412 resultados para requiring hospitalization
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Security of RFID authentication protocols has received considerable interest recently. However, an important aspect of such protocols that has not received as much attention is the efficiency of their communication. In this paper we investigate the efficiency benefits of pre-computation for time-constrained applications in small to medium RFID networks. We also outline a protocol utilizing this mechanism in order to demonstrate the benefits and drawbacks of using thisapproach. The proposed protocol shows promising results as it is able to offer the security of untraceableprotocols whilst only requiring the time comparable to that of more efficient but traceable protocols.
Resumo:
Introduction: Evaluating the effectiveness of interventions designed to increase the physical activity in communities is often a difficult and complex task, requiring considerable expertise and investment, and often constrained by methodological limitations. These limitations, in turn, create additional challenges when these studies are used in systematic reviews as they hinder the confidence, precision and interpretation of results. The objective of this paper is to summarise the methodological challenges posed in conducting a systematic review of community-wide physical activity interventions to help inform those conducting future primary research and systematic reviews. Methods: We conducted a Cochrane systematic review of community-wide interventions to increase physical activity. We assessed the methodological quality of the included studies. We will investigate these in greater detail, particularly in relation to the potential impact on measures of effect, confidence in results, generalizability of results and general interpretation. Results: The systematic review was conducted and has been published in the Cochrane Library. A logic model was helpful in defining and interpreting the studies. Many studies of unsuitable study design were excluded; however several important methodological limitations of the primary studies evaluating community-wide physical activity interventions emerged. These included: - the failure to use validated tools to measure physical activity; - issues associated with pre and post test designs; - inadequate sampling of populations; - poor control groups; and - intervention and measurement protocols of inadequate duration. Although it is challenging to undertake rigorous evaluations of complex interventions, these issues result in significant uncertainty over the effectiveness of these interventions, and the possible factors required for a community-wide intervention to be successful. In particular, the combination of several of these limitations (e.g. un-validated tools, inadequate sampling, and short duration) is that studies may lack the sensitivity to detect any meaningful change. Multiple publications of findings for the same study also made interpretation difficult; however, interventions with parallel qualitative publications were helpful. Discussion: Evaluating community wide interventions to increase physical activity in a rigorous way is incredibly challenging. These findings reflect these challenges but have important ramifications for researchers conducting primary studies to determine the efficacy of such interventions, as well as for researchers conducting systematic reviews. This new review shows that the inadequacies of design and evaluation are continuing. It is hoped that the adoption of such suggestions may aid in the development of systematic reviews, but more importantly, in enabling translation of such findings into policy and practice.
Resumo:
PURPOSE. To evaluate the utility of blood cultures in the assessment of early postoperative fever in hip fracture patients with no other indicators of sepsis. METHODS. 101 blood cultures were drawn on postoperative days 0 to 5 to investigate 84 febrile episodes in 31 women and 30 men (mean age, 80 years) whose body temperature measured via the tympanic route was ≥38ºC. Culture results of these 61 patients were divided into culture-positive and culture-negative groups for comparison. RESULTS. Of the 101 blood cultures, only 2 were positive: one was obtained 5 days after dynamic hip screw fixation, and the other 4 days after hemiarthroplasty. Both blood cultures grew coagulase-negative staphylococcal species, which were deemed to be skin contaminants not requiring change of patient management. 44 of these patients were treated with oral or intravenous antibiotics for a period of time. CONCLUSION. The risk of bacteraemia in patients with postoperative fever but no other symptoms of infection is low. Routine procurement of blood cultures in such patients is ineffective and of limited utility.
Resumo:
Before e-Technology’s effects on users can be accurately measured, those users must be fully engaged with the relevant systems and services. That is they must be able to function as part of the digital economy. The paper refers to this ‘user functionality’ as t-Engagement. Not all users are t-Engaged and in many instances achieving t-Engagement will require assistance from external sources. This paper identifies the current state of Australia’s regional digital economy readiness and highlights the role of Local Government Authorities (‘LGAs’) in enabling t-Engagement. The paper analyses responses to the 2012 BTA, NBN and Digital Economy Survey by LGA and other regional organizations within Australia. The paper’s particular focus is on the level of use by Local Government Authorities of federal, state and other programs designed to enable t-Engagement. The analysis confirms the role of LGAs in enabling t-Engagement and in promoting Australia’s digital economy. The paper concludes by reinforcing the need to ensure ongoing meaningful federal and State support of regional initiatives, as well as identifying issues requiring specific attention.
