43 research outputs found

    Simulating hemispatial neglect with virtual reality

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Hemispatial neglect is a cognitive disorder defined as a lack of attention for stimuli contra-lateral to the brain lesion. The assessment is traditionally done with basic pencil and paper tests and the rehabilitation programs are generally not well adapted. We propose a virtual reality system featuring an eye-tracking device for a better characterization of the neglect that will lead to new rehabilitation techniques.</p> <p>Methods</p> <p>This paper presents a comparison of eye-gaze patterns of healthy subjects, patients and healthy simulated patients on a virtual line bisection test. The task was also executed with a reduced visual field condition hoping that fewer stimuli would limit the neglect.</p> <p>Results</p> <p>We found that patients and healthy simulated patients had similar eye-gaze patterns. However, while the reduced visual field condition had no effect on the healthy simulated patients, it actually had a negative impact on the patients. We discuss the reasons for these differences and how they relate to the limitations of the neglect simulation.</p> <p>Conclusion</p> <p>We argue that with some improvements the technique could be used to determine the potential of new rehabilitation techniques and also help the rehabilitation staff or the patient's relatives to better understand the neglect condition.</p

    Validation of a low-cost virtual reality system for training street-crossing. A comparative study in healthy, neglected and non-neglected stroke individuals

    Full text link
    Unilateral spatial neglect is a common consequence of stroke that directly affects the performance of activities of daily living. This impairment is traditionally assessed with paper-and-pencil tests that can lack correspondence to real life and are easily compensated. Virtual reality can immerse patients in more ecological scenarios, thus providing therapists with new tools to assess and train the effects of this impairment in simulated real tasks. This paper presents the clinical validation and convergent validity of a low-cost virtual reality system for training street-crossing in stroke patients with and without neglect. The performance of neglect patients was significantly worse than the performance of non-neglect and healthy participants. In addition, several correlations between the scores in the system and in the traditional scales were detected.This study was funded in part by Ministerio de Educacion y Ciencia Spain, Projects Consolider-C (SEJ2006-14301/PSIC), "CIBER of Physiopathology of Obesity and Nutrition, an initiative of ISCIII" and the Excellence Research Program PROMETEO (Generalitat Valenciana. Conselleria de Educacion, 2008-157).Navarro, MD.; Llorens RodrĂ­guez, R.; NoĂ©, E.; Ferri, J.; Alcañiz Raya, ML. (2013). Validation of a low-cost virtual reality system for training street-crossing. A comparative study in healthy, neglected and non-neglected stroke individuals. Neuropsychological Rehabilitation. 