781 resultados para KYOTO protocol
Resumo:
Background Older people have higher rates of hospital admission than the general population and higher rates of readmission due to complications and falls. During hospitalisation, older people experience significant functional decline which impairs their future independence and quality of life. Acute hospital services comprise the largest section of health expenditure in Australia and prevention or delay of disease is known to produce more effective use of services. Current models of discharge planning and follow-up care, however, do not address the need to prevent deconditioning or functional decline. This paper describes the protocol of a randomised controlled trial which aims to evaluate innovative transitional care strategies to reduce unplanned readmissions and improve functional status, independence, and psycho-social well-being of community-based older people at risk of readmission. Methods/Design The study is a randomised controlled trial. Within 72 hours of hospital admission, a sample of older adults fitting the inclusion/exclusion criteria (aged 65 years and over, admitted with a medical diagnosis, able to walk independently for 3 meters, and at least one risk factor for readmission) are randomised into one of four groups: 1) the usual care control group, 2) the exercise and in-home/telephone follow-up intervention group, 3) the exercise only intervention group, or 4) the in-home/telephone follow-up only intervention group. The usual care control group receive usual discharge planning provided by the health service. In addition to usual care, the exercise and in-home/telephone follow-up intervention group receive an intervention consisting of a tailored exercise program, in-home visit and 24 week telephone follow-up by a gerontic nurse. The exercise only and in-home/telephone follow-up only intervention groups, in addition to usual care receive only the exercise or gerontic nurse components of the intervention respectively. Data collection is undertaken at baseline within 72 hours of hospital admission, 4 weeks following hospital discharge, 12 weeks following hospital discharge, and 24 weeks following hospital discharge. Outcome assessors are blinded to group allocation. Primary outcomes are emergency hospital readmissions and health service use, functional status, psychosocial well-being and cost effectiveness. Discussion The acute hospital sector comprises the largest component of health care system expenditure in developed countries, and older adults are the most frequent consumers. There are few trials to demonstrate effective models of transitional care to prevent emergency readmissions, loss of functional ability and independence in this population following an acute hospital admission. This study aims to address that gap and provide information for future health service planning which meets client needs and lowers the use of acute care services.
Resumo:
Background: Most skin cancers are preventable by encouraging consistent use of sun protective behaviour. In Australia, adolescents have high levels of knowledge and awareness of the risks of skin cancer but exhibit significantly lower sun protection behaviours than adults. There is limited research aimed at understanding why people do or do not engage in sun protective behaviour, and an associated absence of theory-based interventions to improve sun safe behaviour. This paper presents the study protocol for a school-based intervention which aims to improve the sun safe behaviour of adolescents. Methods/design: Approximately 400 adolescents (aged 12-17 years) will be recruited through Queensland, Australia public and private schools and randomized to the intervention (n = 200) or 'wait-list' control group (n = 200). The intervention focuses on encouraging supportive sun protective attitudes and beliefs, fostering perceptions of normative support for sun protection behaviour, and increasing perceptions of control/self-efficacy over using sun protection. It will be delivered during three × one hour sessions over a three week period from a trained facilitator during class time. Data will be collected one week pre-intervention (Time 1), and at one week (Time 2) and four weeks (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun protection behaviour. Secondary outcomes include attitudes toward performing sun protective behaviours (i.e., attitudes), perceptions of normative support to sun protect (i.e., subjective norms, group norms, and image norms), and perceived control over performing sun protective behaviours (i.e., perceived behavioural control). Discussion: The study will provide valuable information about the effectiveness of the intervention in improving the sun protective behaviour of adolescents.
Resumo:
Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.
