930 resultados para Register
Resumo:
Background The measurement of severity and control of asthma in both children and adults can be based on subjective or objective measures. It has been advocated that fractional exhaled nitric oxide (FeNO) can be used to monitor airway inflammation as it correlates with some markers of asthma. Interventions for asthma therapies have been traditionally based on symptoms and/or spirometry. Objectives To evaluate the efficacy of tailoring asthma interventions based on exhaled nitric oxide in comparison to clinical symptoms (with or without spirometry/peak flow) for asthma related outcomes in children and adults. Search methods We searched the Cochrane Airways Group Specialised Register of Trials, the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE and reference lists of articles. The last search was completed in February 2009. Selection criteria All randomised controlled comparisons of adjustment of asthma therapy based on exhaled nitric oxide compared to traditional methods (primarily clinical symptoms and spirometry/peak flow). Data collection and analysis Results of searches were reviewed against pre-determined criteria for inclusion. Relevant studies were independently selected in duplicate. Two authors independently assessed trial quality and extracted data. Authors were contacted for further information with response from one. Main results Two studies have been added for this update, which now includes six (2 adults and 4 children/adolescent) studies; these studies differed in a variety of ways including definition of asthma exacerbations, FeNO cut off levels, the way in which FeNO was used to adjust therapy and duration of study. Of 1053 participants randomised, 1010 completed the trials. In the meta-analysis, there was no significant difference between groups for the primary outcome of asthma exacerbations or for other outcomes (clinical symptoms, FeNO level and spirometry). In post-hoc analysis, a significant reduction in mean final daily dose inhaled corticosteroid per adult was found in the group where treatment was based on FeNO in comparison to clinical symptoms, (mean difference -450 mcg; 95% CI -677 to -223 mcg budesonide equivalent/day). However, the total amount of inhaled corticosteroid used in one of the adult studies was 11% greater in the FeNO arm. In contrast, in the paediatric studies, there was a significant increase in inhaled corticosteroid dose in the FeNO strategy arm (mean difference of 140 mcg; 95% CI 29 to 251, mcg budesonide equivalent/day). Authors' conclusions Tailoring the dose of inhaled corticosteroids based on exhaled nitric oxide in comparison to clinical symptoms was carried out in different ways in the six studies and found only modest benefit at best and potentially higher doses of inhaled corticosteroids in children. The role of utilising exhaled nitric oxide to tailor the dose of inhaled corticosteroids cannot be routinely recommended for clinical practice at this stage and remains uncertain.
Resumo:
Asthma severity and control can be measured both subjectively and objectively. Traditionally asthma treatments have been individualised using symptoms and spirometry/peak flow. Increasingly treatment tailored in accordance with inflammatory markers (sputum eosinophil counts or fractional exhaled nitric oxide (FeNO) data) is advocated as an alternative strategy. The objective of this review was to evaluate the efficacy of tailoring asthma interventions based on inflammatory markers (sputum analysis and FeNO) in comparison with clinical symptoms (with or without spirometry/peak flow) for asthma-related outcomes in children and adults. Cochrane Airways Group Specialised Register of Trials, the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE and reference lists of articles were searched. The last searches were in February 2009. All randomised controlled comparisons of adjustment of asthma treatment based on sputum analysis or FeNO compared with traditional methods (primarily clinical symptoms and spirometry/peak flow) were selected. Results of searches were reviewed against predetermined criteria for inclusion. Relevant studies were selected, assessed and data extracted independently by at least two people. The trial authors were contacted for further information. Data were analysed as 'intervention received' and sensitivity analyses performed. Six (2 adults and 4 children/adolescent) studies utilising FeNO and three adult studies utilising sputum eosinophils were included. These studies had a degree of clinical heterogeneity including definition of asthma exacerbations, duration of study and variations in cut-off levels for percentage of sputum eosinophils and FeNO to alter management in each study. Adults who had treatment adjusted according to sputum eosinophils had a reduced number of exacerbations compared with the control group (52 vs. 77 patients with >=1 exacerbation in the study period; p=0.0006). There was no significant difference in exacerbations between groups for FeNO compared with controls. The daily dose of inhaled corticosteroids at the end of the study was decreased in adults whose treatment was based on FeNO in comparison with the control group (mean difference -450.03 mug, 95% CI -676.73 to -223.34; p<0.0001). However, children who had treatment adjusted according to FeNO had an increase in their mean daily dose of inhaled corticosteroids (mean difference 140.18 mug, 95% CI 28.94 to 251.42; p=0.014). It was concluded that tailoring of asthma treatment based on sputum eosinophils is effective in decreasing asthma exacerbations. However, tailoring of asthma treatment based on FeNO levels has not been shown to be effective in improving asthma outcomes in children and adults. At present, there is insufficient justification to advocate the routine use of either sputum analysis (due to technical expertise required) or FeNO in everyday clinical practice.
