1,565 research outputs found

    Emergence of the GII-4 Norovirus Sydney2012 strain in England, winter 2012-2013.

    Get PDF
    Norovirus is the commonest cause of acute gastrointestinal disease and is the main aetiological agent of outbreaks of gastroenteritis, particularly in semi-closed environments. Norovirus infections in England typically peak between December and March each year. The most commonly detected norovirus strains belong to the genetically diverse genogroup-II genotype-4 (GII-4) genocluster and in the previous two norovirus winter seasons the majority of GII-4 strains in circulation worldwide have been genetically similar to the GII-4 strain New Orleans 1805/2009/USA. At the beginning of the 2012/13 season a genetically distinct GII-4 strain (Sydney 2012/NSW0514/2012/AU) was described which emerged worldwide during the winter of 2012/13. Here we describe the emergence of norovirus strains genetically related to Sydney2012 in England during the 2012/13 season to replace NewOrleans2009 strains as the most commonly detected variant of GII-4 norovirus in England. Furthermore, we demonstrate that whilst the emergence of Sydney2012 coincided with an early peak in the number of norovirus outbreaks, there was not an overall increase in norovirus activity compared to the previous season. Finally, we show that the Sydney2012 strain is associated with distinct genetic changes compared to the NewOrleans2009 strain, and these changes may have contributed to the emergence of the Sydney2012 strain

    Report on an all-sky LIGO search for periodic gravitational waves in the S4 data

    Full text link
    We report on an all-sky search with the LIGO detectors for periodic gravitational waves in the frequency range 50-1000 Hz and having a negative frequency time derivative with magnitude between zero and 10810^{-8} Hz/s. Data from the fourth LIGO science run have been used in this search. Three different semi-coherent methods of summing strain power were applied. Observing no evidence for periodic gravitational radiation, we report upper limits on strain amplitude and interpret these limits to constrain radiation from rotating neutron stars.Comment: 5 pages, 1 figure, presented at Amaldi7, Sydney (July 2007

    A model for reactive porous transport during re-wetting of hardened concrete

    Full text link
    A mathematical model is developed that captures the transport of liquid water in hardened concrete, as well as the chemical reactions that occur between the imbibed water and the residual calcium silicate compounds residing in the porous concrete matrix. The main hypothesis in this model is that the reaction product -- calcium silicate hydrate gel -- clogs the pores within the concrete thereby hindering water transport. Numerical simulations are employed to determine the sensitivity of the model solution to changes in various physical parameters, and compare to experimental results available in the literature.Comment: 30 page

    Violence and creation: the recovery of the body in the work of Elaine Scarry

    Get PDF
    Elaine Scarry’s book The Body in Pain justly deserves it place as one the pivotal works that opened up the field of ‘body studies’. The text needs to be evaluated in the retrospective terms of the field it established, and also with respect to the changing status of both ‘torture’ and ‘war’ in contemporary state politics. Scarry’s analysis of the relationship between making and unmaking, tools and weapons, under-estimates the reversibility and the situated relational character of these processes and artefacts. The changing nature of modern conflict, and the rising concern with global terrorism rather than ‘conventional’ and ‘nuclear’ war, makes the ‘referential instability’ of the body difficult to recuperate in post-conflict discourse. At the same, the normalisation of the logic of torture in the contemporary governance of the bodies of the most vulnerable in society makes Scarry’s analysis all the more prescient

    The Surgical Infection Society revised guidelines on the management of intra-abdominal infection

