37 resultados para message compliance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To seek an association between total arterial compliance (TAC) and the extent of ischaemia at stress echocardiography. Design: Cohort study. Setting: Regional cardiac centre. Methods: 255 consecutive patients (147 men; mean (SD) age 58 (8)) presenting for stress echocardiography for clinical indications were studied. Wall motion score index (WMSI) was calculated and ischaemia was defined by an inducible or worsening wall motion abnormality. Peak WMSI was used to reflect the extent of dysfunction (ischaemia or scar), and Delta WMSI was indicative of extent of ischaemia. TAC was assessed at rest by simultaneous radial applanation tonometry and pulsed wave Doppler in all patients. Results: Ischaemia was identified by stress echocardiography in 65 patients (25%). TAC was similar in the groups with negative and positive echocardiograms (1.08 (0.41) v 1.17 (0.51) ml/ mm Hg, not significant). However, the extent of dysfunction was associated with TAC independently of age, blood pressure, risk factors, and use of a beta blocker. Moreover, the extent of ischaemia was determined by TAC, risk factors, and use of a b blocker. Conclusion: While traditional cardiovascular risk factors are strong predictors of ischaemia on stress echocardiography, TAC is an independent predictor of the extent of ischaemia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australian country music is influenced by American country music and Australian bush ballads. This music idealises genuine true blue inhabitants of an idealised rural heartland and fuses nationalism with agrarian mythology. The lyrics of a number of country songs contain a populist political message, which is frequently nationalistic but is a form of nationalism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our research described in this paper identifies a three part premise relating to the spyware paradigm. Firstly the data suggests spyware is proliferating at an exponential rate. Secondly ongoing research confirms that spyware produces many security risks – including that of privacy/confidentiality breaches via illicit data collection and reporting. Thirdly, anti-spyware controls are improving but are still considered problematic for several reasons. Our research then concludes that control measures to counter this very significant challenge should merit compliance auditing – and this auditing may effectively target the vital message passing performed by all illicit data collection spyware. Our research then evolves into an experiment involving the design and implementation of a software audit tool to conduct the desired compliance auditing. The software audit tool is positioned at the protected network’s gateway. The software audit tool uses ‘phone-home’ IP addresses as spyware signatures to detect the presence of the offending software. The audit tool also has the capability to differentiate legitimate message passing software from that produced by spyware – and ‘learn’ both new spyware signatures and new legitimate message passing profiles. The testing stage of the software has proven successful – albeit using very limited levels of network message passing variety and frequency.