Resumo:
Current stocks of the LCC15-MB cell line, which we originally isolated from a human breast-bone metastasis, were found to be genetically matched to the MDA-MB-435 cell line from the Lombardi Cancer Center (MDA-MB-435-LCC) using comparative genomic hybridisation, DNA microsatellite analysis and chromosomal number. LCC15-MB stocks used for our previously published studies as well as the earliest available LCC15-MB cells also showed identity to MDA-MB-435-LCC cells. The original karyotype reported for LCC15-MB cells was considerably different to that of MDA-MB-435 cells, indicating that the original LCC15-MB cells were lost to contamination by MDA-MB-435-LCC cells. Chromosome number is the simplest test to distinguish original LCC 15-MB cells (n ∼ 75) from MDA-MB-435 (n ∼ 52). Collectively, our results prove that LCC15-MB cells currently available are MDA-MB-435 cells and we suggest their re-designation as MDA-MB-435-LCC15 cells. We also review the known misclassification of breast and prostate cancer cell lines to date and have initiated a register maintained at http://www.svi.edu.au/cell_lines_registry.doc.
Resumo:
NLS is one of the stream ciphers submitted to the eSTREAM project. We present a distinguishing attack on NLS by Crossword Puzzle (CP) attack method which is introduced in this paper. We build the distinguisher by using linear approximations of both the non-linear feedback shift register (NFSR) and the nonlinear filter function (NLF). Since the bias of the distinguisher depends on the Konst value, which is a key-dependent word, we present the graph showing how the bias of distinguisher vary with Konst. In result, we estimate the bias of the distinguisher to be around O(2^−30). Therefore, we claim that NLS is distinguishable from truly random cipher after observing O(2^60) keystream words. The experiments also show that our distinguishing attack is successful on 90.3% of Konst among 2^32 possible values. We extend the CP attack to NLSv2 which is a tweaked version of NLS. In result, we build a distinguisher which has the bias of around 2− 48. Even though this attack is below the eSTREAM criteria (2^−40), the security margin of NLSv2 seems to be too low.
Resumo:
Precise clock synchronization is essential in emerging time-critical distributed control systems operating over computer networks where the clock synchronization requirements are mostly focused on relative clock synchronization and high synchronization precision. Existing clock synchronization techniques such as the Network Time Protocol (NTP) and the IEEE 1588 standard can be difficult to apply to such systems because of the highly precise hardware clocks required, due to network congestion caused by a high frequency of synchronization message transmissions, and high overheads. In response, we present a Time Stamp Counter based precise Relative Clock Synchronization Protocol (TSC-RCSP) for distributed control applications operating over local-area networks (LANs). In our protocol a software clock based on the TSC register, counting CPU cycles, is adopted in the time clients and server. TSC-based clocks offer clients a precise, stable and low-cost clock synchronization solution. Experimental results show that clock precision in the order of 10~microseconds can be achieved in small-scale LAN systems. Such clock precision is much higher than that of a processor's Time-Of-Day clock, and is easily sufficient for most distributed real-time control applications over LANs.
Resumo:
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and/or integrity checks change and the target address is not computed correctly. Gupta and Pieprzyk's attack uses debugger capabilities such as register and address lookup and breakpoints to minimize the requirement to manually inspect the software. Using these resources, the FBF and calls to the same is identified, correct displacement values are generated and calls to FBF are replaced by the original UBS transferring control of the attack to the correct target instruction. In this paper, we propose a watermarking model that provides security against such debugging attacks. Two primary measures taken are shifting the stack pointer modification operation from the FBF to the individual UBSs, and coding the stack pointer modification in the same language as that of the rest of the code rather than assembly language to avoid conspicuous contents. The manual component complexity increases from O(1) in the previous scheme to O(n) in our proposed scheme.
Resumo:
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.
