WorldWideScience

Sample records for reported hacking incidents

  1. Hacking GPS

    CERN Document Server

    Kingsley-Hughes, Kathie

    2005-01-01

    * This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!* Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS* Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connection with a GPS* Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken* Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector

  2. Hack Tibet

    National Research Council Canada - National Science Library

    Jonathan Kaiman

    2013-01-01

    .... Experts say that the hacks may be part of an elaborate campaign to identify possible protests and preempt them. Few cyberattacks on Dharamsala are strategically tailored to monitor or control the city's network infrastructure, say experts.

  3. Hacking Around.

    Science.gov (United States)

    Zirkel, Perry A.

    1999-01-01

    Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…

  4. Hacking Around.

    Science.gov (United States)

    Zirkel, Perry A.

    1999-01-01

    Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…

  5. Critical incident reporting systems.

    Science.gov (United States)

    Ahluwalia, Jag; Marriott, Lin

    2005-02-01

    Approximately 10% of all hospital admissions are complicated by critical incidents in which harm is caused to the patient - this amounts to more than 850,000 incidents annually. Critical incident reporting (CIR) systems refer to the structured reporting, collation and analysis of such incidents. This article describes the attributes required for an effective CIR system. Example neonatal trigger events and a management pathway for handling a critical incident report are described. The benefits and limitations of CIR systems, reactive and prospective approaches to the analysis of actual or potential critical incidents and the assessment of risk are also reviewed. Individual human error is but one contributor in the majority of critical incidents. Recognition of this and the fostering of an organisational culture that views critical incident reports as an opportunity to learn and to improve future patient care is vital if CIR systems are to be effective.

  6. Incident Report - Legacy

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Incident Report is a mandatory post trip legal document observers fill out to report any enforcement related situations they have encountered on an observed trip...

  7. Hacking Summon

    Directory of Open Access Journals (Sweden)

    Michael Klein

    2010-09-01

    Full Text Available When the Oregon State University Libraries selected Serials Solutions' Summon as its discovery tool, the implementation team realized that they had an opportunity to implement a set of "hacks" that that would improve the overall user experience. This article will explore the space between Summon's out-of-the-box user interface and full developer API, providing practical advice on tweaking configuration information and catalog exports to take full advantage of Summon's indexing and faceting features. The article then describes the creation of OSUL's home-grown open source availability service which replaced and enhanced the availability information that Summon would normally pull directly from the catalog.

  8. Google Hacks

    CERN Document Server

    Dornfest, Rael; Calishain, Tara

    2006-01-01

    Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more usef

  9. Hacking for Dummies

    CERN Document Server

    Beaver, Kevin

    2010-01-01

    A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!. It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, data

  10. IS ETHICAL HACKING ETHICAL?

    OpenAIRE

    MUHAMMAD NUMAN ALI KHAN; DANISH JAMIL,

    2011-01-01

    This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked intoto help keep ethical hacking, ethical.

  11. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  12. Medication incidents reported to an online incident reporting system.

    LENUS (Irish Health Repository)

    Alrwisan, Adel

    2011-01-15

    AIMS: Approximately 20% of deaths from adverse events are related to medication incidents, costing the NHS an additional £500 million annually. Less than 5% of adverse events are reported. This study aims to assess the reporting rate of medication incidents in NHS facilities in the north east of Scotland, and to describe the types and outcomes of reported incidents among different services. Furthermore, we wished to quantify the proportion of reported incidents according to the reporters\\' profession. METHODS: A retrospective description was made of medication incidents reported to an online reporting system (DATIX) over a 46-month-period (July 2005 to April 2009). Reports originated from acute and community hospitals, mental health, and primary care facilities. RESULTS: Over the study period there were 2,666 incidents reported with a mean monthly reporting rate of 78.2\\/month (SD±16.9). 6.1% of all incidents resulted in harm, with insulin being the most commonly implicated medication. Nearly three-quarters (74.2%, n=1,978) of total incidents originated from acute hospitals. Administration incidents were implicated in the majority of the reported medication incidents (59%), followed by prescribing (10.8%) and dispensing (9.9%), while the nondescript "other medication incidents" accounted for 20.3% of total incidents. The majority of reports were made by nursing and midwifery staff (80%), with medical and dental professionals reporting the lowest number of incidents (n=56, 2%). CONCLUSIONS: The majority of medication incidents in this study were reported by nursing and midwifery staff, and were due to administration incidents. There is a clear need to elucidate the reasons for the limited contribution of the medical and dental professionals to reporting medication incidents.

  13. On Hack's Law

    Science.gov (United States)

    Rigon, Riccardo; Rodriguez-Iturbe, Ignacio; Maritan, Amos; Giacometti, Achille; Tarboton, David G.; Rinaldo, Andrea

    1996-11-01

    Hack's law is reviewed, emphasizing its implications for the elongation of river basins as well as its connections with their fractal characteristics. The relation between Hack's law and the internal structure of river basins is investigated experimentally through digital elevation models. It is found that Hack's exponent, elongation, and some relevant fractal characters are closely related. The self-affine character of basin boundaries is shown to be connected to the power law decay of the probability of total contributing areas at any link and to Hack's law. An explanation for Hack's law is derived from scaling arguments. From the results we suggest that a statistical framework referring to the scaling invariance of the entire basin structure should be used in the interpretation of Hack's law.

  14. IS ETHICAL HACKING ETHICAL?

    Directory of Open Access Journals (Sweden)

    MUHAMMAD NUMAN ALI KHAN

    2011-05-01

    Full Text Available This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked intoto help keep ethical hacking, ethical.

  15. Hacked E-mail

    Science.gov (United States)

    ... Tips for Using Public Wi-Fi Networks Understanding Mobile Apps Apps to Help You Shop in Stores Hacked Email Laptop Security Bookmark Shopping Online with Virtual Currencies infographic Using IP Cameras ...

  16. Analyzing voluntary medical incident reports.

    Science.gov (United States)

    Gong, Yang; Richardson, James; Zhijian, Luan; Alafaireet, Patricia; Yoo, Illhoi

    2008-11-06

    Voluntary medical incident reports lacking consistency and accuracy impede the ultimate use of the reports for patient safety research. To improve this, two coders examined harm score usage in a voluntary medical incident reporting system where the harm scores were selected from a predefined list by different reporters. The two coders inter-rater agreement percent was 82%. The major categories and reviewed harm score jointly demonstrate that this process is critical and necessary in preparing the voluntary reports for further content and semantics analysis.

  17. Hacking the next generation

    CERN Document Server

    Dhanjani, Nitesh; Hardin, Brett

    2009-01-01

    With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse

  18. The first SPIE software Hack Day

    Science.gov (United States)

    Kendrew, S.; Deen, C.; Radziwill, N.; Crawford, S.; Gilbert, J.; Gully-Santiago, M.; Kubánek, P.

    2014-07-01

    We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montréal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.

  19. The first SPIE software Hack Day

    CERN Document Server

    Kendrew, Sarah; Radziwill, Nicole; Crawford, Steve; Gilbert, James; Gully-Santiago, Michael; Kubanek, Petr

    2014-01-01

    We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montreal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.

  20. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  1. .hack//fragment

    Institute of Scientific and Technical Information of China (English)

    义经

    2005-01-01

    以虚构的网络游戏世界“THE WORLD”为舞台的RPG作品《.hack》,随着系列最新作《.hack//G.U.》的公布,在1个月之后,实现新梦想的ONLINE作品终于也正式发表了!新作《.hack//fragment(碎片)》是系列首款设有网络连线功能的游戏。游戏内除了在网上可与其他玩家一同冒险外,即使在OFFLINE(下线)时也同样可以与该系列的角色一同冒险,同时配合ONLINE和OFFLINE的功能,达成PS2网络游戏的真正定义!

  2. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  3. We Don’t Hack

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    A Ministry of Industry and Information Technology (MIIT)spokesperson told Xinhua News Agency on January 24 that China is the biggest victim of Internet-based hacking attacks.The country, the spokes person said, has enacted laws that makeall cyber attacks illegal and is willing to work with international partners to promote Internet security and fight against hacking.

  4. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  5. Big Book of Apple Hacks

    CERN Document Server

    Seibold, Chris

    2008-01-01

    Bigger in size, longer in length, broader in scope, and even more useful than our original Mac OS X Hacks, the new Big Book of Apple Hacks offers a grab bag of tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the new line of iPods, iPhone, and Apple TV. With 125 entirely new hacks presented in step-by-step fashion, this practical book is for serious Apple computer and gadget users who really want to take control of these systems. Many of the hacks take you under the hood and show you how to tweak system preferences, alter or add keyboard shortcuts, mount drives and

  6. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times.

    Science.gov (United States)

    Delgado, Ana; Callén, Blanca

    2017-02-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach to politics, we analyse hacks as 'inquiry' to see how they serve to articulate public and political action. We argue that do-it-yourself and makers' hacks are technical and political demonstrations. What do-it-yourself and makers' hacks ultimately demonstrate is that things can be done otherwise and that 'you' can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.

  7. Techniques de hacking

    CERN Document Server

    Erickson, Jon

    2008-01-01

    Dans cet ouvrage, Jon Erickson présente les bases de la programmation en C du point de vue du hacker et dissèque plusieurs techniques de hacking, passées et actuelles, afin de comprendre comment et pourquoi elles fonctionnent. Même si vous ne savez pas programmer, ce livre vous donnera une vue complète de la programmation, de l'architecture des machines, des communications réseau et des techniques de hacking existantes. Associez ces connaissances à l'environnement Linux fourni et laissez libre cours à votre imagination. Avec ce livre vous apprendrez à : • programmer les ordinateurs en C, en assembleur et avec des scripts shell ; • inspecter les registres du processeur et la mémoire système avec un débogueur afin de comprendre précisément ce qui se passe ; Vous découvrirez comment les hackers parviennent à : • corrompre la mémoire d'un système, en utilisant les débordements de tampons et les chaînes de format, pour exécuter un code quelconque ; • surpasser les mesures de sécurit...

  8. National Fire Incident Reporting System (NFIRS)

    Data.gov (United States)

    Department of Homeland Security — The National Fire Incident Reporting System (NFIRS) is a reporting standard that fire departments use to uniformly report on the full range of their activities, from...

  9. Hack's Law: Sinuosity, convexity, elongation

    Science.gov (United States)

    Willemin, James H.

    2000-11-01

    Hack's law, an empirical, power law relationship between drainage basin area and the length of the main stream channel, has long been taken to imply that drainage basins become more elongate (relatively longer and narrower) with increasing basin size. A study of the geometry of 38 basins from three distinct geomorphic settings shows that this geometric interpretation of Hack's law is only occasionally true: Even though Hack's power law relationship holds between basin area and main channel length, these basins do not necessarily become more elongate with increasing size. Rather, Hack's law is an expression of a balance between changes in basin shape and changes in channel planform geometry. For the basins in this study, changes in channel sinuosity play the most important role in this balance; changes in basin shape are far less regular. Local conditions appear to determine the partitioning of importance between changes in basin shape and channel sinuosity.

  10. Semantic Theme Analysis of Pilot Incident Reports

    Science.gov (United States)

    Thirumalainambi, Rajkumar

    2009-01-01

    Pilots report accidents or incidents during take-off, on flight and landing to airline authorities and Federal aviation authority as well. The description of pilot reports for an incident contains technical terms related to Flight instruments and operations. Normal text mining approaches collect keywords from text documents and relate them among documents that are stored in database. Present approach will extract specific theme analysis of incident reports and semantically relate hierarchy of terms assigning weights of themes. Once the theme extraction has been performed for a given document, a unique key can be assigned to that document to cross linking the documents. Semantic linking will be used to categorize the documents based on specific rules that can help an end-user to analyze certain types of accidents. This presentation outlines the architecture of text mining for pilot incident reports for autonomous categorization of pilot incident reports using semantic theme analysis.

  11. Incident Reporting in Mashhad Hospitals

    Directory of Open Access Journals (Sweden)

    Davoodi R

    2013-10-01

    Full Text Available Objectives: In this study, our aim was to evaluate and classify the voluntary error reports in the hospitals of Mashhad University of Medical Sciences. Patients have the right to receive health care in accordance to the best standards. Health care carries a risk of harm for patient safety, and with respect to today’s stressful systems with a large number of patients, it would be inevitable. The meaning of risk management is to predict adverse events and reduce their occurrence.Materials and Methods: A voluntary medical error reporting form was designed and approved by the clinical governance team of Mashhad Medical University. They were then distributed inside hospitals in the way in which everyone (health providers and patients could access them easily. The forms were collected and classified monthly in all wards. Classification was performed on the base of type, outcome and reporter. Data gathering took place from spring to autumn 2012. The data was analyzed by the SPSS software. Results: 2500 errors were extracted from 1000 voluntary error reporting forms of the 12 hospitals of Mashhad Medical University. The most frequent error type was treatment errors (36% related to drug administration, standard procedures and surgical events. Conclusions: Error reporting as a basic activity has an important role in discovering pitfalls of the health care system. To promote the reporting culture, its non punitive base must become clear for all professors and staff members, because this kind of reporting could lead to fewer medical errors and higher staff awareness about probable errors.

  12. P-Hacking in Orthopaedic Literature: A Twist to the Tail.

    Science.gov (United States)

    Bin Abd Razak, Hamid Rahmatullah; Ang, Jin-Guang Ernest; Attal, Hersh; Howe, Tet-Sen; Allen, John Carson

    2016-10-19

    "P-hacking" occurs when researchers preferentially select data or statistical analyses until nonsignificant results become significant. We wanted to evaluate if the phenomenon of p-hacking was evident in orthopaedic literature. We text-mined through all articles published in three top orthopaedic journals in 2015. For anonymity, we cipher-coded the three journals. We included all studies that reported a single p value to answer their main hypothesis. These p values were then charted and frequency graphs were generated to illustrate any evidence of p-hacking. Binomial tests were employed to look for evidence of evidential value and significance of p-hacking. Frequency plots for all three journals revealed evidence of p-hacking. Binomial tests for all three journals were significant for evidence of evidential value (p hacking was significant only for one journal (p = 0.0092). P-hacking is an evolving phenomenon that threatens to jeopardize the evidence-based practice of medicine. Although our results show that there is good evidential value for orthopaedic literature published in our top journals, there is some evidence of p-hacking of which authors and readers should be wary. Copyright © 2016 by The Journal of Bone and Joint Surgery, Incorporated.

  13. Practical hacking techniques and countermeasures

    CERN Document Server

    Spivey, Mark D

    2006-01-01

    Examining computer security from the hacker''s perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of S...

  14. Ethical hacking and penetration testing guide

    CERN Document Server

    Baloch, Rafay

    2014-01-01

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each ...

  15. Degrees of freedom in planning, running, analyzing, and reporting psychological studies : A checklist to avoid p-hacking

    NARCIS (Netherlands)

    Wicherts, J.M.; Veldkamp, C.L.S.; Augusteijn, H.E.M.; Bakker, M.; van Aert, R.C.M.; van Assen, M.A.L.M.

    2016-01-01

    The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of fal

  16. Degrees of freedom in planning, running, analyzing, and reporting psychological studiesA checklist to avoid p - hacking

    Directory of Open Access Journals (Sweden)

    Jelte M Wicherts

    2016-11-01

    Full Text Available The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of false positive results and may inflate effect size estimates. In this review article, we present an extensive list of 34 degrees of freedom that researchers have in formulating hypotheses, and in designing, running, analyzing, and reporting of psychological research. The list can be used in research methods education, and as a checklist to assess the quality of preregistrations and to determine the potential for bias due to (arbitrary choices in unregistered studies.

  17. Degrees of Freedom in Planning, Running, Analyzing, and Reporting Psychological Studies: A Checklist to Avoid p-Hacking.

    Science.gov (United States)

    Wicherts, Jelte M; Veldkamp, Coosje L S; Augusteijn, Hilde E M; Bakker, Marjan; van Aert, Robbie C M; van Assen, Marcel A L M

    2016-01-01

    The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of false positive results and may inflate effect size estimates. In this review article, we present an extensive list of 34 degrees of freedom that researchers have in formulating hypotheses, and in designing, running, analyzing, and reporting of psychological research. The list can be used in research methods education, and as a checklist to assess the quality of preregistrations and to determine the potential for bias due to (arbitrary) choices in unregistered studies.

  18. Degrees of Freedom in Planning, Running, Analyzing, and Reporting Psychological Studies: A Checklist to Avoid p-Hacking

    OpenAIRE

    Wicherts, Jelte M; Veldkamp, Coosje L. S.; Augusteijn, Hilde E. M.; Marjan Bakker; van Aert, Robbie C.M.; Marcel A.L.M. van Assen

    2016-01-01

    The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is problematic because it enhances the chances of false positive results and may inflate effect size estimates. In this review article, we present an extensive list of 34 degrees of freedom that researchers have in formulating hypotheses, and in desi...

  19. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  20. We Don't Hack

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Xinhua:What is your comment on accusations that the Chinese Government participated in cyber attacks? MIIT:Internet security is a global issue that requires cooperation and the work of all countries.The Chinese Government's opposition to Internet hacking is consistent and firm.Accusations that the Chinese Government participated in a cyber attack,either in an explicit or inexplicit way,is groundless and aims to denigrate China.

  1. Growth Hacking a Global Community

    OpenAIRE

    Sarkkinen, Laura; Rauhala, Marita

    2015-01-01

    As technology is developing at a fast phase people are engaging in community activities more and more online, either by extending their offline social life or by creating themselves a whole new parallel life as a member of virtual community. Companies behind communities are rivaling for attention and need to come up with increasingly clever tactics to attract and engage new members. In this thesis the relatively new phenomenon of growth hacking, the use of unconventional methods in order ...

  2. Vulnerability Assessments in Ethical Hacking

    Directory of Open Access Journals (Sweden)

    Ashiqur Rahman ,

    2016-06-01

    Full Text Available Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems. It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.

  3. Hazmat 10 Year Incident Summary Reports - Data Mining Tool

    Data.gov (United States)

    Department of Transportation — Series of Incident data and summary statistics reports produced which provide statistical information on incidents by type, year, geographical location, and others....

  4. Hazmat Yearly Incident Summary Reports - Data Mining Tool

    Data.gov (United States)

    Department of Transportation — Series of Incident data and summary statistics reports produced which provide statistical information on incidents by type, year, geographical location, and others....

  5. Inaccurate reporting of simulated critical anaesthetic incidents.

    Science.gov (United States)

    Byrne, A J; Jones, J G

    1997-06-01

    Eleven anaesthetists completed a simulated anaesthetic which was deliberately complicated by a slow progressive bradycardia followed by an episode of severe bronchospasm. After the simulation, each anaesthetist was asked to complete an anaesthetic chart and a critical incident report. Considerable discrepancies were found between the anaesthetists' written accounts, a videotape of their performance and actual data from the simulator. During the simulations, all of the anaesthetists reacted appropriately and treated their "patient" successfully but their written accounts showed a tendency to record "typical" rather than actual events and to ignore events not consistent with their final diagnosis. Only four anaesthetists mentioned bradycardia in their written description and none accurately described the changes in arterial pressure during the episode of bronchospasm. The findings are in keeping with other studies which suggest that people record events as "schemata" rather than as collections of discrete facts. These results have significant implications for those involved in the teaching of anaesthesia and in the analysis of critical incidents.

  6. Grazing incidence absorption measurements. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1989-07-31

    This final report summarizes the results of a series of different measurements to characterize various mirrors of interest to Los Alamos National Laboratory and the Boeing Aerospace free electron laser program. Most of the measurements were of the glancing incidence characteristics of different overcoated silver mirrors. These included the absolute absorptance as a function of angle of incidence (0--88{degrees}), laser wavelength (0.5145 and 1.06 {mu}m), polarization, and exposure to room air. The latter measurement examined the ability of the overcoated silver mirrors to resist tarnishing. Overcoating materials used were single-layer ThF{sub 4} and MgF{sub 2}, a very thin layer of Al{sub 2}O{sub 3}, and diamond. As a result of the work performed during this program, significant progress has been made to find a better alternative to bare silver mirrors for high-power laser applications. Thick dielectric overcoats do protect the silver mirrors from tarnishing, but problems associated with accurately controlling the optical constants of the dielectric during the coating process appear to make it difficult to achieve the desired optical properties of the mirrors at high angles of incidence.

  7. Science Hack Day uses CMS data

    CERN Multimedia

    Katerina Sandoval

    2012-01-01

    Science Hack events: a new way for scientists, designers and other techno-savvy people to interact. The most recent Science Hack Day was held in San Francisco and with it the CMS collaboration found an original and simple way to present its data. Science Hack events: a new way for scientists, designers and other techno-savvy people to interact. The most recent Science Hack Day was held in San Francisco and with it the CMS collaboration found an original and simple way to present its data.   Participants in the CMS hack event. (Photo credit: Morris Mwanga.) First of all, you need to know what “hack” means. A hack is a quick solution to a problem, often the cleverest one if not the most elegant. So, a Science Hack Day is a 48-hour all-night event that brings together “hackers” to create innovative solutions to scientific problems. This year’s event was held in San Francisco from 12 to 13 November and was a huge success! It hosted around 150 s...

  8. Discovering patterns of activity in unstructured incident reports at scale

    Science.gov (United States)

    2015-05-12

    2015 Carnegie Mellon University Software Engineering Institute Carnegie Mellon University Pittsburgh , PA 15213 Discovering patterns of activity...patterns of activity in incident reports • US-CERT receives incident reports from a diverse constituency. • Each ticket is an observation of...patterns of activity in incident reports Indicators across tickets Indicators occur with diverse patterns across tickets, reporters and time. Time on

  9. Mind the hack

    Science.gov (United States)

    Cartwright, Jon

    2008-05-01

    Late in the afternoon of Monday 19 June 2000, the US news website NASA Watch reported details of a classified briefing from NASA to the White House that concerned a potential landmark discovery in planetary science. Within 24 hours the news had spread onto other small websites, and after two days several of the world's biggest media outlets, including the BBC and USA Today, were running the story on their homepages. Although the details were sketchy, the bottom line was clear: pictures from the Mars Global Surveyor spacecraft implied that the red planet had water on its surface.

  10. Hacking Europe from computer cultures to demoscenes

    CERN Document Server

    Alberts, Gerard

    2014-01-01

    This book traces the evolution of European hacker culture: chopping games in Warsaw, hacking software in Athens, chaos in Hamburg, producing demos in Turku and partying with computing in Zagreb and Amsterdam. Emphasizes the role of mischief, humor and play.

  11. Joint Hacking and Latent Hazard Rate Estimation

    OpenAIRE

    Liu, Ziqi; Smola, Alexander J.; Soska, Kyle; Wang, Yu-Xiang; Zheng, Qinghua

    2016-01-01

    In this paper we describe an algorithm for predicting the websites at risk in a long range hacking activity, while jointly inferring the provenance and evolution of vulnerabilities on websites over continuous time. Specifically, we use hazard regression with a time-varying additive hazard function parameterized in a generalized linear form. The activation coefficients on each feature are continuous-time functions constrained with total variation penalty inspired by hacking campaigns. We show ...

  12. Improving reporting of critical incidents through education and involvement.

    Science.gov (United States)

    Donnelly, Peter

    2015-01-01

    Critical incident reporting involves highlighting events and near-misses which have a potential impact on patient care and patient safety. Reporting of critical incidents is a recognised tool in improving patient safety. Within the community paediatric setting in the Belfast Health & Social Care Trust (BHSCT) there is a paucity of incident report forms. The purpose of this quality improvement project was to establish the barriers to reporting critical incidents and to implement plan-do-study-act (PDSA) cycles to create a climate for change. The methodology for this project was to firstly perform a baseline audit to review all submitted critical incident reports for the Community Paediatric team in the BHSCT for a six month period. A questionnaire was distributed to staff within the multidisciplinary team to establish examples of barriers to reporting. Interventions performed included introducing an agreed definition of a critical incident, distributing/presenting questionnaire findings to senior members of the various management teams and providing feedback to healthcare workers after presentation of a critical incident presentation. A review of incident reports was performed over the subsequent six month period to assess how the interventions impacted on incident reporting. Over 12 questionnaires 28 barriers to reporting critical incidents were reported which fell into five separate categories. Staff members were twice as likely to report negativity after reporting a critical incident. Overall critical incident reporting within the BHSCT Community Paediatric team improved from 11 incident reports (1.8 per month) to 22 incident reports (3.7 per month) after completion of the quality improvement project. This represents an increase of 100%.

  13. Hack's law of debris-flow basins

    Institute of Scientific and Technical Information of China (English)

    LI Yong; YUE Z.Q.; LEE C.F.; BEIGHLEY R.E.; CHEN Xiao-Qing; HU Kai-Heng; CUI Peng

    2009-01-01

    Hack's law was originally derived from basin statistics for varied spatial scales and regions.The exponent value of the law has been shown to vary between 0.47 and 0.70,causing uncertainty in its application.This paper focuses on the emergence of Hack's law from debris-flow basins in China.Over 5,000 debris-flow basins in different regions of China with drainage areas less than 100km2 are included in this study.Basins in the different regions are found to present similar distributions.Hack's law is derived fi'om maximum probability and conditional distributions,suggesting that the law should describe some critical state of basin evolution.Results suggest the exponent value is approximately 0.5.Further analysis indicates that Hack's law is related to other scaling laws underlying the evolution of a basin and that the exponent is not dependent on basin shape but rather on the evolutionary stage.A case study of a well known debris-flow basin further confirms Hack's law and its implications in basin evolution.

  14. Feasible optimality implies Hack's Law

    Science.gov (United States)

    Rigon, Riccardo; Rodriguez-Iturbe, Ignacio; Rinaldo, Andrea

    1998-11-01

    We analyze the elongation (the scaling properties of drainage area with mainstream length) in optimal channel networks (OCNs) obtained through different algorithms searching for the minimum of a functional computing the total energy dissipation of the drainage system. The algorithms have different capabilities to overcome the imprinting of initial and boundary conditions, and thus they have different chances of attaining the global optimum. We find that suboptimal shapes, i.e., dynamically accessible states characterized by locally stationary total potential energy, show the robust type of elongation that is consistently observed in nature. This suggestive and directly measurable property is not found in the so-called ground state, i.e., the global minimum, whose features, including elongation, are known exactly. The global minimum is shown to be too regular and symmetric to be dynamically accessible in nature, owing to features and constraints of erosional processes. Thus Hack's law is seen as a signature of feasible optimality thus yielding further support to the suggestion that optimality of the system as a whole explains the dynamic origin of fractal forms in nature.

  15. The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy

    CERN Document Server

    Engebretson, Patrick

    2011-01-01

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topi

  16. Reanalyzing Head et al. (2015: investigating the robustness of widespread p-hacking

    Directory of Open Access Journals (Sweden)

    Chris H.J. Hartgerink

    2017-03-01

    Full Text Available Head et al. (2015 provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking. This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015 correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher’s method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015, it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking

  17. Automatic Analysis of Critical Incident Reports: Requirements and Use Cases.

    Science.gov (United States)

    Denecke, Kerstin

    2016-01-01

    Increasingly, critical incident reports are used as a means to increase patient safety and quality of care. The entire potential of these sources of experiential knowledge remains often unconsidered since retrieval and analysis is difficult and time-consuming, and the reporting systems often do not provide support for these tasks. The objective of this paper is to identify potential use cases for automatic methods that analyse critical incident reports. In more detail, we will describe how faceted search could offer an intuitive retrieval of critical incident reports and how text mining could support in analysing relations among events. To realise an automated analysis, natural language processing needs to be applied. Therefore, we analyse the language of critical incident reports and derive requirements towards automatic processing methods. We learned that there is a huge potential for an automatic analysis of incident reports, but there are still challenges to be solved.

  18. Hacking of Passwords in Windows Environment

    Directory of Open Access Journals (Sweden)

    C.K. GOEL

    2012-06-01

    Full Text Available Hacking is so simple! Not only the operating system‟s loop holes offers opportunities to hackers but also the applications like Skype and Google Chrome developed for the operating systems are quite attractive to hackers. In this paper I present the various ways in which the passwords like user account‟s passwords stored by the operating system or the passwords required by different applications are stored on the system and can be hacked by intended hackers. This paper presents in depth research of the password storage mechanisms implemented in various versions of Windows and various application software and can be exploited by hackers.

  19. Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking.

    Science.gov (United States)

    Hartgerink, Chris H J

    2017-01-01

    Head et al. (2015) provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking). This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015) correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher's method .04 p p ≤ .04 versus .04875 p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 p p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking is found in this reanalysis, this does not mean that there is no p-hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p-hacking is ambiguous at best.

  20. Developing a user-centered voluntary medical incident reporting system.

    Science.gov (United States)

    Hua, Lei; Gong, Yang

    2010-01-01

    Medical errors are one of leading causes of death among adults in the United States. According to the Institute of Medicine, reporting of medical incidents could be a cornerstone to learn from errors and to improve patient safety, if incident data are collected in a properly structured format which is useful for the detection of patterns, discovery of underlying factors, and generation of solutions. Globally, a number of medical incident reporting systems were deployed for collecting observable incident data in care delivery organizations (CDO) over the past several years. However, few researches delved into design of user-centered reporting system for improving completeness and accuracy of medical incident collection, let alone design models created for other institutes to follow. In this paper, we introduce the problems identified in a current using voluntary reporting system and our effort is being made towards complete, accurate and useful user-centered new reporting system through a usability engineering process.

  1. Ian Hacking, Learner Categories and Human Taxonomies

    Science.gov (United States)

    Davis, Andrew

    2008-01-01

    I use Ian Hacking's views to explore ways of classifying people, exploiting his distinction between indifferent kinds and interactive kinds, and his accounts of how we "make up" people. The natural kind/essentialist approach to indifferent kinds is explored in some depth. I relate this to debates in psychiatry about the existence of mental…

  2. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  3. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  4. Ian Hacking, Learner Categories and Human Taxonomies

    Science.gov (United States)

    Davis, Andrew

    2008-01-01

    I use Ian Hacking's views to explore ways of classifying people, exploiting his distinction between indifferent kinds and interactive kinds, and his accounts of how we "make up" people. The natural kind/essentialist approach to indifferent kinds is explored in some depth. I relate this to debates in psychiatry about the existence of mental…

  5. Clinical incidents involving students on placement: an analysis of incident reports to identify potential risk factors.

