798 resultados para Prosthesis protocol
Resumo:
Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects of education programmes for skin cancer prevention in the general population. Description of the condition Skin cancer is a term that includes both melanoma and keratinocyte cancer. Keratinocyte cancer (also known as nonmelanoma skin cancer) generally refers to basal cell carcinoma (BCC) and squamous cell carcinoma (SCC), although it also includes other rare cutaneous neoplasms (Madan 2010). Skin cancer is the most common cancer in populations of predominantly fair-skinned people (Donaldson 2011; Lomas 2012; Stern 2010), with incidence increasing (Garbe 2009; Leiter 2012). There are variations in annual incidence rates between these populations, with Australia reporting the highest rate of skin cancer in the world (Lomas 2012). In 2012, the estimated age-standardised incidence rate for melanoma was almost 63 per 100,000 people for Australian men, and 40 per 100,000 people for Australian women (AIHW 2012). In Europe, incidence rates range from 10 to 15 per 100,000 people (Garbe 2009; Lasithiotakis 2006), with rates highest amongst men (Stang 2006). In the United States, incidence rates are approximately 18 per 100,000 people (Garbe 2009),with the highest rates reported forwomen (Bradford 2010). Keratinocyte cancer is much more common than melanoma. In 2012, the estimated Australian age-standardised rates for BCCand SCC were 884 and 387 per 100,000 people, respectively (Staples 2006). The cumulative three-year risk of developing a subsequent keratinocyte cancer is 18% for SCC and 44% for BCC (Marcil 2000).
Resumo:
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.
Resumo:
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.
Resumo:
Background Preliminary research shows ginger may be an effective adjuvant treatment for chemotherapy-induced nausea and vomiting but significant limitations need to be addressed before recommendations for clinical practice can be made. Methods/Design In a double–blinded randomised-controlled trial, chemotherapy-naïve patients will be randomly allocated to receive either 1.2 g of a standardised ginger extract or placebo per day. The study medication will be administrated as an adjuvant treatment to standard anti-emetic therapy and will be divided into four capsules per day, to be consumed approximately every 4 hours (300 mg per capsule administered q.i.d) for five days during the first three cycles of chemotherapy. Acute, delayed, and anticipatory symptoms of nausea and vomiting will be assessed over this time frame using a valid and reliable questionnaire, with nausea symptoms being the primary outcome. Quality of life, nutritional status, adverse effects, patient adherence, cancer-related fatigue, and CINV-specific prognostic factors will also be assessed. Discussion Previous trials in this area have noted limitations. These include the inconsistent use of standardized ginger formulations and valid questionnaires, lack of control for anticipatory nausea and prognostic factors that may influence individual CINV response, and the use of suboptimal dosing regimens. This trial is the first to address these issues by incorporating multiple unique additions to the study design including controlling for CINV-specific prognostic factors by recruiting only chemotherapy-naïve patients, implementing a dosing schedule consistent with the pharmacokinetics of oral ginger supplements, and independently analysing ginger supplements before and after recruitment to ensure potency. Our trial will also be the first to assess the effect of ginger supplementation on cancer-related fatigue and nutritional status. Chemotherapy-induced nausea and vomiting are distressing symptoms experienced by oncology patients; this trial will address the significant limitations within the current literature and in doing so, will investigate the effect of ginger supplementation as an adjuvant treatment in modulating nausea and vomiting symptoms. Trial registration
Resumo:
Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.
Resumo:
The first generation e-passport standard is proven to be insecure and prone to various attacks. To strengthen, the European Union (EU) has proposed an Extended Access Control (EAC) mechanism for e-passports that intends to provide better security in protecting biometric information of the e-passport bearer. But, our analysis shows, the EU proposal fails to address many security and privacy issues that are paramount in implementing a strong security mechanism. In this paper we propose an on-line authentication mechanism for electronic passports that addresses the weakness in existing implementations, of both The International Civil Aviation Organisation (ICAO) and EU. Our proposal utilises ICAO PKI implementation, thus requiring very little modifications to the existing infrastructure which is already well established.
