939 resultados para Integrity
Resumo:
Papua New Guinea (PNG) is facing what must seem like an insurmountable challenge to deliver quality healthcare servicesfor women living in both rural and urban areas. Glo bal governing bodies and donor agencies including WHO and UN have indicated that PNG does not have an appropriate health information system. Although there are some systems in place, to date, little research has been conducted on improving or resolving the data integrity and integration issues of the existing health information systems and automating the capture of women and newborns information in PNG. This current research study concentrates on the adoption of eHealth, as an innovative tool to strengthen the health information systems in PNG to meet WHO standards. The research targets maternal and child health focussing on child birth records asan exemplar...
Resumo:
A novel protective covering with a layered and staggered structure was proposed to protect concrete against projectile impact. Experimental study was conducted to investigate the ballistic behaviour of the concrete targets against 12.7 mm armour-piercing incendiary projectile at velocities ranging from 537.7 to 596.5 m/s. The results showed that the concrete targets with protective covering exhibited superior integrity with no damage on the distal surface, whereas the concrete targets without protective covering were fractured with penetrating cracks throughout the thickness of the target. Moreover, the protected concrete targets displayed significantly reduced penetration depth compared with the concrete targets without protective covering. The protective covering with epoxy adhesive interlayers had a bigger protection factor than that with silicone sealant interlayers, but the former suffered more severe damage than the latter.
Resumo:
This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.
Resumo:
The concept of big data has already outperformed traditional data management efforts in almost all industries. Other instances it has succeeded in obtaining promising results that provide value from large-scale integration and analysis of heterogeneous data sources for example Genomic and proteomic information. Big data analytics have become increasingly important in describing the data sets and analytical techniques in software applications that are so large and complex due to its significant advantages including better business decisions, cost reduction and delivery of new product and services [1]. In a similar context, the health community has experienced not only more complex and large data content, but also information systems that contain a large number of data sources with interrelated and interconnected data attributes. That have resulted in challenging, and highly dynamic environments leading to creation of big data with its enumerate complexities, for instant sharing of information with the expected security requirements of stakeholders. When comparing big data analysis with other sectors, the health sector is still in its early stages. Key challenges include accommodating the volume, velocity and variety of healthcare data with the current deluge of exponential growth. Given the complexity of big data, it is understood that while data storage and accessibility are technically manageable, the implementation of Information Accountability measures to healthcare big data might be a practical solution in support of information security, privacy and traceability measures. Transparency is one important measure that can demonstrate integrity which is a vital factor in the healthcare service. Clarity about performance expectations is considered to be another Information Accountability measure which is necessary to avoid data ambiguity and controversy about interpretation and finally, liability [2]. According to current studies [3] Electronic Health Records (EHR) are key information resources for big data analysis and is also composed of varied co-created values [3]. Common healthcare information originates from and is used by different actors and groups that facilitate understanding of the relationship for other data sources. Consequently, healthcare services often serve as an integrated service bundle. Although a critical requirement in healthcare services and analytics, it is difficult to find a comprehensive set of guidelines to adopt EHR to fulfil the big data analysis requirements. Therefore as a remedy, this research work focus on a systematic approach containing comprehensive guidelines with the accurate data that must be provided to apply and evaluate big data analysis until the necessary decision making requirements are fulfilled to improve quality of healthcare services. Hence, we believe that this approach would subsequently improve quality of life.
Resumo:
In Australia, the legal basis for the detention and restraint of people with intellectual impairment is ad hoc and unclear. There is no comprehensive legal framework that authorises and regulates the detention of, for example, older people with dementia in locked wards or in residential aged care, people with disability in residential services or people with acquired brain injury in hospital and rehabilitation services. This paper focuses on whether the common law doctrine of necessity (or its statutory equivalents) should have a role in permitting the detention and restraint of people with disabilities. Traditionally, the defence of necessity has been recognised as an excuse, where the defendant, faced by a situation of imminent peril, is excused from the criminal or civil liability because of the extraordinary circumstances they find themselves in. In the United Kingdom, however, in In re F (Mental Patient: Sterilisation) and R v Bournewood Community and Mental Health NHS Trust, ex parte L, the House of Lords broadened the defence so that it operated as a justification for treatment, detention and restraint outside of the emergency context. This paper outlines the distinction between necessity as an excuse and as a defence, and identifies a number of concerns with the latter formulation: problems of democracy, integrity, obedience, objectivity and safeguards. Australian courts are urged to reject the United Kingdom approach and retain an excuse-based defence, as the risks of permitting the essentially utilitarian model of necessity as a justification are too great.
