lcohol Consumption as a Trigger of Recurrent out Attacks

نویسنده

  • Christine E. Chaisson
چکیده

ACKGROUND: Alcohol consumption has long been considered a trigger for recurrent gout attacks; owever, this hypothesis has not been formally tested. ETHODS: We conducted an Internet-based case-crossover study to assess several putative risk factors, ncluding alcohol consumption, thought to trigger recurrent gout attacks. Subjects who had an attack within he past year were recruited online and asked to provide access to medical records pertaining to their gout. ata were obtained on the amount and type of alcoholic beverage consumed on each day over the 2-day eriod before a gout attack and on each day over a 2-day period during the intercritical period. We xamined the amount and type of alcohol consumption and the risk of recurrent gout attacks using a onditional logistic regression adjusting for diuretic use and purine intake. ESULTS: A total of 197 subjects were recruited online over a 10-month period. Of those, 179 (91%) ulfilled the American College of Rheumatology Criteria for gout. Compared with no alcohol consumption, dds ratios for recurrent gout attacks were 1.1, 0.9, 2.0, and 2.5 for 1 to 2, 3 to 4, 5 to 6, and 7 or more rinks consumed over the 2-day period, respectively (P .005). A dose-response relationship of risk of out attacks was more evident for alcohol consumed over the last 24 hours. An increased risk of recurrent out attacks was found for each type of beverage consumed. ONCLUSION: Alcohol consumption triggers recurrent gout attacks. This effect was likely to occur ithin 24 hours after its consumption. © 2006 Elsevier Inc. All rights reserved.

منابع مشابه

Recent diuretic use and the risk of recurrent gout attacks: the online case-crossover gout study.

OBJECTIVE To assess several putative risk factors, including thiazide and loop diuretics use, thought to trigger recurrent gout attacks. METHODS We conducted an internet-based case-crossover study involving subjects who had a gout attack within the past year. Patients were recruited online and asked to provide access to medical records. Data were obtained on specific diuretic use on each day ...

متن کامل

P155: Differential Diagnosis of Panic Attacks: Using a Decision Tree

Panic attacks are discrete episodes of intense fear or discomfort accompanied by symptoms such as palpitations, shortness of breath, sweating, trembling, derealization and a fear of losing control or dying. Although panic attacks are required for a diagnosis of panic disorder, they also occur in association with a host of other disorders listed in the 5h version of the diagnostic and statistica...

متن کامل

Recurrent and persistent hypoglycemia following intoxication with glibenclamide overdose: case report

Background: Hypoglycemia can cause permanent damage to the brain or lead to death. That is why it is very important to prevent or quickly correct hypoglycemia to save life for the treatment of hypoglycemia following the use of Sulfonylureas, taking oral nutrition for the patient or administration of injectable hypertonic glucose is recommanded. But recurrence and resistance to treatment are com...

متن کامل

Positive association of tomato consumption with serum urate: support for tomato consumption as an anecdotal trigger of gout flares

BACKGROUND Gout is a consequence of an innate immune reaction to monosodium urate crystals deposited in joints. Acute gout attacks can be triggered by dietary factors that are themselves associated with serum urate levels. Tomato consumption is an anecdotal trigger of gout flares. This study aimed to measure the frequency of tomato consumption as a self-reported trigger of gout attacks in a lar...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006