966 resultados para Multi-segment unit
Resumo:
Within the cardiac high dependency unit it is currently a member of the surgical team who makes the decision for a patient's chest drain to be removed after cardiac surgery. This has often resulted in delays in discharging one patient and therefore in admitting the next. A pilot study was carried out using a working standard that had been developed, incorporating an algorithmic model. The results have enabled nursing staff in a cardiac high dependency unit to undertake this responsibility independently.
Resumo:
Review question/objective The review objective is to synthesise the best available evidence on experiences and perceptions of family members of intensive care unit patients on the adequacy of end-of-life care, where life-support modalities have been withheld or withdrawn. Inclusion criteria Types of participants This review will consider studies that report on the experiences and perceptions of patients’ families on EOLC in the ICU, where life-support modalities have been withheld or withdrawn. The family is defined as “those who are closest to the patient... the family may include the biological family, family by acquisition, and the family of choice and friends”. Phenomena of interest The phenomena of interest for this review are the patients’ families experiences, perceptions or views on the adequacy of EOLC delivered in the ICU, where life-support modalities were withheld or withdrawn. These experiences may refer to the following views on domains of care considered important at the end-of-life in the ICU, which have been described already in the existing literature: timely, consistent, and compassionate communication, clinician availability, clinical decision making based on patients’ preferences, goals and values, physical care implemented to maintain patient comfort, holistic interdisciplinary care and bereavement care for families of patients who died.
Resumo:
Purpose Paper-based nutrition screening tools can be challenging to implement in the ambulatory oncology setting. The aim of this study was to determine the validity of the Malnutrition Screening Tool (MST) and a novel, automated nutrition screening system compared to a ‘gold standard’ full nutrition assessment using the Patient-Generated Subjective Global Assessment (PG-SGA). Methods An observational, cross-sectional study was conducted in an outpatient oncology day treatment unit (ODTU) within an Australian tertiary health service. Eligibility criteria were as follows: ≥18 years, receiving outpatient anticancer treatment and English literate. Patients self-administered the MST. A dietitian assessed nutritional status using the PGSGA, blinded to the MST score. Automated screening system data were extracted from an electronic oncology prescribing system. This system used weight loss over 3 to 6 weeks prior to the most recent weight record or age-categorised body mass index (BMI) to identify nutritional risk. Sensitivity and specificity against PG-SGA (malnutrition) were calculated using contingency tables and receiver operating curves. Results There were a total of 300 oncology outpatients (51.7 % male, 58.6±13.3 years). The area under the curve (AUC) for weight loss alone was 0.69 with a cut-off value of ≥1 % weight loss yielding 63 % sensitivity and 76.7 % specificity. MST (score ≥2) resulted in 70.6 % sensitivity and 69.5 % specificity, AUC 0.77. Conclusions Both the MST and the automated method fell short of the accepted professional standard for sensitivity (~≥80 %) derived from the PG-SGA. Further investigation into other automated nutrition screening options and the most appropriate parameters available electronically is warranted to support targeted service provision.
Resumo:
Background Through clinical observation nursing staff of an inpatient rehabilitation unit identified a link between incontinence and undiagnosed urinary tract infections (UTIs). Further, clinical observation and structured continence management led to the realisation that urinary incontinence often improved, or resolved completely, after treatment with antibiotics. In 2009 a small study found that 30% of admitted rehabilitation patients had an undiagnosed UTI, with the majority admitted post-orthopaedic fracture. We suspected that the frequent use of indwelling urinary catheters (IDCs) in the orthopaedic environment may have been a contributing factor. Therefore, a second, more thorough, study was commenced in 2010 and completed in 2011. Aim The aim of this study was to identify what proportion of patients were admitted to one rehabilitation unit with an undiagnosed UTI over a 12-month period. We wanted to identify and highlight the presence of known risk factors associated with UTI and determine whether urinary incontinence was associated with the presence of UTI. Methods Data were collected from every patient that was admitted over a 12-month period (n=140). The majority of patients were over the age of 65 and had an orthopaedic fracture (36.4%) or stroke (27.1%). Mid-stream urine (MSU) samples, routinely collected and sent for culture and sensitivity as part of standard admission procedure, were used by the treating medical officer to detect the presence of UTI. A data collection sheet was developed, reviewed and trialled, before official data collection commenced. Data were collected as part of usual practice and collated by a research assistant. Inferential statistics were used to analyse the data. Results This study found that 25 (17.9%) of the 140 patients admitted to rehabilitation had an undiagnosed UTI, with a statistically significant association between prior presence of an IDC and the diagnosis of UTI. Urinary incontinence improved after the completion of treatment with antibiotics. Results further demonstrated a significant association between the confirmation of a UTI on culture and sensitivity and the absence of symptoms usually associated with UTI, such as burning or stinging on urination. Overall, this study suggests careful monitoring of urinary symptoms in patients admitted to rehabilitation, especially in patients with a prior IDC, is warranted.
