210 resultados para Bartlett
Resumo:
Proteinuria was observed in 27% of 153 patients taking tenofovir for more than 1 year. Concomitant protease inhibitor therapy and cumulative tenofovir exposure were independently associated with proteinuria in this cohort. Proteinuria was reversible in 11 of 12 patients who ceased tenofovir because of proteinuria without altering other medications. Clinicians should be aware that tenofovir can cause reversible proteinuria in patients with HIV.
Resumo:
PURPOSE: To test the reliability of Timed Up and Go Tests (TUGTs) in cardiac rehabilitation (CR) and compare TUGTs to the 6-Minute Walk Test (6MWT) for outcome measurement. METHODS: Sixty-one of 154 consecutive community-based CR patients were prospectively recruited. Subjects undertook repeated TUGTs and 6MWTs at the start of CR (start-CR), postdischarge from CR (post-CR), and 6 months postdischarge from CR (6 months post-CR). The main outcome measurements were TUGT time (TUGTT) and 6MWT distance (6MWD). RESULTS: Mean (SD) TUGTT1 and TUGTT2 at the 3 assessments were 6.29 (1.30) and 5.94 (1.20); 5.81 (1.22) and 5.53 (1.09); and 5.39 (1.60) and 5.01 (1.28) seconds, respectively. A reduction in TUGTT occurred between each outcome point (P ≤ .002). Repeated TUGTTs were strongly correlated at each assessment, intraclass correlation (95% CI) = 0.85 (0.76–0.91), 0.84 (0.73–0.91), and 0.90 (0.83–0.94), despite a reduction between TUGTT1 and TUGTT2 of 5%, 5%, and 7%, respectively (P ≤ .006). Relative decreases in TUGTT1 (TUGTT2) occurred from start-CR to post-CR and from start-CR to 6 months post-CR of −7.5% (−6.9%) and −14.2% (−15.5%), respectively, while relative increases in 6MWD1 (6MWD2) occurred, 5.1% (7.2%) and 8.4% (10.2%), respectively (P < .001 in all cases). Pearson correlation coefficients for 6MWD1 to TUGTT1 and TUGTT2 across all times were −0.60 and −0.68 (P < .001) and the intraclass correlations (95% CI) for the speeds derived from averaged 6MWDs and TUGTTs were 0.65 (0.54, 0.73) (P < .001). CONCLUSIONS: Similar relative changes occurred for the TUGT and the 6MWT in CR. A significant correlation between the TUGTT and 6MWD was demonstrated, and we suggest that the TUGT may provide a related or a supplementary measurement of functional capacity in CR.
Resumo:
Biomechanics involves research and analysis of the mechanisms of living organisms. This can be conducted on multiple levels and represents a continuum from the molecular, wherein biomaterials such as collagen and elastin are considered, to the tissue, organ and whole body level. Some simple applications of Newtonian mechanics can supply correct approximations on each level, but precise details demand the use of continuum mechanics. Sport biomechanics uses the scientific methods of mechanics to study the effects of forces on the sports performer and considers aspects of the behaviour of sports implements, equipment, footwear and surfaces. There are two main aims of sport biomechanics, that is, the reduction of injury and the improvement of performance (Bartlett, 1999). Aristotle (384-322 BC) wrote the first book on biomechanics, De Motu Animalium, translated as On the Movement of Animals. He saw animals' bodies as mechanical systems, but also pursued questions that might explain the physiological difference between imagining the performance of an action and actually doing it. Some simple examples of biomechanics research include the investigation of the forces that act on limbs, the aerodynamics of animals in flight, the hydrodynamics of objects moving through water and locomotion in general across all forms of life, from individual cells to whole organisms...
Resumo:
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.
Resumo:
We performed an integrated genomic, transcriptomic and proteomic characterization of 373 endometrial carcinomas using array- and sequencing-based technologies. Uterine serous tumours and ∼25% of high-grade endometrioid tumours had extensive copy number alterations, few DNA methylation changes, low oestrogen receptor/progesterone receptor levels, and frequent TP53 mutations. Most endometrioid tumours had few copy number alterations or TP53 mutations, but frequent mutations in PTEN, CTNNB1, PIK3CA, ARID1A and KRAS and novel mutations in the SWI/SNF chromatin remodelling complex gene ARID5B. A subset of endometrioid tumours that we identified had a markedly increased transversion mutation frequency and newly identified hotspot mutations in POLE. Our results classified endometrial cancers into four categories: POLE ultramutated, microsatellite instability hypermutated, copy-number low, and copy-number high. Uterine serous carcinomas share genomic features with ovarian serous and basal-like breast carcinomas. We demonstrated that the genomic features of endometrial carcinomas permit a reclassification that may affect post-surgical adjuvant treatment for women with aggressive tumours.