Resumo:
New Australian curriculum documents and government initiatives advocate the inclusion of Asian perspectives, which is highly relevant to the STEM fields. For Australia and other countries, STEM education is an opportunity to develop competencies towards employment in high-demand areas, yet the world’s knowledge of STEM is changing rapidly, requiring continuous analysis to meet market demands. This paper presents the need for “collaborations between nations” through research to advance each country’s STEM agenda towards further globalisation of education with the sharing of knowledge. Research is needed on views of what constitutes cultural capital for STEM, which also involves understanding past and current STEM endeavours occurring within various countries. Most importantly for STEM education is uncovering instructional innovations aligned with countries’ cultures and STEM endeavours. Research questions are provided in this paper to stimulate ideas for investigating in these fields. Economically, and as demonstrated recently by Greece and Spain, countries throughout the world can no longer operate independently for advancing standards of living. The world needs to recognise interdependence not only in trade and resources but also through the knowledge base that exists within countries. Learning together globally means transitioning from independence to interdependence in STEM education that will help each country meet global demands.
Resumo:
In a critical but sympathetic reading of Habermas’s work (1984, 1987a, 1987b, 2003), Luke Goode (2005) recently sought to rework his theory of deliberative democracy in an age of mediated and increasingly digital public spheres. Taking a different approach, Alan McKee (2005) challenged the culture- and class-bound strictures of Habermasian rationalism, instead pursuing a more radically pluralist account of postmodern public spheres. The editors of this special section of Media, Culture & Society invited us to discuss our differing approaches to the public sphere. Goode holds that the institutional bases of contemporary public spheres (political parties, educational institutions or public media) remain of critical importance, albeit in the context of a kaleidoscopic array of unofficial and informal micro-publics, both localized and de-territorialized. In contrast, McKee sustains a ‘hermeneutics of suspicion’ toward the official, hegemonic institutions of the public sphere since they tend to exclude and delegitimize discourses and practices that challenge their polite middle-class norms. McKee’s recent research has focused on sexual cultures, particularly among youth (McKee, 2011). Goode’s recent work has examined new social media spaces, particularly in relation to news and public debate (e.g. Goode, 2009; Goode et al., 2011). Consequently, our discussion turned to a domain which links our interests: after Goode discussed some of his recent research on (in)civility on YouTube as a new media public sphere, McKee challenged him to consider the case of pornographic websites modelled on social media sites.1 He identifies a greater degree of ‘civility’ in these pornographic sibling sites than on YouTube, requiring careful consideration of what constitutes a ‘public sphere’ in contemporary digital culture. Such sites represent an environment that shatters the opposition of public and private interest, affording public engagement on matters of the body, of intimacy, of gender politics, of pleasure and desire – said by many critics to be ruled out of court in Habermasian theory. Such environments also trouble traditional binaries between the cognitive and the affective, and between the performative and the deliberative. In what follows we explore the differences between our approaches in the form of a dialogue. As is often the case, our approaches seemed less at odds after engaging in conversation than may have initially appeared. But important differences of emphasis remain.
