930 resultados para becoming-imperceptible


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Els horts familiars són el focus de cada cop més estudis científics per la seva importància socioecològica, sobretot en les comunitats rurals o indígenes. Aquest estudi, desenvolupat a la comunitat indígena Tsimane’ de Santa Maria, té l’objectiu de determinar si existeix una relació entre la composició dels horts familiars i l’ús de les plantes medicinals. A més, també descriu i analitza les característiques bàsiques dels horts: les espècies presents, el tipus de maneig, les diferències en la implicació d’homes i dones, etc. A partir dels resultats obtinguts es pot concloure que la diversitat d’espècies trobada és de 102 (30 d’elles medicinals), i les diferències de gènere en la implicació en els horts familiars són significatives: les dones tenen mes plantes medicinals que els homes. Tanmateix, no trobem una relació entre el cultiu de plantes medicinals i la seva utilització.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bridge construction projects are becoming increasingly complex as the demand for context-sensitive solutions, aesthetic designs, and accelerated bridge construction becomes more prevalent. In addition, the Iowa Department of Transportation (Iowa DOT) is entering a phase of design and construction of large border bridges, such as the I-80 (let 2008 for $56 million) and US 34 bridges over the Missouri River and I-74 over the Mississippi River. Compared to typical construction projects, these bridges generate more contractor Requests for Information (RFIs), Value Engineering (VE) proposals, Requests for Changes (RFCs), and shop drawings. Management of these submittals is a significant challenge for Resident Construction Engineers (RCEs) and other Iowa DOT staff. In addition, some submittals require cross-departmental and project consultant reviews. Commercially available software exists for managing submittals and project collaboration teams; in-house solutions may also be possible. Implementation is intended to speed construction submittal review time, reduce incidence of delay claims, and free up Iowa DOT staff from project management administrative tasks. Researchers from Iowa State University working with the Iowa DOT conducted a multi-pronged approach to indentify a web-based collaboration solution for Iowa DOT bridge projects. An investigation was launched to determine the functional needs of the Iowa DOT. Commercially available software programs were also evaluated to find what functionality is currently available. A Request for Proposals (RFP) was written to select a commercial web-based collaboration solution for pilot testing. In the second phase of research, a solution will be selected and implemented on two pilot projects. Lessons learned from these pilot projects will assist the Iowa DOT in developing and implementing a long-term solution to improve the management of Iowa DOT bridge projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The representation of age groups is becoming an increasingly discussed topic in Swiss politics. In this study, we explore inequalities in the descriptive and substantive representation of various age groups and find that despite important disparities in descriptive representation, the policy preferences of various age groups are relatively equally represented in the lower house of the Swiss parliament. Our analysis thus suggests that even if it is gaining visibility, the age cleavage is not central for parliamentary representation in Switzerland.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article aims to analyze the different impact that some factors may exert on the probability that a small young firm invests intensively in R&D. Recently, an increasing amount of the literature makes reference to the vital role played by a small number of young firms in generating jobs and increasing efficiency levels. However, not all new firms invest in R&D. Departing from the definition of YICs (firms younger than 6 years old, fewer than 250 employees and with more than 15% of their revenues invested in R&D activities), and with an extensive sample of the Spanish Community Innovation Survey between 2004- 2010, we try to determine: i) those factors that cause firms to become YICs (innovative young small firms) or YNICs (moderately innovative young small firms); ii) what is the difference in the impact of those factors between YICs and YNICs. Our results show that factors such as initial innovation capacity and cooperation in R&D projects enhance the probability of becoming a YIC. Nevertheless, factors such as export potential and market uncertainty may influence the decision to invest moderately and become a YNIC. Keywords: Innovation, Policy, YICs. JEL Classifications: O31, D21

