993 resultados para Theft Prevention Devices.
Resumo:
High-risk adolescents are a population most vulnerable to harm from injury due to increased engagement in risk taking behaviour. There is a gap in the literature regarding how universal school based injury prevention programs apply to high-risk adolescents. This study involves a component of the process evaluation of a school based injury prevention program, as it relates to high-risk adolescents (13-14 years)...
Resumo:
Objectives: To compare measures of fat-free mass (FFM) by three different bioelectrical impedance analysis (BIA) devices and to assess the agreement between three different equations validated in older adult and/or overweight populations. Design: Cross-sectional study. Setting: Orthopaedics ward of Brisbane public hospital, Australia. Participants: Twenty-two overweight, older Australians (72 yr ± 6.4, BMI 34 kg/m2 ± 5.5) with knee osteoarthritis. Measurements: Body composition was measured using three BIA devices: Tanita 300-GS (foot-to-foot), Impedimed DF50 (hand-to-foot) and Impedimed SFB7 (bioelectrical impedance spectroscopy (BIS)). Three equations for predicting FFM were selected based on their ability to be applied to an older adult and/ or overweight population. Impedance values were extracted from the hand-to-foot BIA device and included in the equations to estimate FFM. Results: The mean FFM measured by BIS (57.6 kg ± 9.1) differed significantly from those measured by foot-to-foot (54.6 kg ± 8.7) and hand-to-foot BIA (53.2 kg ± 10.5) (P < 0.001). The mean ± SD FFM predicted by three equations using raw data from hand-to-foot BIA were 54.7 kg ± 8.9, 54.7 kg ± 7.9 and 52.9 kg ± 11.05 respectively. These results did not differ from the FFM predicted by the hand-to-foot device (F = 2.66, P = 0.118). Conclusions: Our results suggest that foot-to-foot and hand-to-foot BIA may be used interchangeably in overweight older adults at the group level but due to the large limits of agreement may lead to unacceptable error in individuals. There was no difference between the three prediction equations however these results should be confirmed within a larger sample and against a reference standard.
Resumo:
Background/objectives This study estimates the economic outcomes of a nutrition intervention to at-risk patients compared with standard care in the prevention of pressure ulcer. Subjects/methods Statistical models were developed to predict ‘cases of pressure ulcer avoided’, ‘number of bed days gained’ and ‘change to economic costs’ in public hospitals in 2002–2003 in Queensland, Australia. Input parameters were specified and appropriate probability distributions fitted for: number of discharges per annum; incidence rate for pressure ulcer; independent effect of pressure ulcer on length of stay; cost of a bed day; change in risk in developing a pressure ulcer associated with nutrition support; annual cost of the provision of a nutrition support intervention for at-risk patients. A total of 1000 random re-samples were made and the results expressed as output probability distributions. Results The model predicts a mean 2896 (s.d. 632) cases of pressure ulcer avoided; 12 397 (s.d. 4491) bed days released and corresponding mean economic cost saving of euros 2 869 526 (s.d. 2 078 715) with a nutrition support intervention, compared with standard care. Conclusion Nutrition intervention is predicted to be a cost-effective approach in the prevention of pressure ulcer in at-risk patients.
Resumo:
To enhance workplace safety in the construction industry it is important to understand interrelationships among safety risk factors associated with construction accidents. This study incorporates the systems theory into Heinrich’s domino theory to explore the interrelationships of risks and break the chain of accident causation. Through both empirical and statistical analyses of 9,358 accidents which occurred in the U.S. construction industry between 2002 and 2011, the study investigates relationships between accidents and injury elements (e.g., injury type, part of body, injury severity) and the nature of construction injuries by accident type. The study then discusses relationships between accidents and risks, including worker behavior, injury source, and environmental condition, and identifies key risk factors and risk combinations causing accidents. The research outcomes will assist safety managers to prioritize risks according to the likelihood of accident occurrence and injury characteristics, and pay more attention to balancing significant risk relationships to prevent accidents and achieve safer working environments.
Resumo:
We conducted a randomized controlled trial to test whether a Brief Mobile Treatment (BMT) intervention could improve outcomes relative to usual care among suicide attempters. The intervention included training in problem solving therapy, meditation, a brief intervention to increase social support as well as advice on alcohol and other drugs, and mobile phone follow-up. The effect of the intervention was measured in terms of a reduction in suicidal ideation, depression and self-harm at Baseline, six and 12 months. A wait-list control group received usual care. A total of 68 participants was recruited from a Sri Lankan hospital following a suicide attempt. Participants who received the intervention were found to achieve significant improvements in reducing suicidal ideation and depression than those receiving usual care. The BMT group also experienced a significant improvement of social support when compared to the control group. However, the BMT group did not demonstrate a significant effect in reducing actual self-harm and most substance use, and differential effects on alcohol use were restricted to men. Although the present study was limited in revealing which component of the intervention was more effective in preventing suicide, it showed its efficacy in reducing suicide as a whole.
Resumo:
To the Editor; It was with interest that I read the recent article by Zhang et al. published in Supportive Care in Cancer [1]. This paper highlighted the importance of radiodermatitis (RD) being an unresolved and distressing clinical issue in patients with cancer undergoing radiation therapy. However, I am concerned with a number of clinical and methodological issues within this paper: (i) the clinical and operational definition of prophylaxis and treatment of RD; (ii) the accuracy of the identification of trials; and (iii) the appropriateness of the conduct of the meta-analyses...