Resumo:
Objectives – To describe the development of an educational workshop to develop procedural skills in undergraduate Paramedic students using fresh frozen cadavers and to report the student’s assessment of the program. Methods – A six-hour anatomy based workshop was developed using fresh frozen cadavers to teach a range of airway and invasive procedural skills to second year undergraduate paramedic students. Embedded QUAN (qual) methodology will be utilised to evaluate the student’s satisfaction, perception and quality of teaching as compared to other existing clinical teaching techniques such as high fidelity simulation. Students will be asked to complete an anonymous validated survey (10 questions formulated on a 5 point Likert scale) and provide a qualitative feedback pre and post the six-hour workshop. Results – This is a prospective study planned for September 2013. Low-risk human research ethics are being sought. Teaching evaluation results from the inaugural 2012 workshop (undergraduate and postgraduate Paramedic students) and interim results for 2013 will be presented. Conclusions – Clinical teaching using fresh frozen cadavers thus far has predominately been used in the education of medical and surgical trainees. A number of studies have found them to be effective and in some cases superior to traditional high fidelity simulation teaching strategies. Fresh frozen cadavers are said to provide perfect anatomy, normal tissue consistency and a realistic operative training experience (Lloyd, Maxwell-Armstrong et al. 2011). The authors believe that this study will show that the use of fresh frozen cadavers offers a safe and effective mode to teach procedural skills to student paramedics that will help bridge the skills gap and increase confidence prior to students undertaking such interventions on living patients. A modified training program may be formulated for general practitioners undertaking Emergency Medicine Advanced Rural Skills.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.
Resumo:
A key perspective on reputation is that of assessment. Much of the communication literature focuses on the influence organizations have on impression formation. This chapter however suggests that in order to understand reputation assessment, it is also important to understand the related concept of legitimacy. It addresses two approaches to understanding reputation namely accreditation and ranking. Accreditation alludes to concepts of legitimacy in which firms may acquire credibility by meeting formalized standards of certification. Ranking deals with categorizing and rating organizational reputations so that they may be assessed relative to one another. The chapter explores the various ways in which the mechanisms of accreditation and ranking operate and the role of social actors in developing and applying them. Ranking systems that provide the mechanism for comparing organizations and assessing their relative value are also explored.
Resumo:
Rationale Developing models to efficiently explore the mechanisms by which stress can mediate reinstatement of drug-seeking behavior is crucial to the development of new pharmacotherapies for alcohol use disorders. Objectives We examined the effects of multiple reinstatement sessions using the pharmacological stressor, yohimbine, in ethanol- and sucrose-seeking rats in order to develop a more efficient model of stress-induced reinstatement. Methods Long–Evans rats were trained to self-administer 10% ethanol with a sucrose-fading procedure, 20% ethanol without a sucrose-fading procedure, or 5% sucrose in 30-min operant self-administration sessions, followed by extinction training. After reaching extinction criteria, the animals were tested once per week with yohimbine vehicle and yohimbine (2 mg/kg), respectively, 30 min prior to the reinstatement sessions or blood collection. Levels of reinstatement and plasma corticosterone (CORT) were determined each week for four consecutive weeks. Results Yohimbine induced reinstatement of ethanol- and sucrose-seeking in each of the 4 weeks. Interestingly, the magnitude of the reinstatement decreased for the 10% ethanol group after the first reinstatement session but remained stable for the 20% ethanol group trained without sucrose. Plasma CORT levels in response to injection of both vehicle and yohimbine were significantly higher in the ethanol-trained animals compared to sucrose controls. Conclusions The stable reinstatement in the 20% ethanol group supports the use of this training procedure in studies using within-subject designs with multiple yohimbine reinstatement test sessions. Additionally, these results indicate that the hormonal response to stressors can be altered following extinction from self-administration of relatively modest amounts of ethanol.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Resumo:
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.
Resumo:
By presenting an overview of institutional theory, specifically the concepts of organizational fields, institutional pressures, and legitimacy, in addition to classical rhetoric, we have sought to highlight that there are links within the literature between the concepts of institutional theory and legitimacy, and also legitimacy and classical rhetoric. To date however, the three concepts – institutional pressures, legitimacy, and rhetoric – have not been explicitly linked. Through building on the current literature, and using the notion of legitimacy as the axis to connect institutional pressures with rhetoric, we argue that certain rhetorical devices may in fact be used to build and construct legitimacy in relation to the different institutional pressures an organization may face within a field. We believe that this preliminary framework may be useful to the field of CSR communication, whereby it may assist in constructing legitimate CSR communication in response to the various pressures an organization may face in relation to CSR.
Resumo:
The field of rhetoric can be highly useful for researchers to focus on and understand the specific textual strategies used by organizations when communicating about CSR practices. To date however, while there have been studies that consider the use of rhetoric to communicate about environmental practices, there have been few studies that have used a rhetorical analysis to consider both green communication and public response to that communication as a way of understanding public issues with organizational practice. This study seeks to address this gap by using a rhetorical analysis of both environmental communication by organizations, and the claims made by a regulatory body acting on behalf of the public about why that communication was deemed ‘greenwash’ or inappropriate. In doing so, the paper applies a rhetorical analysis to understand the grounds on which environmental communication is deemed not legitimate, and suggests that whilst all three elements of ethos should be considered when communicating a CSR practice, the element of phronesis is the most crucial element, whereby organizations must ensure that they accurately justify any claims in relation to CSR.