Resumo:
Background: Hyperpolarised helium MRI (He3 MRI) is a new technique that enables imaging of the air distribution within the lungs. This allows accurate determination of the ventilation distribution in vivo. The technique has the disadvantages of requiring an expensive helium isotope, complex apparatus and moving the patient to a compatible MRI scanner. Electrical impedance tomography (EIT) a non-invasive bedside technique that allows constant monitoring of lung impedance, which is dependent on changes in air space capacity in the lung. We have used He3MRI measurements of ventilation distribution as the gold standard for assessment of EIT. Methods: Seven rats were ventilated in supine, prone, left and right lateral position with 70% helium/30% oxygen for EIT measurements and pure helium for He3 MRI. The same ventilator and settings were used for both measurements. Image dimensions, geometric centre and global in homogeneity index were calculated. Results: EIT images were smaller and of lower resolution and contained less anatomical detail than those from He3 MRI. However, both methods could measure positional induced changes in lung ventilation, as assessed by the geometric centre. The global in homogeneity index were comparable between the techniques. Conclusion: EIT is a suitable technique for monitoring ventilation distribution and inhomgeneity as assessed by comparison with He3 MRI.
Resumo:
Background: Extracorporeal circulation (ECC), the diversion of blood flow through a circuit located outside of the body, has been one of the major advances in modern medicine. Cardio-pulmonary bypass (CPB), renal dialysis, apheresis and extracorporeal membrane oxygenation (ECMO) are all different forms of ECC. Despite its major benefits, when blood comes into contact with foreign material, both the coagulation and inflammation cascades are activated simultaneously. Short periods of exposure to ECC e.g. CPB (�2 h duration), are known to be associated with haemolysis, coagulopathies, bleeding and inflammation which demand blood product support. Therefore, it is not unexpected that these complications would be exaggerated with prolonged periods of ECC such as in ECMO (days to weeks duration). The variability and complexities of the underlying pathologies of patients requiring ECC makes it difficult to study the cause and effect of these complications. To overcome this problem we developed an ovine (sheep) model of ECC. Method: Healthy female sheep (1–3 y.o.) weighing 40–50 kg were fasted overnight, anaesthetised, intubated and ventilated [1]. Half the group received smoke induced acute lung injury (S-ALI group) (n = 8) and the other half did not (healthy group) (n = 8). Sheep were subsequently cannulated (Medtronic Inc, Minneapolis, MN, USA) and veno-venous ECMO commenced using PLS ECMO circuit and Quadrox D oxygenator (Maquet Cardiopulmonary AG, Hechinger Straße, Germany). There was continuous physiological monitoring and blood was collected at specified time intervals for full blood counts, platelet function analysis (by Multiplate®), routine coagulation and assessment of clot formation and lysis (by ROTEM®). Preliminary results Full blood counts and routine coagulation results from normal healthy sheep were comparable to those of normal human adults. Within 15 min of initiating of ECMO, PT, PTT and EXTEM clot formation time increased, whilst EXTEM maximum clot firmness decreased in both cohorts. Discussion & Conclusions: Preliminary results of sheep from both 2 h ECMO cohorts showed that the anatomy, haematology and coagulation parameters of an adult sheep are comparable to that a human adult. Experiments are currently underway with healthy (n = 8) and S-ALI (n = 8) sheep on ECMO for 24 h. In addition to characterising how ECMO alters haematology and coagulation parameters, we hope that it will also define which blood components will be most effective to correct bleeding or clotting complications during ECMO support.
Resumo:
The method of lines is a standard method for advancing the solution of partial differential equations (PDEs) in time. In one sense, the method applies equally well to space-fractional PDEs as it does to integer-order PDEs. However, there is a significant challenge when solving space-fractional PDEs in this way, owing to the non-local nature of the fractional derivatives. Each equation in the resulting semi-discrete system involves contributions from every spatial node in the domain. This has important consequences for the efficiency of the numerical solver, especially when the system is large. First, the Jacobian matrix of the system is dense, and hence methods that avoid the need to form and factorise this matrix are preferred. Second, since the cost of evaluating the discrete equations is high, it is essential to minimise the number of evaluations required to advance the solution in time. In this paper, we show how an effective preconditioner is essential for improving the efficiency of the method of lines for solving a quite general two-sided, nonlinear space-fractional diffusion equation. A key contribution is to show, how to construct suitable banded approximations to the system Jacobian for preconditioning purposes that permit high orders and large stepsizes to be used in the temporal integration, without requiring dense matrices to be formed. The results of numerical experiments are presented that demonstrate the effectiveness of this approach.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Mandatory child abuse and neglect reporting laws apply to teachers in many countries of the world. However, such laws have not yet been introduced for teachers in Malaysia, and there is debate about whether the laws should be extended to teachers at all. This paper aimed to investigate the level of support among teachers to assume mandatory reporting duties and to identify factors determining this support in Malaysia. A total of 668 teachers from 14 randomly selected public primary schools completed an anonymous self-administered questionnaire. Results showed that 44.4 per cent of the respondents supported legislation requiring teachers to report child abuse. Teachers of Indian ethnicity, those with a shorter duration of service in teaching (< 5 years), the availability of knowledgeable and supportive school staff and a higher level of commitment to reporting were significant factors affecting teachers' support for mandatory reporting. This study provides important insights into factors influencing teachers' support for the introduction of mandatory reporting legislation for teachers in Malaysia. Teachers do not unanimously support these laws and there is a lack of clarity about what such laws will mean for teachers. The data highlight the need for specific training programmes to raise teachers' awareness, build their confidence and enhance their willingness to report child abuse.
