161 resultados para Routing protocols
Resumo:
The purpose of this chapter is to provide an overview of the development and use of clinical guidelines as a tool for decision making in clinical practice. Nurses have always developed and used tools to guide clinical decision making related to interventions in practice. Since Florence Nightingale (Nightingale 1860) gave us ‘notes’ on nursing in the late 1800s, nurses have continued to use tools, such as standards, policies and procedures, protocols, algorithms, clinical pathways and clinical guidelines, to assist them in making appropriate decisions about patient care that eventuate in the best desired patient outcomes. Clinical guidelines have enjoyed growing popularity as a comprehensive tool for synthesising clinical evidence and information into user-friendly recommendations for practice. Historically, clinical guidelines were developed by individual experts or groups of experts by consensus, with no transparent process for the user to determine the validity and reliability of the recommendations. The acceptance of the evidence-based practice (EBP) movement as a paradigm for clinical decision making underscores the imperative for clinical guidelines to be systematically developed and based on the best available research evidence. Clinicians are faced with the dilemma of choosing from an abundance of guidelines of variable quality, or developing new guidelines. Where do you start? How do you find an existing guideline to fit your practice? How do you know if a guideline is evidence-based, valid and reliable? Should you apply an existing guideline in your practice or develop a new guideline? How do you get clinicians to use the guidelines? How do you know if using the guideline will make any difference in care delivery or patient outcomes? Whatever the choice, the challenge lies in choosing or developing a clinical guideline that is credible as a decision-making tool for the delivery of quality, efficient and effective care. This chapter will address the posed questions through an exploration of the ins and outs of clinical guidelines, from development to application to evaluation.
Resumo:
In 2007, a comprehensive review of the extant research on nonpharmacological interventions for persons with early-stage dementia was conducted. More than 150 research reports, centered on six major domains, were included: early-stage support groups, cognitive training and enhancement programs, exercise programs, exemplar programs, health promotion programs, and “other” programs not fitting into previous categories. Theories of neural regeneration and plasticity were most often used to support the tested interventions. Recommendations for practice, research, and health policy are outlined, including evidence-based, nonpharmacological treatment protocols for persons with mild cognitive impairment and early-stage dementia. A tested, community-based, multimodal treatment program is also described. Overall, findings identify well-supported nonpharmacological treatments for persons with early-stage dementia and implications for a national health care agenda to optimize outcomes for this growing population of older adults.
Resumo:
How do non-Indigenous theatre practitioners, especially actors, access and incorporate Aboriginal themes in the plays they create or perform in? Will it ever be acceptable for a non-Aboriginal actor to play an Aboriginal role? In literature there are clear protocols for writing Aboriginal characters and themes. In the visual arts and in dance, non-Indigenous practitioners might 'reference' Aboriginal themes, but what about in theatre performance? This research embodies one cultural dilemma in a creative project and exegesis: exploring the complex issues which emerge when an Aboriginal playwright is commissioned to write an 'Aboriginal themed' play for two non-Aboriginal actors.
Resumo:
In setting the scene for this paper, it is useful to briefly outline the history of the Queensland legal system. Our legal system was largely inherited from Britain, so it is, therefore, based in European-Western cultural and legal traditions. Alongside this, and over many thousands of years, Australian Indigenous communities devised their own socio-cultural-legal structures. As a result, when Indigenous people are drawn into interactions with our English-based law and court system, which is very different from Aboriginal law, they face particular disadvantages. Problems may include structural and linguistic differences, the complex language of the law and court processes, cultural differences, gender issues, problems of age, communication differences, the formalities of the courtroom, communication protocols used by judges, barristers, and court administrators, and particularly, the questioning techniques used by police and lawyers.
