945 resultados para grey relational analysis (GRA)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

PURPOSE: We report the clinical, morphological, and ultrastructural findings of 13 consecutively explanted opacified Hydroview(R) (hydrogel) intraocular lenses (IOLs). Our purpose was to provide a comprehensive account on the possible factors involved in late postoperative opacification of these IOLs. PATIENTS AND METHODS: Thirteen consecutive opacified hydrogel IOLs (Hydroview H 60 M, Bausch ; Lomb) were explanted due to the significant visual impairment they caused. The IOLs underwent macroscopical examination, transmission electron microscopy (TEM), scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), and electrophoresis for protein detection. Three unused control Hydroview IOLs served for comparison. RESULTS: Macroscopical examination showed a diffuse or localized grey-whitish opacification within the IOL optic. TEM confirmed the presence of lesions inside the optic in all the explanted IOLs and revealed 3 patterns of deep deposits: a) diffuse, thick, granular, electron-dense ones; b) small, thin, lattice-like ones, with prominent electron-lucent areas; and c) elongated electron-dense formations surrounded by electron-lucent halos. SEM showed surface deposits on four IOLs. EDS revealed oxygen and carbon in all IOLs and documented calcium, phosphorus, silicon and/or iron in the deposits. Two of the patients with iron in their IOLs had eye surgery prior to their phacoemulsification. Iron correlated well with the second TEM pattern of deep lesions, whereas calcium with the third TEM pattern. No protein bands were detected on electrophoresis. Control lenses did not show any ultrastructural or chemical abnormality. CONCLUSIONS: The present study supports the presence of chemical alterations inside the polymer of the optic in late postoperative opacification of Hydroview IOLs. This opacification does not follow a unique pathway but may present under different ultrastructular patterns depending on the responsible factors. Mechanical stress during surgery may initiate a sequence of events where ions such as calcium, phosphorus, silicon, and/or iron, participate in a biochemical cascade that leads to gradual alteration of the polymer network. Intraocular inflammation due to previous operation may be a factor inducing opacification through increase of iron-binding capacity in the aqueous humour. Calcification accounts only partially for the opacification noted in this type of IOL.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper develops a process model of how and why complementarity and substitution form over time between contractual and relational governance in the context of information systems outsourcing. Our analysis identifies four distinct process patterns that explain this formation as the outcome of interaction processes between key elements of both contractual and relational governance. These patterns unveil the dynamic nature of complementarity and substitution. In particular, we show that the relationship between contractual and relational governance oscillates between complementarity and substitution. Those oscillations are triggered mainly by three types of contextual events (goal fuzziness, goal conflict, and goal misalignment). Surprisingly, substitution of informal control did not occur as an immediate reaction to external events but emerged as a consequence of preceding complementarity. Thus, our study challenges the prevailing view of an either/or dichotomy of complementarity and substitution by showing that they are causally connected over time.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Preclinical studies using animal models have shown that grey matter plasticity in both perilesional and distant neural networks contributes to behavioural recovery of sensorimotor functions after ischaemic cortical stroke. Whether such morphological changes can be detected after human cortical stroke is not yet known, but this would be essential to better understand post-stroke brain architecture and its impact on recovery. Using serial behavioural and high-resolution magnetic resonance imaging (MRI) measurements, we tracked recovery of dexterous hand function in 28 patients with ischaemic stroke involving the primary sensorimotor cortices. We were able to classify three recovery subgroups (fast, slow, and poor) using response feature analysis of individual recovery curves. To detect areas with significant longitudinal grey matter volume (GMV) change, we performed tensor-based morphometry of MRI data acquired in the subacute phase, i.e. after the stage compromised by acute oedema and inflammation. We found significant GMV expansion in the perilesional premotor cortex, ipsilesional mediodorsal thalamus, and caudate nucleus, and GMV contraction in the contralesional cerebellum. According to an interaction model, patients with fast recovery had more perilesional than subcortical expansion, whereas the contrary was true for patients with impaired recovery. Also, there were significant voxel-wise correlations between motor performance and ipsilesional GMV contraction in the posterior parietal lobes and expansion in dorsolateral prefrontal cortex. In sum, perilesional GMV expansion is associated with successful recovery after cortical stroke, possibly reflecting the restructuring of local cortical networks. Distant changes within the prefrontal-striato-thalamic network are related to impaired recovery, probably indicating higher demands on cognitive control of motor behaviour.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

