946 resultados para National Institute on Aging.
Resumo:
Worldwide, there are few large-scale epidemiological studies on infertility. In Australia, population-based research on infertility is limited to a few small-scale studies. Therefore, the prevalence of infertility and unmet need for specialist medical advice and treatment cannot be estimated reliably. Women who have used assisted reproductive technologies (ART) are recorded in treatment registries. However, there are many infertile women who are excluded from these clinical populations because they neither seek advice nor use treatment. The thesis was based on a biopsychosocial model of health and used the methods of reproductive epidemiology to address the lack of national data on the prevalence of infertility in Australia. Firstly, numbers of births and pregnancy losses were investigated in two generations of women participating in the Australian Longitudinal Study on Women’s Health (ALSWH). The ALSWH is a broad-ranging, longitudinal examination of biological, psychological and social factors that impact on women’s health and wellbeing. Women from three age cohorts were randomly sampled from the population using the universal public health insurance (i.e., Medicare) database and ALSWH participants were representative of the female population. However, the studies in the thesis only involved data from two cohorts. The younger cohort were born in 1973-78 and completed up to four mailed surveys between 1996 (when they were aged 18-23 years, n=14247) and 2006 (28-33 years, n=9145). The mid-aged cohort were born in 1946-51 and completed four mailed surveys between 1996 (when they were aged 45-50 years n=13715) and 2004 (53-58 years, n=10905). Compared to other studies that focus on outcomes of single pregnancies, these studies included all pregnancy outcomes by developing comprehensive reproductive histories for each woman. Pregnancy outcomes included birth, miscarriage, stillbirth, termination and ectopic pregnancy. Women in the youngest cohort (born in 1973-78) were only just reaching their peak childbearing years and many (44%) had yet to report their first pregnancy outcome. Women from the mid-aged cohort (born 1946-51) had completed their reproductive lives and 92% were able to report on their lifetime pregnancy outcomes. Pregnancy losses, especially miscarriage, were common for both generations of women. Secondly, the prevalence of infertility, seeking medical advice and using treatment was identified for these two generations of women. For the older generation, the lifetime prevalence of infertility and demand for treatment was investigated in the context of the specialist medical services which became available circa 1980. By this time, however, most of these older women had already been pregnant and completed their families. For women who experienced infertility (11%), their options for advice and treatment were limited and less than half (42%) had used any treatment. More recently for the younger generation of women, who were aged 28-33 years in 2006, specialist advice and treatment were extensively available. Among women who had tried to conceive or had been pregnant (n=5936), 17% had experienced infertility and the majority (72%) were able to access medical advice. However, after seeking advice only half of these infertile women had used treatment with fertility hormones or in vitro fertilisation (IVF). Overall for infertile women aged up to 33 years, only one-third had used these treatments. Thirdly, the barriers to accessing medical advice and using treatment for infertility were identified for women aged less than 34 years. Among a community sample of infertile women aged 28-33 years (ALSWH participants), self-reported depression was found to be a barrier to accessing medical advice. The characteristics of these infertile women in the community who had (n=121) or had not (n=110) used treatment were compared to infertile women aged 27-33 years (n=59) attending four fertility clinics. Compared to infertile women in the community, living in major cities and having private health insurance were associated with early use of treatment for infertility at specialist clinics by women aged <34 years. In contrast to most clinical studies of IVF, the final study reported in the thesis took into account repeated IVF cycles and the impact of women’s individual histories on IVF outcomes. Among 121 infertile women (aged 27-46 years) who had 286 IVF cycles, older age and prolonged use of the oral contraceptive pill were associated with fewer eggs collected. Further, women in particular occupations had lower proportions of eggs fertilised normally than women in other occupational groups. These studies form the first large-scale epidemiological examination of infertility in Australia. The finding that two-thirds of women with infertility had not used treatment indicates that there is an unmet need for specialist treatment in women aged less than 34 years. However, barriers to accessing treatment prevent women using ART at a younger age when there is a higher chance of pregnancy.
