996 resultados para Anthropometric Compliance Tools.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background
Error in self-reported measures of obesity has been frequently described, but the effect of self-reported error on recruitment into diabetes prevention programs is not well established. The aim of this study was to examine the effect of using self-reported obesity data from the Finnish diabetes risk score (FINDRISC) on recruitment into the Greater Green Triangle Diabetes Prevention Project (GGT DPP).

Methods
The GGT DPP was a structured group-based lifestyle modification program delivered in primary health care settings in South-Eastern Australia. Between 2004–05, 850 FINDRISC forms were collected during recruitment for the GGT DPP. Eligible individuals, at moderate to high risk of developing diabetes, were invited to undertake baseline tests, including anthropometric measurements performed by specially trained nurses. In addition to errors in calculating total risk scores, accuracy of self-reported data (height, weight, waist circumference (WC) and Body Mass Index (BMI)) from FINDRISCs was compared with baseline data, with impact on participation eligibility presented.

Results
Overall, calculation errors impacted on eligibility in 18 cases (2.1%). Of n = 279 GGT DPP participants with measured data, errors (total score calculation, BMI or WC) in self-report were found in n = 90 (32.3%). These errors were equally likely to result in under- or over-reported risk. Under-reporting was more common in those reporting lower risk scores (Spearman-rho = −0.226, p-value < 0.001). However, underestimation resulted in only 6% of individuals at high risk of diabetes being incorrectly categorised as moderate or low risk of diabetes.

Conclusions
Overall FINDRISC was found to be an effective tool to screen and recruit participants at moderate to high risk of diabetes, accurately categorising levels of overweight and obesity using self-report data. The results could be generalisable to other diabetes prevention programs using screening tools which include self-reported levels of obesity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents research into the attitudes and behaviours of students using wikis for individual writing tasks. The wiki-based assignment differs from the use of wikis normally researched because it was an individual task, not involving collaborative writing. This activity provides an excellent opportunity to learn more about how wikis are actually used by students in higher education. The research finds there is no compelling evidence that the wiki on its own improves performance over and above the general aptitude of students. It also finds that students generally did not utilise the wikis for high-intensity editing and revision. However, students did report that the wiki was valuable as a way of aiding them to review and develop their ideas. We conclude that using wikis for individual writing tasks can, where appropriate active instructions are given to support development of cognitive abilities, lead to improved outcomes for students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Web 2.0 tools, while mobilising citizens to make informed choices, may also manipulated public opinion. This hypothesis forms the central theme of this research investigation through the historiography lens. Based on concurrent research from decade, the authors take a closer look at citizen-to-citizen engagement, so as to trace the role of web 2.0 tools, in perhaps manipulating public opinion or enabling democratic governance through reversal of some existing defects in the Indian context. Specifically, they raise these questions: Has ICT enabled civic engagement manipulated public opinion in this developing democracy? Has it succeeded in reversing apparent defects in the electoral system, which is regarded pivotal in democracies? Focusing on the elections, the authors present a synopsis of the use of web 2.0 tools which were seemingly efficiently and prolifically used during the elections albeit to reach out to the large population base in this country.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main aim of this chapter is to provide an introduction to the theoretical work of Pierre Bourdieu, and to outline different ways in which Bourdieu’s work is influential and has been engaged with in education research and to suggest implicitly the usefulness of this work for educational researchers. In order to do this, we draw on a range of Bourdieu’s own writing published singly or with colleagues, emphasising in particular his engagements with education. Part of our treatment also deals with his wider writing that has subsequently been influential for education researchers, and in particular Bourdieu’s anthropological writing and account of practice (Bourdieu 1977, 1990), his approach to social class and cultural issues, his account of the judgement of taste and distinctions (Bourdieu, 1984), and his later politically focused writing (Bourdieu, 1989/1996, 2003, 2004c, 2005a).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Personal Area Networks provide a pivotal role in local area network technology complementing traditional Wireless Local Area Network technologies. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged as key WPAN technologies with UWB (Ultra Wide Band) standards currently evolving. They are however subject to the usual range of security vulnerabilities found in wireless LANs such as spoofing, snooping, man-in-the-middle, denial of service and other attacks. However security in WPANs is not as mature as it is in Wireless LANs and further work is needed in order to provide comparable protection. This paper examines a range of WPAN technologies and security issues and proposes protection mechanisms that can mitigate risk in each case. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic-particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas such as malware and network attack detection; IP traceback and honeypots; and intrusion detection. Further, the paper addresses new and emerging areas of network forensic development which include critical infrastructure forensics, wireless network forensics, as well as its application to social networking. © 2012 IEEE.