Skip to main content

什么是神经衰弱


  很多人都可能听说过神经衰弱这个病名。有的人说睡眠不好是患了神经衰弱;有的人记忆力差就怀疑自己患了神经衰弱;也有的人认为自己精力不足,也是患了神经衰弱……。众说纷坛,让人似是而非。但究竟什么是神经衰弱呢?
  
  19世纪末,由于瓦特发明了蒸汽机,西方国家迅速工业化,物质生活得到改善,与此同时,人们工作、生活的节奏明显加快。各种竞争更为激烈,为了生存人们普遍感到精神压力加重。在当时的中上层白领阶层中,尤其是脑力劳动者,流行着一种时髦病,临床表现为失眠、脸红、头部重压感等等。1869年美国精神科医生比尔德(Beard)称这种病为神经衰弱,从而首次提出了神经衰弱这个病名。在此后的一段时间里,神经衰弱成为当时社会最流行的诊断名词,有些人甚至以自己患神经衰弱来炫耀自己身份高贵。
  
  近一个世纪来,随着对神经衰弱的认识逐渐加深,欧美国家的精神病医生对神经衰弱这一疾病的认识发生了变化。他们认为过去这一疾病名称,包括的范围过宽,许多本不属于神经衰弱的病症,误诊为神经衰弱。随着各种特殊综合征如焦虑症、疑病症的分出,使这一疾病概念迅速缩小,甚至消失。
  
  我国精神病学家经过长期的调查研究认为,神经衰弱是一种神经症性障碍,主要表现为精神容易兴奋和脑力容易疲乏,情绪烦恼,入睡困难。有的病人还表现为头痛、头昏、眼花、耳鸣、心悸、气短、阳痿、早泄或月经紊乱。
  
  神经衰弱是一种轻度的精神病,是神经症的一种。1985年《中华神经精神科杂志》编委会在《神经症临床工作诊断标准》中重写了神经症的定义“神经症指一组精神障碍,为各种躯体的或精神的不适感、强烈的内心冲突或不愉快的情感体验所苦恼。其病理体验常持续存在或反复出现,但缺乏任何可查明的器质性基础;患者力图摆脱,却无能为力。”神经衰弱也符合上述特点,病人无器质性病变,常为失眠、脑力不足、情绪波动大等不能自主的症状所苦恼。但是神经衰弱的病人,没有严重的行为紊乱,这与严重的精神病如精神分裂症是有区别的。
  
  一般来说,神经衰弱病人在患病前多有持久的情绪紧张和精神压力,如学生担心考试不好,夫妻、婆媳关系紧张,个人生活环境、生活规律剧变等,都可能诱发神经衰弱。
  
  1982年我国在12个地区进行精神病学调查,发现在15-59岁的居民中,神经衰弱的患病率为13.03‰,占全部神经症病例的58.7%,是我国目前最常见的神经症。
  

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...