406 research outputs found

    Produce handling and processing practices.

    Get PDF
    In the past decade, outbreaks of human illness associated with the consumption of raw vegetables and fruits (or unpasteurized products produced from them) have increased in the United States. Changes in agronomic, harvesting, distribution, processing, and consumption patterns and practices have undoubtedly contributed to this increase. Pathogens such as Listeria monocytogenes, Clostridium botulinum, and Bacillus cereus are naturally present in some soil, and their presence on fresh produce is not rare. Salmonella, Escherichia coli O157:H7, Campylobacter jejuni, Vibrio cholerae, parasites, and viruses are more likely to contaminate fresh produce through vehicles such as raw or improperly composted manure, irrigation water containing untreated sewage, or contaminated wash water. Contact with mammals, reptiles, fowl, insects, and unpasteurized products of animal origin offers another avenue through which pathogens can access produce. Surfaces, including human hands, which come in contact with whole or cut produce represent potential points of contamination throughout the total system of growing, harvesting, packing, processing, shipping, and preparing produce for consumption. Treatment of produce with chlorinated water reduces populations of pathogenic and other microorganisms on fresh produce but cannot eliminate them. Reduction of risk for human illness associated with raw produce can be better achieved through controlling points of potential contamination in the field; during harvesting; during processing or distribution; or in retail markets, food-service facilities, or the home

    Continuous versus Routine Electroencephalography in the Intensive Care Unit: A Review of Current Evidence.

    Get PDF
    Electroencephalography (EEG) has long been used to detect seizures in patients with disorders of consciousness. In recent years, there has been a drastically increased adoption of continuous EEG (cEEG) in the intensive care units (ICUs). Given the resources necessary to record and interpret cEEG, this is still not available in every center and widespread recommendations to use continuous instead of routine EEG (typically lasting 20 min) are still a matter of some debate. Considering recent literature and personal experience, this review offers a rationale and practical advice to address this question. Despite the development of increasingly performant imaging techniques and several validated biomarkers, EEG remains central to clinicians in the intensive care unit and has been experiencing expanding popularity for at least 2 decades. Not only does EEG allow seizure or status epilepticus detection, which in the ICU often present without clinical movements, but it is also paramount for the prognostic evaluation of comatose patients, especially after cardiac arrest, and for detecting delayed ischemia after subarachnoid hemorrhage. At the end of the last Century, improvements of technical and digital aspects regarding recording and storage of EEG tracings have progressively led to the era of cEEG and automated quantitative analysis. As compared to repeated rEEG, cEEG in comatose patients does not seem to improve clinical prognosis to a relevant extent, despite allowing a more performant of detection ictal events and consequent therapeutic modifications. The choice between cEEG and rEEG must therefore always be patient-tailored

    Self-Contempt, the Working Alliance and Outcome in Treatments for Borderline Personality Disorder: An Exploratory Study.

    Get PDF
    Objective. We examined the role of expressed self-contempt in therapy for borderline personality disorder (BPD). Based on previous literature on BPD, we assumed an association between the self-contempt and the core symptoms of BPD. We also studied the progression of expressed self-contempt during the treatment and its effect on the alliance and the outcomes of treatment.Method. We rated the expressed self-contempt in 148 tape-recorded sessions with patients with BPD (N = 50), during a brief psychiatric treatment. We rated self-contempt at three time-points, using an observer-rate scale. Self-reported questionnaires were used to assess symptoms and the working alliance.Results. There are some associations between self-contempt and BPD symptoms. Expressed self-contempt did not change during the treatment. One measure of self-contempt was associated with a weaker alliance rated by the patients and with a stronger alliance rated by the therapists. The expression of high self-contempt was not predictive of outcomes when the initial level of problems was controlled for.Conclusions. The results highlight the importance to examine the complex effects of self-contempt in BPD undergoing treatment in a differentiated manner and suggest to clinicians and researchers to be attentive to this specific emotional state, and change therein, in psychotherapy.Keywords: Self-contempt; Borderline Personality Disorder; Brief Treatment; Therapeutic Alliance; EmotionTrial registration: ClinicalTrials.gov identifier: NCT01896024

    Perceived coercion in psychiatric hospital admission: validation of the French-language version of the MacArthur Admission Experience Survey.

    Get PDF
    The MacArthur Admission Experience Survey (AES) is a widely used tool to evaluate the level of perceived coercion experienced at psychiatric hospital admission. The French-language AES was prepared using a translation/back-translation procedure. It consists of 16 items and 3 subscores (perceived coercion, negative pressures and voice). This study aimed to assess the psychometric properties of the French-language AES. 152 inpatients were evaluated. Reliability was estimated using internal consistency coefficients and a test-retest procedure. Internal validity was assessed using a two-parameter logistic item response model. Convergent validity was estimated using correlations between the AES scores and the Coercion Ladder (CL), the Coercion Experience Scale (CES) and the Global Assessment of Functioning (GAF) scale. Discriminatory power was evaluated by comparing the scores of patients undergoing voluntary or compulsory admission. The French-language AES showed good internal consistency and test-retest reliability. Internal validity of the three-factor model was excellent. Correlations between AES and CL, CES and GAF scores suggested good convergent validity. AES scores were significantly higher among patients subject to compulsory psychiatric hospital admission than among those admitted voluntarily. Overall, the French-language version of the AES demonstrated very good psychometric proprieties