Resumo:
Virtual 3D models of long bones are increasingly being used for implant design and research applications. The current gold standard for the acquisition of such data is Computed Tomography (CT) scanning. Due to radiation exposure, CT is generally limited to the imaging of clinical cases and cadaver specimens. Magnetic Resonance Imaging (MRI) does not involve ionising radiation and therefore can be used to image selected healthy human volunteers for research purposes. The feasibility of MRI as alternative to CT for the acquisition of morphological bone data of the lower extremity has been demonstrated in recent studies [1, 2]. Some of the current limitations of MRI are long scanning times and difficulties with image segmentation in certain anatomical regions due to poor contrast between bone and surrounding muscle tissues. Higher field strength scanners promise to offer faster imaging times or better image quality. In this study image quality at 1.5T is quantitatively compared to images acquired at 3T. --------- The femora of five human volunteers were scanned using 1.5T and 3T MRI scanners from the same manufacturer (Siemens) with similar imaging protocols. A 3D flash sequence was used with TE = 4.66 ms, flip angle = 15° and voxel size = 0.5 × 0.5 × 1 mm. PA-Matrix and body matrix coils were used to cover the lower limb and pelvis respectively. Signal to noise ratio (SNR) [3] and contrast to noise ratio (CNR) [3] of the axial images from the proximal, shaft and distal regions were used to assess the quality of images from the 1.5T and 3T scanners. The SNR was calculated for the muscle and bone-marrow in the axial images. The CNR was calculated for the muscle to cortex and cortex to bone marrow interfaces, respectively. --------- Preliminary results (one volunteer) show that the SNR of muscle for the shaft and distal regions was higher in 3T images (11.65 and 17.60) than 1.5T images (8.12 and 8.11). For the proximal region the SNR of muscles was higher in 1.5T images (7.52) than 3T images (6.78). The SNR of bone marrow was slightly higher in 1.5T images for both proximal and shaft regions, while it was lower in the distal region compared to 3T images. The CNR between muscle and bone of all three regions was higher in 3T images (4.14, 6.55 and 12.99) than in 1.5T images (2.49, 3.25 and 9.89). The CNR between bone-marrow and bone was slightly higher in 1.5T images (4.87, 12.89 and 10.07) compared to 3T images (3.74, 10.83 and 10.15). These results show that the 3T images generated higher contrast between bone and the muscle tissue than the 1.5T images. It is expected that this improvement of image contrast will significantly reduce the time required for the mainly manual segmentation of the MR images. Future work will focus on optimizing the 3T imaging protocol for reducing chemical shift and susceptibility artifacts.
Resumo:
The overall theme for the 4th Biennial International Network of Indigenous Health Knowledge and Development (INIHKD)Conference was ‘Knowing Our Roots: Indigenous Medicines, Health Knowledges and Best Practices’. Conference activities were grouped around the following broad themes: •Building of Indigenous research capacity, partnerships and workforce; •Sharing of innovative, traditional and contemporary Indigenous knowledges, especially with respect to culturally-grounded interventions and evidenced-based “best and promising practices”; •Identification of successful Indigenous health policy solutions; and •Sharing of ethical, Indigenous-based research protocols and methodologies. This keynote plenary presentation focused on 'best practice' in research asking the questions: What kind of research will I do? What kind of research will I be? What is the contribution that I will make? what will be my legacy?
Resumo:
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on a heterogeneous set of devices. The challenge is to ensure good programming tools and a small footprint for the virtual machine to meet the memory constraints of typical WSN platforms. To this end we propose Darjeeling, a virtual machine modelled after the Java VM and capable of executing a substantial subset of the Java language, but designed specifically to run on 8- and 16-bit microcontrollers with 2 - 10 KB of RAM. The Darjeeling VM uses a 16- rather than a 32-bit architecture, which is more efficient on the targeted platforms. Darjeeling features a novel memory organisation with strict separation of reference from non-reference types which eliminates the need for run-time type inspection in the underlying compacting garbage collector. Darjeeling uses a linked stack model that provides light-weight threads, and supports synchronisation. The VM has been implemented on three different platforms and was evaluated with micro benchmarks and a real-world application. The latter includes a pure Java implementation of the collection tree routing protocol conveniently programmed as a set of cooperating threads, and a reimplementation of an existing environmental monitoring application. The results show that Darjeeling is a viable solution for deploying large-scale heterogeneous sensor networks. Copyright 2009 ACM.
