292 resultados para Medical protocols.
Resumo:
Oral endotracheal tubes (ETTs) and nasogastric tubes (NGT) are common devices used in adult intensive care and numerous options exist for safe and comfortable securement of these devices. The aim of this project was to identify the available range of ETT and NGT securement devices in Australia as a resource for clinicians seeking to explore options for tube stabilisation. This article reports part A of this project: ETT securement options. Part B will report NGT device fixation options. Securing ETTs to ensure a patent airway with minimal ETT movement, promotion of patient comfort and absence of adverse events such as ETT dislodgement, unplanned extubation and device-related injury1, are essential critical care nursing actions. The ETT requires a fixation method that is robust yet does not traumatise or injure the mucosal tissues of the mouth and soft tissue of the lips.2,3 Choice of a securement apparatus is often determined by product availability in our units or hospitals but is also driven by evidence-based practice and clinician preference. Trying to put this information together can be difficult and time-consuming for the bedside clinician...
Resumo:
This article is the second part of a two-part series examining securement options for commonly used therapeutic devices in the adult intensive care unit. Part A focused on endotracheal device securement.1 This article addresses nasogastric tube (NGT) securement options and with the aim of identifying the available range of NGT securement devices in Australia as a resource for clinicians seeking to explore options for tube stabilisation. Nasogastric feeding or gastric decompression tubes are commonly inserted via the nostril/nares. The National Pressure Ulcer Advisory Panel (NPUAP) 2011 position statement on mucosal pressure injuries, highlighted that mucosal tissues are vulnerable to pressure from devices.2 Securing of these devices sometimes leads to pressure-related injury to the internal mucosa due to difficulty visualising the mucosa and failure to reposition the nasogastric tube to relieve the pressure in a particular area.3 The nasal orifice is much smaller than the oral cavity and regular tube position changes are vital to minimise the risk of mucosal damage and ulcer development.
Resumo:
Indigenous commentators have long critiqued the way in which government agencies and member of academic institutions carry out research in their social context. Recently, these commentators have turned their critical gaze upon activities of Research Ethics Boards(REBs). Informed by the reflections on research processes and by Indigenous Canadian and New Zealand research participants, as well as the extant literature, this paper critiques the processes employed by New Zealand REBs to assess Indigenous‐focused or Indigenous‐led research in the criminological realm.
Resumo:
The validity of fatigue protocols involving multi-joint movements, such as stepping, has yet to be clearly defined. Although surface electromyography can monitor the fatigue state of individual muscles, the effects of joint angle and velocity variation on signal parameters are well established. Therefore, the aims of this study were to i) describe sagittal hip and knee kinematics during repetitive stepping ii) identify periods of high inter-trial variability and iii) determine within-test reliability of hip and knee kinematic profiles. A group of healthy men (N = 15) ascended and descended from a knee-high platform wearing a weighted vest (10%BW) for 50 consecutive trials. The hip and knee underwent rapid flexion and extension during step ascent and descent. Variability of hip and knee velocity peaked between 20-40% of the ascent phase and 80-100% of the descent. Significant (p<0.05) reductions in joint range of motion and peak velocity during step ascent were observed, while peak flexion velocity increased during descent. Healthy individuals use complex hip and knee motion to negotiate a knee-high step with kinematic patterns varying across multiple repetitions. These findings have important implications for future studies intending to use repetitive stepping as a fatigue model for the knee extensors and flexors.
Resumo:
LexisNexis Questions and Answers: Medical Law is designed to facilitate both continuous review and preparation for assignments and examinations. This book provides a clear and concise revision guide for each of the major topics covered in the typical health law course. It provides an understanding of medical law in each Australian jurisdiction and gives a clear and systematic approach to analysing and answering problem and essay questions. Each chapter commences with an identification of the key issues, including a summary of the relevant cases and legislation. Each question is followed by a suggested answer plan, a sample answer and comments on how the answer might be assessed by an examiner. The author also offers advice on common errors to avoid and practical hints and tips on how to achieve higher marks.
