335 research outputs found

    Self-Contempt, the Working Alliance and Outcome in Treatments for Borderline Personality Disorder: An Exploratory Study.

    Get PDF
    Objective. We examined the role of expressed self-contempt in therapy for borderline personality disorder (BPD). Based on previous literature on BPD, we assumed an association between the self-contempt and the core symptoms of BPD. We also studied the progression of expressed self-contempt during the treatment and its effect on the alliance and the outcomes of treatment.Method. We rated the expressed self-contempt in 148 tape-recorded sessions with patients with BPD (N = 50), during a brief psychiatric treatment. We rated self-contempt at three time-points, using an observer-rate scale. Self-reported questionnaires were used to assess symptoms and the working alliance.Results. There are some associations between self-contempt and BPD symptoms. Expressed self-contempt did not change during the treatment. One measure of self-contempt was associated with a weaker alliance rated by the patients and with a stronger alliance rated by the therapists. The expression of high self-contempt was not predictive of outcomes when the initial level of problems was controlled for.Conclusions. The results highlight the importance to examine the complex effects of self-contempt in BPD undergoing treatment in a differentiated manner and suggest to clinicians and researchers to be attentive to this specific emotional state, and change therein, in psychotherapy.Keywords: Self-contempt; Borderline Personality Disorder; Brief Treatment; Therapeutic Alliance; EmotionTrial registration: ClinicalTrials.gov identifier: NCT01896024

    Staged treatment response in status epilepticus: Lessons from the SENSE registry.

    Get PDF
    Although in epilepsy patients the likelihood of becoming seizure-free decreases substantially with each unsuccessful treatment, to our knowledge this has been poorly investigated in status epilepticus (SE). We aimed to evaluate the proportion of SE cessation and functional outcome after successive treatment steps. We conducted a post hoc analysis of a prospective, observational, multicenter cohort (Sustained Effort Network for treatment of Status Epilepticus [SENSE]), in which 1049 incident adult SE episodes were prospectively recorded at nine European centers. We analyzed 996 SE episodes without coma induction before the third treatment step. Rates of SE cessation, mortality (in ongoing SE or after SE control), and favorable functional outcome (assessed with modified Rankin scale) were evaluated after each step. SE was treated successfully in 838 patients (84.1%), 147 (14.8%) had a fatal outcome (36% of them died while still in SE), and 11 patients were transferred to palliative care while still in SE. Patients were treated with a median of three treatment steps (range 1-13), with 540 (54.2%) receiving more than two steps (refractory SE [RSE]) and 95 (9.5%) more than five steps. SE was controlled after the first two steps in 45%, with an additional 21% treated after the third, and 14% after the fourth step. Likelihood of SE cessation (p < 0.001), survival (p = 0.003), and reaching good functional outcome (p < 0.001) decreased significantly between the first two treatment lines and the third, especially in patients not experiencing generalized convulsive SE, but remained relatively stable afterwards. The significant worsening of SE prognosis after the second step clinically supports the concept of RSE. However, and differing from findings in human epilepsy, RSE remains treatable in about one third of patients, even after several failed treatment steps. Clinical judgment remains essential to determine the aggressiveness and duration of SE treatment, and to avoid premature treatment cessation in patients with SE

    Alfalfa Seed Decontamination in Salmonella Outbreak

    Get PDF
    Based on in vitro data, the U.S. Food and Drug Administration recommends chemical disinfection of raw sprout seeds to reduce enteric pathogens contaminating the seed coats. However, little is known about the effectiveness of decontamination at preventing human disease. In 1999, an outbreak of Salmonella enterica serotype Mbandaka occurred in Oregon, Washington, Idaho, and California. Based on epidemiologic and pulsed-field gel electrophoresis evidence from 87 confirmed cases, the outbreak was linked to contaminated alfalfa seeds grown in California’s Imperial Valley. Trace-back and trace-forward investigations identified a single lot of seeds used by five sprout growers during the outbreak period. Cases of salmonellosis were linked with two sprout growers who had not employed chemical disinfection; no cases were linked to three sprout growers who used disinfection. This natural experiment provides empiric evidence that chemical disinfection can reduce the human risk for disease posed by contaminated seed sprouts

    Generic Escherichia coli Contamination of Spinach at the Preharvest Stage: Effects of Farm Management and Environmental Factors

    Get PDF
    The objective of this study was to determine the effects of farm management and environmental factors on preharvest spinach contamination with generic Escherichia coli as an indicator of fecal contamination. A repeated cross-sectional study was conducted by visiting spinach farms up to four times per growing season over a period of 2 years (2010 to 2011). Spinach samples (n = 955) were collected from 12 spinach farms in Colorado and Texas as representative states of the Western and Southwestern United States, respectively. During each farm visit, farmers were surveyed about farm-related management and environmental factors using a questionnaire. Associations between the prevalence of generic E. coli in spinach and farm-related factors were assessed by using a multivariable logistic regression model including random effects for farm and farm visit. Overall, 6.6% of spinach samples were positive for generic E. coli. Significant risk factors for spinach contamination with generic E. coli were the proximity (within 10 miles) of a poultry farm, the use of pond water for irrigation, a >66-day period since the planting of spinach, farming on fields previously used for grazing, the production of hay before spinach planting, and the farm location in the Southwestern United States. Contamination with generic E. coli was significantly reduced with an irrigation lapse time of >5 days as well as by several factors related to field workers, including the use of portable toilets, training to use portable toilets, and the use of hand-washing stations. To our knowledge, this is the first report of an association between field workers' personal hygiene and produce contamination with generic E. coli at the preharvest level. Collectively, our findings support that practice of good personal hygiene and other good farm management practices may reduce produce contamination with generic E. coli at the preharvest level

