Allergen immunotherapy safety: Characterizing systemic reactions and identifying risk factors
ABSTRACT Systemic reactions (SRs) pose a risk to those treated with subcutaneous allergen immunotherapy (AIT). The goals of the study were to calculate a rate of SRs to AIT, characterize the timing and treatment of these SRs, and analyze a case-control sample of patients for putative SR risk factors. A case-control study based on a retrospective chart review from 2004 to 2006 at a single institution was performed for patients receiving AIT. A control group received AIT over the same time period but did not have an SR. Three hundred thirty-eight patients had 10,497 AIT injection visits and 25 patients experienced 29 SRs for a rate of 0.28% per injection visit and 7.4% per patient. Gender, phase (build-up versus maintenance), asthma, angiotensin-converting enzyme inhibitors, beta-blockers, initial skin-prick test size, or allergen type did not increase the odds of an SR to AIT. Nearly one-half (48%) of the SRs occurred >30 minutes after the injection. All five patients with an abnormal physical exam or a >20% decrease in peak expiratory flow during their SRs occurred in patients presenting with their SRs >30 minutes after the injection (p = 0.02). This study found a low rate of SRs to AIT. However, a high percentage of SRs occurred >30 minutes after the injection, and many of these SRs required epinephrine. This study was unable to identify specific risk factors that predict SRs to AIT.
Conference Paper: Knowledge-based method and tool handling[Show abstract] [Hide abstract]
ABSTRACT: Method and tool selection are defined by a method rule system and a tool rule system. The former defines the order in which methods might be applied to perform a specific software-engineering task. Tools supporting the methods are managed by the tool system. A set of interrelation rules defines the transformation of a methodological refined task into a set of appropriate tools of a selected environment. Parameters and weights are used in both rule systems to distinguish alternative or complementary rules and to define preference for a selection process. Three methods of knowledge acquisition are examined: analysis of handbooks, usage protocols, and expert meeting reportsSystem Sciences, 1989. Vol.II: Software Track, Proceedings of the Twenty-Second Annual Hawaii International Conference on; 02/1989
- Electroencephalography and Clinical Neurophysiology 07/1995; 95(1). DOI:10.1016/0013-4694(95)94087-U
Conference Paper: Hashing on strings, cryptography, and protection of privacy[Show abstract] [Hide abstract]
ABSTRACT: Summary form only given. The issues of privacy and reliability of personal data are of paramount importance. If L is a list of people carrying some harmful defective gene, we want questions as to whether a person is in L to be reliably answered without compromising the data concerning anybody else. Reliability means that once the list is formed, nobody can play with the answer. Thus the answer should be checkable by the agent posing the question. We present an efficient protocol for this task. Our solution has very strong privacy protection propertiesCompression and Complexity of Sequences 1997. Proceedings; 07/1997