350 resultados para Tb~(3 )


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Few studies have examined acute injuries in track and field in both elite and sub-elite athletes. Purpose To observe the absolute and relative rates of injury in track and field athletes across a wide range of competition levels and ages during three years of the Penn Relays Carnival to assist with future medical coverage planning and injury prevention strategies. Study design: Descriptive epidemiology study. Methods Over a 3-year period all injuries treated by the medical staff were recorded on a standardised injury report form. Absolute injury rates (absolute number of injuries) and relative injury rates (number of injuries per 1000 participants) were determined and odds ratios (OR) of injury rates were calculated between sexes, competition levels and events. Injuries were also broken down into major or minor medical or orthopedic injuries. Results Throughout the study period 48,473 competing athletes participated in the Penn Relays Carnival, and 436 injuries were sustained. For medical coverage purposes, the relative rate of injury subtypes was greatest for minor orthopedic injuries (5.71 injuries per 1000 participants), followed by minor medical injuries (3.42 injuries per 1000 participants), major medical injuries (0.69 injuries per 1000 participants) and major orthopedic injuries (0.18 injuries per 1000 participants). College/elite level athletes displayed the lowest relative injury rate (7.99 injuries per 1000 participants), which was significantly less than high school (9.87 injuries per 1000 participants) and masters level athletes (16.33 injuries per 1000 participants). Males displayed a greater likelihood of suffering a minor orthopedic injury compared to females (OR = 1.36, 95% CI = 1.06 to 1.75; χ2 = 5.73, p = 0.017) but were less likely to sustain a major medical injury (OR = 0.33, 95% CI = 0.15 to 0.75; χ2 = 7.75, p = 0.005). Of the three most heavily participated in events, the 4 x 400m relay displayed the greatest relative injury rate (13.6 injuries per 1000 participants) compared to the 4 x 100 and 4 x 200m relay. Conclusions Medical coverage teams for future large scale track and field events need to plan for at least two major orthopedic and seven major medical injuries per 1000 participants. Male track and field athletes, particularly masters level male athletes, are at greater risk of injury compared to other genders and competition levels.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: It is important to identify patients who are at risk of malnutrition upon hospital admission as malnutrition results in poor outcomes such as longer length of hospital stay, readmission, hospitalisation cost and mortality. The aim of this study was to determine the prognostic validity of 3-Minute Nutrition Screening (3-MinNS) in predicting hospital outcomes in patients admitted to an acute tertiary hospital through a list of diagnosis-related groups (DRG). Methods: In this study, 818 adult patients were screened for risk of malnutrition using 3-MinNS within 24 hours of admission. Mortality data was collected from the National Registry with other hospitalisation outcomes retrieved from electronic hospital records. The results were adjusted for age, gender and ethnicity, and matched for DRG. Results: Patients identified to be at risk of malnutrition (37%) using 3-MinNS had significant positive association with longer length of hospital stay (6.6 ± 7.1 days vs. 4.5 ± 5.5 days, p<0.001), higher hospitalisation cost (S$4540 ± 7190 vs. S$3630 ± 4961, p<0.001) and increased mortality rate at 1 year (27.8% vs. 3.9%), 2 years (33.8% vs. 7.2%) and 3 years (39.1% vs. 10.5%); p<0.001 for all. Conclusions: The 3-MinNS is able to predict clinical outcomes and can be used to screen newly admitted patients for nutrition risk so that appropriate nutrition assessment and early nutritional intervention can be initiated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Self-care management is needed for effective management of chronic kidney disease. The main aim for treatment or management of chronic kidney disease is to delay the worsening of kidney function, and to prevent or to manage the co-morbidities. Selfcare management is not easy, and patients will face many challenges, especially when they cannot get use to the new treatment plan. One of the challenges they face is dietary restriction, which is a very important aspect in any self-care management programme. Chronic kidney disease patients require a low-protein, low-sodium, low-potassium, and low-phosphorus diet. There are several strategies patients can undertake to ensure adherence, such as self-monitoring their dietary habits and type of food consumed using a food diary; involving social support, such as family members and spouse to help them to adhere to their diet restrictions; setting goals and providing positive reinforcement when they achieved the targeted goals; joining self-management programmes to equip themselves with the necessary skills so that they can better adhere to the treatment regimes, including diet restriction; and lastly, having the knowledge about their regime, and using this knowledge to help them understand and improve their adherence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Samples of marble from Chillagoe, North Queensland have been analyzed using scanning electron microscopy (SEM) with energy dispersive X-ray spectroscopy (EDS) and Raman spectroscopy. Chemical analyses provide evidence for the presence of minerals other than limestone and calcite in the marble, including silicate minerals. Some of these analyses correspond to silicate minerals. The Raman spectra of these crystals were obtained and the Raman spectrum corresponds to that of allanite from the Arizona State University data base (RRUFF) data base. The combination of SEM with EDS and Raman spectroscopy enables the characterization of the mineral allanite in the Chillagoe marble.