Resumo:
In Bazley v Wesley Monash IVF Pty Ltd [2010] QSC 118 an order was made under r 250 of the Uniform Civil Procedure Rules 1999 (Qld) (“UCPR”) requiring the respondent to continue to hold and maintain straws of semen belonging to the applicant’s deceased husband. The decision includes a useful analysis of the development of the common law regarding property rights in human bodies and body parts.
Resumo:
Background: Decreased ability to perform Activities of Daily Living (ADLs) during hospitalisation has negative consequences for patients and health service delivery. Objective: To develop an Index to stratify patients at lower and higher risk of a significant decline in ability to perform ADLs at discharge. Design: Prospective two cohort study comprising a derivation (n=389; mean age 82.3 years; SD� 7.1) and a validation cohort (n=153; mean age 81.5 years; SD� 6.1). Patients and setting: General medical patients aged = 70 years admitted to three university-affiliated acute care hospitals in Brisbane, Australia. Measurement and main results: The short ADL Scale was used to identify a significant decline in ability to perform ADLs from premorbid to discharge. In the derivation cohort, 77 patients (19.8%) experienced a significant decline. Four significant factors were identified for patients independent at baseline: 'requiring moderate assistance to being totally dependent on others with bathing'; 'difficulty understanding others (frequently or all the time)'; 'requiring moderate assistance to being totally dependent on others with performing housework'; a 'history of experiencing at least one fall in the previous 90 days prior to hospital admission' in addition to 'independent at baseline', which was protective against decline at discharge. 'Difficulty understanding others (frequently or all the time)' and 'requiring moderate assistance to being totally dependent on others with performing housework' were also predictors for patients dependent in ADLs at baseline. Sensitivity, specificity, Positive Predictive Value (PPV), and Negative Predictive Value (NPV) of the DADLD dichotomised risk scores were: 83.1% (95% CI 72.8; 90.7); 60.5% (95% CI 54.8; 65.9); 34.2% (95% CI 27.5; 41.5); 93.5% (95% CI 89.2; 96.5). In the validation cohort, 47 patients (30.7%) experienced a significant decline. Sensitivity, specificity, PPV and NPV of the DADLD were: 78.7% (95% CI 64.3; 89.3); 69.8% (95% CI 60.1, 78.3); 53.6% (95% CI 41.2; 65.7); 88.1% (95% CI 79.2; 94.1). Conclusions: The DADLD Index is a useful tool for identifying patients at higher risk of decline in ability to perform ADLs at discharge.
Resumo:
Enterprise Systems (ES) can be understood as the de facto standard for holistic operational and managerial support within an organization. Most commonly ES are offered as commercial off-the-shelf packages, requiring customization in the user organization. This process is a complex and resource-intensive task, which often prevents small and midsize enterprises (SME) from undertaking configuration projects. Especially in the SME market independent software vendors provide pre-configured ES for a small customer base. The problem of ES configuration is shifted from the customer to the vendor, but remains critical. We argue that the yet unexplored link between process configuration and business document configuration must be closer examined as both types of configuration are closely tied to one another.