989 resultados para Shopping centre protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Microwell platforms are frequently described for the efficient and uniform manufacture of 3-dimensional (3D) multicellular microtissues. Multiple partial or complete medium exchanges can displace microtissues from discrete microwells, and this can result in either the loss of microtissues from culture, or microtissue amalgamation when displaced microtissues fall into common microwells. Herein we describe the first microwell platform that incorporates a mesh to retain microtissues within discrete microwells; the microwell-mesh. We show that bonding a nylon mesh with an appropriate pore size over the microwell openings allows single cells to pass through the mesh into the microwells during the seeding process, but subsequently retains assembled microtissues within discrete microwells. To demonstrate the utility of this platform, we used the microwell-mesh to manufacture hundreds of cartilage microtissues, each formed from 5 × 10(3) bone marrow-derived mesenchymal stem/stromal cells (MSC). The microwell-mesh enabled reliable microtissue retention over 21-day cultures that included multiple full medium exchanges. Cartilage-like matrix formation was more rapid and homogeneous in microtissues than in conventional large diameter control cartilage pellets formed from 2 × 10(5) MSC each. The microwell-mesh platform offers an elegant mechanism to retain microtissues in microwells, and we believe that this improvement will make this platform useful in 3D culture protocols that require multiple medium exchanges, such as those that mimic specific developmental processes or complex sequential drug exposures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Vascular access devices (VADs), such as peripheral or central venous catheters, are vital across all medical and surgical specialties. To allow therapy or haemodynamic monitoring, VADs frequently require administration sets (AS) composed of infusion tubing, fluid containers, pressure-monitoring transducers and/or burettes. While VADs are replaced only when necessary, AS are routinely replaced every 3–4 days in the belief that this reduces infectious complications. Strong evidence supports AS use up to 4 days, but there is less evidence for AS use beyond 4 days. AS replacement twice weekly increases hospital costs and workload. Methods and analysis This is a pragmatic, multicentre, randomised controlled trial (RCT) of equivalence design comparing AS replacement at 4 (control) versus 7 (experimental) days. Randomisation is stratified by site and device, centrally allocated and concealed until enrolment. 6554 adult/paediatric patients with a central venous catheter, peripherally inserted central catheter or peripheral arterial catheter will be enrolled over 4 years. The primary outcome is VAD-related bloodstream infection (BSI) and secondary outcomes are VAD colonisation, AS colonisation, all-cause BSI, all-cause mortality, number of AS per patient, VAD time in situ and costs. Relative incidence rates of VAD-BSI per 100 devices and hazard rates per 1000 device days (95% CIs) will summarise the impact of 7-day relative to 4-day AS use and test equivalence. Kaplan-Meier survival curves (with log rank Mantel-Cox test) will compare VAD-BSI over time. Appropriate parametric or non-parametric techniques will be used to compare secondary end points. p Values of <0.05 will be considered significant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Efforts to reduce carbon emissions in the buildings sector have been focused on encouraging green design, construction and building operation; however, the business case is not very compelling if considering the energy cost savings alone. In recent years green building has been driven by a sense that it will improve the productivity of occupants,something with much greater economic returns than energy savings. Reducing energy demand in green commercial buildings in a way that encourages greater productivity is not yet well understood as it involves a set of complex and interdependent factors. This project investigates these factors and focuses on the performance of and interaction between: green design elements, internal environmental quality, occupant experience, tenant/leasing agreements, and building regulation and management. This paper suggests six areas of strategic research that are needed to understand how conditions can be created to support productivity in green buildings, and deliver significant energy consumption reductions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The number of pedestrian victims at Australian and foreign level crossings has remained stable over the past decade and it continues to be a significant problem. To examine the factors contributing to pedestrians’ unsafe crossing behaviours, direct observations were conducted at three black spot urban level crossings in Brisbane for a total of 45 h during morning and afternoon peak. In total, 129 pedestrians transgressed the active controls. More transgressions were observed at the crossings located in more populated suburbs in close proximity to large shopping centres and school zones, whereas the smallest number of transgressions were observed at the least populated locations. In addition to characteristics associated with the larger socio-economic area, the patterns of transgression could be associated with the properties of the existing safety equipment and the design of each level crossing (i.e. location of the platforms, number of rail tracks). Indeed, the largest number of crossed unoccupied but “at risk” rail tracks (where a train could have passed), was observed at the crossing with the least transgressions. Contrary to previous findings, younger adults were the most frequent transgressors. School children and elderly were most likely to