23(4):597-618. https://doi.org/10.1080/09602011.2013.806269S597618234Allegri, R. F. (2000). AtenciĂłn y negligencia: bases neurolĂłgicas, evaluaciĂłn y trastornos. Revista de NeurologĂ­a, 30(05), 491. doi:10.33588/rn.3005.99645Appelros, P., Karlsson, G. M., Seiger, &#x000C5;ke, & Nydevik, I. (2002). Neglect and Anosognosia After First-Ever Stroke: Incidence and Relationship to Disability. Journal of Rehabilitation Medicine, 34(5), 215-220. doi:10.1080/165019702760279206Baheux, K., Yoshizawa, M., & Yoshida, Y. (2007). Simulating hemispatial neglect with virtual reality. Journal of NeuroEngineering and Rehabilitation, 4(1). doi:10.1186/1743-0003-4-27Boian, R. F., Burdea, G. C., Deutsch, J. E. and Winter, S. H. Street crossing using a virtual environment mobility simulator.Paper presented at 3rd Annual International Workshop on Virtual Reality. Lausanne, Switzerland.Broeren, J., Samuelsson, H., Stibrant-Sunnerhagen, K., Blomstrand, C., & Rydmark, M. (2007). Neglect assessment as an application of virtual reality. Acta Neurologica Scandinavica, 116(3), 157-163. doi:10.1111/j.1600-0404.2007.00821.xBuxbaum, L. J., Ferraro, M. K., Veramonti, T., Farne, A., Whyte, J., Ladavas, E., 
 Coslett, H. B. (2004). Hemispatial neglect: Subtypes, neuroanatomy, and disability. Neurology, 62(5), 749-756. doi:10.1212/01.wnl.0000113730.73031.f4Buxbaum, L. J., Palermo, M. A., Mastrogiovanni, D., Read, M. S., Rosenberg-Pitonyak, E., Rizzo, A. A., & Coslett, H. B. (2008). Assessment of spatial attention and neglect with a virtual wheelchair navigation task. Journal of Clinical and Experimental Neuropsychology, 30(6), 650-660. doi:10.1080/13803390701625821Castiello, U., Lusher, D., Burton, C., Glover, S., & Disler, P. (2004). Improving left hemispatial neglect using virtual reality. Neurology, 62(11), 1958-1962. doi:10.1212/01.wnl.0000128183.63917.02Conners, C. K., Epstein, J. N., Angold, A., & Klaric, J. (2003). Journal of Abnormal Child Psychology, 31(5), 555-562. doi:10.1023/a:1025457300409Folstein, M. F., Folstein, S. E., & McHugh, P. R. (1975). «Mini-mental state». Journal of Psychiatric Research, 12(3), 189-198. doi:10.1016/0022-3956(75)90026-6Fordell, H., Bodin, K., Bucht, G., & Malm, J. (2011). A virtual reality test battery for assessment and screening of spatial neglect. Acta Neurologica Scandinavica, 123(3), 167-174. doi:10.1111/j.1600-0404.2010.01390.xGupta, V., Knott, B. A., Kodgi, S., & Lathan, C. E. (2000). Using the «VREye» System for the Assessment of Unilateral Visual Neglect: Two Case Reports. Presence: Teleoperators and Virtual Environments, 9(3), 268-286. doi:10.1162/105474600566790Hartman-Maeir, A., & Katz, N. (1995). Validity of the Behavioral Inattention Test (BIT): Relationships With Functional Tasks. American Journal of Occupational Therapy, 49(6), 507-516. doi:10.5014/ajot.49.6.507Jannink, M. J. A., Aznar, M., de Kort, A. C., van de Vis, W., Veltink, P., & van der Kooij, H. (2009). Assessment of visuospatial neglect in stroke patients using virtual reality: a pilot study. International Journal of Rehabilitation Research, 32(4), 280-286. doi:10.1097/mrr.0b013e3283013b1cJehkonen, M., Laihosalo, M., & Kettunen, J. (2006). Anosognosia after stroke: assessment, occurrence, subtypes and impact on functional outcome reviewed. Acta Neurologica Scandinavica, 114(5), 293-306. doi:10.1111/j.1600-0404.2006.00723.xKatz, N., Ring, H., Naveh, Y., Kizony, R., Feintuch, U., & Weiss, P. L. (2005). Interactive virtual environment training for safe street crossing of right hemisphere stroke patients with Unilateral Spatial Neglect. Disability and Rehabilitation, 27(20), 1235-1244. doi:10.1080/09638280500076079Kim, D. Y., Ku, J., Chang, W. H., Park, T. H., Lim, J. Y., Han, K., 
