991 resultados para Security protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acute lung injury is a common, devastating clinical syndrome associated with substantial mortality and morbidity with currently no proven therapeutic interventional strategy to improve patient outcomes. The objectives of this study are to test the potential therapeutic effects of keratinocyte growth factor for patients with acute lung injury on oxygenation and biological indicators of acute inflammation, lung epithelial and endothelial function, protease:antiprotease balance, and lung extracellular matrix degradation and turnover.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows:

Primary objective: To assess the effects of interventions to delay or treat osteoporosis in DMD patients treated with glucocorticoid steroids.

Secondary objectives: To assess the effects of interventions to delay or treat osteoporosis in DMD on the frequency of vertebral fragility fractures and long bone fractures in DMD patients treated with glucocorticoid steroids.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Going beyond the association between youth exposure to political violence and psychopathology, the current article examines within-person change in youth strength of identity with their ethno-political group and youth reports of the insecurity in their communities. Conceptually related but growing out of different paradigms, both group identity and emotional insecurity have been examined as key variables impacting youth responses to threats from other group members. The goal of the current study is to review previous studies examining these two key variables and to contribute new analyses, modeling within-person change in both variables and examining covariation in their growth. The current article uses data from 823 Belfast adolescents over 4 years. The results suggest youth are changing linearly over age in both constructs and that there are ethno-political group differences in how youth are changing. The results also indicate that change in insecurity is related to strength of identity at age 18, and strength of identity and emotional insecurity are related at age 18. Implications and directions for future work in the area of youth and political violence are discussed. © 2014 American Psychological Association.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Following discharge home from the ICU, patients often suffer from reduced physical function, exercise capacity, health-related quality of life and social functioning. There is usually no support to address these longer term problems, and there has been limited research carried out into interventions which could improve patient outcomes. The aim of this study is to investigate the effectiveness and cost-effectiveness of a 6-week programme of exercise on physical function in patients discharged from hospital following critical illness compared to standard care.

Methods/Design: The study design is a multicentre prospective phase II, allocation-concealed, assessor-blinded, randomised controlled clinical trial. Participants randomised to the intervention group will complete three exercise sessions per week (two sessions of supervised exercise and one unsupervised session) for 6 weeks. Supervised sessions will take place in a hospital gymnasium or, if this is not possible, in the participants home and the unsupervised session will take place at home. Blinded outcome assessment will be conducted at baseline after hospital discharge, following the exercise intervention, and at 6 months following baseline assessment (or equivalent time points for the standard care group). The primary outcome measure is physical function as measured by the physical functioning subscale of the Short-Form-36 health survey following the exercise programme. Secondary outcomes are health-related quality of life, exercise capacity, anxiety and depression, self efficacy to exercise and healthcare resource use. In addition, semi-structured interviews will be conducted to explore participants’ perceptions of the exercise programme, and the feasibility (safety, practicality and acceptability) of providing the exercise programme will be assessed. A within-trial cost-utility analysis to assess the cost-effectiveness of the intervention compared to standard care will also be conducted.

Discussion: If the exercise programme is found to be effective, this study will improve outcomes that are meaningful to patients and their families. It will inform the design of a future multicentre phase III clinical trial of exercise following recovery from critical illness. It will provide useful information which will help the development of services for patients after critical illness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

African coastal regions are expected to experience the highest rates of population growth in coming decades. Fresh groundwater resources in the coastal zone of East Africa (EA) are highly vulnerable to seawater intrusion. Increasing water demand is leading to unsustainable and ill-planned well drilling and abstraction. Wells supplying domestic, industrial and agricultural needs are or have become, in many areas, too saline for use. Climate change, including weather changes and sea level rise, is expected to exacerbate this problem. The multiplicity of physical, demographic and socio-economic driving factors makes this a very challenging issue for management. At present the state and probable evolution of coastal aquifers in EA are not well documented. The UPGro project 'Towards groundwater security in coastal East Africa' brings together teams from Kenya, Tanzania, Comoros Islands and Europe to address this knowledge gap. An integrative multidisciplinary approach, combining the expertise of hydrogeologists, hydrologists and social scientists, is investigating selected sites along the coastal zone in each country. Hydrogeologic observatories have been established in different geologic and climatic settings representative of the coastal EA region, where focussed research will identify the current status of groundwater and identify future threats based on projected demographic and climate change scenarios. Researchers are also engaging with end users as well as local community and stakeholder groups in each area in order to understanding the issues most affecting the communities and searching sustainable strategies for addressing these.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In wireless networks, the broadcast nature of the propagation medium makes the communication process vulnerable to malicious nodes (e.g. eavesdroppers) which are in the coverage area of the transmission. Thus, security issues play a vital role in wireless systems. Traditionally, information security has been addressed in the upper layers (e.g. the network layer) through the design of cryptographic protocols. Cryptography-based security aims to design a protocol such that it is computationally prohibitive for the eavesdropper to decode the information. The idea behind this approach relies on the limited computational power of the eavesdroppers. However, with advances in emerging hardware technologies, achieving secure communications relying on protocol-based mechanisms alone become insufficient. Owing to this fact, a new paradigm of secure communications has been shifted to implement the security at the physical layer. The key principle behind this strategy is to exploit the spatial-temporal characteristics of the wireless channel to guarantee secure data transmission without the need of cryptographic protocols.