666 resultados para panic attacks
Resumo:
Most aerial parts of the plants are covered by a hydrophobic coating called cuticle. The cuticle is formed of cutin, a complex mixture of esterified fatty acids that are embedded and associated with waxes. The cuticle often appears as a superposition of layers of different composition: The cuticle proper formed of cutin and a mixture of waxes and underneath, the cuticle layer containing cutin, intracuticular waxes and polysaccharides of the cell wall. In addition to its involvement in plant development by preventing organ fusions, the cuticle acts as a barrier to prevent water loss and protect plants against environmental aggressions such as excessive radiation or pathogens attacks. PEC1/AtABCG32 is an ABC transporter from the PDR family involved in cutin biosynthesis. Characterization of the peci mutant in Arabidopsis thaliana showed that PEC1 plays a significant role in the diffusion barrier formation in leaves and petals. The cuticles of leaves and flowers of peci are permeable and the cuticular layer rather than the cuticular proper was altered in the petals, underlining the importance of this particular layer in the maintenance of the diffusion barrier. Chemical analysis on the flower cutin monomer composition of ped mutant revealed a decrease in hydroxylated cutin monomers, suggesting a function of PEC1 in the incorporation of these monomers in the polymer cutin. However, the exact nature of the substrates of PEC1 remained elusive. PEC1 homologues in barley and rice, respectively HvABCG31/EIBI1 and OsABCG31, are also implicated in cuticle biosynthesis. Interestingly, the rice mutant displays more severe phenotypes such as dwarfism and spreading necrosis conducting to the seedling death. In this work, we further characterized osabcg31 mutant and hairpin-RNAi downregulated OsABCG31 plant lines showing reduced growth and cuticle permeability. Our analysis showed a decrease in hydroxylated cutin monomers and severe disruptions in the cuticle, which explain the permeability. Further insights into the function of the cuticle in rice resistance/susceptibility to Pathogens were obtained after inoculation with Magnaporthe oryzae, the fungus responsible for the rice blast disease. Osabcg31 as well as the transgenic lines downregulating OsABCG31 showed increased resistance to the fungus. However, only later steps of infection are reduced . and no impact is obseived on the germination or penetration stages, suggesting that the cuticle disruption per se is not responsible for the resistance. We further investigated the cause of the resistance by analyzing the expression of defense related gene in osabcg31 prior to infection. We found that osabcg31 constitutively express defense related genes, which may explain the resistance, the dwarfism and the cell death. osabcg31 is thus a tool to study the connection between cuticle, plant development and defense signaling networks in rice. The transport function of PEC1 family members is still unknown. In order to link cutin biosynthesis and transport activity, we combined ped mutation with mutations in cutin synthesis related genes. Here, we show that PEC1 acts independently from GPAT4 and GPAT8 pathway and partially overlaps with GPAT6 biosynthesis pathway that leads to the production of hydroxylated C16 cutin precursor 2-Mono(10,16-dihydroxyhexadecanoylJglycerol (2-MHG). In addition, we noticed that despite a comparable cutin monomer composition, ped mutant leaves cuticle are permeable while that of gpat6 mutant are not. This finding raises the possibility of PEC1 being required for the incorporation of C16 hydroxylated monomers and their structural arrangement rather than their direct transport towards the cuticle. A careful investigation of the cuticle permeability, cutin composition and ultrastructure during leave development in Wt plants and ped mutants revealed a possible different regulation of several pathways of cutin biosynthesis and showed the importance of PEC1 function early during leave cuticle maturation. In order to elucidate the transport activity of PEC1, we successfully expressed PEC1 in Nicotiana benthamiana plant system for direct transport experiments. This system will be used to test the PEC 1-dependent transport of potential substrates such as sn-2-monoacylglycerol loaded with a hydroxylated C16 fatty acid. -- Toutes les parties aériennes des plantes