 Kim, S. I. (2010). Assessment of post-stroke extrapersonal neglect using a three-dimensional immersive virtual street crossing program. Acta Neurologica Scandinavica, 121(3), 171-177. doi:10.1111/j.1600-0404.2009.01194.xKim, J., Kim, K., Kim, D. Y., Chang, W. H., Park, C.-I., Ohn, S. H., 
 Kim, S. I. (2007). Virtual Environment Training System for Rehabilitation of Stroke Patients with Unilateral Neglect: Crossing the Virtual Street. CyberPsychology & Behavior, 10(1), 7-15. doi:10.1089/cpb.2006.9998Kim, K., Kim, J., Ku, J., Kim, D. Y., Chang, W. H., Shin, D. I., 
 Kim, S. I. (2004). A Virtual Reality Assessment and Training System for Unilateral Neglect. CyberPsychology & Behavior, 7(6), 742-749. doi:10.1089/cpb.2004.7.742Kim, Y. M., Chun, M. H., Yun, G. J., Song, Y. J., & Young, H. E. (2011). The Effect of Virtual Reality Training on Unilateral Spatial Neglect in Stroke Patients. Annals of Rehabilitation Medicine, 35(3), 309. doi:10.5535/arm.2011.35.3.309Krakauer, J. W. (2006). Motor learning: its relevance to stroke recovery and neurorehabilitation. Current Opinion in Neurology, 19(1), 84-90. doi:10.1097/01.wco.0000200544.29915.ccMcComas, J., MacKay, M., & Pivik, J. (2002). Effectiveness of Virtual Reality for Teaching Pedestrian Safety. CyberPsychology & Behavior, 5(3), 185-190. doi:10.1089/109493102760147150Myers, R. L., & Bierig, T. A. (2000). Virtual Reality and Left Hemineglect: A Technology for Assessment and Therapy. CyberPsychology & Behavior, 3(3), 465-468. doi:10.1089/10949310050078922Peskine, A., Rosso, C., Box, N., Galland, A., Caron, E., Rautureau, G., 
 Pradat-Diehl, P. (2010). Virtual reality assessment for visuospatial neglect: importance of a dynamic task. Journal of Neurology, Neurosurgery & Psychiatry, 82(12), 1407-1409. doi:10.1136/jnnp.2010.217513Romero, M., SĂĄnchez, A., MarĂ­n, C., Navarro, M. D., Ferri, J., & NoĂ©, E. (2012). Utilidad clĂ­nica de la versiĂłn en castellano del Mississippi Aphasia Screening Test (MASTsp): validaciĂłn en pacientes con ictus. NeurologĂ­a, 27(4), 216-224. doi:10.1016/j.nrl.2011.06.006Rose, F. D., Brooks, B. M., & Rizzo, A. A. (2005). Virtual Reality in Brain Damage Rehabilitation: Review. CyberPsychology & Behavior, 8(3), 241-262. doi:10.1089/cpb.2005.8.241Schwebel, D. C., & McClure, L. A. (2010). Using virtual reality to train children in safe street-crossing skills. Injury Prevention, 16(1), e1-e1. doi:10.1136/ip.2009.025288Simpson, G., Johnston, L., & Richardson, M. (2003). An investigation of road crossing in a virtual environment. Accident Analysis & Prevention, 35(5), 787-796. doi:10.1016/s0001-4575(02)00081-7Smith, J., Hebert, D., & Reid, D. (2007). Exploring the effects of virtual reality on unilateral neglect caused by stroke: Four case studies. Technology and Disability, 19(1), 29-40. doi:10.3233/tad-2007-19104Sugarman, H., Weisel-Eichler, A., Burstin, A. and Brown, R.Use of novel virtual reality system for the assessment and treatment of unilateral spatial neglect: A feasibility study. Paper presented at International Conference on Virtual Rehabilitation. ZĂŒrich.Tanaka, T., Sugihara, S., Nara, H., Ino, S., & Ifukube, T. (2005). Journal of NeuroEngineering and Rehabilitation, 2(1), 31. doi:10.1186/1743-0003-2-31Thomson, J. A., Tolmie, A. K., Foot, H. C., Whelan, K. M., Sarvary, P., & Morrison, S. (2005). Influence of Virtual Reality Training on the Roadside Crossing Judgments of Child Pedestrians. Journal of Experimental Psychology: Applied, 11(3), 175-186. doi:10.1037/1076-898x.11.3.175Weiss, P. L. (Tamar), Naveh, Y., & Katz, N. (2003). Design