    Science.gov (United States)

    Gaida, J E; Maloney, S; Lo, K; Morgan, P

    2015-06-01

    Students are sometimes involved in incidents during clinical training. To the authors' knowledge, no quantitative studies of incidents specifically involving physiotherapy students on clinical placement are available in the literature. A retrospective audit (2008 to 2011) of incident reports involving physiotherapy students was conducted to identify the nature and features of incidents. The study aimed to determine if injuries to a student or patient were more or less likely when the supervisor was in close proximity, and whether students with lower academic performance in their preclinical semester were more likely to be involved in an incident. There were 19 care-delivery-related and three equipment-related incidents. There were no incidents of violent, aggressive or demeaning behaviour towards students. The incident rate was 9.0/100,000 student-hours for third-year students and 6.8/100,000 student-hours for fourth-year students. The majority of incidents (55%) occurred from 11 am to 12-noon and from 3 pm to 3.30 pm. Incidents more often resulted in patient or student injury when the supervisor was not in close proximity (approximately 50% vs approximately 20%), although the difference was not significant (P=0.336). The academic results of students involved in incidents were equivalent to the whole cohort in their preclinical semester {mean 75 [standard deviation (SD) 6] vs 76 (SD 7); P=0.488}. The unexpected temporal clustering of incidents warrants further investigation. Student fatigue may warrant attention as a potential contributor; however, contextual factors, such as staff workload, along with organisational systems, structures and procedures may be more relevant. The potential relationship between supervisor proximity and injury also warrants further exploration. The findings of the present study should be integrated into clinical education curricula and communicated to clinical educators. Copyright © 2014 Chartered Society of Physiotherapy. Published by

  6. SU-E-P-07: Retrospective Analysis of Incident Reports at a Radiology Department: Feedback From Incident Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Kakinohana, Y; Toita, T; Heianna, J; Murayama, S [School of medicine, University of the Ryukyus, Nishihara-cho, Okinawa (Japan)

    2015-06-15

    Purpose: To provide an overview of reported incidents that occurred in a radiology department and to describe the most common causal source of incidents. Methods: Incident reports from the radiology department at the University of the Ryukyus Hospital between 2008 and 2013 were collected and analyzed retrospectively. The incident report form contains the following items, causal factors of the incident and desirable corrective actions to prevent recurrence of similar incidents. These items allow the institution to investigate/analyze root causes of the incidents and suggest measures to be taken to prevent further, similar incidents. The ‘causal factors of the incident’ item comprises multiple selections from among 24 selections and includes some synonymous selections. In this study, this item was re-categorized into four causal source types: (i) carelessness, (ii) lack of skill or knowledge, (iii) deficiencies in communication, and (iv) external factors. Results: There were a total of 7490 incident reports over the study period and 276 (3.7%) were identified as originating from the radiology department. The most frequent causal source type was carelessness (62%). The other three types showed similar frequencies (10–14%). The staff members involved in incidents indicate three predominant desirable corrective actions to prevent or decrease the recurrence of similar incidents. These are ‘improvement in communication’ (24%), ‘staff training/education’ (19%), and ‘daily medical procedures’ (22%), and the most frequent was ‘improvement in communication’. Even though the most frequent causal factor was related to carelessness, the most desirable corrective action indicated by the staff members was related to communication. Conclusion: Our finding suggests that the most immediate causes are strongly related to carelessness. However, the most likely underlying causes of incidents would be related to deficiencies in effective communication. At our

  7. Connected Learning in the Library as a Product of Hacking, Making, Social Diversity and Messiness

    Science.gov (United States)

    Bilandzic, Mark

    2016-01-01

    Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people's interactions at "Hack The…

  8. Connected Learning in the Library as a Product of Hacking, Making, Social Diversity and Messiness

    Science.gov (United States)

    Bilandzic, Mark

    2016-01-01

    Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people's interactions at "Hack The…

  9. 49 CFR 171.16 - Detailed hazardous materials incident reports.

    Science.gov (United States)

    2010-10-01

    ... at the reporting person's principal place of business. If the written or electronic Hazardous... Safety Administration, Department of Transportation, Washington, DC 20590-0001, or an electronic... incident involving transportation by aircraft, submit a written or electronic copy of the...

  10. Low Tech Hacking Street Smarts for Security Professionals

    CERN Document Server

    Wiles, Jack; Jabbusch, Jennifer; Rogers, Russ; Lowther, Sean

    2011-01-01

    Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions

  11. The evaluation of a web-based incident reporting system.

    Science.gov (United States)

    Kuo, Ya-Hui; Lee, Ting-Ting; Mills, Mary Etta; Lin, Kuan-Chia

    2012-07-01

    A Web-based reporting system is essential to report incident events anonymously and confidentially. The purpose of this study was to evaluate a Web-based reporting system in Taiwan. User satisfaction and impact of system use were evaluated through a survey answered by 249 nurses. Incident events reported in paper and electronic systems were collected for comparison purposes. Study variables included system user satisfaction, willingness to report, number of reports, severity of the events, and efficiency of the reporting process. Results revealed that senior nurses were less willing to report events, nurses on internal medicine units had higher satisfaction than others, and lowest satisfaction was related to the time it took to file a report. In addition, the Web-based reporting system was used more often than the paper system. The percentages of events reported were significantly higher in the Web-based system in laboratory, environment/device, and incidents occurring in other units, whereas the proportions of reports involving bedsores and dislocation of endotracheal tubes were decreased. Finally, moderate injury event reporting decreased, whereas minor or minimal injury event reporting increased. The study recommends that the data entry process be simplified and the network system be improved to increase user satisfaction and reporting rates.

  12. Ethical Hacking: Research and Course Compilation

    OpenAIRE

    Matero, Ida

    2016-01-01

    The constant leaps forward in all technological areas have begun to cause increasing amounts of concern to both business owners and private individuals. Security is one of the areas where constant education and improvement is required in order to keep a system inaccessible for unauthorized personnel. Ethical hacking is a form of penetration testing where the tester takes the role of a legitimate attacker and attempts to access the system through unauthorized means. This attack shows the v...

  13. Herramientas para hacking ético

    OpenAIRE

    2015-01-01

    The objective of this project is to describe and test the most important hacking tools available in the Kali Linux distribution. This distribution, based on UNIX, contains tools for network auditing, cracking passwords and traffic sniffing of various protocols (TCP, UDP, HTTP, SSH, ..). The hosts used to test the attacks will be based on UNIX, Windows and Android architecture. It is very important to previously study the architecture of the target (host, network) because the attacks are focus...

  14. Hacking medical devices a review - biomed 2013.

    Science.gov (United States)

    Frenger, Paul

    2013-01-01

    Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as “hacking”. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (“buggy”) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.

  15. Reporting Helicopter Emergency Medical Services in Major Incidents

    DEFF Research Database (Denmark)

    Fattah, Sabina; Johnsen, Anne Siri; Sollid, Stephen J M

    2016-01-01

    OBJECTIVE: Research on helicopter emergency medical services (HEMS) in major incidents is predominately based on case descriptions reported in a heterogeneous fashion. Uniform data reported with a consensus-based template could facilitate the collection, analysis, and exchange of experiences...... interacted through e-mail. We asked these experts to define data variables and rank which were most important to report during an immediate prehospital medical response to a major incident. Five rounds were conducted. RESULTS: In the first round, the experts suggested 98 variables. After 5 rounds, 21...

  16. Critical incident reporting in anaesthesia: a prospective internal audit.

    Science.gov (United States)

    Gupta, Sunanda; Naithani, Udita; Brajesh, Saroj Kumar; Pathania, Vikrant Singh; Gupta, Apoorva

    2009-08-01

    Critical incident monitoring is useful in detecting new problems, identifying 'near misses' and analyzing factors or events leading to mishaps, which can be instructive for trainees. This study was aimed at investigating potential risk factors and analyze events leading to peri-operative critical incidents in order to develop a critical incident reporting system. We conducted a one year prospective analysis of voluntarily reported 24- hour-perioperative critical incidents, occurring in patients subjected to anaesthesia. During a one year period from December 2006 to December 2007, 14,134 anaesthetics were administered and 112(0.79%) critical incidents were reported with complete recovery in 71.42%(n=80) and mortality in 28.57% (n=32) cases. Incidents occurred maximally in 0-10 years age (23.21%), ASA 1(61.61%), in general surgery patients (43.75%), undergoing emergency surgery (52.46%) and during day time (75.89%). Incidence was more in the operating theatre (77.68%), during maintenance (32.04%) and post-operative phase (25.89%) and in patients who received general anaesthesia (75.89%). Critical incidents occurred clue to factors related to anaesthesia (42.85%), patient (37.50%) and surgery (16.96%). Among anaesthesia related critical incidents (42.85% n=48/112), respiratory events were maximum (66.66%) mainly at induction (37.5%) and emergence (43.75%), and factors responsible were human error (85.41%), pharmacological factors (10.41%) and equipment error (4.17%). Incidence of mortality was 22.6 per 10, 000 anaesthetics (32/14,314), mostly attributable to risk factors in patient (59.38%) as compared to anaesthesia (25%) and surgery (9.38%). There were 8 anaesthesia related deaths (5.6 per 10, 000 anaesthetics) where human error (75%) attributed to lack of judgment (67.50%) was an important causative factor. We conclude that critical incident reporting system may be a valuable part of quality assurance to develop policies to prevent recurrence and enhance patient

  17. Materials released from spill incidents reported to Iowa DNR and tracked in the Hazardous Substance Incident database

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Materials released from spill incidents reported to Iowa DNR and tracked in the Hazardous Substance Incident database. These Emergency Release Notifications are...

  18. The extent and consequences of p-hacking in science.

    Directory of Open Access Journals (Sweden)

    Megan L Head

    2015-03-01

    Full Text Available A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.

  19. The extent and consequences of p-hacking in science.

    Science.gov (United States)

    Head, Megan L; Holman, Luke; Lanfear, Rob; Kahn, Andrew T; Jennions, Michael D

    2015-03-01

    A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.

  20. Incident reporting: a technique for studying police corruption

    NARCIS (Netherlands)

    Vigneswaran, D.V.

    2011-01-01

    The study of police corruption faces seemingly insurmountable sampling and validity problems. This paper outlines an experimental technique for overcoming these issues by challenging the assumption that corruption is not prone to systematic observational research. Incident reporting combines a ‘comb

  1. Incident reporting: a technique for studying police corruption

    NARCIS (Netherlands)

    D.V. Vigneswaran

    2011-01-01

    The study of police corruption faces seemingly insurmountable sampling and validity problems. This paper outlines an experimental technique for overcoming these issues by challenging the assumption that corruption is not prone to systematic observational research. Incident reporting combines a ‘comb

  2. Blind Persons Report Critical Incidents of Science and Mathematics Instruction.

    Science.gov (United States)

    Sica, Morris G.

    This project identified over 500 critical incidents of successful and unsuccessful instruction in science and mathematics courses reported through interviews of 105 blind college students. The principal categories of effective teacher behavior included planned concrete learning experiences, creative use of learning materials, and detailed…

  3. Hacking with Kali practical penetration testing techniques

    CERN Document Server

    Broad, James

    2013-01-01

    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle

  4. Safety Incident Management Team Report for NIMLT Case 50796

    LENUS (Irish Health Repository)

    2017-01-17

    This is a report on the management of a patient safety incident involving BowelScreen and symptomatic colonoscopy services at Wexford General Hospital (WGH). The patient safety incident relates to the work of a Consultant Endoscopist (referred to as Clinician Y) employed by WGH who undertook screening colonoscopies on behalf of the BowelScreen Programme since the commencement of the screening programme in WGH in March 2013. Clinician Y also performed non-screening colonoscopies for the diagnosis of symptomatic patients as part of routine surgical service provision at WGH.\\r\

  5. Standardizing the classification of abortion incidents: the Procedural Abortion Incident Reporting and Surveillance (PAIRS) Framework.

    Science.gov (United States)

    Taylor, Diana; Upadhyay, Ushma D; Fjerstad, Mary; Battistelli, Molly F; Weitz, Tracy A; Paul, Maureen E

    2017-07-01

    To develop and validate standardized criteria for assessing abortion-related incidents (adverse events, morbidities, near misses) for first-trimester aspiration abortion procedures and to demonstrate the utility of a standardized framework [the Procedural Abortion Incident Reporting & Surveillance (PAIRS) Framework] for estimating serious abortion-related adverse events. As part of a California-based study of early aspiration abortion provision conducted between 2007 and 2013, we developed and validated a standardized framework for defining and monitoring first-trimester (≤14weeks) aspiration abortion morbidity and adverse events using multiple methods: a literature review, framework criteria testing with empirical data, repeated expert reviews and data-based revisions to the framework. The final framework distinguishes incidents resulting from procedural abortion care (adverse events) from morbidity related to pregnancy, the abortion process and other nonabortion related conditions. It further classifies incidents by diagnosis (confirmatory data, etiology, risk factors), management (treatment type and location), timing (immediate or delayed), seriousness (minor or major) and outcome. Empirical validation of the framework using data from 19,673 women receiving aspiration abortions revealed almost an equal proportion of total adverse events (n=205, 1.04%) and total abortion- or pregnancy-related morbidity (n=194, 0.99%). The majority of adverse events were due to retained products of conception (0.37%), failed attempted abortion (0.15%) and postabortion infection (0.17%). Serious or major adverse events were rare (n=11, 0.06%). Distinguishing morbidity diagnoses from adverse events using a standardized, empirically tested framework confirms the very low frequency of serious adverse events related to clinic-based abortion care. The PAIRS Framework provides a useful set of tools to systematically classify and monitor abortion-related incidents for first

  6. “We are all hackers now”: critical sociological reflections on the hacking phenomenon

    OpenAIRE

    Alleyne, Brian

    2011-01-01

    The paper connects earlier work to more recent developments. It calls for a re-imagination of hacking against the backdrop of late capitalist network society. Hacking is discussed in terms of open and clandestine practices, ‘hacktivism’, and hardware hacking. The paper concludes by sketching the outlines of an integrated sociological understanding of hacking, one which can account for the varied representations and practices that constitute hacking in the contemporary world.

  7. Scrutinizing incident reporting in anaesthesia: why is an incident perceived as critical?

    DEFF Research Database (Denmark)

    Maaløe, R; la Cour, M; Hansen, A

    2006-01-01

    The purpose of the present study was to measure the incidence and type of incidents that occurred in relation to anaesthesia and surgery during a 1-year period in six Danish hospitals. Furthermore, we wanted to identify risk factors for incidents, as well as risk factors for incidents being deemed...

  8. Voluntary Medical Incident Reporting Tool to Improve Physician Reporting of Medical Errors in an Emergency Department

    Directory of Open Access Journals (Sweden)

    Nnaemeka G. Okafor

    2015-12-01

    Full Text Available Introduction: Medical errors are frequently under-reported, yet their appropriate analysis, coupled with remediation, is essential for continuous quality improvement. The emergency department (ED is recognized as a complex and chaotic environment prone to errors. In this paper, we describe the design and implementation of a web-based ED-specific incident reporting system using an iterative process. Methods: A web-based, password-protected tool was developed by members of a quality assurance committee for ED providers to report incidents that they believe could impact patient safety. Results: The utilization of this system in one residency program with two academic sites resulted in an increase from 81 reported incidents in 2009, the first year of use, to 561 reported incidents in 2012. This is an increase in rate of reported events from 0.07% of all ED visits to 0.44% of all ED visits. In 2012, faculty reported 60% of all incidents, while residents and midlevel providers reported 24% and 16% respectively. The most commonly reported incidents were delays in care and management concerns. Conclusion: Error reporting frequency can be dramatically improved by using a web-based, userfriendly, voluntary, and non-punitive reporting system.

  9. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value

    Directory of Open Access Journals (Sweden)

    Dorothy V.M. Bishop

    2016-02-01

    Full Text Available Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015 and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the “p-hacking bump” just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed.

  10. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value.

    Science.gov (United States)

    Bishop, Dorothy V M; Thompson, Paul A

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the "p-hacking bump" just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed.

  11. Brief report: The bystander effect in cyberbullying incidents.

    Science.gov (United States)

    Machackova, Hana; Dedkova, Lenka; Mezulanikova, Katerina

    2015-08-01

    This study examined the bystander effect in cyberbullying. Using self-reported data from 257 Czech respondents who had witnessed a cyberbullying attack, we tested whether provided help decreased with increased number of other bystanders. We controlled for several individual and contextual factors, including empathy, social self-efficacy, empathic response to victimization, and relationship to the victim. Results showed that participants tend to help the victims more in incidents with only one or two other bystanders. We also found that, as in the "offline" realm, bystander effect is not linear: no significant differences were found between incidents with a moderate number (3-10) and a larger number of total bystanders. Our findings, thus, provide support for the presence of the bystander effect in cyberbullying.

  12. Report of incidence and mortality in China cancer registries, 2009

    Institute of Scientific and Technical Information of China (English)

    Wanqing Chen; Rongshou Zheng; Siwei Zhang; Ping Zhao; Guanglin Li; Lingyou Wu; Jie He

    2013-01-01

    The National Central Cancer Registry (NCCR) collected cancer registration data in 2009 from local cancer registries in 2012,and analyzed to describe cancer incidence and mortality in China.Methods.:On basis of the criteria of data quality from NCCR,data subrnitted from 104 registries were checked and evaluated.There were 72 registries' data qualified and accepted for cancer registry annual report in 2012.Descriptive analysis included incidence and mortality stratified by area (urban/rural),sex,age group and cancer site.The top 10 common cancers in different groups,proportion and cumulative rates were also calculated.Chinese population census in 1982 and Segi's population were used for age-standardized incidence/mortality rates.Results:All 72 cancer registries covered a total of 85,470,522 population (57,489,009 in urban and 27,981,513 in rural areas).The total new cancer incident cases and cancer deaths were 244,366 and 154,310,respectively.The morphology verified cases accounted for 67.23%,and 3.14% of incident cases only had information from death certifications.The crude incidence rate in Chinese cancer registration areas was 285.91/100,000(males 317.97/100,000,females 253.09/100,000),age-standardized incidence rates by Chinese standard population (ASIRC) and by world standard population (ASIRW) were 146.87/100,000 and 191.72/100,000 with the cumulative incidence rate (0-74 age years old) of 22.08%.The cancer incidence and ASIRC were 303.39/100,000 and 150.31/100,000 in urban areas whereas in rural areas,they were 249.98/100,000 and 139.68/100,000,respectively.The cancer mortality in Chinese cancer regist-ation areas was 180.54/100,000 (224.20/100,000 in males and 135.85/100,000 in females),age-standardized umortality rates by Chinese standard population (ASMRC) and by world standard population (ASMRW) were 85.06/100,000 and 115.65/100,000,and the cumulative incidence rate (0-74 age years old) was 12.94%.The cancer mortality and ASMRC were 181

  13. Hacking the quantum revolution: 1925-1975

    Science.gov (United States)

    Schweber, Silvan S.

    2015-01-01

    I argue that the quantum revolution should be seen as an Ian Hacking type of scientific revolution: a profound, longue durée, multidisciplinary process of transforming our understanding of physical nature, with deep-rooted social components from the start. The "revolution" exhibits a characteristic style of reasoning - the hierarchization of physical nature - and developed and uses a specific language - quantum field theory (QFT). It is by virtue of that language that the quantum theory has achieved some of its deepest insights into the description of the dynamics of the physical world. However, the meaning of what a quantum field theory is and what it describes has deeply altered, and one now speaks of "effective" quantum field theories. Interpreting all present day quantum field theories as but "effective" field theories sheds additional light on Phillip Anderson's assertion that "More is different". This important element is addressed in the last part of the paper.

  14. What to do with healthcare Incident Reporting Systems

    Directory of Open Access Journals (Sweden)

    Julius Cuong Pham

    2013-12-01

    Full Text Available Incident Reporting Systems (IRS are and will continue to be an important influence on improving patient safety. They can provide valuable insights into how and why patients can be harmed at the organizational level. However, they are not the panacea that many believe them to be. They have several limitations that should be considered. Most of these limitations stem from inherent biases of voluntary reporting systems. These limitations include: i IRS can’t be used to measure safety (error rates; ii IRS can’t be used to compare organizations; iii IRS can’t be used to measure changes over time; iv IRS generate too many reports; v IRS often don’t generate in-depth analyses or result in strong interventions to reduce risk; vi IRS are associated with costs. IRS do offer significant value; their value is found in the following: i IRS can be used to identify local system hazards; ii IRS can be used to aggregate experiences for uncommon conditions; iii IRS can be used to share lessons within and across organizations; iv IRS can be used to increase patient safety culture. Moving forward, several strategies are suggested to maximize their value: i make reporting easier; ii make reporting meaningful to the reporter; iii make the measure of success system changes, rather than events reported; iv prioritize which events to report and investigate, report and investigate them well; v convene with diverse stakeholders to enhance the value of IRS.

  15. I-35w incident management and impact of incidents on freeway operations. Final report, 1976-1979

    Energy Technology Data Exchange (ETDEWEB)

    Lari, A.; Christianson, D.; Porter, S.

    1982-01-01

    I-35W and I-94 Traffic Management System have been in operation since 1974. As of December 1979, the TMS operation included six principal functional subsystems. These are (1) a 24 camera closed circuit television network (2) 38 ramp meter signals, (3) eleven express bus and/or carpool meter bypass ramps, (4) a motorist information program including changeable message signs, lane control signals, highway advisory radio and a traffic grade information sign, (5) the Traffic Management Center and (6) an incident detection and response program. The purpose of this study was twofold: first, available incident records accumulated on the TMS were analyzed to develop a comprehensive view of the types and quantities of incidents that have occurred. Second, the incident data base and companion volume and occupancy data was used to determine the impact of 'typical' incidents and the impact of the total incident problem. Included in the report is an analysis of incident types detected, mode of incident detection, duration of incidents, and incident response activities.

  16. The Thai Anesthesia Incident Monitoring Study (Thai AIMS) of anesthetic equipment failure/malfunction: an analysis of 1996 incident reports.

    Science.gov (United States)

    Kusumaphanyo, Chaiyapruk; Charuluxananan, Somrat; Sriramatr, Dujduen; Pulnitiporn, Aksorn; Sriraj, Wimonrat

    2009-11-01

    The present study is a part of the multi-centered study of model of anesthesia relating adverse events in Thailand by incident report (The Thai Anesthesia Incident Monitoring Study or Thai AIMS). The objective was to identify the frequency distribution, contributing factors, and factors minimizing incident of equipment failure/malfunction. As a prospective descriptive research design, anesthesia providers reported the data as soon as the incidents of equipment failure/malfunction occurred. Standardized forms of incident report were then mailed to the center at Chulalongkorn University and three anesthesiologists reviewed the data. Ninety-two cases of equipment failure/malfunction were reported from 51 hospitals across Thailand Between January and June 2007, 92 incidents of equipment failure/malfunction were reported out of 1996 anesthesia-related incidents (4.6%). Failed/malfunctioned equipment included anesthetic circuit (17.4%), anesthesia machine (15.2%), capnography (15.2%), laryngoscope (15.2%), ventilator (12%), pulse oximeter (8.7%), vaporizer (4.3%), endotracheal tube (3.3%), sodalime (3.3%), and electrocardiogram (2.2%). All 16 anesthetic circuit incidents (100%) were detected by clinical signs whereas five incidents (31.3%) were detected firstly by monitors. All 14 laryngoscope malfunction (100%) were detected solely by clinical signs. Only one out of eight (12.5%) of pulse oximeter incidents was detected by clinical signs before the pulse oximeter itself. Three out of four (75%) incidents of vaporizer were detected by clinical signs before monitors. The majority of equipment malfunction was considered as related to anesthetic (69.6%) and system factors (69.6%) and 71.7% of incidents were preventable. Seventy-four incidents (80.4%) were caused by human error and, specifically, rule-based error in three fourths. Contributing factors were ineffective equipment, haste, lack of experience, ineffective monitors, and inadequate equipment. Factors minimizing

  17. Effects on incident reporting after educating residents in patient safety: a controlled study

    Directory of Open Access Journals (Sweden)

    Jansma José D

    2011-12-01

    Full Text Available Abstract Background Medical residents are key figures in delivering health care and an important target group for patient safety education. Reporting incidents is an important patient safety domain, as awareness of vulnerabilities could be a starting point for improvements. This study examined effects of patient safety education for residents on knowledge, skills, attitudes, intentions and behavior concerning incident reporting. Methods A controlled study with follow-up measurements was conducted. In 2007 and 2008 two patient safety courses for residents were organized. Residents from a comparable hospital acted as external controls. Data were collected in three ways: 1] questionnaires distributed before, immediately after and three months after the course, 2] incident reporting cards filled out by course participants during the course, and 3] residents' reporting data gathered from hospital incident reporting systems. Results Forty-four residents attended the course and 32 were external controls. Positive changes in knowledge, skills and attitudes were found after the course. Residents' intentions to report incidents were positive at all measurements. Participants filled out 165 incident reporting cards, demonstrating the skills to notice incidents. Residents who had reported incidents before, reported more incidents after the course. However, the number of residents reporting incidents did not increase. An increase in reported incidents was registered by the reporting system of the intervention hospital. Conclusions Patient safety education can have immediate and long-term positive effects on knowledge, skills and attitudes, and modestly influence the reporting behavior of residents.

  18. The Need for Specific Penalties for Hacking in Criminal Law

    Directory of Open Access Journals (Sweden)

    Sangkyo Oh

    2014-01-01

    Full Text Available In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA. Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  19. The need for specific penalties for hacking in criminal law.

    Science.gov (United States)

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  20. Semantic Language and Tools for Reporting Human Factors Incidents Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Incidents related to impaired human performance in space operations can be caused by environmental conditions, situational challenges, and operational deficiencies....

  1. Semantic Language and Tools for Reporting Human Factors Incidents Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Incidents related to impaired human performance in space operations can be caused by environmental conditions, situational challenges, and operational deficiencies....

  2. Medication Incidents Related to Automated Dose Dispensing in Community Pharmacies and Hospitals - A Reporting System Study

    Science.gov (United States)

    Cheung, Ka-Chun; van den Bemt, Patricia M. L. A.; Bouvy, Marcel L.; Wensing, Michel; De Smet, Peter A. G. M.

    2014-01-01

    Introduction Automated dose dispensing (ADD) is being introduced in several countries and the use of this technology is expected to increase as a growing number of elderly people need to manage their medication at home. ADD aims to improve medication safety and treatment adherence, but it may introduce new safety issues. This descriptive study provides insight into the nature and consequences of medication incidents related to ADD, as reported by healthcare professionals in community pharmacies and hospitals. Methods The medication incidents that were submitted to the Dutch Central Medication incidents Registration (CMR) reporting system were selected and characterized independently by two researchers. Main Outcome Measures Person discovering the incident, phase of the medication process in which the incident occurred, immediate cause of the incident, nature of incident from the healthcare provider's perspective, nature of incident from the patient's perspective, and consequent harm to the patient caused by the incident. Results From January 2012 to February 2013 the CMR received 15,113 incidents: 3,685 (24.4%) incidents from community pharmacies and 11,428 (75.6%) incidents from hospitals. Eventually 1 of 50 reported incidents (268/15,113 = 1.8%) were related to ADD; in community pharmacies more incidents (227/3,685 = 6.2%) were related to ADD than in hospitals (41/11,428 = 0.4%). The immediate cause of an incident was often a change in the patient's medicine regimen or relocation. Most reported incidents occurred in two phases: entering the prescription into the pharmacy information system and filling the ADD bag. Conclusion A proportion of incidents was related to ADD and is reported regularly, especially by community pharmacies. In two phases, entering the prescription into the pharmacy information system and filling the ADD bag, most incidents occurred. A change in the patient's medicine regimen or relocation was the immediate causes of an incident

  3. Professional penetration testing creating and operating a formal hacking lab

    CERN Document Server

    Wilhelm, Thomas

    2009-01-01

    PART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II - Running a PenTest. Chapter 9: Information Gathering. Chapter 10: Vulnerability Identification. Chapter 11: Vulnerability Verification. Chapter 12: Compromising a System and Privilege Escalation. Chapter 13: Maintaining Access. Chapter 14: Covering Your Tracks. PART III - Wrapping Everything Up. Chap

  4. Hacking and penetration testing with low power devices

    CERN Document Server

    Polstra, Philip

    2014-01-01

    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to

  5. An Evaluation of Departmental Radiation Oncology Incident Reports: Anticipating a National Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Terezakis, Stephanie A., E-mail: stereza1@jhmi.edu [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Harris, Kendra M. [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Ford, Eric [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Department of Radiation Oncology, University of Washington, Seattle, Washington (United States); Michalski, Jeff [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, Missouri (United States); DeWeese, Theodore [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Santanam, Lakshmi; Mutic, Sasa; Gay, Hiram [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, Missouri (United States)

    2013-03-15

    Purpose: Systems to ensure patient safety are of critical importance. The electronic incident reporting systems (IRS) of 2 large academic radiation oncology departments were evaluated for events that may be suitable for submission to a national reporting system (NRS). Methods and Materials: All events recorded in the combined IRS were evaluated from 2007 through 2010. Incidents were graded for potential severity using the validated French Nuclear Safety Authority (ASN) 5-point scale. These incidents were categorized into 7 groups: (1) human error, (2) software error, (3) hardware error, (4) error in communication between 2 humans, (5) error at the human-software interface, (6) error at the software-hardware interface, and (7) error at the human-hardware interface. Results: Between the 2 systems, 4407 incidents were reported. Of these events, 1507 (34%) were considered to have the potential for clinical consequences. Of these 1507 events, 149 (10%) were rated as having a potential severity of ≥2. Of these 149 events, the committee determined that 79 (53%) of these events would be submittable to a NRS of which the majority was related to human error or to the human-software interface. Conclusions: A significant number of incidents were identified in this analysis. The majority of events in this study were related to human error and to the human-software interface, further supporting the need for a NRS to facilitate field-wide learning and system improvement.

  6. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value

    OpenAIRE

    Bishop, DVM; Thompson, PA

    2016-01-01

    Background The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where a...

  7. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value

    OpenAIRE

    Bishop, Dorothy V M; Thompson, Paul A.

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an exper...

  8. Can a biologist fix a smartphone?-Just hack it!

    Science.gov (United States)

    Kamoun, Sophien

    2017-05-08

    Biological systems integrate multiscale processes and networks and are, therefore, viewed as difficult to dissect. However, because of the clear-cut separation between the software code (the information encoded in the genome sequence) and hardware (organism), genome editors can operate as software engineers to hack biological systems without any particularly deep understanding of the complexity of the systems.

  9. An introduction to hacking and crimeware a pocket guide

    CERN Document Server

    Loewengart, Victoria

    2012-01-01

    An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.

  10. Critical incidents related to cardiac arrests reported to the Danish Patient Safety Database

    DEFF Research Database (Denmark)

    Andersen, Peter Oluf; Maaløe, Rikke; Andersen, Henning Boje

    2010-01-01

    Background Critical incident reports can identify areas for improvement in resuscitation practice. The Danish Patient Safety Database is a mandatory reporting system and receives critical incident reports submitted by hospital personnel. The aim of this study is to identify, analyse and categorize...... critical incidents related to cardiac arrests reported to the Danish Patient Safety Database. Methods The search terms “cardiac arrest” and “resuscitation” were used to identify reports in the Danish Patient Safety Database. Identified critical incidents were then classified into categories. Results One...... hundred and seven reports describing 122 separate incidents were identified and classified into incidents related to: alerting the resuscitation team (n = 32; 26%), human performance (n = 22; 18%), equipment failure (n = 19; 16%), resuscitation equipment not available (n = 13; 11%), physical environment...

  11. The walking-induced transient hack concept is valid & relies on a transient early-exercise hypoxemia.

    Directory of Open Access Journals (Sweden)

    Antoine Bruneau

    Full Text Available BACKGROUND: Decreased arterial oxygen pressure obtained at peak exercise is strong evidence of walking-induced hypoxemia, assuming that the lower pressure occurs just before exercise is stopped. Using empirical predefined models and transcutaneous oximetry, we have shown that some patients reporting exercise intolerance show a minimal value at the onset of walking and a post-exercise overshoot. These changes are referred to as transcutaneous "walking-induced transient hacks". METHODS: In 245 patients, walking-induced transcutaneous oxygen pressure changes in the chest were analyzed using observer-independent clustering techniques. Clustering classes were compared to the profile types previously proposed with the cross-correlation technique. The classifications of patients according to both approaches were compared using kappa statistics. In 10 patients showing a hack on transcutaneous oximetry, we analyzed the results of direct iterative arterial sampling recorded during a new walking treadmill test. RESULTS: Clustering analysis resulted in 4 classes that closely fit the 4 most frequently proposed empirical models (cross-correlation coefficients: 0.93 to 0.97. The kappa between the two classifications was 0.865. In 10 patients showing transcutaneous hacks, the minimal direct arterial oxygen pressure value occurred at exercise onset, and these patients exhibited a recovery overshoot reaching a maximum at two minutes of recovery, confirming the walking-induced transient hypoxemia. CONCLUSIONS: In patients reporting exercise intolerance, transcutaneous oximetry could help to detect walking-induced transient hypoxemia, while peak-exercise arterial oximetry might be normal.