sont recouvertes d'une couche hydrophobe appelée «cuticule». Cette cuticule est composée de cutine, un polymère d'acides gras estérifiés, et de cires. La cuticule apparaît souvent sous forme de couches superposées: une première couche extérieure appelée «cuticle proper» formée de cutine et d'un mélange de cires, et une deuxième couche, la «cuticle layer», formée de cutine associée à des cires intracuticulaires et des polysaccharides pariétaux. La cuticule joue le rôle de barrière prévenant contre la perte d'eau et les agressions environnementales. AtABCG32/PEC1 est un transporteur ABC de la famille des PDR impliqué dans la synthèse de la cutine. L'étude du mutant peci d'Arabidopsis thaliana a révélé une fonction de PEC1 dans la formation de la barrière de diffusion. La cuticule des feuilles et fleurs de peci est perméable. Des altérations de la «cuticle layer» ont été démontrées, soulignant son importance dans le maintien de la barrière. L'analyse de la composition de la cutine de peci a montré une réduction spécifique en monomères hydroxylés, suggérant un rôle de PEC1 dans leur incorporation dans la cuticule. Cependant, la nature exacte des substrats de PEC1 n'a pas été identifiée. PEC1 possède deux homologues chez l'orge et le riz, respectivement HvABCG31 et OsABCG31, et qui sont impliqués dans la biosynthèse de la cuticule. Chez le riz, des phénotypes plus sévères ont été observés tels que nanisme et nécroses conduisant à la mort des jeunes plants. Dans cette étude, nous avons continué la caractérisation de osabcg31 ainsi que des lignées de riz sous exprimant le gène OsABCG31 et présentant une cuticule perméable tout en ayant une meilleure croissance. Notre étude a démontré une réduction des monomères hydroxylés de cutine et une désorganisation de la structure de la cuticule, aggravée dans le mutant osabcg31. Ce résultat explique la perméabilité observée. Des mformations P|us approfondies sur l'implication de la cuticule dans la résistance aux pathogènes ont été obtenues après inoculation du mutant osabcg31 et les lignées sous- exprimant OsABCG31 avec une souche virulente de Magnaporthe Oryzae, le champignon responsable de la pyriculariose du riz. Les différentes lignées testées ont démontré une résistance au pathogène. Cependant, seules les étapes tardives de l'infection sont réduites et aucun impact n'est observé sur la germination des spores ou la pénétration du champignon, suggérant que les modifications de la cuticule ne sont pas directement à l'origine de la résistance. L'analyse de l'expression de gènes impliqués dans la résistance à Magnaporthe.oryzae a mis en évidence l'expression constitutive de ces gènes en l'absence de tout contact avec le pathogène. Ceci explique la résistance, le nanisme et la mort cellulaire observés. Ainsi, osabcg31 représente un outil efficace pour l'étude intégrée des systèmes de régulation de la défense, de développement des plantes et la cuticule. La nature des substrats transportés par PEC1/AtABCG32 reste inconnue. Dans le but d'établir une liaison entre biosynthèse de cutine et transport des précurseurs par PEC1, la mutation peci a été combinée avec des mutants impliqués dans différentes voies de biosynthèse. Cette étude a démontré une fonction indépendante de PEC1 de la voie de biosynthèse impliquant les enzymes GPAT4 et GPAT8, et une fonction partiellement indépendante de la voie impliquant GPAT6 qui mène à la production de précurseurs sn-2- monoacylglycerol chargés en acides gras en C16 (2-MHG). De plus, malgré un profil similaire en monomères de cutine, gpat6 conserve une cuticule imperméable alors que celle de PEC1 est perméable. Ceci suggère que PEC1 est nécessaire à l'incorporation des monomères en C16 et leur arrangement structurel plutôt que simplement à leur transport direct. L'étude approfondie de la perméabilité cuticulaire, de la structure ainsi que de la composition en cutine pendant le développement des feuilles de peci et la plante sauvage a révélé l'existence de différentes régulations des voies de biosynthèses des monomères et a démontré l'importance de PEC1 dans les premières étapes de la mise en place de la cuticule. Pour identifier les substrats transportés, l'expression de PEC1 chez le système hétérologue Nicotiana benthamiana a été conduite avec succès. Ce système sera utilisé pour tester le transport de substrats potentiels tels que le sn-2-monoacylglycerol chargé en acide gras en C16.