    Get PDF
    Background: Previous evidence-based guidelines on the management of intra-abdominal infection (IAI) were published by the Surgical Infection Society (SIS) in 1992, 2002, and 2010. At the time the most recent guideline was released, the plan was to update the guideline every five years to ensure the timeliness and appropriateness of the recommendations. Methods: Based on the previous guidelines, the task force outlined a number of topics related to the treatment of patients with IAI and then developed key questions on these various topics. All questions were approached using general and specific literature searches, focusing on articles and other information published since 2008. These publications and additional materials published before 2008 were reviewed by the task force as a whole or by individual subgroups as to relevance to individual questions. Recommendations were developed by a process of iterative consensus, with all task force members voting to accept or reject each recommendation. Grading was based on the GRADE (Grades of Recommendation Assessment, Development, and Evaluation) system; the quality of the evidence was graded as high, moderate, or weak, and the strength of the recommendation was graded as strong or weak. Review of the document was performed by members of the SIS who were not on the task force. After responses were made to all critiques, the document was approved as an official guideline of the SIS by the Executive Council. Results: This guideline summarizes the current recommendations developed by the task force on the treatment of patients who have IAI. Evidence-based recommendations have been made regarding risk assessment in individual patients; source control; the timing, selection, and duration of antimicrobial therapy; and suggested approaches to patients who fail initial therapy. Additional recommendations related to the treatment of pediatric patients with IAI have been included. Summary: The current recommendations of the SIS regarding the treatment of patients with IAI are provided in this guideline

    Phenotypic redshifts with self-organizing maps: A novel method to characterize redshift distributions of source galaxies for weak lensing

    Get PDF
    Wide-field imaging surveys such as the Dark Energy Survey (DES) rely on coarse measurements of spectral energy distributions in a few filters to estimate the redshift distribution of source galaxies. In this regime, sample variance, shot noise, and selection effects limit the attainable accuracy of redshift calibration and thus of cosmological constraints. We present a new method to combine wide-field, few-filter measurements with catalogs from deep fields with additional filters and sufficiently low photometric noise to break degeneracies in photometric redshifts. The multi-band deep field is used as an intermediary between wide-field observations and accurate redshifts, greatly reducing sample variance, shot noise, and selection effects. Our implementation of the method uses self-organizing maps to group galaxies into phenotypes based on their observed fluxes, and is tested using a mock DES catalog created from N-body simulations. It yields a typical uncertainty on the mean redshift in each of five tomographic bins for an idealized simulation of the DES Year 3 weak-lensing tomographic analysis of σΔz=0.007\sigma_{\Delta z} = 0.007, which is a 60% improvement compared to the Year 1 analysis. Although the implementation of the method is tailored to DES, its formalism can be applied to other large photometric surveys with a similar observing strategy.Comment: 24 pages, 11 figures; matches version accepted to MNRA

    Testing the cognitive-behavioural maintenance models across DSM-5 bulimic-type eating disorder diagnostic groups: A multi-centre study

    Get PDF
    The original cognitive-behavioural (CB) model of bulimia nervosa, which provided the basis for the widely used CB therapy, proposed that specific dysfunctional cognitions and behaviours maintain the disorder. However, amongst treatment completers, only 40–50 % have a full and lasting response. The enhanced CB model (CB-E), upon which the enhanced version of the CB treatment was based, extended the original approach by including four additional maintenance factors. This study evaluated and compared both CB models in a large clinical treatment seeking sample (N = 679), applying both DSM-IV and DSM-5 criteria for bulimic-type eating disorders. Application of the DSM-5 criteria reduced the number of cases of DSM-IV bulimic-type eating disorders not otherwise specified to 29.6 %. Structural equation modelling analysis indicated that (a) although both models provided a good fit to the data, the CB-E model accounted for a greater proportion of variance in eating-disordered behaviours than the original one, (b) interpersonal problems, clinical perfectionism and low self-esteem were indirectly associated with dietary restraint through over-evaluation of shape and weight, (c) interpersonal problems and mood intolerance were directly linked to binge eating, whereas restraint only indirectly affected binge eating through mood intolerance, suggesting that factors other than restraint may play a more critical role in the maintenance of binge eating. In terms of strength of the associations, differences across DSM-5 bulimic-type eating disorder diagnostic groups were not observed. The results are discussed with reference to theory and research, including neurobiological findings and recent hypotheses

    Routes for breaching and protecting genetic privacy

    Full text link
    We are entering the era of ubiquitous genetic information for research, clinical care, and personal curiosity. Sharing these datasets is vital for rapid progress in understanding the genetic basis of human diseases. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.Comment: Draft for comment
    corecore