and testing of a virtual environment to train stroke patients with unilateral spatial neglect to cross a street safely. Occupational Therapy International, 10(1), 39-55. doi:10.1002/oti.176Witmer, B. G., & Singer, M. J. (1998). Measuring Presence in Virtual Environments: A Presence Questionnaire. Presence: Teleoperators and Virtual Environments, 7(3), 225-240. doi:10.1162/105474698565686Wu, H., Ashmead, D. H. and Bodenheimer, B.Using immersive virtual reality to evaluate pedestrian street crossing decisions at a roundabout. Paper presented at 6th Symposium on appied perception in Graphics and Visualization. Chania

    Kontextmedveten sÀkerhetstestning av androidapplikationer : UpptÀckande av utnyttjingsbara sÄrbarheter genom Android modellbaserad sÀkerhetstestning

    No full text
    This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. The study begins by reviewing recent papers on Android security flaws affecting application in order to guide our tool creation. Thus, we are able to introduce three Domain Specific Languages (DSLs) for Model-Based Security Testing (MBST): Context Definition Language (CDL), Context-Driven Modelling Language (CDML), and Vulnerability Pattern (VPat). These languages provide a fresh perspective on evaluating the security of Android apps by accounting for the dynamic context that is present on smartphones and can greatly impact user security. The result of this work is the development of VPatChecker[1], a tool that detects vulnerabilities and creates abstract exploits by integrating an application model, a context model, and a set of vulnerability patterns. This set of vulnerability patterns can be defined to represent a wide array of vulnerabilities, allowing the tool to be indefinitely updated with each new CVE. The tool was evaluated on the GHERA benchmark, showing that at least 38% (out of a total of 60) of the vulnerabilities in the benchmark can be modelled and detected. The research underscores the importance of considering context in Android security testing and presents a viable and extendable solution for identifying vulnerabilities through MBST and DSLs.Detta examensarbete utforskar vĂ€gar för att hitta och utnyttja sĂ„rbarheter i Android-appar genom att introducera ett nytt sĂ€tt att utföra sĂ€kerhetstestning. ForskningsfrĂ„gan fokuserar pĂ„ att upptĂ€cka en effektiv metod för att detektera sĂ„rbarheter som kan hĂ€rledas till kontexten för en app. Arbetet inleds med en översikt av nyliga forskningspublikationer om sĂ€kerhetsbrister som pĂ„verkar Android-appar, vilka vĂ€gleder utvecklingen av ett verktyg. Vi introducerar tre domĂ€nspecifika sprĂ„k (DSL) för modellbaserad testning (MBST): CDL, CDML och VPat. Dessa sprĂ„k ger ett nytt perspektiv pĂ„ sĂ€kerheten för Android-appar genom att ta hĂ€nsyn till den dynamiska kontext som finns pĂ„ smarta mobiltelefoner och som kan starkt pĂ„verka anvĂ€ndarsĂ€kerheten. Resultatet av arbetet Ă€r utveckling av VPatChecker[1], ett verktyg som upptĂ€cker sĂ„rbarheter och skapar abstrakta sĂ€tt att utnyttja dem i en programmodell, en kontextmodell, och en mĂ€ngd av sĂ„rbarhetsmönster. Denna sĂ„rbarhetsmönstermĂ€ngd kan defineras sĂ„ att den representerar ett brett spektrum av sĂ„rbarheter, vilket möjliggör för verktyger att uppdateras med varje ny CVE.Verktyget utvĂ€rderades pĂ„ datamĂ€ngden GHERA, vilket visade att 38% (av totalt 60) av alla sĂ„rbarheter kunde