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sternal osteomyelitis and poststernotomy mediastinitis is a severe and life-threatening complication after the cardiac surgery. The incidence ranges up to 3% with a mortality rate up to 29%. In addition, postoperative infections after sternotomy are associated with prolonged hospital stay, increased healthcare costs and impaired quality of patient life, representing an economic and social burden. The emergence of increasing antimicrobial resistant bacteria augments the importance of postsurgical infections since the antimicrobial choices are becoming limited. Furthermore, the incidence of infection is an indicator for the quality of patient care in the international benchmark studies. Although several therapy strategies are nowadays present in clinical practice, there is a lack of evidence-based surgical consensus for treatment of this surgical complication. In most cases the poststernotomy mediastinitis involves surgical revision with debridement, open dressing and/or vacuum-assisted therapy. After the granulation tissue on open chest wound is achieved, secondary closure and/or reconstruction with vascularized soft tissue flaps, such as omentum or pectoral muscle is performed. It seems there is a need for more effective surgical treatment of poststernotomy wound infections, which may address the prolonged hospitalization and reduce the number of surgical interventions and with this also the perioperative morbidity. In light of this we propose a randomized study comparing new delayed primary closure of the sternum to the secondary vacuum-assisted closure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Enzymatic biodiesel is becoming an increasingly popular topic in bioenergy literature because of its potential to overcome the problems posed by chemical processes. However, the high cost of the enzymatic process still remains the main drawback for its industrial application, mostly because of the high price of refined oils. Unfortunately, low cost substrates, such as crude soybean oil, often release a product that hardly accomplishes the final required biodiesel specifications and need an additional pretreatment for gums removal. In order to reduce costs and to make the enzymatic process more efficient, we developed an innovative system for enzymatic biodiesel production involving a combination of a lipase and two phospholipases. This allows performing the enzymatic degumming and transesterification in a single step, using crude soybean oil as feedstock, and converting part of the phospholipids into biodiesel. Since the two processes have never been studied together, an accurate analysis of the different reaction components and conditions was carried out. Results Crude soybean oil, used as low cost feedstock, is characterized by a high content of phospholipids (900 ppm of phosphorus). However, after the combined activity of different phospholipases and liquid lipase Callera Trans L, a complete transformation into fatty acid methyl esters (FAMEs >95%) and a good reduction of phosphorus (P <5 ppm) was achieved. The combination of enzymes allowed avoidance of the acid treatment required for gums removal, the consequent caustic neutralization, and the high temperature commonly used in degumming systems, making the overall process more eco-friendly and with higher yield. Once the conditions were established, the process was also tested with different vegetable oils with variable phosphorus contents. Conclusions Use of liquid lipase Callera Trans L in biodiesel production can provide numerous and sustainable benefits. Besides reducing the costs derived from enzyme immobilization, the lipase can be used in combination with other enzymes such as phospholipases for gums removal, thus allowing the use of much cheaper, non-refined oils. The possibility to perform degumming and transesterification in a single tank involves a great efficiency increase in the new era of enzymatic biodiesel production at industrial scale.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Viking Lake State Park is beautiful resource which has been special to residents of Southwest Iowa and visitors from around the region. Unfortunately, Viking Lake itself is being impacted by non-point source pollution. Water quality conditions are becoming the reason that visitors are shying away from the park instead of flocking to it. To combat these non-point source problems the Viking Lake Water Quality Project has been initiated and $327,000 has been allocated through the Section 319/WSPF Program which will address water quality concerns in the watershed. Additionally, IDNR Fisheries is preparing for an entire renovation of Viking Lake in 2006. One funding gap remains, that may prevent this comprehensive water quality project from achieving a successful endpoint. Funds are still needed for the renovation of malfunctioning septic systems at Viking Village housing development which is adjacent to the park, and has been identified as a primary source of contamination entering the lake. The intent of this application is to secure funds so that these septic system problems can be corrected and water quality conditions of this important natural resource restored for public enjoyment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

My job today as chief justice is to inform you and all Iowans of the condition of the Iowa Judicial Branch. The judicial branch is accountable to do its work so that Iowans can see the value of its fair and impartial courts. It is accountable every day for the resources it is given and the important responsibilities with which it has been entrusted. We best meet these obligations by becoming the best court system we can be. I am honored to report the progress the judicial branch has made towards becoming the best court system in the nation and the value of this progress for all Iowans. Both my grandfathers were carpenters. Like others who build with their hands, they could look at their work at the end of the day and see progress since the beginning of the day. Building Iowa’s court system consistent with its goals may not reveal progress at the end of every day as easily as the work of a carpenter. It is a long, careful process that requires the hands of many, working every day. But, certain days do come along when progress can be seen and our goals are closer within reach. Again this year, the goals of the judicial branch are to:  Protect Iowa’s children;  Provide full-time access to justice;  Operate an efficient, full-service court system;  Provide faster and less costly resolution of legal disputes;  Remain open and transparent; and  Provide fair and impartial justice for all.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper analyses the effect of R&D investment on firm growth. We use an extensive sample of Spanish manufacturing and service firms. The database comprises diverse waves of Spanish Community Innovation Survey and covers the period 2004–2008. First, a probit model corrected for sample selection analyses the role of innovation on the probability of being a high-growth firm (HGF). Second, a quantile regression technique is applied to explore the determinants of firm growth. Our database shows that a small number of firms experience fast growth rates in terms of sales or employees. Our results reveal that R&D investments positively affect the probability of becoming a HGF. However, differences appear between manufacturing and service firms. Finally, when we study the impact of R&D investment on firm growth, quantile estimations show that internal R&D presents a significant positive impact for the upper quantiles, while external R&D shows a significant positive impact up to the median. Keywords : High-growth firms, Firm growth, Innovation activity. JEL Classifications : L11, L25, L26, O30