Resumo:
The world has experienced a large increase in the amount of available data. Therefore, it requires better and more specialized tools for data storage and retrieval and information privacy. Recently Electronic Health Record (EHR) Systems have emerged to fulfill this need in health systems. They play an important role in medicine by granting access to information that can be used in medical diagnosis. Traditional systems have a focus on the storage and retrieval of this information, usually leaving issues related to privacy in the background. Doctors and patients may have different objectives when using an EHR system: patients try to restrict sensible information in their medical records to avoid misuse information while doctors want to see as much information as possible to ensure a correct diagnosis. One solution to this dilemma is the Accountable e-Health model, an access protocol model based in the Information Accountability Protocol. In this model patients are warned when doctors access their restricted data. They also enable a non-restrictive access for authenticated doctors. In this work we use FluxMED, an EHR system, and augment it with aspects of the Information Accountability Protocol to address these issues. The Implementation of the Information Accountability Framework (IAF) in FluxMED provides ways for both patients and physicians to have their privacy and access needs achieved. Issues related to storage and data security are secured by FluxMED, which contains mechanisms to ensure security and data integrity. The effort required to develop a platform for the management of medical information is mitigated by the FluxMED's workflow-based architecture: the system is flexible enough to allow the type and amount of information being altered without the need to change in your source code.
Resumo:
The periodontal ligament is the key tissue facilitating periodontal regeneration. This study aimed to fabricate decellularized human periodontal ligament cell sheets for subsequent periodontal tissue engineering applications. The decellularization protocol involved the transfer of intact human periodontal ligament cell sheets onto melt electrospun polycaprolactone membranes and subsequent bi-directional perfusion with NH4OH/Triton X-100 and DNase solutions. The protocol was shown to remove 92% of DNA content. The structural integrity of the decellularized cell sheets was confirmed by a collagen quantification assay, immunostaining of human collagen type I and fibronectin, and scanning electron microscopy. ELISA was used to demonstrate the presence of residual basic fibroblast growth factor (bFGF), vascular endothelial growth factor (VEGF), and hepatocyte growth factor (HGF) in the decellularized cell sheet constructs. The decellularized cell sheets were shown to have the ability to support recellularization by allogenic human periodontal ligament cells. This study describes the fabrication of decellularized periodontal ligament cell sheets that retain an intact extracellular matrix and resident growth factors and can support repopulation by allogenic cells. The decellularized hPDL cell sheet concept has the potential to be utilized in future "off-the-shelf" periodontal tissue engineering strategies.
Resumo:
Optical coherence tomography (OCT) has been applied for high resolution imaging of articular cartilage. However, the contribution of individual structural elements of cartilage on OCT signal has not been thoroughly studied. We hypothesize that both collagen and chondrocytes, essential structural components of cartilage, act as important light scatterers and that variation in their concentrations can be detected by OCT through changes in backscattering and attenuation. To evaluate this hypothesis, we established a controlled model system using agarose scaffolds embedded with variable collagen concentrations and chondrocyte densities. Using OCT, we measured the backscattering coefficient (µb) and total attenuation coefficient (µt) in these scaffolds. Along our hypothesis, light backscattering and attenuation in agarose were dependent on collagen concentration and chondrocyte density. Significant correlations were found between µt and chondrocyte density (ρ = 0.853, p < 0.001) and between µt and collagen concentration (ρ = 0.694, p < 0.001). µb correlated significantly with chondrocyte density (ρ = 0.504, p < 0.001) but not with collagen concentration (ρ = 0.103, p = 0.422) of the scaffold. Thus, quantitation of light backscattering and, especially, attenuation could be valuable when evaluating the integrity of soft tissues, such as articular cartilage with OCT.
