117 research outputs found

    Exercises and Dry Needling for Subacromial Pain Syndrome: a Randomized Parallel- Group Trial.

    Get PDF
    This randomized clinical trial investigated the effectiveness of exercise vs. exercise plus trigger point dry needling (TrP-DN) in subacromial pain syndrome. A randomized parallel-group trial, with 1-year follow-up was conducted. Fifty subjects with subacromial pain syndrome were randomly allocated to receive exercise alone or exercise +TrP-DN. Participants in both groups were asked to perform an exercise program of the rotator cuff muscles twice daily for 5 weeks. Further, patients allocated to the exercise +TrP-DN group also received dry needling to active TrPs in the muscles reproducing shoulder symptoms during the 2nd and 4th sessions. The primary outcome was pain-related disability assessed with the Disabilities of the Arm, Shoulder and Hand (DASH) questionnaire. Secondary outcomes included mean current pain and the worst pain experienced in the shoulder during the previous week. They were assessed at baseline, one week, and 3, 6, and 12 months after the end of treatment. Analysis was by intention to treat with mixed ANCOVA adjusted for baseline outcomes. At 12 months, 47 (94%) patients completed follow-up. Statistically larger improvements (all, P<0.01) in shoulder disability was found for the exercise +TrP-DN group at all follow up periods [post: Δ -20.6 (-23.8 to -17.4); 3 months: Δ -23.2 (-28.3 to -18.1); 6 months: Δ -23.6 (-28.9 to -18.3); 12 months: Δ -13.9 (-17.5 to -10.3). Both groups exhibited similar improvements in shoulder pain outcomes at all follow-up periods. The inclusion of TrP-DN to an exercise program was effective for improving disability in subacromial pain syndrome. No greater improvements in shoulder pain were observed.pre-print2407 K

    Micro-computed tomography assessment of different obturation techniques for filling lateral canals

    Get PDF
    Background: the aim of this study was to evaluate obturation depth and volume by means of micro-CT when filling lateral canals. Material and methods: thirty single-rooted teeth were used. After instrumentation, three artificial lateral canals were created on each mesial and distal surface (one on each third). The samples were then separated randomly into three groups according to the obturation technique used (n=10): lateral condensation (Group 1), Tagger's hybrid technique (Group 2) and GuttaCore (Group 3). Samples were scanned and data was processed with Avizo software. Depth and volume of the infilling were measured in each lateral canal. Values were expressed as percentages and were analyzed using the Kruskal-Wallis test. Results: mean depth showed statistically significant differences between Group 3 and Groups 1 (p=0.001) and 2 (p=0.003), whereas no significant difference was found between Groups 1 and 2 (p≈1). As for mean volume, significant differences were found between Group 3 and Groups 1 (p=0.01) and 2 (p=0.003) but no differences were found between Groups 1 and 2 (p=1.00). Conclusions: GuttaCore provided the best lateral canal sealing among the three techniques compared. Key words:Lateral canals, Micro-CT, obturation

    Effects of Low-Load Exercise on Post-needling Induced Pain After Dry Needling of Active Trigger Point in Individuals with Subacromial Pain Syndrome.

    Get PDF
    Background: Application of dry needling is usually associated to post-needling induced pain. Development of post-needling intervention targeting to reduce this adverse event is needed. Objective: To determine the effectiveness of low-load exercise on reducing post-needling induced-pain after dry needling of active trigger points (TrPs) in the infraspinatus muscle in subacromial pain syndrome.pre-print3778 K

    Neuropathological findings in fatal COVID-19 and their associated neurological clinical manifestations

    Get PDF
    9 p.Severe cases of Coronavirus Disease 2019 (COVID-19) can present with multiple neurological symptoms. The available neuropathological studies have described different lesions; the most frequent was the presence of neuroinflammation and vascular-related lesions. The objective of this study was to report the neuropathological studies performed in a medical institution, with abundant long intensive care unit stays, and their associated clinical manifestations. This is a retrospective monocentric case series study based on the neuropathological reports of 13 autopsies with a wide range of illness duration (13-108 days). A neuroinflammatory score was calculated based on the quantification of CD8- and CD68-positive cells in representative areas of the central nervous system. This score was correlated afterwards with illness duration and parameters related to systemic inflammation. Widespread microglial and cytotoxic T-cell activation was found in all patients. There was no correlation between the neuroinflammatory score and the duration of the illness; nor with parameters of systemic inflammation such as the peak of IL-6 or the HScore (a parameter of systemic macrophage activation syndrome). Two patients had global hypoxic ischaemic damage and five patients had subacute infarcts. One patient had many more brain vascular microthrombi compared to the others and multiple subacute pituitary infarcts. SARS-CoV-2 RNA was not detected with qRT-PCR. The proportion of brain lesions in severe COVID-19 patients could be related to illness duration. In our series, with abundant long hospitalisation stays, neuroinflammation was present in all patients and was more prominent between day 34 and day 45 after onset of symptoms. Clinical correlation showed that two patients with the highest neuroinflammatory scores had severe encephalopathies that were not attributable to any other cause. The second most frequent lesions were related to vascular pathology.Instituto de Salud Carlos IIICIBERONCInstituto Ramón y Cajal de Investigación SanitariaMerck, Sharp & Dohme (MSD