Resumo:
Parkinson’s disease (PD) is a progressive, chronic neurodegenerative disorder for which there is no known cure. Physical exercise programs may be used to assist with the physical management of PD. Several studies have demonstrated that community based physical therapy programs are effective in reducing physical aspects of disability among people with PD. While multidisciplinary therapy interventions may have the potential to reduce disability and improve the quality of life of people with PD, there is very limited clinical trial evidence to support or refute the use of a community based multidisciplinary or interdisciplinary programs for people with PD. A two group randomized trial is being undertaken within a community rehabilitation service in Brisbane, Australia. Community dwelling adults with a diagnosis of Idiopathic Parkinson’s disease are being recruited. Eligible participants are randomly allocated to a standard exercise rehabilitation group program or an intervention group which incorporates physical, cognitive and speech activities in a multi-tasking framework. Outcomes will be measured at 6-week intervals for a period of six months. Primary outcome measures are the Montreal Cognitive Assessment (MoCA) and the Timed Up and Go (TUG) cognitive test. Secondary outcomes include changes in health related quality of life, communication, social participation, mobility, strength and balance, and carer burden measures. This study will determine the immediate and long-term effectiveness of a unique multifocal, interdisciplinary, dual-tasking approach to the management of PD as compared to an exercise only program. We anticipate that the results of this study will have implications for the development of cost effective evidence based best practice for the treatment of people with PD living in the community.
Resumo:
This paper describes observational research and verbal protocols methods, how these methods are applied and integrated within different contexts, and how they complement each other. The first case study focuses on nurses’ interaction during bandaging of patients’ lower legs. To maintain research rigor a triangulation approach was applied that links observations of current procedures, ‘talk-aloud’ protocol during interaction and retrospective protocol. Maps of interactions demonstrated that some nurses bandage more intuitively than others. Nurses who bandage intuitively assemble long sequences of bandaging actions while nurses who bandage less intuitively ‘focus-shift’ in between bandaging actions. Thus different levels of expertise have been identified. The second case study consists of two laboratory experiments. It focuses on analysing and comparing software and product design teams and how they approached a design problem. It is based on the observational and verbal data analysis. The coding scheme applied evolved during the analysis of the activity of each team and is identical for all teams. The structure of knowledge captured from the analysis of the design team maps of interaction is identified. The significance of this work is within its methodological approach. The maps of interaction are instrumental for understanding the activities and interactions of the people observed. By examining the maps of interaction, it is possible to draw conclusions about interactions, structure of knowledge captured and level of expertise. This research approach is transferable to other design domains. Designers will be able to transfer the interaction maps outcomes to systems and services they design.
Resumo:
A high-throughput method of isolating and cloning geminivirus genomes from dried plant material, by combining an Extract-n-Amp™-based DNA isolation technique with rolling circle amplification (RCA) of viral DNA, is presented. Using this method an attempt was made to isolate and clone full geminivirus genomes/genome components from 102 plant samples, including dried leaves stored at room temperature for between 6 months and 10 years, with an average hands-on-time to RCA-ready DNA of 15 min per 20 samples. While storage of dried leaves for up to 6 months did not appreciably decrease cloning success rates relative to those achieved with fresh samples, efficiency of the method decreased with increasing storage time. However, it was still possible to clone virus genomes from 47% of 10-year-old samples. To illustrate the utility of this simple method for high-throughput geminivirus diversity studies, six Maize streak virus genomes, an Abutilon mosaic virus DNA-B component and the DNA-A component of a previously unidentified New Word begomovirus species were fully sequenced. Genomic clones of the 69 other viruses were verified as such by end sequencing. This method should be extremely useful for the study of any circular DNA plant viruses with genome component lengths smaller than the maximum size amplifiable by RCA. © 2008 Elsevier B.V. All rights reserved.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: Primary research objective To determine the effects of community wide, multi-strategic interventions upon community levels of physical activity. Secondary research objectives 1. To explore whether any effects of the intervention are different within and between populations, and whether these differences form an equity gradient. 2. To describe other health (e.g. cardiovascular disease morbidity) and behavioural effects (e.g. diet) where appropriate outcomes are available. 3. To explore the influence of context in the design, delivery, and outcomes of the interventions. 4. To explore the relationship between the number of components, duration, and effects of the interventions. 5. To highlight implications for further research and research methods to improve knowledge of the interventions in relation to the primary research objective.
