781 resultados para watermarking protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects of intensive glycaemic control compared to conventional control on the outcome of foot ulcers in patients with type 1 and type 2 diabetes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Despite advancements in our understanding of the importance of stress reduction in achieving good health, we still only have limited insight into the impact of stress on cellular function. Recent studies have suggested that exposure to prolonged psychological stress may alter an individual's physiological responses, and contribute to morbidity and mortality. This paper presents an overview of the study protocol we are using to examine the impact of life stressors on lifestyle factors, health-related quality of life and novel and established biomarkers of stress in midlife and older Australian women.The primary aim of this study is to explore the links between chronic psychological stress on both subjective and objective health markers in midlife and older Australian women. The study examines the extent to which exposure frightening, upsetting or stressful events such as natural disasters, illness or death of a relative, miscarriage and relationship conflict is correlated with a variety of objective and subjective health markers.Methods/design: This study is embedded within the longitudinal Healthy Aging of Women's study which has collected data from midlife and older Australian women at 5 yearly intervals since 2001, and uses the Allostastic model of women's health by Groer and colleagues in 2010. The current study expands the focus of the HOW study and will assess the impact of life stressors on quality of life and clinical biomarkers in midlife and older Australian women to explain the impact of chronic psychological stress in women. DISCUSSION: The proposed study hypothesizes that women are at increased risk of exposure to multiple or repeated stressors, some being unique to women, and the frequency and chronicity of stressors increases women's risk of adverse health outcomes. This study aims to further our understanding of the relationships between stressful life experiences, perceived quality of life, stress biomarkers, chronic illness, and health status in women.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Falls are the most frequent adverse event reported in hospitals. Approximately 30% of in-hospital falls lead to an injury and up to 2% result in a fracture. A large randomised trial found that a trained health professional providing individualised falls prevention education to older inpatients reduced falls in a cognitively intact subgroup. This study aims to investigate whether this efficacious intervention can reduce falls and be clinically useful and cost-effective when delivered in the real-life clinical environment. Methods A stepped-wedge cluster randomised trial will be used across eight subacute units (clusters) which will be randomised to one of four dates to start the intervention. Usual care on these units includes patient's screening, assessment and implementation of individualised falls prevention strategies, ongoing staff training and environmental strategies. Patients with better levels of cognition (Mini-Mental State Examination >23/30) will receive the individualised education from a trained health professional in addition to usual care while patient's feedback received during education sessions will be provided to unit staff. Unit staff will receive training to assist in intervention delivery and to enhance uptake of strategies by patients. Falls data will be collected by two methods: case note audit by research assistants and the hospital falls reporting system. Cluster-level data including patient's admissions, length of stay and diagnosis will be collected from hospital systems. Data will be analysed allowing for correlation of outcomes (clustering) within units. An economic analysis will be undertaken which includes an incremental cost-effectiveness analysis. Ethics and dissemination The study was approved by The University of Notre Dame Australia Human Research Ethics Committee and local hospital ethics committees. Results The results will be disseminated through local site networks, and future funding and delivery of falls prevention programmes within WA Health will be informed. Results will also be disseminated through peer-reviewed publications and medical conferences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives To describe the intervention protocol for the first multilevel ecological intervention for physical activity in retirement communities that addresses individual, interpersonal and community influences on behavior change. Design A cluster randomized controlled trial design was employed with two study arms: a physical activity intervention and an attention control successful aging condition. Setting Sixteen continuing care retirement communities in San Diego County. Participants Three hundred twenty older adults, aged 65 years and older, are being recruited to participate in the trial. In addition, peer leaders are being recruited to lead some study activities, especially to sustain the intervention after study activities ceased. Intervention Participants in the physical activity trial receive individual, interpersonal and community intervention components. The individual level components include pedometers, goal setting and individual phone counseling. The interpersonal level components include group education sessions and peer-led activities. The community level components include resource audits and enumeration, tailored walking maps, and community improvement projects. The successful aging group receives individual and group attention about successful aging topics. Measurements The main outcome is light to moderate physical activity, measured objectively by accelerometry. Other objective outcomes included physical functioning, blood pressure, physical fitness, and cognitive functioning. Self report measures include depressive symptoms and health related quality of life. Results The intervention is being delivered successfully in the communities and compliance rates are high. Conclusion Ecological Models call for interventions that address