895 resultados para Combined assurance
Resumo:
The present Working Project aims at studying the topic of assurance mapping in a specific organizational context of a Portuguese retail company. For this purpose, an assurance map framework was designed to support the decision making process of stakeholders, through the delivery of comfort concerning risks, operations and control. In the end, the framework was successfully implemented for the process sourcing of goods in two business units of the company. Although, further implementation of the framework proved not to be feasible during the project’s timespan, it is expected to occur in the near future.
Resumo:
INTRODUCTION: EORTC trial 22991 was designed to evaluate the addition of concomitant and adjuvant short-term hormonal treatments to curative radiotherapy in terms of disease-free survival for patients with intermediate risk localized prostate cancer. In order to assess the compliance to the 3D conformal radiotherapy protocol guidelines, all participating centres were requested to participate in a dummy run procedure. An individual case review was performed for the largest recruiting centres as well. MATERIALS AND METHODS: CT-data of an eligible prostate cancer patient were sent to 30 centres including a description of the clinical case. The investigator was requested to delineate the volumes of interest and to perform treatment planning according to the protocol. Thereafter, the investigators of the 12 most actively recruiting centres were requested to provide data on five randomly selected patients for an individual case review. RESULTS: Volume delineation varied significantly between investigators. Dose constraints for organs at risk (rectum, bladder, hips) were difficult to meet. In the individual case review, no major protocol deviations were observed, but a number of dose reporting problems were documented for centres using IMRT. CONCLUSIONS: Overall, results of this quality assurance program were satisfactory. The efficacy of the combination of a dummy run procedure with an individual case review is confirmed in this study, as none of the evaluated patient files harboured a major protocol deviation. Quality assurance remains a very important tool in radiotherapy to increase the reliability of the trial results. Special attention should be given when designing quality assurance programs for more complex irradiation techniques.
Resumo:
1. Wind pollination is thought to have evolved in response to selection for mechanisms to promote pollination success, when animal pollinators become scarce or unreliable. We might thus expect wind-pollinated plants to be less prone to pollen limitation than their insect-pollinated counterparts. Yet, if pollen loads on stigmas of wind-pollinated species decline with distance from pollen donors, seed set might nevertheless be pollen-limited in populations of plants that cannot self-fertilize their progeny, but not in self-compatible hermaphroditic populations.2. Here, we test this hypothesis by comparing pollen limitation between dioecious and hermaphroditic (monoecious) populations of the wind-pollinated herb Mercurialis annua.3. In natural populations, seed set was pollen-limited in low-density patches of dioecious, but not hermaphroditic, M. annua, a finding consistent with patterns of distance-dependent seed set by females in an experimental array. Nevertheless, seed set was incomplete in both dioecious and hermaphroditic populations, even at high local densities. Further, both factors limited the seed set of females and hermaphrodites, after we manipulated pollen and resource availability in a common garden experiment.4. Synthesis. Our results are consistent with the idea that pollen limitation plays a role in the evolution of combined vs. separate sexes in M. annua. Taken together, they point to the potential importance of pollen transfer between flowers on the same plant (geitonogamy) by wind as a mechanism of reproductive assurance and to the dual roles played by pollen and resource availability in limiting seed set. Thus, seed set can be pollen-limited in sparse populations of a wind-pollinated species, where mates are rare or absent, having potentially important demographic and evolutionary implications.
Resumo:
INTRODUCTION: The phase III EORTC 22033-26033/NCIC CE5 intergroup trial compares 50.4 Gy radiotherapy with up-front temozolomide in previously untreated low-grade glioma. We describe the digital EORTC individual case review (ICR) performed to evaluate protocol radiotherapy (RT) compliance. METHODS: Fifty-eight institutions were asked to submit 1-2 randomly selected cases. Digital ICR datasets were uploaded to the EORTC server and accessed by three central reviewers. Twenty-seven parameters were analysed including volume delineation, treatment planning, organ at risk (OAR) dosimetry and verification. Consensus reviews were collated and summary statistics calculated. RESULTS: Fifty-seven of seventy-two requested datasets from forty-eight institutions were technically usable. 31/57 received a major deviation for at least one section. Relocation accuracy was according to protocol in 45. Just over 30% had acceptable target volumes. OAR contours were missing in an average of 25% of cases. Up to one-third of those present were incorrectly drawn while dosimetry was largely protocol compliant. Beam energy was acceptable in 97% and 48 patients had per protocol beam arrangements. CONCLUSIONS: Digital RT plan submission and review within the EORTC 22033-26033 ICR provide a solid foundation for future quality assurance procedures. Strict evaluation resulted in overall grades of minor and major deviation for 37% and 32%, respectively.