transgress in groups. Potential directions for future research and more effective measures are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Biophilic urbanism, or urban design which refl ects human’s innate need for nature in and around and on top of our buildings, stands to make signifi cant contributions to a range of national, state and local government policies related to climate change mitigation and adaptation. Potential benefi ts include reducing the heat island effect, reducing energy consumption for thermal control, enhancing urban biodiversity, improving well being and productivity, improving water cycle management, and assisting in the response to growing needs for densifi cation and revitalisation of cities. This discussion paper will give an overview of the concept of biophilia and consider enablers and disablers to its application to urban planning and design. The paper will present findings from stakeholder engagement related to a consideration of the economics of the use of biophilic elements (direct and indirect). The paper outlines eight strategic areas being considered in the project, including how a ‘daily minimum dose’ of nature can be received through biophilic elements, and how planning and policy can underpin effective biophilic urbanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows: Our objective is to determine if there is sufficient evidence to recommend the use of pH testing (the intervention under scrutiny) for verification of correct placement of nasogastric tubes in adults and children. To this end, we will attempt to answer the following questions: 1. In adults and children, is pH testing an effective and safe method for determining whether nasogastric tubes are correctly positioned in the stomach before feeding (or delivery of any fluid) begins? 2. What evidence is there about the risk of adverse events in the case of incorrect placement? For this review, pH testing is defined as: litmus paper, pH indicator test strips, pH meters. These will be tested against other methods used for detecting placement of nasogastric tubes, including visual examination of aspirate, auscultation with insufflation of air, detection of air bubbles in a bowl of water, X-ray, ultrasonography, endoscopy, enzyme analysis of aspirate, capnography, and other methods that do not rely on measurement of pH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and simultaneously support different versions. Recent advances in provable security have shown that most modern TLS ciphersuites are secure authenticated and confidential channel establishment (ACCE) protocols, but these analyses generally focus on single ciphersuites in isolation. In this paper we extend the ACCE model to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and define a security notion for secure negotiation of the optimal sub-protocol. We give a generic theorem that shows how secure negotiation follows, with some additional conditions, from the authentication property of secure ACCE protocols. Using this framework, we analyse the security of ciphersuite and three variants of version negotiation in TLS, including a recently proposed mechanism for detecting fallback attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring pedestrian and cyclists movement is an important area of research in transport, crowd safety, urban design and human behaviour assessment areas. Media Access Control (MAC) address data has been recently used as potential information for extracting features from people’s movement. MAC addresses are unique identifiers of WiFi and Bluetooth wireless technologies in smart electronics devices such as mobile phones, laptops and tablets. The unique number of each WiFi and Bluetooth MAC address can be captured and stored by MAC address scanners. MAC addresses data in fact allows for unannounced, non-participatory, and tracking of people. The use of MAC data for tracking people has been focused recently for applying in mass events, shopping centres, airports, train stations etc. In terms of travel time estimation, setting up a scanner with a big value of antenna’s gain is usually recommended for highways and main roads to track vehicle’s movements, whereas big gains can have some drawbacks in case of pedestrian and cyclists. Pedestrian and cyclists mainly move in built distinctions and city pathways where there is significant noises from other fixed WiFi and Bluetooth. Big antenna’s gains will cover wide areas that results in scanning more samples from pedestrians and cyclists’ MAC device. However, anomalies (such fixed devices) may be captured that increase the complexity and processing time of data analysis. On the other hand, small gain antennas will have lesser anomalies in the data but at the cost of lower overall sample size of pedestrian and cyclist’s data. This paper studies the effect of antenna characteristics on MAC address data in terms of travel-time estimation for pedestrians and cyclists. The results of the empirical case study compare the effects of small and big antenna gains in order to suggest optimal set up for increasing the accuracy of pedestrians and cyclists’ travel-time estimation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project examines procurement of creative services in a bureaucratic setting and proposes alternative procedures that better negotiate the tensions between creative and bureaucratised ways of working. The outcome is a project procurement strategy called 'Creative Practice Enabled Procurement' and a prototype industry toolkit 'It's Not Shopping! A Guide to Purchasing Innovation and Creativity'. The research is of benefit to managers and creative practitioners, especially those working in interpretive settings. The goal is to propagate better forms of creative procurement across government and private sectors by providing an evidence-based case