multiple levels of the model. Previous studies have not included components at each level and retirement communities provide a model environment to demonstrate how to implement such an intervention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: The intense pain and anxiety triggered by burns and their associated wound care procedures are well established in the literature. Non-pharmacological intervention is a critical component of total pain management protocols and is used as an adjunct to pharmacological analgesia. An example is virtual reality, which has been used effectively to dampen pain intensity and unpleasantness. Possible links or causal relationships between pain/anxiety/stress and burn wound healing have previously not been investigated. The purpose of this study is to investigate these relationships, specifically by determining if a newly developed multi-modal procedural preparation and distraction device (Ditto) used during acute burn wound care procedures will reduce the pain and anxiety of a child and increase the rate of re-epithelialization. METHODS/DESIGN: Children (4 to 12 years) with acute burn injuries presenting for their first dressing change will be randomly assigned to either the (1) Control group (standard distraction) or (2) Ditto intervention group (receiving Ditto, procedural preparation and Ditto distraction). It is intended that a minimum of 29 participants will be recruited for each treatment group. Repeated measures of pain intensity, anxiety, stress and healing will be taken at every dressing change until complete wound re-epithelialization. Further data collection will aid in determining patient satisfaction and cost effectiveness of the Ditto intervention, as well as its effect on speed of wound re-epithelialization. DISCUSSION: Results of this study will provide data on whether the disease process can be altered by reducing stress, pain and anxiety in the context of acute burn wounds. TRIAL REGISTRATION: ACTRN12611000913976.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: In the paediatric population, pain and distress associated with burn injuries during wound care procedures remain a constant challenge. Although silver dressings are the gold standard for burn care in Australasia, very few high-level trials have been conducted that compare silver dressings to determine which will provide the best level of care clinically. Therefore, for paediatric patients in particular, identifying silver dressings that are associated with lower levels of pain and rapid wound re-epithelialisation is imperative. This study will determine whether there is a difference in time to re-epithelialisation and pain and distress experienced during wound care procedures among Acticoat, Acticoat combined with Mepitel and Mepilex Ag dressings for acute, paediatric partial thickness burns. METHODS/DESIGN: Children aged 0 to 15 years with an acute partial thickness (superficial partial to deep partial thickness inclusive) burn injury and a burn total body surface area of

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Globally, alcohol-related injuries cause millions of deaths and huge economic loss each year . The incidence of facial (jawbone) fractures in the Northern Territory of Australia is second only to Greenland, due to a strong involvement of alcohol in its aetiology, and high levels of alcohol consumption. The highest incidences of alcohol-related trauma in the Territory are observed amongst patients in the Maxillofacial Surgery Unit of the Royal Darwin Hospital. Accordingly, this project aims to introduce screening and brief interventions into this unit, with the aims of changing health service provider practice, improving access to care, and improving patient outcomes. Methods Establishment of Project Governance: The project governance team includes a project manager, project leader, an Indigenous Reference Group (IRG) and an Expert Reference Group (ERG). Development of a best practice pathway: PACT project researchers collaborate with clinical staff to develop a best practice pathway suited to the setting of the surgical unit. The pathway provides clear guidelines for screening, assessment, intervention and referral. Implementation: The developed pathway is introduced to the unit through staff training workshops and associate resources and adapted in response to staff feedback. Evaluation: File audits, post workshop questionnaires and semi-structured interviews are administered. Discussion This project allows direct transfer of research findings into clinical practice and can inform future hospital-based injury prevention strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects of education programmes for skin cancer prevention in the general population. Description of the condition Skin cancer is a term that includes both melanoma and keratinocyte cancer. Keratinocyte cancer (also known as nonmelanoma skin cancer) generally refers to basal cell carcinoma (BCC) and squamous cell carcinoma (SCC), although it also includes other rare cutaneous neoplasms (Madan 2010). Skin cancer is the most common cancer in populations of predominantly fair-skinned people (Donaldson 2011; Lomas 2012; Stern 2010), with incidence increasing (Garbe 2009; Leiter 2012). There are variations in annual incidence rates between these populations, with Australia reporting the highest rate of skin cancer in the world (Lomas 2012). In 2012, the estimated age-standardised incidence rate for melanoma was almost 63 per 100,000 people for Australian men, and 40 per 100,000 people for Australian women (AIHW 2012). In Europe, incidence rates range from 10 to 15 per 100,000 people (Garbe 2009; Lasithiotakis 2006), with rates highest amongst men (Stang 2006). In the United States, incidence rates are approximately 18 per 100,000 people (Garbe 2009),with the highest rates reported forwomen (Bradford 2010). Keratinocyte cancer is much more common than melanoma. In 2012, the estimated Australian age-standardised rates for BCCand SCC were 884 and 387 per 100,000 people, respectively (Staples 2006). The cumulative three-year risk of developing a subsequent keratinocyte cancer is 18% for SCC and 44% for BCC (Marcil 2000).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.