1,326 research outputs found
The interrelationship between multiple long-term conditions (MLTC) and delirium: A scoping review
\ua9 2024 The Author(s). Published by Oxford University Press on behalf of the British Geriatrics Society.Introduction: Delirium and multiple long-term conditions (MLTC) share numerous risk factors and have been shown individually to be associated with adverse outcomes following hospitalisation. However, the extent to which these common ageing syndromes have been studied together is unknown. This scoping review aims to summarise our knowledge to date on the interrelationship between MLTC and delirium. Methods: Searches including terms for delirium and MLTC in adult human participants were performed in PubMed, EMBASE, Medline, Psycinfo and CINAHL. Descriptive analysis was used to summarise findings, structured according to Synthesis Without Meta-analysis reporting guidelines. Results: After removing duplicates, 5256 abstracts were screened for eligibility, with 313 full-texts sought along with 17 additional full-texts from references in review articles. In total, 140 met inclusion criteria and were included in the final review. Much of the literature explored MLTC as a risk factor for delirium (n = 125). Fewer studies explored the impact of MLTC on delirium presentation (n = 5), duration (n = 3) or outcomes (n = 6) and no studies explored how MLTC impacts the treatment of delirium or whether having delirium increases risk of developing MLTC. The most frequently used measures of MLTC and delirium were the Charlson Comorbidity Index (n = 98/140) and Confusion Assessment Method (n = 81/140), respectively. Conclusion: Existing literature largely evaluates MLTC as a risk factor for delirium. Major knowledge gaps identified include the impact of MLTC on delirium treatment and the effect of delirium on MLTC trajectories. Current research in this field is limited by significant heterogeneity in defining both MLTC and delirium
Development of Erf-mediated craniosynostosis and pharmacological amelioration
ETS2 repressor factor (ERF) insufficiency causes craniosynostosis (CRS4) in humans and mice. ERF is an ETS domain transcriptional repressor regulated by Erk1/2 phosphorylation via nucleo-cytoplasmic shuttling. Here, we analyze the onset and development of the craniosynostosis phenotype in an Erf-insufficient mouse model and evaluate the potential of the residual Erf activity augmented by pharmacological compounds to ameliorate the disease. Erf insufficiency appears to cause an initially compromised frontal bone formation and subsequent multisuture synostosis, reflecting distinct roles of Erf on the cells that give rise to skull and facial bones. We treated animals with Mek1/2 and nuclear export inhibitors, U0126 and KPT-330, respectively, to increase Erf activity by two independent pathways. We implemented both a low dosage locally over the calvaria and a systemic drug administration scheme to evaluate the possible indirect effects from other systems and minimize toxicity. The treatment of mice with either the inhibitors or the administration scheme alleviated the synostosis phenotype with minimal adverse effects. Our data suggest that the ERF level is an important regulator of cranial bone development and that pharmacological modulation of its activity may represent a valid intervention approach both in CRS4 and in other syndromic forms of craniosynostosis mediated by the FGFR-RAS-ERK-ERF pathway
Recommended from our members
CHERIvoke: Characterising pointer revocation using CHERI capabilities for temporal memory safety
A lack of temporal safety in low-level languages has led to an epidemic of use-after-free exploits. These have surpassed in number and severity even the infamous buffer-overflow exploits violating spatial safety. Capability addressing can directly enforce spatial safety for the C language by enforcing bounds on pointers and by rendering pointers unforgeable. Nevertheless, an efficient solution for strong temporal memory safety remains elusive.
CHERI is an architectural extension to provide hardware capability addressing that is seeing significant commercial and open- source interest. We show that CHERI capabilities can be used as a foundation to enable low-cost heap temporal safety by facilitating out-of-date pointer revocation, as capabilities enable precise and efficient identification and invalidation of pointers, even when using unsafe languages such as C. We develop CHERIvoke, a technique for deterministic and fast sweeping revocation to enforce temporal safety on CHERI systems. CHERIvoke quarantines freed data before periodically using a small shadow map to revoke all dangling pointers in a single sweep of memory, and provides a tunable trade-off between performance and heap growth. We evaluate the performance of such a system using high-performance x86 processors, and further analytically examine its primary overheads. When configured with a heap-size overhead of 25%, we find that CHERIvoke achieves an average execution-time overhead of under 5%, far below the overheads associated with traditional garbage collection, revocation, or page-table systems.EP/K026399/1, EP/P020011/1, EP/K008528/
A semi-parametric approach to estimate risk functions associated with multi-dimensional exposure profiles: application to smoking and lung cancer
A common characteristic of environmental epidemiology is the multi-dimensional aspect of exposure patterns, frequently reduced to a cumulative exposure for simplicity of analysis. By adopting a flexible Bayesian clustering approach, we explore the risk function linking exposure history to disease. This approach is applied here to study the relationship between different smoking characteristics and lung cancer in the framework of a population based case control study
Recommended from our members
CheriRTOS: A Capability Model for Embedded Devices
Embedded systems are deployed ubiquitously
among various sectors including automotive, medical, robotics
and avionics. As these devices become increasingly connected,
the attack surface also increases tremendously; new mechanisms
must be deployed to defend against more sophisticated attacks
while not violating resource constraints. In this paper we present
CheriRTOS on CHERI-64, a hardware-software platform atop
Capability Hardware Enhanced RISC Instructions (CHERI) for
embedded systems.