modelleras och upptĂ€ckas. Arbetet understryker vikten av att ta hĂ€nsyn till kontext i sĂ€kerhetstestning av Android-appar och presenterar en praktisk och utdragbar lösning för att hitta sĂ„rbarheter genom MBST and DSLs.Ce mĂ©moire de maĂźtrise explore les moyens de dĂ©couvrir et d’exploiter les vulnĂ©rabilitĂ©s des applications Android en introduisant une nouvelle approche des tests de sĂ©curitĂ©. La question de recherche se concentre sur la dĂ©couverte d’une mĂ©thode efficace pour dĂ©tecter les vulnĂ©rabilitĂ©s liĂ©es au contexte d’une application. L’étude commence par l’examen de documents rĂ©cents sur les failles de sĂ©curitĂ© des applications Android afin de guider la crĂ©ation de notre outil. Nous sommes ainsi en mesure d’introduire trois Langages dĂ©diĂ© (DSL) pour des Tests de SĂ©curitĂ© BasĂ©s sur les ModĂšles (MBST) : Langage de DĂ©finition de Contexte (CDL), Langage de ModĂ©lisation DĂ©terminĂ©e par le Contexte (CDML) et Motif de VulnĂ©rabilitĂ© (VPat). Ces langages offrent une nouvelle perspective sur l’évaluation de la sĂ©curitĂ© des applications Android en tenant compte du contexte dynamique prĂ©sent sur les smartphones et qui peut avoir un impact important sur la sĂ©curitĂ© de l’utilisateur. Le rĂ©sultat de ce travail est le dĂ©veloppement de VPatChecker[1], un outil qui dĂ©tecte les vulnĂ©rabilitĂ©s et crĂ©e des exploits abstraits en intĂ©grant un modĂšle d’application, un modĂšle de contexte et un ensemble de modĂšles de vulnĂ©rabilitĂ©. Cet ensemble de modĂšles de vulnĂ©rabilitĂ© peut ĂȘtre dĂ©fini pour reprĂ©senter un large Ă©ventail de vulnĂ©rabilitĂ©s, ce qui permet Ă  l’outil d’ĂȘtre indĂ©finiment mis Ă  jour avec chaque nouveau CVE. L’outil a Ă©tĂ© testĂ© sur le benchmark GHERA[2] et montre qu’un total d’au moins 38% (sur un total de 60) des vulnĂ©rabilitĂ©s peut ĂȘtre modĂ©lisĂ© et dĂ©tectĂ©. La recherche souligne l’importance de prendre en compte le contexte dans les tests de sĂ©curitĂ© Android et prĂ©sente une solution viable et extensible pour identifier les vulnĂ©rabilitĂ©s par le biais de MBST et DSLs

    Kontextmedveten sÀkerhetstestning av androidapplikationer : UpptÀckande av utnyttjingsbara sÄrbarheter genom Android modellbaserad sÀkerhetstestning

    No full text
    This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. The study begins by reviewing recent papers on Android security flaws affecting application in order to guide our tool creation. Thus, we are able to introduce three Domain Specific Languages (DSLs) for Model-Based Security Testing (MBST): Context Definition Language (CDL), Context-Driven Modelling Language (CDML), and Vulnerability Pattern (VPat). These languages provide a fresh perspective on evaluating the security of Android apps by accounting for the dynamic context that is present on smartphones and can greatly impact user security. The result of this work is the development of VPatChecker[1], a tool that detects vulnerabilities and creates abstract exploits by integrating an application model, a context model, and a set of vulnerability patterns. This set of vulnerability patterns can be defined to represent a wide array of vulnerabilities, allowing the tool to be indefinitely updated with each new CVE. The tool was evaluated on the GHERA benchmark, showing that at least 38% (out of a total of 60) of the vulnerabilities in the benchmark can be modelled and detected. The research underscores the importance of considering context