During the summer of 2013 seven Italian Tyrolean Grey calves were born with abnormally short limbs. Detailed clinical and pathological examination revealed similarities to chondrodysplastic dwarfism. Pedigree analysis showed a common founder, assuming autosomal monogenic recessive transmission of the defective allele. A positional cloning approach combining genome wide association and homozygosity mapping identified a single 1.6 Mb genomic region on BTA 6 that was associated with the disease. Whole genome re-sequencing of an affected calf revealed a single candidate causal mutation in the Ellis van Creveld syndrome 2 (EVC2) gene. This gene is known to be associated with chondrodysplastic dwarfism in Japanese Brown cattle, and dwarfism, abnormal nails and teeth, and dysostosis in humans with Ellis-van Creveld syndrome. Sanger sequencing confirmed the presence of a 2 bp deletion in exon 19 (c.2993_2994ACdel) that led to a premature stop codon in the coding sequence of bovine EVC2, and was concordant with the recessive pattern of inheritance in affected and carrier animals. This loss of function mutation confirms the important role of EVC2 in bone development. Genetic testing can now be used to eliminate this form of chondrodysplastic dwarfism from Tyrolean Grey cattle.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The major bovine whey proteins, α-lactalbumin (α-LA) and β-lactoglobulin (β-LG), exhibit breed-specific genetic variation. The aim of this study was to identify possible new protein variants and determine the distribution of variants across a variety of 18 taurine and indicine cattle breeds applying a DNA-based sequencing approach. To this end, the open reading frames of the respective genes (LALBA and LGB) were sequenced in 476 animals. Within the LALBA gene, a previously unknown synonymous and a previously undesignated non-synonymous nucleotide exchange were identified. Furthermore, two known α-LA variants (A and B) and four known β-LG variants (A, B, C and W) were determined. The occurrence of typical indicine variants in some taurine cattle breeds, such as Suisse Eringer, German Hinterwälder and Hungarian Grey Steppe, further supports the hypothesis of ancient Bos indicus introgression into (peri-)alpine cattle breeds.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Trabecular bone score (TBS) is a grey-level textural index of bone microarchitecture derived from lumbar spine dual-energy X-ray absorptiometry (DXA) images. TBS is a BMD-independent predictor of fracture risk. The objective of this meta-analysis was to determine whether TBS predicted fracture risk independently of FRAX probability and to examine their combined performance by adjusting the FRAX probability for TBS. We utilized individual level data from 17,809 men and women in 14 prospective population-based cohorts. Baseline evaluation included TBS and the FRAX risk variables and outcomes during follow up (mean 6.7 years) comprised major osteoporotic fractures. The association between TBS, FRAX probabilities and the risk of fracture was examined using an extension of the Poisson regression model in each cohort and for each sex and expressed as the gradient of risk (GR; hazard ratio per 1SD change in risk variable in direction of increased risk). FRAX probabilities were adjusted for TBS using an adjustment factor derived from an independent cohort (the Manitoba Bone Density Cohort). Overall, the GR of TBS for major osteoporotic fracture was 1.44 (95% CI: 1.35-1.53) when adjusted for age and time since baseline and was similar in men and women (p > 0.10). When additionally adjusted for FRAX 10-year probability of major osteoporotic fracture, TBS remained a significant, independent predictor for fracture (GR 1.32, 95%CI: 1.24-1.41). The adjustment of FRAX probability for TBS resulted in a small increase in the GR (1.76, 95%CI: 1.65, 1.87 vs. 1.70, 95%CI: 1.60-1.81). A smaller change in GR for hip fracture was observed (FRAX hip fracture probability GR 2.25 vs. 2.22). TBS is a significant predictor of fracture risk independently of FRAX. The findings support the use of TBS as a potential adjustment for FRAX probability, though the impact of the adjustment remains to be determined in the context of clinical assessment guidelines. This article is protected by copyright. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND Panic disorder is characterised by the presence of recurrent unexpected panic attacks, discrete periods of fear or anxiety that have a rapid onset and include symptoms such as racing heart, chest pain, sweating and shaking. Panic disorder is common in the general population, with a lifetime prevalence of 1% to 4%. A previous Cochrane meta-analysis suggested that psychological therapy (either alone or combined with pharmacotherapy) can be chosen as a first-line treatment for panic disorder with or without agoraphobia. However, it is not yet clear whether certain psychological therapies can be considered superior to others. In order to answer this question, in this review we performed a network meta-analysis (NMA), in which we compared eight different forms of psychological therapy and three forms of a control condition. OBJECTIVES To assess the comparative efficacy and acceptability of different psychological therapies and different control conditions for panic disorder, with or without agoraphobia, in adults. SEARCH METHODS We conducted the main searches in the CCDANCTR electronic databases (studies and references registers), all years to 16 March 2015. We conducted complementary searches in PubMed and trials registries. Supplementary searches included reference lists of included studies, citation indexes, personal communication to the authors of all included studies and grey literature searches in OpenSIGLE. We applied no restrictions on date, language or publication status. SELECTION CRITERIA We included all relevant randomised controlled trials (RCTs) focusing on adults with a formal diagnosis of panic disorder with or without agoraphobia. We considered the following psychological therapies: psychoeducation (PE), supportive psychotherapy (SP), physiological therapies (PT), behaviour therapy (BT), cognitive therapy (CT), cognitive behaviour therapy (CBT), third-wave CBT (3W) and psychodynamic therapies (PD). We included both individual and group formats. Therapies had to be administered face-to-face. The comparator interventions considered for this review were: no treatment (NT), wait list (WL) and attention/psychological placebo (APP). For this review we considered four short-term (ST) outcomes (ST-remission, ST-response, ST-dropouts, ST-improvement on a continuous scale) and one long-term (LT) outcome (LT-remission/response). DATA COLLECTION AND ANALYSIS As a first step, we conducted a systematic search of all relevant papers according to the inclusion criteria. For each outcome, we then constructed a treatment network in order to clarify the extent to which each type of therapy and each comparison had been investigated in the available literature. Then, for each available comparison, we conducted a random-effects meta-analysis. Subsequently, we performed a network meta-analysis in order to synthesise the available direct evidence with indirect evidence, and to obtain an overall effect size estimate for each possible pair of therapies in the network. Finally, we calculated a probabilistic ranking of the different psychological therapies and control conditions for each outcome. MAIN RESULTS We identified 1432 references; after screening, we included 60 studies in the final qualitative analyses. Among these, 54 (including 3021 patients) were also included in the quantitative analyses. With respect to the analyses for the first of our primary outcomes, (short-term remission), the most studied of the included psychological therapies was CBT (32 studies), followed by BT (12 studies), PT (10 studies), CT (three studies), SP (three studies) and PD (two studies).The quality of the evidence for the entire network was found to be low for all outcomes. The quality of the evidence for CBT vs NT, CBT vs SP and CBT vs PD was low to very low, depending on the outcome. The majority of the included studies were at unclear risk of bias with regard to the randomisation process. We found almost half of the included studies to be at high risk of attrition bias and detection bias. We also found selective outcome reporting bias to be present and we strongly suspected publication bias. Finally, we found almost half of the included studies to be at high risk of researcher allegiance bias.Overall the networks appeared to be well connected, but were generally underpowered to detect any important disagreement between direct and indirect evidence. The results showed the superiority of psychological therapies over the WL condition, although this finding was amplified by evident small study effects (SSE). The NMAs for ST-remission, ST-response and ST-improvement on a continuous scale showed well-replicated evidence in favour of CBT, as well as some sparse but relevant evidence in favour of PD and SP, over other therapies. In terms of ST-dropouts, PD and 3W showed better tolerability over other psychological therapies in the short term. In the long term, CBT and PD showed the highest level of remission/response, suggesting