. Analysis of the separate contributions of distress and coping revealed a significant main effect of coping (OR = 0.7 [95% CI = 0.7-0.8]), but no effect for distress (OR = 1.0 [95% CI = 0.9-1.1]) or for the interaction of coping and distress. Behavior and psychological stress only modestly attenuated socio-economic inequality in retention of < 20 teeth, providing evidence to support a mediating role of coping.
Resumo:
This study investigated the psychological impact of HIV infection through assessment of posttraumatic stress disorder in response to HIV infection. Sixty-one HIV-positive homosexual/bisexual men were assessed for posttraumatic stress disorder in response to HIV infection (PTSD-HIV) using a modified PTSD module of the DIS-III-R. Thirty percent met criteria for a syndrome of posttraumatic stress disorder in response to HIV diagnosis (PTSD-HIV). In over one-third of the PTSD cases, the disorder had an onset greater than 6 months after initial HIV infection diagnosis. PTSD-HIV was associated with other psychiatric diagnoses, particularly the development of first episodes of major depression after HIV infection diagnosis. PTSD-HIV was significantly associated with a pre-HIV history of PTSD from other causes, and other pre-HIV psychiatric disorders and neuroticism scores, indicating a similarity with findings in studies of PTSD from other causes. The findings from this preliminary study suggest that a PTSD response to HIV diagnosis has clinical validity and requires further investigation in this population and other medically ill groups. The results support the inclusion of the diagnosis of life-threatening illness as a traumatic incident that may lead to a posttraumatic stress disorder, which is consistent with the DSM-IV criteria.
Resumo:
This paper is a continuation of the paper titled “Concurrent multi-scale modeling of civil infrastructure for analyses on structural deteriorating—Part I: Modeling methodology and strategy” with the emphasis on model updating and verification for the developed concurrent multi-scale model. The sensitivity-based parameter updating method was applied and some important issues such as selection of reference data and model parameters, and model updating procedures on the multi-scale model were investigated based on the sensitivity analysis of the selected model parameters. The experimental modal data as well as static response in terms of component nominal stresses and hot-spot stresses at the concerned locations were used for dynamic response- and static response-oriented model updating, respectively. The updated multi-scale model was further verified to act as the baseline model which is assumed to be finite-element model closest to the real situation of the structure available for the subsequent arbitrary numerical simulation. The comparison of dynamic and static responses between the calculated results by the final model and measured data indicated the updating and verification methods applied in this paper are reliable and accurate for the multi-scale model of frame-like structure. The general procedures of multi-scale model updating and verification were finally proposed for nonlinear physical-based modeling of large civil infrastructure, and it was applied to the model verification of a long-span bridge as an actual engineering practice of the proposed procedures.
Resumo:
The healing process for bone fractures is sensitive to mechanical stability and blood supply at the fracture site. Most currently available mechanobiological algorithms of bone healing are based solely on mechanical stimuli, while the explicit analysis of revascularization and its influences on the healing process have not been thoroughly investigated in the literature. In this paper, revascularization was described by two separate processes: angiogenesis and nutrition supply. The mathematical models for angiogenesis and nutrition supply have been proposed and integrated into an existing fuzzy algorithm of fracture healing. The computational algorithm of fracture healing, consisting of stress analysis, analyses of angiogenesis and nutrient supply, and tissue differentiation, has been tested on and compared with animal experimental results published previously. The simulation results showed that, for a small and medium-sized fracture gap, the nutrient supply is sufficient for bone healing, for a large fracture gap, non-union may be induced either by deficient nutrient supply or inadequate mechanical conditions. The comparisons with experimental results demonstrated that the improved computational algorithm is able to simulate a broad spectrum of fracture healing cases and to predict and explain delayed unions and non-union induced by large gap sizes and different mechanical conditions. The new algorithm will allow the simulation of more realistic clinical fracture healing cases with various fracture gaps and geometries and may be helpful to optimise implants and methods for fracture fixation.
Resumo:
Security-critical communications devices must be evaluated to the highest possible standards before they can be deployed. This process includes tracing potential information flow through the device's electronic circuitry, for each of the device's operating modes. Increasingly, however, security functionality is being entrusted to embedded software running on microprocessors within such devices, so new strategies are needed for integrating information flow analyses of embedded program code with hardware analyses. Here we show how standard compiler principles can augment high-integrity security evaluations to allow seamless tracing of information flow through both the hardware and software of embedded systems. This is done by unifying input/output statements in embedded program execution paths with the hardware pins they access, and by associating significant software states with corresponding operating modes of the surrounding electronic circuitry.