in Android security testing and presents a viable and extendable solution for identifying vulnerabilities through MBST and DSLs.Detta examensarbete utforskar vĂ€gar för att hitta och utnyttja sĂ„rbarheter i Android-appar genom att introducera ett nytt sĂ€tt att utföra sĂ€kerhetstestning. ForskningsfrĂ„gan fokuserar pĂ„ att upptĂ€cka en effektiv metod för att detektera sĂ„rbarheter som kan hĂ€rledas till kontexten för en app. Arbetet inleds med en översikt av nyliga forskningspublikationer om sĂ€kerhetsbrister som pĂ„verkar Android-appar, vilka vĂ€gleder utvecklingen av ett verktyg. Vi introducerar tre domĂ€nspecifika sprĂ„k (DSL) för modellbaserad testning (MBST): CDL, CDML och VPat. Dessa sprĂ„k ger ett nytt perspektiv pĂ„ sĂ€kerheten för Android-appar genom att ta hĂ€nsyn till den dynamiska kontext som finns pĂ„ smarta mobiltelefoner och som kan starkt pĂ„verka anvĂ€ndarsĂ€kerheten. Resultatet av arbetet Ă€r utveckling av VPatChecker[1], ett verktyg som upptĂ€cker sĂ„rbarheter och skapar abstrakta sĂ€tt att utnyttja dem i en programmodell, en kontextmodell, och en mĂ€ngd av sĂ„rbarhetsmönster. Denna sĂ„rbarhetsmönstermĂ€ngd kan defineras sĂ„ att den representerar ett brett spektrum av sĂ„rbarheter, vilket möjliggör för verktyger att uppdateras med varje ny CVE.Verktyget utvĂ€rderades pĂ„ datamĂ€ngden GHERA, vilket visade att 38% (av totalt 60) av alla sĂ„rbarheter kunde modelleras och upptĂ€ckas. Arbetet understryker vikten av att ta hĂ€nsyn till kontext i sĂ€kerhetstestning av Android-appar och presenterar en praktisk och utdragbar lösning för att hitta sĂ„rbarheter genom MBST and DSLs.Ce mĂ©moire de maĂźtrise explore les moyens de dĂ©couvrir et d’exploiter les vulnĂ©rabilitĂ©s des applications Android en introduisant une nouvelle approche des tests de sĂ©curitĂ©. La question de recherche se concentre sur la dĂ©couverte d’une mĂ©thode efficace pour dĂ©tecter les vulnĂ©rabilitĂ©s liĂ©es au contexte d’une application. L’étude commence par l’examen de documents rĂ©cents sur les failles de sĂ©curitĂ© des applications Android afin de guider la crĂ©ation de notre outil. Nous sommes ainsi en mesure d’introduire trois Langages dĂ©diĂ© (DSL) pour des Tests de SĂ©curitĂ© BasĂ©s sur les ModĂšles (MBST) : Langage de DĂ©finition de Contexte (CDL), Langage de ModĂ©lisation DĂ©terminĂ©e par le Contexte (CDML) et Motif de VulnĂ©rabilitĂ© (VPat). Ces langages offrent une nouvelle perspective sur l’évaluation de la sĂ©curitĂ© des applications Android en tenant compte du contexte dynamique prĂ©sent sur les smartphones et qui peut avoir un impact important sur la sĂ©curitĂ© de l’utilisateur. Le rĂ©sultat de ce travail est le dĂ©veloppement de VPatChecker[1], un outil qui dĂ©tecte les vulnĂ©rabilitĂ©s et crĂ©e des exploits abstraits en intĂ©grant un modĂšle d’application, un modĂšle de contexte et un ensemble de modĂšles de vulnĂ©rabilitĂ©. Cet ensemble de modĂšles de vulnĂ©rabilitĂ© peut ĂȘtre dĂ©fini pour reprĂ©senter un large Ă©ventail de vulnĂ©rabilitĂ©s, ce qui permet Ă  l’outil d’ĂȘtre indĂ©finiment mis Ă  jour avec chaque nouveau CVE. L’outil a Ă©tĂ© testĂ© sur le benchmark GHERA[2] et montre qu’un total d’au moins 38% (sur un total de 60) des vulnĂ©rabilitĂ©s peut ĂȘtre modĂ©lisĂ© et dĂ©tectĂ©. La recherche souligne l’importance de prendre en compte le contexte dans les tests de sĂ©curitĂ© Android et prĂ©sente une solution viable et extensible pour identifier les vulnĂ©rabilitĂ©s par le biais de MBST et DSLs