Resumo:
This book explores the interrelation of literacy and religion as practiced by Western Christians in, first, historical contexts and, second, in one contemporary church setting. Using both a case study and a Foucauldian theoretical framework, the book provides a sustained analysis of the reciprocal discursive construction of literacy, religiosity and identity in one Seventh-day Adventist Church community of Northern Australia. Critical linguistic and discourse analytic theory is used to disclose processes of theological (church), familial (home) and educational (school) normalisation of community members into regulated ways of hearing and speaking, reading and writing, being and believing. Detailed analyses of spoken and written texts taken from institutional and local community settings show how textual religion is an exemplary technology of the self, a politics constituted by canonical texts, interpretive norms, textual practices, ritualised events and sociopolitical protocols that, ultimately, are turned in upon the self. The purpose of these analyses is to show how, across denominational difference in belief (tradition) and practice, particular versions of self and society are constructed through economies of truth from text, enabling and constraining what can and cannot be spoken and enacted by believers.
Resumo:
Background Despite being the leading cause of death and disability in the paediatric population, traumatic brain injury (TBI) in this group is largely understudied. Clinical practice within the paediatric intensive care unit (PICU) has been based upon adult guidelines however children are significantly different in terms of mechanism, pathophysiology and consequence of injury. Aim To review TBI management in the PICU and gain insight into potential management strategies. Method To conduct this review, a literature search was conducted using MEDLINE, PUBMED and The Cochrane Library using the following key words; traumatic brain injury; paediatric; hypothermia. There were no date restrictions applied to ensure that past studies, whose principles remain current were not excluded. Results Three areas were identified from the literature search and will be discussed against current acknowledged treatment strategies: Prophylactic hypothermia, brain tissue oxygen tension monitoring and decompressive craniectomy. Conclusion Previous literature has failed to fully address paediatric specific management protocols and we therefore have little evidence-based guidance. This review has shown that there is an emerging and ongoing trend towards paediatric specific TBI research in particular the area of moderate prophylactic hypothermia (MPH).
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
International market access for fresh commodities is regulated by international accepted phytosanitary guidelines, the objectives of which are to reduce the biosecurity risk of plant pest and disease movement. Papua New Guinea (PNG) has identified banana as a potential export crop and to help meet international market access requirements, this thesis provides information for the development of a pest risk analysis (PRA) for PNG banana fruit. The PRA is a three step process which first identifies the pests associated with a particular commodity or pathway, then assesses the risk associated with those pests, and finally identifies risk management options for those pests if required. As the first step of the PRA process, I collated a definitive list on the organisms associated with the banana plant in PNG using formal literature, structured interviews with local experts, grey literature and unpublished file material held in PNG field research stations. I identified 112 organisms (invertebrates, vertebrate, pathogens and weeds) associated with banana in PNG, but only 14 of these were reported as commonly requiring management. For these 14 I present detailed information summaries on their known biology and pest impact. A major finding of the review was that of the 14 identified key pests, some research information occurs for 13. The single exception for which information was found to be lacking was Bactrocera musae (Tryon), the banana fly. The lack of information for this widely reported ‘major pest on PNG bananas’ would hinder the development of a PNG banana fruit PRA. For this reason the remainder of the thesis focused on this organism, particularly with respect to generation of information required by the PRA process. Utilising an existing, but previously unanalysed fruit fly trapping database for PNG, I carried out a Geographic Information System analysis of the distribution and abundance of banana in four major regions of PNG. This information is required for a PRA to determine if banana fruit grown in different parts of the country are at different risks from the fly. Results showed that the fly was widespread in all cropping regions and that temperature and rainfall were not significantly correlated with banana fly abundance. Abundance of the fly was significantly correlated (albeit weakly) with host availability. The same analysis was done with four other PNG pest fruit flies and their responses to the environmental factors differed to banana fly and each other. This implies that subsequent PRA analyses for other PNG fresh commodities will need to investigate the risk of each of