997 resultados para electronic signatures
Resumo:
We have taken a new method of calibrating portal images of IMRT beams and used this to measure patient set-up accuracy and delivery errors, such as leaf errors and segment intensity errors during treatment. A calibration technique was used to remove the intensity modulations from the images leaving equivalent open field images that show patient anatomy that can be used for verification of the patient position. The images of the treatment beam can also be used to verify the delivery of the beam in terms of multileaf collimator leaf position and dosimetric errors. A series of controlled experiments delivering an IMRT anterior beam to the head and neck of a humanoid phantom were undertaken. A 2mm translation in the position of the phantom could be detected. With intentional introduction of delivery errors into the beam this method allowed us to detect leaf positioning errors of 2mm and variation in monitor units of 1%. The method was then applied to the case of a patient who received IMRT treatment to the larynx and cervical nodes. The anterior IMRT beam was imaged during four fractions and the images calibrated and investigated for the characteristic signs of patient position error and delivery error that were shown in the control experiments. No significant errors were seen. The method of imaging the IMRT beam and calibrating the images to remove the intensity modulations can be a useful tool in verifying both the patient position and the delivery of the beam.
Resumo:
Background Knowledge of current trends in nurse-administered procedural sedation and analgesia (PSA) in the cardiac catheterisation laboratory (CCL) may provide important insights into how to improve safety and effectiveness of this practice. Objective To characterise current practice as well as education and competency standards regarding nurse-administered PSA in Australian and New Zealand CCLs. Design A quantitative, cross-sectional, descriptive survey design was used. Methods Data were collected using a web-based questionnaire on practice, educational standards and protocols related to nurse-administered PSA. Descriptive statistics were used to analyse data. Results A sample of 62 nurses, each from a different CCL, completed a questionnaire that focused on PSA practice. Over half of the estimated total number of CCLs in Australia and New Zealand was represented. Nurse-administered PSA was used in 94% (n = 58) of respondents CCLs. All respondents indicated that benzodiazepines, opioids or a combination of both is used for PSA (n = 58). One respondent indicated that propofol was also used. 20% (n = 12) indicated that deep sedation is purposefully induced for defibrillation threshold testing and cardioversion without a second medical practitioner present. Sedation monitoring practices vary considerably between institutions. 31% (n = 18) indicated that comprehensive education about PSA is provided. 45% (n = 26) indicated that nurses who administer PSA should undergo competency assessment. Conclusion By characterising nurse-administered PSA in Australian and New Zealand CCLs, a baseline for future studies has been established. Areas of particular importance to improve include protocols for patient monitoring and comprehensive PSA education for CCL nurses in Australia and New Zealand.
Resumo:
Class E Resonant Inverters are theoretically capable of delivering any power to a load and achieve 100% efficiency at any frequency of operation. In practice efficiency in the “high 90's” can be achieved into megahertz frequencies regardless of inverter output powers. The topology also allows the manipulation of output power through sub-optimal operation, with a negligible efficiency penalty. The 24W inverter discussed in this paper was specifically designed to harness the benefits, and discuss the shortcomings, of the Class E topology for use in the growing market for portable, battery powered lighting. It exhibits a peak recorded power efficiently of over 98%, and a conservatively measured efficiency of 95% across a range of dimming settings.
Resumo:
Information privacy is a critical success/failure factor in information technology supported healthcare (eHealth). eHealth systems utilise electronic health records (EHR) as the main source of information, thus, implementing appropriate privacy preserving methods for EHRs is vital for the proliferation of eHealth. Whilst information privacy may be a fundamental requirement for eHealth consumers, healthcare professionals demand non-restricted access to patient information for improved healthcare delivery, thus, creating an environment where stakeholder requirements are contradictory. Therefore, there is a need to achieve an appropriate balance of requirements in order to build successful eHealth systems. Towards achieving this balance, a new genre of eHealth systems called Accountable-eHealth (AeH) systems has been proposed. In this paper, an access control model for EHRs is presented that can be utilised by AeH systems to create information usage policies that fulfil both stakeholders’ requirements. These policies are used to accomplish the aforementioned balance of requirements creating a satisfactory eHealth environment for all stakeholders. The access control model is validated using a Web based prototype as a proof of concept.
