95 resultados para Access protocols
Resumo:
Sleep-wake disturbances are frequently observed in stroke patients and are associated with poorer functional outcome. Until now the effects of sleep on stroke evolution are unknown. The purpose of the present study was to evaluate the effects of three sleep deprivation (SD) protocols on brain damages after focal cerebral ischemia in a rat model. Permanent occlusion of distal branches of the middle cerebral artery was induced in adult rats. The animals were then subjected to 6h SD, 12h SD or sleep disturbances (SDis) in which 3 x 12h sleep deprivation were performed by gentle handling. Infarct size and brain swelling were assessed by Cresyl violet staining, and the number of damaged cells was measured by terminal deoxynucleotidyl transferase mediated dUTP nick end labeling (TUNEL) staining. Behavioral tests, namely tape removal and cylinder tests, were performed for assessing sensorimotor function. In the 6h SD protocol, no significant difference (P > 0.05) was found either in infarct size (42.5 ± 30.4 mm3 in sleep deprived animals vs. 44.5 ± 20.5 mm3 in controls, mean ± s.d.), in brain swelling (10.2 ± 3.8 % in sleep deprived animals vs. 11.3 ± 2.0 % in controls) or in number of TUNEL-positive cells (21.7 ± 2.0/mm2 in sleep deprived animals vs. 23.0 ± 1.1/mm2 in controls). In contrast, 12h sleep deprivation increased infarct size by 40 % (82.8 ± 10.9 mm3 in SD group vs. 59.2 ± 13.9 mm3 in control group, P = 0.008) and number of TUNEL-positive cells by 137 % (46.8 ± 15/mm in SD group vs. 19.7 ± 7.7/mm2 in control group, P = 0.003). There was no significant difference (P > 0.05) in brain swelling (12.9 ± 6.3 % in sleep deprived animals vs. 11.6 ± 6.0 % in controls). The SDis protocol also increased infarct size by 76 % (3 x 12h SD 58.8 ± 20.4 mm3 vs. no SD 33.8 ± 6.3 mm3, P = 0.017) and number of TUNEL-positive cells by 219 % (32.9 ± 13.2/mm2 vs. 10.3 ± 2.5/mm2, P = 0.008). Brain swelling did not show any difference between the two groups (24.5 ± 8.4 % in SD group vs. 16.7 ± 8.9 % in control group, p > 0.05). Both behavioral tests did not show any concluding results. In summary, we demonstrate that sleep deprivation aggravates brain damages in a rat model of stroke. Further experiments are needed to unveil the mechanisms underlying these effects.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
This thesis examines how oversight bodies, as part of an ATI policy, contribute to the achievement of the policy's objectives. The aim of the thesis is to see how oversight bodies and the work they do affects the implementation of their respective ATI policies and thereby contributes to the objectives of those policies using a comparative case study approach. The thesis investigates how federal/central government level information commissioners in four jurisdictions - Germany, India, Scotland, and Switzerland - enforce their respective ATI policies, which tasks they carry out in addition to their enforcement duties, the challenges they face in their work and the ways they overcome these. Qualitative data were gathered from primary and secondary documents as well as in 37 semi-structured interviews with staff of the commissioners' offices, administrative officials whose job entails complying with ATI, people who have made ATI requests and appealed to their respective oversight body, and external experts who have studied ATI implementation in their particular jurisdiction. The thesis finds that while the aspect of an oversight body's formal independence that has the greatest impact on its work is resource control and that although the powers granted by law set the framework for ensuring that the administration is properly complying with the policy, the commissioner's leadership style - a component of informal independence - has more influence than formal attributes of independence in setting out how resources are obtained and used as well as how staff set priorities and utilize the powers they are granted by law. The conclusion, therefore, is that an ATI oversight body's ability to contribute to the achievement of the policy's objectives is a function of three main factors: a. commissioner's leadership style; b. adequacy of resources and degree of control the organization has over them; c. powers and the exercise of discretion in using them. In effect, the thesis argues that it is difficult to pinpoint the value of the formal powers set out for the oversight body in the ATI law, and that their decisions on whether and how to use them are more important than the presumed strength of the powers. It also claims that the choices made by the commissioners and their staff regarding priorities and use of powers are determined to a large extent by the adequacy of resources and the degree of control the organization has over those resources. In turn, how the head of the organization leads and manages the oversight body is crucial to both the adequacy of the organization's resources and the decisions made about the use of powers. Together, these three factors have a significant impact on the body's effectiveness in contributing to ATI objectives.
Resumo:
Psychotic patients to not access easily to psychiatric care. First, psychotic disorders are difficult to identify among a great number of non psychotic depressive and anxious disorders. Second, inpatient care has shortened and now focus on acute care rather than long stay. For some psychotic patients, desinstitutionalization means exclusion and marginalization. Intensive case management can answer these needs in collaboration with relatives and professionals of patient's social network. Results and care's steps of intensive case management as practiced in Lausanne are described and illustrated with cases vignettes.
Resumo:
Due to actual demographic evolution, emergency departments have to face a dramatic increase in admissions of elderly people. The peculiar medical and socio-demographic characteristics of these old patients emphasize the need of specific decision processes and resources allocation. An individual-based approach, related to significant ethical values, should allow better diagnostic and therapeutic attitudes. Such a way to admit, evaluate and treat older patients implies an active collaboration with patients and their relatives, but also with all medical interveners, including in particular primary care physicians.