Resumo:
MicroRNAs (miRNAs) are a class of small non-coding RNAs with a critical role in development and environmental responses. Efficient and reliable detection of miRNAs is an essential step towards understanding their roles in specific cells and tissues. However, gel-based assays currently used to detect miRNAs are very limited in terms of throughput, sensitivity and specificity. Here we provide protocols for detection and quantification of miRNAs by RT-PCR. We describe an end-point and real-time looped RT-PCR procedure and demonstrate detection of miRNAs from as little as 20 pg of plant tissue total RNA and from total RNA isolated from as little as 0.1 l of phloem sap. In addition, we have developed an alternative real-time PCR assay that can further improve specificity when detecting low abundant miRNAs. Using this assay, we have demonstrated that miRNAs are differentially expressed in the phloem sap and the surrounding vascular tissue. This method enables fast, sensitive and specific miRNA expression profiling and is suitable for facilitation of high-throughput detection and quantification of miRNA expression.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
Background Few cancers pose greater challenges than head and neck (H&N) cancer. Residual effects following treatment include body image changes, pain, fatigue and difficulties with appetite, swallowing and speech. Depression is a common comorbidity. There is limited evidence about ways to assist patients to achieve optimal adjustment after completion of treatment. In this study, we aim to examine the effectiveness and feasibility of a model of survivorship care to improve the quality of life of patients who have completed treatment for H&N cancer. Methods This is a preliminary study in which 120 patients will be recruited. A prospective randomised controlled trial of the H&N Cancer Survivor Self-management Care Plan (HNCP) involving pre- and post-intervention assessments will be used. Consecutive patients who have completed a defined treatment protocol for H&N cancer will be recruited from two large cancer services and randomly allocated to one of three study arms: (1) usual care, (2) information in the form of a written resource or (3) the HNCP delivered by an oncology nurse who has participated in manual-based training and skill development in patient self-management support. The trained nurses will meet patients in a face-to-face interview lasting up to 60 minutes to develop an individualised HNCP, based on principles of chronic disease self-management. Participants will be assessed at baseline, 3 and 6 months. The primary outcome measure is quality of life. The secondary outcome measures include mood, self-efficacy and health-care utilisation. The feasibility of implementing this intervention in routine clinical care will be assessed through semistructured interviews with participating nurses, managers and administrators. Interviews with patients who received the HNCP will explore their perceptions of the HNCP, including factors that assisted them in achieving behavioural change. Discussion In this study, we aim to improve the quality of life of a patient population with unique needs by means of a tailored self-management care plan developed upon completion of treatment. Delivery of the intervention by trained oncology nurses is likely to be acceptable to patients and, if successful, will be a model of care that can be implemented for diverse patient populations.
Resumo:
Review question/objective What are the most effective information sharing strategies used to reduce anxiety in families of patients undergoing elective surgery? This review seeks to synthesize the best available evidence in relation to the most effective information-sharing intervention to reduce anxiety for families waiting for patients undergoing an elective surgical procedure. The specific objectives are to review the effectiveness of evidence of interventions designed to reduce the anxiety of families waiting whilst their loved one undergoes a surgical intervention. A variety of interventions exist and include surgical nurse liaison services, intraoperative reporting either by face-to-face or telephone delivery, informational cards, visual information screens, and intraoperative paging devices for families. Inclusion criteria Types of participants All studies of family members over 18 years of age waiting for patients undergoing an elective surgical procedure will be included, including those waiting for both adult and paediatric patients. Studies of families waiting for other patient populations, eg emergency surgery, chemotherapy or intensive care patients will be excluded. Types of intervention(s)/phenomena of interest All information-sharing Interventions for families of patients undergoing an elective surgical procedure will be included, including but not limited to: surgical nurse liaison services, in-person intraoperative reporting, visual information screens, paging devices, informational cards and telephone delivery of intraoperative progress reports. Interventions that take place during the intraoperative phase of care only will be included in the review. Preadmission information sharing interventions will be excluded. Types of outcomes The outcomes of interest include: Primary outcome: the level of anxiety amongst family members or close relatives whilst waiting for patients undergoing surgery, as measured by a validated instrument (such as the S-Anxiety portion of the State-Trait Anxiety Inventory).4 Secondary outcomes: family satisfaction and other measurements that may be considered indicators of stress and anxiety, such as mean arterial pressure (MAP) and heart rate.
