141 |
Esterilização não-cirúrgica: estudo do perfil reprodutivo e dos efeitos colaterais de mulheres que recorreram a este método / Non-surgical sterilization: a study of the reproductive profile and side effects of women who used this methodFanny Viviana Lopez Alegria 06 December 1991 (has links)
O presente trabalho constitui uma avaliação prospectiva da utilização do método de esterilização feminina não-cirúrgica com quinacrina. O grupo em estudo é formado por dez mulheres, atendidas no período de abril a setembro de 1990, no Ambulatório de Planejamento Familiar do Hospital Sotero del Rio, Santiago, Chile. O perfil reprodutivo das mulheres, revela que o inicio da vida fértil foi, em media, aos 12.1 anos e aproximadamente quatro anos depois (16.4 anos), iniciaram a atividade sexual sem uso de métodos anticoncepcionais. Em consequência, verifica-se que a primeira gravidez ocorreu, em média, aos 19.1 anos, ou seja, ainda dentro do período que compreende a adolescência. Após este evento obstétrico - gravidez - a maioria iniciou o uso de métodos de planejamento familiar por volta dos 21 anos, tendo como resultado, uma variada e não muito bem sucedida história anticoncepcional. A decisão de encerrar a vida reprodutiva com medidas definitivas foi tomada pelo casal, baseado em informações fornecidas pelos profissionais de saúde e referindo razões de planejamento familiar, história anticoncepcional e obstétrica negativa. No momento de concretizar esta decisão, as mulheres faziam em média, 34.8 anos e parte de uma família legalmente constituída com 3.2 filhos vivos. Destas mulheres, 40 por cento ainda tinham a opção de utilizar métodos reversíveis modernos, no momento de submeter-se a este método definitivo. O seguimento prospectivo do método não-cirúrgico mostra que os efeitos colaterais, como os maiores níveis de quinacrina plasmática e urinária apresentam-se no período das primeiras 48 horas, após inserção intrauterina da primeira e segunda doses de \"pellets\" de quinacrina. / This paper consists of an evaluation on the use of quinacrine as a non-surgical irreversible method for female sterilization. The study group is made up of ten women, seen at the Sotero del Rio Hospital outpatient clinic in Santiago, Chile, from april to september 1990. This study reveals that the women\'s reproductive life began on average at the age of 12.1 years and approximately four years later they began their sexual activity without the use of contraceptive methods. Consequently their first pregnancy occurred at the age of 19.1 years, during late adolescent years. Two years after pregnancy many of these women began to use contraceptive methods (at the age of 21, on average). As a result their obstetric history shows a non well succeeded and varied response to anticonceptional methods. The decision to close reprodutive life taking permanent steps was made by the couples based on information furnished by health professionals. The reasons given were related to family planning, anticonceptional and negative obstetric history. On implementing their decision, the group averaged 34.8 years and averaged 3.2 a lived children per subject. A total of 40 per cent of these women could still use other modern reversible methods before being submited to this permanent one. The follow-up of this non-surgical procedure shows that side effects such as higher levels of quinacrine in the blood and urine ocurred in the first 48 hours after the first and second intrauterine insertion of quinacrine pellets.
|
142 |
Spectre: Attack and DefenseHarris, Rae 01 January 2019 (has links)
Modern processors use architecture like caches, branch predictors, and speculative execution in order to maximize computation throughput. For instance, recently accessed memory can be stored in a cache so that subsequent accesses take less time. Unfortunately microarchitecture-based side channel attacks can utilize this cache property to enable unauthorized memory accesses. The Spectre attack is a recent example of this attack.
The Spectre attack is particularly dangerous because the vulnerabilities that it exploits are found in microprocessors used in billions of current systems. It involves the attacker inducing a victim’s process to speculatively execute code with a malicious input and store the recently accessed memory into the cache.
This paper describes the previous microarchitecture side channel attacks. It then describes the three variants of the Spectre attack. It describes and evaluates proposed defenses against Spectre.