  12. Report of Incidence and Mortality in China Cancer Registries, 2008

    Institute of Scientific and Technical Information of China (English)

    Wan-qing Chen; Rong-shou Zheng; Si-wei Zhang; Ni Li; Ping Zhao; Guang-lin Li; Liang-you Wu; Jie He

    2012-01-01

    Objective:Annual cancer incidence and mortality in 2008 were provided by National Central Cancer Registry in China,which data were collected from population-based cancer registries in 2011.Methods:There were 56 registries submitted their data in 2008.After checking and evaluating the data quality,total 41 registries' data were accepted and pooled for analysis.Incidence and mortality rates by area (urban or rural areas) were assessed,as well as the age-and sex-specific rates,age-standardized rates,proportions and cumulative rate.Results:The coverage population of the 41 registries was 66,138,784 with 52,158,495 in urban areas and 13,980,289 in rural areas.There were 197,833 new cancer cases and 122,136 deaths in cancer with mortality to incidence ratio of 0.62.The morphological verified rate was 69.33%,and 2.23% of cases were identified by death certificate only.The crude cancer incidence rate in all areas was 299.12/100,000 (330.16/100,000 in male and 267.56/100,000 in female) and the age-standardized incidence rates by Chinese standard population (ASIRC) and world standard population (ASIRW) were 148.75/100,000 and 194.99/100,000,respectively.The cumulative incidence rate (0-74 years old) was of 22.27%.The crude incidence rate in urban areas was higher than that in rural areas.However,after adjusted by age,the incidence rate in urban was lower than that in rural.The crude cancer mortality was 184.67/100,000 (228.14/100,000 in male and 140.48/100,000 in female),and the age-standardized mortality rates by Chinese standard population (ASMRC) and by world population were 84.36/100,000 and 114.32/100,000,respectively.The cumulative mortality rate (0-74 years old) was of 12.89%.Age-adjusted mortality rates in urban areas were lower than that in rural areas.The most common cancer sites were lung,stomach,colon-rectum,liver,esophagus,pancreas,brain,lymphoma,breast and cervix which accounted for 75% of all cancer incidence.Lung cancer was the leading cause of

  13. Safety and Health Standard 110: Incident/accident reporting and investigation

    Energy Technology Data Exchange (ETDEWEB)

    Sones, K. [West Kootenay Power, BC (Canada)

    1999-10-01

    Incident/accident reporting requirements in effect at West Kootenay Power are discussed. Details provided include definitions of low risk, high risk, and critical events, the incidents to be reported, the nature of the reports, the timelines, the investigation to be undertaken for each type of incident/accident, counselling services available to employees involved in serious incidents, and the procedures to be followed in accidents involving serious injury to non-employees. The emphasis is on the `critical five` high risk events and the procedures relating to them.

  14. Incident reporting in post-operative patients managed by acute pain service

    Directory of Open Access Journals (Sweden)

    Syeda Fauzia Hasan

    2015-01-01

    Full Text Available Background and Aims: Incident reporting is a reliable and inexpensive tool used in anaesthesia to identify errors in patient management. A hospital incident reporting system was already present in our hospital, but we were unable to find any incident related to acute pain management. Hence, acute pain service (APS was started for voluntary incident reporting in post-operative patients to identify critical incidents, review the root cause and suggest remedial measures. Methods: All post-operative patients managed by APS were included in this observational study. A proforma was developed by APS, which included information about the type of incident (equipment and patient-related, human errors, severity of incident, person responsible and suggestions to prevent the same incident in the future. Patients and medical staff were informed about the reporting system. Whenever an incident was identified, a proforma was filled out by APS resident and data entered in SPSS programme. Results: Total of 98 (1.80% incidents were reported in 5432 patients managed by APS during 3 years period. Average age of the patients was 46 ± 17 years. Majority of incidents were related to epidural care (71% and occurred in surgical wards (87%. Most of the incidents occurred due to human error and infusion delivery set-related defects. Conclusion: Incident reporting proved to be a feasible method of improving quality care in developing countries. It not only provides valuable information about areas which needed improvement, but also helped in developing strategies to improve care. Knowledge and attitudes of medical and paramedical staff are identified as the targeted area for improvement.

  15. Case report of critical incident stress debriefing through translators.

    Science.gov (United States)

    True, P K

    2000-01-01

    The United States Navy has SPRINT (Special Psychiatric Rapid Intervention Team) teams stationed in National Naval Medical Center in Bethesda, Maryland, Naval Regional Medical Center in Portsmouth, Virginia, Naval Regional Medical Center in San Diego, California, and US Naval Hospital, Bremerton, Washington. These teams are large units of psychiatrists, psychologists, nurses, chaplains, and hospital corpsmen who are trained in the techniques of Critical Incident Stress using the model developed by Jeffrey T. Mitchell and George S. Everly, Jr. (Mitchell & Everly, 1996; Everly & Mitchell, 1999). In addition to these large SPRINT teams, smaller Critical Incident Stress Management (CISM) teams exist at several Navy commands, including US Naval Hospital, Jacksonville, Florida. Since the formation of SPRINT teams, there have been several hundred interventions done at various military sites. This article discusses an intervention that was particularly unusual in that it was done by US military personnel for the members of the Argentine military, none of whom could speak English.

  16. 75 FR 922 - Notification and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and...

    Science.gov (United States)

    2010-01-07

    ... SAFETY BOARD 49 CFR Part 830 Notification and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and Preservation of Aircraft Wreckage, Mail, Cargo, and Records AGENCY: National Transportation... notification and reporting requirements regarding aircraft accidents or incidents. In particular, the NTSB is...

  17. Using Pareto Analysis with Trend Analysis: Statistical Techniques to Investigate Incident Reports within a Housing System

    Science.gov (United States)

    Luna, Andrew L.

    1998-01-01

    The purpose of this study was to determine trends and difficulties concerning student incident reports within the residence halls as they relate to the incident reporting system from the Department of Housing and Residential Life at a Southeastern Doctoral I Granting Institution. This study used the frequency distributions of each classified…

  18. 77 FR 53779 - Reports by Air Carriers on Incidents Involving Animals During Air Transport

    Science.gov (United States)

    2012-09-04

    ... Incidents Involving Animals During Air Transport AGENCY: Office of the Secretary (OST), Department of... comment period of an NPRM on the reporting of incidents involving animals during air transport that was... animal during air transport. The NPRM proposed to: (1) Expand the reporting requirement to U.S....

  19. 75 FR 35329 - Notification and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and...

    Science.gov (United States)

    2010-06-22

    ... SAFETY BOARD 49 CFR Part 830 Notification and Reporting of Aircraft Accidents or Incidents and Overdue... addition, the NTSB is correcting a footnote because the NTSB no longer has a regional office in Parsippany... NPRM titled ``Notification and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and...

  20. Less noise, more hacking: how to deploy principles from MIT's hacking medicine to accelerate health care.

    Science.gov (United States)

    DePasse, Jacqueline W; Carroll, Ryan; Ippolito, Andrea; Yost, Allison; Santorino, Data; Chu, Zen; Olson, Kristian R

    2014-07-01

    Medical technology offers enormous potential for scalable medicine--to improve the quality and access in health care while simultaneously reducing cost. However, current medical device innovation within companies often only offers incremental advances on existing products, or originates from engineers with limited knowledge of the clinical complexities. We describe how the Hacking Medicine Initiative, based at Massachusetts Institute of Technology has developed an innovative "healthcare hackathon" approach, bringing diverse teams together to rapidly validate clinical needs and develop solutions. Hackathons are based on three core principles; emphasis on a problem-based approach, cross-pollination of disciplines, and "pivoting" on or rapidly iterating on ideas. Hackathons also offer enormous potential for innovation in global health by focusing on local needs and resources as well as addressing feasibility and cultural contextualization. Although relatively new, the success of this approach is clear, as evidenced by the development of successful startup companies, pioneering product design, and the incorporation of creative people from outside traditional life science backgrounds who are working with clinicians and other scientists to create transformative innovation in health care.

  1. Quantum key distribution with hacking countermeasures and long term field trial.

    Science.gov (United States)

    Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J

    2017-05-16

    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.

  2. Risk factors for radiotherapy incidents and impact of an online electronic reporting system.

    Science.gov (United States)

    Chang, David W; Cheetham, Lynn; te Marvelde, Luc; Bressel, Mathias; Kron, Tomas; Gill, Suki; Tai, Keen Hun; Ball, David; Rose, William; Silva, Linas; Foroudi, Farshad

    2014-08-01

    To ascertain the rate, type, significance, trends and the potential risk factors associated with radiotherapy incidents in a large academic department. Data for all radiotherapy activities from July 2001 to January 2011 were reviewed from radiotherapy incident reporting forms. Patient and treatment data were obtained from the radiotherapy record and verification database (MOSAIQ) and the patient database (HOSPRO). Logistic regression analyses were performed to determine variables associated with radiotherapy incidents. In that time, 65,376 courses of radiotherapy were delivered with a reported incident rate of 2.64 per 100 courses. The rate of incidents per course increased (1.96 per 100 courses to 3.52 per 100 courses, p5% deviation in dose (10.50 to 2.75%, p<0.001) had decreased after the introduction of an online electronic reporting system. The following variables were associated with an increased rate of incidents: afternoon treatment time, paediatric patients, males, inpatients, palliative plans, head-and-neck, skin, sarcoma and haematological malignancies. In general, complex plans were associated with higher incidence rates. Radiotherapy incidents were infrequent and most did not result in significant dose deviation. A number of risk factors were identified and these could be used to highlight high-risk cases in the future. Introduction of an online electronic reporting system resulted in a significant increase in the number of incidents being reported. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  3. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  4. p-Curve and p-Hacking in Observational Research.

    Directory of Open Access Journals (Sweden)

    Stephan B Bruns

    Full Text Available The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable.

  5. p-Curve and p-Hacking in Observational Research.

    Science.gov (United States)

    Bruns, Stephan B; Ioannidis, John P A

    2016-01-01

    The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable.

  6. A Profile of Criminal Incidents at School: Results from the 2003-05 National Crime Victimization Survey Crime Incident Report NCES 2010-318

    Science.gov (United States)

    Ruddy, Sally A.; Bauer, Lynn; Neiman, Samantha

    2010-01-01

    This report provides estimates of criminal incidents that occur at school. Incident-level data were obtained from the National Crime Victimization Survey (NCVS), the nation's primary source of information on criminal victimization and criminal incidents in the United States. The NCVS collects demographic information on respondents in the NCVS…

  7. Schistosomal appendicitis: Incidence in Japan and a case report

    Institute of Scientific and Technical Information of China (English)

    Tadashi Terada

    2009-01-01

    Schistosomal appendicitis is very rare in developed countries like the USA, Europe, and Japan. The author reviewed 311 pathologic archival specimens of vermiform appendix over the past 10 years. One case of schistosomal appendicitis was recognized. Therefore, the incidence of this disease was 0.32% in all appendices surgically resected in our hospital. The patient was a 41-year-old woman presenting with lower abdominal pain. She was a sailor traveling to many countries including endemic areas. Physical examination, laboratory data, and imaging modalities suggested an acute appendicitis, and appendectomy was performed under the diagnosis of ordinary appendicitis. Histologically, numerous schistosomal eggs were present in the vasculatures throughout the appendiceal walls. Some of the eggs were calcified. Stromal foreign body reaction was also recognized. The appendicitis was phlegmonous consisting of severe infiltrations of neutrophils and eosinophils. Acute serositis was also noted. Examination of feces revealed numerous eggs of Schistosoma mansoni. Clinicians should be aware of schistosomal appendicitis.

  8. 18 CFR 12.10 - Reporting safety-related incidents.

    Science.gov (United States)

    2010-04-01

    ... at the project, the applicant or licensee must report that drowning or other accident to the Regional... the Regional Engineer any condition affecting the safety of a project or projects works, as defined in...)(1), the applicant or licensee must submit to the Regional Engineer a written report on the condition...

  9. Cancer incidence in south-east Nigeria: a report from Nnewi Cancer ...

    African Journals Online (AJOL)

    Cancer incidence in south-east Nigeria: a report from Nnewi Cancer Registry. ... Journal Home > Vol 29, No 1-2 (2017) > ... 000 per annum and age-standardized incidence rates per 100 000 per annum using the world standard population.

  10. SU-E-T-511: Inter-Rater Variability in Classification of Incidents in a New Incident Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Pappas, D; Reis, S; Ali, A [Hofstra University, Hempstead, NY (United States); Kapur, A [Long Island Jewish Medical Center, New Hyde Park, NY (United States)

    2015-06-15

    Purpose To determine how consistent the results of different raters are when reviewing the same cases within the Radiation Oncology Incident Learning System (ROILS). Methods Three second-year medical physics graduate students filled out incident reports in spreadsheets set up to mimic ROILS. All students studied the same 33 cases and independently entered their assessments, for a total of 99 reviewed cases. The narratives for these cases were obtained from a published International Commission on Radiological Protection (ICRP) report which included shorter narratives selected from the Radiation Oncology Safety Information System (ROSIS) database. Each category of questions was reviewed to see how consistent the results were by utilizing free-marginal multirater kappa analysis. The percentage of cases where all raters shared full agreement or full disagreement was recorded to show which questions were answered consistently by multiple raters for a given case. The consistency among the raters was analyzed between ICRP and ROSIS cases to see if either group led to more reliable results. Results The categories where all raters agreed 100 percent in their choices were the event type (93.94 percent of cases 0.946 kappa) and the likelihood of the event being harmful to the patient (42.42 percent of cases 0.409 kappa). The categories where all raters disagreed 100 percent in their choices were the dosimetric severity scale (39.39 percent of cases 0.139 kappa) and the potential future toxicity (48.48 percent of cases 0.205 kappa). ROSIS had more cases where all raters disagreed than ICRP (23.06 percent of cases compared to 15.58 percent, respectively). Conclusion Despite reviewing the same cases, the results among the three raters was widespread. ROSIS narratives were shorter than ICRP, which suggests that longer narratives lead to more consistent results. This study shows that the incident reporting system can be optimized to yield more consistent results.

  11. Plutonium Reclamation Facility incident response project progress report

    Energy Technology Data Exchange (ETDEWEB)

    Austin, B.A.

    1997-11-25

    This report provides status of Hanford activities in response to process deficiencies highlighted during and in response to the May 14, 1997, explosion at the Plutonium Reclamation Facility. This report provides specific response to the August 4, 1997, memorandum from the Secretary which requested a progress report, in 120 days, on activities associated with reassessing the known and evaluating new vulnerabilities (chemical and radiological) at facilities that have been shut down, are in standby, are being deactivated or have otherwise changed their conventional mode of operation in the last several years. In addition, this report is intended to provide status on emergency response corrective activities as requested in the memorandum from the Secretary on August 28, 1997. Status is also included for actions requested in the second August 28, 1997, memorandum from the Secretary, regarding timely notification of emergencies.

  12. [Learning from mistakes in hospitals. A system perspective on errors and incident reporting systems].

    Science.gov (United States)

    Hofinger, G

    2009-06-01

    Analysis of incidents and near-incidents is an important factor for continuous improvement in patient safety in hospitals and for the promotion of organizational learning. From a system perspective, accidents occur when decision-making at several levels of a working system is faulty and the safety barriers fail. Human error is inevitable but accidents are not. Errors can be used as an opportunity for organizational learning and this is especially true for incidents when patients come to no harm. Starting with explanations of a system perspective on errors, this paper deals with the prerequisites for organizational learning and general rules for establishing incident reporting systems in hospitals.

  13. Diagnostic strategies and the incidence of prostate cancer:reasons for the low reported incidence of prostate cancer in China

    Institute of Scientific and Technical Information of China (English)

    Ling Zhang; Shan Wu; Li-Rong Guo; Xue-Jian Zhao

    2009-01-01

    We have analysed the reasons for the low reported incidence of prostate cancer in China and argue for early diagnosis and treatment of this disease.According to the 2002 database of the International Agency for Research on Cancer (IARC),the age-standardized incidence of prostate cancer in China is 1.6/105 person years (PY),with a mortality rate of 1.0/105PY and mortality-to-incidence rate ratio (MR/IR)=0.63.The MR/IR ratio of prostate cancer in China was found to be higher than the average in Asia (MR/IR=0.57) and much higher than that in North America (MR/IR=0.13).These data indicate that in China most prostate cancers were in the advanced stages at the time of diagnosis,and that patients had a short survival time thereafter.In 2004,Stamey et al.reported a retrospective American study of prostate cancer for the years 1983-2003.It was shown that most cases of prostate cancer detected by prostate-specific antigen (PSA) screening were in the advanced stage at the start of this 20-year period.These early follow-up data are quite similar to the results obtained from mass PSA screening of elderly men in Changchun,China.However,after the American programmes for early diagnosis and treatment of prostate cancer were accepted,tumours were diagnosed at earlier stages.On the basis of these findings,mass screening should be performed in the whole of China using serum PSA to facilitate early diagnosis and treatment of prostate cancer.

  14. Department of Veterans Affairs - Monthly Report to Congress of Data Incidents (April 2014)

    Data.gov (United States)

    Department of Veterans Affairs — This is a monthly report that the VA Office of Information Technology provides to congress about data incidents that took place during the month (April 2014). The...

  15. Incident reporting by acute pain service at a tertiary care university hospital

    Directory of Open Access Journals (Sweden)

    Aliya Ahmed

    2015-01-01

    Conclusion: Reporting of untoward incidents and their regular analysis by APS is recommended to ensure high-quality patient care and to provide guidance in making teaching strategies and guidelines to improve patient safety.

  16. Incident Reporting and Lessons Learned [Rocky Mountain Arsenal National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this procedure is to create an effective and consistent process to report all incidences as defined by this procedure - maintain and distribute...

  17. Change in Reported Lyme Disease Incidence in the Northeast and Upper Midwest, 1991-2014

    Data.gov (United States)

    U.S. Environmental Protection Agency — This indicator shows how reported Lyme disease incidence has changed by state since 1991, based on the number of new cases per 100,000 people. The total change has...

  18. Rating and Classification of Incident Reporting in Radiology in a Large Academic Medical Center.

    Science.gov (United States)

    Mansouri, Mohammad; Aran, Shima; Shaqdan, Khalid W; Abujudeh, Hani H

    2016-01-01

    The purpose of this article is to provide a rate of safety incident report of adverse events in a large academic radiology department and to share the various types that may occur. This is a Health Insurance Portability and Accountability Act compliant, institutional review board-approved study. Consent requirement was waived. All incident reports from April 2006-September 2012 were retrieved. Events were further classified as follows: diagnostic test orders, identity document or documentation or consent, safety or security or conduct, service coordination, surgery or procedure, line or tube, fall, medication or intravenous safety, employee general incident, environment or equipment, adverse drug reaction (ADR), skin or tissue, and diagnosis or treatment. Overall rates and subclassification rates were calculated. There were 10,224 incident reports and 4,324,208 radiology examinations (rate = 0.23%). The highest rates of the incident reports were due to diagnostic test orders (34.3%; 3509/10,224), followed by service coordination (12.2%; 1248/10,224) and ADR (10.3%; 1052/4,324,208). The rate of incident reporting was highest in inpatient (0.30%; 2949/970,622), followed by emergency radiology (0.22%; 1500/672,958) and outpatient (0.18%; 4957/2,680,628). Approximately 48.5% (4947/10,202) of incidents had no patient harm and did not affect the patient, followed by no patient harm, but did affect the patient (35.2%, 3589/10,202), temporary or minor patient harm (15.5%, 1584/10,202), permanent or major patient harm (0.6%, 62/10,202), and patient death (0.2%, 20/10,202). Within an academic radiology department, the rate of incident reports was only 0.23%, usually did not harm the patient, and occurred at higher rates in inpatients. The most common incident type was in the category of diagnostic test orders, followed by service coordination, and ADRs.

  19. Analysis of immediate transfusion incidents reported in a regional blood bank

    Directory of Open Access Journals (Sweden)

    Adriana Lemos de Sousa Neto

    2011-10-01

    Full Text Available BACKGROUND: Blood transfusion is imperative when treating certain patients; however, it is not risk free. In addition to the possible transmission of contagious infectious diseases, incidents can occur immediately after transfusion and at a later time. AIMS: This study aimed to examine the immediate transfusion incidents reported in a regional blood bank in the state of Minas Gerais between December 2006 and December 2009. A retrospective quantitative epidemiological study was conducted. Data were obtained from 202 transfusion incident reports of 42 health institutions served by the blood bank. Data processing and analysis were carried out using the Statistical Package for the Social Sciences (SPSS software. RESULTS: The rate of immediate transfusion incidents reported in the period was 0.24%; febrile non-hemolytic reactions were the most common type of incident (56.4%. The most frequent clinical manifestations listed in transfusion incident reports were chills (26.9% and fever (21.6%. There was a statistically significant association (p-value < 0.05 between the infusion of platelet concentrates and febrile non-hemolytic reactions and between fresh frozen plasma and febrile non-hemolytic reaction. The majority (73.3% of transfused patients who suffered immediate transfusion incidents had already been transfused and 36.5% of the cases had previous transfusion incident reports. CONCLUSIONS: Data from the present study corroborate the implementation of new professional training programs aimed at blood transfusion surveillance. These measures should emphasize prevention, identification and reporting of immediate transfusion incidents aiming to increase blood transfusion quality and safety.

  20. Flight Attendant Fatigue. Part IV. Analysis of Incident Reports

    Science.gov (United States)

    2009-12-01

    other airline not listed above that operates within a specific niche market [e.g., hawaiian Airlines]) 3. When did your air carrier become involved...into JFk, ny. 592062 Narrative: reported to work on Jul/ Wed /03 at xA10. Boarded airplane at approximately xA35 and departed ZZZ. Captain discovered...Something must be done to change or eliminate the hawaiian island turns, especially the all night turns. My concerns are not regarding violations

  1. GROWTH HACKING PRACTICES IN A START-UP: A CASE STUDY ON THECON.RO

    Directory of Open Access Journals (Sweden)

    Marius GERU

    2014-06-01

    Full Text Available Despite the increasing awareness of content marketing tools in the academic community, the benefits of growth hacking were highlighted especially in blog posts and several e-books. This paper examines the particular features of growth hacking techniques, which differentiates it from traditional marketing. Specifically, a content analysis was conducted to identify the experts’ opinions regarding the effective use of growth hacking techniques, to detect the specific skills that a growth hacker must gain and to compare the tools related to this concept from both inbound and outbound marketing perspective. On the other hand, we outlined the need for development of start-ups, without spending huge amounts of money in marketing. Using a case study methodology, we examined the motivations of adopting growth hacking techniques by an Internet pure player - Thecon. Results show that the effective mix of growth hacking techniques applied by this company tends to forward more online content than its competitors.

  2. 75 FR 5640 - Pipeline Safety: Implementation of Revised Incident/Accident Report Forms for Distribution...

    Science.gov (United States)

    2010-02-03

    .../Accident Report Forms for Distribution Systems, Gas Transmission and Gathering Systems, and Hazardous... PHMSA`s Revised Incident/Accident Report Forms for Gas Distribution Systems, Gas Transmission and... Transmission and Gathering Systems, and (3) PHMSA Form F 7000-1--Accident Report for Hazardous Liquid...

  3. Statistical analysis of incidents reported in the Greek Petrochemical Industry for the period 1997-2003.

    Science.gov (United States)

    Konstandinidou, Myrto; Nivolianitou, Zoe; Markatos, Nikolaos; Kiranoudis, Chris

    2006-07-31

    This paper makes an analysis of all reported accidents and incidents in the Greek Petrochemical Industry for the period spanning from 1997 to 2003. The work performed is related to the analysis of important parameters of the incidents, their inclusion in a database adequately designed for the purposes of this analysis and an importance assessment of this reporting scheme. Indeed, various stakeholders have highlighted the importance of a reporting system for industrial accidents and incidents. The European Union has established for this purpose the Major Accident Reporting System (MARS) for the reporting of major accidents in the Member States. However, major accidents are not the only measure that can characterize the safety status of an establishment; neither are the former the only events from which important lessons can be learned. Near misses, industrial incidents without major consequences, as well as occupational accidents could equally supply with important findings the interested analyst, while statistical analysis of these incidents could give significant insight in the understanding and the prevention of similar incidents or major accidents in the future. This analysis could be more significant, if each industrial sector was separately analyzed, as the authors do for the petrochemical sector in the present article.

  4. The ethical hack a framework for business value penetration testing

    CERN Document Server

    Tiller, James S

    2004-01-01

    INTRODUCTIONPerspectives of ValueSECURITY AND HACKINGInformation SecuritySecurity ArchitectureHacking ImpactsTHE FRAMEWORKBusiness Planning and OperationsReconnaissanceEnumerationVulnerability AnalysisExploitationFinal AnalysisDeliverableIntegration INFORMATION SECURITY PROGRAMScope of Information Security ProgramsThe Process of Information SecurityComponent Parts of Information Security ProgramsBUSINESS PLANNING AND OPERATIONSBusiness ObjectivesSecurity PolicyPrevious Test ResultsBusiness ChallengesThe Business of SecurityReasoningOverall ExpectationsHow Deep is Deep Enough?Timing is Everythi

  5. Hacking point of sale payment application secrets, threats, and solutions

    CERN Document Server

    Gomzin, Slava

    2014-01-01

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendati

  6. 黄昏的腕轮传说(.hack//SIGN)

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    .hack//SIGN可谓日本当今最走红的动漫作品之一。在大型网络游戏TheWorld中漫无边际游荡的主人翁司忽然发现一个可怕的现实:他竟然没有办法从游戏里退出!而与此同时,一股神秘的力量开始“帮助”这个弱不禁风的小魔法师。这究竟

  7. Optimised quantum hacking of superconducting nanowire single-photon detectors

    Science.gov (United States)

    Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.

    2014-03-01

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  8. Hacking Health: Bottom-up Innovation for Healthcare

    Directory of Open Access Journals (Sweden)

    Jeeshan Chowdhury

    2012-07-01

    Full Text Available Healthcare is not sustainable and still functions with outdated technology (e.g., pagers, paper records. Top-down approaches by governments and corporations have failed to deliver digital technologies to modernize healthcare. Disruptive innovation must come from the ground up by bridging the gap between front-line health experts and innovators in the latest web and mobile technology. Hacking Health is a hackathon that is focused on social innovation more than technical innovation. Our approach to improve healthcare is to pair technological innovators with healthcare experts to build realistic, human-centric solutions to front-line healthcare problems.

  9. Quality review of an adverse incident reporting system and root cause analysis of serious adverse surgical incidents in a teaching hospital of Scotland

    Directory of Open Access Journals (Sweden)

    Khorsandi Maziar

    2012-08-01

    Full Text Available Abstract Background A significant proportion of surgical patients are unintentionally harmed during their hospital stay. Root Cause Analysis (RCA aims to determine the aetiology of adverse incidents that lead to patient harm and produce a series of recommendations, which would minimise the risk of recurrence of similar events, if appropriately applied to clinical practice. A review of the quality of the adverse incident reporting system and the RCA of serious adverse incidents at the Department of Surgery of Ninewells hospital, in Dundee, United Kingdom was performed. Methods The Adverse Incident Management (AIM database of the Department of Surgery of Ninewells Hospital was retrospectively reviewed. Details of all serious (red, sentinel incidents recorded between May 2004 and December 2009, including the RCA reports and outcomes, where applicable, were reviewed. Additional related information was gathered by interviewing the involved members of staff. Results The total number of reported surgical incidents was 3142, of which 81 (2.58% cases had been reported as red or sentinel. 19 of the 81 incidents (23.4% had been inappropriately reported as red. In 31 reports (38.2% vital information with regards to the details of the adverse incidents had not been recorded. In 12 cases (14.8% the description of incidents was of poor quality. RCA was performed for 47 cases (58% and only 12 cases (15% received recommendations aiming to improve clinical practice. Conclusion The results of our study demonstrate the need for improvement in the quality of incident reporting. There are enormous benefits to be gained by this time and resource consuming process, however appropriate staff training on the use of this system is a pre-requisite. Furthermore, sufficient support and resources are required for the implementation of RCA recommendations in clinical practice.

  10. Community pharmacy incident reporting: a new tool for community pharmacies in Canada.

    Science.gov (United States)

    Ho, Certina; Hung, Patricia; Lee, Gary; Kadija, Medina

    2010-01-01

    Incident reporting offers insight into a variety of intricate processes in healthcare. However, it has been found that medication incidents are under reported in the community pharmacy setting. The Community Pharmacy Incident Reporting (CPhIR) program was created by the Institute for Safe Medication Practices Canada specifically for incident reporting in the community pharmacy setting in Canada. The initial development of key elements for CPhIR included several focus-group teleconferences with pharmacists from Ontario and Nova Scotia. Throughout the development and release of the CPhIR pilot, feedback from pharmacists and pharmacy technicians was constantly incorporated into the reporting program. After several rounds of iterative feedback, testing and consultation with community pharmacy practitioners, a final version of the CPhIR program, together with self-directed training materials, is now ready to launch. The CPhIR program provides users with a one-stop platform to report and record medication incidents, export data for customized analysis and view comparisons of individual and aggregate data. These unique functions allow for a detailed analysis of underlying contributing factors in medication incidents. A communication piece for pharmacies to share their experiences is in the process of development. To ensure the success of the CPhIR program, a patient safety culture must be established. By gaining a deeper understanding of possible causes of medication incidents, community pharmacies can implement system-based strategies for quality improvement and to prevent potential errors from occurring again in the future. This article highlights key features of the CPhIR program that will assist community pharmacies to improve their drug distribution system and, ultimately, enhance patient safety.

  11. One Coin has Two Sides: A Comparative Appraisal of New York Times and China Daily’s News Coverage of Alleged Internet Hacking

    Directory of Open Access Journals (Sweden)

    Wenyu Liu

    2015-04-01

    Full Text Available There is always some debate as to whether news reporting is objective and emotionless. Under the guidance of engagement system, a sub-system of Appraisal Theory, concerning the conveyance of ideology, the present study attempts to make a comparative study of different ideological attitudes by news coverage in New York Times and China Daily’s (English version on alleged internet hacking. The findings suggest that similar distributions of engagement resources in the news reports are adopted when engaged in an ideological attitude. Additionally, China Daily and New York Times hold different attitudes to Internet hacking. The attitude by China Daily changes before and after Snowden Event, while New York Times remains the same.

  12. E-Community: Mobile application for reporting incidents of public services of a city

    Directory of Open Access Journals (Sweden)

    Jaime Suárez

    2013-12-01

    Full Text Available This paper reports the mobile application call E-Community, an application of a social nature with the objective that the civilian population in the city of La Paz, Baja California Sur, Mexico, have an alternative to report incidents that deal with services public. Generally, citizens reported by telephone different types of incidents such as traffic accidents, water leaks, lighting shabby, fire, garbage collection, however sometimes the phone is not attended for various reasons so regularly only remains in the record attempt. E-community, is a mobile application that aims to make ads via a click, registering the report in a database making use of Geographical Positioning System (GPS and a smarthphone with the option to write a message describing details of the this information, this message is routed through the operations center to the appropriate authority depending on incident.

  13. Application of Hospital Information Systems-Construction of an Incident Reporting System

    Directory of Open Access Journals (Sweden)

    Yii-Ching Lee

    2016-11-01

    Full Text Available This study depicts hospitals’ need to establish an incident reporting system to avoid disputes and enhance reporting intention. A series of implement are provided, including an RCA team is partied to make improvements based on the root cause of a case, a reward system needs to be provided to encourage the employees’ intentions to report incident events, and the root causes is analyzed to deliver the improvement measures. In addition, Medical Quality and Patient Safety Committee should be organized to promote better medical quality and patient safety. Last, the promotion of patient safety culture should pay more attention to the implement process, rather than separate strategies.

