945 resultados para Hand file
Resumo:
Penetrating hand wounds are common and these are managed by thorough debridement. However, stab wounds without evidence of divided structures are often treated with irrigation using antiseptic substances, antibiotic therapy, and immobilization. Octenisept® (Schülke & Mayr Ltd) is a widely used antiseptic agent for disinfection of acute or chronic wounds. It has a broad spectrum of antiseptic efficacy and has become an antiseptic of first choice in many hospitals. Within a few months, four patients presented to us with chronic inflammation and severe tissue necrosis after irrigation of penetrating hand wounds with Octenisept®. Repeated surgery and debridement was required in all patients. Wound healing was prolonged and patients had persisting oedema. Penetrating hand wounds must not be irrigated with Octenisept®.
Resumo:
The purpose of our prospective study was to document the clinical and radiological results of conservative-functional treatment of extraarticular proximal phalangeal fractures without immobilisation of the wrist.
Resumo:
Ca(v)2.1 Ca(2+) channels (P/Q-type), which participate in various key roles in the CNS by mediating calcium influx, are extensively spliced. One of its alternatively-spliced exons is 37, which forms part of the EF hand. The expression of exon 37a (EFa form), but not exon 37b (EFb form), confers the channel an activity-dependent enhancement of channel opening known as Ca(2+)-dependent facilitation (CDF). In this study, we analyzed the trend of EF hand splice variant distributions in mouse, rat and human brain tissues. We observed a developmental switch in rodents, as well as an age and gender bias in human brain tissues, suggestive of a possible role of these EF hand splice variants in neurophysiological specialization. A parallel study performed on rodent brains showed that the data drawn from human and rodent tissues may not necessarily correlate in the process of aging.
Resumo:
We report on a father and daughter with hand-foot-genital syndrome (HFGS) with typical skeletal and genitourinary anomalies due to a 14-residue polyalanine expansion in HOXA13. This is the largest (32 residues) polyalanine tract so far described for any polyalanine mutant protein. Polyalanine expansion results in protein misfolding, cytoplasmic aggregation and degradation; however, HOXA13 polyalanine expansions appear to act as loss of function mutations in contrast to gain of function for HOXD13 polyalanine expansions. To address this paradox we examined the cellular consequences of polyalanine expansions on HOXA13 protein using COS cell transfection and immunocytochemistry. HOXA13 polyalanine expansion proteins form cytoplasmic aggregates, and distribution between cytoplasmic aggregates or the nucleus is polyalanine tract size-dependent. Geldanamycin, an Hsp90 inhibitor, reduces the steady-state abundance of all polyalanine-expanded proteins in transfected cells. We also found that wild-type HOXA13 or HOXD13 proteins are sequestered in HOXA13 polyalanine expansion cytoplasmic aggregates. Thus, the difference between HOXA13 polyalanine expansion loss-of-function and HOXD13 polyalanine expansion dominant-negative effect is not the ability to aggregate wild-type group 13 paralogs but perhaps to variation in activities associated with refolding, aggregation or degradation of the proteins.
Resumo:
Project-based education and portfolio assessments are at the forefront of educational research. This research follows the implementation of a project-based unit in a high school physics class. Students played the role of an engineering firm who designed, built and tested file folder bridges. The purpose was to determine if projectbased learning could improve student attitude toward science and related careers like engineering. Teams of students presented their work in a portfolio for a final assessment of the process of designing, building and testing their bridges.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
OBJECTIVE: We sought to investigate the activity of bilateral parietal and premotor areas during a Go/No Go paradigm involving praxis movements of the dominant hand. METHODS: A sentence was presented which instructed subjects on what movement to make (S1; for example, "Show me how to use a hammer."). After an 8-s delay, "Go" or "No Go" (S2) was presented. If Go, they were instructed to make the movement described in the S1 instruction sentence as quickly as possible, and continuously until the "Rest" cue was presented 3 s later. If No Go, subjects were to simply relax until the next instruction sentence. Event-related potentials (ERP) and event-related desynchronization (ERD) in the beta band (18-22 Hz) were evaluated for three time bins: after S1, after S2, and from -2.5 to -1.5 s before the S2 period. RESULTS: Bilateral premotor ERP was greater than bilateral parietal ERP after the S2 Go compared with the No Go. Additionally, left premotor ERP was greater than that from the right premotor area. There was predominant left parietal ERD immediately after S1 for both Go and No Go, which was sustained for the duration of the interval between S1 and S2. For both S2 stimuli, predominant left parietal ERD was again seen when compared to that from the left premotor or right parietal area. However, the left parietal ERD was greater for Go than No Go. CONCLUSION: The results suggest a dominant role in the left parietal cortex for planning, executing, and suppressing praxis movements. The ERP and ERD show different patterns of activation and may reflect distinct neural movement-related activities. SIGNIFICANCE: The data can guide further studies to determine the neurophysiological changes occurring in apraxia patients and help explain the unique error profiles seen in patients with left parietal damage.
Resumo:
The optimal testing position for hand grip strength, which is a useful functional measure of nutritional status, is open to debate. We therefore examined the systematic difference between different postures in order to establish a methodology that is clinically relevant, easy to perform and reproducible.
Resumo:
Component commonality - the use of the same version of a component across multiple products - is being increasingly considered as a promising way to offer high external variety while retaining low internal variety in operations. However, increasing commonality has both positive and negative cost effects, so that optimization approaches are required to identify an optimal commonality level. As components influence to a greater or lesser extent nearly every process step along the supply chain, it is not surprising that a multitude of diverging commonality problems is being investigated in literature, each of which are developing a specific algorithm designed for the respective commonality problem being considered. The paper on hand aims at a general framework which is flexible and efficient enough to be applied to a wide range of commonality problems. Such a procedure based on a two-stage graph approach is presented and tested. Finally, flexibility of the procedure is shown by customizing the framework to account for different types of commonality problems.