    A systematic review of shared decision making interventions in chronic conditions: a review protocol

    Get PDF
    Background: Chronic conditions are a major source of morbidity, mortality and cost worldwide. Shared decision making is one way to improve care for patients with chronic conditions. Although it has been widely studied, the effect of shared decision making in the context of chronic conditions is unknown. Methods/Design: We will perform a systematic review with the objective of determining the effectiveness of shared decision making interventions for persons diagnosed with chronic conditions. We will search the following databases for relevant articles: PubMed, Scopus, Ovid MEDLINE, Ovid EMBASE, Ovid EBM Reviews CENTRAL, CINAHL, and Ovid PsycInfo. We will also search clinical trial registries and contact experts in the field to identify additional studies. We will include randomized controlled trials studying shared decision making interventions in patients with chronic conditions who are facing an actual decision. Shared decision making interventions will be defined as any intervention aiming to facilitate or improve patient and/or clinician engagement in a decision making process. We will describe all studies and assess their quality. After adjusting for missing data, we will analyze the effect of shared decision making interventions on outcomes in chronic conditions overall and stratified by condition. We will evaluate outcomes according to an importance ranking informed by a variety of stakeholders. We will perform several exploratory analyses including the effect of author contact on the estimates of effect. Discussion: We anticipate that this systematic review may have some limitations such as heterogeneity and imprecision; however, the results will contribute to improving the quality of care for individuals with chronic conditions and facilitate a process that allows decision making that is most consistent with their own values and preferences

    A Network Analysis of the Human T-Cell Activation Gene Network Identifies Jagged1 as a Therapeutic Target for Autoimmune Diseases

    Get PDF
    Understanding complex diseases will benefit the recognition of the properties of the gene networks that control biological functions. Here, we set out to model the gene network that controls T-cell activation in humans, which is critical for the development of autoimmune diseases such as Multiple Sclerosis (MS). The network was established on the basis of the quantitative expression from 104 individuals of 20 genes of the immune system, as well as on biological information from the Ingenuity database and Bayesian inference. Of the 31 links (gene interactions) identified in the network, 18 were identified in the Ingenuity database and 13 were new and we validated 7 of 8 interactions experimentally. In the MS patients network, we found an increase in the weight of gene interactions related to Th1 function and a decrease in those related to Treg and Th2 function. Indeed, we found that IFN-ß therapy induces changes in gene interactions related to T cell proliferation and adhesion, although these gene interactions were not restored to levels similar to controls. Finally, we identify JAG1 as a new therapeutic target whose differential behaviour in the MS network was not modified by immunomodulatory therapy. In vitro treatment with a Jagged1 agonist peptide modulated the T-cell activation network in PBMCs from patients with MS. Moreover, treatment of mice with experimental autoimmune encephalomyelitis with the Jagged1 agonist ameliorated the disease course, and modulated Th2, Th1 and Treg function. This study illustrates how network analysis can predict therapeutic targets for immune intervention and identified the immunomodulatory properties of Jagged1 making it a new therapeutic target for MS and other autoimmune diseases