Resumo:
BACKGROUND: Many clinical studies are ultimately not fully published in peer-reviewed journals. Underreporting of clinical research is wasteful and can result in biased estimates of treatment effect or harm, leading to recommendations that are inappropriate or even dangerous. METHODS: We assembled a cohort of clinical studies approved 2000-2002 by the Research Ethics Committee of the University of Freiburg, Germany. Published full articles were searched in electronic databases and investigators contacted. Data on study characteristics were extracted from protocols and corresponding publications. We characterized the cohort, quantified its publication outcome and compared protocols and publications for selected aspects. RESULTS: Of 917 approved studies, 807 were started and 110 were not, either locally or as a whole. Of the started studies, 576 (71%) were completed according to protocol, 128 (16%) discontinued and 42 (5%) are still ongoing; for 61 (8%) there was no information about their course. We identified 782 full publications corresponding to 419 of the 807 initiated studies; the publication proportion was 52% (95% CI: 0.48-0.55). Study design was not significantly associated with subsequent publication. Multicentre status, international collaboration, large sample size and commercial or non-commercial funding were positively associated with subsequent publication. Commercial funding was mentioned in 203 (48%) protocols and in 205 (49%) of the publications. In most published studies (339; 81%) this information corresponded between protocol and publication. Most studies were published in English (367; 88%); some in German (25; 6%) or both languages (27; 6%). The local investigators were listed as (co-)authors in the publications corresponding to 259 (62%) studies. CONCLUSION: Half of the clinical research conducted at a large German university medical centre remains unpublished; future research is built on an incomplete database. Research resources are likely wasted as neither health care professionals nor patients nor policy makers can use the results when making decisions.
Resumo:
OBJECTIVES: We report a new salvage technique for treating venous aneurysms (VAs) complicating vascular access arteriovenous fistula (AVF) using externally reinforced venous aneurysmorrhaphy. DESIGN: A retrospective study over a 20-month period from a single centre. PATIENTS: Patients presenting to the vascular surgery department, Bordeaux University Hospital for revision of a vascular access AVF were included. METHODS: Reinforced venous aneurysmorrhaphy consisted in removal of redundant vessel wall followed by reinforcement using an external prosthetic graft. Patency, diameter and flow were assessed by duplex ultrasound at 1, 6 and 12 months after salvage. RESULTS: Thirty-eight eligible patients were identified. Five were excluded because VA was associated with central vein stenosis; the remaining 33 underwent salvage. Indications were rapidly expanding or painful VA in seven cases; VA with frequent bleeding or damaged overlying skin in eight; VA in close relation to a stenosis in two; and VA associated with high-flow rate in 16. Cannulation was attempted after 30 days. Mean follow-up time was 12 S.D. 5 months (range: 4-22). Two repaired AVFs failed. Primary 1-year patency was 93%. No aneurysm or infection occurred. Reduction of high flow was successful in 12 of 16 patients. The remaining four required re-operation. CONCLUSIONS: Reinforced venous aneurysmorrhaphy is effective in controlling venous dilation and achieving patency. Reduction of high-flow rates was not always achieved. Further study is needed to evaluate long-term efficacy of this treatment.
Resumo:
BACKGROUND: Efavirenz and abacavir are components of recommended first-line regimens for HIV-1 infection. We used genome-wide genotyping and clinical data to explore genetic associations with virologic failure among patients randomized to efavirenz-containing or abacavir-containing regimens in AIDS Clinical Trials Group (ACTG) protocols. PARTICIPANTS AND METHODS: Virologic response and genome-wide genotype data were available from treatment-naive patients randomized to efavirenz-containing (n=1596) or abacavir-containing (n=786) regimens in ACTG protocols 384, A5142, A5095, and A5202. RESULTS: Meta-analysis of association results across race/ethnic groups showed no genome-wide significant associations (P<5×10) with virologic response for either efavirenz or abacavir. Our sample size provided 80% power to detect a genotype relative risk of 1.8 for efavirenz and 2.4 for abacavir. Analyses focused on CYP2B genotypes that define the lowest plasma efavirenz exposure stratum did not show associations nor did analysis limited to gene sets predicted to be relevant to efavirenz and abacavir disposition. CONCLUSION: No single polymorphism is associated strongly with virologic failure with efavirenz-containing or abacavir-containing regimens. Analyses to better consider context, and that minimize confounding by nongenetic factors, may show associations not apparent here.
Resumo:
Metabolic homeostasis is achieved by complex molecular and cellular networks that differ significantly among individuals and are difficult to model with genetically engineered lines of mice optimized to study single gene function. Here, we systematically acquired metabolic phenotypes by using the EUMODIC EMPReSS protocols across a large panel of isogenic but diverse strains of mice (BXD type) to study the genetic control of metabolism. We generated and analyzed 140 classical phenotypes and deposited these in an open-access web service for systems genetics (www.genenetwork.org). Heritability, influence of sex, and genetic modifiers of traits were examined singly and jointly by using quantitative-trait locus (QTL) and expression QTL-mapping methods. Traits and networks were linked to loci encompassing both known variants and novel candidate genes, including alkaline phosphatase (ALPL), here linked to hypophosphatasia. The assembled and curated phenotypes provide key resources and exemplars that can be used to dissect complex metabolic traits and disorders.