Resumo:
The Australian e-Health Research Centre and Queensland University of Technology recently participated in the TREC 2012 Medical Records Track. This paper reports on our methods, results and experience using an approach that exploits the concept and inter-concept relationships defined in the SNOMED CT medical ontology. Our concept-based approach is intended to overcome specific challenges in searching medical records, namely vocabulary mismatch and granularity mismatch. Queries and documents are transformed from their term-based originals into medical concepts as defined by the SNOMED CT ontology, this is done to tackle vocabulary mismatch. In addition, we make use of the SNOMED CT parent-child `is-a' relationships between concepts to weight documents that contained concept subsumed by the query concepts; this is done to tackle the problem of granularity mismatch. Finally, we experiment with other SNOMED CT relationships besides the is-a relationship to weight concepts related to query concepts. Results show our concept-based approach performed significantly above the median in all four performance metrics. Further improvements are achieved by the incorporation of weighting subsumed concepts, overall leading to improvement above the median of 28% infAP, 10% infNDCG, 12% R-prec and 7% Prec@10. The incorporation of other relations besides is-a demonstrated mixed results, more research is required to determined which SNOMED CT relationships are best employed when weighting related concepts.
Resumo:
• The Queensland context • Rationale and aims • Method • Demographics and basic data • Avoidance of driving and walking situations • Success of intended avoidance • Further analyses (preliminary results) • Implications
Resumo:
This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.
Resumo:
Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.
Resumo:
BACKGROUND: Although many studies have shown that high temperatures are associated with an increased risk of mortality and morbidity, there has been little research on managing the process of planned adaptation to alleviate the health effects of heat events and climate change. In particular, economic evaluation of public health adaptation strategies has been largely absent from both the scientific literature and public policy discussion. OBJECTIVES: his paper aims to discuss how public health organizations should implement adaptation strategies, and how to improve the evidence base for policies to protect health from heat events and climate change. DISCUSSION: Public health adaptation strategies to cope with heat events and climate change fall into two categories: reducing the heat exposure and managing the health risks. Strategies require a range of actions, including timely public health and medical advice, improvements to housing and urban planning, early warning systems, and the assurance that health care and social systems are ready to act. Some of these actions are costly, and the implementation should be based on the cost-effectiveness analysis given scarce financial resources. Therefore, research is required not only on the temperature-related health costs, but also on the costs and benefits of adaptation options. The scientific community must ensure that the health co-benefits of climate change policies are recognized, understood and quantified. CONCLUSIONS: The integration of climate change adaptation into current public health practice is needed to ensure they increase future resilience. The economic evaluation of temperature-related health costs and public health adaptation strategies are particularly important for policy decisions.
Resumo:
For the evaluation, design, and planning of traffic facilities and measures, traffic simulation packages are the de facto tools for consultants, policy makers, and researchers. However, the available commercial simulation packages do not always offer the desired work flow and flexibility for academic research. In many cases, researchers resort to designing and building their own dedicated models, without an intrinsic incentive (or the practical means) to make the results available in the public domain. To make matters worse, a substantial part of these efforts pertains to rebuilding basic functionality and, in many respects, reinventing the wheel. This problem not only affects the research community but adversely affects the entire traffic simulation community and frustrates the development of traffic simulation in general. For this problem to be addressed, this paper describes an open source approach, OpenTraffic, which is being developed as a collaborative effort between the Queensland University of Technology, Australia; the National Institute of Informatics, Tokyo; and the Technical University of Delft, the Netherlands. The OpenTraffic simulation framework enables academies from geographic areas and disciplines within the traffic domain to work together and contribute to a specific topic of interest, ranging from travel choice behavior to car following, and from response to intelligent transportation systems to activity planning. The modular approach enables users of the software to focus on their area of interest, whereas other functional modules can be regarded as black boxes. Specific attention is paid to a standardization of data inputs and outputs for traffic simulations. Such standardization will allow the sharing of data with many existing commercial simulation packages.