|
143 |
Clinical Practice Guidelines for Home Management of Intravenous Immunoglobulin TherapyTaylor, Rosemary 01 January 2019 (has links)
The infusion of intravenous immunoglobulin therapy in the home setting requires a critical nursing assessment and interventions aimed at managing and preventing the escalation of adverse events. Some patients experience side effects that necessitate a rapid response by field nurses, requiring standing orders for nursing administration and the availability of essential medications to alleviate symptoms in the patient's home. The clinical practice issue was that the home health agency did not have a uniform clinical practice nursing guideline to assist field nurses in providing rapid responses for managing infusion-related reactions. The purpose of this project was to develop an evidence-based clinical practice guideline using standing orders for the comprehensive management of immunoglobulin side effects in the patient's home. The practice-focused question centered on whether the use of a nursing practice guideline based on interprofessional collaboration could manage the side effects of patients in the home by decreasing the use of emergent care and improved quality of care for those patients susceptible to significant side effects. An interdisciplinary expert panel experience in IVIG l used Newman's system theory and the reach, effectiveness, adoption, implementation, maintenance framework for interprofessional collaboration in developing a clinical nursing guideline with a standing order for rating side effects. Panelists used the appraisal of guidelines, research, and evaluation II tool to appraise the evidence for the guideline. The use of clinical guideline with standing orders to address the needs of patients in the home setting may lead to positive social change by enabling more rapid management of symptoms, more effective care in the home, and improved patient outcomes
|
144 |
Discitis after discography and chemonucleolysisFraser, Robert D. (Robert David) January 1986 (has links) (PDF)
Bibliography: leaves 107-109.
|
145 |
Adverse drug events and medication errors in a paediatric inpatient populationKunac, Desirée L., n/a January 2005 (has links)
Background. Medication-related patient injuries (adverse drug events, ADEs) are an important problem in all hospitalised populations; however, the potential for injury is reported to be greater in children than adults. Many ADEs are due to error and therefore could be prevented. Data regarding the risk factors (or predictors) for these events in paediatric inpatients is limited. It was hypothesised that "identification of risk factors for ADEs and medication errors in the paediatric inpatient setting will inform likely prevention strategies".
Aims. To determine the frequency, nature and risk factors for ADEs and potential ADEs occurring in a paediatric inpatient population; to assess the vulnerable processes in the neonatal intensive care unit (NICU) medication use process; and to provide recommendations for the targeting of likely prevention strategies.
Setting. A general paediatric ward (PW), postnatal ward (PNW) and NICU of a University- affiliated urban general hospital.
Design. There were two study components: the medEVENT study which involved identification of actual ADEs and potential ADEs over a twelve week period, through prospective review of medical records, medication charts and administration records along with voluntary and solicited staff report and parent interview; and the FMEA study which used a proactive risk assessment technique, Failure Mode and Effect Analysis (FMEA), to rank all potential failures in the NICU medication use process according to risk.
Results. In the MedEVENT study 3160 prescription episodes were reviewed (which represented 520 admissions, 3037 patient-days) and revealed a total of 67 ADEs and 77 potential ADEs. The greatest number of events occurred in NICU with very few events in the PNW. However, paediatric surgical admissions experienced the highest rate of ADEs per 1000 patient-days (80) as compared to medical (65) then NICU admissions (19). Over half of the ADEs were deemed preventable, 38 (57%), with the �more serious� ADEs more likely to be preventable than �not serious� ADEs. The impact on hospital resources was considerable with the cost attributed to extra bed days due to ADEs to be $NZD 50,000. Dosing errors were the most common type of error, particularly when prescribing and administering medications. Antibacterial and narcotic analgesics were commonly implicated, as was the intravenous route of administration. Few events were related to unlicensed use of medications.
For ADEs, the major risk factors when analysed by admission, were greater medication exposure and increasing age; by prescription, were increasing age, oral route and narcotics and antibacterial agents; for paediatric ward admission, were increasing age and increased length of stay; and for NICU admission, no major risk factors emerged. For potential ADEs, the major risk factors when analysed by admission were greater medication exposure; by prescription, were junior prescriber, intravenous route, narcotics and antibacterials; for paediatric ward admission, were junior prescriber and narcotics; and for NICU admission were antibacterials, electrolytes and umbilical venous catheter administration. Neither ADEs nor potential ADEs were associated with unlicensed use of medicines or high alert status drugs.
The FMEA study identified 72 potential failures in the NICU medication use process with 193 associated causes and effects. Multiple failures were possible in the process of �prescribing medication� and in the process of �preparation of medication for administration�. The highest ranking issues were found to occur at the administration stage. Common potential failures related to errors in the dose, timing of administration, infusion pump settings and route of administration.
Conclusions. Analysis of the risk factors of ADEs and potential ADEs found that the most vulnerable processes were when prescribing and when preparing a medicine for administration; especially when involving narcotic and antibacterial agents and for children with greater medication exposure Strategies that selectively target these high risk areas are therefore likely to have the greatest impact on preventing drug-related injuries in hospitalised children.
|
146 |
The disposition of morphine and its 3- and 6-glucuronide metabolites in humans and sheep / Robert W. Milne.Milne, Robert W. (Robert William). January 1994 (has links)
Corrigenda inserted opposite title page. / Copies of author's previously published articles inserted inside back cover. / Bibliography: leaves 245-291. / xvii, 291 leaves ; 30 cm. / Title page, contents and abstract only. The complete thesis in print form is available from the University Library. / An improved HPLC method was developed to measure the concentration of the three compounds in plasma and urine. The stability of the compounds during storage in plasma was also established. / Thesis (Ph.D.)--University of Adelaide, Dept. of Clinical and Experimental Pharmacology, 1995?