Resumo:
The purpose of this paper is to introduce the concept of hydraulic damage and its numerical integration. Unlike the common phenomenological continuum damage mechanics approaches, the procedure introduced in this paper relies on mature concepts of homogenization, linear fracture mechanics, and thermodynamics. The model is applied to the problem of fault reactivation within resource reservoirs. The results show that propagation of weaknesses is highly driven by the contrasts of properties in porous media. In particular, it is affected by the fracture toughness of host rocks. Hydraulic damage is diffused when it takes place within extended geological units and localized at interfaces and faults.
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
This paper discusses the idea and demonstrates an early prototype of a novel method of interacting with security surveillance footage using natural user interfaces in place of traditional mouse and keyboard interaction. Current surveillance monitoring stations and systems provide the user with a vast array of video feeds from multiple locations on a video wall, relying on the user’s ability to distinguish locations of the live feeds from experience or list based key-value pair of location and camera IDs. During an incident, this current method of interaction may cause the user to spend increased amounts time obtaining situational and location awareness, which is counter-productive. The system proposed in this paper demonstrates how a multi-touch screen and natural interaction can enable the surveillance monitoring station users to quickly identify the location of a security camera and efficiently respond to an incident.
Resumo:
The ability to understand and predict how thermal, hydrological,mechanical and chemical (THMC) processes interact is fundamental to many research initiatives and industrial applications. We present (1) a new Thermal– Hydrological–Mechanical–Chemical (THMC) coupling formulation, based on non-equilibrium thermodynamics; (2) show how THMC feedback is incorporated in the thermodynamic approach; (3) suggest a unifying thermodynamic framework for multi-scaling; and (4) formulate a new rationale for assessing upper and lower bounds of dissipation for THMC processes. The technique is based on deducing time and length scales suitable for separating processes using a macroscopic finite time thermodynamic approach. We show that if the time and length scales are suitably chosen, the calculation of entropic bounds can be used to describe three different types of material and process uncertainties: geometric uncertainties,stemming from the microstructure; process uncertainty, stemming from the correct derivation of the constitutive behavior; and uncertainties in time evolution, stemming from the path dependence of the time integration of the irreversible entropy production. Although the approach is specifically formulated here for THMC coupling we suggest that it has a much broader applicability. In a general sense it consists of finding the entropic bounds of the dissipation defined by the product of thermodynamic force times thermodynamic flux which in material sciences corresponds to generalized stress and generalized strain rates, respectively.
Resumo:
Mycobacterium kansasii is a pulmonary pathogen that has been grown readily from municipal water, but rarely isolated from natural waters. A definitive link between water exposure and disease has not been demonstrated and the environmental niche for this organism is poorly understood. Strain typing of clinical isolates has revealed seven subtypes with Type 1 being highly clonal and responsible for most infections worldwide. The prevalence of other subtypes varies geographically. In this study 49 water isolates are compared with 72 patient isolates from the same geographical area (Brisbane, Australia), using automated repetitive unit PCR (Diversilab) and ITS RFLP. The clonality of the dominant clinical strain type is again demonstrated but with rep-PCR, strain variation within this group is evident comparable with other reported methods. There is significant heterogeneity of water isolates and very few are similar or related to the clinical isolates. This suggests that if water or aerosol transmission is the mode of infection, then point source contamination likely occurs from an alternative environmental source.
Resumo:
This paper presents a method for the continuous segmentation of dynamic objects using only a vehicle mounted monocular camera without any prior knowledge of the object’s appearance. Prior work in online static/dynamic segmentation is extended to identify multiple instances of dynamic objects by introducing an unsupervised motion clustering step. These clusters are then used to update a multi-class classifier within a self-supervised framework. In contrast to many tracking-by-detection based methods, our system is able to detect dynamic objects without any prior knowledge of their visual appearance shape or location. Furthermore, the classifier is used to propagate labels of the same object in previous frames, which facilitates the continuous tracking of individual objects based on motion. The proposed system is evaluated using recall and false alarm metrics in addition to a new multi-instance labelled dataset to evaluate the performance of segmenting multiple instances of objects.
Resumo:
In this paper, we propose a new multi-class steganalysis for binary image. The proposed method can identify the type of steganographic technique used by examining on the given binary image. In addition, our proposed method is also capable of differentiating an image with hidden message from the one without hidden message. In order to do that, we will extract some features from the binary image. The feature extraction method used is a combination of the method extended from our previous work and some new methods proposed in this paper. Based on the extracted feature sets, we construct our multi-class steganalysis from the SVM classifier. We also present the empirical works to demonstrate that the proposed method can effectively identify five different types of steganography.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.