Resumo:
Asphalt pavements suffer various failures due to insufficient quality within their design lives. The American Association of State Highway and Transportation Officials (AASHTO) Mechanistic-Empirical Pavement Design Guide (MEPDG) has been proposed to improve pavement quality through quantitative performance prediction. Evaluation of the actual performance (quality) of pavements requires in situ nondestructive testing (NDT) techniques that can accurately measure the most critical, objective, and sensitive properties of pavement systems. The purpose of this study is to assess existing as well as promising new NDT technologies for quality control/quality assurance (QC/QA) of asphalt mixtures. Specifically, this study examined field measurements of density via the PaveTracker electromagnetic gage, shear-wave velocity via surface-wave testing methods, and dynamic stiffness via the Humboldt GeoGauge for five representative paving projects covering a range of mixes and traffic loads. The in situ tests were compared against laboratory measurements of core density and dynamic modulus. The in situ PaveTracker density had a low correlation with laboratory density and was not sensitive to variations in temperature or asphalt mix type. The in situ shear-wave velocity measured by surface-wave methods was most sensitive to variations in temperature and asphalt mix type. The in situ density and in situ shear-wave velocity were combined to calculate an in situ dynamic modulus, which is a performance-based quality measurement. The in situ GeoGauge stiffness measured on hot asphalt mixtures several hours after paving had a high correlation with the in situ dynamic modulus and the laboratory density, whereas the stiffness measurement of asphalt mixtures cooled with dry ice or at ambient temperature one or more days after paving had a very low correlation with the other measurements. To transform the in situ moduli from surface-wave testing into quantitative quality measurements, a QC/QA procedure was developed to first correct the in situ moduli measured at different field temperatures to the moduli at a common reference temperature based on master curves from laboratory dynamic modulus tests. The corrected in situ moduli can then be compared against the design moduli for an assessment of the actual pavement performance. A preliminary study of microelectromechanical systems- (MEMS)-based sensors for QC/QA and health monitoring of asphalt pavements was also performed.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Purpose – The purpose of this paper is to develop an integrated patient-focused analytical framework to improve quality of care in accident and emergency (A&E) unit of a Maltese hospital. Design/methodology/approach – The study adopts a case study approach. First, a thorough literature review has been undertaken to study the various methods of healthcare quality management. Second, a healthcare quality management framework is developed using combined quality function deployment (QFD) and logical framework approach (LFA). Third, the proposed framework is applied to a Maltese hospital to demonstrate its effectiveness. The proposed framework has six steps, commencing with identifying patients’ requirements and concluding with implementing improvement projects. All the steps have been undertaken with the involvement of the concerned stakeholders in the A&E unit of the hospital. Findings – The major and related problems being faced by the hospital under study were overcrowding at A&E and shortage of beds, respectively. The combined framework ensures better A&E services and patient flow. QFD identifies and analyses the issues and challenges of A&E and LFA helps develop project plans for healthcare quality improvement. The important outcomes of implementing the proposed quality improvement programme are fewer hospital admissions, faster patient flow, expert triage and shorter waiting times at the A&E unit. Increased emergency consultant cover and faster first significant medical encounter were required to start addressing the problems effectively. Overall, the combined QFD and LFA method is effective to address quality of care in A&E unit. Practical/implications – The proposed framework can be easily integrated within any healthcare unit, as well as within entire healthcare systems, due to its flexible and user-friendly approach. It could be part of Six Sigma and other quality initiatives. Originality/value – Although QFD has been extensively deployed in healthcare setup to improve quality of care, very little has been researched on combining QFD and LFA in order to identify issues, prioritise them, derive improvement measures and implement improvement projects. Additionally, there is no research on QFD application in A&E. This paper bridges these gaps. Moreover, very little has been written on the Maltese health care system. Therefore, this study contributes demonstration of quality of emergency care in Malta.