|
147 |
Cache-based vulnerabilities and spam analysisNeve de Mevergnies, Michael 14 July 2006 (has links)
Two problems of computer security are investigated. On one hand, we are facing a practical problematic of actual processors: the cache, an element of the architecture that brings flexibility and allows efficient utilization of the resources, is demonstrated to open security breaches from which secret information can be extracted. This issue required a delicate study to understand the problem and the role of the incriminated elements, to discover the potential of the attacks and find effective countermeasures.
Because of the intricate behavior of a processor and limited resources of the cache, it is extremely hard to write constant-time software. This is particularly true with cryptographic applications that often rely on large precomputed data and pseudo-random accesses. The principle of time-driven attacks is to analyze the overall execution time of a cryptographic process and extract timing profiles. We show that in the case of AES those profiles are dependent on the memory lookups, i.e. the addition of the plaintext and the secret key. Correlations between some profiles with known inputs and some with partially unknown ones (known plaintext but unknown secret key) lead to the recovery of the secret key.
We then detail access-driven attacks: another kind of cache-based side channel. This case relies on stronger assumptions regarding the attacker's capacities: he must be able to run another process, concurrent to the security process. Even if the security policies prevent the so-called "spy" process from accessing directly the data of the "crypto" process, the cache is shared between them and its behavior can lead the spy process to deduce the secrets of the crypto process.
Several ways are explored for mitigations, depending on the security level to reach and on the attacker's capabilities. The respective performances of the mitigations are given. The scope is however oriented toward software mitigations as they can be directly applied to patch programs and reduce the cache leakage.
On the other hand, we tackle a situation of computer science that also concerns many people and where important economical aspects are at stake: although spam is often considered as the other side of the Internet coin, we believe that it can be defeated and avoided. A increasing number of researches for example explores the ways cryptographic techniques can prevent spams from being spread. We concentrated on studying the behavior of the spammers to understand how e-mail addresses can be prevented from being gathered. The motivation for this work was to produce and make available quantitative results to efficiently prevent spam, as well as to provide a better understanding of the behavior of spammers.
Even if orthogonal, both parts tackle practical problems and their results can be directly applied.
|
148 |
Analysis of Taiwan-Fujlan¡¦s Regional Economic DevelopmentChen, Mei-yin 06 September 2007 (has links)
Fujian is the closest province between Taiwan and China. Fujian is also the important area that Taiwan¡¦s businesses invested in China. The economical development and industrial structure in Taiwan and Fujian is very closely. Fujian is the key area that for the Taiwan ¡¥s businesses entering to China. It is necessary to understand the trade relation and history between Taiwan and Fujian, the economical position in Fujian, the
plan of the west side of the Straits and the compare with other economical area. The study researched and analysed the history of Fujian, Xizmen economical zone, the Quanzhou pattern and the plan of the west side of the Straits to know the regional economical development between Fujian and Taiwan.
|
149 |
Ozone caused changes in competition between Western wheatgrass and Sideoats gramaZiminski, Peter K. 24 June 1993 (has links)
Graduation date: 1994
|
150 |
Multiple Antenna Broadcast Channels with Random Channel Side InformationShalev Housfater, Alon 11 January 2012 (has links)
The performance of multiple input single output (MISO) broadcast channels is strongly dependent on the availability of channel side
information (CSI) at the transmitter. In many practical systems, CSI may be available to the transmitter only in a corrupted and
incomplete form. It is natural to assume that the flaws in the CSI are random and can be represented by a probability distribution
over the channel. This work is concerned with two key issues concerning MISO broadcast systems with random CSI: performance analysis and system design. First, the impact of noisy channel information on system performance is investigated. A simple model is formulated where the channel is Rayleigh fading, the CSI is corrupted by additive white Gaussian noise and a zero forcing precoder is formed by the noisy CSI. Detailed analysis of the
ergodic rate and outage probability of the system is given. Particular attention is given to system behavior at asymptotically
high SNR. Next, a method to construct precoders in a manner that accounts for the uncertainty in the channel information is
developed. A framework is introduced that allows one to quantify the tradeoff between the risk (due to the CSI randomness) that is
associated with a precoder and the resulting transmission rate. Using ideas from modern portfolio theory, the risk-rate problem is
modified to a tractable mean-variance optimization problem. Thus, we give a method that allows one to efficiently find a good
precoder in the risk-rate sense. The technique is quite general and applies to a wide range of CSI probability distributions.
|
Page generated in 0.0173 seconds