Resumo:
Aim To evaluate emergency nurse practitioner service effectiveness on outcomes related to quality of care and service responsiveness. Background Increasing service pressures in the emergency setting have resulted in the adoption of service innovation models; the most common and rapidly expanding of these is the emergency nurse practitioner. The delivery of high quality patient care in the emergency department is one of the most important service indicators to be measured in health services today. The rapid uptake of emergency nurse practitioner service in Australia has outpaced the capacity to evaluate this model in outcomes related to safety and quality of patient care. Design Pragmatic randomized controlled trial at one site with 260 participants. Methods This protocol describes a definitive prospective randomized controlled trial, which will examine the impact of emergency nurse practitioner service on key patient care and service indicators. The study control will be standard emergency department care. The intervention will be emergency nurse practitioner service. The primary outcome measure is pain score reduction and time to analgesia. Secondary outcome measures are waiting time, number of patients who did not wait, length of stay in the emergency department and representations within 48 hours. Discussion Scant research enquiry evaluating emergency nurse practitioner service on patient effectiveness and service responsiveness exists currently. This study is a unique trial that will test the effectiveness of the emergency nurse practitioner service on patients who present to the emergency department with pain. The research will provide an opportunity to further evaluate emergency nurse practitioner models of care and build research capacity into the workforce.
Resumo:
Background In 2002/03 the Queensland Government responded to high rates of alcohol-related harm in discrete Indigenous communities by implementing alcohol management plans (AMPs), designed to include supply and harm reduction and treatment measures. Tighter alcohol supply and carriage restrictions followed in 2008 following indications of reductions in violence and injury. Despite the plans being in place for over a decade, no comprehensive independent review has assessed to what level the designed aims were achieved and what effect the plans have had on Indigenous community residents and service providers. This study will describe the long-term impacts on important health, economic and social outcomes of Queensland’s AMPs. Methods/Design The project has two main studies, 1) outcome evaluation using de-identified epidemiological data on injury, violence and other health and social indicators for across Queensland, including de-identified databases compiled from relevant routinely-available administrative data sets, and 2) a process evaluation to map the nature, timing and content of intervention components targeting alcohol. Process evaluation will also be used to assess the fidelity with which the designed intervention components have been implemented, their uptake and community responses to them and their perceived impacts on alcohol supply and consumption, injury, violence and community health. Interviews and focus groups with Indigenous residents and service providers will be used. The study will be conducted in all 24 of Queensland’s Indigenous communities affected by alcohol management plans. Discussion This evaluation will report on the impacts of the original aims for AMPs, what impact they have had on Indigenous residents and service providers. A central outcome will be the establishment of relevant databases describing the parameters of the changes seen. This will permit comprehensive and rigorous surveillance systems to be put in place and provided to communities empowering them with the best credible evidence to judge future policy and program requirements for themselves. The project will inform impending alcohol policy and program adjustments in Queensland and other Australian jurisdictions. The project has been approved by the James Cook University Human Research Ethics Committee (approval number H4967 & H5241).
Resumo:
The 1967 Protocol Relating to the Status of Refugees has been described as an unnecessary addendum to the 1951 Convention Relating to the Status of Refugees. However, if the 1967 Protocol was superfluous, why did the United Nations High Commissioner for Refugees in the early 1960s insist on its development? This article seeks to establish that the 1967 Protocol was originally intended to encompass the broader concerns of African and Asian states concerning refugee populations in their region. However, the political influence upon the development of international refugee law radically altered the UNHCR's endeavour to make the 1951 Convention universally accessible.
Resumo:
Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.