  14. [The critical incident reporting system as an instrument of risk management for better patient safety].

    Science.gov (United States)

    Panzica, M; Krettek, C; Cartes, M

    2011-09-01

    The probability that an inpatient will be harmed by a medical procedure is at least 3% of all patients. As a consequence, hospital risk management has become a central management task in the health care sector. The critical incident reporting system (CIRS) as a voluntary instrument for reporting (near) incidents plays a key role in the implementation of a risk management system. The goal of the CIRS is to register system errors without assigning guilt or meting out punishment and at the same time increasing the number of voluntary reports.

  15. Incidence and pattern of 12 years of reported transfusion adverse events in Zimbabwe: A retrospective analysis

    NARCIS (Netherlands)

    Mafirakureva, Nyashadzaishe; Khoza, Star; Mvere, David A.; Chitiyo, McLeod E.; Postma, Maarten J.; Van Hulst, Marinus

    2014-01-01

    Background. Haemovigilance hinges on a systematically structured reporting system, which unfortunately does not always exist in resource-limited settings. We determined the incidence and pattern of transfusion-related adverse events reported to the National Blood Service Zimbabwe. Materials and meth

  16. Educators' Reports on Incidence of Harassment and Advocacy toward LGBTQ Students

    Science.gov (United States)

    Dragowski, Eliza A.; McCabe, Paul C.; Rubinson, Florence

    2016-01-01

    This study is based on a national survey investigation of 968 educators, who reported the incidence of LGBTQ harassment in schools, and their advocacy efforts on behalf of this population. LGBTQ-related knowledge, attitudes, norms, and perceived ability to advocate were also assessed. Ninety percent of educators reported observing LGBTQ harassment…

  17. Longitudinal trends in organophosphate incidents reported to the National Pesticide Information Center, 1995–2007

    Directory of Open Access Journals (Sweden)

    Jenkins Jeffrey J

    2009-04-01

    Full Text Available Abstract Background Regulatory decisions to phase-out the availability and use of common organophosphate pesticides among the general public were announced in 2000 and continued through 2004. Based on revised risk assessments, chlorpyrifos and diazinon were determined to pose unacceptable risks. To determine the impact of these decisions, organophosphate (OP exposure incidents reported to the National Pesticide Information Center (NPIC were analyzed for longitudinal trends. Methods Non-occupational human exposure incidents reported to NPIC were grouped into pre- (1995–2000 and post-announcement periods (2001–2007. The number of total OP exposure incidents, as well as reports for chlorpyrifos, diazinon and malathion, were analyzed for significant differences between these two periods. The number of informational inquiries from the general public was analyzed over time as well. Results The number of average annual OP-related exposure incidents reported to NPIC decreased significantly between the pre- and post-announcement periods (p Conclusion Consistent with other findings, the number of chlorpyrifos and diazinon exposure incidents reported to NPIC significantly decreased following public announcement and targeted regulatory action.

  18. Attitudes and perceived barriers of tertiary level health professionals towards incident reporting in Pakistan

    Directory of Open Access Journals (Sweden)

    Muhammad Raees Malik

    2010-02-01

    Full Text Available Background: A limited framework of incident reporting exists in most of the health care system in Pakistan. This poses a risk to the patient population and therefore there is a need to find the causes behind the lack of such a system in healthcare settings in Pakistan. Aims: To determine the attitudes and perceived barriers towards incident reporting among tertiary care health professionals in Pakistan. Materials and Methods: The study was done in Shifa International Hospitals and consisted of a questionnaire given to 217 randomly selected doctors and nurses. Mean ± SD of continuous variables and frequency (percentage % of categorical variables are presented. Chi square statistical analysis was used to test the significance of association among doctors and nurses with various outcome variables (motivators to report, perceived barriers, preferred person to report and patient’s outcome that influence reporting behaviors. P value of <0.05 was considered significant. Student doctors and student nurses were not included in the study. Results: Unlike consultant, registrars, medical officers and nurses (more than 95% are willing to report, only 20% of house officers will report the incident happened through them. Sixty nine percent of doctors and 67% of nurses perceive ‘administration sanction’ as a common barrier to incident reporting. Sixty percent of doctors and 80% of nurses would prefer reporting to the head of the department. Conclusions: By giving immunity from administrative sanction, providing prompt feedback and assurance that the incident reporting will be used to make changes in the system, there is considerable willingness of doctors and nurses to take time out of their busy schedules to submit reports.

  19. Reported fatal and non-fatal incidents involving tourists in Thailand, July 1997-June 1999.

    Science.gov (United States)

    Leggat, Peter A; Leggat, Frances W

    2003-05-01

    Objectives. To examine fatal and non-fatal incidents involving tourists in Thailand. Methods. Press records from a major English language newspaper for the period from July 1997 to June 1999 were examined for reports of fatal and non-fatal incidents involving tourists. Results. From July 1997 to June 1999, up to 233 deaths were reported and up to a further 216 were reported injured in incidents involving tourists. One hundred and one deaths and 45 injured were reported following one major domestic jet aircraft crash in southern Thailand, however, it was not stated what proportion of casualties were tourists. Approximately 90 people perished in a single hotel fire in southeast Thailand. Most of the victims were local travellers attending meetings of two Thai companies. Sixteen deaths and 86 injured resulted from five road accidents. The majority of deaths and injuries involved foreigners. Twelve deaths and at least 33 injured resulted from three ferry and tour boat accidents. Most victims were reported to be foreigners. Three deaths and 35 injured resulted from a single cable car accident in northern Thailand. Most of these were Thai tourists, however, four of the injured were foreigners. Eight deaths and six injured resulted from 11 muggings and other violent incidents. All were foreigners. Six deaths were reportedly connected to a scam at the airport in Bangkok involving unlicensed airport taxis. Three deaths and four injured were due to other reported incidents. Conclusions. Newspaper reports of fatal and non-fatal incidents involving tourists in Thailand were probably uncommon, particularly given the volume of tourists entering the Kingdom, although better reporting mechanisms are needed. With the exception of the unusual major incidents, most reported fatal and non-fatal incidents involving tourists were due to road trauma and other transportation accidents, muggings, and occasional water sports and other accidents, which could occur at any major tourist

  20. Medication incidents related to automated dose dispensing in community pharmacies and hospitals--a reporting system study.

    Science.gov (United States)

    Cheung, Ka-Chun; van den Bemt, Patricia M L A; Bouvy, Marcel L; Wensing, Michel; De Smet, Peter A G M

    2014-01-01

    Automated dose dispensing (ADD) is being introduced in several countries and the use of this technology is expected to increase as a growing number of elderly people need to manage their medication at home. ADD aims to improve medication safety and treatment adherence, but it may introduce new safety issues. This descriptive study provides insight into the nature and consequences of medication incidents related to ADD, as reported by healthcare professionals in community pharmacies and hospitals. The medication incidents that were submitted to the Dutch Central Medication incidents Registration (CMR) reporting system were selected and characterized independently by two researchers. Person discovering the incident, phase of the medication process in which the incident occurred, immediate cause of the incident, nature of incident from the healthcare provider's perspective, nature of incident from the patient's perspective, and consequent harm to the patient caused by the incident. From January 2012 to February 2013 the CMR received 15,113 incidents: 3,685 (24.4%) incidents from community pharmacies and 11,428 (75.6%) incidents from hospitals. Eventually 1 of 50 reported incidents (268/15,113 = 1.8%) were related to ADD; in community pharmacies more incidents (227/3,685 = 6.2%) were related to ADD than in hospitals (41/11,428 = 0.4%). The immediate cause of an incident was often a change in the patient's medicine regimen or relocation. Most reported incidents occurred in two phases: entering the prescription into the pharmacy information system and filling the ADD bag. A proportion of incidents was related to ADD and is reported regularly, especially by community pharmacies. In two phases, entering the prescription into the pharmacy information system and filling the ADD bag, most incidents occurred. A change in the patient's medicine regimen or relocation was the immediate causes of an incident.

  1. In situ simulation: Taking reported critical incidents and adverse events back to the clinic

    DEFF Research Database (Denmark)

    Juul, Jonas; Paltved, Charlotte; Krogh, Kristian

    2014-01-01

    does not tap into situational resources, e.g. individual, team, and organisational characteristics such as routines, personal relations, distributed skill-levels etc. Therefore, it fails to fully mimic real clinical team processes. Alternatively, in situ simulation offers a unique opportunity...... improve patient safety if coupled with training and organisational support2. Insight into the nature of reported critical incidents and adverse events can be used in writing in situ simulation scenarios and thus lead to interventions that enhance patient safety. The patient safety literature emphasises...... well-developed non-technical skills in preventing medical errors3. Furthermore, critical incidents and adverse events reporting systems comprise a knowledgebase to gain in-depth insights into patient safety issues. This study explores the use of critical incidents and adverse events reports to inform...

  2. Time-sampled versus continuous-time reporting for measuring incidence.

    Science.gov (United States)

    McNamee, Roseanne; Chen, Yiqun; Hussey, Louise; Agius, Raymond

    2010-05-01

    Accuracy of incidence estimates may be affected by biases that depend on frequency of approach to reporters and reporting window length. A time-sampling strategy enables infrequent approaches with short windows but has never been evaluated. A randomized crossover trial compared incidence estimates of work-related diseases using time-sampled versus continuous-time reporting. Physicians were randomly allocated either to report every month (12/12) in 2004 and for 1 randomly chosen month (1/12) in 2005, or to the reverse sequence. Numbers of new cases of work-related disease reported per reporter per month for 1/12 and 12/12 reporting periods were compared. Response rates were high (87%). Withdrawal from the study was higher under 12/12 reporting. The rate ratio for 1/12 versus 12/12 reporting was 1.26 (95% confidence interval = 1.11-1.42). Rates declined gradually in the 12/12 groups over the year, consistent with reporting fatigue. Increased frequency of data collection may reduce incidence estimates.

  3. Violent behaviour in a forensic psychiatric hospital in Finland: an analysis of violence incident reports.

    Science.gov (United States)

    Kuivalainen, S; Vehviläinen-Julkunen, K; Putkonen, A; Louheranta, O; Tiihonen, J

    2014-04-01

    The aim of this paper was to explore the frequency and provocation of physically violent incidents in a Finnish forensic psychiatric hospital. Three years (2007-2009) of violent incident reports were analysed retrospectively. The data were analysed by content analysis, and statistically by Poisson regression analysis. During the study period a total of 840 incidents of physical violence occurred. Six main categories were found to describe the provocation of violence where three of these categories seemed to be without a specified reason (61%), and three represented a reaction to something (36%). The risk for violent behaviour was highest for the civil patients (RR = 11.96; CI 95% 9.43-15.18; P violence incidents. Patients undergoing a forensic mental examination did not frequently behave aggressively (RR = 1.97; CI 95% 0.91-4.28). These results can be used in the reorganization of health-care practices and the allocation of resources. © 2013 John Wiley & Sons Ltd.

  4. A study of cases reported as incidents in a public hospital from 2011 to 2014.

    Science.gov (United States)

    Göttems, Leila Bernarda Donato; Santos, Maria do Livramento Gomes Dos; Carvalho, Paloma Aparecida; Amorim, Fábio Ferreira

    2016-01-01

    Analyzing incidents reported in a public hospital in the Federal District, Brasilia, according to the characteristics and outcomes involving patients. A descriptive and retrospective study of incidents reported between January 2011 and September 2014. 209 reported incidents were categorized as reportable occurrences (n = 22, 10.5%), near misses (n = 16, 7.7%); incident without injury (n = 4, 1.9%) and incident with injury (adverse events) (n = 167, 79.9%). The average age of patients was 44 years and the hospitalization time until the moment of the incident was on average 38.5 days. Nurses were the healthcare professionals who most reported the incidents (n = 55, 67%). No outcomes resulted in death. Incidents related to blood/hemoderivatives, medical devices/equipment, patient injuries and intravenous medication/fluids were the most frequent. Standardizing the reporting processes and enhancing participation by professionals in managing incidents is recommended. Analisar os incidentes notificados em um hospital público do Distrito Federal, segundo as características e os desfechos quando envolveram pacientes. Estudo descritivo e retrospectivo dos incidentes notificados entre janeiro de 2011 e setembro de 2014. Notificados 209 incidentes categorizados em ocorrência comunicável (n = 22, 10,5%), quase evento (n = 16, 7,7%), incidente sem dano (n = 4, 1,9%) e incidente com dano (eventos adversos) (n = 167, 79,9%). A idade média dos pacientes foi de 44 anos e o tempo da internação até o momento do incidente teve média de 38,5 dias. Os enfermeiros foram os que mais notificaram (n = 55, 67%). Nenhum desfecho resultou em morte. Os incidentes relacionados a sangue/hemoderivados, dispositivos/equipamento médico, acidentes do doente e medicação/fluidos endovenosos foram os mais frequentes. Recomenda-se padronizar os processos de notificação e potencializar a participação dos profissionais no manejo dos incidentes.

  5. SU-E-T-524: Web-Based Radiation Oncology Incident Reporting and Learning System (ROIRLS)

    Energy Technology Data Exchange (ETDEWEB)

    Kapoor, R; Palta, J; Hagan, M [Virginia Commonwealth University, Richmond, VA (United States); National Radiation Oncology Program (10P4H), Richmond, VA (United States); Grover, S; Malik, G [TSG Innovations Inc., Richmond, VA (United States)

    2014-06-01

    Purpose: Describe a Web-based Radiation Oncology Incident Reporting and Learning system that has the potential to improve quality of care for radiation therapy patients. This system is an important facet of continuing effort by our community to maintain and improve safety of radiotherapy.Material and Methods: The VA National Radiation Oncology Program office has embarked on a program to electronically collect adverse events and near miss data of radiation treatment of over 25,000 veterans treated with radiotherapy annually. Software used for this program is deployed on the VAs intranet as a Website. All data entry forms (adverse event or near miss reports, work product reports) utilize standard causal, RT process step taxonomies and data dictionaries defined in AAPM and ASTRO reports on error reporting (AAPM Work Group Report on Prevention of Errors and ASTROs safety is no accident report). All reported incidents are investigated by the radiation oncology domain experts. This system encompasses the entire feedback loop of reporting an incident, analyzing it for salient details, and developing interventions to prevent it from happening again. The operational workflow is similar to that of the Aviation Safety Reporting System. This system is also synergistic with ROSIS and SAFRON. Results: The ROIRLS facilitates the collection of data that help in tracking adverse events and near misses and develop new interventions to prevent such incidents. The ROIRLS electronic infrastructure is fully integrated with each registered facility profile data thus minimizing key strokes and multiple entries by the event reporters. Conclusions: OIRLS is expected to improve the quality and safety of a broad spectrum of radiation therapy patients treated in the VA and fulfills our goal of Effecting Quality While Treating Safely The Radiation Oncology Incident Reporting and Learning System software used for this program has been developed, conceptualized and maintained by TSG Innovations

  6. Differences in reported sepsis incidence according to study design: a literature review

    Directory of Open Access Journals (Sweden)

    Saga Elise Mariansdatter

    2016-10-01

    Full Text Available Abstract Background Sepsis and severe sepsis are common conditions in hospital settings, and are associated with high rates of morbidity and mortality, but reported incidences vary considerably. In this literature review, we describe the variation in reported population-based incidences of sepsis and severe sepsis. We also examine methodological and demographic differences between studies that may explain this variation. Methods We carried out a literature review searching three major databases and reference lists of relevant articles, to identify all original studies reporting the incidence of sepsis or severe sepsis in the general population. Two authors independently assessed all articles, and the final decision to exclude an article was reached by consensus. We extracted data according to predetermined variables, including study country, sepsis definition, and data source. We then calculated descriptive statistics for the reported incidences of sepsis and severe sepsis. The studies were classified according to the method used to identify cases of sepsis or severe sepsis: chart-based (i.e. review of patient charts or code-based (i.e. predetermined International Classification of Diseases [ICD] codes. Results Among 482 articles initially screened, we identified 23 primary publications reporting incidence of sepsis and/or severe sepsis in the general population. The reported incidences ranged from 74 to 1180 per 100,000 person-years and 3 to 1074 per 100,000 person-years for sepsis and severe sepsis, respectively. Most chart-based studies used the Bone criteria (or a modification hereof and Protein C Worldwide Evaluation in Severe Sepsis (PROWESS study criteria to identify cases of sepsis and severe sepsis. Most code-based studies used ICD-9 codes, but the number of codes used ranged from 1 to more than 1200. We found that the incidence varied according to how sepsis was identified (chart-based vs. code-based, calendar year, data source, and

  7. Safe incident reporting in out-of-hours primary care: an exploratory study.

    Science.gov (United States)

    Augustyns, Nele; Lesaffer, Caroline; Teughels, Stefan; Philips, Hilde; Remmen, Roy

    2016-12-01

    The goal of safe incident reporting (SIR) is to recognize avoidable incidents to prevent future harm. Data on the use of SIR in Belgium's out-of-hours primary care (OOHC) services are lacking. We investigated a priori attitudes of managers and GPs, and their willingness to report in OOHC services. We mapped which methods are used. A telephone questionnaire was conducted with the managers of all 27 OOHC centers in Flanders. It assessed the design of used reporting systems and the attitudes towards SIR. A paper survey was administered to assess GPs' attitudes in two large out-of-hours primary care centers. All managers participated (N = 23). Seventy percent used some form of incident reporting system, with a large design variation. All managers thought SIR is important to improve quality and safety. Seven managers predicted that GPs would be hesitant to use SIR. In the GPs' survey (response rate 58%), 69.7% of responders had experienced an incident and 74.5% would tend to report it. 81.1% agreed that an incident has to be analyzed, discussed, and should lead to an improvement plan. The majority believed SIR could create openness about adverse events and would improve job satisfaction. One out of five feared that it would make their job more difficult, and 39% were afraid the report could be used against the reporter. OOHC center managers and GPs show positive attitudes towards SIR. There is a large variation in the currently used methods. Future projects could focus on interventions of implementation of SIR in OOHC.

  8. Cumulative incidence of postoperative severe pain at Hospital Universitario San Jose, Popayan. Preliminar report

    Directory of Open Access Journals (Sweden)

    Ingrid Muñoz

    2013-12-01

    Full Text Available Introduction: Postoperative pain remains as a problem. National studies report incidences of 31% for moderate and 22% for severe pain. Inadequate analgesia is related to dissatisfaction and adverse outcomes. The aim of this study was to describe the incidence and characteristics of the postoperative pain in the post-anesthesia care unit (PACU at Hospital Universitario San José of Popayán (HUSJ in patients undergoing general anesthesia during the first postoperative hour. Methods: Cohort study. We recruited patients attending PACU and undergoing procedures using general anesthesia, between 18 and 70 years. Using a standardized collection form medical history, demographic data, medical history, anesthetic management, intraoperative analgesia and postoperative pain assessment by verbal and numerical pain scale (1-10 were recorded. Postoperative outcome data were also collected in the PACU. Results: The incidence of severe postoperative pain at 10 minutes was 12.3% 95%CI [7.1-18.2] (19 patients. Within 30 minutes of assessment 4.5% 95%CI [1.3-8.4] (7 patients and 1.9% 60 minutes 95%CI [0-4.5] (3 patients. 48.7% required rescue analgesic at PACU. Incidence of postoperative nausea and vomiting (PONV was significantly different in patients requiring rescue analgesic. Conclusion: The incidence of severe postoperative pain in the first postoperative hour at HUSJ is close to 12% and it decreases as time goes by. Patients requiring rescue analgesic have a higher incidence of postoperative complications such as PONV.

  9. In-depth analysis of the causal factors of incidents reported in the Greek petrochemical industry

    Energy Technology Data Exchange (ETDEWEB)

    Konstandinidou, Myrto [Institute of Nuclear Technology-Radiation Protection, National Center for Scientific Research ' Demokritos' , Aghia Paraskevi 15310 (Greece); Nivolianitou, Zoe, E-mail: zoe@ipta.demokritos.gr [Institute of Nuclear Technology-Radiation Protection, National Center for Scientific Research ' Demokritos' , Aghia Paraskevi 15310 (Greece); Kefalogianni, Eirini; Caroni, Chrys [School of Applied Mathematical and Physical Sciences, National Technical University of Athens, 9 Iroon Polytexneiou Str., Zografou Campus, 157 80 Athens (Greece)

    2011-11-15

    This paper presents a statistical analysis of all reported incidents in the Greek petrochemical industry from 1997 to 2003. A comprehensive database has been developed to include industrial accidents (fires, explosions and substance releases), occupational accidents, incidents without significant consequences and near misses. The study concentrates on identifying and analyzing the causal factors related to different consequences of incidents, in particular, injury, absence from work and material damage. Methods of analysis include logistic regression with one of these consequences as dependent variable. The causal factors that are considered cover four major categories related to organizational issues, equipment malfunctions, human errors (of commission or omission) and external causes. Further analyses aim to confirm the value of recording near misses by comparing their causal factors with those of more serious incidents. The statistical analysis highlights the connection between the human factor and the underlying causes of accidents or incidents. - Highlights: > The research work is original, based on field data collected directly from the petrochemical industry. > It deals with the in-depth statistical analysis of accident data on human-organizational causes. > It researches underlying causes of accidents and the parameters affecting them. > The causal factors that are considered cover four big taxonomies. > Near misses are worth recording for comparing their causal factors with more serious incidents.

  10. Recommendations for Nuclear Medicine Technologists Drawn from an Analysis of Errors Reported in Australian Radiation Incident Registers.

    Science.gov (United States)

    Kearney, Nicole; Denham, Gary

    2016-12-01

    When a radiation incident occurs in nuclear medicine in Australia, the incident is reported to the relevant state or territory authority, which performs an investigation and sends its findings to the Australian Radiation Protection and Nuclear Safety Agency. The agency then includes these data in its Australian Radiation Incident Register and makes them available to the public as an annual summary report on its website. The aim of this study was to analyze the radiation incidents included in these annual reports and in the publically available state and territory registers, identify any recurring themes, and make recommendations to minimize future incidents.

  11. Effects of patient safety culture interventions on incident reporting in general practice: a cluster randomised trial.

    NARCIS (Netherlands)

    Verbakel, N.J.; Langelaan, M.; Verheij, T.J.M.; Wagner, C.; Zwart, D.L.M.

    2015-01-01

    Background A constructive safety culture is essential for the successful implementation of patient safety improvements. Aim To assess the effect of two patient safety culture interventions on incident reporting as a proxy of safety culture. Design and setting A three-arm cluster randomised trial was

  12. 77 FR 38747 - Reports by Air Carriers on Incidents Involving Animals During Air Transport

    Science.gov (United States)

    2012-06-29

    ... estimate that it would take a Paralegal working in scheduled air transportation making $33.46 (the average... of reported incidents per year is 46. If we were to assume that it takes a Paralegal one hour to... per year. This is based on our estimate of a Paralegal's salary discussed above. Various trade sources...

  13. 14 CFR 234.13 - Reports by air carriers on incidents involving animals during air transport.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Reports by air carriers on incidents involving animals during air transport. 234.13 Section 234.13 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS AIRLINE SERVICE QUALITY PERFORMANCE...

  14. 75 FR 51953 - Notification and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and...

    Science.gov (United States)

    2010-08-24

    ... Organization (ICAO) amendment 13 to Annex 13, Aircraft Accident and Incident Investigation, defines unmanned... safety. If the NTSB implemented the ICAO standard, it would likely receive many reports that would not be... safety recommendations. In addition, the proposed ICAO standard would not address the concerns of...

  15. Parasitic fibroid: case report and novel approach in reducing incidence of future cases

    Directory of Open Access Journals (Sweden)

    Sukainah S.

    2016-08-01

    Full Text Available We report a case of parasitic fibroid which developed less than 1 year following laparoscopic myomectomy using power morcellation. Following this case, a novel approach in reducing the incidence of future parasitic fibroid is described. [Int J Reprod Contracept Obstet Gynecol 2016; 5(8.000: 2836-2839

  16. Growth hacking -perehdytyksen tehostaminen : case: Avaus Marketing Innovations Oy

    OpenAIRE

    Hirvonen, Jere

    2016-01-01

    Tämän opinnäytetyön tavoitteena oli luoda perehdyttämisprosessi, joka tehostaa Avaus Marketing Innovationsin growth hacking -tiimin uusien työntekijöiden oppimista ja nopeuttaa uusien työntekijöiden siirtymistä tuottavaan työhön. Opinnäytetyön ja sen osana luodun perehdyttämisprosessin tarkoituksena oli tehostaa Avaus Marketing Innovations Oy:n (MaaS) Marketing as a Service -liiketoimintaa. Prosessi selventää mitä käytännön taitoja growth hacker työssään tarvitsee sekä miten asetetut...

  17. iPhone Hacks Tips and Tools for Pushing the Smartest Phone to Its Limits

    CERN Document Server

    Jurick, David; Stolarz, Damien

    2009-01-01

    With iPhone Hacks, you can make your iPhone do all you'd expect of a smartphone -- and more. Learn tips and techniques to unleash little-known features, find and create innovative applications for both the iPhone and iPod touch, and unshackle these devices to run everything from network utilities to video game emulators. iPhone Hacks is exactly what you need to make the most of your iPhone.

  18. Improvement in the incident reporting and investigation procedures using process excellence (DMAI2C) methodology.

    Science.gov (United States)

    Miles, Elizabeth N

    2006-03-17

    In 1996, Health & Safety introduced an incident investigation process called Learning to Look to Johnson & Johnson. This process provides a systematic way of analyzing work-related injuries and illness, uncovers root cause that leads to system defects, and points to viable solutions. The process analyzed involves three steps: investigation and reporting of the incident, determination of root cause, and development and implementation of a corrective action plan. The process requires the investigators to provide an initial communication for work-related serious injuries and illness as well as lost workday cases to Corporate Headquarters within 72 h of the incident with a full investigative report to follow within 10 days. A full investigation requires a written report, a cause-result logic diagram (CRLD), a corrective action plan (CAP) and a report of incident costs (SafeCost) all due to be filed electronically. It is incumbent on the principal investigator and his or her investigative teams to assemble the various parts of the investigation and to follow up with the relevant parties to ensure corrective actions are implemented, and a full report submitted to Corporate executives. Initial review of the system revealed that the process was not working as designed. A number of reports were late, not signed by the business leaders, and in some instances, all cause were not identified. Process excellence was the process used to study the issue. The team used six sigma DMAI2C methodologies to identify and implement system improvements. The project examined the breakdown of the critical aspects of the reporting and investigation process that lead to system errors. This report will discuss the study findings, recommended improvements, and methods used to monitor the new improved process.

  19. Thermohydraulic incidents at full power (safety analysis detailed report no. 1)

    Energy Technology Data Exchange (ETDEWEB)

    1988-01-15

    In this paper, attention is focused on the role of plant-incident analysis during the design stage and the conclusions reached regarding safety. This class of incidents includes sequences arising from the breakdown or anomalous behaviour of components or from errors in plant operation that have repercussions on the process of the system involved and the related systems. The sequences of possible relevance to safety are those which stress the active and passive protection (containment barriers). As these stresses are below the design-basis limits, they have no consequences in terms of radioactivity release. This report illustrates in greater detail the analysis that led to this conclusion, with particular reference to reactor events that have significant consequences on the first barrier (fuel cladding). Thermohydraulic incidents at full power are examined here.

  20. How to simplify and improve incident and near miss reporting in wards:I.R.G.E. (Incident Reporting with Gravity Effect system

    Directory of Open Access Journals (Sweden)

    Francesco De Caro

    2011-09-01

    Full Text Available

    In this paper, an improved system that allows a simplified reporting of errors and near misses in wards, and permits operators to accurately manage all data recorded, is presented. IRGE (Incident Reporting with Gravity Effect System is based on the use of a paper form for reporting accidents and near misses. The severity of an error can be evidenced through the choice of a color similar to the well-known method used in the emergency medicine triage, thus leading to the most evident and immediate understanding of the magnitude of error. In addition, the system is provided with a report form for its users to be compiled with the highest completeness of information.


    A dedicated software for the storage of records and data analysis has been created, which gives one the possibility of alerting key figures within the health facility promptly. The system allows us to store and share records among different care units and also among different hospitals, thus providing a basis for a national database. Moreover, through this system, it is possible to assess the “risk attitude” of the health facility monitored.

  1. Department of the Navy Suicide Incident Report (DONSIR): Summary of Findings, 1999-2007

    Science.gov (United States)

    2009-03-24

    in body weight (p < .01), with 25 out of 330 decedents evidencing recent change. This is possibly a spurious result based on over- or under- eating ...acute than chronic, with major psychological disorders and physical 1999–2007 DON Suicide Incident Report 35 illnesses less prevalent in comparison...performance histories than other personnel, and that perfectionism may distinguish certain types of suicidal behavior such as completed versus attempted

  2. Experience with an anonymous web-based state EMS safety incident reporting system.

    Science.gov (United States)

    Gallagher, John M; Kupas, Douglas F

    2012-01-01

    Patient and provider safety is paramount in all aspects of emergency medical services (EMS) systems. The leaders, administrators, and policymakers of these systems must have an understanding of situations that present potential for harm to patients or providers. This study analyzed reports to a statewide EMS safety event reporting system with the purpose of categorizing the types of incidents reported and identifying opportunities to prevent future safety events. This statewide EMS safety incident reporting system is a Web-based system to which any individual can anonymously report any event or situation perceived to impact safety. We reviewed all reports between the system's inception in 2003 through August 2010. A stipulation of the system is that any entry containing information that identifies an EMS provider, agency, or patient will be deleted and thus not included in the analysis. Each event report included the description of the event, the relationship of the reporter, and the year in which the event occurred. Each entry was placed into a category that best represents the situation described. A total of 415 reports were received during the study period, and 186 reports were excluded-163 (39%) excluded by the state because of identifiable information and 23 (6%) excluded by the authors because of nonsensical description. Within the remaining 229 reports, there were 237 distinct safety events. These events were classified as actions/behavior (32%), vehicle/transportation (16%), staffing or ambulance availability (13%), communications (8%), medical equipment (9%), multiple patients/agencies/units and level-of-care issues (7%), medical procedure (6%), medication (5%), accident scene management/scene safety (3%), and protocol issues (1%). EMS providers directly involved in the event represented the largest reporting group (33%). We also provide examples of statewide system and policy changes that were made in direct response to these reports. This EMS safety

  3. Change in Reported Lyme Disease Incidence in the Northeast and Upper Midwest, 1991-2014

    Science.gov (United States)

    This indicator shows how reported Lyme disease incidence has changed by state since 1991, based on the number of new cases per 100,000 people. The total change has been estimated from the average annual rate of change in each state. This map is limited to the 14 states where Lyme disease is most common, where annual rates are consistently above 10 cases per 100,000. Connecticut, New York, and Rhode Island had too much year-to-year variation in reporting practices to allow trend calculation. For more information: www.epa.gov/climatechange/science/indicators

  4. SClib, a hack for straightforward embedded C functions in Python

    CERN Document Server

    Fuentes, Esteban

    2014-01-01

    We present SClib, a simple hack that allows easy and straightforward evaluation of C functions within Python code, boosting flexibility for better trade-off between computation power and feature availability, such as visualization and existing computation routines in SciPy. We also present two cases were SClib has been used. In the first set of applications we use SClib to write a port to Python of a Schr\\"odinger equation solver that has been extensively used the literature, the resulting script presents a speed-up of about 150x with respect to the original one. A review of the situations where the speeded-up script has been used is presented. We also describe the solution to the related problem of solving a set of coupled Schr\\"odinger-like equations where SClib is used to implement the speed-critical parts of the code. We argue that when using SClib within IPython we can use NumPy and Matplotlib for the manipulation and visualization of the solutions in an interactive environment with no performance compro...