Resumo:
To execute good design one not only needs to know what to do and how to do it, but also why it should be done. For a standardization expert the rationale of a standardization project may be found in the proposal for a new work item or terms of reference, but rarely in the scope statement. However, it is also commonplace that the rationale of the project is not clearly stated in any of these parts. If the rationale is not surfaced in the early phases of a project, it is left to the design, sense-making and negotiation cycles of the design process to orient the project towards a goal. This paper explores how scope statements are used to position standardization projects in the IT for Learning, Education and Training (ITLET) domain, and how scope and rationale are understood in recent projects in European and international standardization. Based on two case-studies the paper suggests some actions for further research and improvement of the process.
Resumo:
Theoretical Background and research questions/hypothesis: Recently, throughout Australasia, humorous appeals have become implemented increasingly in health advertising despite limited evidence regarding the persuasiveness of different types of humour. Of those studies available which have examined the persuasiveness of humorous messages, the type of humour is often not defined so it is unclear what type of humour is being examined. Speck’s (1991) typology includes five types of humour; comic wit, sentimental humour, satire, sentimental comedy, and full comedy. Each type of humour is based on one or more humour generation processes; namely, incongruity-resolution, disparagement humour, and arousal-safety. It has been acknowledged that more research is needed to determine the relative persuasiveness of these different types of humour and to identify those types which may be most effective for health advertising. The current research explored individuals’ thoughts about, and their responses to some different types of, humorous messages addressing the serious health topic of road safety. Methods: A preliminary qualitative, study was conducted involving discussions with licensed drivers (N = 18) regarding their thoughts and feelings about humorous road safety messages in general as well as in response to some (5 in total) pre-existing advertisements. Men (n = 10) and women of younger and older age groups (17-24 or 25+ years) participated in one of six discussions. Participants were recruited from an existing community-based database held by the authors’ Research Centre or were approached directly on the university campus. Ethical approval was gained for the study. Each participant was offered $AUD40. A semi-structured interview schedule guided the discussion (e.g., was it humorous?, would this ad influence you?). Audio-recordings of the discussions were professionally transcribed and the transcripts were analysed using thematic analysis. Results: The findings revealed that, irrespective of age and gender, humour that was clever, incorporated something unexpected and contrasting with the everyday, was a preferred and relevant approach, thus aligning with incongruity-based theories of humour generation and humour types, such as comic wit and satire. As a persuasive function, humorous messages were considered likely to be talked about (and relatively more so than traditional fear-based approaches). Participants also felt that humorous messages would need to be used cautiously as humour that was considered inappropriate and/or associated with serious occurrences, such as a crash, would be unlikely to persuade. Conclusions: The findings highlight some of the potential benefits of using humour, such as increasing the extent to which an advertisement is talked about as well as the types of humour which may be effective in this context. Implications for research and/or practice: While this research has provided important insight, future research which quantitatively assesses the persuasive effects of different types of humorous road safety messages within a larger, representative sample is needed. This current study has highlighted some humorous approaches which may hold persuasive promise in encouraging individuals to adopt safer attitudes and behaviours not only on the road, but in relation to serious health issues more broadly.
Resumo:
This professional doctorate included a major research project investigating the efficacy of acting methodologies taught at four leading Australian actor-training institutions - National Institute of Dramatic Art, Queensland University of Technology, Victorian College of the Arts, and Western Australian Academy of Performing Arts. This study represents the first review of its kind, in which the 'castability' of acting graduates from each of these schools was scrutinized by industry leaders. The study not only reveals the methodologies and philosophies of each school but determines an ideal set of practices for future consideration. The doctorate also included two practice-led projects examining the candidate's transition from actor and teacher of actors to theatre director. The candidate's qualitative study was also underpinned by reflective practice on her extensive professional experience as actor, teacher and director.