Resumo:
In the wake of the terrorist attacks of September 11, 2001, many authors of fiction, filmmakers, journalists, public figures and scholars have attempted to narrate, recreate, explain, reflect on, and theorize about the event and its aftermath.
Resumo:
Research into the course of life, mental stamina and health status of wartime prisoners, victims of Soviet partisan attacks, and paupers in Finnish Lapland The basis of this research comprised the issues raised during the interviews conducted in my work as a general practitioner in Lapland, regarding factors that have possibly affected the life stories and health conditions of Lappish people who had lived through the war as war prisoners, victims of partisan attacks, or paupers. The purpose of the study was to describe how the different life phases and experiences emerged from the interviewees’ stories and to identify their mental stamina. Another goal was to make observations on their health status, in which the main emphasis became to address mental symptoms. The cohort consisted of elderly Finns who lived in Lapland during the war and experienced war imprisonment, pauperism, or became victims of partisan attacks. All three groups consisted of 12 interviewees. The interview transcripts were read several times and then investigated using the content analysis methods applicable to the material. The research methodology was based on building awareness and understanding. Thematic tagging and data coding were used as structured analysis tools. In all three groups most of the interviewees clearly identified their mental stamina, the most fundamental of which were home, family and work. The war prisoners’ injuries and nervous sensibility symptoms had been shown in earlier studies on war prisoners, and on this basis they had been granted disability pensions. However, many of them had suppressed their traumatic experiences and mental difficulties, and they could not talk about these issues until at the time of these interviews held at old age. Four of them still suffered from a post-traumatic stress disorder. The victims of Soviet partisans had had to carry their mental load alone for decades before the cruel ravages on civilians in remote areas of Lapland became publicly known. Most of them still had disturbing nervous sensibility symptoms. Four interviewees had a post-traumatic stress disorder, and in addition to these, the mental symptoms of one had developed into a post-traumatic stress disorder during old age. Many of the interviewees who had been left paupers remembered their childhood as filled with grief and feelings of inferiority, and had nightmares relating to their wartime experiences. Yet none of them suffered from post-traumatic stress disorder. The results showed that the exceptional suffering caused by the war, the wartime imprisonment and the devastating attacks by Soviet partisans had led especially to mental difficulties. These were left almost completely unnoticed in the post-war conditions, and the war victims were unable to seek help on their own. Based on the results, our health care for the elderly should focus on familiarization with the individual experiences and life stories of each elderly person. This can facilitate geriatric diagnostics and individual therapy planning. Empathic familiarization with the life experiences of the elderly may strengthen their mental stamina and improve the quality of successful aging.
