942 resultados para Target-controlled infusion
Resumo:
Recombinant glucagon-like peptide-1 (7–36)amide (rGLP-1) was recently shown to cause significant weight loss in type 2 diabetics when administered for 6 weeks as a continuous subcutaneous infusion. The mechanisms responsible for the weight loss are not clarified. In the present study, rGLP-1 was given for 5d by prandial subcutaneous injections (PSI) (76nmol 30min before meals, four times daily; a total of 302·4nmol/24h) or by continuous subcutaneous infusion (CSI) (12·7nmol/h; a total of 304·8nmol/24h). This was performed in nineteen healthy obese subjects (mean age 44·2 (sem 2·5) years; BMI 39·0 (sem 1·2)kg/m2) in a prospective randomised, double-blind, placebo-controlled, cross-over study. Compared with the placebo, rGLP-1 administered as PSI and by CSI generated a 15% reduction in mean food intake per meal (P=0·02) after 5d treatment. A weight loss of 0·55 (sem 0·2) kg (P<0·05) was registered after 5d with PSI of rGLP-1. Gastric emptying rate was reduced during both PSI (P<0·001) and CSI (P<0·05) treatment, but more rapidly and to a greater extent with PSI of rGLP-1. To conclude, a 5d treatment of rGLP-1 at high doses by PSI, but not CSI, promptly slowed gastric emptying as a probable mechanism of action of increased satiety, decreased hunger and, hence, reduced food intake with an ensuing weight loss.
Resumo:
Background: Ambiguity remains about the effectiveness of wearing surgical face masks. The purpose of this study was to assess the impact on surgical site infections when non-scrubbed operating room staff did not wear surgical face masks. Design: Randomised controlled trial. Participants: Patients undergoing elective or emergency obstetric, gynecological, general, orthopaedic, breast or urological surgery in an Australian tertiary hospital. Intervention: 827 participants were enrolled and complete follow-up data was available for 811 (98.1%) patients. Operating room lists were randomly allocated to a ‘Mask roup’ (all non-scrubbed staff wore a mask) or ‘No Mask group’ (none of the non-scrubbed staff wore masks). Primary end point: Surgical site infection (identified using in-patient surveillance; post discharge follow-up and chart reviews). The patient was followed for up to six weeks. Results: Overall, 83 (10.2%) surgical site infections were recorded; 46/401 (11.5%) in the Masked group and 37/410 (9.0%) in the No Mask group; odds ratio (OR) 0.77 (95% confidence interval (CI) 0.49 to 1.21), p = 0.151. Independent risk factors for surgical site infection included: any pre-operative stay (adjusted odds ratio [aOR], 0.43 (95% CI, 0.20; 0.95), high BMI aOR, 0.38 (95% CI, 0.17; 0.87), and any previous surgical site infection aOR, 0.40 (95% CI, 0.17; 0.89). Conclusion: Surgical site infection rates did not increase when non-scrubbed operating room personnel did not wear a face mask.
Resumo:
Objective: During hospitalisation older people often experience functional decline which impacts on their future independence. The objective of this study was to evaluate a multifaceted transitional care intervention including home-based exercise strategies for at-risk older people on functional status, independence in activities of daily living, and walking ability. Methods: A randomised controlled trial was undertaken in a metropolitan hospital in Australia with 128 patients (64 intervention, 64 control) aged over 65 years with an acute medical admission and at least one risk factor for hospital readmission. The intervention group received an individually tailored program for exercise and follow-up care which was commenced in hospital and included regular visits in hospital by a physiotherapist and a Registered Nurse, a home visit following discharge, and regular telephone follow-up for 24 weeks following discharge. The program was designed to improve health promoting behaviours, strength, stability, endurance and mobility. Data were collected at baseline, then 4, 12 and 24 weeks following discharge using the Index of Activities of Daily Living (ADL), Instrumental Index of Activities of Daily Living (IADL), and the Walking Impairment Questionnaire (Modified). Results: Significant improvements were found in the intervention group in IADL scores (p<.001), ADL scores (p<.001), and WIQ scale scores (p<.001) in comparison to the control group. The greatest improvements were found in the first four weeks following discharge. Conclusions: Early introduction of a transitional model of care incorporating a tailored exercise program and regular telephone follow-up for hospitalised at-risk older adults can improve independence and functional ability.