    Le désir du sujet pervers masochiste : analyse du développement psychosexuel de Séverin von Kusiemski et des modalités de son rapport à cet Autre, Wanda von Dunajew, dans <i>La Vénus à la fourrure</i> (1870), de Léopold von Sacher-Masoch ; ambivalences et renversements identitaires, déconstruction de la théorie freudienne du masochisme et nouvelles perspectives

    No full text
    De l’Ɠuvre de Leopold von Sacher-Masoch est tirĂ© le concept du « masochisme », par Richard von Krafft-Ebing. Repris par Sigmund Freud, ce concept prendra une place Ă  part entiĂšre dans sa thĂ©orie du dĂ©veloppement psychosexuel. Le masochisme freudien est-il pour autant cohĂ©rent avec la perversion que nous prĂ©sente Masoch ?Au cours de cette Ă©tude, il s’agira d’identifier les modalitĂ©s du dĂ©sir pervers masochiste tout en interrogeant la pertinence de la thĂ©orie freudienne du dĂ©veloppement pervers masochiste. Pour cela, nous proposerons une analyse de La VĂ©nus Ă  la fourrure publiĂ©e en 1870 par Masoch ; nous examinerons le dĂ©veloppement psychosexuel de SĂ©verin von Kusiemski, puis nous Ă©claircirons la relation qu’il entretient avec Wanda von Dunajew. Constructions de l’autre par le moi pervers, renversements des rapports sujet-objet, ou encore composantes fĂ©tichistes voire narcissiques du sujet pervers, divers retournements identitaires s’opĂšrent et viennent complexifier les modalitĂ©s du dĂ©sir de SĂ©verin. Ambivalent, ce dĂ©sir se laisse mal saisir. Que veut rĂ©ellement SĂ©verin ? Nous dĂ©passerons la thĂ©orie freudienne du masochisme et proposerons une dĂ©finition novatrice de ce dĂ©sir particulier mis en scĂšne par Masoch

    MusicothĂ©rapie auprĂšs d’un enfant sourd implantĂ©: la co-construction d’un cadre thĂ©rapeutique favorable Ă  l’émergence de la parole

    No full text
    National audienceDeafness is asensory deficit marked primarily by a language deficit. Unlike what has long been accepted, deaf people can benefit from music to improve their language skills. This relation ship between musicand deafness has been studied for a number of years. As a reminder, the theme "music and deafness" has been choose during the regional study day organized by the Institute of Music Therapy of Nantes in 1994. I found the same theme at asymposium organized by ACFOS (Action Connaissance FOrmation pour la SurditĂ©) in November2017. Different hearing aids have been put in place since the 90s. Among them is the Cochlear Implant (CI). How does theCochlear Implant(CI) work? How does theperson perceive the sounds? It is on this basis that the sessions of Musicotherapy at the CAMSP have been build to create adapted proposals. When a child is implanted, he can follow a reeducation in a CAMSP (Centre d’Action MĂ©dico-Social PrĂ©coce). So what difference can be made between rehabilitation and music therapy with an implanted child? The construction of music therapy sessions with Michel shows us how the therapeutic and reeducation proposals are complementary. To go further, the example of Michel's follow-up shows us how the co-construction of this therapeutic framework has favored the emergence of speech..La surditĂ© constitue un dĂ©ficit sensoriel se manifestant principalement par un dĂ©ficit langagier.Contrairement Ă  ce qui a Ă©tĂ© longtemps admis, les personnes sourdes peuvent bĂ©nĂ©ficier de la musique pour amĂ©liorer leurs capacitĂ©s langagiĂšres.Cette relation entre la musique et la surditĂ© est