  5. Characterizing Cyberbullying among College Students: Hacking, Dirty Laundry, and Mocking

    Directory of Open Access Journals (Sweden)

    Rajitha Kota

    2014-10-01

    Full Text Available Bullying behaviors occur across the lifespan and have increasingly migrated to online platforms where they are known as cyberbullying. The purpose of this study was to explore the phenomenon of cyberbullying among college students. Participants were recruited for focus groups through purposeful sampling, including recruitment from groups traditionally at risk for bullying. Focus groups discussed views and perceptions of cyberbullying on campuses. Groups were led by a trained facilitator and were audio recorded and manually transcribed. The constant comparative approach was used to identify themes and representative quotations. The 42 participants had an average age of 19.2 (SD = 1.2, 55% were female, 83% were Caucasian. Three themes emerged from the data: (1 lack of agreement on a definition of cyberbullying, but consensus on three representative scenarios: hacking, dirty laundry and mocking; (2 concerns with translating definitions of traditional bullying to cyberbullying; (3 opinions that cyberbullying may manifest differently in college compared to younger adolescents, including increased potential for long-term effects. College students were not in agreement about a theoretical definition, but they could agree upon specific representative instances of cyberbullying.  Future studies could consider using common case examples or vignettes of cyberbullying, or creation of developmentally representative definitions by age group.

  6. Mind Invasion: Situated Affectivity and the Corporate Life Hack.

    Science.gov (United States)

    Slaby, Jan

    2016-01-01

    In view of the philosophical problems that vex the debate on situated affectivity, it can seem wise to focus on simple cases. Accordingly, theorists often single out scenarios in which an individual employs a device in order to enhance their emotional experience, or to achieve new kinds of experience altogether, such as playing an instrument, going to the movies, or sporting a fancy handbag. I argue that this narrow focus on cases that fit a "user/resource model" tends to channel attention away from more complex and also more problematic instances of situated affectivity. Among these are scenarios in which a social domain draws individuals into certain modes of affective interaction, often by way of attunement and habituation to affective styles and interaction patterns that are normative in the domain in question. This can lead to a phenomenon that is not so much "mind extension" than "mind invasion": affectivity is dynamically framed and modulated from without, often contrary to the prior orientations of the individuals in question. As an example, I discuss affective patterns prevalent in today's corporate workplace. I claim that workplace affect sometimes contributes to what is effectively a "hack" of employees' subjectivity.

  7. Medication incident reporting in residential aged care facilities: Limitations and risks to residents’ safety

    Directory of Open Access Journals (Sweden)

    Tariq Amina

    2012-11-01

    Full Text Available Abstract Background Medication incident reporting (MIR is a key safety critical care process in residential aged care facilities (RACFs. Retrospective studies of medication incident reports in aged care have identified the inability of existing MIR processes to generate information that can be used to enhance residents’ safety. However, there is little existing research that investigates the limitations of the existing information exchange process that underpins MIR, despite the considerable resources that RACFs’ devote to the MIR process. The aim of this study was to undertake an in-depth exploration of the information exchange process involved in MIR and identify factors that inhibit the collection of meaningful information in RACFs. Methods The study was undertaken in three RACFs (part of a large non-profit organisation in NSW, Australia. A total of 23 semi-structured interviews and 62 hours of observation sessions were conducted between May to July 2011. The qualitative data was iteratively analysed using a grounded theory approach. Results The findings highlight significant gaps in the design of the MIR artefacts as well as information exchange issues in MIR process execution. Study results emphasized the need to: a design MIR artefacts that facilitate identification of the root causes of medication incidents, b integrate the MIR process within existing information systems to overcome key gaps in information exchange execution, and c support exchange of information that can facilitate a multi-disciplinary approach to medication incident management in RACFs. Conclusions This study highlights the advantages of viewing MIR process holistically rather than as segregated tasks, as a means to identify gaps in information exchange that need to be addressed in practice to improve safety critical processes.

  8. Nuclear medicine incident reporting in Australia: control charts and notification rates inform quality improvement.

    Science.gov (United States)

    Larcos, G; Collins, L T; Georgiou, A; Westbrook, J I

    2015-06-01

    Australia has a statutory incident reporting system for radiopharmaceutical maladministrations, but additional research into registry data is required for the purpose of quality improvement in nuclear medicine. We (i) used control charts to identify factors contributing to special cause variation (indicating higher than expected rates) in maladministrations and (ii) evaluated the impact of heterogeneous notification criteria and extent of underreporting among jurisdictions and individual facilities, respectively. Anonymised summaries of Australian Radiation Incident Register reports permitted calculation of national monthly maladministration notification rates for 2007-2012 and preparation of control charts. Multivariate logistic regression assessed the association of population, insurance and regulatory characteristics with maladministration notifications in each Australian State and Territory. Maladministration notification rates from two facilities with familiarity of notification processes and commitment to radiation protection were compared with those elsewhere. Special cause variation occurred in only 3 months, but contributed to 21% of all incidents (42 of 197 patients), mainly because of 'clusters' of maladministrations (n = 24) arising from errors in bulk radiopharmaceutical dispensing. Maladministration notification rates varied significantly between jurisdictions (0 to 12.2 maladministrations per 100 000 procedures (P < 0.05)) and individual facilities (31.7 vs 5.8 per 100 000; χ(2) = 40; 1 degree of freedom, P < 0.001). Unexpected increases in maladministration notifications predominantly relate to incident 'clusters' affecting multiple patients. The bulk preparation of radiopharmaceuticals is a vulnerable process and merits additional safeguards. Maladministration notification rates in Australia are heterogeneous. Adopting uniform maladministration notification criteria among States and Territories and methods to overcome underreporting are

  9. p-hacking by post hoc selection with multiple opportunities: Detectability by skewness test?: Comment on Simonsohn, Nelson, and Simmons (2014).

    Science.gov (United States)

    Ulrich, Rolf; Miller, Jeff

    2015-12-01

    Simonsohn, Nelson, and Simmons (2014) have suggested a novel test to detect p-hacking in research, that is, when researchers report excessive rates of "significant effects" that are truly false positives. Although this test is very useful for identifying true effects in some cases, it fails to identify false positives in several situations when researchers conduct multiple statistical tests (e.g., reporting the most significant result). In these cases, p-curves are right-skewed, thereby mimicking the existence of real effects even if no effect is actually present.

  10. Creating European guidelines for Chiropractic Incident Reporting and Learning Systems (CIRLS: relevance and structure

    Directory of Open Access Journals (Sweden)

    Wangler Martin

    2011-04-01

    Full Text Available Abstract Background In 2009, the heads of the Executive Council of the European Chiropractors' Union (ECU and the European Academy of Chiropractic (EAC involved in the European Committee for Standardization (CEN process for the chiropractic profession, set out to establish European guidelines for the reporting of adverse reactions to chiropractic treatment. There were a number of reasons for this: first, to improve the overall quality of patient care by aiming to reduce the application of potentially harmful interventions and to facilitate the treatment of patients within the context of achieving maximum benefit with a minimum risk of harm; second, to inform the training objectives for the Graduate Education and Continuing Professional Development programmes of all 19 ECU member nations, regarding knowledge and skills to be acquired for maximising patient safety; and third, to develop a guideline on patient safety incident reporting as it is likely to be part of future CEN standards for ECU member nations. Objective To introduce patient safety incident reporting within the context of chiropractic practice in Europe and to help individual countries and their national professional associations to develop or improve reporting and learning systems. Discussion Providing health care of any kind, including the provision of chiropractic treatment, can be a complex and, at times, a risky activity. Safety in healthcare cannot be guaranteed, it can only be improved. One of the most important aspects of any learning and reporting system lies in the appropriate use of the data and information it gathers. Reporting should not just be seen as a vehicle for obtaining information on patient safety issues, but also be utilised as a tool to facilitate learning, advance quality improvement and to ultimately minimise the rate of the occurrence of errors linked to patient care. Conclusions Before a reporting and learning system can be established it has to be clear

  11. A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model.

    Science.gov (United States)

    Gubin, Tatyana A; Iyer, Hari P; Liew, Shirlene N; Sarma, Aartik; Revelos, Alex; Ribas, João; Movassaghi, Babak; Chu, Zen M; Khalid, Ayesha N; Majmudar, Maulik D; Lee, Christopher Xiang

    2017-07-26

    MIT Hacking Medicine is a student, academic, and community-led organization that uses systems-oriented "healthcare hacking" to address challenges around innovation in healthcare. The group has organized more than 80 events around the world that attract participants with diverse backgrounds. These participants are trained to address clinical needs from the perspective of multiple stakeholders and emphasize utility and implementation viability of proposed solutions. We describe the MIT Hacking Medicine model as a potential method to integrate collaboration and training in rapid innovation techniques into academic medical centers. Built upon a systems approach to healthcare innovation, the time-compressed but expertly guided nature of the events could enable more widely accessible preliminary training in systems-level innovation methodology, as well as creating a structured opportunity for interdisciplinary congregation and collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Patient-safety-related hospital deaths in England: thematic analysis of incidents reported to a national database, 2010-2012.

    Directory of Open Access Journals (Sweden)

    Liam J Donaldson

    2014-06-01

    Full Text Available BACKGROUND: Hospital mortality is increasingly being regarded as a key indicator of patient safety, yet methodologies for assessing mortality are frequently contested and seldom point directly to areas of risk and solutions. The aim of our study was to classify reports of deaths due to unsafe care into broad areas of systemic failure capable of being addressed by stronger policies, procedures, and practices. The deaths were reported to a patient safety incident reporting system after mandatory reporting of such incidents was introduced. METHODS AND FINDINGS: The UK National Health Service database was searched for incidents resulting in a reported death of an adult over the period of the study. The study population comprised 2,010 incidents involving patients aged 16 y and over in acute hospital settings. Each incident report was reviewed by two of the authors, and, by scrutinising the structured information together with the free text, a main reason for the harm was identified and recorded as one of 18 incident types. These incident types were then aggregated into six areas of apparent systemic failure: mismanagement of deterioration (35%, failure of prevention (26%, deficient checking and oversight (11%, dysfunctional patient flow (10%, equipment-related errors (6%, and other (12%. The most common incident types were failure to act on or recognise deterioration (23%, inpatient falls (10%, healthcare-associated infections (10%, unexpected per-operative death (6%, and poor or inadequate handover (5%. Analysis of these 2,010 fatal incidents reveals patterns of issues that point to actionable areas for improvement. CONCLUSIONS: Our approach demonstrates the potential utility of patient safety incident reports in identifying areas of service failure and highlights opportunities for corrective action to save lives.

  13. [Pressure ulcer care quality indicator: analysis of medical records and incident report].

    Science.gov (United States)

    dos Santos, Cássia Teixeira; Oliveira, Magáli Costa; Pereira, Ana Gabriela da Silva; Suzuki, Lyliam Midori; Lucena, Amália de Fátima

    2013-03-01

    Cross-sectional study that aimed to compare the data reported in a system for the indication of pressure ulcer (PU) care quality, with the nursing evolution data available in the patients' medical records, and to describe the clinical profile and nursing diagnosis of those who developed PU grade 2 or higher Sample consisted of 188 patients at risk for PU in clinical and surgical units. Data were collected retrospectively from medical records and a computerized system of care indicators and statistically analyzed. Of the 188 patients, 6 (3%) were reported for pressure ulcers grade 2 or higher; however, only 19 (10%) were recorded in the nursing evolution records, thus revealing the underreporting of data. Most patients were women, older adults and patients with cerebrovascular diseases. The most frequent nursing diagnosis was risk of infection. The use of two or more research methodologies such as incident reporting data and retrospective review of patients' records makes the results trustworthy.

  14. Identifying medication error chains from critical incident reports: a new analytic approach.

    Science.gov (United States)

    Huckels-Baumgart, Saskia; Manser, Tanja

    2014-10-01

    Research into the distribution of medication errors usually focuses on isolated stages within the medication use process. Our study aimed to provide a novel process-oriented approach to medication incident analysis focusing on medication error chains. Our study was conducted across a 900-bed teaching hospital in Switzerland. All reported 1,591 medication errors 2009-2012 were categorized using the Medication Error Index NCC MERP and the WHO Classification for Patient Safety Methodology. In order to identify medication error chains, each reported medication incident was allocated to the relevant stage of the hospital medication use process. Only 25.8% of the reported medication errors were detected before they propagated through the medication use process. The majority of medication errors (74.2%) formed an error chain encompassing two or more stages. The most frequent error chain comprised preparation up to and including medication administration (45.2%). "Non-consideration of documentation/prescribing" during the drug preparation was the most frequent contributor for "wrong dose" during the administration of medication. Medication error chains provide important insights for detecting and stopping medication errors before they reach the patient. Existing and new safety barriers need to be extended to interrupt error chains and to improve patient safety.

  15. Can Patient Safety Incident Reports Be Used to Compare Hospital Safety? Results from a Quantitative Analysis of the English National Reporting and Learning System Data.

    Directory of Open Access Journals (Sweden)

    Ann-Marie Howell

    Full Text Available The National Reporting and Learning System (NRLS collects reports about patient safety incidents in England. Government regulators use NRLS data to assess the safety of hospitals. This study aims to examine whether annual hospital incident reporting rates can be used as a surrogate indicator of individual hospital safety. Secondly assesses which hospital characteristics are correlated with high incident reporting rates and whether a high reporting hospital is safer than those lower reporting hospitals. Finally, it assesses which health-care professionals report more incidents of patient harm, which report more near miss incidents and what hospital factors encourage reporting. These findings may suggest methods for increasing the utility of reporting systems.This study used a mix methods approach for assessing NRLS data. The data were investigated using Pareto analysis and regression models to establish which patients are most vulnerable to reported harm. Hospital factors were correlated with institutional reporting rates over one year to examine what factors influenced reporting. Staff survey findings regarding hospital safety culture were correlated with reported rates of incidents causing harm; no harm and death to understand what barriers influence error disclosure.5,879,954 incident reports were collected from acute hospitals over the decade. 70.3% of incidents produced no harm to the patient and 0.9% were judged by the reporter to have caused severe harm or death. Obstetrics and Gynaecology reported the most no harm events [OR 1.61(95%CI: 1.12 to 2.27, p<0.01] and pharmacy was the hospital location where most near-misses were captured [OR 3.03(95%CI: 2.04 to 4.55, p<0.01]. Clinicians were significantly more likely to report death than other staff [OR 3.04(95%CI: 2.43 to 3.80 p<0.01]. A higher ratio of clinicians to beds correlated with reduced rate of harm reported [RR = -1.78(95%Cl: -3.33 to -0.23, p = 0.03]. Litigation claims per bed were

  16. 12 CFR 250.181 - Reports of change in control of bank management incident to a merger.

    Science.gov (United States)

    2010-01-01

    ... change in control of bank management incident to a merger. (a) A State member bank has inquired whether... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Reports of change in control of bank management incident to a merger. 250.181 Section 250.181 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF...

  17. Explanation of the values of Hack's drainage basin, river length scaling exponent

    Science.gov (United States)

    Hunt, A. G.

    2015-08-01

    Percolation theory can be used to find water flow paths of least resistance. The application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law allows interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  18. Brief communication: Possible explanation of the values of Hack's drainage basin, river length scaling exponent

    Science.gov (United States)

    Hunt, Allen G.

    2016-04-01

    Percolation theory can be used to find water flow paths of least resistance. Application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law may allow interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  19. Growth Hacking in Start-ups (Case Study IranAuto Oy)

    OpenAIRE

    Salemisohi, Behdad

    2016-01-01

    The purpose of this bachelor’s thesis is to make the reader familiar with the growth hacking concepts and the usage of certain hacks in start-ups. VaseForoosh.com at IranAuto Oy Company has been the practical case throughout the studies. VaseForoosh meaning ‘For Sale’ in Persian, is a website similar to Nettiauto in Finland, mainly with the purpose of trading cars and bikes online in Iran. The website has been up since 2011 but haven’t gained enough audience for its services. The aim is to gr...

  20. Statistics Hacks Tips & Tools for Measuring the World and Beating the Odds

    CERN Document Server

    Frey, Bruce

    2008-01-01

    Want to calculate the probability that an event will happen? Be able to spot fake data? Prove beyond doubt whether one thing causes another? Or learn to be a better gambler? You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips, tricks, and mind-boggling solutions from the world of statistics, measurement, and research methods will not only amaze and entertain you, but will give you an advantage in several real-world situations-including business.

  1. Linux Server Hacks, 2 Tips & Tools for Connecting, Monitoring, and Troubleshooting

    CERN Document Server

    von Hagen, William

    2009-01-01

    This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative envir

  2. FTO5/470: Critical Incident Monitoring in Emergency Medicine Web-based System (CRIME-base): Current evidence on incident reporting and its impact to quality of care

    OpenAIRE

    Arvanitis, TN; Ryan, J.

    1999-01-01

    Introduction A critical incident is "any event which is inconsistent with routine hospital practice or with the quality of patient care and which has or could have had a demonstrably adverse outcome for a particular patient" (J.A. Williamson, Critical Incident Reporting in Anaesthesia. Anaesthetic Intensive Care, 1988: 16: 101-103). Such "negative incidents" may arise as a result of a variety of reasons during routine hospital practice. Incident monitoring and reporting has been identified as...

  3. Understanding patient-to-worker violence in hospitals: a qualitative analysis of documented incident reports.

    Science.gov (United States)

    Arnetz, Judith E; Hamblin, Lydia; Essenmacher, Lynnette; Upfal, Mark J; Ager, Joel; Luborsky, Mark

    2015-02-01

    To explore catalysts to, and circumstances surrounding, patient-to-worker violent incidents recorded by employees in a hospital system database. Violence by patients towards healthcare workers (Type II workplace violence) is a significant occupational hazard in hospitals worldwide. Studies to date have failed to investigate its root causes due to a lack of empirical research based on documented episodes of patient violence. Qualitative content analysis. Content analysis was conducted on the total sample of 214 Type II incidents documented in 2011 by employees of an American hospital system with a centralized reporting system. The majority of incidents were reported by nurses (39·8%), security staff (15·9%) and nurse assistants (14·4%). Three distinct themes were identified from the analysis: Patient Behaviour, Patient Care and Situational Events. Specific causes of violence related to Patient Behaviour were cognitive impairment and demanding to leave. Catalysts related to patient care were the use of needles, patient pain/discomfort and physical transfers of patients. Situational factors included the use/presence of restraints; transitions in the care process; intervening to protect patients and/or staff; and redirecting patients. Identifying catalysts and situations involved in patient violence in hospitals informs administrators about potential targets for intervention. Hospital staff can be trained to recognize these specific risk factors for patient violence and can be educated in how to best mitigate or prevent the most common forms of violent behaviour. A social-ecological model can be adapted to the hospital setting as a framework for prevention of patient violence towards staff. © 2014 John Wiley & Sons Ltd.

  4. A unique insight into the incidence of rugby injuries using referee replacement reports.

    Science.gov (United States)

    Sharp, J C; Murray, G D; Macleod, D A

    2001-02-01

    To obtain further information the incidence of injuries and playing positions affected in club rugby in Scotland. Routine reports of injury (permanent) and blood (temporary) replacements occurring in competitive club rugby matches by referees to the Scottish Rugby Union during seasons 1990-1991 to 1996-1997 were analysed. A total of 3,513 injuries (87 per 100 scheduled matches) and 1,000 blood replacements (34 per 100 scheduled matches) were reported. Forwards accounted for 60% of the injury and 72% of the blood replacements. Flankers and the front row were the most commonly replaced forwards while wing and centre three quarters were the most vulnerable playing positions among backs. The incidence of injury replacements increased as the match progressed up until the last 10 minutes when the trend was reversed. Blood replacements showed a different pattern with 60% occurring during the first half of the match. The most important finding of the study was reliability of referees in documenting the vulnerability of certain playing positions, and the timing when injuries took place, thus assisting coaches and team selectors when choosing replacement players for competitive club and representative rugby matches. This study re-emphasises the need for continuing epidemiological research.

  5. Can Patient Safety Incident Reports Be Used to Compare Hospital Safety? Results from a Quantitative Analysis of the English National Reporting and Learning System Data.

    Science.gov (United States)

    Howell, Ann-Marie; Burns, Elaine M; Bouras, George; Donaldson, Liam J; Athanasiou, Thanos; Darzi, Ara

    2015-01-01

    The National Reporting and Learning System (NRLS) collects reports about patient safety incidents in England. Government regulators use NRLS data to assess the safety of hospitals. This study aims to examine whether annual hospital incident reporting rates can be used as a surrogate indicator of individual hospital safety. Secondly assesses which hospital characteristics are correlated with high incident reporting rates and whether a high reporting hospital is safer than those lower reporting hospitals. Finally, it assesses which health-care professionals report more incidents of patient harm, which report more near miss incidents and what hospital factors encourage reporting. These findings may suggest methods for increasing the utility of reporting systems. This study used a mix methods approach for assessing NRLS data. The data were investigated using Pareto analysis and regression models to establish which patients are most vulnerable to reported harm. Hospital factors were correlated with institutional reporting rates over one year to examine what factors influenced reporting. Staff survey findings regarding hospital safety culture were correlated with reported rates of incidents causing harm; no harm and death to understand what barriers influence error disclosure. 5,879,954 incident reports were collected from acute hospitals over the decade. 70.3% of incidents produced no harm to the patient and 0.9% were judged by the reporter to have caused severe harm or death. Obstetrics and Gynaecology reported the most no harm events [OR 1.61(95%CI: 1.12 to 2.27), ppharmacy was the hospital location where most near-misses were captured [OR 3.03(95%CI: 2.04 to 4.55), pPatient satisfaction and mortality outcomes were not significantly associated with reporting rates. Staff survey responses revealed that keeping reports confidential, keeping staff informed about incidents and giving feedback on safety initiatives increased reporting rates [r = 0.26 (ppatient safety

  6. "You just don't report that kind of stuff": investigating teens' ambivalence toward peer-perpetrated, unwanted sexual incidents.

    Science.gov (United States)

    Weiss, Karen G

    2013-01-01

    An investigation of narratives from the National Crime Victimization Survey (NCVS) finds that one in three teenagers--12-18 years old--who experience an unwanted sexual incident perpetrated by another teen trivialize their incidents as minor, unimportant, or normal kid stuff. This study contextualizes these responses within a framework of ambivalence that highlights separately teens' ambiguity of definitions, or uncertainty that incidents perpetrated by other teens (especially dating partners and schoolmates) are "real" crimes or offenses worth reporting, and adaptive indifference, a more tactical response to conflicting norms and allegiances that discourage teens from reporting their peers' sexual misconduct to authorities. The context and consequences of teens' ambivalence are discussed.

  7. Patient-reported safety incidents in older patients with long-term conditions: a large cross-sectional study.

    Science.gov (United States)

    Panagioti, Maria; Blakeman, Thomas; Hann, Mark; Bower, Peter

    2017-05-30

    Increasing evidence suggests that patient safety is a serious concern for older patients with long-term conditions. Despite this, there is a lack of research on safety incidents encountered by this patient group. In this study, we sought to examine patient reports of safety incidents and factors associated with reports of safety incidents in older patients with long-term conditions. The baseline cross-sectional data from a longitudinal cohort study were analysed. Older patients (n=3378 aged 65 years and over) with a long-term condition registered in general practices were included in the study. The main outcome was patient-reported safety incidents including availability and appropriateness of medical tests and prescription of wrong types or doses of medication. Binary univariate and multivariate logistic regression analyses were undertaken to examine factors associated with patient-reported safety incidents. Safety incidents were reported by 11% of the patients. Four factors were significantly associated with patient-reported safety incidents in multivariate analyses. The experience of multiple long-term conditions (OR=1.09, 95% CI 1.05 to 1.13), a probable diagnosis of depression (OR=1.36, 95% CI 1.06 to 1.74) and greater relational continuity of care (OR=1.28, 95% CI 1.08 to 1.52) were associated with increased odds for patient-reported safety incidents. Perceived greater support and involvement in self-management was associated with lower odds for patient-reported safety incidents (OR=0.95, 95% CI 0.93 to 0.97). We found that older patients with multimorbidity and depression are more likely to report experiences of patient safety incidents. Improving perceived support and involvement of patients in their care may help prevent patient-reported safety incidents. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  8. Analysis of Aviation Safety Reporting System Incident Data Associated with the Technical Challenges of the Atmospheric Environment Safety Technology Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2014-01-01

    This study analyzed aircraft incidents in the NASA Aviation Safety Reporting System (ASRS) that apply to two of the three technical challenges (TCs) in NASA's Aviation Safety Program's Atmospheric Environment Safety Technology Project. The aircraft incidents are related to airframe icing and atmospheric hazards TCs. The study reviewed incidents that listed their primary problem as weather or environment-nonweather between 1994 and 2011 for aircraft defined by Federal Aviation Regulations (FAR) Parts 121, 135, and 91. The study investigated the phases of flight, a variety of anomalies, flight conditions, and incidents by FAR part, along with other categories. The first part of the analysis focused on airframe-icing-related incidents and found 275 incidents out of 3526 weather-related incidents over the 18-yr period. The second portion of the study focused on atmospheric hazards and found 4647 incidents over the same time period. Atmospheric hazards-related incidents included a range of conditions from clear air turbulence and wake vortex, to controlled flight toward terrain, ground encounters, and incursions.

  9. "Hacking at Our Very Roots": Rearticulating White Racial Identity within the Context of Teacher Education

    Science.gov (United States)

    Aveling, Nado

    2006-01-01

    When teaching about race and racism and how we as "Whites" are implicated in the discursive practices that sustain racism, we are indeed "hacking at the very roots" of the ways in which students have conceptualized their identity in terms of being non-racialized and at the same time non-racist. In this paper I focus on the challenges and…

  10. "Hacking at Our Very Roots": Rearticulating White Racial Identity within the Context of Teacher Education

    Science.gov (United States)

    Aveling, Nado

    2006-01-01

    When teaching about race and racism and how we as "Whites" are implicated in the discursive practices that sustain racism, we are indeed "hacking at the very roots" of the ways in which students have conceptualized their identity in terms of being non-racialized and at the same time non-racist. In this paper I focus on the challenges and…

  11. Second generation bioethanol production from Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.

    Science.gov (United States)

    Danilo Scordia; Salvatore L. Consentino; Thomas W. Jeffries

    2010-01-01

    Saccharum (Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.), is a rapidly growing, wide ranging high-yield perennial, suitable for second generation bioethanol production. This study evaluated oxalic acid as a pretreatment for bioconversion. Overall sugar yields, sugar degradation products, enzymatic glucan hydrolysis and ethanol production were studied as...

  12. Patient and procedural factors associated with an increased risk of harm or death in the first 4,000 incidents reported to webAIRS.

    Science.gov (United States)

    Gibbs, N M; Culwick, M D; Merry, A F

    2017-03-01

    This report describes an analysis of patient and procedural factors associated with a higher proportion of harm or death versus no harm in the first 4,000 incidents reported to webAIRS. The report is supplementary to a previous cross-sectional report on the first 4,000 incidents reported to webAIRS. The aim of this analysis was to identify potential patient or procedural factors that are more common in incidents resulting in harm or death than in incidents with more benign outcomes. There was a >50% higher proportion of harm (versus no harm) for incidents in which the patient's body mass index (BMI) was incidents in post-anaesthesia care units and non-theatre procedural areas, and for incidents under the main category of cardiovascular or neurological. The proportion of incidents associated with death was also higher (risk ratio >1.5) for BMI incidents in non-theatre procedural areas, and incidents under the main category of cardiovascular or neurological. In addition, the proportion of incidents associated with death was higher for incidents in which the patient's age was >80 years, the American Society of Anesthesiologists physical status was 4 or 5, incidents involving non-elective procedures, and incidents occurring after hours (1800 to 0800 hours). When faced with incidents with these potential risk factors, anaesthetists should consider earlier interventions and request assistance at an earlier stage. Educational strategies on incident prevention and management should place even further emphasis on scenarios involving these factors.

  13. First Annual Report: NASA-ONERA Collaboration on Human Factors in Aviation Accidents and Incidents

    Science.gov (United States)

    Srivastava, Ashok; Fabiani, Patrick

    2012-01-01

    This is the first annual report jointly prepared by NASA and ONERA on the work performed under the agreement to collaborate on a study of the human factors entailed in aviation accidents and incidents particularly focused on consequences of decreases in human performance associated with fatigue. The objective of this Agreement is to generate reliable, automated procedures that improve understanding of the levels and characteristics of flight-crew fatigue factors whose confluence will likely result in unacceptable crew performance. This study entails the analyses of numerical and textual data collected during operational flights. NASA and ONERA are collaborating on the development and assessment of automated capabilities for extracting operationally significant information from very large, diverse (textual and numerical) databases much larger than can be handled practically by human experts. This report presents the approach that is currently expected to be used in processing and analyzing the data for identifying decrements in aircraft performance and examining their relationships to decrements in crewmember performance due to fatigue. The decisions on the approach were based on samples of both the numerical and textual data that will be collected during the four studies planned under the Human Factors Monitoring Program (HFMP). Results of preliminary analyses of these sample data are presented in this report.

  14. Evaluation of the Defense Criminal Investigative Organizations’ Defense Incident-Based Reporting System Reporting and Reporting Accuracy

    Science.gov (United States)

    2014-10-29

    and management. Additional data collection and reporting requirements are contained in the Victims’ Rights and Restitution Act of 1990 (49 U.S.C...and reporting requirements of the Uniform Federal Crime Reporting Act of 1988, Victims’ Rights and Restitution , and Brady Handgun Violence Prevention...process instead of the back end (with FBI checks). The DIBRS Database Administrator is working with his FBI CJIS counterpart to work out a plan for the

  15. Chlamydia trachomatis Incidence Using Self-Reports and Serology by Gender, Age Period, and Sexual Behavior in a Birth Cohort.

    Science.gov (United States)

    Righarts, A Antoinette; Morgan, Jane; Horner, Paddy J; Wills, Gillian S; McClure, Myra O; Dickson, Nigel P

    2017-06-01

    Although understanding chlamydia incidence assists prevention and control, analyses based on diagnosed infections may distort the findings. Therefore, we determined incidence and examined risks in a birth cohort based on self-reports and serology. Self-reported chlamydia and behavior data were collected from a cohort born in New Zealand in 1972/3 on several occasions to age 38 years. Sera drawn at ages 26, 32, and 38 years were tested for antibodies to Chlamydia trachomatis Pgp3 antigen using a recently developed assay, more sensitive in women (82.9%) than men (54.4%). Chlamydia incidence by age period (first coitus to age 26, 26-32, and 32-38 years) was calculated combining self-reports and serostatus and risk factors investigated by Poisson regression. By age 38 years, 32.7% of women and 20.9% of men had seroconverted or self-reported a diagnosis. The highest incidence rate was to age 26, 32.7 and 18.4 years per 1000 person-years for women and men, respectively. Incidence rates increased substantially with increasing number of sexual partners. After adjusting age period incidence rates for partner numbers, a relationship with age was not detected until 32 to 38 years, and then only for women. Chlamydia was common in this cohort by age 38, despite the moderate incidence rates by age period. The strongest risk factor for incident infection was the number of sexual partners. Age, up to 32 years, was not an independent factor after accounting for partner numbers, and then only for women. Behavior is more important than age when considering prevention strategies.