Resumo:
Uninhabited aerial vehicles (UAVs) are a cutting-edge technology that is at the forefront of aviation/aerospace research and development worldwide. Many consider their current military and defence applications as just a token of their enormous potential. Unlocking and fully exploiting this potential will see UAVs in a multitude of civilian applications and routinely operating alongside piloted aircraft. The key to realising the full potential of UAVs lies in addressing a host of regulatory, public relation, and technological challenges never encountered be- fore. Aircraft collision avoidance is considered to be one of the most important issues to be addressed, given its safety critical nature. The collision avoidance problem can be roughly organised into three areas: 1) Sense; 2) Detect; and 3) Avoid. Sensing is concerned with obtaining accurate and reliable information about other aircraft in the air; detection involves identifying potential collision threats based on available information; avoidance deals with the formulation and execution of appropriate manoeuvres to maintain safe separation. This thesis tackles the detection aspect of collision avoidance, via the development of a target detection algorithm that is capable of real-time operation onboard a UAV platform. One of the key challenges of the detection problem is the need to provide early warning. This translates to detecting potential threats whilst they are still far away, when their presence is likely to be obscured and hidden by noise. Another important consideration is the choice of sensors to capture target information, which has implications for the design and practical implementation of the detection algorithm. The main contributions of the thesis are: 1) the proposal of a dim target detection algorithm combining image morphology and hidden Markov model (HMM) filtering approaches; 2) the novel use of relative entropy rate (RER) concepts for HMM filter design; 3) the characterisation of algorithm detection performance based on simulated data as well as real in-flight target image data; and 4) the demonstration of the proposed algorithm's capacity for real-time target detection. We also consider the extension of HMM filtering techniques and the application of RER concepts for target heading angle estimation. In this thesis we propose a computer-vision based detection solution, due to the commercial-off-the-shelf (COTS) availability of camera hardware and the hardware's relatively low cost, power, and size requirements. The proposed target detection algorithm adopts a two-stage processing paradigm that begins with an image enhancement pre-processing stage followed by a track-before-detect (TBD) temporal processing stage that has been shown to be effective in dim target detection. We compare the performance of two candidate morphological filters for the image pre-processing stage, and propose a multiple hidden Markov model (MHMM) filter for the TBD temporal processing stage. The role of the morphological pre-processing stage is to exploit the spatial features of potential collision threats, while the MHMM filter serves to exploit the temporal characteristics or dynamics. The problem of optimising our proposed MHMM filter has been examined in detail. Our investigation has produced a novel design process for the MHMM filter that exploits information theory and entropy related concepts. The filter design process is posed as a mini-max optimisation problem based on a joint RER cost criterion. We provide proof that this joint RER cost criterion provides a bound on the conditional mean estimate (CME) performance of our MHMM filter, and this in turn establishes a strong theoretical basis connecting our filter design process to filter performance. Through this connection we can intelligently compare and optimise candidate filter models at the design stage, rather than having to resort to time consuming Monte Carlo simulations to gauge the relative performance of candidate designs. Moreover, the underlying entropy concepts are not constrained to any particular model type. This suggests that the RER concepts established here may be generalised to provide a useful design criterion for multiple model filtering approaches outside the class of HMM filters. In this thesis we also evaluate the performance of our proposed target detection algorithm under realistic operation conditions, and give consideration to the practical deployment of the detection algorithm onboard a UAV platform. Two fixed-wing UAVs were engaged to recreate various collision-course scenarios to capture highly realistic vision (from an onboard camera perspective) of the moments leading up to a collision. Based on this collected data, our proposed detection approach was able to detect targets out to distances ranging from about 400m to 900m. These distances, (with some assumptions about closing speeds and aircraft trajectories) translate to an advanced warning ahead of impact that approaches the 12.5 second response time recommended for human pilots. Furthermore, readily available graphic processing unit (GPU) based hardware is exploited for its parallel computing capabilities to demonstrate the practical feasibility of the proposed target detection algorithm. A prototype hardware-in- the-loop system has been found to be capable of achieving data processing rates sufficient for real-time operation. There is also scope for further improvement in performance through code optimisations. Overall, our proposed image-based target detection algorithm offers UAVs a cost-effective real-time target detection capability that is a step forward in ad- dressing the collision avoidance issue that is currently one of the most significant obstacles preventing widespread civilian applications of uninhabited aircraft. We also highlight that the algorithm development process has led to the discovery of a powerful multiple HMM filtering approach and a novel RER-based multiple filter design process. The utility of our multiple HMM filtering approach and RER concepts, however, extend beyond the target detection problem. This is demonstrated by our application of HMM filters and RER concepts to a heading angle estimation problem.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
In this paper, we report on a metal-catalyst-free synthesis of carbon nanotubes (CNTs) on a pre-patterned Si(001) surface. Arrays of triangular-shaped holes were created by nanoindentation in specific sites of the sample. After germanium deposition and chemical vapor deposition (CVD) of acetylene, a few CNTs nucleated and grew from germanium nanoparticles. These results illustrate that it is possible to control the growth of CNTs without the use of any metal catalyst. By leading the assembly of Ge nanoparticles with a patterning technique, a precise control over the growth order is also attainable.
