992 resultados para 7038-212


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background:  The aims of this study were to determine the documentation of pharmacotherapy optimization goals in the discharge letters of patients with the principal diagnosis of chronic heart failure. Methods:  A retrospective practice audit of 212 patients discharged to the care of their local general practitioner from general medical units of a large tertiary hospital. Details of recommendations regarding ongoing pharmacological and non-pharmacological management were reviewed. The doses of medications on discharge were noted and whether they met current guidelines recommending titration of angiotensin-converting enzyme inhibitors and beta-blockers. Ongoing arrangements for specialist follow up were also reviewed. Results:  The mean age of patients whose letters were reviewed was 78.4 years (standard deviation ± 8.6); 50% were men. Patients had an overall median of six comorbidities and eight regular medications on discharge. Mean length of stay for each admission was 6 days. Discharge letters were posted a median of 4 days after discharge, with 25% not posted at 10 days. No discharge letter was sent in 9.4% (20) of the cases. Only six (2.8%) letters had any recommendations regarding future titration of angiotensin-converting enzyme inhibitors and 6.6% (14) for beta-blockers. Recommendations for future non-pharmacological management, for example, diuretic action plans, regular weight monitoring and exercise plans were not found in the letters in this audit. Conclusion:  Hospital discharge is an opportunity to communicate management plans for treatment optimization effectively, and while this opportunity is spurned, implementation gaps in the management of cardiac failure will probably remain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Apart from helmets, little is known about the effectiveness of motorcycle protective clothing in reducing injuries in crashes. The study aimed to quantify the association between usage of motorcycle clothing and injury in crashes. Methods and findings Cross-sectional analytic study. Crashed motorcyclists (n = 212, 71% of identified eligible cases) were recruited through hospitals and motorcycle repair services. Data was obtained through structured face-to-face interviews. The main outcome was hospitalization and motorcycle crash-related injury. Poisson regression was used to estimate relative risk (RR) and 95% confidence intervals for injury adjusting for potential confounders. Results Motorcyclists were significantly less likely to be admitted to hospital if they crashed wearing motorcycle jackets (RR = 0.79, 95% CI: 0.69–0.91), pants (RR = 0.49, 95% CI: 0.25–0.94), or gloves (RR = 0.41, 95% CI: 0.26–0.66). When garments included fitted body armour there was a significantly reduced risk of injury to the upper body (RR = 0.77, 95% CI: 0.66–0.89), hands and wrists (RR = 0.55, 95% CI: 0.38–0.81), legs (RR = 0.60, 95% CI: 0.40–0.90), feet and ankles (RR = 0.54, 95% CI: 0.35–0.83). Non-motorcycle boots were also associated with a reduced risk of injury compared to shoes or joggers (RR = 0.46, 95% CI: 0.28–0.75). No association between use of body armour and risk of fracture injuries was detected. A substantial proportion of motorcycle designed gloves (25.7%), jackets (29.7%) and pants (28.1%) were assessed to have failed due to material damage in the crash. Conclusions Motorcycle protective clothing is associated with reduced risk and severity of crash related injury and hospitalization, particularly when fitted with body armour. The proportion of clothing items that failed under crash conditions indicates a need for improved quality control. While mandating usage of protective clothing is not recommended, consideration could be given to providing incentives for usage of protective clothing, such as tax exemptions for safety gear, health insurance premium reductions and rebates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new approach to pattern recognition using invariant parameters based on higher order spectra is presented. In particular, invariant parameters derived from the bispectrum are used to classify one-dimensional shapes. The bispectrum, which is translation invariant, is integrated along straight lines passing through the origin in bifrequency space. The phase of the integrated bispectrum is shown to be scale and amplification invariant, as well. A minimal set of these invariants is selected as the feature vector for pattern classification, and a minimum distance classifier using a statistical distance measure is used to classify test patterns. The classification technique is shown to distinguish two similar, but different bolts given their one-dimensional profiles. Pattern recognition using higher order spectral invariants is fast, suited for parallel implementation, and has high immunity to additive Gaussian noise. Simulation results show very high classification accuracy, even for low signal-to-noise ratios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Open-source software systems have become a viable alternative to proprietary systems. We collected data on the usage of an open-source workflow management system developed by a university research group, and examined this data with a focus on how three different user cohorts – students, academics and industry professionals – develop behavioral intentions to use the system. Building upon a framework of motivational components, we examined the group differences in extrinsic versus intrinsic motivations on continued usage intentions. Our study provides a detailed understanding of the use of open-source workflow management systems in different user communities. Moreover, it discusses implications for the provision of workflow management systems, the user-specific management of open-source systems and the development of services in the wider user community.