Resumo:
We report on a new analysis of neutrino oscillations in MINOS using the complete set of accelerator and atmospheric data. The analysis combines the ν(μ) disappearance and ν(e) appearance data using the three-flavor formalism. We measure |Δm(32)(2)| = [2.28-2.46] × 10(-3) eV(2) (68% C.L.) and sin(2)θ(23) = 0.35-0.65 (90% C.L.) in the normal hierarchy, and |Δm(32)(2)| = [2.32-2.53] × 10(-3) eV(2) (68% C.L.) and sin(2)θ(23) = 0.34-0.67 (90% C.L.) in the inverted hierarchy. The data also constrain δ(CP), the θ(23} octant degeneracy and the mass hierarchy; we disfavor 36% (11%) of this three-parameter space at 68% (90%) C.L.
Resumo:
Perianal fistulizing Crohn's disease is one of the most severe phenotypes of inflammatory bowel diseases. Combined therapy with seton placement and anti-TNF therapy is the most common strategy for this condition. The aim of this study was to analyze the rates of complete perianal remission after combined therapy for perianal fistulizing Crohn's disease. This was a retrospective observational study with perianal fistulizing Crohn's disease patients submitted to combined therapy from four inflammatory bowel diseases referral centers. We analyzed patients' demographic characteristics, Montreal classification, concomitant medication, classification of the fistulae, occurrence of perianal complete remission and recurrence after remission. Complete perianal remission was defined as absence of drainage from the fistulae associated with seton removal. A total of 78 patients were included, 44 (55.8%) females with a mean age of 33.8 (±15) years. Most patients were treated with Infliximab, 66.2%, than with Adalimumab, 33.8%. Complex fistulae were found in 52/78 patients (66.7%). After a medium follow-up of 48.2 months, 41/78 patients (52.6%) had complete perianal remission (95% CI: 43.5%-63.6%). Recurrence occurred in four (9.8%) patients (95% CI: 0.7%-18.8%) in an average period of 74.8 months. Combined therapy lead to favorable and durable results in perianal fistulizing Crohn's disease.
Resumo:
Abstract Objective. The aim of this study was to evaluate the alteration of human enamel bleached with high concentrations of hydrogen peroxide associated with different activators. Materials and methods. Fifty enamel/dentin blocks (4 × 4 mm) were obtained from human third molars and randomized divided according to the bleaching procedure (n = 10): G1 = 35% hydrogen peroxide (HP - Whiteness HP Maxx); G2 = HP + Halogen lamp (HL); G3 = HP + 7% sodium bicarbonate (SB); G4 = HP + 20% sodium hydroxide (SH); and G5 = 38% hydrogen peroxide (OXB - Opalescence Xtra Boost). The bleaching treatments were performed in three sessions with a 7-day interval between them. The enamel content, before (baseline) and after bleaching, was determined using an FT-Raman spectrometer and was based on the concentration of phosphate, carbonate, and organic matrix. Statistical analysis was performed using two-way ANOVA for repeated measures and Tukey's test. Results. The results showed no significant differences between time of analysis (p = 0.5175) for most treatments and peak areas analyzed; and among bleaching treatments (p = 0.4184). The comparisons during and after bleaching revealed a significant difference in the HP group for the peak areas of carbonate and organic matrix, and for the organic matrix in OXB and HP+SH groups. Tukey's analysis determined that the difference, peak areas, and the interaction among treatment, time and peak was statistically significant (p < 0.05). Conclusion. The association of activators with hydrogen peroxide was effective in the alteration of enamel, mainly with regards to the organic matrix.
Resumo:
The local anesthetic effects on neuromuscular junction and its influence on blockade produced by nondepolarizing neuromuscular blockers are still under-investigated; however, this interaction has been described in experimental studies and in humans. The aim of this study was to evaluate in vitro the interaction between ropivacaine and pancuronium, the influence on transmission and neuromuscular blockade, and the effectiveness of neostigmine and 4-aminopyridine to reverse the blockade. Rats were divided into groups (n=5) according to the study drug: ropivacaine (5μgmL(-1)); pancuronium (2μg.mL(-1)); ropivacaine+pancuronium. Neostigmine and 4-aminopyridine were used at concentrations of 2μgmL(-1) and 20μgmL(-1), respectively. The effects of ropivacaine on membrane potential and miniature end-plate potential, the amplitude of diaphragm responses before and 60minutes after the addition of ropivacaine (degree of neuromuscular blockade with pancuronium and with the association of pancuronium-ropivacaine), and the effectiveness of neostigmine and 4-aminopyridine on neuromuscular block reversal were evaluated. Ropivacaine did not alter the amplitude of muscle response (the membrane potential), but decreased the frequency and amplitude of the miniature end-plate potential. Pancuronium blockade was potentiated by ropivacaine, and partially and fully reversed by neostigmine and 4-aminopyridine, respectively. Ropivacaine increased the neuromuscular block produced by pancuronium. The complete antagonism with 4-aminopyridine suggests presynaptic action of ropivacaine.
