A RANDOMIZED CONTROLLED TRIAL COMPARING TRAUMA-FOCUSED TREATMENT WITH AND WITHOUT CONCURRENT PERSONALITY DISORDER TREATMENT IN PATIENTS WITH POSTTRAUMATIC STRESS DISORDER AND COMORBID BORDERLINE PERSONALITY DISORDER

A randomized controlled trial comparing trauma-focused treatment with and without concurrent personality disorder treatment in patients with posttraumatic stress disorder and comorbid borderline personality disorder

Introduction Posttraumatic stress disorder (PTSD) and borderline personality disorder (BPD) often co-occur.There is growing motivation among clinicians to offer trauma-focused treatments, such as Eye Movement Desensitization and Reprocessing (EMDR), to patients with PTSD and comorbid BPD.However, a large subgroup of these patients does not sufficie

read more

Multi-faceted analysis provides little evidence for recurrent whole-genome duplications during hexapod evolution

Abstract Background Gene duplication events play an important role in the evolution and adaptation of organisms.Duplicated genes can arise through different mechanisms, including whole-genome duplications (WGDs).Recently, WGD was suggested to be an important driver of evolution, also in hexapod animals.Results Here, we analyzed 20 high-quality hexa

read more

Dynamic monitoring of viral gene expression reveals rapid antiviral effects of CD8 T cells recognizing the HCMV-pp65 antigen

IntroductionHuman jerome brown jersey Cytomegalovirus (HCMV) is a betaherpesvirus that causes severe disease in immunocompromised transplant recipients.Immunotherapy with CD8 T cells specific for HCMV antigens presented on HLA class-I molecules is explored as strategy for long-term relief to such patients, but the antiviral effectiveness of T cell

read more


COSR: A Reputation-Based Secure Route Protocol in MANET

Now, the route protocols defined in the Mobile Ad Hoc Network (MANET) are constructed in a common assumption which all nodes contained in such networks are trustworthy and cooperative.Once malicious or jerome brown jersey selfish nodes exist, all route paths built by these protocols must be broken immediately.According to the secure problems within

read more