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Society has a need for children to be able to make health care decisions. Homeless children need access to health care. Parents may not be accessible or competent to consent to their child’s health care. The familial relationship may have broken down. Children may not want their parents to know about drug, alcohol or pregnancy related issues. There is legal and academic support for the right of children to make autonomous decisions with respect to their health care. However what these decisions cover and who can make them is not clear. Whether or not a minor has capacity and is therefore competent to consent to medical treatment is a question of law. Some states of Australia have enacted legislation, while others rely on the common law to determine this issue. At common law a minor is capable of giving consent to medical treatment when he or she achieves a sufficient understanding and intelligence to be able to understand fully what is proposed. Known as ‘Gillick competence’ this is a well known principle of law. The question posed by this paper is whether the decision of a ‘Gillick competent’ child can and should be overridden by the court?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With rapid and continuing growth of learning support initiatives in mathematics and statistics found in many parts of the world, and with the likelihood that this trend will continue, there is a need to ensure that robust and coherent measures are in place to evaluate the effectiveness of these initiatives. The nature of learning support brings challenges for measurement and analysis of its effects. After briefly reviewing the purpose, rationale for, and extent of current provision, this article provides a framework for those working in learning support to think about how their efforts can be evaluated. It provides references and specific examples of how workers in this field are collecting, analysing and reporting their findings. The framework is used to structure evaluation in terms of usage of facilities, resources and services provided, and also in terms of improvements in performance of the students and staff who engage with them. Very recent developments have started to address the effects of learning support on the development of deeper approaches to learning, the affective domain and the development of communities of practice of both learners and teachers. This article intends to be a stimulus to those who work in mathematics and statistics support to gather even richer, more valuable, forms of data. It provides a 'toolkit' for those interested in evaluation of learning support and closes by referring to an on-line resource being developed to archive the growing body of evidence. © 2011 Taylor & Francis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Studies continue to report ancient DNA sequences and viable microbial cells that are many millions of years old. In this paper we evaluate some of the most extravagant claims of geologically ancient DNA. We conclude that although exciting, the reports suffer from inadequate experimental setup and insufficient authentication of results. Consequently, it remains doubtful whether amplifiable DNA sequences and viable bacteria can survive over geological timescales. To enhance the credibility of future studies and assist in discarding false-positive results, we propose a rigorous set of authentication criteria for work with geologically ancient DNA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter discusses an action research project into the lived experience of the workplace mobbing phenomenon. The action research methodology is based on the exemplarian model (Coenen & Khonraad, 2003) from the Netherlands Group. This model requires positive outcomes for those immersed in the problem to reduce the adversity of their circumstances. The findings challenge the psychological perspective of the existing bullying literature that tends to focus on individual behaviour. This research, undertaken over a three year period with 212 participants, identified the dysfunctional nature of public sector bureaucracies and the power gained through gossip and rumour as some of the key emergent themes to explain the workplace mobbing problem. In addition, resistance, conscientisation, and agency were identified as the key to transformation for those targeted. The discussion focuses on the crystallisation phase of the exemplarian model where the participants identified themselves as the Black Sheep and adopted the motto that “a black sheep is a biting beast” (Bastard, 1565 or 6-1618, p. 90), reflecting a sense of empowerment, individual agency, and a sense of humour in dealing with the serious yet seemingly absurd reality of their situations. The identity of the Black Sheep was consolidated when the group organised a 2 day conference with over 200 attendees to discuss how best to prevent