Resumo:
The basic goal of this study is to extend old and propose new ways to generate knapsack sets suitable for use in public key cryptography. The knapsack problem and its cryptographic use are reviewed in the introductory chapter. Terminology is based on common cryptographic vocabulary. For example, solving the knapsack problem (which is here a subset sum problem) is termed decipherment. Chapter 1 also reviews the most famous knapsack cryptosystem, the Merkle Hellman system. It is based on a superincreasing knapsack and uses modular multiplication as a trapdoor transformation. The insecurity caused by these two properties exemplifies the two general categories of attacks against knapsack systems. These categories provide the motivation for Chapters 2 and 4. Chapter 2 discusses the density of a knapsack and the dangers of having a low density. Chapter 3 interrupts for a while the more abstract treatment by showing examples of small injective knapsacks and extrapolating conjectures on some characteristics of knapsacks of larger size, especially their density and number. The most common trapdoor technique, modular multiplication, is likely to cause insecurity, but as argued in Chapter 4, it is difficult to find any other simple trapdoor techniques. This discussion also provides a basis for the introduction of various categories of non injectivity in Chapter 5. Besides general ideas of non injectivity of knapsack systems, Chapter 5 introduces and evaluates several ways to construct such systems, most notably the "exceptional blocks" in superincreasing knapsacks and the usage of "too small" a modulus in the modular multiplication as a trapdoor technique. The author believes that non injectivity is the most promising direction for development of knapsack cryptosystema. Chapter 6 modifies two well known knapsack schemes, the Merkle Hellman multiplicative trapdoor knapsack and the Graham Shamir knapsack. The main interest is in aspects other than non injectivity, although that is also exploited. In the end of the chapter, constructions proposed by Desmedt et. al. are presented to serve as a comparison for the developments of the subsequent three chapters. Chapter 7 provides a general framework for the iterative construction of injective knapsacks from smaller knapsacks, together with a simple example, the "three elements" system. In Chapters 8 and 9 the general framework is put into practice in two different ways. Modularly injective small knapsacks are used in Chapter 9 to construct a large knapsack, which is called the congruential knapsack. The addends of a subset sum can be found by decrementing the sum iteratively by using each of the small knapsacks and their moduli in turn. The construction is also generalized to the non injective case, which can lead to especially good results in the density, without complicating the deciphering process too much. Chapter 9 presents three related ways to realize the general framework of Chapter 7. The main idea is to join iteratively small knapsacks, each element of which would satisfy the superincreasing condition. As a whole, none of these systems need become superincreasing, though the development of density is not better than that. The new knapsack systems are injective but they can be deciphered with the same searching method as the non injective knapsacks with the "exceptional blocks" in Chapter 5. The final Chapter 10 first reviews the Chor Rivest knapsack system, which has withstood all cryptanalytic attacks. A couple of modifications to the use of this system are presented in order to further increase the security or make the construction easier. The latter goal is attempted by reducing the size of the Chor Rivest knapsack embedded in the modified system. '
Resumo:
An efficient approach for organizing large ad hoc networks is to divide the nodesinto multiple clusters and designate, for each cluster, a clusterhead which is responsible forholding intercluster control information. The role of a clusterhead entails rights and duties.On the one hand, it has a dominant position in front of the others because it manages theconnectivity and has access to other node¿s sensitive information. But on the other hand, theclusterhead role also has some associated costs. Hence, in order to prevent malicious nodesfrom taking control of the group in a fraudulent way and avoid selfish attacks from suitablenodes, the clusterhead needs to be elected in a secure way. In this paper we present a novelsolution that guarantees the clusterhead is elected in a cheat-proof manner.
Resumo:
On this instrumental study we intend to analyse the factorial structure of the Screen for Child Anxiety Related Emotional Disorders (SCARED) in a Spanish sample using exploratory and confirmatory factorial analysis. As a second objective we intend to develop a short form of it for rapid screening and, finally, to analyze the reliabilities of both questionnaires. The SCARED was administered to a community sample of 1,508 children aged between 8 and 12 years. The sample was randomly split using half for the exploratory analysis and the other half for the confirmatory study. Furthermore a reduced version of the SCARED was developed using the SchmidLeiman procedure. Exploratory Factor Analysis yielded a four factor structure comprised of Somatic/panic, Generalized anxiety, Separation anxiety and Social phobia factors This structure was confirmed using Confirmatory Factor Analysis. The four factors, the full scale and the short scale showed good reliabilities. The results obtained seem to indicate that the Spanish version of the SCARED has good internal consistency, and along with other recent results, has a structure of four related factors that replicates the dimensions proposed for anxiety disorders by the DSM-IV-TR
Resumo:
Cardiovascular diseases are responsible for the largest number of deaths among humans worldwide, including heart attacks, strokes, and thrombosis. The treatment of thrombosis is generally through the administration of anticoagulant and/or antiplatelet drugs, which have some clinical limitations. Plants synthesize a wide variety of bioactive metabolites in response to different stimuli. This review focuses on a number of molecules of vegetal origin belonging to different chemical classes, with significant anticoagulant and antiplatelet effects. Their promising antithrombotic profile confirms the potential of natural products as a source of lead molecules for drug development in the prevention and treatment of thrombosis.