    Involvement of the V2 Vasopressin Receptor in Adaptation to Limited Water Supply

    Get PDF
    Mammals adapted to a great variety of habitats with different accessibility to water. In addition to changes in kidney morphology, e.g. the length of the loops of Henle, several hormone systems are involved in adaptation to limited water supply, among them the renal-neurohypophysial vasopressin/vasopressin receptor system. Comparison of over 80 mammalian V2 vasopressin receptor (V2R) orthologs revealed high structural and functional conservation of this key component involved in renal water reabsorption. Although many mammalian species have unlimited access to water there is no evidence for complete loss of V2R function indicating an essential role of V2R activity for survival even of those species. In contrast, several marsupial V2R orthologs show a significant increase in basal receptor activity. An increased vasopressin-independent V2R activity can be interpreted as a shift in the set point of the renal-neurohypophysial hormone circuit to realize sufficient water reabsorption already at low hormone levels. As found in other desert mammals arid-adapted marsupials show high urine osmolalities. The gain of basal V2R function in several marsupials may contribute to the increased urine concentration abilities and, therefore, provide an advantage to maintain water and electrolyte homeostasis under limited water supply conditions

    Effect of jenny milk addition on the inhibition of late blowing in semihard cheese

    Get PDF
    The occurrence of late blowing defects in cheese produces negative effects on the quality and commercial value of the product. In this work, we verified whether the addition of raw jenny milk to bulk cow milk reduced the late blowing defects in semihard cheeses. During cheesemaking, different aliquots of jenny milk were poured into 2 groups of 4 vats, each containing a fixed amount of cow milk. A group of cheeses was created by deliberately contaminating the 4 vats with approximately 3 log10 cfu/mL milk of Clostridium tyrobutyricum CLST01. The other 4 vats, which were not contaminated, were used for a second group of cheeses. After 120 d of ripening, some physical, chemical, and microbiological parameters were evaluated on the obtained semihard cheeses. Differences in sensory properties among cheeses belonging to the uncontaminated group were evaluated by 80 regular consumers of cheese. Our results showed that the increasing addition of jenny milk to cow milk led to a reduction of pH and total bacterial count in both cheese groups, as well as C. tyrobutyricum spores that either grew naturally or artificially inoculated. We observed a progressive reduction of the occurrence of late blowing defects in cheese as consequence of the increasing addition of jenny milk during cheese making. Moreover, the addition of jenny milk did not affect the acceptability of the product, as consumers found no difference among cheeses concerning sensorial aspects. In conclusion, the important antimicrobial activity of lysozyme contained in jenny milk has been confirmed in the current research. It is recommend for use as a possible and viable alternative to egg lysozyme for controlling late blowing defects in cheese

    Risky Traitor Tracing and New Differential Privacy Negative Results

    Get PDF
    In this work we seek to construct collusion-resistant traitor tracing systems with small ciphertexts from standard assumptions that also move toward practical efficiency. In our approach we will hold steadfast to the principle of collusion resistance, but relax the requirement on catching a traitor from a successful decoding algorithm. We define a ff-risky traitor tracing system as one where the probability of identifying a traitor is f(λ,n)f(\lambda,n) times the probability a successful box is produced. We then go on to show how to build such systems from prime order bilinear groups with assumptions close to those used in prior works. Our core system achieves, for any k>0k > 0, f(λ,n)kn+k1f(\lambda,n) \approx \frac{k}{n + k - 1} where ciphertexts consists of (k+4)(k + 4) group elements and decryption requires (k+3)(k + 3) pairing operations. At first glance the utility of such a system might seem questionable since the ff we achieve for short ciphertexts is relatively small. Indeed an attacker in such a system can more likely than not get away with producing a decoding box. However, we believe this approach to be viable for four reasons: 1. A risky traitor tracing system will provide deterrence against risk averse attackers. In some settings the consequences of being caught might bear a high cost and an attacker will have to weigh his utility of producing a decryption DD box against the expected cost of being caught. 2. Consider a broadcast system where we want to support low overhead broadcast encrypted communications, but will periodically allow for a more expensive key refresh operation. We refer to an adversary produced algorithm that maintains the ability to decrypt across key refreshes as a persistent decoder. We show how if we employ a risky traitor tracing systems in this setting, even for a small ff, we can amplify the chances of catching such a ``persistent decoder\u27\u27 to be negligibly close to 1. 3. In certain resource constrained settings risky traitor tracing provides a best tracing effort where there are no other collusion-resistant alternatives. For instance, suppose we had to support 100K users over a radio link that had just 10KB of additional resources for extra ciphertext overhead. None of the existing N\sqrt N bilinear map systems can fit in these constraints. On the other hand a risky traitor tracing system provides a spectrum of tracing probability versus overhead tradeoffs and can be configured to at least give some deterrence in this setting. 4. Finally, we can capture impossibility results for differential privacy from 1n\frac{1}{n}-risky traitor tracing. Since our ciphertexts are short (O(λ)O(\lambda)), we get the negative result which matches what one would get plugging in the obfuscation based tracing system Boneh-Zhandry (CRYPTO 2014) solution into the prior impossibility result of Dwork et al. (STOC 2009)
    corecore