105 research outputs found

    Comparative Pharmacoepidemiological Assessment of Antihypertensive Drugs Administration Structure in Pregnant Women in Routine Medical Practice in Kursk and Chisinau

    Get PDF
    Aim. To study the structure of antihypertensive drugs prescription in pregnant women in routine practice in Kursk and Chisinau.Material and methods. The study design was observational descriptive cross-sectional. Authors conducted a survey of doctors in medical organizations in Kursk and Chisinau in 2017-2018.Results. Respondents from Kursk and Chisinau preferred methyldopa in prescriptions of central alpha-adrenergic receptor agonists. Doctors from Chisinau used clonidine in 14.3% of cases. The leading place in the group of calcium channel blockers belonged to short-acting nifedipine. Among beta-blockers in Kursk, doctors most often prescribed bisoprolol (43.3%), metoprolol (21.7%) and nebivolol (13.3%), while in Chisinau the preference was given to metoprolol (32.1%), atenolol (19.6%) and bisoprolol (16.1%). From the group of diuretics, Kursk doctors mainly prescribed hydrochlorothiazide (10%), indapamide (6.7%); in Chisinau, indapamide was the leader (19.6%), hydrochlorothiazide was used less frequently (7,1%). From the class of alpha-blockers, prazosin occupied the leading position among respondents in Kursk, and terazosin in Chisinau.Conclusion. The priority drug classes in both regions were calcium channel blockers, central alpha-adrenergic receptor agonists and beta-blockers. A small number of not recommended drugs prescriptions have been registered. In general, the prescribed treatment corresponded to the current guidelines and protocols for the management of patients with arterial hypertension during pregnancy

    Reliability Analysis of Component-Based Systems with Multiple Failure Modes

    Get PDF
    This paper presents a novel approach to the reliability modeling and analysis of a component-based system that allows dealing with multiple failure modes and studying the error propagation among components. The proposed model permits to specify the components attitude to produce, propagate, transform or mask different failure modes. These component-level reliability specifications together with information about systems global structure allow precise estimation of reliability properties by means of analytical closed formulas, probabilistic modelchecking or simulation methods. To support the rapid identification of components that could heavily affect systems reliability, we also show how our modeling approach easily support the automated estimation of the system sensitivity to variations in the reliability properties of its components. The results of this analysis allow system designers and developers to identify critical components where it is worth spending additional improvement efforts

    An Evaluation of the Fe-N Phase Diagram Considering Long-Range Order of N Atoms in γ'-Fe4N1-x and ε-Fe2N1-z

    Get PDF
    The chemical potential of nitrogen was described as a function of nitrogen content for the Fe-N phases α-Fe[N], γ'-Fe4N1-x, and ε-Fe2N1-z. For α-Fe[N], an ideal, random distribution of the nitrogen atoms over the octahedral interstices of the bcc iron lattice was assumed; for γ'-Fe4N1-x and ε-Fe2N1-z, the occurrence of a long-range ordered distribution of the nitrogen atoms over the octahedral interstices of the close packed iron sublattices (fcc and hcp, respectively) was taken into account. The theoretical expressions were fitted to nitrogen-absorption isotherm data for the three Fe-N phases. The α/α + γ', α + γ'/γ', γ'/γ' + ε, and γ' + ε/ε phase boundaries in the Fe-N phase diagram were calculated from combining the quantitative descriptions for the absorption isotherms with the known composition of NH3/H2 gas mixtures in equilibrium with coexisting α and γ' phases and in equilibrium with coexisting γ' and ε phases. Comparison of the present phase boundaries with experimental data and previously calculated phase boundaries showed a major improvement as compared to the previously calculated Fe-N phase diagrams, where long-range order for the nitrogen atoms in the γ' and ε phases was not accounted for

    Using Relational Verification for Program Slicing

    Get PDF
    Program slicing is the process of removing statements from a program such that defined aspects of its behavior are retained. For producing precise slices, i.e., slices that are minimal in size, the program\u27s semantics must be considered. Existing approaches that go beyond a syntactical analysis and do take the semantics into account are not fully automatic and require auxiliary specifications from the user. In this paper, we adapt relational verification to check whether a slice candidate obtained by removing some instructions from a program is indeed a valid slice. Based on this, we propose a framework for precise and automatic program slicing. As part of this framework, we present three strategies for the generation of slice candidates, and we show how dynamic slicing approaches - that interweave generating and checking slice candidates - can be used for this purpose. The framework can easily be extended with other strategies for generating slice candidates. We discuss the strengths and weaknesses of slicing approaches that use our framework

    Optimizing investments in cyber hygiene for protecting healthcare users

    Get PDF
    Cyber hygiene measures are often recommended for strengthening an organization’s security posture, especially for protecting against social engineering attacks that target the human element. However, the related recommendations are typically the same for all organizations and their employees, regardless of the nature and the level of risk for different groups of users. Building upon an existing cybersecurity investment model, this paper presents a tool for optimal selection of cyber hygiene safeguards, which we refer as the Optimal Safeguards Tool (OST). The model combines game theory and combinatorial optimization (0-1 Knapsack) taking into account the probability of each user group to being attacked, the value of assets accessible by each group, and the efficacy of each control for a particular group. The model considers indirect cost as the time employees could require for learning and trainning against an implemented control. Utilizing a game-theoretic framework to support the Knapsack optimization problem permits us to optimally select safeguards’ application levels minimizing the aggregated expected damage within a security investment budget. We evaluate OST in a healthcare domain use case. In particular, on the Critical Internet Security (CIS) Control group 17 for implementing security awareness and training programs for employees belonging to the ICT, clinical and administration personnel of a hospital. We compare the strategies implemented by OST against alternative common-sense defending approaches for three different types of attackers: Nash, Weighted and Opportunistic. Our results show that Nash defending strategies are consistently better than the competing strategies for all attacker types with a minor exception where the Nash defending strategy, for a specific game, performs at least as good as other common-sense approaches. Finally, we illustrate the alternative investment strategies on different Nash equilibria (called plans) and discuss the optimal choice using the framework of 0-1 Knapsack optimization

    A FORMAL MODEL OF PROGRAM DEPENDENCES AND ITS IMPLICATIONS FOR SOFTWARE TESTING, DEBUGGING, AND MAINTENANCE

    No full text
    A formal, general model of program dependences is presented and used to evaluate several dependence-based software testing, debugging, and maintenance techniques. Two generalizations of control and data flow dependence, called weak and strong syntactic dependence, are introduced and related to a concept called semantic dependence. Semantic dependence models the ability of a program statement to affect the execution behavior of other statements. It is shown, among other things, that weak syntactic dependence is a necessary but not sufficient condition for semantic dependence and that strong syntactic dependence is a necessary but not sufficient condition for a restricted form of semantic dependence that is finitely demonstrated. These results are then used to support some proposed uses of program dependences, to controvert others, and to suggest new uses.
    corecore