276 resultados para PROTOCOL FOR SURGERY


Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: The intense pain and anxiety triggered by burns and their associated wound care procedures are well established in the literature. Non-pharmacological intervention is a critical component of total pain management protocols and is used as an adjunct to pharmacological analgesia. An example is virtual reality, which has been used effectively to dampen pain intensity and unpleasantness. Possible links or causal relationships between pain/anxiety/stress and burn wound healing have previously not been investigated. The purpose of this study is to investigate these relationships, specifically by determining if a newly developed multi-modal procedural preparation and distraction device (Ditto) used during acute burn wound care procedures will reduce the pain and anxiety of a child and increase the rate of re-epithelialization. METHODS/DESIGN: Children (4 to 12 years) with acute burn injuries presenting for their first dressing change will be randomly assigned to either the (1) Control group (standard distraction) or (2) Ditto intervention group (receiving Ditto, procedural preparation and Ditto distraction). It is intended that a minimum of 29 participants will be recruited for each treatment group. Repeated measures of pain intensity, anxiety, stress and healing will be taken at every dressing change until complete wound re-epithelialization. Further data collection will aid in determining patient satisfaction and cost effectiveness of the Ditto intervention, as well as its effect on speed of wound re-epithelialization. DISCUSSION: Results of this study will provide data on whether the disease process can be altered by reducing stress, pain and anxiety in the context of acute burn wounds. TRIAL REGISTRATION: ACTRN12611000913976.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: In the paediatric population, pain and distress associated with burn injuries during wound care procedures remain a constant challenge. Although silver dressings are the gold standard for burn care in Australasia, very few high-level trials have been conducted that compare silver dressings to determine which will provide the best level of care clinically. Therefore, for paediatric patients in particular, identifying silver dressings that are associated with lower levels of pain and rapid wound re-epithelialisation is imperative. This study will determine whether there is a difference in time to re-epithelialisation and pain and distress experienced during wound care procedures among Acticoat, Acticoat combined with Mepitel and Mepilex Ag dressings for acute, paediatric partial thickness burns. METHODS/DESIGN: Children aged 0 to 15 years with an acute partial thickness (superficial partial to deep partial thickness inclusive) burn injury and a burn total body surface area of for the trial. Patients will be randomised to one of the three dressing groups: (1) Acticoat or (2) Acticoat combined with Mepitel or (3) Mepilex Ag. A minimum of 28 participants will be recruited for each treatment group. Primary measures of pain, distress and healing will be repeated at each dressing change until complete wound re-epithelialisation occurs or skin grafting is required. Additional data collected will include infection status at each dressing change, physical function, scar outcome and scar management requirements, cost effectiveness of each dressing and staff perspectives of the dressings. DISCUSSION: The results of this study will determine the effects of three commonly used silver and silicone burn dressing combinations on the rate of wound re-epithelialisation and pain experienced during dressing procedures in acute, paediatric partial thickness burn injuries. TRIAL REGISTRATION: Australian New Zealand Clinical Trials Registry ACTRN12613000105741.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose The aim of this study is to assess the refractive and visual outcomes following cataract surgery and implantation of the AcrySof IQ Toric SN6AT2 intraolcular lens (IOL) (Alcon Laboratories, Inc) in patients with low corneal astigmatism. Materials and Methods A retrospective, consecutive, single surgeon series of ninety-eight eyes of 88 patients following cataract surgery and implantation of the AcrySof IQ Toric SN6AT2 IOL in eyes with low preoperative corneal astigmatism. Postoperative measurements were obtained at one month post surgery. Main outcome measures were monocular distance visual acuity and residual refractive astigmatism. Results The mean preoperative corneal astigmatic power vector (APV) was 0.38 ± 0.09 D. Following surgery and implantation of the toric IOL, mean postoperative refractive APV was 0.13 ± 0.10 D. Mean postoperative distance uncorrected visual acuity (UCVA) was 0.08 ± 0.09 logMAR. Postoperative spherical equivalent refraction (SER) resulted in a mean of - 0.23 ± 0.22 D, with 96% of eyes falling within 0.50 D of the target SER. Conclusions The AcrySof IQ Toric