Our system provides efficient and scalable task isolation,
fast and secure inter-task communication, fine-grained memory
safety, and real-time guarantees, using hardware capabilities as
the sole protection mechanism. We summarize state-of-the-art se-
curity and memory safety for embedded systems for comparison
with our platform, illustrating the superior substrate provided
by CHERIâs capabilities. Finally, our evaluations show that a
capability system can be implemented within the constraints of
embedded systems
Microservice Transition and its Granularity Problem: A Systematic Mapping Study
Microservices have gained wide recognition and acceptance in software
industries as an emerging architectural style for autonomic, scalable, and more
reliable computing. The transition to microservices has been highly motivated
by the need for better alignment of technical design decisions with improving
value potentials of architectures. Despite microservices' popularity, research
still lacks disciplined understanding of transition and consensus on the
principles and activities underlying "micro-ing" architectures. In this paper,
we report on a systematic mapping study that consolidates various views,
approaches and activities that commonly assist in the transition to
microservices. The study aims to provide a better understanding of the
transition; it also contributes a working definition of the transition and
technical activities underlying it. We term the transition and technical
activities leading to microservice architectures as microservitization. We then
shed light on a fundamental problem of microservitization: microservice
granularity and reasoning about its adaptation as first-class entities. This
study reviews state-of-the-art and -practice related to reasoning about
microservice granularity; it reviews modelling approaches, aspects considered,
guidelines and processes used to reason about microservice granularity. This
study identifies opportunities for future research and development related to
reasoning about microservice granularity.Comment: 36 pages including references, 6 figures, and 3 table
Energy- and flux-budget (EFB) turbulence closure model for the stably stratified flows. Part I: Steady-state, homogeneous regimes
We propose a new turbulence closure model based on the budget equations for
the key second moments: turbulent kinetic and potential energies: TKE and TPE
(comprising the turbulent total energy: TTE = TKE + TPE) and vertical turbulent
fluxes of momentum and buoyancy (proportional to potential temperature).
Besides the concept of TTE, we take into account the non-gradient correction to
the traditional buoyancy flux formulation. The proposed model grants the
existence of turbulence at any gradient Richardson number, Ri. Instead of its
critical value separating - as usually assumed - the turbulent and the laminar
regimes, it reveals a transition interval, 0.1< Ri <1, which separates two
regimes of essentially different nature but both turbulent: strong turbulence
at Ri<<1; and weak turbulence, capable of transporting momentum but much less
efficient in transporting heat, at Ri>1. Predictions from this model are
consistent with available data from atmospheric and lab experiments, direct
numerical simulation (DNS) and large-eddy simulation (LES).Comment: 40 pages, 6 figures, Boundary-layer Meteorology, resubmitted, revised
versio
Recommended from our members
Efficient tagged memory
We characterize the cache behavior of an in-memory tag table and
demonstrate that an optimized implementation can typically achieve a near-zero memory traffic overhead. Both industry and academia have repeatedly demonstrated tagged memory as a key mechanism to enable enforcement of powerful security invariants, including capabilities pointer integrity, watchpoints, and information-flow tracking. A single-bit tag shadowspace is the most commonly proposed requirement, as one bit is the minimum metadata needed to distinguish between an untyped data word and any number of new hardware-enforced types. We survey various tag shadowspace approaches and identify their common requirements and positive features of their implementations. To avoid non-standard memory widths, we identify the most practical implementation for tag storage to be an in-memory table managed next to the DRAM controller. We characterize the caching performance of such a tag table and demonstrate a DRAM traffic overhead below 5\% for the vast majority of applications. We identify spatial locality on a page scale as the primary factor that enables surprisingly high table cache-ability. We then demonstrate tag-table compression for a set of common applications. A hierarchical structure with elegantly simple optimizations reduces DRAM traffic overhead to below 1\% for most applications. These insights and optimizations pave the way for commercial applications making use of single-bit tags stored in commodity memory
Epigenetics as a mechanism driving polygenic clinical drug resistance
Aberrant methylation of CpG islands located at or near gene promoters is associated with inactivation of gene expression during tumour development. It is increasingly recognised that such epimutations may occur at a much higher frequency than gene mutation and therefore have a greater impact on selection of subpopulations of cells during tumour progression or acquisition of resistance to anticancer drugs. Although laboratory-based models of acquired resistance to anticancer agents tend to focus on specific genes or biochemical pathways, such 'one gene : one outcome' models may be an oversimplification of acquired resistance to treatment of cancer patients. Instead, clinical drug resistance may be due to changes in expression of a large number of genes that have a cumulative impact on chemosensitivity. Aberrant CpG island methylation of multiple genes occurring in a nonrandom manner during tumour development and during the acquisition of drug resistance provides a mechanism whereby expression of multiple genes could be affected simultaneously resulting in polygenic clinical drug resistance. If simultaneous epigenetic regulation of multiple genes is indeed a major driving force behind acquired resistance of patients' tumour to anticancer agents, this has important implications for biomarker studies of clinical outcome following chemotherapy and for clinical approaches designed to circumvent or modulate drug resistance
- âŠ