269 research outputs found
Prevention of mother to child transmission of hepatitis B
Hepatitis B virus (HBV) is a major cause of morbidity and mortality worldwide with a high prevalence in resource limited settings (RLS) like the Thailand-Myanmar border (6.2%). In these settings the main route of transmission is from mother to child (MTCT). Chronic HBV infection can progress into liver failure, liver cirrhosis and liver cancer which lead to death in 25% of the perinatally infected patients. There is no curative treatment for HBV and the main target to stop the HBV epidemic is preventing MTCT. The current strategy for preventing MTCT is by vaccination, a birth dose vaccine followed by three additional vaccinations later in life, combined with the administration of hepatitis B immunoglobulins (HBIG) after birth. In RLS these strategies are challenging due to home deliveries, people living far away from clinics, absence of a cold chain and presence of out-of-pocket expenditure. Moreover, even with perfect administration of HBIG, birth dose and three vaccinations, MTCT can still occur in 8-32% of the cases. An additional way of preventing HBV transmission is by maternal treatment with Tenofovir Disoproxil Fumarate (TDF), that reduces the HBV DNA load to a minimum at the time of delivery. TDF after rapid diagnostic test is a cost-effective option in a RLS if given at the correct time and dosage. Focusing on the wellbeing of mothers and children would not only support HBV elimination but also contribute to strengthening maternal and child health and achieving the health component of the Sustainable Development Goals in the wider context
Method for Statically Checking an Object-oriented Computer Program Module
A method for statically checking an object-oriented computer program module includes the step of identifying objects within a computer program module, at least one of the objects having a plurality of references thereto, possibly from multiple clients. A discipline of permissions is imposed on the objects identified within the computer program module. The permissions enable tracking, from among a discrete set of changeable states, a subset of states each object might be in. A determination is made regarding whether the imposed permissions are violated by a potential reference to any of the identified objects. The results of the determination are output to a user
Practical API Protocol Checking with Access Permissions
Reusable APIs often define usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while affording a great deal of aliasing flexibility. We also developed Plural, a prototype tool that embodies our approach as an automated static analysis and includes several extensions we found useful in practice. This paper evaluates our approach along the following dimensions: (1) We report on experience in specifying relevant usage rules for a large Java standard API with our approach. We also specify several other Java APIs and identify recurring patterns. (2) We summarize two case studies in verifying third-party open-source code bases with few false positives using our tool. We discuss how tool shortcomings can be addressed either with code refactorings or extensions to the tool itself. These results indicate that our approach can be used to specify and enforce real API protocols in practice
Is Entrepreneurial Success Predictable? An Ex-Ante Analysis of the Character-Based Approach
This paper empirically analyzes whether the character-based approach, which focuses on the personality structure and the human capital of business founders, allows prediction of entrepreneurial success. A unique data set is used consisting of 414 persons whose personal characteristics were analyzed by different methods, namely an one-day assessment center (AC) and a standardized questionnaire, before they launched their business. Results are partly unexpected and weaker than previous ex-post findings: first, we found correlations between the AC data and the questionnaire in one subgroup only. Second, the predictive power of the AC data is slightly better than that of the questionnaire, but lower than expected in theory. Interestingly, for those subgroups where the AC data have low predictive power, the questionnaire does better. Third, when success is measured in terms of employees hired, the character-based approach is a poor predictor. Copyright 2008 The Authors.
Inflammation and endothelial activation in benign prostatic hyperplasia and prostate cancer
PURPOSE: Emerging insights underline a link among chronic inflammation and endothelial activation with benign prostatic hyperplasia (BPH) and prostate cancer (PCa). We aim to investigate whether specific plasma markers of inflammation and endothelial activation allow to discriminate BPH and PCa. MATERIALS AND METHODS: Fifteen patients affected by BPH, 15 by PCa and 15 controls, were enrolled. Interleukin-6 (IL-6), CD40 ligand (CD40L), endothelial-selectin (E-selectin), platelet-selectin (P-selectin), vascular cell adhesion molecule-1 (VCAM-1) and intercellular adhesion molecule-1 (ICAM-1) were measured. RESULTS: In systemic blood samples, IL-6 has been found increased in patients affected by BPH (4.25 ± 0. pg/mL) and PCa (5.08 ± 0.24) respect to controls (2.62 ± 0.34; p < 0.05). CD40L was higher in BPH (4.25 ± 0.65 ng/mL; p < 0.05) than in control (2.31 ± 0.20) and PCa group (2.60 ± 0.56). E-selectin, P-selectin and VCAM-1 did not show any significant difference. Higher levels of ICAM-1 were detected in patients with PCa (573.04 ± 52.23) and BPH (564.40 ± 74.67) than in the controls (215.30 ± 11.53 ng/mL; p < 0.05). In local blood samples, IL-6 has been found significantly increased in PCa in comparison with patients with BPH; there was no difference in CD40L, E-selectin, P-selectin, VCAM-1 ed ICAM-1. CONCLUSIONS: Changes in inflammation and endothelial activation markers may be not considered to be of value in discriminating BPH and PCa
Differences in the semantics of prosocial words: an exploration of compassion and kindness
The study of prosocial behaviour has accelerated greatly in the last 20 years. Researchers are exploring different domains of prosocial behaviour such as compassion, kindness, caring, cooperation, empathy, sympathy, love, altruism and morality. While these constructs can overlap, and are sometimes used interchangeably, they also have distinctive features that require careful elucidation. This paper discusses some of the controversies and complexities of describing different (prosocial) mental states, followed by a study investigating the differences between two related prosocial concepts: compassion and kindness. For the study, a scenario-based questionnaire was developed to assess the degree to which a student (N = 222) and a community (N = 112) sample judged scenarios in terms of compassion or kindness. Subsequently, participants rated emotions (e.g. sadness, anxiety, anger, disgust, joy) associated with each scenario. Both groups clearly distinguished kindness from compassion in the scenarios on the basis of suffering. In addition, participants rated compassion-based scenarios as significantly higher on sadness, anger, anxiety and disgust, whereas kindness-based scenarios had higher levels of joy. As a follow-up, a further sample (29 male, 63 female) also rated compassionate scenarios as involving significantly more suffering compared to the kindness scenarios. Although overlapping concepts, compassion and kindness are clearly understood as different processes with different foci, competencies and emotion textures. This has implications for research in prosocial behaviour, and the cultivation of kindness and compassion for psychotherapy and in general.N/
- …