that the effects of these two treatments may be more stable with respect to other psychological therapies. However, all the mentioned differences among active treatments must be interpreted while taking into account that in most cases the effect sizes were small and/or results were imprecise. AUTHORS' CONCLUSIONS There is no high-quality, unequivocal evidence to support one psychological therapy over the others for the treatment of panic disorder with or without agoraphobia in adults. However, the results show that CBT - the most extensively studied among the included psychological therapies - was often superior to other therapies, although the effect size was small and the level of precision was often insufficient or clinically irrelevant. In the only two studies available that explored PD, this treatment showed promising results, although further research is needed in order to better explore the relative efficacy of PD with respect to CBT. Furthermore, PD appeared to be the best tolerated (in terms of ST-dropouts) among psychological treatments. Unexpectedly, we found some evidence in support of the possible viability of non-specific supportive psychotherapy for the treatment of panic disorder; however, the results concerning SP should be interpreted cautiously because of the sparsity of evidence regarding this treatment and, as in the case of PD, further research is needed to explore this issue. Behaviour therapy did not appear to be a valid alternative to CBT as a first-line treatment for patients with panic disorder with or without agoraphobia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distribution patterns, petrography, whole-rock and mineral chemistry, and shape and fabric data are described for the most representative basement lithologies occurring as clasts (granule to bolder grain-size class) from the 625 m deep CRP-2/2A drillcore. A major change in the distribution pattern of the clast types occurs at c. 310 mbsf., with granitoid-dominated clasts above and mainly dolerite clasts below; moreover, compositional and modal data suggest a further division into seven main detrital assemblages or petrofacies. In spite of this variability, most granitoid pebbles consist of either pink or grey biotite±hornblende monzogranites. Other less common and ubiquitous lithologies include biotite syenogranite, biotite-hornblende granodiorite, tonalite, monzogranitic porphyries (very common below 310 mbsf), microgranite, and subordinately, monzogabbro, Ca-silicate rocks, biotite-clinozoisite schist and biotite orthogneiss (restricted to the pre-Pliocene strata). The ubiquitous occurrence of biotite±hornblende monzogranite pebbles in both the Quaternary-Pliocene and Miocene-Oligocene sections, apparently reflects the dominance of these lithologies in the onshore basement, and particularly in the Cambro-Ordovician Granite Harbour Igneous Complex which forms the most extensive outcrop in southern Victoria Land. The petrographical features of the other CRP-2/2A pebble lithologies are consistent with a supply dominantly from areas of the Transantarctic Mountains facing the CRP-2/2A site, and they thus provide further evidence of a local provenance for the supply of basement clasts to the CRP-2/2A sedimentary strata.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Studies were made of the glacial geology and provenance of erratic in the Shackleton Range during the German geological expedition GEISHA in 1987/88, especially in the southern and northwestern parts of the range. Evidence that the entire Shackleton Range was once overrun by ice from a southerly to southeasterly direction was provided by subglacial erosional forms (e.g. striations, crescentic gouges, roches moutonnées) and erratics which probably orriginated in the region of the Whichaway Nunataks and the Pensacola Mountains in the southern part of the range. This probably happened during the last major expansion of the Anarctic polar ice sheet, which, on the basis of evidence from other parts of the continent, occurred towards the end of the Miocene. Till and an area of scattered erratics were mapped in the northwestern part of the range. These were deposited during a period of expansion of the Slessor Glacier in the Weichselian (Wisconsian) glacial stage earlier. This expansion was caused by blockage of the glacier by an expanded Filchner ice shelf which resulted from the sinking of the sea level during the Pleistocene, as demonstrated by geological studies in the Weddell Sea and along the coast of the Ross Sea. Studies of the erratics at the edges of glaciers provided information about rock concealed by the glacier.