Resumo:
The policy instruments that provide information on a firm's or facility's environmental performance, such as the U.S. Toxic Release Inventory (TRI) and the Pollutant Release and Transfer Register system (PRTRs) used in some European countries and Japan, play an important role in encouraging firms or facilities to improve their environmental performance, if investors, consumers and residents recognize their environmental performance. This study uses a hedonic approach to explore how the Japanese rental housing market responds to carcinogenic risk arising from releases and transfers of chemical substances produced and used at close facilities. We found that residents do not perceive carcinogenic risk generated more than 1.0 km away from their residence and that they seem to recognize the increased carcinogenic risk at distances from 0.5 km to 1.0 km away; a 1% increase in carcinogenic risk reduces the average rent by 0.0007%. The distance at which residents perceive the risk arising from such facilities is less than in previous studies. This suggests that the risk perception recognized in previous studies may capture the other externalities in addition to the chemical risk because the risk is measured by the distance.
Resumo:
Objective: In response to concerns about the health consequences of high-risk drinking by young people, the Australian Government increased the tax on pre-mixed alcoholic beverages ('alcopops') favoured by this demographic. We measured changes in admissions for alcohol-related harm to health throughout Queensland, before and after the tax increase in April 2008. Methods: We used data from the Queensland Trauma Register, Hospitals Admitted Patients Data Collection, and the Emergency Department Information System to calculate alcohol-related admission rates per 100,000 people, for 15 - 29 year-olds. We analysed data over 3 years (April 2006 - April 2009), using interrupted time-series analyses. This covered 2 years before, and 1 year after, the tax increase. We investigated both mental and behavioural consequences (via F10 codes), and intentional/unintentional injuries (S and T codes). Results: We fitted an auto-regressive integrated moving average (ARIMA) model, to test for any changes following the increased tax. There was no decrease in alcohol-related admissions in 15 - 29 year-olds. We found similar results for males and females, as well as definitions of alcohol-related harms that were narrow (F10 codes only) and broad (F10, S and T codes). Conclusions: The increased tax on 'alcopops' was not associated with any reduction in hospital admissions for alcohol-related harms in Queensland 15 - 29 year-olds.
Resumo:
This article considers the changes to the Swimming Pools Act 1992 (NSW)(Act) which established a State-wide online register of all private swimming pools in NSW requiring pool owners to register their pools by 19 November 2013. Amendments to the Act introduced changes to the conveyancing and residential tenancy regulations to require vendors and landlords to have a valid Compliance Certificate issued for their swimming pool before offering the property for sale or lease. This article provides a brief overview of the new sale and leasing requirements effective from 29 April 2014, focusing on its application to lot owners within strata and community title schemes and other owners of water front properties with pools on Crown Land Reserves.
Resumo:
There is a new type of home education parent challenging long-held assumptions about homeschooling (cf. Morton 2012). These parents are well educated (cf. Beck 2010) but have chosen to eschew the social and cultural capital (Bourdieu & Wacquant 1992) of school in favour of some- thing completely different. They are unschoolers, which involves ‘allow- ing children as much freedom to learn in the world as their parents can possibly bear’ (cf. Holt & Farenga 2003: 238). This chapter presents the approach taken by one researcher to explore the reasons families choose unschooling. These families can be difficult to access, because they often fail to register with home education units and thus remain outside the education system (cf. Townsend 2012). Their lack of registration makes them largely invisible, affecting their ability to make an important contribution to debates around education. In spite of this invisibility, many unschoolers are keen to talk to researchers to increase wider understanding of unschooling.
Resumo:
OBJECTIVES: Bottle-feeding has been suggested to increase the risk of pyloric stenosis (PS). However, large population-based studies are needed. We examined the effect of bottle-feeding during the first 4 months after birth, by using detailed data about the timing of first exposure to bottle-feeding and extensive confounder information. METHODS: We performed a large population-based cohort study based on the Danish National Birth Cohort, which provided information on infants and feeding practice. Information about surgery for PS was obtained from the Danish National Patient Register. The association between bottle-feeding and the risk of PS was evaluated by hazard ratios (HRs) estimated in a Cox regression model, adjusting for possible confounders. RESULTS: Among 70 148 singleton infants, 65 infants had surgery for PS, of which 29 were bottle-fed before PS diagnosis. The overall HR of PS for bottle-fed infants compared with not bottle-fed infants was 4.62 (95% confidence interval [CI]: 2.78–7.65). Among bottle-fed infants, risk increases were similar for infants both breast and bottle-fed (HR: 3.36 [95% CI: 1.60–7.03]), formerly breastfed (HR: 5.38 [95% CI: 2.88–10.06]), and never breastfed (HR: 6.32 [95% CI: 2.45–16.26]) (P = .76). The increased risk of PS among bottle-fed infants was observed even after 30 days since first exposure to bottle-feeding and did not vary with age at first exposure to bottle-feeding. CONCLUSIONS: Bottle-fed infants experienced a 4.6-fold higher risk of PS compared with infants who were not bottle-fed. The result adds to the evidence supporting the advantage of exclusive breastfeeding in the first months after birth.
