1000 resultados para Suppressed records


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Top-predators can play important roles in terrestrial food webs, fuelling speculation that top-predators might be used as biocontrol tools against invasive mesopredators. Feral cats are believed to be largely responsible for the current declines of native fauna across tropical northern Australia, where substantial beef cattle production occurs. Dingoes are known to impact cattle production there and are predicted to impact native fauna also. However, dingoes are forecasted to curtail the impacts of cats and reverse native fauna declines. We review (1) empirical studies investigating the relationships between dingoes and cats, and dingo control and cats, (2) records of cat remains in dingo diets, and (3) historical records of lethal dingo control using 1080-poisoned baits across Australia between 1999 and 2008 to show how two naturalised invasive species can interact in dynamic agro-ecological landscapes. From the 35 studies assessed, most reported no detectable relationship between dingoes and cats; negative or positive relationships were seldom detected. Dingoes do not appear to exclude cats beyond fine scales, but may alter cat activity periods under certain conditions. Cat remains were found in only 0.63 % of over 31,000 dingo diet records. Lethal dingo control occurs (in varying degrees) across about two-thirds of Australia and does not appear to substantially influence dingo-cat relationships. We conclude that the presently available data provides little evidence that bolstering dingo populations will reduce the impacts of cats. Much more work is needed to identify situations where top-predators might be used as effective biocontrol tools against invasive mesopredators in agro-ecological systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The East Asian Monsoon (EAM) is an active component of the global climate system and has a profound social and economic impact in East Asia and its surrounding countries. Its impact on regional hydrological processes may influence society through industrial water supplies, food productivity and energy use. In order to predict future rates of climate change, reliable and accurate reconstructions of regional temperature and rainfall are required from all over the world to test climate models and better predict future climate variability. Hokkaido is a region which has limited palaeo-climate data and is sensitive to climate change. Instrumental data show that the climate in Hokkaido is influenced by the East Asian Monsoon (EAM), however, instrumental data is limited to the past ~150 years. Therefore down-core climate reconstructions, prior to instrumental records, are required to provide a better understanding of the long-term behaviour of the climate drivers (e.g. the EAM, Westerlies, and teleconnections) in this region. The present study develops multi-proxy reconstructions to determine past climatic and hydrologic variability in Japan over the past 1000 years and aid in understanding the effects of the EAM and the Westerlies independently and interactively. A 250-cm long sediment core from Lake Toyoni, Hokkaido was retrieved to investigate terrestrial and aquatic input, lake temperature and hydrological changes over the past 1000-years within Lake Toyoni and its catchment using X-Ray Fluorescence (XRF) data, alkenone palaeothermometry, the molecular and hydrogen isotopic composition of higher plant waxes (δD(HPW)). Here, we conducted the first survey for alkenone biomarkers in eight lakes in the Hokkaido, Japan. We detected the occurrence of alkenones within the sediments of Lake Toyoni. We present the first lacustrine alkenone record from Japan, including genetic analysis of the alkenone producer. C37 alkenone concentrations in surface sediments are 18µg C37 g−1 of dry sediment and the dominant alkenone is C37:4. 18S rDNA analysis revealed the presence of a single alkenone producer in Lake Toyoni and thus a single calibration is used for reconstructing lake temperature based on alkenone unsaturation patterns. Temperature reconstructions over the past 1000 years suggest that lake water temperatures varies between 8 and 19°C which is in line with water temperature changes observed in the modern Lake Toyoni. The alkenone-based temperature reconstruction provides evidence for the variability of the EAM over the past 1000 years. The δD(HPW) suggest that the large fluctuations (∼40‰) represent changes in temperature and source precipitation in this region, which is ultimately controlled by the EAM system and therefore a proxy for the EAM system. In order to complement the biomarker reconstructions, the XRF data strengthen the lake temperature and hydrological reconstructions by providing information on past productivity, which is controlled by the East Asian Summer monsoon (EASM) and wind input into Lake Toyoni, which is controlled by the East Asian Winter Monsoon (EAWM) and the Westerlies. By combining the data generated from XRF, alkenone palaeothermometry and the δD(HPW) reconstructions, we provide valuable information on the EAM and the Westerlies, including; the timing of intensification and weakening, the teleconnections influencing them and the relationship between them. During the Medieval Warm Period (MWP), we find that the EASM dominated and the EAWM was suppressed, whereas, during the Little Ice Age (LIA), the influence of the EAWM dominated with time periods of increased EASM and Westerlies intensification. The El Niño Southern Oscillation (ENSO) significantly influenced the EAM; a strong EASM occurred during El Niño conditions and a strong EAWM occurred during La Niña. The North Atlantic Oscillation, on the other hand, was a key driver of the Westerlies intensification; strengthening of the Westerlies during a positive NAO phase and weakening of the Westerlies during a negative NAO phase. A key finding from this study is that our data support an anti-phase relationship between the EASM and the EAWM (e.g. the intensification of the EASM and weakening of the EAWM and vice versa) and that the EAWM and the Westerlies vary independently from each other, rather than coincide as previously suggested in other studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the patient point-of-care could possibly lead to a fatality. In this paper we propose employing emergent technologies such as Java SIM Cards (JSC),Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHRs). A partial EHR contained within a JSC can be used at the patient point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Healthcare Records Centre (EHRC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The intention of this work is to explain theoretically that democracy logically exists in China, despite the statements to the contrary by China’s ruling party. We will have to look at several recent developments in social and political theory to fully understand my point. The first involves recent findings in the historical analysis of democracy from thinkers like Keane (2009), Isakhan and Stockwell (2011). The second deals with cosmopolitan theory and 2nd modernity, or from the works of David Held (2003), Ulrich Beck and Edgar Grande (2010) respectively. Finally, the third is a recent work of mine titled “Democratic Theory and Theoretical Physics” (2010).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background This paper presents a novel approach to searching electronic medical records that is based on concept matching rather than keyword matching. Aim The concept-based approach is intended to overcome specific challenges we identified in searching medical records. Method Queries and documents were transformed from their term-based originals into medical concepts as defined by the SNOMED-CT ontology. Results Evaluation on a real-world collection of medical records showed our concept-based approach outperformed a keyword baseline by 25% in Mean Average Precision. Conclusion The concept-based approach provides a framework for further development of inference based search systems for dealing with medical data.