  16. Dizziness reported by elderly patients in family practice: prevalence, incidence, and clinical characteristics

    Directory of Open Access Journals (Sweden)

    van Weert Henk C

    2010-01-01

    Full Text Available Abstract Background Although dizziness in elderly patients is very common in family practice, most prevalence studies on dizziness are community-based and include a study population that is not representative of family practice. The aim of this study was to investigate the prevalence and incidence of dizziness reported by elderly patients in family practice, to describe their final diagnoses as recorded by the family physician, and to compare the clinical characteristics of dizzy patients with those of non-dizzy patients. Methods Data were obtained from the Second Dutch National Survey of General Practice, a prospective registration study which took place over a 12-month period in 2001. We developed a search strategy consisting of 15 truncated search terms (based on Dutch synonyms for dizziness, and identified all patients aged 65 or older who visited their family physician because of dizziness (N = 3,990. We used the mid-time population as denominator to calculate the prevalence and incidence, and for group comparisons we used the Student's t and Chi-square test, and logistic regression analysis. Results The one-year prevalence of dizziness in family practice in patients aged 65 or older was 8.3%, it was higher in women than in men, and it increased with age. In patients aged 85 or older the prevalence was similar for men and women. The incidence of dizziness was 47.1 per 1000 person-years. For 39% of the dizzy patients the family physicians did not specify a diagnosis, and recorded a symptom diagnosis as the final diagnosis. Living alone, lower level of education, pre-existing cerebrovascular disease, and pre-existing hypertension were independently associated with dizziness. Conclusions Dizziness in family practice patients increases with age. It is more common in women than in men, but this gender difference disappears in the very old. Because a large proportion of dizzy elderly patients in family practice remains undiagnosed, it would be

  17. Cancer Incidence in Golestan Province : Report of an Ongoing Population-based Cancer Registry in Iran between 2004 and 2008

    NARCIS (Netherlands)

    Roshandel, Gholamreza; Sadjadi, Alireza; Aarabi, Mohsen; Keshtkar, Abbasali; Sedaghat, Seyed Mehdi; Nouraie, Seyed Mehdi; Semnani, Shahryar; Malekzadeh, Reza

    2012-01-01

    Background: Golestan Province, at the western end of the Asian esophageal cancer (EC) belt in northeastern Iran, was reported to have one of the highest worldwide rates of EC in the 1970s. We have previously shown a declining incidence of EC in Golestan during the last decades. This study reports ad

  18. Cancer Incidence in Golestan Province : Report of an Ongoing Population-based Cancer Registry in Iran between 2004 and 2008

    NARCIS (Netherlands)

    Roshandel, Gholamreza; Sadjadi, Alireza; Aarabi, Mohsen; Keshtkar, Abbasali; Sedaghat, Seyed Mehdi; Nouraie, Seyed Mehdi; Semnani, Shahryar; Malekzadeh, Reza

    Background: Golestan Province, at the western end of the Asian esophageal cancer (EC) belt in northeastern Iran, was reported to have one of the highest worldwide rates of EC in the 1970s. We have previously shown a declining incidence of EC in Golestan during the last decades. This study reports

  19. Hack's relation and optimal channel networks: The elongation of river basins as a consequence of energy minimization

    Science.gov (United States)

    Ijjasz-Vasquez, Ede J.; Bras, Rafael L.; Rodriguez-Iturbe, Ignacio

    1993-08-01

    As pointed by Hack (1957), river basins tend to become longer and narrower as their size increases. This work shows that this property may be partially regarded as the consequence of competition and minimization of energy expenditure in river basins.

  20. Incident reporting in nurse-led national telephone triage in Sweden: the reported errors reveal a pattern that needs to be broken.

    Science.gov (United States)

    Ernesäter, Annica; Engström, Maria; Holmström, Inger; Winblad, Ulrika

    2010-01-01

    We conducted a retrospective study of incident reports concerning the national, nurse-led telephone triage system in Sweden. The Swedish Health Care Direct organization (SHD) is staffed by registered nurses who act as telenurses and triage the callers' need for care, using a computerized decision support system. Data were collected during 2007 from all county councils that participated in the SHD and were analysed using content analysis. Incident reports were then compared concerning differences in reported categories and who reported the errors. The 426 incident reports included 452 errors. Of the analysed incident reports, 41% concerned accessibility problems, 25% incorrect assessment, 15% routines/guidelines, 13% technical problems and 6% information and communication. The most frequent outgoing incident reports (i.e. sent from SHD to other health-care providers) concerned accessibility problems and the most frequently incoming reports (i.e. sent to SHD from other health-care providers) concerned incorrect assessment. There was a significant difference (P triage or under-triage the callers' need for care. This over-triage or under-triage may in turn cause other health-care providers to report incorrect assessment to SHD. The implications for practice are that poor accessibility is a matter that should be addressed and that the reasons for incorrect assessment should be explored.

  1. Examining the attitudes of hospital pharmacists to reporting medication safety incidents using the theory of planned behaviour.

    Science.gov (United States)

    Williams, Steven David; Phipps, Denham L; Ashcroft, Darren

    2015-08-01

    To assess the effect of factors within hospital pharmacists' practice on the likelihood of their reporting a medication safety incident. Theory of planned behaviour (TPB) survey. Twenty-one general and teaching hospitals in the North West of England. Two hundred and seventy hospital pharmacists (response rate = 45%). Hospital pharmacists were invited to complete a TPB survey, based on a prescribing error scenario that had resulted in serious patient harm. Multiple regression was used to determine the relative influence of different TPB variables, and participant demographics, on the pharmacists' self-reported intention to report the medication safety incident. The TPB variables predicting intention to report: attitude towards behaviour, subjective norm, perceived behavioural control and descriptive norm. Overall, the hospital pharmacists held strong intentions to report the error, with senior pharmacists being more likely to report. Perceived behavioural control (ease or difficulty of reporting), Descriptive Norms (belief that other pharmacists would report) and Attitudes towards Behaviour (expected benefits of reporting) showed good correlation with, and were statistically significant predictors of, intention to report the error [R = 0.568, R(2) = 0.323, adjusted R(2) = 0.293, P behavioural and control beliefs about the reporting process. This should include instilling greater confidence about the benefits of reporting and not harming professional relationships with doctors, greater clarity about what/not to report and a simpler reporting system. © The Author 2015. Published by Oxford University Press in association with the International Society for Quality in Health Care; all rights reserved.

  2. Little River revisited - thirty-five years after Hack and Goodlett

    Science.gov (United States)

    Osterkamp, W.R.; Hupp, C.R.; Schening, M.R.

    1995-01-01

    In possibly the first detailed study to relate geomorphology, vegetation, and hydrology at a watershed scale, Hack and Goodlett (1960) documented variation in the eastern forest with topographic positions of cove, side slope, and nose. The study also described effects on landforms and vegetation of a catastrophic flood that occurred in June, 1949. Field investigations, conducted nearly four decades later, review selected parts of the study by Hack and Goodlett (1960). Replicate data provide a basis to evaluate their interpretations, to document geomorphic change since the 1949 flood, and to identify vegetation change in uplands and bottomlands. Results suggest that change to hillslope landforms has been minor since 1949, but that changes have occurred, seemingly during flow events of 1952, 1955 and 1985. Change in areal extent of forest types was not detected. Change in the relative abundances of dominant species may have resulted from 20th century fire suppression. -from Authors

  3. National Incident Management System (NIMS) Standards Review Panel Workshop Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    Stenner, Robert D.; Kirk, Jennifer L.; Stanton, James R.; Shebell, Peter; Schwartz, Deborah S.; Judd, Kathleen S.; Gelston, Gariann M.

    2006-02-07

    The importance and need for full compliant implementation of NIMS nationwide was clearly demonstrated during the Hurricane Katrina event, which was clearly expressed in Secretary Chertoff's October 4, 2005 letter addressed to the State's governors. It states, ''Hurricane Katrina was a stark reminder of how critical it is for our nation to approach incident management in a coordinated, consistent, and efficient manner. We must be able to come together, at all levels of government, to prevent, prepare for, respond to, and recover from any emergency or disaster. Our operations must be seamless and based on common incident management doctrine, because the challenges we face as a nation are far greater than capabilities of any one jurisdiction.'' The NIMS is a system/architecture for organizing response on a ''national'' level. It incorporations ICS as a main component of that structure (i.e., it institutionalizes ICS in NIMS). In a paper published on the NIMS Website, the following statements were made: ''NIMS represents a core set of doctrine, principles, terminology, and organizational processes to enable effective, efficient and collaborative incident management at all levels. To provide the framework for interoperability and compatibility, the NIMS is based on a balance between flexibility and standardization.'' Thus the NIC is challenged with the need to adopt quality SDO generated standards to support NIMS compliance, but in doing so maintain the flexibility necessary so that response operations can be tailored for the specific jurisdictional and geographical needs across the nation. In support of this large and complex challenge facing the NIC, the Pacific Northwest National Laboratory (PNNL) was asked to provide technical support to the NIC, through their DHS Science and Technology ? Standards Portfolio Contract, to help identify, review, and develop key standards for NIMS compliance. Upon

  4. Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E

    OpenAIRE

    Joshua Bartolomie

    2013-01-01

    Wilhelm, T. (2013). Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E. Waltham, MA: Syngress, 464 pages, ISBN-10: 1597499935; ISBN-13: 978-1597499934, US$79.99Reviewed by Joshua Bartolomie, CISSP, CEECS, CFCE, DFCP, CRISC, CSMOrganizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactiv...

  5. Governance responses to hacking in the banking sector of South Africa : an exploratory study

    OpenAIRE

    2013-01-01

    D.Comm. (Auditing) Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time, IT also introduces significant risks, such as hacking. The board of directors is ultimately responsible for mitigating IT risk as a component of business risk. This task is included in its corporate governance responsibilities, which, in the South African context, is underpinned by the King Code of Corporate...

  6. Little River revisited — thirty-five years after Hack and Goodlett

    Science.gov (United States)

    Osterkamp, W. R.; Hupp, C. R.; Schening, M. R.

    1995-09-01

    In possibly the first detailed study to relate geomorphology, vegetation, and hydrology at a watershed scale, Hack and Goodlett (1960) documented variation in the eastern forest with topograhic positions of cove, side slope, and nose. Runoff identified as convergent, parallel, or divergent, supported forest types, respectively, of northern hardwood, oak, and yellow pine. The study, conducted in the Little River Basin of northwestern Virginia, also described effects on landforms and vegetation of a catastrophic flood that occurred in June, 1949. Field investigations, conducted nearly 4 decades later, review selected parts of the study by Hack and Goodlett (1960). Replicate data provide a basis to evaluate interpretations of Hack and Goodlett, to document geomorphic change within the Little River Basin since the 1949 flood, and to identify vegetation change in uplands and bottomlands. Results suggest that change to hillslope landforms has been minor since 1949, but that changes have occurred to the Little River and its tributaries, seemingly during flow events of 1952, 1955, and 1985. Change in areal extent of forest types was not detected. Change in the relative abundances of dominant species may have resulted from 20th-century fire suppression.

  7. Science Hack Day: an opportunity for public engagement, art/science mash-ups, and inspiration

    Science.gov (United States)

    Bellis, Matthew

    2013-04-01

    The idea of a Science Hack Day (http://sciencehackday.com/) is to put non-scientists (designers, web developers, artists, interested enthusiasts) in a room with scientists and some good ideas, and see what science-themed project they can create in a weekend (about 24 hours of real hacking). The motto of the organizers is ``Get Excited and Make Things with Science!'' I have participated in several of these events including the first one held in the United State in Palo Alto in 2010 and as a remote advisor to participants in Nairobi, Kenya. To these events I have brought particle physics data from both the BaBar and the CMS (Compact Muon Solenoid) experiments, data from the CoGeNT dark matter direct-detection experiment, and my expertise and enthusiasm. The experience has been transformative for me as both a scientist and a science advocate. This talk will recount my experiences with Science Hack Day events in general and detail some projects that have come out of these days, including the Particle Physics Wind Chime (http://www.mattbellis.com/windchime/) and the Standard Model of Cocktail Physics (http://www.physicsdavid.net/2012/11/standard-model-of-cocktail-physics/). Opportunities for other scientists to take part in similar events will be discussed.

  8. Effects of patient safety culture interventions on incident reporting in general practice : A cluster randomised trial a cluster randomised trial

    NARCIS (Netherlands)

    Verbakel, Natasha J.; Langelaan, Maaike; Verheij, Theo J M; Wagner, Cordula; Zwart, Dorien L M

    2015-01-01

    Background: A constructive safety culture is essential for the successful implementation of patient safety improvements. Aim: To assess the effect of two patient safety culture interventions on incident reporting as a proxy of safety culture. Design and setting: A three-arm cluster randomised trial

  9. Using Critical Incident Reporting to Promote Objectivity and Self-Knowledge in Pre-Service School Psychologists

    Science.gov (United States)

    Griffin, Maureen L.; Scherr, Tracey G.

    2010-01-01

    This longitudinal project consisted of exploring the usefulness of Critical Incident Reporting (CIR) as an instructional tool (Griffin, 2003) to first increase objectivity and self-knowledge among practicum students and then to guide practices when those students became interns the following academic year. Analysis included 120 CIRs written by 15…

  10. The Diffuse Involvement of Bilateral Breasts in the Incidence of Burkitt's Lymphoma: A Case Report

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Myung Su; Lee, Sa Rah; Yang, Woo Ick; Kim, Eun Kyung [Yonsei University College of Medicine, Seoul (Korea, Republic of); Jung, Hae Kyoung [CHA University, Bundang CHA Hospital, Seongnam (Korea, Republic of)

    2009-12-15

    The incidence of Burkitt's lymphoma involving both breasts is rare. We report such a case that was diagnosed by a core biopsy of a hypoechoic lesion visualized from the ultrasonographic results of a patient that was clinically suspected of mastitis.

  11. Parent-Reported Otorrhea in Children with Tympanostomy Tubes: Incidence and Predictors

    OpenAIRE

    van Dongen, T. M.; van der Heijden, G. J.; Freling, H. G.; Venekamp, R. P.; Schilder, A. G.

    2013-01-01

    Purpose Although common in children with tympanostomy tubes, the current incidence of tympanostomy tube otorrhea (TTO) is uncertain. TTO is generally a sign of otitis media, when middle ear fluid drains through the tube. Predictors for otitis media are therefore suggested to have predictive value for the occurrence of TTO. Objective To determine the incidence of TTO and its predictors. Methods We performed a cohort study, using a parental web-based questionnaire to retrospec...

  12. Estimating the incidence reporting rates of new influenza pandemics at an early stage using travel data from the source country.

    Science.gov (United States)

    Chong, K C; Fong, H F; Zee, C Y

    2014-05-01

    During the surveillance of influenza pandemics, underreported data are a public health challenge that complicates the understanding of pandemic threats and can undermine mitigation efforts. We propose a method to estimate incidence reporting rates at early stages of new influenza pandemics using 2009 pandemic H1N1 as an example. Routine surveillance data and statistics of travellers arriving from Mexico were used. Our method incorporates changes in reporting rates such as linearly increasing trends due to the enhanced surveillance. From our results, the reporting rate was estimated at 0·46% during early stages of the pandemic in Mexico. We estimated cumulative incidence in the Mexican population to be 0·7% compared to 0·003% reported by officials in Mexico at the end of April. This method could be useful in estimation of actual cases during new influenza pandemics for policy makers to better determine appropriate control measures.

  13. Estimating the incidence reporting rates of new influenza pandemics at an early stage using travel data from the source country

    OpenAIRE

    CHONG, K. C.; Fong, H. F.; ZEE, C. Y.

    2013-01-01

    SUMMARY During the surveillance of influenza pandemics, underreported data are a public health challenge that complicates the understanding of pandemic threats and can undermine mitigation efforts. We propose a method to estimate incidence reporting rates at early stages of new influenza pandemics using 2009 pandemic H1N1 as an example. Routine surveillance data and statistics of travellers arriving from Mexico were used. Our method incorporates changes in reporting rates such as linearly inc...

  14. Analysis of Aviation Safety Reporting System Incident Data Associated With the Technical Challenges of the Vehicle Systems Safety Technology Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2014-01-01

    This analysis was conducted to support the Vehicle Systems Safety Technology (VSST) Project of the Aviation Safety Program (AVsP) milestone VSST4.2.1.01, "Identification of VSST-Related Trends." In particular, this is a review of incident data from the NASA Aviation Safety Reporting System (ASRS). The following three VSST-related technical challenges (TCs) were the focus of the incidents searched in the ASRS database: (1) Vechicle health assurance, (2) Effective crew-system interactions and decisions in all conditions; and (3) Aircraft loss of control prevention, mitigation, and recovery.

  15. Application of an aviation model of incident reporting and investigation to the neurosurgical scenario: method and preliminary data.

    Science.gov (United States)

    Ferroli, Paolo; Caldiroli, Dario; Acerbi, Francesco; Scholtze, Maurizio; Piro, Alfonso; Schiariti, Marco; Orena, Eleonora F; Castiglione, Melina; Broggi, Morgan; Perin, Alessandro; DiMeco, Francesco

    2012-11-01

    Incident reporting systems are universally recognized as important tools for quality improvement in all complex adaptive systems, including the operating room. Nevertheless, introducing a safety culture among neurosurgeons is a slow process, and few studies are available in the literature regarding the implementation of an incident reporting system within a neurosurgical department. The authors describe the institution of an aviation model of incident reporting and investigation in neurosurgery, focusing on the method they have used and presenting some preliminary results. In 2010, the Inpatient Safety On-Board project was developed through cooperation between a team of human factor and safety specialists with aviation backgrounds (DgSky team) and the general manager of the Fondazione Istituto Neurologico Carlo Besta. In 2011, after specific training in safety culture, the authors implemented an aviation-derived prototype of incident reporting within the Department of Neurosurgery. They then developed an experimental protocol to track, analyze, and categorize any near misses that happened in the operating room. This project officially started in January 2012, when a dedicated team of assessors was established. All members of the neurosurgical department were asked to report near misses on a voluntary, confidential, and protected form (Patient Incident Reporting System form, Besta Safety Management Programme). Reports were entered into an online database and analyzed by a dedicated team of assessors with the help of a facilitator, and an aviation-derived root cause analysis was performed. Since January 2012, 14 near misses were analyzed and classified. The near-miss contributing factors were mainly related to human factors (9 of 14 cases), technology (1 of 14 cases), organizational factors (3 of 14 cases), or procedural factors (1 of 14 cases). Implementing an incident reporting system is quite demanding; the process should involve all of the people who work within

  16. Self-reported incident type 2 diabetes in the Ibadan study of ageing: relationship with urban residence and socioeconomic status.

    Science.gov (United States)

    Balogun, Williams O; Gureje, Oye

    2013-01-01

    There is no incident study of diabetes among elderly Nigerians and it is unclear what factors may constitute risks for the condition in this society undergoing rapid social changes. This study explores the link between urban residence and socioeconomic status, and incident diabetes among community-dwelling elderly Nigerians. A cohort of 2,149 persons, aged 65 years and above, were recruited through a clustered multistage sampling in eight contiguous predominantly Yoruba-speaking states in south-western and north-central regions of Nigeria. Follow-up evaluation was conducted approximately 39 months after the baseline assessments. Face-to-face assessments obtained self-report of chronic medical conditions, including diabetes, using a standardized checklist as well as information on social factors, including residence. Incident diabetes was determined among persons who were free of the problem at baseline (n = 1,330). At follow-up, 38 subjects had developed diabetes giving an incidence rate of 8.87% [95% confidence interval (CI): 6.45-12.19] per 1,000 person-years. A stepwise relationship was found between incident diabetes and urbanicity as well as increasing economic status. The highest incidence of diabetes (13.57%; 95% CI: 8.75-21.03 per 1,000 person-years) occurred among subjects residing in urban areas, representing an adjusted relative risk of 4.25 (95% CI: 1.81-9.94) compared to those residing in rural areas. Also, compared with persons in the lowest economic group, those in the highest group had about a 3-fold elevated risk of having incident diabetes. Urban residence and increasing socioeconomic status are risk factors for new onset diabetes among elderly Nigerians. These social factors may be proxies for lifestyles that increase the likelihood of developing the disorder. Copyright © 2012 S. Karger AG, Basel.

  17. SU-E-T-469: Implementation of VAs Web-Based Radiotherapy Incident Reporting and Analysis System (RIRAS)

    Energy Technology Data Exchange (ETDEWEB)

    Kapoor, R; Palta, J; Hagan, M [Veteran Health Administration, Richmond, Virginia (United States); Virginia Commonwealth University, Richmond, VA (United States); Malik, G [TSG Innovations Inc. (United States)

    2015-06-15

    Purpose: This Web-based Radiotherapy Incident Reporting and Analysis System (RIRAS) is a tool to improve quality of care for radiation therapy patients. This system is an important facet of continuing effort by our community to maintain and improve safety of radiotherapy.Material and Methods: VA’s National Radiation Oncology Program office has embarked on a program to electronically collect adverse events and good-catch data of radiation treatment of over 25,000 veterans treated with radiotherapy annually. This VA-Intranet based software design has made use of dataset taxonomies and data dictionaries defined in AAPM/ASTRO reports on error reporting. We used proven industrial and medical event reporting techniques to avoid several common problems faced in effective data collection such as incomplete data due to data entry fatigue by the reporters, missing data due to data difficult to obtain or not familiar to most reporters, missing reports due to fear of reprisal etc. This system encompasses the entire feedback loop of reporting an incident, analyzing it for salient details, and developing interventions to prevent it from happening again. The analysis reports with corrective, learning actions are shared with the reporter/facility and made public to the community (after deidentification) as part of the learning process. Results: Till date 50 incident/good catches have been reported in RIRAS and we have completed analysis on 100% of these reports. This is done due to the fact that each reported incidents is investigated and a complete analysis/patient-safety-work-product report is generated by radiation oncology domain-experts. Conclusions Because of the completeness of the data, the system has enabled us to analyze process steps and track trends of major errors which in the future will lead to implementing system wide process improvement steps and safe standard operating procedures for each radiotherapy treatment modality/technique and fulfills our goal of

  18. EP&R Standards Project Report: Technical Review of National Incident Management Standards

    Energy Technology Data Exchange (ETDEWEB)

    Stenner, Robert D.

    2007-04-24

    The importance and necessity for a fully developed and implemented National Incident Management System (NIMS) has been demonstrated in recent years by the impact of national events such as Hurricane Katrina in 2005. Throughout the history of emergency response to major disasters, especially when multiple response organizations are involved, there have been systemic problems in the consistency and uniformity of response operations. Identifying national standards that support the development and implementation of NIMS is key to helping solve these systemic problems. The NIMS seeks to provide uniformity and consistency for incident management by using common terminology and protocols that will enable responders to coordinate their efforts to ensure an efficient response.

  19. Masking in reports of "most serious" events: bias in estimators of sports injury incidence in Canadian children

    Directory of Open Access Journals (Sweden)

    A. Gupta

    2016-08-01

    Full Text Available Introduction: Surveys that collect information on injuries often focus on the single "most serious" event to help limit recall error and reduce survey length. However, this can mask less serious injuries and result in biased incidence estimates for specific injury subcategories. Methods: Data from the 2002 Health Behaviour in School-aged Children (HBSC survey and from the Canadian Hospitals Injury Reporting and Prevention Program (CHIRPP were used to compare estimates of sports injury incidence in Canadian children. Results: HBSC data indicate that 6.7% of children report sustaining a sports injury that required an emergency department (ED visit. However, details were only collected on a child's "most serious" injury, so children who had multiple injuries requiring an ED visit may have had sports injuries that went unreported. The rate of 6.7% can be seen to be an underestimate by as much as 4.3%. Corresponding CHIRPP surveillance data indicate an incidence of 9.9%. Potential masking bias is also highlighted in our analysis of injuries attended by other health care providers. Conclusion: The "one most serious injury" line of questioning induces potentially substantial masking bias in the estimation of sports injury incidence, which limits researchers' ability to quantify the burden of sports injury. Longer survey recall periods naturally lead to greater masking. The design of future surveys should take these issues into account. In order to accurately inform policy decisions and the direction of future research, researchers must be aware of these limitations.

  20. Prostate cancer incidence in men with self-reported prostatitis after 15 years of follow-up.

    Science.gov (United States)

    Vaarala, Markku H; Mehik, Aare; Ohtonen, Pasi; Hellström, Pekka A

    2016-08-01

    Controversy exists regarding a possible association between prostatitis and prostate cancer. To further evaluate the incidence of prostate cancer following prostatitis, a study of prostate cancer incidence in a cohort of Finnish men was performed. The original survey evaluating self-reported prostatitis was conducted in 1996-1997. A database review was conducted focusing on prostate cancer diagnoses in the cohort. In 2012, there were 13 (5.2%) and 27 (1.8%) prostate cancer cases among men with (n=251) and without (n=1,521) prostatitis symptoms, respectively. There were no significant differences in age, primary therapy distribution, prostate-specific antigen levels, Gleason score, clinical T-class at the time of prostate cancer diagnosis, or time lag between the original survey and prostate cancer diagnosis. The standardized incidence ratio (SIR) of prostate cancer was 1.16 [95% confidence interval (CI), 0.62-1.99] and 0.44 (95% CI, 0.29-0.64) among men with and without prostatitis symptoms, respectively. After 15 years of follow-up subsequent to self-reported prostatitis, no evident increase in incidence of prostate cancer was detected among Finnish men with prostatitis symptoms. The higher percentage of prostate cancer among men with prostatitis symptoms appears to be due to coincidentally low SIR of prostate cancer among men without prostatitis symptoms, and may additionally be due to increased diagnostic examinations. Further research is required to confirm this speculation.

  1. The impact of under-reporting of cases on the estimates of childhood cancer incidence and survival in Estonia.

    Science.gov (United States)

    Paapsi, Keiu; Mägi, Margit; Mikkel, Sirje; Saks, Kadri; Aareleid, Tiiu; Innos, Kaire

    2017-06-09

    About 35 new childhood cancer cases are diagnosed in Estonia (population 1.3 million in 2011) every year. Despite continuous improvements in the healthcare system and available cancer treatment options, the survival rates for childhood cancers have appeared to remain lower than the European average. These observations and the accompanying decrease in incidence led us to hypothesize that some nonfatal cases might be missing from the Estonian Cancer Registry (ECR). The aim of this study was to evaluate the completeness of reporting of childhood cancer cases to the ECR and its impact on the estimates of cancer incidence and survival. All cases of benign and malignant tumours, diagnosed in 2000-2011 among children aged 0-17 years and eligible for registration in the ECR, were included in the study. Completeness of reporting was evaluated for cases aged 0-17 years, and incidence and survival were analysed for cases aged 0-14 for international comparisons. The total number of new cancer cases increased from 459 to 515. Overall completeness of case ascertainment was estimated to be 89.5%. After adding the missing cases, the overall incidence rate increased from 12.9 to 14.9/100 000 (from 3.4 to 4.7 for leukaemias). The 2010-2014 period estimate of the 5-year survival increased from 70 to 76% for all sites combined and from 71 to 82% for leukaemias. In conclusion, the under-reporting of nonfatal childhood cancer cases to the ECR had an important impact on incidence and survival rates, causing a considerable underestimation of both.

  2. Learning from incident reports in the Australian medical imaging setting: handover and communication errors.

    Science.gov (United States)

    Hannaford, N; Mandel, C; Crock, C; Buckley, K; Magrabi, F; Ong, M; Allen, S; Schultz, T

    2013-02-01

    To determine the type and nature of incidents occurring within medical imaging settings in Australia and identify strategies that could be engaged to reduce the risk of their re-occurrence. 71 search terms, related to clinical handover and communication, were applied to 3976 incidents in the Radiology Events Register. Detailed classification and thematic analysis of a subset of incidents that involved handover or communication (n=298) were undertaken to identify the most prevalent types of error and to make recommendations about patient safety initiatives in medical imaging. Incidents occurred most frequently during patient preparation (34%), when requesting imaging (27%) and when communicating a diagnosis (23%). Frequent problems within each of these stages of the imaging cycle included: inadequate handover of patients (41%) or unsafe or inappropriate transfer of the patient to or from medical imaging (35%); incorrect information on the request form (52%); and delayed communication of a diagnosis (36%) or communication of a wrong diagnosis (36%). The handover of patients and clinical information to and from medical imaging is fraught with error, often compromising patient safety and resulting in communication of delayed or wrong diagnoses, unnecessary radiation exposure and a waste of limited resources. Corrective strategies to address safety concerns related to new information technologies, patient transfer and inadequate test result notification policies are relevant to all healthcare settings. Handover and communication errors are prevalent in medical imaging. System-wide changes that facilitate effective communication are required.

  3. Dizziness reported by elderly patients in family practice: prevalence, incidence, and clinical characteristics

    NARCIS (Netherlands)

    Maarsingh, O.R.; Dros, J.; Schellevis, F.G.; van Weert, H.C.; Bindels, P.J.; van der Horst, H.E.

    2010-01-01

    Background: Although dizziness in elderly patients is very common in family practice, most prevalence studies on dizziness are community-based and include a study population that is not representative of family practice. The aim of this study was to investigate the prevalence and incidence of dizzin

  4. Dizziness reported by elderly patients in family practice: prevalence, incidence, and clinical characteristics.

    NARCIS (Netherlands)

    Maarsingh, O.R.; Dros, J.; Schellevis, F.G.; Weert, H.C. van; Bindels, P.J.; Horst, H.E. van der

    2010-01-01

    Background: Although dizziness in elderly patients is very common in family practice, most prevalence studies on dizziness are community-based and include a study population that is not representative of family practice. The aim of this study was to investigate the prevalence and incidence of dizzin

  5. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    Science.gov (United States)

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  6. How to Understand Hack on Internet%如何认识互联网黑客现象

    Institute of Scientific and Technical Information of China (English)

    吴利军

    2007-01-01

    "黑客"一词来源于英语动词hack,原意为"劈,砍",也就意味着"劈出、开辟".关于"Hack"和"Hacker"的含义,《新黑客网上字典》列举了9种不同的解释.但该字典也收录了一个MIT黑客菲尔(Phil Agre)的文章.菲尔告诉读者,不要被这些看似很有弹性的解释给蒙了,"Hack"其实只有一个意思,就是用精细、高明的手段去挑战传统想法.

  7. SCORE Study Report #11: Incidences of Neovascular Events in Eyes with Retinal Vein Occlusion

    Science.gov (United States)

    Chan, Clement K.; Ip, Michael S.; VanVeldhuisen, Paul C.; Oden, Neal L.; Scott, Ingrid U.; Tolentino, Michael J.; Blodi, Barbara A.

