Chia An Huang

Learn More
OBJECTIVE The aim of this paper is to describe the presentation and clinical management of a patient with anorexia nervosa complicated by superior mesenteric artery syndrome and pancreatitis, and discuss the association between these conditions. METHOD We present a case report and briefly review the relevant literature. RESULTS A 17-year-old girl with(More)
OBJECTIVE A number of organic conditions may mimic the symptoms of an eating disorder, however, gastric outlet obstruction mimicking anorexia nervosa has rarely been reported. METHOD We report the case of a 51-year-old female admitted to an eating disorders unit with an initial diagnosis of anorexia nervosa. RESULTS The patient's upper gastrointestinal(More)
To investigate the safety and tolerability of the atypical antipsychotic quetiapine in anorexia nervosa patients, and to determine the effect of quetiapine treatment on anorexic psychopathology and other key outcome measures including weight and body image, we conducted a naturalistic, open-label, 12-week randomized controlled trial of low-dose (100-400(More)
Anorexia nervosa (AN) is associated with gut and non-gut symptoms e.g. orthostatic intolerance and fatigue syndromes. Elsewhere, joint hypermobility has been found in non-anorexic populations who have gut symptoms, orthostatic intolerance or fatigue syndromes. We therefore postulated that joint hypermobility may be a feature of AN.Patients from an inpatient(More)
Individuals with anorexia nervosa (AN) experience insecure attachment. We investigated whether insecure attachment is associated with punishment and reward sensitivity in women with AN. Women with AN (n = 24) and comparison women (n = 26) (CW) completed The Eating Disorder Examination Questionnaire, Depression Anxiety Stress Scale, The Attachment Style(More)
The paper proposed a subsampling and quantization based watermarking scheme to resist the permutation attack. The subsampling based watermarking schemes have drawn great attention for its convenience and effectiveness recently, but this kind of watermarking schemes is very vulnerable to the permutation attack. In this paper, the watermark information is(More)
  • 1