workplace mobbing. This self-affirming action was a proactive step towards metaphorically “biting back” at the problem. A number of positive outcomes were achieved including the conference with over 200 attending leading to national media coverage across Australia and additional interviews with magazines, newspapers, and radio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motorcycles are overrepresented in road traffic crashes and particularly vulnerable at signalized intersections. The objective of this study is to identify causal factors affecting the motorcycle crashes at both four-legged and T signalized intersections. Treating the data in time-series cross-section panels, this study explores different Hierarchical Poisson models and found that the model allowing autoregressive lag 1 dependent specification in the error term is the most suitable. Results show that the number of lanes at the four-legged signalized intersections significantly increases motorcycle crashes largely because of the higher exposure resulting from higher motorcycle accumulation at the stop line. Furthermore, the presence of a wide median and an uncontrolled left-turn lane at major roadways of four-legged intersections exacerbate this potential hazard. For T signalized intersections, the presence of exclusive right-turn lane at both major and minor roadways and an uncontrolled left-turn lane at major roadways of T intersections increases motorcycle crashes. Motorcycle crashes increase on high-speed roadways because they are more vulnerable and less likely to react in time during conflicts. The presence of red light cameras reduces motorcycle crashes significantly for both four-legged and T intersections. With the red-light camera, motorcycles are less exposed to conflicts because it is observed that they are more disciplined in queuing at the stop line and less likely to jump start at the start of green.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Building Web 2.0 sites does not necessarily ensure the success of the site. We aim to better understand what improves the success of a site by drawing insight from biologically inspired design patterns. Web 2.0 sites provide a mechanism for human interaction enabling powerful intercommunication between massive volumes of users. Early Web 2.0 site providers that were previously dominant are being succeeded by newer sites providing innovative social interaction mechanisms. Understanding what site traits contribute to this success drives research into Web sites mechanics using models to describe the associated social networking behaviour. Some of these models attempt to show how the volume of users provides a self-organising and self-contextualisation of content. One model describing coordinated environments is called stigmergy, a term originally describing coordinated insect behavior. This paper explores how exploiting stigmergy can provide a valuable mechanism for identifying and analysing online user behavior specifically when considering that user freedom of choice is restricted by the provided web site functionality. This will aid our building better collaborative Web sites improving the collaborative processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stromatolites consist primarily of trapped and bound ambient sediment and/or authigenic mineral precipitates, but discrimination of the two constituents is difficult where stromatolites have a fine texture. We used laser ablation-inductively coupled plasma-mass spectrometry to measure trace element (rare earth element – REE, Y and Th) concentrations in both stromatolites (domical and branched) and closely associated particulate carbonate sediment in interspaces (spaces between columns or branches) from bioherms within the Neoproterozoic Bitter Springs Formation, central Australia. Our high resolution sampling allows discrimination of shale-normalised REE patterns between carbonate in stromatolites and immediately adjacent, fine-grained ambient particulate carbonate sediment from interspaces. Whereas all samples show similar negative La and Ce anomalies, positive Gd anomalies and chondritic Y/Ho ratios, the stromatolites and non-stromatolite sediment are distinguishable on the basis of consistently elevated light REEs (LREEs) in the stromatolitic laminae and relatively depleted LREEs in the particulate sediment samples. Additionally, concentrations of the lithophile element Th are higher in ambient sediment samples than in stromatolites, consistent with accumulation of some fine siliciclastic detrital material in the ambient sediment but a near absence in the stromatolites. These findings are consistent with the stromatolites consisting dominantly of in situ carbonate precipitates rather than trapped and bound ambient sediment. Hence, high resolution trace element (REE + Y, Th) geochemistry can discriminate fine-grained carbonates in these stromatolites from coeval non-stromatolitic carbonate sediment and demonstrates that the sampled stromatolites formed primarily from in situ precipitation, presumably within microbial mats/biofilms, rather than by trapping and binding of ambient sediment. Identification of the source of fine carbonate in stromatolites is significant, because if it is not too heavily contaminated by trapped ambient sediment, it may contain geochemical biosignatures and/or direct evidence of the local water chemistry in which the precipitates formed.