for improved, practical alternatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Miscommunication in the healthcare sector can be life-threatening. The rising number of migrant patients and foreign-trained staff means that communication errors between a healthcare practitioner and patient when one or both are speaking a second language are increasingly likely. However, there is limited research that addresses this issue systematically. This protocol outlines a hospital-based study examining interactions between healthcare practitioners and their patients who either share or do not share a first language. Of particular interest are the nature and efficacy of communication in language-discordant conversations, and the degree to which risk is communicated. Our aim is to understand language barriers and miscommunication that may occur in healthcare settings between patients and healthcare practitioners, especially where at least one of the speakers is using a second (weaker) language. Methods/Design Eighty individual interactions between patients and practitioners who speak either English or Chinese (Mandarin or Cantonese) as their first language will be video recorded in a range of in- and out-patient departments at three hospitals in the Metro South area of Brisbane, Australia. All participants will complete a language background questionnaire. Patients will also complete a short survey rating the effectiveness of the interaction. Recordings will be transcribed and submitted to both quantitative and qualitative analyses to determine elements of the language used that might be particularly problematic and the extent to which language concordance and discordance impacts on the quality of the patient-practitioner consultation. Discussion Understanding the role that language plays in creating barriers to healthcare is critical for healthcare systems that are experiencing an increasing range of culturally and linguistically diverse populations both amongst patients and practitioners. The data resulting from this study will inform policy and practical solutions for communication training, provide an agenda for future research, and extend theory in health communication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Canadian C spine rule and NEXUS criteria have identified risk factors for cervical spine injury in adults but not for children. PECARN has developed an 8 variable model for cervical spine injury in children. We sought to identify the mechanism, prevalence of PECARN risk factors, injury patterns, and management of severe Paediatric cervical spine injuries presenting to the major children’s hospitals in Brisbane, Australia. Methods This a retrospective study of the children with cervical spine injuries who presented directly or were referred to the major children’s hospitals in Brisbane over 5 years. Results There were 38 patients with 18 male and 20 female.The mean age was 8.6 years. They were divided into two groups according to their age, (Group 1 < =8 years had 18 (47%) patients, while group 2 (9-15 years) had 20 (53%) patients. Motor vehicle related injuries were the most common (61%) in Group 1 while it was sporting injuries (50%) in group 2. All patients in group 1 had upper cervical injury (C0-C2) while subaxial injuries were most common in group 2 (66.6%). 82% of the patients had 2 or more PECARN risk factors. 18 children (47%) had normal neurological assessment at presentation, 6 (16%) had radicular symptoms, 11 (29%) could not be assessed as they had already been intubated due to the severity of the injury, 3 (8%) had incomplete cord injury. 29 (69%) patients had normal neurological assessment at final follow up and 2 children died from their injuries. Conclusion Our study confirms that younger children sustain upper cervical injuries most commonly secondary to motor vehicle accidents, while the older sustain subaxial injuries from sporting activities. The significant prevalence of the PECARN risk factors among this cohort of patients have led to them being incorporated into a protocol at these hospitals used to assess patients with suspected cervical spinal injury.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Recently there have been efforts to derive safe, efficient processes to rule out acute coronary syndrome (ACS) in emergency department (ED) chest pain patients. We aimed to prospectively validate an ACS assessment pathway (the 2-Hour Accelerated Diagnostic Protocol to Assess Patients with Chest Pain Symptoms Using Contemporary Troponins as the Only Biomarker (ADAPT) pathway) under pragmatic ED working conditions. Methods: This prospective cohort study included patients with atraumatic chest pain in whom ACS was suspected but who did not have clear evidence of ischaemia on ECG. Thrombolysis in myocardial infarction (TIMI) score and troponin (TnI Ultra) were measured at ED presentation, 2 h later and according to current national recommendations. The primary outcome of interest was the occurrence of major adverse cardiac events (MACE) including prevalent myocardial infarction (MI) at 30 days in the group who had a TIMI score of 0 and had presentation and 2-h TnI assays <99th percentile. Results: Eight hundred and forty patients were studied of whom 177 (21%) had a TIMI score of 0. There were no MI, MACE or revascularization in the per protocol and intention-to-treat 2-h troponin groups (0%, 95% confidence interval (CI) 0% to 4.5% and 0%, 95% CI 0% to 3.8%, respectively). The negative predictive value (NPV) was 100% (95% CI 95.5% to 100%) and 100% (95% CI 96.2% to 100%), respectively. Conclusions: A 2-h accelerated rule-out process for ED chest pain patients using electrocardiography, a TIMI score of 0 and a contemporary sensitive troponin assay accurately identifies a group at very low risk of 30-day MI or MACE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.