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As modern molecular biology moves towards the analysis of biological systems as opposed to their individual components, the need for appropriate mathematical and computational techniques for understanding the dynamics and structure of such systems is becoming more pressing. For example, the modeling of biochemical systems using ordinary differential equations (ODEs) based on high-throughput, time-dense profiles is becoming more common-place, which is necessitating the development of improved techniques to estimate model parameters from such data. Due to the high dimensionality of this estimation problem, straight-forward optimization strategies rarely produce correct parameter values, and hence current methods tend to utilize genetic/evolutionary algorithms to perform non-linear parameter fitting. Here, we describe a completely deterministic approach, which is based on interval analysis. This allows us to examine entire sets of parameters, and thus to exhaust the global search within a finite number of steps. In particular, we show how our method may be applied to a generic class of ODEs used for modeling biochemical systems called Generalized Mass Action Models (GMAs). In addition, we show that for GMAs our method is amenable to the technique in interval arithmetic called constraint propagation, which allows great improvement of its efficiency. To illustrate the applicability of our method we apply it to some networks of biochemical reactions appearing in the literature, showing in particular that, in addition to estimating system parameters in the absence of noise, our method may also be used to recover the topology of these networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Summary: Becoming a female researcher - tension points in graduate study supervision

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La complexité croissante de la prise en charge des malformations cardiaques congénitales impose des interventions chirurgicales et des cathétérismes cardiaques interventionnels fréquents. Chacune de ces techniques a ces limitations propres. Les interventions hybrides associent les avantages de la chirurgie cardiaque et du cathétérisme interventionnel. Dans notre expérience, les thérapies hybrides permettent de diminuer le temps de circulation extracorporelle, de diminuer la morbidité des interventions chirurgicales, de raccourcir le séjour du patient aux soins intensifs. Pour certaines malformations cardiaques congénitales complexes pour lesquelles il n'existe pas de chirurgie ou de thérapie interventionnelle idéale, les interventions hybrides sont en train de s'imposer comme la prise en charge incontournable. Increasing complexity in management of congenital heart disease imposes more frequent surgeries and interventions. Each technique has its own limitations, which could impair the anticipated result. Hybrid procedures join the advantages of cardiac surgery and interventions, creating a synergy in the management of these patients with cardiac anomalies. In our experience, hybrid procedures shorten cardiopulmonary bypass, reduce morbidity of surgery and reduce duration of stay in the intensive care unit. For some complex congenital heart diseases for which there are no ideal surgical or interventional options, hybrid procedures are becoming increasingly important in their management. Finally hybrid procedures allow surgeons and cardiologist to achieve complex procedures that could not be possible in another way

Relevância:

10.00% 10.00%

Publicador:

Resumo:

AIM: To assess the predictors of a significant decrease or cessation of substance use (SU) in a treated epidemiological cohort of first-episode psychosis (FEP) patients. METHOD: Participants were FEP patients of the Early Psychosis Prevention and Intervention Centre in Australia. Patients' medical files were reviewed using a standardized file audit. Data on 432 patients with FEP and baseline co-morbid substance use disorder (SUD) were available for analysis. Predictors of reduction/cessation of SU at follow up were examined using logistic regression analyses. RESULTS: In univariate analyses, a reduction/cessation of SU was predicted by baseline measures reflecting higher education, employment, accommodation with others, cannabis use disorder (CUD) only (rather than poly-SUDs), better global functioning and better premorbid social and occupational functioning, later age at onset of psychosis, and a diagnosis of non-affective psychosis. In multivariate analysis, CUD alone and better premorbid social and occupational functioning remained significant predictors. CONCLUSIONS: Addressing SUDs and social and occupational goals in people with FEP may offer opportunities to prevent SUDs becoming more severe or entrenched. Further longitudinal research on recovery from SU and FEP is needed to disentangle directions of influence and identify key targets for intervention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the current issue of epidemiology, Danaei and colleagues elegantly estimated both the direct effect and the indirect effect-that is, the effect mediated by blood pressure, cholesterol, glucose, fibrinogen, and high-sensitivity C-reactive protein-of body mass index (BMI) on the risk of coronary heart disease (CHD). they analyzed data from 9 cohort studies including 58,322 patients and 9459 CHD events, with baseline measurements between 1954 and 2001. Using sophisticated and cutting-edge methods for direct and indirect effect estimations, the authors estimated that half of the risk of overweight and obesity would be mediated by blood pressure, cholesterol, and glucose. Few additional percentage points of the risk would be mediated by fibrinogen and hs-CRP. How should we understand these estimates? Can we say that if obese persons reduce their body weight and reach a normal body weight, their excess risk of CHD would be reduced by half through an improvement in these mediators and by half through the reduction in BmI itself? Is that also true if these individuals are prevented from becoming obese in the first place? Can we also conclude that if these mediators are well controlled in obese individuals through other means than a body weight reduction, their excess risk of CHD would be reduced by half? Let us confront these estimates with observations from studies evaluating 2 interventions to reduce body weight, that is, bariatric surgery in patients with severe obesity and intensive lifestyle intervention in overweight patients with diabetes