Resumo:
Voltammetric techniques have been introduced to monitor the formation of gold nanoparticles produced via the reaction of the amino acid glycyl-L-tyrosine with Au(III) (bromoaurate) in 0.05 M KOH conditions. The alkaline conditions facilitate amino acid binding to Au(III), inhibit the rate of reduction to Au(0), and provide an excellent supporting electrolyte for voltammetric studies. Data obtained revealed that a range of time-dependent gold solution species are involved in gold nanoparticle formation and that the order in which reagents are mixed is critical to the outcome. Concomitantly with voltammetric measurements, the properties of gold nanoparticles formed are probed by examination of electronic spectra in order to understand how the solution environment present during nanoparticle growth affects the final distribution of the nanoparticles. Images obtained by the ex situ transmission electron microscopy (TEM) technique enable the physical properties of the nanoparticles isolated in the solid state to be assessed. Use of this combination of in situ and ex situ techniques provides a versatile framework for elucidating the details of nanoparticle formation.
Resumo:
Gambling activities and the revenues derived have been seen as a way to increase economic development in deprived areas. There are also, however, concerns about the effects of gambling in general and electronic gaming machines (EGMs) in particular, on the resources available to the localities in which they are situated. This paper focuses on the factors that determine the extent and spending of community benefit-related EGM-generated resources within Victoria, Australia, focusing in particular on the relationships between EGM activity and socio-economic and social capital indicators, and how this relates to the community benefit resources generated by gaming.
Resumo:
This paper describes a new method of indexing and searching large binary signature collections to efficiently find similar signatures, addressing the scalability problem in signature search. Signatures offer efficient computation with acceptable measure of similarity in numerous applications. However, performing a complete search with a given search argument (a signature) requires a Hamming distance calculation against every signature in the collection. This quickly becomes excessive when dealing with large collections, presenting issues of scalability that limit their applicability. Our method efficiently finds similar signatures in very large collections, trading memory use and precision for greatly improved search speed. Experimental results demonstrate that our approach is capable of finding a set of nearest signatures to a given search argument with a high degree of speed and fidelity.
Resumo:
Insulated rail joints are designed in a similar way to butt jointed steel structural systems, the difference being a purpose made gap between the main rail members to maintain electrical insulation for the proper functioning of the track circuitry at all times of train operation. When loaded wheels pass the gap, they induce an impact loading with the corresponding strains in the railhead edges exceeding the plastic limit significantly, which lead to metal flow across the gap thereby increasing the risk of short circuiting and impeding the proper functioning of the signalling and broken rail identification circuitries, of which the joints are a critical part. The performance of insulated rail joints under the passage of the wheel loading is complex due to the presence of a number of interacting components and hence is not well understood. This paper presents a dynamic wheel-rail contact-impact modelling method for the determination of the impact loading; a brief description of a field experiment to capture strain signatures for validating the predicted impact loading is also presented. The process and the results of the characterisation of the materials from virgin, in-service and damaged insulated rail joints using neutron diffraction method are also discussed.
Resumo:
We propose a framework for adaptive security from hard random lattices in the standard model. Our approach borrows from the recent Agrawal-Boneh-Boyen families of lattices, which can admit reliable and punctured trapdoors, respectively used in reality and in simulation. We extend this idea to make the simulation trapdoors cancel not for a specific forgery but on a non-negligible subset of the possible challenges. Conceptually, we build a compactly representable, large family of input-dependent “mixture” lattices, set up with trapdoors that “vanish” for a secret subset which we hope the forger will target. Technically, we tweak the lattice structure to achieve “naturally nice” distributions for arbitrary choices of subset size. The framework is very general. Here we obtain fully secure signatures, and also IBE, that are compact, simple, and elegant.
Resumo:
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Previous group signature constructions did not provide any disclosure capability, or at best a very limited one (such as subset membership). Our scheme offers a very powerful language for disclosing exactly in what capacity a subgroup of signers is making a signature on behalf of the group.
Resumo:
We present an approach to automatically de-identify health records. In our approach, personal health information is identified using a Conditional Random Fields machine learning classifier, a large set of linguistic and lexical features, and pattern matching techniques. Identified personal information is then removed from the reports. The de-identification of personal health information is fundamental for the sharing and secondary use of electronic health records, for example for data mining and disease monitoring. The effectiveness of our approach is first evaluated on the 2007 i2b2 Shared Task dataset, a widely adopted dataset for evaluating de-identification techniques. Subsequently, we investigate the robustness of the approach to limited training data; we study its effectiveness on different type and quality of data by evaluating the approach on scanned pathology reports from an Australian institution. This data contains optical character recognition errors, as well as linguistic conventions that differ from those contained in the i2b2 dataset, for example different date formats. The findings suggest that our approach compares to the best approach from the 2007 i2b2 Shared Task; in addition, the approach is found to be robust to variations of training size, data type and quality in presence of sufficient training data.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.