Resumo:
Chitinase is produced by a wide variety of plants as a defense against peste attacks. In this study, grape chitinases were purified 16 times by fractionation in 80% ammonium sulfate followed by dialysis and filtration. Purified chitinases exhibited enzymatic activity toward chitin azure. The yield of purified chitinase was 229 mg/L with chitinase activity of 563 U/g. Chitinases had molecular masses of 24 and 30 kDa, as evaluated by SDS-PAGE 12.5%. Two pH optima were determined 3.0 and 6.0. The optimal temperature was 42 °C. Pre hydrolysis of crystalline shrimp chitin by chitinases caused in an increase in the deacetylation ratio triggered by chitin deacetylase producing chitooligosaccharides with DA (degree acetylation) of 58.8%.
Resumo:
Coal, natural gas and petroleum-based liquid fuels are still the most widely used energy sources in modern society. The current scenario contrasts with the foreseen shortage of petroleum that was spread out in the beginning of the XXI century, when the concept of "energy security" emerged as an urgent agenda to ensure a good balance between energy supply and demand. Much beyond protecting refineries and oil ducts from terrorist attacks, these issues soon developed to a portfolio of measures related to process sustainability, involving at least three fundamental dimensions: (a) the need for technological breakthroughs to improve energy production worldwide; (b) the improvement of energy efficiency in all sectors of modern society; and (c) the increase of the social perception that education is a key-word towards a better use of our energy resources. Together with these technological, economic or social issues, "energy security" is also strongly influenced by environmental issues involving greenhouse gas emissions, loss of biodiversity in environmentally sensitive areas, pollution and poor solid waste management. For these and other reasons, the implementation of more sustainable practices in our currently available industrial facilities and the search for alternative energy sources that could partly replace the fossil fuels became a major priority throughout the world. Regarding fossil fuels, the main technological bottlenecks are related to the exploitation of less accessible petroleum resources such as those in the pre-salt layer, ranging from the proper characterization of these deep-water oil reservoirs, the development of lighter and more efficient equipment for both exploration and exploitation, the optimization of the drilling techniques, the achievement of further improvements in production yields and the establishment of specialized training programs for the technical staff. The production of natural gas from shale is also emerging in several countries but its production in large scale has several problems ranging from the unavoidable environmental impact of shale mining as well as to the bad consequences of its large scale exploitation in the past. The large scale use of coal has similar environmental problems, which are aggravated by difficulties in its proper characterization. Also, the mitigation of harmful gases and particulate matter that are released as a result of combustion is still depending on the development of new gas cleaning technologies including more efficient catalysts to improve its emission profile. On the other hand, biofuels are still struggling to fulfill their role in reducing our high dependence on fossil fuels. Fatty acid alkyl esters (biodiesel) from vegetable oils and ethanol from cane sucrose and corn starch are mature technologies whose market share is partially limited by the availability of their raw materials. For this reason, there has been a great effort to develop "second-generation" technologies to produce methanol, ethanol, butanol, biodiesel, biogas (methane), bio-oils, syngas and synthetic fuels from lower grade renewable feedstocks such as lignocellulosic materials whose consumption would not interfere with the rather sensitive issues of food security. Advanced fermentation processes are envisaged as "third generation" technologies and these are primarily linked to the use of algae feedstocks as well as other organisms that could produce biofuels or simply provide microbial biomass for the processes listed above. Due to the complexity and cost of their production chain, "third generation" technologies usually aim at high value added biofuels such as biojet fuel, biohydrogen and hydrocarbons with a fuel performance similar to diesel or gasoline, situations in which the use of genetically modified organisms is usually required. In general, the main challenges in this field could be summarized as follows: (a) the need for prospecting alternative sources of biomass that are not linked to the food chain; (b) the intensive use of green chemistry principles in our current industrial activities; (c) the development of mature technologies for the production of second and third generation biofuels; (d) the development of safe bioprocesses that are based on environmentally benign microorganisms; (e) the scale-up of potential technologies to a suitable demonstration scale; and (f) the full understanding of the technological and environmental implications of the food vs. fuel debate. On the basis of these, the main objective of this article is to stimulate the discussion and help the decision making regarding "energy security" issues and their challenges for modern society, in such a way to encourage the participation of the Brazilian Chemistry community in the design of a road map for a safer, sustainable and prosper future for our nation.