these flies independently. To quantify the damage to banana fruit caused by banana fly in PNG, local surveys and one national survey of banana fruit infestation were carried out. Contrary to expectations, infestation was found to be very low, particularly in the widely grown commercial cultivar, Cavendish. Infestation of Cavendish fingers was only 0.41% in a structured, national survey of over 2 700 banana fingers. Follow up laboratory studies showed that fingers of Cavendish, and another commercial variety Lady-finger, are very poor hosts for B. musae, with very low host selection rates by female flies and very poor immature survival. An analysis of a recent (within last decade) incursion of B. musae into the Gazelle Peninsula of East New Britain Province, PNG, provided the final set of B. musae data. Surveys of the fly on the peninsular showed that establishment and spread of the fly in the novel environment was very rapid and thus the fly should be regarded as being of high biosecurity concern, at least in tropical areas. Supporting the earlier impact studies, however, banana fly has not become a significant banana fruit problem on the Gazelle, despite bananas being the primary starch staple of the region. The results of the research chapters are combined in the final Discussion in the form of a B. musae focused PRA for PNG banana fruit. Putting the thesis in a broader context, the Discussion also deals with the apparent discrepancy between high local abundance of banana fly and very low infestation rates. This discussion focuses on host utilisation patterns of specialist herbivores and suggests that local pest abundance, as determined by trapping or monitoring, need not be good surrogate for crop damage, despite this linkage being implicit in a number of international phytosanitary protocols.
Resumo:
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.
Resumo:
Chemical and physical restraints are frequently used in the intensive care unit (ICU) to control agitated patients and to prevent self-harm and unplanned extubations. Published work relating to the numerous issues of the care and treatment strategies for these patients remains conflicting and unclear. Literature regarding sedation and chemical restraint reveals a trend towards management with lighter sedation, use of sedation assessment tools and sedation protocols. It remains unclear which treatment is best for agitated and delirious patients, and the evidence on the effect of sedation is conflicting. A large portion of the literature on the use of physical restraint is from general hospital wards and residential homes, and not from the ICU environment. The purpose of this paper is to provide a summary of the existing literature on the use of physical and chemical restraints in the ICU setting. In Part 1 of this two-part paper, the evidence on chemical and physical restraints is explored with specific focus on definition of terms, unplanned
Resumo:
A common scenario in many pairing-based cryptographic protocols is that one argument in the pairing is fixed as a long term secret key or a constant parameter in the system. In these situations, the runtime of Miller's algorithm can be significantly reduced by storing precomputed values that depend on the fixed argument, prior to the input or existence of the second argument. In light of recent developments in pairing computation, we show that the computation of the Miller loop can be sped up by up to 37 if precomputation is employed, with our method being up to 19.5 faster than the previous precomputation techniques.
Resumo:
Emerging data streaming applications in Wireless Sensor Networks require reliable and energy-efficient Transport Protocols. Our recent Wireless Sensor Network deployment in the Burdekin delta, Australia, for water monitoring [T. Le Dinh, W. Hu, P. Sikka, P. Corke, L. Overs, S. Brosnan, Design and deployment of a remote robust sensor network: experiences from an outdoor water quality monitoring network, in: Second IEEE Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2007), Dublin, Ireland, 2007] is one such example. This application involves streaming sensed data such as pressure, water flow rate, and salinity periodically from many scattered sensors to the sink node which in turn relays them via an IP network to a remote site for archiving, processing, and presentation. While latency is not a primary concern in this class of application (the sampling rate is usually in terms of minutes or hours), energy-efficiency is. Continuous long-term operation and reliable delivery of the sensed data to the sink are also desirable. This paper proposes ERTP, an Energy-efficient and Reliable Transport Protocol for Wireless Sensor Networks. ERTP is designed for data streaming applications, in which sensor readings are transmitted from one or more sensor sources to a base station (or sink). ERTP uses a statistical reliability metric which ensures the number of data packets delivered to the sink exceeds the defined threshold. Our extensive discrete event simulations and experimental evaluations show that ERTP is significantly more energyefficient than current approaches and can reduce energy consumption by more than 45% when compared to current approaches. Consequently, sensor nodes are more energy-efficient and the lifespan of the unattended WSN is increased.