Resumo:
In Christensen v Salter [2002] QDC 082 the District Court of Queensland considered some issues on the limitation period applying to claims arising out of a failed sterilisation procedure
Resumo:
This study investigates if and why assessing relevance of clinical records for a clinical retrieval task is cognitively demanding. Previous research has highlighted the challenges and issues information retrieval systems are faced with when determining the relevance of documents in this domain, e.g., the vocabulary mismatch problem. Determining if this assessment imposes cognitive load on human assessors, and why this is the case, may shed lights on what are the (cognitive) processes that assessors use for determining document relevance (in this domain). High cognitive load may impair the ability of the user to make accurate relevance judgements and hence the design of IR mechanisms may need to take this into account in order to reduce the load.
Resumo:
Electronic Medical Record (EMR) systems are being implemented increasingly worldwide. Saudi Arabia is one of the developing countries that commenced implementing such systems in 1988. Whilst EMR uptake has been low in Saudi Arabia until now, a number of hospitals have implemented EMR systems successfully. This paper analyses available studies (n = 28) in the literature regarding EMR implementation in Saudi Arabia to identify the progress of EMR implementation to date and to identify the facilitators and barriers to implementation.
Resumo:
This study explored the stress and wellbeing of Emergency Medical Dispatchers (EMD) who remotely provide crisis intervention to medical emergencies through telehealth support. Semi-structured interviews with 16 EMDs were conducted and Interpretative Phenomenological Analysis was used to identify themes in the data. These results indicated that despite their physical distance from the crisis scene, EMDs can experience vicarious trauma through acute and cumulative exposure to traumatic incidents and their perceived lack of control which can expound feelings of helplessness. Three superordinate themes of operational stress and trauma, organisational stress, and posttraumatic growth were identified. Practical implications are suggested to enable emergency services organisations to counteract this job related stress and promote more positive mental health outcomes.
Resumo:
Cancer can be defined as a deregulation or hyperactivity in the ongoing network of intracellular and extracellular signaling events. Reverse phase protein microarray technology may offer a new opportunity to measure and profile these signaling pathways, providing data on post-translational phosphorylation events not obtainable by gene microarray analysis. Treatment of ovarian epithelial carcinoma almost always takes place in a metastatic setting since unfortunately the disease is often not detected until later stages. Thus, in addition to elucidation of the molecular network within a tumor specimen, critical questions are to what extent do signaling changes occur upon metastasis and are there common pathway elements that arise in the metastatic microenvironment. For individualized combinatorial therapy, ideal therapeutic selection based on proteomic mapping of phosphorylation end points may require evaluation of the patient's metastatic tissue. Extending these findings to the bedside will require the development of optimized protocols and reference standards. We have developed a reference standard based on a mixture of phosphorylated peptides to begin to address this challenge.
Resumo:
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Resumo:
The finite-signal-to-noise ratio (SNR) diversity-multiplexing trade-off (DMT) of cooperative diversity protocols are investigated in vehicular networks based on cascaded Rayleigh fading. Lower bounds of DMT at finite SNR for orthogonal and non-orthogonal protocols are derived. The results showcase the first look into the achievable DMT trade-off of cooperative diversity in volatile vehicular environments. It is shown that the diversity gains are significantly suboptimal at realistic SNRs.
Resumo:
• At common law, a competent adult can refuse life-sustaining medical treatment, either contemporaneously or through an advance directive which will operate at a later time when the adult’s capacity is lost. • Legislation in most Australian jurisdictions also provides for a competent adult to complete an advance directive that refuses life-sustaining medical treatment. • At common law, a court exercising its parens patriae jurisdiction can consent to, or authorise, the withdrawal or withholding of life-sustaining medical treatment from an adult or child who lacks capacity if that is in the best interests of the person. A court may also declare that the withholding or withdrawal of treatment is lawful. • Guardianship legislation in all jurisdictions allows a substitute decision-maker, in an appropriate case, to refuse life-sustaining medical treatment for an adult who lacks capacity. • In terms of children, a parent may refuse life-sustaining medical treatment for his or her child if it is in the child’s best interests. • While a refusal of life-sustaining medical treatment by a competent child may be valid, this decision can be overturned by a court. • At common law and generally under guardianship statutes, demand for futile treatment need not be complied with by doctors.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.