Resumo:
In this work, we studied the reactivity of picloram in the aqueous phase at the B3LYP/6-311++G(2d,2p) and MP2/6-311++G(2d,2p) levels of theory through global and local reactivity descriptors. The results obtained at the MP2 level indicate that the cationic form of picloram exhibits the highest hardness while the anionic form is the most nucleophilic. From the Fukui function values, the most reactive site for electrophilic and free radical attacks are on the nitrogen in the pyridine ring. The more reactive sites for nucleophilic attacks are located on the nitrogen atom of the amide group and on the carbon atoms located at positions 2 and 3 in the pyridine ring.
Resumo:
Since his inauguration, President Barack Obama has emphasized the need for a new cybersecurity policy, pledging to make it a "national security priority". This is a significant change in security discourse after an eight-year war on terror – a term Obama announced to be no longer in use. After several white papers, reports and the release of the so-called 60-day Cybersecurity Review, Obama announced the creation of a "cyber czar" position and a new military cyber command to coordinate American cyber defence and warfare. China, as an alleged cyber rival, has played an important role in the discourse that introduced the need for the new office and the proposals for changes in legislation. Research conducted before this study suggest the dominance of state-centric enemy descriptions paused briefly after 9/11, but returned soon into threat discourse. The focus on China's cyber activities fits this trend. The aim of this study is to analyze the type of modern threat scenarios through a linguistic case study on the reporting on Chinese hackers. The methodology of this threat analysis is based on the systemic functional language theory, and realizes as an analysis of action and being descriptions (verbs) used by the American authorities. The main sources of data include the Cybersecurity Act 2009, Securing Cyberspace for the 44th Presidency, and 2008 Report to Congress of the U.S. - China Economic and Security Review Commission. Contrary to the prevailing and popularized terrorism discourse, the results show the comeback of Cold War rhetoric as well as the establishment of a state-centric threat perception in cyber discourse. Cyber adversaries are referred to with descriptions of capacity, technological superiority and untrustworthiness, whereas the ‘self’ is described as vulnerable and weak. The threat of cyber attacks is compared to physical attacks on critical military and civilian infrastructure. The authorities and the media form a cycle, in which both sides quote each other and foster each other’s distrust and rhetoric. The white papers present China's cyber army as an existential threat. This leads to cyber discourse turning into a school-book example of a securitization process. The need for security demands action descriptions, which makes new rules and regulations acceptable. Cyber discourse has motives and agendas that are separate from real security discourse: the arms race of the 21st century is about unmanned war.
Resumo:
In São Paulo State, mainly in rural areas, the utilization of wooden poles is observed for different purposes. In this context, wood in contact with the ground presents faster deterioration, which is generally associated to environmental factors and, especially to the presence of fungi and insects. With the use of mathematical models, the useful life of wooden structures can be predicted by obtaining "climatic indexes" to indicate, comparatively among the areas studied, which have more or less tendency to fungi and insects attacks. In this work, by using climatological data of several cities at São Paulo State, a simplified mathematical model was obtained to measure the aggressiveness of the wood in contact with the soil.
