1,043 research outputs found

    Quantification of HIV-1 RNA Among Men Who Have Sex With Men Using an At-Home Self-Collected Dried Blood Spot Specimen: Feasibility Study

    Full text link
    Background: Suboptimal antiretroviral therapy (ART) adherence and disengagement in care present significant public health challenges because of the increased probability of HIV transmission. In the United States, men who have sex with men (MSM) continue to be disproportionately affected by HIV, highlighting a critical need to engage high-risk MSM living with HIV who are not engaged or retained in care. Objective: The aim of the study was to assess the feasibility of at-home blood self-collection and laboratory quantification of HIV-1 RNA viral load (VL) to report laboratory-based VL outcomes and compare self-reported and laboratory-reported VL Methods: Between 2016 and 2017, 766 US HIV-positive MSM enrolled in a Web-based behavioral intervention were invited to participate in an at-home dried blood spot (DBS) collection study using HemaSpot-HF kits (Spot On Sciences, Inc, Austin, TX) for laboratory-quantified VL. Results: Of those invited to participate, 72.3% (554/766) enrolled in the DBS study. Most (79.2%, 439/554) men enrolled reported attempting to collect their blood, 75.5% (418/554) of participants mailed a DBS specimen to the research laboratory, and 60.8% (337/554) had an adequate blood sample for VL testing. Of the 337 specimens tested for VL by the laboratory, 52.5% (177/337) had detectable VL (median: 3508 copies/mL; range: 851-1,202,265 copies/mL). Most men (83.9%, 135/161) who returned a DBS specimen with laboratory-quantified detectable VL self-reported an undetectable VL during their last clinical visit. Conclusions: Home collection of DBS samples from HIV-positive MSM is feasible and has the potential to support clinical VL monitoring. Discrepant laboratory HIV-1 RNA values and self-reported VL indicate a need to address perceived VL status, especially in the era of treatment as prevention. Most participants were willing to use an at-home DBS kit in the future, signaling an opportunity to engage high-risk MSM in long-term HIV care activities

    Presence of periorbital and conjunctival petechial hemorrhages in accidental pediatric drowning

    Get PDF
    Abstract The pathological findings of drowning are variable and non-specific. Petechial hemorrhages involving the periorbital region and the conjunctiva have been described in many causes of death, but are thought to be exceedingly uncommon in cases of drowning. However, such studies have not specifically addressed the pediatric population. The current study retrospectively examined 79 cases of accidental pediatric drowning for the presence of periorbital/conjunctival hemorrhages and analyzed factors that may have affected their presence. Ten victims had periorbital/ conjunctival petechial hemorrhages (13%), with five having periorbital petechiae, three having conjunctival petechiae, and two having both periorbital and conjunctival petechiae. The age and gender of the victim, site of drowning, resuscitation history and the presence of other pathological findings were not significantly associated with the presence of periorbital/conjunctival petechiae. However, as the interval between the drowning episode and autopsy increased, the incidence of periorbital/conjunctival petechiae decreased (28% for <24 h; 7% for >24 h). The presence of periorbital/conjunctival hemorrhages in a significant proportion of pediatric drowning victims confirms that the pathologist must add this finding to the spectrum of changes seen in pediatric drowning. Crow

    F.A.R.O.G. FORUM Vol. 2, No. 2

    Get PDF
    https://digitalcommons.library.umaine.edu/francoamericain_forum/1001/thumbnail.jp

    Polynomial approximation of quasipolynomials based on digital filter design principles

    Get PDF
    This contribution is aimed at a possible procedure approximating quasipolynomials by polynomials. Quasipolynomials appear in linear time-delay systems description as a natural consequence of the use of the Laplace transform. Due to their infinite root spectra, control system analysis and synthesis based on such quasipolynomial models are usually mathematically heavy. In the light of this fact, there is a natural research endeavor to design a sufficiently accurate yet simple engineeringly acceptable method that approximates them by polynomials preserving basic spectral information. In this paper, such a procedure is presented based on some ideas of discrete-time (digital) filters designing without excessive math. Namely, the particular quasipolynomial is subjected to iterative discretization by means of the bilinear transformation first; consequently, linear and quadratic interpolations are applied to obtain integer powers of the approximating polynomial. Since dominant roots play a decisive role in the spectrum, interpolations are made in their very neighborhood. A simulation example proofs the algorithm efficiency. © Springer International Publishing Switzerland 2016

    Influencing users towards better passwords: Persuasive cued click-points

    Get PDF
    Usable security has unique usability challenges because the need for security often means that standard human-computerinteraction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots ' portions of the image where users are more likely to select click-points, allowing attackers to mount more successful dictionary attacks. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more secure, click-points. Our approach is to introduce persuasion to the Cued Click-Points graphical password scheme (Chiasson, van Oorschot, Biddle, 2007). Our resulting scheme significantly reduces hotspots while still maintaining its usability
    corecore