SN6AT2 IOL is a safe and effective option for eyes undergoing cataract surgery with low amounts of preoperative corneal astigmatism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects of education programmes for skin cancer prevention in the general population. Description of the condition Skin cancer is a term that includes both melanoma and keratinocyte cancer. Keratinocyte cancer (also known as nonmelanoma skin cancer) generally refers to basal cell carcinoma (BCC) and squamous cell carcinoma (SCC), although it also includes other rare cutaneous neoplasms (Madan 2010). Skin cancer is the most common cancer in populations of predominantly fair-skinned people (Donaldson 2011; Lomas 2012; Stern 2010), with incidence increasing (Garbe 2009; Leiter 2012). There are variations in annual incidence rates between these populations, with Australia reporting the highest rate of skin cancer in the world (Lomas 2012). In 2012, the estimated age-standardised incidence rate for melanoma was almost 63 per 100,000 people for Australian men, and 40 per 100,000 people for Australian women (AIHW 2012). In Europe, incidence rates range from 10 to 15 per 100,000 people (Garbe 2009; Lasithiotakis 2006), with rates highest amongst men (Stang 2006). In the United States, incidence rates are approximately 18 per 100,000 people (Garbe 2009),with the highest rates reported forwomen (Bradford 2010). Keratinocyte cancer is much more common than melanoma. In 2012, the estimated Australian age-standardised rates for BCCand SCC were 884 and 387 per 100,000 people, respectively (Staples 2006). The cumulative three-year risk of developing a subsequent keratinocyte cancer is 18% for SCC and 44% for BCC (Marcil 2000).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Preliminary research shows ginger may be an effective adjuvant treatment for chemotherapy-induced nausea and vomiting but significant limitations need to be addressed before recommendations for clinical practice can be made. Methods/Design In a double–blinded randomised-controlled trial, chemotherapy-naïve patients will be randomly allocated to receive either 1.2 g of a standardised ginger extract or placebo per day. The study medication will be administrated as an adjuvant treatment to standard anti-emetic therapy and will be divided into four capsules per day, to be consumed approximately every 4 hours (300 mg per capsule administered q.i.d) for five days during the first three cycles of chemotherapy. Acute, delayed, and anticipatory symptoms of nausea and vomiting will be assessed over this time frame using a valid and reliable questionnaire, with nausea symptoms being the primary outcome. Quality of life, nutritional status, adverse effects, patient adherence, cancer-related fatigue, and CINV-specific prognostic factors will also be assessed. Discussion Previous trials in this area have noted limitations. These include the inconsistent use of standardized ginger formulations and valid questionnaires, lack of control for anticipatory nausea and prognostic factors that may influence individual CINV response, and the use of suboptimal dosing regimens. This trial is the first to address these issues by incorporating multiple unique additions to the study design including controlling for CINV-specific prognostic factors by recruiting only chemotherapy-naïve patients, implementing a dosing schedule consistent with the pharmacokinetics of oral ginger supplements, and independently analysing ginger supplements before and after recruitment to ensure potency. Our trial will also be the first to assess the effect of ginger supplementation on cancer-related fatigue and nutritional status. Chemotherapy-induced nausea and vomiting are distressing symptoms experienced by oncology patients; this trial will address the significant limitations within the current literature and in doing so, will investigate the effect of ginger supplementation as an adjuvant treatment in modulating nausea and vomiting symptoms. Trial registration

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The first generation e-passport standard is proven to be insecure and prone to various attacks. To strengthen, the European Union (EU) has proposed an Extended Access Control (EAC) mechanism for e-passports that intends to provide better security in protecting biometric information of the e-passport bearer. But, our analysis shows, the EU proposal fails to address many security and privacy issues that are paramount in implementing a strong security mechanism. In this paper we propose an on-line authentication mechanism for electronic passports that addresses the weakness in existing implementations, of both The International Civil Aviation Organisation (ICAO) and EU. Our proposal utilises ICAO PKI implementation, thus requiring very little modifications to the existing infrastructure which is already well established.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