    Pathogen detection, testing, and control in fresh broccoli sprouts

    Get PDF
    BACKGROUND: The recent increased interest in consuming green vegetable sprouts has been tempered by the fact that fresh sprouts can in some cases be vehicles for food-borne illnesses. They must be grown according to proper conditions of sanitation and handled as a food product rather than as an agricultural commodity. When sprouts are grown in accordance with the criteria proposed from within the sprout industry, developed by regulatory agencies, and adhered to by many sprouters, green sprouts can be produced with very low risk. Contamination may occur when these guidelines are not followed. METHODS: A one year program of microbial hold-and-release testing, conducted in concert with strict seed and facility cleaning procedures by 13 U.S. broccoli sprout growers was evaluated. Microbial contamination tests were performed on 6839 drums of sprouts, equivalent to about 5 million consumer packages of fresh green sprouts. RESULTS: Only 24 (0.75%) of the 3191 sprout samples gave an initial positive test for Escherichia coli O157:H7 or Salmonella spp., and when re-tested, 3 drums again tested positive. Composite testing (e.g., pooling up to 7 drums for pathogen testing) was equally sensitive to single drum testing. CONCLUSION: By using a "test-and-re-test" protocol, growers were able to minimize crop destruction. By pooling drums for testing, they were also able to reduce testing costs which now represent a substantial portion of the costs associated with sprout growing. The test-and-hold scheme described herein allowed those few batches of contaminated sprouts to be found prior to packaging and shipping. These events were isolated, and only safe sprouts entered the food supply

    Involvement of the V2 Vasopressin Receptor in Adaptation to Limited Water Supply

    Get PDF
    Mammals adapted to a great variety of habitats with different accessibility to water. In addition to changes in kidney morphology, e.g. the length of the loops of Henle, several hormone systems are involved in adaptation to limited water supply, among them the renal-neurohypophysial vasopressin/vasopressin receptor system. Comparison of over 80 mammalian V2 vasopressin receptor (V2R) orthologs revealed high structural and functional conservation of this key component involved in renal water reabsorption. Although many mammalian species have unlimited access to water there is no evidence for complete loss of V2R function indicating an essential role of V2R activity for survival even of those species. In contrast, several marsupial V2R orthologs show a significant increase in basal receptor activity. An increased vasopressin-independent V2R activity can be interpreted as a shift in the set point of the renal-neurohypophysial hormone circuit to realize sufficient water reabsorption already at low hormone levels. As found in other desert mammals arid-adapted marsupials show high urine osmolalities. The gain of basal V2R function in several marsupials may contribute to the increased urine concentration abilities and, therefore, provide an advantage to maintain water and electrolyte homeostasis under limited water supply conditions

    Risky Traitor Tracing and New Differential Privacy Negative Results

    Get PDF
    In this work we seek to construct collusion-resistant traitor tracing systems with small ciphertexts from standard assumptions that also move toward practical efficiency. In our approach we will hold steadfast to the principle of collusion resistance, but relax the requirement on catching a traitor from a successful decoding algorithm. We define a ff-risky traitor tracing system as one where the probability of identifying a traitor is f(λ,n)f(\lambda,n) times the probability a successful box is produced. We then go on to show how to build such systems from prime order bilinear groups with assumptions close to those used in prior works. Our core system achieves, for any k>0k > 0, f(λ,n)kn+k1f(\lambda,n) \approx \frac{k}{n + k - 1} where ciphertexts consists of (k+4)(k + 4) group elements and decryption requires (k+3)(k + 3) pairing operations. At first glance the utility of such a system might seem questionable since the ff we achieve for short ciphertexts is relatively small. Indeed an attacker in such a system can more likely than not get away with producing a decoding box. However, we believe this approach to be viable for four reasons: 1. A risky traitor tracing system will provide deterrence against risk averse attackers. In some settings the consequences of being caught might bear a high cost and an attacker will have to weigh his utility of producing a decryption DD box against the expected cost of being caught. 2. Consider a broadcast system where we want to support low overhead broadcast encrypted communications, but will periodically allow for a more expensive key refresh operation. We refer to an adversary produced algorithm that maintains the ability to decrypt across key refreshes as a persistent decoder. We show how if we employ a risky traitor tracing systems in this setting, even for a small ff, we can amplify the chances of catching such a ``persistent decoder\u27\u27 to be negligibly close to 1. 3. In certain resource constrained settings risky traitor tracing provides a best tracing effort where there are no other collusion-resistant alternatives. For instance, suppose we had to support 100K users over a radio link that had just 10KB of additional resources for extra ciphertext overhead. None of the existing N\sqrt N bilinear map systems can fit in these constraints. On the other hand a risky traitor tracing system provides a spectrum of tracing probability versus overhead tradeoffs and can be configured to at least give some deterrence in this setting. 4. Finally, we can capture impossibility results for differential privacy from 1n\frac{1}{n}-risky traitor tracing. Since our ciphertexts are short (O(λ)O(\lambda)), we get the negative result which matches what one would get plugging in the obfuscation based tracing system Boneh-Zhandry (CRYPTO 2014) solution into the prior impossibility result of Dwork et al. (STOC 2009)
    corecore