Resumo:
Technical problems have hampered the study of sleep in teleosts. The electrical discharges of Gymnotus carapo L. (Gymnotidae: Gymnotiformes) were monitored to evaluate their ease and reliability as parameters to study sleep. The discharges were detected by electrodes immersed in a glass aquarium and were recorded on a conventional polygraph. G. carapo showed conspicuous signs of behavioral sleep. During these periods, opercular beat rates were counted, electric discharges recorded, and the "sharp discharge increase" (SDI) of the orienting reflex was investigated. All 20 animals monitored maintained electrical discharges during behavioral sleep. The discharge frequencies during sleep (50.3 ± 10.4 Hz) were not significantly different from those observed when the fish was awake and inactive (57.2 ± 12.1 Hz) (Wilcoxon matched-pairs signed-ranks test, P>0.05). However, the SDI, which was prevalent in the awake fish, was not observed during periods of behavioral sleep. Additional observations showed that the species had cannibalistic habits. When presented with electrical discharges from a conspecific, the sleeping fish showed an initial decrease or pause in discharge frequency, while the awake fish did not have this response. We conclude that the electrical discharges of G. carapo were not conspicuous indicators of behavioral sleep. Discharges may have been maintained during sleep for sensory purposes, i.e., conspecific detection and avoidance of cannibalistic attacks.
Resumo:
Epidemiological and clinical studies have shown a positive correlation between smoking and psychiatric disorders. To investigate the prevalence of cigarette smoking, 277 psychiatric outpatients with anxiety or depressive disorders (DSM-IV) answered a self-evaluation questionnaire about smoking behavior and were compared with a group of 68 control subjects. The diagnoses (N = 262) were: 30.2% (N = 79) major depressive disorder, 23.3% (N = 61) panic disorder, 15.6% (N = 41) social anxiety disorder, 7.3% (N = 19) other anxiety disorders, and 23.7% (N = 62) comorbidity disorders. Among them, 26.3% (N = 69) were smokers, 23.7% (N = 62) were former smokers and 50.0% (N = 131) were nonsmokers. The prevalence of nicotine dependence among the smokers was 59.0% (DSM-IV). The frequency of cigarette smoking did not show any significant difference among the five classes of diagnosis. The social anxiety disorder patients were the heaviest smokers (75.0%), with more unsuccessful attempts to stop smoking (89.0%). The frequency of former smokers was significantly higher among older subjects and nonsmokers were significantly younger (c² = 9.13, d.f. = 2, P = 0.01). Our data present some clinical implications suggesting that in our psychiatric outpatient sample with anxiety disorder, major depression and comorbidity (anxiety disorder and major depression), the frequency of cigarette smoking did not differ from the frequency found in the control group or in general population studies. Some specific features of our population (outpatients, anxiety and depressive disorders) might be responsible for these results.
Resumo:
This review covers the effect of drugs affecting anxiety using four psychological procedures for inducing experimental anxiety applied to healthy volunteers and patients with anxiety disorders. The first is aversive conditioning of the skin conductance responses to tones. The second is simulated public speaking, which consists of speaking in front of a video camera, with anxiety being measured with psychometric scales. The third is the Stroop Color-Word test, in which words naming colors are painted in the same or in a different shade, the incongruence generating a cognitive conflict. The last test is a human version of a thoroughly studied animal model of anxiety, fear-potentiated startle, in which the eye-blink reflex to a loud noise is recorded. The evidence reviewed led to the conclusion that the aversive conditioning and potentiated startle tests are based on classical conditioning of anticipatory anxiety. Their sensitivity to benzodiazepine anxiolytics suggests that these models generate an emotional state related to generalized anxiety disorder. On the other hand, the increase in anxiety determined by simulated public speaking is resistant to benzodiazepines and sensitive to drugs affecting serotonergic neurotransmission. This pharmacological profile, together with epidemiological evidence indicating its widespread prevalence, suggests that the emotional state generated by public speaking represents a species-specific response that may be related to social phobia and panic disorder. Because of scant pharmacological data, the status of the Stroop Color-Word test remains uncertain. In spite of ethical and economic constraints, human experimental anxiety constitutes a valuable tool for the study of the pathophysiology of anxiety disorders.