    2010-01-01

    Purpose To investigate in The Standard Care versus COrticosteroid for REtinal Vein Occlusion (SCORE) Study: 1) incidences of neovascular events and retinal capillary nonperfusion (abbreviated as “nonperfusion”), and their relationship with treatment groups; 2) neovascular incidences by nonperfusion status; and 3) pertinent baseline factors for their potential risk for neovascular events. Design Two multi-center, randomized clinical trials: one evaluating participants with central retinal vein occlusion (CRVO) and the other evaluating participants with branch retinal vein occlusion (BRVO). Participants At 36 months, data were available for 81 participants with CRVO and 128 with BRVO. Intervention Standard care (observation or grid photocoagulation) versus 1 mg or 4 mg intravitreal triamcinolone. Main Outcome Measures Neovascularization of the iris (NVI), neovascular glaucoma (NVG), disc or retinal neovascularization (NVD/NVE), pre-retinal or vitreous hemorrhage (PRH/VH), and nonperfusion. Results Cumulative 36-month incidences for CRVO and BRVO eyes, respectively, were: 8.5% and 2.4% for NVI or NVG; 8.8 % and 7.6% for NVD/NVE or PRH/VH. There were no differences in incidences of neovascular events or risk of nonperfusion when comparing the 3 treatment groups within diseases. For CRVO at 36 months, 16.6% of eyes with ≥ 5.5 disc areas of nonperfusion vs. 4.0% of eyes with retinal capillary details caused by dense hemorrhage at baseline for CRVO eyes. Increased risk of neovascularization was noted below the historical threshold of 10 disc areas of nonperfusion for retinal vein occlusion. PMID:21440942

  8. Accidental nuclear excursion Recuplex operation 234-5 facility. Final report: Date of incident: April 7, 1962

    Energy Technology Data Exchange (ETDEWEB)

    1962-08-01

    On Saturday morning, April 7, 1962, at about 1059 Armed Forces time, an accidental nuclear excursion occurred in the plutonium waste recovery facility (Recuplex) of the 234-5 Building. This excursion did not result in any mechanical damage or spread of contamination. Three employees of the General Electric Company received overexposures to gamma and neutron radiation. None were fatally exposed; in each case the overexposure was recognized promptly, and following medical observation and testing the men were released to return to work. In compliance with AEC Manual Chapter 0703, an AEC-HAPO committee composed of two AEC employees and five General Electric employees was appointed by the Manger, HOO, with the concurrence of the General Manager, HAPO, to conduct an investigation of the incident. The committee`s purpose was to determine the cause, nature, and extent of the incident, and recommend action to be taken by others to minimize or preclude future incidents of this magnitude. A study of operating practices and operating conditions that appeared to exist prior to, during, and subsequent to the accident was made by the committee. The committee believes that this report provides sufficient information to answer questions which may arise as a result of the criticality incident except those relating to its cause.

  9. Better P-curves: Making P-curve analysis more robust to errors, fraud, and ambitious P-hacking, a Reply to Ulrich and Miller (2015).

    Science.gov (United States)

    Simonsohn, Uri; Simmons, Joseph P; Nelson, Leif D

    2015-12-01

    When studies examine true effects, they generate right-skewed p-curves, distributions of statistically significant results with more low (.01 s) than high (.04 s) p values. What else can cause a right-skewed p-curve? First, we consider the possibility that researchers report only the smallest significant p value (as conjectured by Ulrich & Miller, 2015), concluding that it is a very uncommon problem. We then consider more common problems, including (a) p-curvers selecting the wrong p values, (b) fake data, (c) honest errors, and (d) ambitiously p-hacked (beyond p < .05) results. We evaluate the impact of these common problems on the validity of p-curve analysis, and provide practical solutions that substantially increase its robustness.

  10. Obtaining plant Miscanthus sacchariflorus (Maxim. Hack and Miscanthus sinensis Andersson in vitro culture by indirect morphogenesis

    Directory of Open Access Journals (Sweden)

    С. М. Гонтаренко

    2017-03-01

    Full Text Available Purpose. To obtain Miscanthus sacchariflorus (Maxim. Hack and Miscanthus sinensis Andersson in vitro culture by indirect morphogenesis. Methods. Biotechnological procedures, mathematical and statistical analyses. Results. Composition of nutrient medium was developed intended for induction of callusogenesis from Miscanthus seeds with a poor germination and viability of seedlings – Murashige and Skoog (MS medium was modified for the amount of macroelements (half-dose that was supplemented with amino acids (300 mg/l of glutamic acid, 50 mg/l of aspartic acid, 5 mg/l of tyrosine, 3 mg/l of arginine, 2 mg/l of hydroxyproline and plant growth regulators [2,5 mg/l of 2.4D (2.4-Dichlorophenoxyacetic acid, 0,6 mg/l of BAP (6-Benzyl-aminopurine and 0,3 mg/l of ABA (Abscisic acid]. Composition of nutrient medium was developed for regeneration of microplants from callus – agar MS medium was modified for the amount of macroelements (half-dose supplemented with vitamins: 10 mg/l of thiaminum, 1,0 mg/l of pyridoxine, 1,0 mg/l of nicotinic acid (by White, 1,0 mg/l of ascorbic acid, 250 mg/l of glutamic acid, 2,0 mg/l of BAP, 0,3 mg/l of NAA (Naphthaleneacetic acid. On this medium, 100% regeneration of M. sacchariflorus (Maxim. Hack and 50% regeneration of M. sinensis Andersson was obtained. Due to media modification aimed at initiating callusogenesis and microplants regeneration, reproduction factor of M. sinensis was increased 20 times at the average, M. sacchariflorus – 35–40 times. Conclusions. Plants of M. sacchariflorus (Maxim. Hack and M. sinensis Andersson were obtained in vitro culture by initiation of callusogenes and microplants regeneration from the Miscanthus seeds with poor germination and viability on nutrient media of certain composition.

  11. Hacking multitude’ and Big Data: Some insights from the Turkish ‘digital coup’

    Directory of Open Access Journals (Sweden)

    Paolo Cardullo

    2015-04-01

    Full Text Available The paper presents my first findings and reflections on how ordinary people may opportunistically and unpredictably respond to Internet censorship and tracking. I try to capture this process with the concept of ‘hacking multitude'. Working on a case study of the Turkish government's block of the social media platform Twitter (March 2014, I argue that during systemic data choke-points, a multitude of users might acquire a certain degree of reflexivity over ubiquitous software of advanced techno-capitalism. Resisting naïve parallels between urban streets and virtual global streets, the article draws on Fuller's ‘media ecologies' to make sense of complex and dynamic interactions between processes and materialities, strategies of communication and mundane practices. Such a dense space is mostly invisible to network and traffic analysis, although it comes alive under the magnifying lens of digital ethnography. As the Turkish government tried to stop protesters on both the urban and the Twitter spheres, alternative material configurations and new hybrid formations and practices emerged. I try to bring this process alive following the traces – that is, a combination of digital data and materialities – of a social space between the protest for Twitter access, the ‘digital coup' and the interactions that this situation determined. In the final section, I briefly explore two research trajectories which can further develop my initial formulation of a ‘hacking multitude'. I argue that a generalisation of hacking/multitude is problematic for the political, cultural or economic processes more directly associated with Big Data.

  12. Hacking multitude’ and Big Data: Some insights from the Turkish ‘digital coup’

    Directory of Open Access Journals (Sweden)

    Paolo Cardullo

    2015-04-01

    Full Text Available The paper presents my first findings and reflections on how ordinary people may opportunistically and unpredictably respond to Internet censorship and tracking. I try to capture this process with the concept of ‘hacking multitude'. Working on a case study of the Turkish government's block of the social media platform Twitter (March 2014, I argue that during systemic data choke-points, a multitude of users might acquire a certain degree of reflexivity over ubiquitous software of advanced techno-capitalism. Resisting naïve parallels between urban streets and virtual global streets, the article draws on Fuller's ‘media ecologies' to make sense of complex and dynamic interactions between processes and materialities, strategies of communication and mundane practices. Such a dense space is mostly invisible to network and traffic analysis, although it comes alive under the magnifying lens of digital ethnography. As the Turkish government tried to stop protesters on both the urban and the Twitter spheres, alternative material configurations and new hybrid formations and practices emerged. I try to bring this process alive following the traces – that is, a combination of digital data and materialities – of a social space between the protest for Twitter access, the ‘digital coup' and the interactions that this situation determined. In the final section, I briefly explore two research trajectories which can further develop my initial formulation of a ‘hacking multitude'. I argue that a generalisation of hacking/multitude is problematic for the political, cultural or economic processes more directly associated with Big Data.

  13. Hacking web intelligence open source intelligence and web reconnaissance concepts and techniques

    CERN Document Server

    Chauhan, Sudhanshu

    2015-01-01

    Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach

  14. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    Science.gov (United States)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  15. Macroscopic and stereomicroscopic comparison of hacking trauma of bones before and after carbonization.

    Science.gov (United States)

    Alunni, Véronique; Nogueira, Luísa; Quatrehomme, Gérald

    2017-07-12

    This experimental study examined lesions produced by a hatchet on pig femurs before and after carbonization. A total of 30 lesions were produced and analyzed using stereomicroscopy and then reexamined after carbonization. Not only was the sharp-blunt mechanism of the hacking trauma (V-shape, regularity of one edge, irregularity of the other edge, upraising, lateral pushing back, fossae dug laterally to the edge) still recognizable after carbonization; in some instances, the carbonization actually enhanced the features observed. Carbonization also did not significantly alter the measurements of the lesions. Carbonization tends to alter the structure of the bone especially in areas weakened by the blunt trauma.

  16. Characteristics of health IT outage and suggested risk management strategies: an analysis of historical incident reports in China.

    Science.gov (United States)

    Lei, Jianbo; Guan, Pengcheng; Gao, Kaihua; Lu, Xueqin; Chen, Yunan; Li, Yuefeng; Meng, Qun; Zhang, Jiajie; Sittig, Dean F; Zheng, Kai

    2014-02-01

    The healthcare industry has become increasingly dependent on using information technology (IT) to manage its daily operations. Unexpected downtime of health IT systems could therefore wreak havoc and result in catastrophic consequences. Little is known, however, regarding the nature of failures of health IT. To analyze historical health IT outage incidents as a means to better understand health IT vulnerabilities and inform more effective prevention and emergency response strategies. We studied news articles and incident reports publicly available on the internet describing health IT outage events that occurred in China. The data were qualitatively analyzed using a deductive grounded theory approach based on a synthesized IT risk model developed in the domain of information systems. A total of 116 distinct health IT incidents were identified. A majority of them (69.8%) occurred in the morning; over 50% caused disruptions to the patient registration and payment collection functions of the affected healthcare facilities. The outpatient practices in tertiary hospitals seem to be particularly vulnerable to IT failures. Software defects and overcapacity issues, followed by malfunctioning hardware, were among the principal causes. Unexpected health IT downtime occurs more and more often with the widespread adoption of electronic systems in healthcare. Risk identification and risk assessments are essential steps to developing preventive measures. Equally important is institutionalization of contingency plans as our data show that not all failures of health IT can be predicted and thus effectively prevented. The results of this study also suggest significant future work is needed to systematize the reporting of health IT outage incidents in order to promote transparency and accountability. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Reported fried food consumption and the incidence of hypertension in a Mediterranean cohort: the SUN (Seguimiento Universidad de Navarra) project.

    Science.gov (United States)

    Sayon-Orea, Carmen; Bes-Rastrollo, Maira; Gea, Alfredo; Zazpe, Itziar; Basterra-Gortari, Francisco J; Martinez-Gonzalez, Miguel A

    2014-09-28

    Reported associations between the consumption of fried foods and the incidence of obesity or weight gain make it likely that fried food consumption might also be associated with the development of hypertension. However, evidence from long-term prospective studies is scarce. Therefore, the aim of the present study was to longitudinally evaluate this association in a prospective cohort. The SUN (Seguimiento Universidad de Navarra) project is a Mediterranean cohort study of university graduates conducted in Spain, which started in December 1999 and is still ongoing. In the present study, we included 13,679 participants (5059 men and 8620 women), free of hypertension at baseline with a mean age of 36·5 (SD 10·8) years. Total fried food consumption was estimated at baseline. The outcome was the incidence of a medical diagnosis of self-reported hypertension during the follow-up period. To assess the association between the consumption of fried foods and the subsequent risk of developing incident hypertension during the follow-up period, Cox regression models were used. During a median follow-up period of 6·3 years, 1232 incident cases of hypertension were identified. After adjusting for potential confounders, the adjusted hazard ratios for developing hypertension were 1·18 (95% CI 1·03, 1·36) and 1·21 (95% CI 1·04, 1·41) for those consuming fried foods 2-4 and >4 times/week, respectively, compared with those consuming fried foods < 2 times/week (P for trend = 0·009). In conclusion, frequent consumption of fried foods at baseline was found to be associated with a higher risk of hypertension during the follow-up period in a Mediterranean cohort of university graduates.

  18. Structural problems of medical news reports in newspapers: a verification of news reports on an incident of mass nosocomial Serratia infection.

    Science.gov (United States)

    Mizuno, Yasuhiro; Narimatsu, Hiroto; Kishi, Yukiko; Kodama, Yuko; Murashige, Naoko; Yuji, Koichiro; Matsumura, Tomoko; Kami, Masahiro

    2010-04-01

    It is unclear how changes in the content and number of news reports over time affect the impressions made in the minds of newspaper readers. This study targeted news reports in major newspapers regarding an incident of mass nosocomial Serratia infection that occurred at one clinic. The trends in the total number of articles and total number of characters contained in the articles were congruent, with a peak on the day after the incident was disclosed and a rapid decrease thereafter. The numbers of articles and characters that appeared during the first 3 days corresponded to 45 and 51% of those that appeared during the entire study period. On day 9, it was published that Serratia liquefaciens propagated on medical instruments, and both the number of articles and the number of characters increased by approximately 40% in comparison to those published on the day after the initial report of the incident. The individual articles were deemed to be medically accurate; however, the main problem was that only part of the specific medical issue had been emphasized because of a poor balance in the number of news reports on this topic.

  19. To what extent are adverse events found in patient records reported by patients and healthcare professionals via complaints, claims and incident reports?

    Directory of Open Access Journals (Sweden)

    van der Wal Gerrit

    2011-02-01

    Full Text Available Abstract Background Patient record review is believed to be the most useful method for estimating the rate of adverse events among hospitalised patients. However, the method has some practical and financial disadvantages. Some of these disadvantages might be overcome by using existing reporting systems in which patient safety issues are already reported, such as incidents reported by healthcare professionals and complaints and medico-legal claims filled by patients or their relatives. The aim of the study is to examine to what extent the hospital reporting systems cover the adverse events identified by patient record review. Methods We conducted a retrospective study using a database from a record review study of 5375 patient records in 14 hospitals in the Netherlands. Trained nurses and physicians using a method based on the protocol of The Harvard Medical Practice Study previously reviewed the records. Four reporting systems were linked with the database of reviewed records: 1 informal and 2 formal complaints by patients/relatives, 3 medico-legal claims by patients/relatives and 4 incident reports by healthcare professionals. For each adverse event identified in patient records the equivalent was sought in these reporting systems by comparing dates and descriptions of the events. The study focussed on the number of adverse event matches, overlap of adverse events detected by different sources, preventability and severity of consequences of reported and non-reported events and sensitivity and specificity of reports. Results In the sample of 5375 patient records, 498 adverse events were identified. Only 18 of the 498 (3.6% adverse events identified by record review were found in one or more of the four reporting systems. There was some overlap: one adverse event had an equivalent in both a complaint and incident report and in three cases a patient/relative used two or three systems to complain about an adverse event. Healthcare professionals

  20. The cybersecurity dilemma hacking, trust and fear between nations

    CERN Document Server

    Buchanan, Ben

    2017-01-01

    This book examines how cyber conflict could happen--even if no nation desires it. It applies the security dilemma, a long-standing idea in international relations, to cybersecurity. Drawing on a detailed analysis of leaked classified documents and cybersecurity forensic reports, this book shows how nations' methods of defending themselves in other states risk unintentionally threatening other nations and risking escalation.

  1. Parent-reported otorrhea in children with tympanostomy tubes: incidence and predictors.

    Directory of Open Access Journals (Sweden)

    Thijs M A van Dongen

    Full Text Available PURPOSE: Although common in children with tympanostomy tubes, the current incidence of tympanostomy tube otorrhea (TTO is uncertain. TTO is generally a sign of otitis media, when middle ear fluid drains through the tube. Predictors for otitis media are therefore suggested to have predictive value for the occurrence of TTO. OBJECTIVE: To determine the incidence of TTO and its predictors. METHODS: We performed a cohort study, using a parental web-based questionnaire to retrospectively collect data on TTO episodes and its potential predictors from children younger than 10 years of age with tympanostomy tubes. RESULTS: Of the 1,184 children included in analyses (total duration of time since tube placement was 768 person years with a mean of 7.8 months per child, 616 children (52% experienced one or more episodes of TTO. 137 children (12% had TTO within the calendar month of tube placement. 597 (50% children had one or more acute TTO episodes (duration <4 weeks and 46 children (4% one or more chronic TTO episodes (duration ≥4 weeks. 146 children (12% experienced recurrent TTO episodes. Accounting for time since tube placement, 67% of children developed one or more TTO episodes in the year following tube placement. Young age, recurrent acute otitis media being the indication for tube placement, a recent history of recurrent upper respiratory tract infections and the presence of older siblings were independently associated with the future occurrence of TTO, and can therefore be seen as predictors for TTO. CONCLUSIONS: Our survey confirms that otorrhea is a common sequela in children with tympanostomy tubes, which occurrence can be predicted by age, medical history and presence of older siblings.

  2. A consistent framework for Horton regression statistics that leads to a modified Hack's law

    Science.gov (United States)

    Furey, Peter R.; Troutman, Brent M.

    2008-12-01

    A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ω. Data show that ω plays a statistically significant role in the modified Hack's law expression.

  3. Metal accumulation in the greentail prawn, Metapenaeus bennettae, in Sydney and Port Hacking estuaries, Australia.

    Science.gov (United States)

    Lewtas, K L M; Birch, G F; Foster-Thorpe, C

    2014-01-01

    Metal concentrations of the inshore greentail prawn, Metapenaeus bennettae, and surface sediments from locations within Sydney estuary and Port Hacking (Australia) were assessed for bioaccumulation and contamination. The current study aimed to assess metal concentrations in prawn tissue (tail muscle, exoskeleton, hepatopancreas and gills), relate whole body prawn tissue metal concentrations to sediment metal concentrations and animal size, as well as assess prawn consumption as a risk to human health. Metal concentrations were highest in sediment and prawns from contaminated locations (Iron Cove, Hen and Chicken Bay and Lane Cove) in Sydney estuary compared with the reference estuary (Port Hacking). Concentrations in sediments varied considerably between sites and between metals (As, Cd, Cr, Cu, Ni, Pb and Zn), and although concentrations exceeded Interim Sediment Quality Guideline-Low values, metals (As, Cd, Cr, Cu, Ni, Pb and Zn) were below Australian National Health and Medical Research Council human consumption guidelines in prawn tail muscle tissue. Metal concentrations in prawn tail muscle tissue were significantly different (p ≤ 0.05) amongst locations for Pb, Zn and Cd, and metal concentrations were generally highest in gills tissue, followed by the hepatopancreas, exoskeleton and tail muscle. The exoskeleton contained the highest Sr concentration; the hepatopancreas contained the highest As, Cu and Mo concentrations; and the gills contained the highest Al, Cr, Fe and Pb concentrations. Concentrations of Pb, As and Sr were significantly different (p ≤ 0.05) between size groups amongst locations.

  4. A consistent framework for Horton regression statistics that leads to a modified Hack's law

    Science.gov (United States)

    Furey, P.R.; Troutman, B.M.

    2008-01-01

    A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ??. Data show that ?? plays a statistically significant role in the modified Hack's law expression. ?? 2008 Elsevier B.V.

  5. Incidence of self-reported brain injury and the relationship with substance abuse: findings from a longitudinal community survey

    Directory of Open Access Journals (Sweden)

    Butterworth Peter

    2010-03-01

    Full Text Available Abstract Background Traumatic or serious brain injury (BI has persistent and well documented adverse outcomes, yet 'mild' or 'moderate' BI, which often does not result in hospital treatment, accounts for half the total days of disability attributed to BI. There are currently few data available from community samples on the incidence and correlates of these injuries. Therefore, the study aimed to assess the 1 incidence of self-reported mild (not requiring hospital admission and moderate (admitted to hospital brain injury (BI, 2 causes of injury 3 physical health scores and 4 relationship between BI and problematic alcohol or marijuana use. Methods An Australian community sequential-cohort study (cohorts aged 20-24, 40-44 and 60-64 years at wave one used a survey methodology to assess BI and substance use at baseline and four years later. Results Of the 7485 wave one participants, 89.7% were re-interviewed at wave two. There were 56 mild (230.8/100000 person-years and 44 moderate BI (180.5/100000 person-years reported between waves one and two. Males and those in the 20-24 year cohort had increased risk of BI. Sports injury was the most frequent cause of BI (40/100 with traffic accidents being a greater proportion of moderate (27% than mild (7% BI. Neither alcohol nor marijuana problems at wave one were predictors of BI. BI was not a predictor of developing substance use problems by wave two. Conclusions BI were prevalent in this community sample, though the incidence declined with age. Factors associated with BI in community samples differ from those reported in clinical samples (e.g. typically traumatic brain injury with traffic accidents the predominate cause. Further, detailed evaluation of the health consequences of these injuries is warranted.

  6. 78 FR 77601 - Adjustment of Monetary Threshold for Reporting Rail Equipment Accidents/Incidents for Calendar...

    Science.gov (United States)

    2013-12-24

    ...) and (e) of 49 CFR 225.19 further provide that the dollar figure that constitutes the reporting... include these advances will ensure it appropriately reflects changes in costs, wages, and inflation. New... reported in the Federal Register); Wnew = New average hourly wage rate, in dollars; Wprior = Prior...

  7. Scanning electron microscopy analysis of experimental bone hacking trauma.

    Science.gov (United States)

    Alunni-Perret, Veronique; Muller-Bolla, Michèle; Laugier, Jean-Pierre; Lupi-Pégurier, Laurence; Bertrand, Marie-France; Staccini, Pascal; Bolla, Marc; Quatrehomme, Gérald

    2005-07-01

    The authors report on their macro- and microscopy study of bone lesions made by a sharp force instrument (a single blade knife), and a sharp-blunt instrument classified as a chopping weapon (a hatchet). The aim of this work was to attempt to identify the instrument by analyzing the general class characteristics of the cuts. Each weapon was used on human bones. The results indicate that macroscopic analysis is more problematic. The microscopic analysis assessed that characteristics examined were effective in distinguishing sharp from sharp-blunt injury to the bone. The microscope facilitates analysis unachievable with macroscopic methods, some three-dimensional characteristics not visible to the naked eye being clearly defined with its use. Emphasis has been placed on the value of SEM as an anthropologist's tool in bone lesion injuries.

  8. A human error taxonomy for analysing healthcare incident reports: assessing reporting culture and its effects on safety perfomance

    DEFF Research Database (Denmark)

    Itoh, Kenji; Omata, N.; Andersen, Henning Boje

    2009-01-01

    The present paper reports on a human error taxonomy system developed for healthcare risk management and on its application to evaluating safety performance and reporting culture. The taxonomy comprises dimensions for classifying errors, for performance-shaping factors, and for the maturity...

  9. Tobacco-related cancers in India: A review of incidence reported from population-based cancer registries

    Science.gov (United States)

    Asthana, Smita; Patil, Rakshit S.; Labani, Satyanarayana

    2016-01-01

    Background: Tobacco related cancers (TRC) account for major share of all cancers and updated of incidence data are helpful in policy changes. The aim was to present an update of TRCs on age-adjusted incidence data and corresponding lifetime risk of developing TRC for different regions of the country. Methods: The data for this study were obtained from published reports of 25 population-based cancer registries (PBCRs) in India. The PBCRs in different parts of India were divided into seven regions such as North, South, Central, Northeast, West, Rural West, and East. Data indicators such as age-adjusted rates (AARs) of incidence and the cumulative risks of TRCs up to the age of 64 years for each of the 10 TRC sites of either sex in each of 25 registries were obtained from the National Cancer Registry Programme reports. Results: Among all TRCs, esophagus, lung, hypopharynx, and mouth are the leading sites for both males and females. Males in Northeast region had the highest risk 1 in 27 of developing esophageal cancer, 1 in 67 for cancer of lungs and hypopharynx, followed by 1 in 143 for both mouth and tongue cancers. Females also had the highest risk of esophagus and lungs (1 in 63 female) and cancer of mouth (1 in 250) in Northeast region. Proportion of TRC in comparison of all cancer ranged from 11–25% for men and 3–18% for women. Conclusions: Proportion of TRC in relation to all cancers was still high in different registries of India including the Northeast region. PMID:27688608

  10. Tobacco-related cancers in India: A review of incidence reported from population-based cancer registries

    Directory of Open Access Journals (Sweden)

    Smita Asthana

    2016-01-01

    Full Text Available Background: Tobacco related cancers (TRC account for major share of all cancers and updated of incidence data are helpful in policy changes. The aim was to present an update of TRCs on age-adjusted incidence data and corresponding lifetime risk of developing TRC for different regions of the country. Methods: The data for this study were obtained from published reports of 25 population-based cancer registries (PBCRs in India. The PBCRs in different parts of India were divided into seven regions such as North, South, Central, Northeast, West, Rural West, and East. Data indicators such as age-adjusted rates (AARs of incidence and the cumulative risks of TRCs up to the age of 64 years for each of the 10 TRC sites of either sex in each of 25 registries were obtained from the National Cancer Registry Programme reports. Results: Among all TRCs, esophagus, lung, hypopharynx, and mouth are the leading sites for both males and females. Males in Northeast region had the highest risk 1 in 27 of developing esophageal cancer, 1 in 67 for cancer of lungs and hypopharynx, followed by 1 in 143 for both mouth and tongue cancers. Females also had the highest risk of esophagus and lungs (1 in 63 female and cancer of mouth (1 in 250 in Northeast region. Proportion of TRC in comparison of all cancer ranged from 11–25% for men and 3–18% for women. Conclusions: Proportion of TRC in relation to all cancers was still high in different registries of India including the Northeast region.

  11. European downstream oil industry safety performance. Statistical summary of reported incidents - 2012

    Energy Technology Data Exchange (ETDEWEB)

    Burton, A. [Awaken Consulting, Shropshire, Herefordshire (United Kingdom); Den Haan, K.H.

    2013-08-15

    In this nineteenth annual report on European downstream oil industry safety performance, 2012 statistics are presented on work-related personal injuries for the industry's own employees and contractors. Data were received from 38 CONCAWE Member Companies representing approximately 98% of the European refining capacity. Trends over the last nineteen years are also highlighted and the data are compared to similar statistics from related industries. This report also presents the fourth year of results for Process Safety Performance Indicators from CONCAWE members.

  12. European downstream oil industry safety performance. Statistical summary of reported incidents - 2011

    Energy Technology Data Exchange (ETDEWEB)

    Burton, A. [Awaken Consulting, Shropshire, Herefordshire (United Kingdom); Den Haan, K.H.

    2012-07-15

    In this eighteenth annual report on European downstream oil industry safety performance, 2011 statistics are presented on work-related personal injuries for the industry's own employees and contractors. Data were received from 34 CONCAWE Member Companies representing approximately 96% of the European refining capacity. Trends over the last eighteen years are also highlighted and the data are compared to similar statistics from related industries. This report also presents the third year of results for Process Safety Performance Indicators from CONCAWE members.

  13. Quantum hacking: attacking practical quantum key distribution systems

    Science.gov (United States)

    Qi, Bing; Fung, Chi-Hang Fred; Zhao, Yi; Ma, Xiongfeng; Tamaki, Kiyoshi; Chen, Christine; Lo, Hoi-Kwong

    2007-09-01

    Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and violate some of the assumptions in a security proof. Here, we report two types of eavesdropping attacks against a practical QKD system. The first one is "time-shift" attack, which is applicable to QKD systems with gated single photon detectors (SPDs). In this attack, the eavesdropper, Eve, exploits the time mismatch between the open windows of the two SPDs. She can acquire a significant amount of information on the final key by simply shifting the quantum signals forwards or backwards in time domain. Our experimental results in [9] with a commercial QKD system demonstrate that, under this attack, the original QKD system is breakable. This is the first experimental demonstration of a feasible attack against a commercial QKD system. This is a surprising result. The second one is "phase-remapping" attack [10]. Here, Eve exploits the fact that a practical phase modulator has a finite response time. In principle, Eve could change the encoded phase value by time-shifting the signal pulse relative to the reference pulse.

  14. Integrating Data From the UK National Reporting and Learning System With Work Domain Analysis to Understand Patient Safety Incidents in Community Pharmacy.

    Science.gov (United States)

    Phipps, Denham L; Tam, W Vanessa; Ashcroft, Darren M

    2017-03-01

    To explore the combined use of a critical incident database and work domain analysis to understand patient safety issues in a health-care setting. A retrospective review was conducted of incidents reported to the UK National Reporting and Learning System (NRLS) that involved community pharmacy between April 2005 and August 2010. A work domain analysis of community pharmacy was constructed using observational data from 5 community pharmacies, technical documentation, and a focus group with 6 pharmacists. Reports from the NRLS were mapped onto the model generated by the work domain analysis. Approximately 14,709 incident reports meeting the selection criteria were retrieved from the NRLS. Descriptive statistical analysis of these reports found that almost all of the incidents involved medication and that the most frequently occurring error types were dose/strength errors, incorrect medication, and incorrect formulation. The work domain analysis identified 4 overall purposes for community pharmacy: business viability, health promotion and clinical services, provision of medication, and use of medication. These purposes were served by lower-order characteristics of the work system (such as the functions, processes and objects). The tasks most frequently implicated in the incident reports were those involving medication storage, assembly, or patient medication records. Combining the insights from different analytical methods improves understanding of patient safety problems. Incident reporting data can be used to identify general patterns, whereas the work domain analysis can generate information about the contextual factors that surround a critical task.

  15. Training Early Interventionists in Low Incidence Disabilities (September 1996-August 2000). Final Report.

    Science.gov (United States)

    Kaczmarek, Louise A.

    This final report summarizes the objectives, activities and outcomes of a federally-funded project that was designed to add an interdisciplinary specialization in multiple disabilities for infants and toddlers to an existing Early Intervention Master of Education/Early Childhood Education Certificate Program at the University of Pittsburgh. Seven…

  16. A comprehensive overview of medical error in hospitals using incident-reporting systems, patient complaints and chart review of inpatient deaths.

    Directory of Open Access Journals (Sweden)

    Jeantine M de Feijter

    Full Text Available BACKGROUND: Incident reporting systems (IRS are used to identify medical errors in order to learn from mistakes and improve patient safety in hospitals. However, IRS contain only a small fraction of occurring incidents. A more comprehensive overview of medical error in hospitals may be obtained by combining information from multiple sources. The WHO has developed the International Classification for Patient Safety (ICPS in order to enable comparison of incident reports from different sources and institutions. METHODS: The aim of this paper was to provide a more comprehensive overview of medical error in hospitals using a combination of different information sources. Incident reports collected from IRS, patient complaints and retrospective chart review in an academic acute care hospital were classified using the ICPS. The main outcome measures were distribution of incidents over the thirteen categories of the ICPS classifier "Incident type", described as odds ratios (OR and proportional similarity indices (PSI. RESULTS: A total of 1012 incidents resulted in 1282 classified items. Large differences between data from IRS and patient complaints (PSI = 0.32 and from IRS and retrospective chart review (PSI = 0.31 were mainly attributable to behaviour (OR = 6.08, clinical administration (OR = 5.14, clinical process (OR = 6.73 and resources (OR = 2.06. CONCLUSIONS: IRS do not capture all incidents in hospitals and should be combined with complementary information about diagnostic error and delayed treatment from patient complaints and retrospective chart review. Since incidents that are not recorded in IRS do not lead to remedial and preventive action in response to IRS reports, healthcare centres that have access to different incident detection methods should harness information from all sources to improve patient safety.