Resumo:
The topic of “the cloud” has attracted significant attention throughout the past few years (Cherry 2009; Sterling and Stark 2009) and, as a result, academics and trade journals have created several competing definitions of “cloud computing” (e.g., Motahari-Nezhad et al. 2009). Underpinning this article is the definition put forward by the US National Institute of Standards and Technology, which describes cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Garfinkel 2011, p. 3). Despite the lack of consensus about definitions, however, there is broad agreement on the growing demand for cloud computing. Some estimates suggest that spending on cloudrelated technologies and services in the next few years may climb as high as USD 42 billion/year (Buyya et al. 2009).
Resumo:
In the latter half of the nineteenth century the railway became an emblem of technological advancement, stood for the improvement and progression of European life, and became a recognizable symbol for the achievements of governments and citizens. The implementation and use of the railway became closely linked with notions of national identity and character. The railway became an identifiable artefact in official history but at the same time it became a part of everyday life. Richard Flanagan’s Gould’s Book of Fish retells the life-story of a fictionalized convict sent to Sarah Island and who paints fish, eventually he metamorphoses into one. It could be thought that a novel set in convict times would have little to do with notions of national identity, technological advancement, and railway travel. However, Richard Flanagan, in this very complex, almost surreal, novel, has used the construction of a fictional national railway as one of the ways to explore Australia's complex relationship with history and space. The novel tells of the plans of a history-loving Commandant and his desire to build a national railway on Sarah Island. This paper explores how Sarah Island becomes a metonym for Australia as a whole and Flanagan's novel takes on a metaphysical dimension as he reveals the struggles that emerge when official history collides with non-official versions. The fabulations of the novel contribute to an historical reconstruction of the spatial/architectural history of the Tasmanian colonial project.
Resumo:
This exploratory enquiry employs qualitative methods to advance knowledge and understanding of physical environmental attributes related to active living among residents of Australian retirement villages. Six focus groups (n = 51 residents) were held and participants described how their current, and subsequently ideal, retirement village and neighborhood supported active lifestyles. Thematic analysis revealed three key environmental factors associated with active living: a positive social environment within the village; services and facilities provided in the village and wider neighborhood; and the presence of suitable pedestrian infrastructure. The unique discovery that environmental factors of both the retirement village and the surrounding neighborhood were associated with residents’ active living raises many questions for study. Findings informed the development of a survey instrument, and further understanding in this area has the potential to contribute to the design and siting practices of senior housing complexes within neighborhoods.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
Background Prevention strategies are critical to reduce infection rates in total joint arthroplasty (TJA), but evidence-based consensus guidelines on prevention of surgical site infection (SSI) remain heterogeneous and do not necessarily represent this particular patient population. Questions/Purposes What infection prevention measures are recommended by consensus evidence-based guidelines for prevention of periprosthetic joint infection? How do these recommendations compare to expert consensus on infection prevention strategies from orthopedic surgeons from the largest international tertiary referral centers for TJA? Patients and Methods A review of consensus guidelines was undertaken as described by Merollini et al. Four clinical guidelines met inclusion criteria: Centers for Disease Control and Prevention's, British Orthopedic Association, National Institute of Clinical Excellence's, and National Health and Medical Research Council's (NHMRC). Twenty-eight recommendations from these guidelines were used to create an evidence-based survey of infection prevention strategies that was administered to 28 orthopedic surgeons from members of the International Society of Orthopedic Centers. The results between existing consensus guidelines and expert opinion were then compared. Results Recommended strategies in the guidelines such as prophylactic antibiotics, preoperative skin preparation of patients and staff, and sterile surgical attire were considered critically or significantly important by the surveyed surgeons. Additional strategies such as ultraclean air/laminar flow, antibiotic cement, wound irrigation, and preoperative blood glucose control were also considered highly important by surveyed surgeons, but were not recommended or not uniformly addressed in existing guidelines on SSI prevention. Conclusion Current evidence-based guidelines are incomplete and evidence should be updated specifically to address patient needs undergoing TJA.