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La seguridad verificada es una metodología para demostrar propiedades de seguridad de los sistemas informáticos que se destaca por las altas garantías de corrección que provee. Los sistemas informáticos se modelan como programas probabilísticos y para probar que verifican una determinada propiedad de seguridad se utilizan técnicas rigurosas basadas en modelos matemáticos de los programas. En particular, la seguridad verificada promueve el uso de demostradores de teoremas interactivos o automáticos para construir demostraciones completamente formales cuya corrección es certificada mecánicamente (por ordenador). La seguridad verificada demostró ser una técnica muy efectiva para razonar sobre diversas nociones de seguridad en el área de criptografía. Sin embargo, no ha podido cubrir un importante conjunto de nociones de seguridad “aproximada”. La característica distintiva de estas nociones de seguridad es que se expresan como una condición de “similitud” entre las distribuciones de salida de dos programas probabilísticos y esta similitud se cuantifica usando alguna noción de distancia entre distribuciones de probabilidad. Este conjunto incluye destacadas nociones de seguridad de diversas áreas como la minería de datos privados, el análisis de flujo de información y la criptografía. Ejemplos representativos de estas nociones de seguridad son la indiferenciabilidad, que permite reemplazar un componente idealizado de un sistema por una implementación concreta (sin alterar significativamente sus propiedades de seguridad), o la privacidad diferencial, una noción de privacidad que ha recibido mucha atención en los últimos años y tiene como objetivo evitar la publicación datos confidenciales en la minería de datos. La falta de técnicas rigurosas que permitan verificar formalmente este tipo de propiedades constituye un notable problema abierto que tiene que ser abordado. En esta tesis introducimos varias lógicas de programa quantitativas para razonar sobre esta clase de propiedades de seguridad. Nuestra principal contribución teórica es una versión quantitativa de una lógica de Hoare relacional para programas probabilísticos. Las pruebas de correción de estas lógicas son completamente formalizadas en el asistente de pruebas Coq. Desarrollamos, además, una herramienta para razonar sobre propiedades de programas a través de estas lógicas extendiendo CertiCrypt, un framework para verificar pruebas de criptografía en Coq. Confirmamos la efectividad y aplicabilidad de nuestra metodología construyendo pruebas certificadas por ordendor de varios sistemas cuyo análisis estaba fuera del alcance de la seguridad verificada. Esto incluye, entre otros, una meta-construcción para diseñar funciones de hash “seguras” sobre curvas elípticas y algoritmos diferencialmente privados para varios problemas de optimización combinatoria de la literatura reciente. ABSTRACT The verified security methodology is an emerging approach to build high assurance proofs about security properties of computer systems. Computer systems are modeled as probabilistic programs and one relies on rigorous program semantics techniques to prove that they comply with a given security goal. In particular, it advocates the use of interactive theorem provers or automated provers to build fully formal machine-checked versions of these security proofs. The verified security methodology has proved successful in modeling and reasoning about several standard security notions in the area of cryptography. However, it has fallen short of covering an important class of approximate, quantitative security notions. The distinguishing characteristic of this class of security notions is that they are stated as a “similarity” condition between the output distributions of two probabilistic programs, and this similarity is quantified using some notion of distance between probability distributions. This class comprises prominent security notions from multiple areas such as private data analysis, information flow analysis and cryptography. These include, for instance, indifferentiability, which enables securely replacing an idealized component of system with a concrete implementation, and differential privacy, a notion of privacy-preserving data mining that has received a great deal of attention in the last few years. The lack of rigorous techniques for verifying these properties is thus an important problem that needs to be addressed. In this dissertation we introduce several quantitative program logics to reason about this class of security notions. Our main theoretical contribution is, in particular, a quantitative variant of a full-fledged relational Hoare logic for probabilistic programs. The soundness of these logics is fully formalized in the Coq proof-assistant and tool support is also available through an extension of CertiCrypt, a framework to verify cryptographic proofs in Coq. We validate the applicability of our approach by building fully machine-checked proofs for several systems that were out of the reach of the verified security methodology. These comprise, among others, a construction to build “safe” hash functions into elliptic curves and differentially private algorithms for several combinatorial optimization problems from the recent literature.