384 resultados para 337.3
Resumo:
Objective While home visiting in the early postpartum period appears to have increased, there are limited data defining which women receive a visit and none that include Queensland. We aimed to investigate patterns of postpartum home visiting in the public and private sectors in Queensland. Methods Data were collected via a retrospective cross-sectional survey of women birthing in Queensland between 1st February and 31st May 2010 at 4 months postpartum (N = 6948). Logistic regression was used to assess associations between receiving a home visit and sociodemographic, clinical and hospital variables. Analyses were stratified by public and private birthing sector because of significant differences between sectors. Results Public sector women were more likely to receive a visit from a nurse or midwife (from the hospital or child health sector) within 10 days of hospital discharge (67.2%) than private sector women (7.2%). Length of hospital stay was associated with home visiting in both sectors. Some vulnerable sub-populations in both sectors were more likely to be visited, while others were not. Conclusions Home visiting in Queensland varies markedly between the public and private sector and is less common in some vulnerable populations. Further consideration to improving the equity of community postpartum care in Queensland is needed.
Resumo:
Background: It is important to identify patients who are at risk of malnutrition upon hospital admission as malnutrition results in poor outcomes such as longer length of hospital stay, readmission, hospitalisation cost and mortality. The aim of this study was to determine the prognostic validity of 3-Minute Nutrition Screening (3-MinNS) in predicting hospital outcomes in patients admitted to an acute tertiary hospital through a list of diagnosis-related groups (DRG). Methods: In this study, 818 adult patients were screened for risk of malnutrition using 3-MinNS within 24 hours of admission. Mortality data was collected from the National Registry with other hospitalisation outcomes retrieved from electronic hospital records. The results were adjusted for age, gender and ethnicity, and matched for DRG. Results: Patients identified to be at risk of malnutrition (37%) using 3-MinNS had significant positive association with longer length of hospital stay (6.6 ± 7.1 days vs. 4.5 ± 5.5 days, p<0.001), higher hospitalisation cost (S$4540 ± 7190 vs. S$3630 ± 4961, p<0.001) and increased mortality rate at 1 year (27.8% vs. 3.9%), 2 years (33.8% vs. 7.2%) and 3 years (39.1% vs. 10.5%); p<0.001 for all. Conclusions: The 3-MinNS is able to predict clinical outcomes and can be used to screen newly admitted patients for nutrition risk so that appropriate nutrition assessment and early nutritional intervention can be initiated.
Resumo:
Self-care management is needed for effective management of chronic kidney disease. The main aim for treatment or management of chronic kidney disease is to delay the worsening of kidney function, and to prevent or to manage the co-morbidities. Selfcare management is not easy, and patients will face many challenges, especially when they cannot get use to the new treatment plan. One of the challenges they face is dietary restriction, which is a very important aspect in any self-care management programme. Chronic kidney disease patients require a low-protein, low-sodium, low-potassium, and low-phosphorus diet. There are several strategies patients can undertake to ensure adherence, such as self-monitoring their dietary habits and type of food consumed using a food diary; involving social support, such as family members and spouse to help them to adhere to their diet restrictions; setting goals and providing positive reinforcement when they achieved the targeted goals; joining self-management programmes to equip themselves with the necessary skills so that they can better adhere to the treatment regimes, including diet restriction; and lastly, having the knowledge about their regime, and using this knowledge to help them understand and improve their adherence.