    Internet of things: where to be is to trust

    Get PDF
    [EN] Networks' creation is getting more and more required, anytime, anywhere. Devices that can participate on these networks can be quite different among them. Sensors, mobiles, home appliances, or other type of devices will have to collaborate to increase and improve the services provided to clients. In the same way, network configuration, security mechanisms establishment, and optimal performance control must be done by them. Some of these devices could have limited resources to work, sometimes even resources restriction not existing, they must work to optimize network traffic. In this article, we center our researching on spontaneous networks. We propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction and communities' creation to grant a quick, easy, and secure access to users to surf the Web. Each device will have an identity in the network. Each community will also have an identity and will act as a unity on a world based on Internet connection. Security will be established in the moment they access to the network through the use of the trust chain generated by nodes. Trust is modified by each node on the basis of nodes behaviorLacuesta, R.; Palacios-Navarro, G.; Cetina Englada, C.; Peñalver Herrero, ML.; Lloret, J. (2012). Internet of things: where to be is to trust. EURASIP Journal on Wireless Communications and Networking. (203):1-16. doi:10.1186/1687-1499-2012-203S116203Lipnack J, Stamps J: Virtual Teams: Researching Across Space, Time, and Organizations with Technology. New York: John Wiley and Sons; 1997.Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November–December. 1999, 741-757.Mowshowitz A: Virtual organization. Commun ACM 1997, 40(9):30-37. 10.1145/260750.260759Preuß S: CH Cap, Overview of spontaneous networking-evolving concepts and technologies, in Rostocker Informatik-Berichte. Rostock: Fachbereich Informatik der Universit; 2000:113-123.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Commun Mag 2001, 39(6):176-181. 10.1109/35.925687Latvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wirel Commun 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Mani M, Nguyen A-M, Crespi N: SCOPE: a prototype for spontaneous P2P social networking. Proceedings of 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010, 220-225.Legendre F, de Amorim MD, Fdida S: Implicit merging of overlapping spontaneous networks. Proceedings of Vehicular Technology Conference 2004, 3050-3054.Zarate Silva VH, De Cruz Salgado EI, Ramos Quintana F: AWISPA: an awareness framework for collaborative spontaneous networks. 36th Annual Frontiers in Education Conference 2006, 27-31.Perkins CE, Bhagwat P: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM’94 1994, 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Boston, MA: Ad Hoc Networking (Addison-Wesley Longman Publishing; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing, RFC 3561. 2003.Park V, Corson MS: IETF MANET Internet Draft “draft-ietf-MANET-tora-spe03.txt”, November 2000. 2012. Accessed March http://tools.ietf.org/html/draft-ietf-manet-tora-spec-03Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606. 10.1016/j.adhoc.2004.08.006Lacuesta R, Peñalver L: IP addresses configuration in spontaneous networks. In Proceedings of the 9th WSEAS International Conference on Computers. Athens, Greece; 2005:1-6.Alvarez-Hamelin JI, Viana AC, de Amorim M Dias: Architectural considerations for a self-configuring routing scheme for spontaneous networks, Technical Report 1. 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. In Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’07). Valencia, Spain; 2007:157-162.Foulks EF: Social network therapies and society: an overview. Contemp Fam Therapy 1985, 3(4):316-320.IBM: A Smarter Planet. 2012. http://www.ibm.com/smarterplanetMontenegro G, Kushalnagar N, Hui J, Culler D: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. 2007.Alcaraz C, Najera P, Lopez J, Roman R: Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?, 1st International workshop on the security of The internet of Things (SecIoT). tokyo (Japan); 2010. . Accessed January 2012 1er International Workshop on the Security of The Internet of Things (SecIoT 2010) http://www.nics.uma.es/seciot10/files/pdf/alcaraz_seciot10_paper.pdfFerscha A, Davies N, Schmidt A, Streitz N: Pervasive Socio-Technical Fabric. Procedia Computer Science 2011, 7: 88-91.Hubaux JP, Buttyán L, Capkun S: The quest for security in mobile ad-hoc networks, in Proceedings of the ACM Symposium on Mobile Ad-hoc Networking and Computing. 2001, 146-155.Wang Y, Varadharajan V: Interaction trust evaluation in decentralized environments, e-commerce and web technologies. In Proceedings of 5th International Conference on Electronic Commerce and Web Technologies, vol LNCS 3182. Springer; 2004:144-153.Jimin L, Junbao L, Aiguo A, Zhenpeng L: Two-way trust evaluation based on feedback. in Conference on Logistics Systems and Intelligent Management 2010, 3: 1910-1914.Daskapan S, Nurtanti I, Van den Berg J: Trust algorithms in P2P file sharing networks. Int J Internet Technol Secured Trans 2010, 2(1–2):174-200.Maña A, Koshutanski H, Pérez EJ: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput Secur 2012, 31(1):4-25. 10.1016/j.cose.2011.11.006Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. Security Protocols, 7th International Workshop Proceedings, Lecture notes in Computer Science, LNCS 1296 1999, 172-194.Balfanz D, Smetters DK, Stewart P, ChiWong H: Talking to strangers: authentication in ad-hoc wireless networks, in Symposium on Network and Distributed Systems Security (NDSS’02). San Diego, CA; 2002.Capkun S, Hubaux JP, Buttyán L: Mobility helps security in ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MD, USA: Annapolis; 2003:46-56.Metzger MJ: Privacy, trust, and disclosure: exploring barriers to electronic commerce. J Comput-Mediat Commun 2004, 9(4). http://jcmc.indiana.edu/vol9/issue4/metzger.html 2004, 9(4)
    corecore