Resumo:
184
Resumo:
We report a combined study of external pressure and Cu-substitution on BaFe2As2 single crystals grown by the in-flux technique. At ambient pressure, the Cu-substitution is known to suppress the spin density wave (SDW) phase in pure BaFe2As2(TSDW ≈ 140 K) and to induce a superconducting (SC) dome with a maximum transition temperature [Formula: see text]. This [Formula: see text] is much lower than the Tc ∼ 15-28 K achieved in the case of Ru, Ni and Co substitutions. Such a lower Tc is attributed to a Cu(2+) magnetic pair-breaking effect. The latter is strongly suppressed by applied pressure, as shown herein, Tc can be significantly enhanced by applying high pressures. In this work, we investigated the pressure effects on Cu(2+) magnetic pair-breaking in the BaFe2-xCuxAs2 series. Around the optimal concentration (xopd = 0.11), all samples showed a substantial increase of Tc as a function of pressure. Yet for those samples with a slightly higher doping level (over-doped regime), Tc presented a dome-like shape with maximum Tc ≃ 8 K. Remarkably interesting, the under-doped samples, e.g. x = 0.02 display a maximum pressure induced Tc ≃ 30 K which is comparable to the maximum Tc's found for the pure compound under external pressures. Furthermore, the magnetoresistance effect as a function of pressure in the normal state of the x = 0.02 sample also presented an evolution consistent with the screening of the Cu(2+) local moments. These findings demonstrate that the Cu(2+) magnetic pair-breaking effect is completely suppressed by applying pressure in the low concentration regime of Cu(2+) substituted BaFe2As2.
Resumo:
The 22q11 chromosomal region contains low copy repeats (LCRs) sequences that mediate non-allelic homologous recombination, which predisposes to copy number variations (CNVs) at this locus. Hemizygous deletions of the proximal 22q11.2 region result in the 22q11.2 deletion syndrome (22q11.2 DS). In addition, 22q11.2 duplications involving the distal LCR22s have been reported. This article describes a patient presenting a 2.5-Mb de novo deletion at proximal 22q11.21 region (between LCRs A-D), combined with a 1.3-Mb maternally inherited duplication at distal 22q11.23 region (between LCRs F-H). The presence of concomitant chromosomal imbalances found in this patient has not been reported previously. Clinical and molecular data were compared with literature, in order to contribute to genotype-phenotype correlation. These findings exemplify the complexity and genetic heterogeneity observed in 22q11.2 deletion syndrome and highlights the difficulty to make genetic counseling and predict phenotypic consequences in these situations.
Resumo:
In 2004, Costa-Santos and cols. reported 24 patients from 19 Brazilian families with 17α-hydroxylase deficiency and showed that p.W406R and p.R362C corresponded to 50% and 32% of CYP17A1 mutant alleles, respectively. The present report describes clinical and molecular data of six patients from three inbred Brazilian families with 17α-hydroxlyse deficiency. All patients had hypogonadism, amenorrhea and hypertension at diagnosis. Two sisters were found to be 46,XY with both gonads palpable in the inguinal region. All patients presented hypergonadotrophic hypogonadism, with high levels of ACTH (> 104 ng/mL), suppressed plasmatic renin activity, low levels of potassium (< 2.8 mEq/L) and elevated progesterone levels (> 4.4 ng/mL). Three of them, including two sisters, were homozygous for p.W406R mutation and the other three (two sisters and one cousin) were homozygous for p.R362C. The finding of p.W406R and p.R362C in the CYP17A1 gene here reported in additional families, confirms them as the most frequent mutations causing complete combined 17α-hydroxylase/17,20-lyase deficiency in Brazilian patients.