Resumo:
Controlled syntheses of carbon nanotubes (CNTs) are highly desirable for nanoelectronic applications. To date, metallic catalyst particles have usually been deemed unavoidable for the nucleation and growth of any kind of CNTs. However, the presence of metal species mixed with the CNTs represents a shortcoming for most electronic applications, as metal particles are incompatible with silicon semiconductor technology. Recently it has been shown that it is possible to create nanotubes without the presence of metallic catalysts, by using SIO2, Ge and other non-metallic nanoparticles. Here we report on a metal-catalyst-free synthesis of CNTs, obtained through Ge nano-particles assembled on silicon surfaces previously patterned by Focused Ion Beam and nanoindentation.
Resumo:
Background The purpose of this study was to provide a detailed evaluation of adherence to nutrition supplements by patients with a lower limb fracture. Methods These descriptive data are from 49 nutritionally“ at-risk” patients aged 70+ years admitted to the hospital after a fall-related lower limb fracture and allocated to receive supplementation as part of a randomized, controlled trial. Supplementation commenced on day 7 and continued for 42 days. Prescribed volumes aimed to meet 45% of individually estimated theoretical energy requirements to meet the shortfall between literature estimates of energy intake and requirements. The supplement was administered by nursing staff on medication rounds in the acute or residential care settings and supervised through thrice-weekly home visits postdischarge. Results Median daily percent of the prescribed volume of nutrition supplement consumed averaged over the 42 days was 67% (interquartile range [IQR], 31–89, n = 49). There was no difference in adherence for gender, accommodation, cognition, or whether the supplement was self-administered or supervised. Twenty-three participants took some supplement every day, and a further 12 missed <5 days. For these 35 “nonrefusers,” adherence was 82% (IQR, 65–93), and they lost on average 0.7% (SD, 4.0%) of baseline weight over the 6 weeks of supplementation compared with a loss of 5.5% (SD, 5.4%) in the “refusers” (n = 14, 29%), p = .003. Conclusions We achieved better volume and energy consumption than previous studies of hip fracture patients but still failed to meet target supplement volumes prescribed to meet 45% of theoretical energy requirements. Clinicians should consider alternative methods of feeding such as a nasogastric tube, particularly in those patients where adherence to oral nutrition supplements is poor and dietary intake alone is insufficient to meet estimated energy requirements.
Resumo:
BACKGROUND Parenting-skills training may be an effective age-appropriate child behavior-modification strategy to assist parents in addressing childhood overweight. OBJECTIVE Our goal was to evaluate the relative effectiveness of parenting-skills training as a key strategy for the treatment of overweight children. DESIGN The design consisted of an assessor-blinded, randomized, controlled trial involving 111 (64% female) overweight, prepubertal children 6 to 9 years of age randomly assigned to parenting-skills training plus intensive lifestyle education, parenting-skills training alone, or a 12-month wait-listed control. Height, BMI, and waist-circumference z score and metabolic profile were assessed at baseline, 6 months, and 12 months (intention to treat). RESULTS After 12 months, the BMI z score was reduced by ∼10% with parenting-skills training plus intensive lifestyle education versus ∼5% with parenting-skills training alone or wait-listing for intervention. Waist-circumference z score fell over 12 months in both intervention groups but not in the control group. There was a significant gender effect, with greater reduction in BMI and waist-circumference z scores in boys compared with girls. CONCLUSION Parenting-skills training combined with promoting a healthy family lifestyle may be an effective approach to weight management in prepubertal children, particularly boys. Future studies should be powered to allow gender subanalysis.