Ă©tudiĂ©e depuis un certain nombre d’annĂ©es. Pour rappel, le thĂšme «musique et surdité» avait Ă©tĂ© choisi lors de la journĂ©e rĂ©gionale d’étude organisĂ©e par l’Institut de MusicothĂ©rapie de Nantes en 1994. J’ai retrouvĂ© ce mĂȘme thĂšme lors d’un colloque organisĂ© par ACFOS (Action Connaissance FOrmation pour la SurditĂ©) en novembre2017.DiffĂ©rentes aides auditives se sont mises en place depuis les annĂ©es 90. Parmi elles l’Implant CochlĂ©aire (IC). Comment l’Implant CochlĂ©aire (IC) fonctionne-t-il ? Comment la personne perçoit-elle les sons? C’est sur cette base que les sĂ©ances de MusicothĂ©rapie au CAMSP ont pu s’appuyer pour crĂ©er des propositions adaptĂ©es. Lorsqu’un enfant est implantĂ©, il peut suivre une rĂ©Ă©ducation dans un CAMSP (Centre d’Action MĂ©dico-Social PrĂ©coce). DĂšs lors, quelle diffĂ©rence peut-on faire entre rĂ©Ă©ducation et musicothĂ©rapie auprĂšs d’un enfant implantĂ©?La construction des sĂ©ances de musicothĂ©rapie auprĂšs de Michel, nous montre en quoi les propositions thĂ©rapeutiques et de rĂ©Ă©ducation sont complĂ©mentaires. Pour aller plus loin, l’exemple du suivi de Michel nous montre en quoi la co-construction de ce cadre thĂ©rapeutique a favorisĂ© l’émergence de la parole

    Routine surgeries during the COVID-19 pandemic: A French nationwide cohort study

    No full text
    International audienceBackground: The COVID-19 pandemic inevitably had consequences on routine surgical procedures. The objective was to quantify changes to five surgical procedures during the COVID-19 pandemic namely cataract surgery, hip and knee arthoplasties, coronary revascularization by angioplasty and definitive cardiac stimulation. Materials and method: All hospitalizations with at least one act of each surgery between January 1, 2019, and June 30, 2021, were included from the database of all French residents’ health-related expenses. Percentage changes between observed and expected numbers of hospital stays were calculated for each surgery in 2020 and the first half of 2021 with 95% Confidence Intervals. Expected numbers were calculated from the number in 2019 by applying an average annual change between 2015 and 2019. The type of intervention (primary operation or reoperation/revision) and/or the emergency status were also considered. Results: A total of 2,153,857 hospitalizations for cataract surgery (0.6% revision), 398,213 for hip arthroplasty (10.9% revision and 26.9% in emergency), 276,607 for knee arthroplasty (8.2% revision), 471,318 for coronary angioplasty (48.7% in emergency) and 178,441 for cardiac stimulation (27.6% revision) were included. Activity was lower than expected in 2020 (cataract surgery: −21.9% [−22.5;−21.4]; hip arthroplasty: −13.4% [−14.8;−12.0]; knee arthroplasty: −24.6% [−26.1;−23.0]; coronary angioplasty: −11.2% [−12.7;−9.7]) without any catch–up in the first half of 2021 (cataract surgery: −5.0% [−5.8;−4.3]; hip arthroplasty: −9.9% [−11.6;−8.2]; knee arthroplasty: −22.0% [−24.0;−20.1]; coronary angioplasty: −12,1% [−13.9;−10.4]). Revisions and non-elective interventions also decreased but to a lesser magnitude. Cardiac stimulation activity was almost in line with expectations (−2.6% [−4.9; −0.3]/+0.6 [−2.2; +3.4]). Conclusion: This study shows that there was a marked decrease in four routine surgeries compared to expectations through to at least the first half of 2021, despite the gradual national rollout of the vaccine
    corecore