MicroRNAs (miRNAs) are a class of small non-coding RNAs with a critical role in development and environmental responses. Efficient and reliable detection of miRNAs is an essential step towards understanding their roles in specific cells and tissues. However, gel-based assays currently used to detect miRNAs are very limited in terms of throughput, sensitivity and specificity. Here we provide protocols for detection and quantification of miRNAs by RT-PCR. We describe an end-point and real-time looped RT-PCR procedure and demonstrate detection of miRNAs from as little as 20 pg of plant tissue total RNA and from total RNA isolated from as little as 0.1 l of phloem sap. In addition, we have developed an alternative real-time PCR assay that can further improve specificity when detecting low abundant miRNAs. Using this assay, we have demonstrated that miRNAs are differentially expressed in the phloem sap and the surrounding vascular tissue. This method enables fast, sensitive and specific miRNA expression profiling and is suitable for facilitation of high-throughput detection and quantification of miRNA expression.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It has been 21 years since the decision in Rogers v Whitaker and the legal principles concerning informed consent and liability for negligence are still strongly grounded in this landmark High Court decision. This paper considers more recent developments in the law concerning the failure to disclose inherent risks in medical procedures, focusing on the decision in Wallace v Kam [2013] HCA 19. In this case, the appellant underwent a surgical procedure that carried a number of risks. The surgery itself was not performed in a sub-standard way, but the surgeon failed to disclose two risks to the patient, a failure that constituted a breach of the surgeon’s duty of care in negligence. One of the undisclosed risks was considered to be less serious than the other, and this lesser risk eventuated causing injury to the appellant. The more serious risk did not eventuate, but the appellant argued that if the more serious risk had been disclosed, he would have avoided his injuries completely because he would have refused to undergo the procedure. Liability was disputed by the surgeon, with particular reference to causation principles. The High Court of Australia held that the appellant should not be compensated for harm that resulted from a risk he would have been willing to run. We examine the policy reasons underpinning the law of negligence in this specific context and consider some of the issues raised by this unusual case. We question whether some of the judicial reasoning adopted in this case, represents a significant shift in traditional causation principles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Few cancers pose greater challenges than head and neck (H&N) cancer. Residual effects following treatment include body image changes, pain, fatigue and difficulties with appetite, swallowing and speech. Depression is a common comorbidity. There is limited evidence about ways to assist patients to achieve optimal adjustment after completion of treatment. In this study, we aim to examine the effectiveness and feasibility of a model of survivorship care to improve the quality of life of patients who have completed treatment for H&N cancer. Methods This is a preliminary study in which 120 patients will be recruited. A prospective randomised controlled trial of the H&N Cancer Survivor Self-management Care Plan (HNCP) involving pre- and post-intervention assessments will be used. Consecutive patients who have completed a defined treatment protocol for H&N cancer will be recruited from two large cancer services and randomly allocated to one of three study arms: (1) usual care, (2) information in the form of a written resource or (3) the HNCP delivered by an oncology nurse who has participated in manual-based training and skill development in patient self-management support. The trained nurses will meet patients in a face-to-face interview lasting up to 60 minutes to develop an individualised HNCP, based on principles of chronic disease self-management. Participants will be assessed at baseline, 3 and 6 months. The primary outcome measure is quality of life. The secondary outcome measures include mood, self-efficacy and health-care utilisation. The feasibility of implementing this intervention in routine clinical care will be assessed through semistructured interviews with participating nurses, managers and administrators. Interviews with patients who received the HNCP will explore their perceptions of the HNCP, including factors that assisted them in achieving behavioural change. Discussion In this study, we aim to improve the quality of life of a patient population with unique needs by means of a tailored self-management care plan developed upon completion of treatment. Delivery of the intervention by trained oncology nurses is likely to be acceptable to patients and, if successful, will be a model of care that can be implemented for diverse patient populations.