Resumo:
The isolation of islets by collagenase digestion can cause damage and impact the efficiency of islet engraftment and function. In this study, we assessed the basement membranes (BMs) of mouse pancreatic islets as a molecular biomarker for islet integrity, damage after isolation, and islet repair in vitro as well as in the absence or presence of an immune response after transplantation. Immunofluorescence staining of BM matrix proteins and the endothelial cell marker platelet endothelial cell adhesion molecule-1 (PECAM-1) was performed on pancreatic islets in situ, isolated islets, islets cultured for 4 days, and islet grafts at 3-10 days posttransplantation. Flow cytometry was used to investigate the expression of BM matrix proteins in isolated islet β-cells. The islet BM, consisting of collagen type IV and components of Engelbreth-Holm-Swarm (EHS) tumor laminin 111, laminin α2, nidogen-2, and perlecan in pancreatic islets in situ, was completely lost during islet isolation. It was not reestablished during culture for 4 days. Peri- and intraislet BM restoration was identified after islet isotransplantation and coincided with the migration pattern of PECAM-1(+) vascular endothelial cells (VECs). After islet allotransplantation, the restoration of VEC-derived peri-islet BMs was initiated but did not lead to the formation of the intraislet vasculature. Instead, an abnormally enlarged peri-islet vasculature developed, coinciding with islet allograft rejection. The islet BM is a sensitive biomarker of islet damage resulting from enzymatic isolation and of islet repair after transplantation. After transplantation, remodeling of both peri- and intraislet BMs restores β-cell-matrix attachment, a recognized requirement for β-cell survival, for isografts but not for allografts. Preventing isolation-induced islet BM damage would be expected to preserve the intrinsic barrier function of islet BMs, thereby influencing both the effector mechanisms required for allograft rejection and the antirejection strategies needed for allograft survival.
Resumo:
Titanium dioxide (TiO2) nanotube arrays are attracting increasing attention for use in solar cells, lithium-ion batteries, and biomedical implants. To take full advantage of their unique physical properties, such arrays need to maintain adequate mechanical integrity in applications. However, the mechanical performance of TiO2 nanotube arrays is not well understood. In this work, we investigate the deformation and failure of TiO2 nanotube arrays using the nanoindentation technique. We found that the load–displacement response of the arrays strongly depends on the indentation depth and indenter shape. Substrate-independent elastic modulus and hardness can be obtained when the indentation depth is less than 2.5% of the array height. The deformation mechanisms of TiO2 nanotube arrays by Berkovich and conical indenters are closely associated with the densification of TiO2 nanotubes under compression. A theoretical model for deformation of the arrays under a largeradius conical indenter is also proposed.
Resumo:
MGMT is the primary vehicle for cellular removal of alkyl lesions from the O-6 position of guanine and the O-4 position of thymine. While key to the maintenance of genomic integrity, MGMT also removes damage induced by alkylating chemotherapies, inhibiting the efficacy of cancer treatment. Germline variants of human MGMT are well-characterized, but somatic variants found in tumors were, prior to this work, uncharacterized. We found that MGMT G132R, from a human esophageal tumor, and MGMT G156C, from a human colorectal cancer cell line, are unable to rescue methyltransferase-deficient Escherichia coli as well as wild type (WT) human MGMT after treatment with a methylating agent. Using pre-steady state kinetics, we biochemically characterized these variants as having a reduced rate constant. G132R binds DNA containing an O6-methylguanine lesion half as tightly as WT MGMT, while G156C has a 40-fold decrease in binding affinity for the same damaged DNA versus WT. Mammalian cells expressing either G132R or G156C are more sensitive to methylating agents than mammalian cells expressing WT MGMT. G132R is slightly resistant to O6-benzylguanine, an inhibitor of MGMT in clinical trials, while G156C is almost completely resistant to this inhibitor. The impared functionality of expressed variants G132R and G156C suggests that the presence of somatic variants of MGMT in a tumor could impact chemotherapeutic outcomes.