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose To determine the prescribed drug-utilisation pattern for six common chronic conditions in adult South Africans in a cross-sectional survey. Methods 13 826 randomly selected participants, 15 years and older, were surveyed by trained fieldworkers at their homes in 1998. Questionnaires included socio-demographic, chronic-disease and drug-use data. The prescribed drugs were recorded from participants' medication containers. The Anatomical Therapeutic Classification (ATC) code of the drugs for tuberculosis (TB), diabetes, hypertension, hyperlipidaemia, other atherosclerosis-related conditions, such as heart conditions or cerebrovascular accidents (CVA), and asthma or chronic obstructive pulmonary disease (COPD), was recorded. The use of logistic regression analyses identified the determinants of those patients who used prescription medication for these six conditions. Results 18.4% of the women and 12.5% of the men used drugs for the six chronic conditions. Men used drugs most frequently for hypertension (50.9%) and asthma or chronic bronchitis (24.3%), while in women it was for hypertension (59.9%) and diabetes (17.5%). The logistic regression analyses showed that women, wealthier and older people, and those with medical insurance used these chronic-disease drugs more frequently compared to men, younger or poor people, or those without medical insurance. The African population group used these drugs less frequently than any other ethnic group. The inappropriate use of methyldopa was found for 14.8% of all antihypertensive drugs, while very few people used aspirin. Conclusions The methodology of this study provides a means of ascertaining the chronic-disease drug-utilisation pattern in national health surveys. The pattern described, suggests an inequitable use of chronic-disease drugs and inadequate use of some effective drugs to control the burden of chronic diseases in South Africa. Copyright © 2004 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Out of the Box Festival was founded in 1994 by the Queensland Performing Arts Centre and has been held biannually ever since both within and around the centre in what is now known as the Cultural Precinct at Southbank. It is unique in Australia in that it caters entirely to children aged 8 years and under, with a highly curated program of ticketed performance events, workshops and free arts-based events. It is attended by school and kindergarten groups and by families, and besides engaging children in high quality arts experiences, the festival is also a platform for advocating the developmental and educational benefits of the arts for children. Dr Mark Radvan was the artistic director of the 2008 festival, with responsibility for developing the curatorial direction of each festival, for creating and programming its events, and for working with festival partners The Queensland Art Gallery, The Queensland Museum, The State Library of Queensland and The Queensland Theatre Company. Radvan designed selected and commissioned works to demonstrate how the arts create memorable, celebratory and immersive experiences that stimulate children’s imagination, their curiosity and confidence about the material world and the cultures of its people. A core event was an outdoor music and dance performance space featuring entirely Indigenous performers that was not only the beating heart of the festival, but served to underlie the importance of mainstreaming awareness of our first peoples in the increasingly culturally diverse communities of children attending.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

10 page document containing expert assessment of shortcomings of Western Australian State Planning Policy SPP3.7- Planning for Bushfire Risk Management. Document produced on behalf of QUT and submitted to and published by the WAPC as part of their public consultation process for their draft policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current developments in gene medicine and vaccination studies are utilizing plasmid DNA (pDNA) as the vector. For this reason, there has been an increasing trend towards larger and larger doses of pDNA utilized in human trials: from 100-1000 μg in 2002 to 500-5000 μg in 2005. The increasing demand of pDNA has created the need to revolutionalize current production levels under optimum economy. In this work, different standard media (LB, TB and SOC) for culturing recombinant Escherichia coli DH5α harbouring pUC19 were compared to a medium optimised for pDNA production. Lab scale fermentations using the standard media showed that the highest pDNA volumetric and specific yields were for TB (11.4 μg/ml and 6.3 μg/mg dry cell mass respectively) and the lowest was for LB (2.8 μg/ml and 3.3 μg/mg dry cell mass respectively). A fourth medium, PDMR, designed by modifying a stoichiometrically-formulated medium with an optimised carbon source concentration and carbon to nitrogen ratio displayed pDNA volumetric and specific yields of 23.8 μg/ml and 11.2 μg/mg dry cell mass respectively. However, it is the economic advantages of the optimised medium that makes it so attractive. Keeping all variables constant except medium and using LB as a base scenario (100 medium cost [MC] units/mg pDNA), the optimised PDMR medium yielded pDNA at a cost of only 27 MC units/mg pDNA. These results show that greater amounts of pDNA can be obtained more economically with minimal extra effort simply by using a medium optimised for pDNA production.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl. Grøstl is a so-called wide-pipe construction where the size of the internal state is significantly larger than the size of the output. This has the effect that all known, generic attacks on the hash function are made much more difficult. Grøstl has good performance on a wide range of platforms and counter-measures against side-channel attacks are well-understood from similar work on the AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two �fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.