Resumo:
The purpose of this paper is to review the incidence of upper-body morbidity (arm and breast symptoms, impairments, and lymphedema), methods for diagnosis, and prevention and treatment strategies. It was also the purpose to highlight the evidence base for integration of prospective surveillance for upper-body morbidity within standard clinical care of women with breast cancer. Between 10% and 64% of women report upper-body symptoms between 6 months and 3 years after breast cancer, and approximately 20% develop lymphedema. Symptoms remain common into longer-term survivorship, and although lymphedema may be transient for some, those who present with mild lymphedema are at increased risk of developing moderate to severe lymphedema. The etiology of morbidity seems to be multifactorial, with the most consistent risk factors being those associated with extent of treatment. However, known risk factors cannot reliably distinguish between those who will and will not develop upper-body morbidity. Upper-body morbidity may be treatable with physical therapy. There is also evidence in support of integrating regular surveillance for upper-body morbidity into the routine care provided to women with breast cancer, with early diagnosis potentially contributing to more effective management and prevention of progression of these conditions.
Resumo:
In deregulated versions of free-market electricity, producers will be free to send power along other utilities. The price of power strongly depends and fluctuates according to mutual benefit index of both supplier and consumer. In such a situation, strong interaction among utilities may cause instabilities in the system. As the frequency of market-based dispatch increases market forces tend to destabilize the stable system dynamics depending on the value of Ks/τλ(market dependent parameter) ratio. This tends to destabilize the coupled dynamics. The implementation of TCSC can effectively damp the inter area modes of oscillations of the coupled market system.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Many older people have difficulties using modern consumer products due to increased product complexity both in terms of functionality and interface design. Previous research has shown that older people have more difficulty in using complex devices intuitively when compared to the younger. Furthermore, increased life expectancy and a falling birth rate have been catalysts for changes in world demographics over the past two decades. This trend also suggests a proportional increase of older people in the work-force. This realisation has led to research on the effective use of technology by older populations in an effort to engage them more productively and to assist them in leading independent lives. Ironically, not enough attention has been paid to the development of interaction design strategies that would actually enable older users to better exploit new technologies. Previous research suggests that if products are designed to reflect people's prior knowledge, they will appear intuitive to use. Since intuitive interfaces utilise domain-specific prior knowledge of users, they require minimal learning for effective interaction. However, older people are very diverse in their capabilities and domain-specific prior knowledge. In addition, ageing also slows down the process of acquiring new knowledge. Keeping these suggestions and limitations in view, the aim of this study was set to investigate possible approaches to developing interfaces that facilitate their intuitive use by older people. In this quest to develop intuitive interfaces for older people, two experiments were conducted that systematically investigated redundancy (the use of both text and icons) in interface design, complexity of interface structure (nested versus flat), and personal user factors such as cognitive abilities, perceived self-efficacy and technology anxiety. All of these factors could interfere with intuitive use. The results from the first experiment suggest that, contrary to what was hypothesised, older people (65+ years) completed the tasks on the text only based interface design faster than on the redundant interface design. The outcome of the second experiment showed that, as expected, older people took more time on a nested interface. However, they did not make significantly more errors compared with younger age groups. Contrary to what was expected, older age groups also did better under anxious conditions. The findings of this study also suggest that older age groups are more heterogeneous in their capabilities and their intuitive use of contemporary technological devices is mediated more by domain-specific technology prior knowledge and by their cognitive abilities, than chronological age. This makes it extremely difficult to develop product interfaces that are entirely intuitive to use. However, by keeping in view the cognitive limitations of older people when interfaces are developed, and using simple text-based interfaces with flat interface structure, would help them intuitively learn and use complex technological products successfully during early encounter with a product. These findings indicate that it might be more pragmatic if interfaces are designed for intuitive learning rather than for intuitive use. Based on this research and the existing literature, a model for adaptable interface design as a strategy for developing intuitively learnable product interfaces was proposed. An adaptable interface can initially use a simple text only interface to help older users to learn and successfully use the new system. Over time, this can be progressively changed to a symbols-based nested interface for more efficient and intuitive use.
Resumo:
School connectedness is an important protective factor for adolescent risk-taking behaviour. This study examined a pilot version of the Skills for Preventing Injury in Youth (SPIY) programme, combining teacher professional development for increasing school connectedness (connectedness component) with a risk and injury prevention curriculum for early adolescents (curriculum component). A process evaluation was conducted on the connectedness component, involving assessments of programme reach, participant receptiveness and initial use, and a preliminary impact evaluation was conducted on the combined connectedness and curriculum programme. The connectedness component was well received by teacher participants, who saw benefits for both themselves and their students. Classroom observation also showed that teachers who received professional development made use of the programme strategies. Grade 8 students who participated in the SPIY programme were less likely to report violent behaviour at six-month follow-up than were control students, and trends also suggested reduced transport injuries. The results of this research support the use of the combined SPIY connectedness and curriculum components in a large-scale effectiveness trial to assess the impact of the programme on students’ connectedness, risk-taking and associated injuries.