Resumo:
Introduction & aims The demand for evidence of efficacy of treatments in general and orthopaedic surgical procedures in particular is ever increasing in Australia and worldwide. The aim of this study is to share the key elements of an evaluation framework recently implemented in Australia to determine the efficacy of bone-anchored prostheses. Method The proposed evaluation framework to determine the benefit and harms of bone-anchored prostheses for individuals with limb loss was extracted from a systematic review of the literature including seminal studies focusing on clinical benefits and safety of procedures involving screw-type implant (e.g., OPRA) and press-fit fixations (e.g., EEFT, ILP, OPL). [1-64] Results The literature review highlighted that a standard and replicable evaluation framework should focus on: • The clinical benefits with a systematic recording of health-related quality of life (e.g., SF-26, Q-TFA), mobility predictor (e.g., AMPRO), ambulation abilities (e.g., TUG, 6MWT), walking abilities (e.g., characteristic spatio-temporal) and actual activity level at baseline and follow-up post Stage 2 surgery, • The potential harms with systematic recording of residuum care, infection, implant stability, implant integrity, injuries (e.g., falls) after Stage 1 surgery. There was a general consensus around the instruments to monitor most of the benefits and harms. The benefits could be assessed using a wide spectrum of complementary assessments ranging from subjective patient self-reporting to objective measurements of physical activity. However, this latter was assessed using a broad range of measurements (e.g., pedometer, load cell, energy consumption). More importantly, the lack of consistent grading of infections was sufficiently noticeable to impede cross-fixation comparisons. Clearly, a more universal grading system is needed. Conclusions Investigators are encouraged to implement an evaluation framework featuring the domains and instruments proposed above using a single database to facilitate robust prospective studies about potential benefits and harms of their procedure. This work is also a milestone in the development of national and international clinical outcome registries.
Resumo:
Identity crime is argued to be one of the most significant crime problems of today. This paper examines identity crime, through the attitudes and practices of a group of seniors in Queensland, Australia. It examines their own actions towards the protection of their personal data in response to a fraudulent email request. Applying the concept of a prudential citizen (as one who is responsible for self-regulating their behaviour to maintain the integrity of one’s identity) it will be argued that seniors often expose identity information through their actions. However, this is demonstrated to be the result of flawed assumptions and misguided beliefs over the perceived risk and likelihood of identity crime, rather than a deliberate act. This paper concludes that to protect seniors from identity crime, greater awareness of appropriate risk-management strategies towards disclosure of their personal details is required to reduce their inadvertent exposure to identity crime.
Resumo:
Ulcerative colitis is a common form of inflammatory bowel disease with a complex etiology. As part of the Wellcome Trust Case Control Consortium 2, we performed a genome-wide association scan for ulcerative colitis in 2,361 cases and 5,417 controls. Loci showing evidence of association at P 1 × 10 5 were followed up by genotyping in an independent set of 2,321 cases and 4,818 controls. We find genome-wide significant evidence of association at three new loci, each containing at least one biologically relevant candidate gene, on chromosomes 20q13 (HNF4A; P = 3.2 × 10 17), 16q22 (CDH1 and CDH3; P = 2.8 × 10 8) and 7q31 (LAMB1; P = 3.0 × 10 8). Of note, CDH1 has recently been associated with susceptibility to colorectal cancer, an established complication of longstanding ulcerative colitis. The new associations suggest that changes in the integrity of the intestinal epithelial barrier may contribute to the pathogenesis of ulcerative colitis. © 2009 Nature America, Inc. All rights reserved.
Resumo:
This poster presents key features of how QUT’s integrated research data storage and management services work with researchers through their own individual or team research life cycle. By understanding the characteristics of research data, and the long-term need to store this data, QUT has provided resources and tools that support QUT’s goal of being a research intensive institute. Key to successful delivery and operation has been the focus upon researchers’ individual needs and the collaboration between providers, in particular, Information Technology Services, High Performance Computing and Research Support, and QUT Library. QUT’s Research Data Storage service provides all QUT researchers (staff and Higher Degree Research students (HDRs)) with a secure data repository throughout the research data lifecycle. Three distinct storage areas provide for raw research data to be acquired, project data to be worked on, and published data to be archived. Since the service was launched in late 2014, it has provided research project teams from all QUT faculties with acquisition, working or archival data space. Feedback indicates that the storage suits the unique needs of researchers and their data. As part of the workflow to establish storage space for researchers, Research Support Specialists and Research Data Librarians consult with researchers and HDRs to identify data storage requirements for projects and individual researchers, and to select and implement the most suitable data storage services and facilities. While research can be a journey into the unknown[1], a plan can help navigate through the uncertainty. Intertwined in the storage provision is QUT’s Research Data Management Planning tool. Launched in March 2015, it has already attracted 273 QUT staff and 352 HDR student registrations, and over 620 plans have been created (2/10/2015). Developed in collaboration with Office of Research Ethics and Integrity (OREI), uptake of the plan has exceeded expectations.