Resumo:
Commonwealth legislation covering insurance contracts contains numerous provisions designed to control the operation and effect of terms in life and general insurance contracts. For example, the Life Insurance Act 1995 (Cth) contains provisions regulating the consequences attendant upon incorrect statements in proposals [1] and non-payment of premiums, [2] provides that an insurer may only exclude liability in the case of suicide if it has made express provision for such contingency in its policy, [3] and severely restricts the efficacy of conditions as to war risks. [4] The Insurance Contracts Act 1984 (Cth) is even more intrusive and has a major impact upon contractual provisions in the general insurance field. It is beyond the scope of this note to explore all of these provisions in any detail but examples of controls and constraints imposed upon the operation and effect of contractual provisions include the following. A party is precluded from relying upon a provision in a contract of insurance if such reliance would amount to a failure to act with the utmost good faith. [5] Similarly, a policy provision which requires differences or disputes arising out of the insurance to be submitted to arbitration is void, [6] unless the insurance is a genuine cover for excess of loss over and above another specified insurance. [7] Similarly clause such as conciliation clauses, [8] average clauses, [9] and unusual terms [10] are given qualified operation. [11] However the provision in the Insurance Contracts Act that has the greatest impact upon, and application to, a wide range of insurance clauses and claims is s 54. This section has already generated a significant volume of case law and is the focus of this note. In particular this note examines two recent cases. The first, Johnson v Triple C Furniture and Electrical Pty Ltd [2012] 2 Qd R 337, (hereafter the Triple C case), is a decision of the Queensland Court of Appeal; and the second, Matthew Maxwell v Highway Hauliers Pty Ltd [2013] WASCA 115, (hereafter the Highway Hauliers case), is a decision of the Court of Appeal in Western Australia. This latter decision is on appeal to the High Court of Australia. The note considers too the decision of the New South Wales Court of Appeal in Prepaid Services Pty Ltd v Atradius Credit Insurance NV [2013] NSWCA 252 (hereafter the Prepaid Services case).These cases serve to highlight the complex nature of s 54 and its application, as well as the difficulty in achieving a balance between an insurer and an insured's reasonable expectations.
Resumo:
Samples of marble from Chillagoe, North Queensland have been analyzed using scanning electron microscopy (SEM) with energy dispersive X-ray spectroscopy (EDS) and Raman spectroscopy. Chemical analyses provide evidence for the presence of minerals other than limestone and calcite in the marble, including silicate minerals. Some of these analyses correspond to silicate minerals. The Raman spectra of these crystals were obtained and the Raman spectrum corresponds to that of allanite from the Arizona State University data base (RRUFF) data base. The combination of SEM with EDS and Raman spectroscopy enables the characterization of the mineral allanite in the Chillagoe marble.
Resumo:
The Out of the Box Festival was founded in 1994 by the Queensland Performing Arts Centre and has been held biannually ever since both within and around the centre in what is now known as the Cultural Precinct at Southbank. It is unique in Australia in that it caters entirely to children aged 8 years and under, with a highly curated program of ticketed performance events, workshops and free arts-based events. It is attended by school and kindergarten groups and by families, and besides engaging children in high quality arts experiences, the festival is also a platform for advocating the developmental and educational benefits of the arts for children. Dr Mark Radvan was the artistic director of the 2008 festival, with responsibility for developing the curatorial direction of each festival, for creating and programming its events, and for working with festival partners The Queensland Art Gallery, The Queensland Museum, The State Library of Queensland and The Queensland Theatre Company. Radvan designed selected and commissioned works to demonstrate how the arts create memorable, celebratory and immersive experiences that stimulate children’s imagination, their curiosity and confidence about the material world and the cultures of its people. A core event was an outdoor music and dance performance space featuring entirely Indigenous performers that was not only the beating heart of the festival, but served to underlie the importance of mainstreaming awareness of our first peoples in the increasingly culturally diverse communities of children attending.
Resumo:
10 page document containing expert assessment of shortcomings of Western Australian State Planning Policy SPP3.7- Planning for Bushfire Risk Management. Document produced on behalf of QUT and submitted to and published by the WAPC as part of their public consultation process for their draft policy.
Resumo:
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.
Resumo:
The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.
Resumo:
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl. Grøstl is a so-called wide-pipe construction where the size of the internal state is significantly larger than the size of the output. This has the effect that all known, generic attacks on the hash function are made much more difficult. Grøstl has good performance on a wide range of platforms and counter-measures against side-channel attacks are well-understood from similar work on the AES.
Resumo:
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two �fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl
Resumo:
The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.
Resumo:
In a study of socioeconomically disadvantaged children's acquisition of school literacies, a university research team investigated how a group of teachers negotiated critical literacies and explored notions of social power with elementary children in a suburban school located in an area of high poverty. Here we focus on a grade 2/3 classroom where the teacher and children became involved in a local urban renewal project and on how in the process the children wrote about place and power. Using the students' concerns about their neighborhood, the teacher engaged her class in a critical literacy project that not only involved a complex set of literate practices but also taught the children about power and the possibilities for local civic action. In particular, we discuss examples of children's drawing and writing about their neighborhoods and their lives. We explore how children's writing and drawing might be key elements in developing "critical literacies" in elementary school settings. We consider how such classroom writing can be a mediator of emotions, intellectual and academic learning, social practice, and political activism.