947 research outputs found
Recommended from our members
DFN-02, Sumatriptan 10Â mg Nasal Spray with Permeation Enhancer, for the Acute Treatment of Migraine: A Randomized, Double-Blind, Placebo-Controlled Study Assessing Functional Disability and Subject Satisfaction with Treatment.
BackgroundThe commercial formulation of sumatriptan nasal spray is an effective option for migraine patients requiring or preferring a non-oral route of drug administration, but its utility is limited by poor absorption and tolerability issues. DFN-02, a new formulation of sumatriptan 10 mg nasal spray, is co-formulated with a permeation enhancer that gives it pharmacokinetics comparable to subcutaneous sumatriptan. As reported previously, DFN-02 was significantly better than placebo on multiple efficacy endpoints at 2 h postdose, including pain freedom, absence of the most bothersome symptom, and pain relief, and its safety and tolerability profiles were excellent.ObjectiveThe objective of this study was to assess the efficacy of acute treatment of migraine with DFN-02, including its effect on migraine-related functional disability and patient satisfaction with treatment.MethodsThis was a multicenter, randomized, double-blind, placebo-controlled efficacy and safety study of DFN-02 in adults with episodic migraine. Functional disability and subject satisfaction with treatment were prespecified endpoints, assessed in real-time by subjects, using an electronic diary.ResultsIn total, 107 subjects were randomized. DFN-02 was significantly superior to placebo for the reduction in functional disability score from predose level at 2 h after treatment (- 1.2 vs. - 0.6, p < 0.001). Subjects treated with DFN-02 were also more likely to be satisfied or very satisfied than subjects treated with placebo at 2 h postdose (70.0% vs. 44.2%, p = 0.027). Using the Patient Perception of Migraine Questionnaire-Revised at 24 h postdose, DFN-02 mean scores were significantly superior to placebo for the subscales of efficacy (65.2 vs. 42.5, p = 0.016) and function (68.9 vs. 42.1, p = 0.001), and for total score (71.0 vs. 56.6, p = 0.016); global medication effectiveness (p = 0.027); and overall satisfaction (p = 0.019). Placebo was significantly better than DFN-02 on the tolerability subscale (94.8 vs. 88.5, p = 0.026). At 24 h postdose, subjects reported significantly higher satisfaction with DFN-02 compared with satisfaction reported pre-randomization regarding their usual migraine medication (p = 0.012).ConclusionDFN-02 was superior to placebo for the relief of migraine-related functional disability, and provided greater satisfaction than placebo or subjects' usual acute treatment.Trial registrationClinicalTrials.gov identifier: NCT02856802
From modular invariants to graphs: the modular splitting method
We start with a given modular invariant M of a two dimensional su(n)_k
conformal field theory (CFT) and present a general method for solving the
Ocneanu modular splitting equation and then determine, in a step-by-step
explicit construction, 1) the generalized partition functions corresponding to
the introduction of boundary conditions and defect lines; 2) the quantum
symmetries of the higher ADE graph G associated to the initial modular
invariant M. Notice that one does not suppose here that the graph G is already
known, since it appears as a by-product of the calculations. We analyze several
su(3)_k exceptional cases at levels 5 and 9.Comment: 28 pages, 7 figures. Version 2: updated references. Typos corrected.
su(2) example has been removed to shorten the paper. Dual annular matrices
for the rejected exceptional su(3) diagram are determine
From conformal embeddings to quantum symmetries: an exceptional SU(4) example
We briefly discuss several algebraic tools that are used to describe the
quantum symmetries of Boundary Conformal Field Theories on a torus. The
starting point is a fusion category, together with an action on another
category described by a quantum graph. For known examples, the corresponding
modular invariant partition function, which is sometimes associated with a
conformal embedding, provides enough information to recover the whole
structure. We illustrate these notions with the example of the conformal
embedding of SU(4) at level 4 into Spin(15) at level 1, leading to the
exceptional quantum graph E4(SU(4)).Comment: 22 pages, 3 color figures. Version 2: We changed the color of figures
(ps files) in such a way that they are still understood when converted to
gray levels. Version 3: Several references have been adde
Orders and dimensions for sl(2) or sl(3) module categories and Boundary Conformal Field Theories on a torus
After giving a short description, in terms of action of categories, of some
of the structures associated with sl(2) and sl(3) boundary conformal field
theories on a torus, we provide tables of dimensions describing the semisimple
and co-semisimple blocks of the corresponding weak bialgebras (quantum
groupoids), tables of quantum dimensions and orders, and tables describing
induction - restriction. For reasons of size, the sl(3) tables of induction are
only given for theories with self-fusion (existence of a monoidal structure).Comment: 25 pages, 5 tables, 9 figures. Version 2: updated references. Typos
corrected. Several proofs added. Examples of ADE and generalized ADE
trigonometric identities have been removed to shorten the pape
Data-Oblivious Graph Algorithms in Outsourced External Memory
Motivated by privacy preservation for outsourced data, data-oblivious
external memory is a computational framework where a client performs
computations on data stored at a semi-trusted server in a way that does not
reveal her data to the server. This approach facilitates collaboration and
reliability over traditional frameworks, and it provides privacy protection,
even though the server has full access to the data and he can monitor how it is
accessed by the client. The challenge is that even if data is encrypted, the
server can learn information based on the client data access pattern; hence,
access patterns must also be obfuscated. We investigate privacy-preserving
algorithms for outsourced external memory that are based on the use of
data-oblivious algorithms, that is, algorithms where each possible sequence of
data accesses is independent of the data values. We give new efficient
data-oblivious algorithms in the outsourced external memory model for a number
of fundamental graph problems. Our results include new data-oblivious
external-memory methods for constructing minimum spanning trees, performing
various traversals on rooted trees, answering least common ancestor queries on
trees, computing biconnected components, and forming open ear decompositions.
None of our algorithms make use of constant-time random oracles.Comment: 20 page
Space-time patterns of soil pH in submountain beech ecosystems in the West Carpathians
Abstract: JanĂk R., Schieber B., Bublinec E. 2014: Space-time patterns of soil pH and conductivity in submountain beech ecosystems in the West Carpathians. Beskydy, 7 (2): 81-86 The results of pH values monitoring performed for 26 years (1988-2013) in Ĺ tiavnickĂ© vrchy Mts (middle Slovakia) are summarised. The accumulative trend of acidifying components of forest soils downwards the soil depth has been confirmed. The pH values of soil, exposed to a severe airborne pollution load in the past, were in general lower: from 5.42 in the surface humus decreasin
- …