228 resultados para Agreement Index (KAPPA)
Resumo:
Objective Evaluation of scapular posture is an integral component of the clinical assessment of painful neck disorders. The aim of this study was to evaluate agreement between therapist judgements of scapula posture in multiple biomechanical planes in individuals with neck pain. Design Inter-therapist reliability study. Setting Research laboratory. Participants Fifteen participants with chronic neck pain. Main outcome measures Four physiotherapists recorded ratings of scapular orientation (relative to the thorax) in five different scapula postural planes (plane of scapula, sagittal plane, transverse plane, horizontal plane, and vertical plane) under four test conditions (at rest, and during three isometric shoulder conditions) in all participants. Inter-therapist reliability was expressed using both generalized and paired kappa coefficient. Results Following adjustment for expected agreement and the high prevalence of neutral ratings (81%), on average both the generalised kappa (0.37) as well as Cohen's Kappa for the two therapist pairs (0.45 and 0.42) demonstrated only slight to moderate inter-therapist reliability. Conclusions The findings suggest that ratings of scapular posture in individuals with neck pain by visual inspection has only slight to moderate reliability and should only be used in conjunction with other clinical tests when judging scapula function in these patients.
Resumo:
Two dimensional flow of a micropolar fluid in a porous channel is investigated. The flow is driven by suction or injection at the channel walls, and the micropolar model due to Eringen is used to describe the working fluid. An extension of Berman's similarity transform is used to reduce the governing equations to a set of non-linear coupled ordinary differential equations. The latter are solved for large mass transfer via a perturbation analysis where the inverse of the cross-flow Reynolds number is used as the perturbing parameter. Complementary numerical solutions for strong injection are also obtained using a quasilinearisation scheme, and good agreement is observed between the solutions obtained from the perturbation analysis and the computations.
Resumo:
Recent data indicate that levels of overweight and obesity are increasing at an alarming rate throughout the world. At a population level (and commonly to assess individual health risk), the prevalence of overweight and obesity is calculated using cut-offs of the Body Mass Index (BMI) derived from height and weight. Similarly, the BMI is also used to classify individuals and to provide a notional indication of potential health risk. It is likely that epidemiologic surveys that are reliant on BMI as a measure of adiposity will overestimate the number of individuals in the overweight (and slightly obese) categories. This tendency to misclassify individuals may be more pronounced in athletic populations or groups in which the proportion of more active individuals is higher. This differential is most pronounced in sports where it is advantageous to have a high BMI (but not necessarily high fatness). To illustrate this point we calculated the BMIs of international professional rugby players from the four teams involved in the semi-finals of the 2003 Rugby Union World Cup. According to the World Health Organisation (WHO) cut-offs for BMI, approximately 65% of the players were classified as overweight and approximately 25% as obese. These findings demonstrate that a high BMI is commonplace (and a potentially desirable attribute for sport performance) in professional rugby players. An unanswered question is what proportion of the wider population, classified as overweight (or obese) according to the BMI, is misclassified according to both fatness and health risk? It is evident that being overweight should not be an obstacle to a physically active lifestyle. Similarly, a reliance on BMI alone may misclassify a number of individuals who might otherwise have been automatically considered fat and/or unfit.
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.