Resumo:
Use of the hand is vital in working life due to the grabbing and pinching it performs. Spherical grip is the most commonly used, due to similarity to the gripping of a computer mouse. Knowledge of its execution and the involved elements is essential. Analysis of this exertion with surface electromyography devices (to register muscular activity) and accelerometer devices (to register movement values ) can provide multiple variables. Six subjects performed ball gripping and registered real-time electromyography (thenar region, hypothenar region, first dorsal interosseous, flexors of the wrist, flexor carpi ulnaris and extensors of the wrist muscles) and accelerometer (thumb, index, middle, ring, pinky and palm) values. The obtained data was resampled “R software” and processed “Matlab Script” based on an automatic numerical sequence recognition program. Electromyography values were normalized on the basis of maximum voluntary contraction, whilst modular values were calculated for the acceleration vector. After processing and analysing the obtained data and signal, it was possible to identify five stages of movement in accordance with the module vector from the palm. The statistical analysis of the variables was descriptive: average and standard deviations. The outcome variables focus on the variations of the modules of the vector (between the maximum and minimum values of each module and phase) and the maximum values of the standardized electromyography of each muscle. Analysis of movement through accelerometer and electromyography variables can give us an insight into the operation of spherical grip. The protocol and treatment data can be used as a system to complement existing assessments in the hand.
Resumo:
The purpose of this paper is to review existing knowledge management (KM) practices within the field of asset management, identify gaps, and propose a new approach to managing knowledge for asset management. Existing approaches to KM in the field of asset management are incomplete with the focus primarily on the application of data and information systems, for example the use of an asset register. It is contended these approaches provide access to explicit knowledge and overlook the importance of tacit knowledge acquisition, sharing and application. In doing so, current KM approaches within asset management tend to neglect the significance of relational factors; whereas studies in the knowledge management field have showed that relational modes such as social capital is imperative for ef-fective KM outcomes. In this paper, we argue that incorporating a relational ap-proach to KM is more likely to contribute to the exchange of ideas and the devel-opment of creative responses necessary to improve decision-making in asset management. This conceptual paper uses extant literature to explain knowledge management antecedents and explore its outcomes in the context of asset man-agement. KM is a component in the new Integrated Strategic Asset Management (ISAM) framework developed in conjunction with asset management industry as-sociations (AAMCoG, 2012) that improves asset management performance. In this paper we use Nahapiet and Ghoshal’s (1998) model to explain antecedents of relational approach to knowledge management. Further, we develop an argument that relational knowledge management is likely to contribute to the improvement of the ISAM framework components, such as Organisational Strategic Manage-ment, Service Planning and Delivery. The main contribution of the paper is a novel and robust approach to managing knowledge that leads to the improvement of asset management outcomes.
Resumo:
Legacies of the Global Financial Crisis and major domestic corporate collapses – such as HIH Insurance Pty Ltd and One.Tel Ltd (telecommunications) – have significantly changed Australia‟s financial regulatory landscape. Legal requirements for auditors have attracted particular attention as have practice standards more broadly around disclosure and conflict of interest. Conversely, although successful detection and prosecution of breaches may rest in significant part on forensic accounting activities, Australia‟s practitioners in this field have no minimum training or qualifications standards other than the baseline requirements mandated by the country‟s three professional accounting bodies. For those unaffiliated with these organizations, no professional oversight exists. In Australia, growth in the forensic accounting industry has been in direct response to public demand for expertise in a broad range of fraud, forensic and business analytics areas in order to improve the corporate governance practices of Australian organizations. During the 1990s, Australian forensic accounting firms expanded and diversified into a number of different areas going well beyond just the examination of financial documents and involvement in financial litigation disputes. “Big 4” accounting firms such as PriceWaterhouseCoopers, KPMG, Deloitte and Ernst and Young formed independent forensic accounting or forensic services units; a number of mid-tier and „boutique‟ forensic accounting firms similarly expanded into forensic investigative, analytical and advisory services. By 2008, 800 forensic accountants were registered with the country‟s largest specialist forensic accounting group, the Forensic Accounting Special Interest Group (FASIG) of the ICAA1. Currently, obtaining more precise figures on numbers of forensic accounting practitioners is problematic: professional accounting bodies either do not keep a register or have ceased registering their forensic accounting members; lack of formal recognition, admission or certification processes complicate identification of candidates; and diversity of the skills sets the industry requires has meant the influx of non-accounting based specialists.