Resumo:
A copy of the slide presentation titled 'Researching with the Aboriginal Community'. It was presented by Bronwyn Fredericks for the Master of Public Health Program (MPH2057- Aboriginal Health Course) at Monash University. The Monash University Aboriginal Health Course (MPH2057) is delivered in partnership by the Victorian Aboriginal Community Controlled Health Organisation (VACCHO) & The Burnet Institute. The 2010 Aboriginal Health Course was run on Level 3 of The Burnet Institute, 89 Commercial Road, Prahan, Melbourne, Victoria, 29 September 2010.
Resumo:
Background Despite the recognition of obesity in young people as a key health issue, there is limited evidence to inform health professionals regarding the most appropriate treatment options. The Eat Smart study aims to contribute to the knowledge base of effective dietary strategies for the clinical management of the obese adolescent and examine the cardiometablic effects of a reduced carbohydrate diet versus a low fat diet. Methods and design Eat Smart is a randomised controlled trial and aims to recruit 100 adolescents over a 2½ year period. Families will be invited to participate following referral by their health professional who has recommended weight management. Participants will be overweight as defined by a body mass index (BMI) greater than the 90th percentile, using CDC 2000 growth charts. An accredited 6-week psychological life skills program ‘FRIENDS for Life’, which is designed to provide behaviour change and coping skills will be undertaken prior to volunteers being randomised to group. The intervention arms include a structured reduced carbohydrate or a structured low fat dietary program based on an individualised energy prescription. The intervention will involve a series of dietetic appointments over 24 weeks. The control group will commence the dietary program of their choice after a 12 week period. Outcome measures will be assessed at baseline, week 12 and week 24. The primary outcome measure will be change in BMI z-score. A range of secondary outcome measures including body composition, lipid fractions, inflammatory markers, social and psychological measures will be measured. Discussion The chronic and difficult nature of treating the obese adolescent is increasingly recognised by clinicians and has highlighted the need for research aimed at providing effective intervention strategies, particularly for use in the tertiary setting. A structured reduced carbohydrate approach may provide a dietary pattern that some families will find more sustainable and effective than the conventional low fat dietary approach currently advocated. This study aims to investigate the acceptability and effectiveness of a structured reduced dietary carbohydrate intervention and will compare the outcomes of this approach with a structured low fat eating plan. Trial Registration: The protocol for this study is registered with the International Clinical Trials Registry (ISRCTN49438757).
Resumo:
Cutaneous cholecalciferol synthesis has not been considered in making recommendations for vitamin D intake. Our objective was to model the effects of sun exposure, vitamin D intake, and skin reflectance (pigmentation) on serum 25-hydroxyvitamin D (25[OH]D) in young adults with a wide range of skin reflectance and sun exposure. Four cohorts of participants (n = 72 total) were studied for 7-8 wk in the fall, winter, spring, and summer in Davis, CA [38.5° N, 121.7° W, Elev. 49 ft (15 m)]. Skin reflectance was measured using a spectrophotometer, vitamin D intake using food records, and sun exposure using polysulfone dosimeter badges. A multiple regression model (R^sup 2^ = 0.55; P < 0.0001) was developed and used to predict the serum 25(OH)D concentration for participants with low [median for African ancestry (AA)] and high [median for European ancestry (EA)] skin reflectance and with low [20th percentile, ~20 min/d, ~18% body surface area (BSA) exposed] and high (80th percentile, ~90 min/d, ~35% BSA exposed) sun exposure, assuming an intake of 200 IU/d (5 ug/d). Predicted serum 25(OH)D concentrations for AA individuals with low and high sun exposure in the winter were 24 and 42 nmol/L and in the summer were 40 and 60 nmol/L. Corresponding values for EA individuals were 35 and 60 nmol/L in the winter and in the summer were 58 and 85 nmol/L. To achieve 25(OH)D ≥75 nmol/L, we estimate that EA individuals with high sun exposure need 1300 IU/d vitamin D intake in the winter and AA individuals with low sun exposure need 2100-3100 IU/d year-round.