Resumo:
The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.
Resumo:
In this paper, we review the sequential slotted amplify-decode-and-forward (SADF) protocol with half-duplex single-antenna and evaluate its performance in terms of pairwise error probability (PEP). We obtain the PEP upper bound of the protocol and find out that the achievable diversity order of the protocol is two with arbitrary number of relay terminals. To achieve the maximum achievable diversity order, we propose a simple precoder that is easy to implement with any number of relay terminals and transmission slots. Simulation results show that the proposed precoder achieves the maximum achievable diversity order and has similar BER performance compared to some of the existing precoders.
Resumo:
Aim. A protocol for a new peer-led self-management programme for communitydwelling older people with diabetes in Shanghai, China. Background. The increasing prevalence of type 2 diabetes poses major public health challenges. Appropriate education programmes could help people with diabetes to achieve self-management and better health outcomes. Providing education programmes to the fast growing number of people with diabetes present a real challenge to Chinese healthcare system, which is strained for personnel and funding shortages. Empirical literature and expert opinions suggest that peer education programmes are promising. Design. Quasi-experimental. Methods. This study is a non-equivalent control group design (protocol approved in January, 2008). A total of 190 people, with 95 participants in each group, will be recruited from two different, but similar, communities. The programme, based on Social Cognitive Theory, will consist of basic diabetes instruction and social support and self-efficacy enhancing group activities. Basic diabetes instruction sessions will be delivered by health professionals, whereas social support and self-efficacy enhancing group activities will be led by peer leaders. Outcome variables include: self-efficacy, social support, self-management behaviours, depressive status, quality of life and healthcare utilization, which will be measured at baseline, 4 and 12 weeks. Discussion. This theory-based programme tailored to Chinese patients has potential for improving diabetes self-management and subsequent health outcomes. In addition, the delivery mode, through involvement of peer leaders and existing community networks,is especially promising considering healthcare resource shortage in China.
Resumo:
Background: The incidence of mandibular fractures in the Northern Territory of Australia is very high, especially among Indigenous people. Alcohol intoxication is implicated in the majority of facial injuries, and substance use is therefore an important target for secondary prevention. The current study tests the efficacy of a brief therapy, Motivational Care Planning, in improving wellbeing and substance misuse in youth and adults hospitalised with alcohol-related facial trauma. Methods and design: The study is a randomised controlled trial with 6 months of follow-up, to examine the effectiveness of a brief and culturally adapted intervention in improving outcomes for trauma patients with at-risk drinking admitted to the Royal Darwin Hospital maxillofacial surgery unit. Potential participants are identified using AUDIT-C questionnaire. Eligible participants are randomised to either Motivational Care Planning (MCP) or Treatment as Usual (TAU). The outcome measures will include quantity and frequency of alcohol and other substance use by Timeline Followback. The recruitment target is 154 participants, which with 20% dropout, is hoped to provide 124 people receiving treatment and follow-up. Discussion: This project introduces screening and brief interventions for high-risk drinkers admitted to the hospital with facial trauma. It introduces a practical approach to integrating brief interventions in the hospital setting, and has potential to demonstrate significant benefits for at-risk drinkers with facial trauma.
Resumo:
Deploying networked control systems (NCSs) over wireless networks is becoming more and more popular. However, the widely-used transport layer protocols, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), are not designed for real-time applications. Therefore, they may not be suitable for many NCS application scenarios because of their limitations on reliability and/or delay performance, which real-control systems concern. Considering a typical type of NCSs with periodic and sporadic real-time traffic, this paper proposes a highly reliable transport layer protocol featuring a packet loss-sensitive retransmission mechanism and a prioritized transmission mechanism. The packet loss-sensitive retransmission mechanism is designed to improve the reliability of all traffic flows. And the prioritized transmission mechanism offers differentiated services for periodic and sporadic flows. Simulation results show that the proposed protocol has better reliability than UDP and improved delay performance than TCP over wireless networks, particularly when channel errors and congestions occur.
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.