  17. Determinants of self-reported bystander behavior in cyberbullying incidents amongst adolescents.

    Science.gov (United States)

    DeSmet, Ann; Veldeman, Charlene; Poels, Karolien; Bastiaensens, Sara; Van Cleemput, Katrien; Vandebosch, Heidi; De Bourdeaudhuij, Ilse

    2014-04-01

    This study explores behavioral determinants of self-reported cyberbullying bystander behavior from a behavioral change theoretical perspective, to provide levers for interventions. Nine focus groups were conducted with 61 young adolescents (aged 12-16 years, 52% girls). Assertive defending, reporting to others, providing advice, and seeking support were the most mentioned behaviors. Self-reported bystander behavior heavily depended on contextual factors, and should not be considered a fixed participant role. Bystanders preferred to handle cyberbullying offline and in person, and comforting the victim was considered more feasible than facing the bully. Most prevailing behavioral determinants to defend or support the victim were low moral disengagement, that the victim is an ingroup member, and that the bystander is popular. Youngsters felt they received little encouragement from their environment to perform positive bystanding behavior, since peers have a high acceptance for not defending and perceived parental support for defending behavior is largely lacking. These results suggest multilevel models for cyberbullying research, and interventions are needed. With much previous research into cyberbullying insufficiently founded in theoretical models, the employed framework of the Integrative Model and Social Cognitive Theory may inspire future studies into bystander behavior.

  18. Preliminary report on operational guidelines developed for use in emergency preparedness and response to a radiological dispersal device incident.

    Energy Technology Data Exchange (ETDEWEB)

    Yu, C.; Cheng, J.-J.; Kamboj, S.; Domotor, S.; Wallo, A.; Environmental Science Division; DOE

    2006-12-15

    This report presents preliminary operational guidelines and supporting work products developed through the interagency Operational Guidelines Task Group (OGT). The report consolidates preliminary operational guidelines, all ancillary work products, and a companion software tool that facilitates their implementation into one reference source document. The report is intended for interim use and comment and provides the foundation for fostering future reviews of the operational guidelines and their implementation within emergency preparedness and response initiatives in the event of a radiological dispersal device (RDD) incident. The report principally focuses on the technical derivation and presentation of the operational guidelines. End-user guidance providing more details on how to apply these operational guidelines within planning and response settings is being considered and developed elsewhere. The preliminary operational guidelines are categorized into seven groups on the basis of their intended application within early, intermediate, and long-term recovery phases of emergency response. We anticipate that these operational guidelines will be updated and refined by interested government agencies in response to comments and lessons learned from their review, consideration, and trial application. This review, comment, and trial application process will facilitate the selection of a final set of operational guidelines that may be more or less inclusive of the preliminary operational guidelines presented in this report. These and updated versions of the operational guidelines will be made available through the OGT public Web site (http://ogcms.energy.gov) as they become finalized for public distribution and comment.

  19. The reported incidence of work-related musculoskeletal disease in the UK: MOSS 1997-2000.

    Science.gov (United States)

    Cherry, N M; Meyer, J D; Chen, Y; Holt, D L; McDonald, J C

    2001-10-01

    Consultant rheumatologists participate in surveillance of work-related musculoskeletal conditions under the Musculoskeletal Occupational Surveillance Scheme (MOSS), which has been in operation since 1997. During the first 3 years of the scheme, an estimated total of 8070 cases and 8442 diagnoses were obtained, an average of slightly less than 2700 estimated cases each year. Disorders of the upper limb accounted for approximately 66% (5502) of the total, with hand/wrist/arm conditions (3693 cases) comprising the majority of these. Conditions of the lumbar spine and trunk (13% of cases), the cervical spine (12%) and the shoulder (12%) were also frequently reported. Pain with ill-defined pathology was reported in 35% of cases with hand and forearm disorders. Overall, 82% of cases were related to repetitive rather than single injury. The largest numbers of cases were seen in workers in craft occupations (1659) and in clerical and secretarial workers (1524). High rates of musculoskeletal conditions, particularly of upper limb disorders, are notable in mining. In most occupations, and overall, women were at greater risk than men.

  20. High incidence of sperm dysfunction in a varicocele infertile man:case report

    Institute of Scientific and Technical Information of China (English)

    Vineeth VS; Suttur S Malini; Sreenivasa G; Usha R Dutta

    2012-01-01

    Studies indicate abnormal semen indicators among varicocele infertile men can be reversed to normal status after surgical repair.While semen indicators andDNA damage of sperms are reported frequently, sperm function tests are rarely performed to assess the functional status of sperms among these individuals.We report a35-year-old male with4 years of primary infertility who otherwise has a normal sexual life.Various analyses performed revealed the interplay of multiple abnormalities leading to the observed phenotype.The individual was diagnosed with severe sperm defects, bilateral varicocele(gradeII) and endocrinopathy.The percentage of functionally normal sperms were found to be24% for hypo-osmotic swelling,28% for acrosome reaction and21% for nuclear chromatin decondensationtest.Cytogenetic analyses showed normal karyotype and sequence-tagged-site markers basedPCR showed no deletions involving key candidate genes of theY chromosome.A thorough investigation of infertile subjects and simple diagnostic tests are essential to detect the treatable defects, in general as well as severe infertile cases, which can improve the chances of normal conception or the success rates ofin-vitro fertilization and intracytoplasmic sperm injection.

  1. Hack the Planet: What we Talk About When we Talk About Geoengineering

    Science.gov (United States)

    Kintisch, E.

    2010-12-01

    Hack the Planet (Wiley, 2010) explores how an idea once basically anathema to meetings like AGU has, in the space of a few years, become part of the geoscience mainstream. Through chapters involving researchers like David Battisti, Stephen Salter, Edward Teller and Brent Constanz the book documents the roots of this shift and how scientists are breaking new ground in the controversial field. And it shows how trying to engineer the planet's climate or manage its carbon poses novel scientific, geopolitical and moral risks and rewards. This session will cover how the topic of climate engineering has moved from something geoscientists don't talk about to something geoscientists can talk about, to something, in my view, that geoscientists must talk about.

  2. Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E

    Directory of Open Access Journals (Sweden)

    Joshua Bartolomie

    2013-09-01

    Full Text Available Wilhelm, T. (2013. Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E. Waltham, MA: Syngress, 464 pages, ISBN-10: 1597499935; ISBN-13: 978-1597499934, US$79.99Reviewed by Joshua Bartolomie, CISSP, CEECS, CFCE, DFCP, CRISC, CSMOrganizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactive awareness into real attack vectors that may exist within their organizations. With attack methods and efforts becoming increasingly aggressive, and effective, organizations must take equally assertive measures to protect their critical information and assets. Penetration testing is one of those tools that is often misunderstood, overlooked, and undervalued. A true adversary would not hesitate to exploit every potential to gain entry or cause a disruption to their target.(see PDF for full review

  3. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  4. Confirmation of the reported association of clonal chromosomal mosaicism with an increased risk of incident hematologic cancer.

    Directory of Open Access Journals (Sweden)

    Ursula M Schick

    Full Text Available Chromosomal abnormalities provide clinical utility in the diagnosis and treatment of hematologic malignancies, and may be predictive of malignant transformation in individuals without apparent clinical presentation of a hematologic cancer. In an effort to confirm previous reports of an association between clonal mosaicism and incident hematologic cancer, we applied the anomDetectBAF algorithm to call chromosomal anomalies in genotype data from previously conducted Genome Wide Association Studies (GWAS. The genotypes were initially collected from DNA derived from peripheral blood of 12,176 participants in the Group Health electronic Medical Records and Genomics study (eMERGE and the Women's Health Initiative (WHI. We detected clonal mosaicism in 169 individuals (1.4% and large clonal mosaic events (>2 mb in 117 (1.0% individuals. Though only 9.5% of clonal mosaic carriers had an incident diagnosis of hematologic cancer (multiple myeloma, myelodysplastic syndrome, lymphoma, or leukemia, the carriers had a 5.5-fold increased risk (95% CI: 3.3-9.3; p-value = 7.5×10(-11 of developing these cancers subsequently. Carriers of large mosaic anomalies showed particularly pronounced risk of subsequent leukemia (HR = 19.2, 95% CI: 8.9-41.6; p-value = 7.3×10(-14. Thus we independently confirm the association between detectable clonal mosaicism and hematologic cancer found previously in two recent publications.

  5. Confirmation of the Reported Association of Clonal Chromosomal Mosaicism with an Increased Risk of Incident Hematologic Cancer

    Science.gov (United States)

    Crane, Paul K.; Weston, Noah; Ehrlich, Kelly; Newton, Katherine M.; Wallace, Robert; Bookman, Ebony; Harrison, Tabitha; Aragaki, Aaron; Crosslin, David R.; Wang, Sophia S.; Reiner, Alex P.; Jackson, Rebecca D.; Peters, Ulrike; Larson, Eric B.; Jarvik, Gail P.; Carlson, Christopher S.

    2013-01-01

    Chromosomal abnormalities provide clinical utility in the diagnosis and treatment of hematologic malignancies, and may be predictive of malignant transformation in individuals without apparent clinical presentation of a hematologic cancer. In an effort to confirm previous reports of an association between clonal mosaicism and incident hematologic cancer, we applied the anomDetectBAF algorithm to call chromosomal anomalies in genotype data from previously conducted Genome Wide Association Studies (GWAS). The genotypes were initially collected from DNA derived from peripheral blood of 12,176 participants in the Group Health electronic Medical Records and Genomics study (eMERGE) and the Women’s Health Initiative (WHI). We detected clonal mosaicism in 169 individuals (1.4%) and large clonal mosaic events (>2 mb) in 117 (1.0%) individuals. Though only 9.5% of clonal mosaic carriers had an incident diagnosis of hematologic cancer (multiple myeloma, myelodysplastic syndrome, lymphoma, or leukemia), the carriers had a 5.5-fold increased risk (95% CI: 3.3–9.3; p-value = 7.5×10−11) of developing these cancers subsequently. Carriers of large mosaic anomalies showed particularly pronounced risk of subsequent leukemia (HR = 19.2, 95% CI: 8.9–41.6; p-value = 7.3×10−14). Thus we independently confirm the association between detectable clonal mosaicism and hematologic cancer found previously in two recent publications. PMID:23533652

  6. Data Mining and the Twitter Platform for Prescribed Burn and Wildfire Incident Reporting with Geospatial Applications

    Science.gov (United States)

    Endsley, K.; McCarty, J. L.

    2012-12-01

    Data mining techniques have been applied to social media in a variety of contexts, from mapping the evolution of the Tahrir Square protests in Egypt to predicting influenza outbreaks. The Twitter platform is a particular favorite due to its robust application programming interface (API) and high throughput. Twitter, Inc. estimated in 2011 that over 2,200 messages or "tweets" are generated every second. Also helpful is Twitter's semblance in operation to the short message service (SMS), better known as "texting," available on cellular phones and the most popular means of wide telecommunications in many developing countries. In the United States, Twitter has been used by a number of federal, state and local officials as well as motivated individuals to report prescribed burns in advance (sometimes as part of a reporting obligation) or to communicate the emergence, response to, and containment of wildfires. These reports are unstructured and, like all Twitter messages, limited to 140 UTF-8 characters. Through internal research and development at the Michigan Tech Research Institute, the authors have developed a data mining routine that gathers potential tweets of interest using the Twitter API, eliminates duplicates ("retweets"), and extracts relevant information such as the approximate size and condition of the fire. Most importantly, the message is geocoded and/or contains approximate locational information, allowing for prescribed and wildland fires to be mapped. Natural language processing techniques, adapted to improve computational performance, are used to tokenize and tag these elements for each tweet. The entire routine is implemented in the Python programming language, using open-source libraries. As such, it is demonstrated in a web-based framework where prescribed burns and/or wildfires are mapped in real time, visualized through a JavaScript-based mapping client in any web browser. The practices demonstrated here generalize to an SMS platform (or any short

  7. Self reported incidence and morbidity of acute respiratory illness among deployed U.S. military in Iraq and Afghanistan.

    Directory of Open Access Journals (Sweden)

    Bryony W Soltis

    Full Text Available BACKGROUND: Historically, respiratory infections have had a significant impact on U.S. military missions. Deployed troops are particularly at high risk due to close living conditions, stressful work environments and increased exposure to pathogens. To date, there are limited data available on acute respiratory illness (ARI among troops deployed in support of ongoing military operations, specifically Operation Enduring Freedom (OEF and Operation Iraqi Freedom (OIF. METHODS: Using self-report data from two sources collected from troops deployed to Iraq, Afghanistan and the surrounding region, we analyzed incidence and risk factors for ARI. Military personnel on mid-deployment Rest & Recuperation (R&R or during redeployment were eligible to participate in the voluntary self-report survey. RESULTS: Overall, 39.5% reported having at least one ARI. Of these, 18.5% sought medical care and 33.8% reported having decreased job performance. The rate of self-reported ARI was 15 episodes per 100 person-months among those taking the voluntary survey, and 24.7 episodes per 100 person-months among those taking the clinic health questionnaire. Negative binomial regression analysis found female sex, Navy branch of service and lack of flush toilets to be independently associated with increased rates of ARI. Deployment to OIF, increasing age and higher rank were also positively associated with ARI risk. CONCLUSIONS: The overall percentage of deployed military personnel reporting at least one acute respiratory illness decreased since earlier parts of OIF/OEF. However, the reported effect on job performance increased tremendously. The most important factors associated with increased respiratory infection are female sex, Navy branch of service, lack of improved latrine facilities, deployment to OIF, increasing age and higher rank.

  8. Male-female differences in the number of reported incident dengue fever cases in six Asian countries

    Directory of Open Access Journals (Sweden)

    Martha Anker

    2011-06-01

    Full Text Available Introduction. Demographic factors, such as age and sex, are associated with the likelihood of exposure to Aedes aegypti, the vector for dengue. However, dengue date disaggregated by both sex and ageare not routinely reported or analyzed by national surveillance systems. This study analysed the reported number of incident dengue cases by age and sex for six countries in Asia. Methods. Data for the Lao People's Democratic Republic, the Philippines, Singapore and Sri Lanka were obtained from DengueNet; the number of male and female dengue cases was available for four age groups ( 15 years over a cumulative period of six to 10 years. Data for Cambodia (2010 and Malaysia (1997–2008 were obtained from their respective ministries of health. Results. An excess of males was found among reported dengue cases > 15 years of age. This pattern was observed consistently over several years across six culturally and economically diverse countries. Discussion. These data indicated the importance of reporting data stratified by both sex and age since collapsing the data over all ages would have masked some of the observed differences. In order to target preventive measures appropriately, assessment of gender by age is important for dengue because biological or gender-related factors can change over the human lifespan and gender-related factors may differ across countries.

  9. In situ simulation: Taking reported critical incidents and adverse events back to the clinic

    DEFF Research Database (Denmark)

    Juul, Jonas; Paltved, Charlotte; Krogh, Kristian

    2014-01-01

    Introduction In situ simulation offers a novel approach to training in the healthcare setting. It models clinical processes in a real clinical environment and provides the opportunity to correct errors and adjust team interactions without endangering patients. Training in the simulation laboratory...... does not tap into situational resources, e.g. individual, team, and organisational characteristics such as routines, personal relations, distributed skill-levels etc. Therefore, it fails to fully mimic real clinical team processes. Alternatively, in situ simulation offers a unique opportunity...... to explore and improve team processes in the clinical environment. Though research on in situ simulation in healthcare is in its infancy, literature is abundant on patient safety, medical simulation, team training and human factors1. Patient safety reporting systems that identify risks to patients can...

  10. Peters Anomaly in Twins: A Case Report of a Rare Incident with Novel Comorbidities

    Directory of Open Access Journals (Sweden)

    Hashem S. Almarzouki

    2016-10-01

    Full Text Available Introduction: Peters anomaly is a rare developmental malformation involving the anterior segment of the eye, which culminates in amblyopia or congenital blindness. Multiple ocular and/or systemic malformations have been observed with this anomaly, and novel comorbidities continue to be reported. Case Presentation: The probands were monozygotic twin boys (twin I and twin II born to consanguineous parents at 36 weeks of gestation. Coarse facial features and deep-seated eyes were noted at birth. At 6 months, ophthalmic examination revealed that both twins were unable to blink in response to light, or to fixate and follow a moving object. Both twins had prominent horizontal nystagmus. Slit-lamp examination demonstrated varying degrees of central leukoma (corneal opacity associated with iridocorneal adhesion, which is characteristic of type I Peters anomaly. No cataractous changes were observed. Normal intraocular pressure and disorganized retina were observed. Pupillary abnormalities included bilaterally underdeveloped pupils and bilateral absence of pupils was noted. Ocular MRI showed bilateral microphthalmia and optic nerve hypoplasia, with a small optic chiasm in both twins. At this age, the diagnosis of Peters anomaly was made. At 16 months of age, both twins developed deep venous thrombosis and purpuric skin lesions. Investigations revealed a hereditary thrombophilia secondary to a homozygous mutation causing protein C deficiency, which is a rare thrombotic condition. Ocular ultrasonography revealed bilateral vitreous hemorrhaging linked to altered coagulation. One twin developed bilateral inguinal hernia and cryptorchidism. Conclusion: The novel concordance of Peters anomaly in these monozygotic twins sharing a mutation in PROC gene provides further evidence that this anomaly has a genetic basis. Hypoplasia of the optic nerves and optic chiasm, along with severe protein C deficiency and bilateral absence of the pupils, are associated

  11. Reproductive hacking

    Science.gov (United States)

    Dustin Rubinstein, C; Wolfner, Mariana F

    2014-01-01

    Seminal proteins are critical for reproductive success in all animals that have been studied. Although seminal proteins have been identified in many taxa, and female reproductive responses to receipt of these proteins have been documented in several, little is understood about the mechanisms by which seminal proteins affect female reproductive physiology. To explore this topic, we investigated how a Drosophila seminal protein, ovulin, increases ovulation rate in mated females. Ovulation is a relatively simple physiological process, with known female regulators: previous studies have shown that ovulation rate is promoted by the neuromodulator octopamine (OA) in D. melanogaster and other insects. We found that ovulin stimulates ovulation by increasing OA signaling in the female. This finding supports a model in which a male seminal protein acts through “hacking” a well-conserved, regulatory system females use to adjust reproductive output, rather than acting downstream of female mechanisms of control or in parallel pathways altogether. We also discuss similarities between 2 forms of intersexual control of behavior through chemical communication: seminal proteins and pheromones. PMID:25483253

  12. Hacking Culture.

    Science.gov (United States)

    Vigh, Pia

    The paper presents the model behind net2art, a joint Nordic project of creating a platform for Nordic net art. The projects background and scope, organization, impact and experiences, funding structures, and copyright issues are covered. The paper argues that museums do not have a natural role in the distribution of net art (i.e., art that is made…

  13. Conceptualisation of socio-technical integrated information technology solutions to improve incident reporting through Maslow's hierarchy of needs: a qualitative study of junior doctors.

    Science.gov (United States)

    Yee, Kwang Chien

    2007-01-01

    Medical errors are common, especially within the acute healthcare delivery. The identification of systemic factors associated with adverse events and the construction of models to improve the safety of the healthcare system seems straightforward, this process has been proven to be much more difficult in the realism of medical practice due to the failure of the incident reporting system to capture the essential information, especially from the perspective of junior doctors. The failure of incidence reporting system has been related to the lack of socio-technical consideration for both system designs and system implementations. The main reason of non-reporting can be conceptualised through the motivation psychology model: Maslow's hierarchy of needs; in order to achieve a change in the socio-cultural domain for incident reporting. This paper presents a qualitative research methodology approach to generate contextual-rich insights into the socio-cultural and technological factors of incident reporting among junior doctors. The research illuminates the guiding principles for future socio-technical integrated information communication technology designs and implementations. Using Maslow's hierarchy of needs as the conceptual framework, the guiding principles aim to design electronic incident reporting systems which will motivate junior doctors to participate in the process. This research paper aims to make a significant contribution to the fields of socio-technical systems and medical errors management. The design and implementation of the new incident reporting system has great potential to motivate junior doctors to change the culture of incident reporting and to work towards a safer future healthcare system.

  14. Geophysical variables and behavior: LIII. Epidemiological considerations for incidence of cancer and depression in areas of frequent UFO reports.

    Science.gov (United States)

    Persinger, M A

    1988-12-01

    Luminous phenomena and anomalous physical forces have been hypothesized to be generated by focal tectonic strain fields that precede earthquakes. If these geophysical processes exist, then their spatial and temporal density should be greatest during periods of protracted, localized UFO reports; they might be used as dosimetric indicators. Contemporary epidemiological data concerning the health risks of power frequency electromagnetic fields and radon gas levels (expected correlates of certain tectonic strain fields), suggest that increased incidence (odds ratios greater 1:3) of brain tumors and leukemia should be evident within "flap" areas. In addition the frequency of variants of temporal lobe lability, psychological depression and posttraumatic stress should be significantly elevated. UFO field investigators, because they have repeated, intermittent close proximity to these fields, are considered to be a particularly high risk population for these disorders.

  15. [Critical incidents].

    Science.gov (United States)

    Scheidegger, D

    2005-03-01

    In medicine real severe mishaps are rare. On the other hand critical incidents are frequent. Anonymous critical incident reporting systems allow us to learn from these mishaps. This learning process will make our daily clinical work safer Unfortunately, before these systems can be used efficiently our professional culture has to be changed. Everyone in medicine has to admit that errors do occur to see the need for an open discussion. If we really want to learn from errors, we cannot punish the individual, who reported his or her mistake. The interest is primarily in what has happened and why it has happened and not who has committed this mistake. The cause for critical incidents in medicine is in over 80% the human factor Poor communication, work under enormous stress, conflicts and hierarchies are the main cause. This has been known for many years, therefore have already 15 years ago high-tech industries, like e.g. aviation, started to invest in special courses on team training. Medicine is a typical profession were until now only the individual performance decided about the professional career Communication, conflict management, stress management, decision making, risk management, team and team resource management were subjects that have never been taught during our preor postgraduate education. These points are the most important ones for an optimal teamwork. A multimodular course designed together with Swissair (Human Aspect Development medical, HADmedical) helps to cover, as in aviation, the soft factor and behavioural education in medicine and to prepare professionals in health care to work as a real team.

  16. Comparison of macroscopic and microscopic (stereomicroscopy and scanning electron microscopy) features of bone lesions due to hatchet hacking trauma.

    Science.gov (United States)

    Nogueira, Luísa; Quatrehomme, Gérald; Bertrand, Marie-France; Rallon, Christophe; Ceinos, Romain; du Jardin, Philippe; Adalian, Pascal; Alunni, Véronique

    2017-03-01

    This experimental study examined the lesions produced by a hatchet on human bones (tibiae). A total of 30 lesions were produced and examined macroscopically (naked eye) and by stereomicroscopy. 13 of them were also analyzed using scanning electron microscopy. The general shape of the lesion, both edges, both walls, the kerf floor and the extremities were described. The length and maximum width of the lesions were also recorded. The microscopic analysis of the lesions led to the description of a sharp-blunt mechanism. Specific criteria were identified (lateral pushing back, fragmentation of the upraising, fossa dug laterally to the edge and vertical striae) enabling the forensic expert to conclude that a hacking instrument was used. These criteria are easily identifiable using scanning electron microscopy, but can also be observed with stereomicroscopy. Overall, lateral pushing back and vertical striae visible using stereomicroscopy and scanning electron microscopy signal the use of a hacking tool.

  17. Research of hacking techniques and countermeasures%浅谈黑客技术及其对策

    Institute of Scientific and Technical Information of China (English)

    邱波

    2011-01-01

    本文通过对黑客起源及其文化的认识来分析黑客技术的发展,同时也针对当前一些主要的黑客攻击手段提出了防御的对策。%The paper analyses the hacking technology which based on the understanding of hacker culture,and gives the countermeasures for the current major hacker attacks.

  18. Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment

    OpenAIRE

    2015-01-01

    Computer security students benefit from having hands-on experience with hacking tools and with access to vulnerable systems that they can attack and defend. However, vulnerable VMs are static; once they have been exploited by a student there is no repeatable challenge as the vulnerable boxes never change. A new novel solution, SecGen, has been created and deployed. SecGen solves the issue by creating vulnerable machines with randomised vulnerabilities and services, with constraints that ensur...

  19. Pesticide residues in honeybees, honey and bee pollen by LC-MS/MS screening: reported death incidents in honeybees.

    Science.gov (United States)

    Kasiotis, Konstantinos M; Anagnostopoulos, Chris; Anastasiadou, Pelagia; Machera, Kyriaki

    2014-07-01

    The aim of this study was to investigate reported cases of honeybee death incidents with regard to the potential interrelation to the exposure to pesticides. Thus honeybee, bee pollen and honey samples from different areas of Greece were analyzed for the presence of pesticide residues. In this context an LC-ESI-MS/MS multiresidue method of total 115 analytes of different chemical classes such as neonicotinoids, organophosphates, triazoles, carbamates, dicarboximides and dinitroanilines in honeybee bodies, honey and bee pollen was developed and validated. The method presents good linearity over the ranges assayed with correlation coefficient values r(2)≥0.99, recoveries ranging for all matrices from 59 to 117% and precision (RSD%) values ranging from 4 to 27%. LOD and LOQ values ranged - for honeybees, honey and bee pollen - from 0.03 to 23.3 ng/g matrix weight and 0.1 up to 78 ng/g matrix weight, respectively. Therefore this method is sufficient to act as a monitoring tool for the determination of pesticide residues in cases of suspected honeybee poisoning incidents. From the analysis of the samples the presence of 14 active substances was observed in all matrices with concentrations ranging for honeybees from 0.3 to 81.5 ng/g, for bee pollen from 6.1 to 1273 ng/g and for honey one sample was positive to carbendazim at 1.6 ng/g. The latter confirmed the presence of such type of compounds in honeybee body and apicultural products. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Google Hacking and intelligent worms' prevention and cure%Google Hacking与智能蠕虫防治

    Institute of Scientific and Technical Information of China (English)

    郑辉; 李冠一

    2005-01-01

    越来越多的黑客利用搜索引擎来寻找攻击目标和完成入侵,"Google Hacking"是这种攻击手段和攻击形式的代称.当整个"Google Hacking"的流程自动化的时候,所造成的危害是巨大的.Santy蠕虫的出现,表明智能蠕虫已经由理论预测成为事实上的新的蠕虫表现形式.智能蠕虫利用搜索引擎作为自己功能结构的组成部分,通过引入搜索引擎的智能特性使蠕虫自身具有相应的智能特性.智能蠕虫的出现,标志着Internet核心应用服务商也已经被卷入到网络安全对抗的前沿,Internet安全由分散对抗逐渐演变成整体安全联盟的趋势.如何防范"Google Hacking",如何防范利用搜索引擎传播的智能蠕虫,成为我们必须关注和解决的重大研究课题.

  1. Fire Incident Reporting Manual

    Science.gov (United States)

    1984-02-01

    are backstage areas, dressing rooms, ice rinks, boxing rings, and basketball floors. 37. Projection room or area. Included are stage light and...or taper . 45. Match. 46. Lighter (flame type). 47. Open fire. Included are campfires, bonfires, warning flares, rubbish fires, open trash burners, open

  2. Cancer Incidence and Mortality in Ardabil: Report of an Ongoing Population-Based Cancer Registry in Iran, 2004-2006

    Directory of Open Access Journals (Sweden)

    M Babaei

    2009-12-01

    Full Text Available "nBackground: Ardabil cancer registry is the first population-based cancer registry in Iran that was established in 2000. The first report from this registry revealed that Ardabil has one of the highest rate of gastric cardia cancer and the lowest rate of cer­vical cancer in the world. We aim to update the cancer incidence in this area by the second follow up report from this registry."nMethod: Data on all newly diagnosed cancer cases between 2004 and 2006 were actively collected. CanReg4 software was used for data entry and the data of cancer-related death were obtained from the comprehensive death registry system."nResults: More than 4300 new cases were registered during 3 years. Diagnosis of cancer was based on histopathology in 69%, clinical investigation 8%, clinical only 5%, and Death Certificate Only (DCO in 18% of cases. In terms of age-stan­dardized rate (/100,000, the five leading cancers in men (excluding skin cancer were stomach (51.8, esophagus (19.5, blad­der (13.1, lung and bronchus (10.8, and colorectal (9.6; in women, they were stomach (24.9, esophagus (19.7, breast (11.9, colon and rectum (7.4, and brain tumors (6.9. According to death registration data, upper gastrointestinal can­cers constituted more than 43% of cancer-related death in Ardabil."nConclusions: The ASR for gastric cancer is among the highest rate for this cancer in male and female in the world. Most of the cancers, especially in female, have a significant increase compared to previous report from Ardabil. This is most likely due to the change in the registration practice.  

  3. Self-Reported Periodontitis and Incident Type 2 Diabetes among Male Workers from a 5-Year Follow-Up to MY Health Up Study.

    Directory of Open Access Journals (Sweden)

    Atsushi Miyawaki

    Full Text Available The purpose of this study was to examine whether periodontitis is associated with incident type 2 diabetes in a Japanese male worker cohort.The study participants were Japanese men, aged 36-55 years, without diabetes. Data were extracted from the MY Health Up study, consisting of self-administered questionnaire surveys at baseline and following annual health examinations for an insurance company in Japan. The oral health status of the participants was classified by two self-reported indicators: (1 gingival hemorrhage and (2 tooth loosening. Type 2 diabetes incidence was determined by self-reporting or blood test data. Modified Poisson regression approach was used to estimate the relative risks and the 95% confidence intervals of incident diabetes with periodontitis. Covariates included age, body mass index, family history of diabetes, hypertension, current smoking habits, alcohol use, dyslipidemia, and exercise habits.Of the 2895 candidates identified at baseline in 2004, 2469 men were eligible for follow-up analysis, 133 of whom were diagnosed with diabetes during the 5-year follow-up period. Tooth loosening was associated with incident diabetes [adjusted relative risk = 1.73, 95% confidence interval = 1.14-2.64] after adjusting for other confounding factors. Gingival hemorrhage displayed a similar trend but was not significantly associated with incident diabetes [adjusted relative risk = 1.32, 95% confidence interval = 0.95-1.85].Tooth loosening is an independent predictor of incident type 2 diabetes in Japanese men.

  4. Self-Reported Periodontitis and Incident Type 2 Diabetes among Male Workers from a 5-Year Follow-Up to MY Health Up Study

    Science.gov (United States)

    Miyawaki, Atsushi; Toyokawa, Satoshi; Inoue, Kazuo; Miyoshi, Yuji; Kobayashi, Yasuki

    2016-01-01

    Aims The purpose of this study was to examine whether periodontitis is associated with incident type 2 diabetes in a Japanese male worker cohort. Methods The study participants were Japanese men, aged 36–55 years, without diabetes. Data were extracted from the MY Health Up study, consisting of self-administered questionnaire surveys at baseline and following annual health examinations for an insurance company in Japan. The oral health status of the participants was classified by two self-reported indicators: (1) gingival hemorrhage and (2) tooth loosening. Type 2 diabetes incidence was determined by self-reporting or blood test data. Modified Poisson regression approach was used to estimate the relative risks and the 95% confidence intervals of incident diabetes with periodontitis. Covariates included age, body mass index, family history of diabetes, hypertension, current smoking habits, alcohol use, dyslipidemia, and exercise habits. Results Of the 2895 candidates identified at baseline in 2004, 2469 men were eligible for follow-up analysis, 133 of whom were diagnosed with diabetes during the 5-year follow-up period. Tooth loosening was associated with incident diabetes [adjusted relative risk = 1.73, 95% confidence interval = 1.14–2.64] after adjusting for other confounding factors. Gingival hemorrhage displayed a similar trend but was not significantly associated with incident diabetes [adjusted relative risk = 1.32, 95% confidence interval = 0.95–1.85]. Conclusions Tooth loosening is an independent predictor of incident type 2 diabetes in Japanese men. PMID:27115749

  5. Does the implementation of an electronic prescribing system create unintended medication errors? A study of the sociotechnical context through the analysis of reported medication incidents

    Directory of Open Access Journals (Sweden)

    Hodson James

    2011-05-01

    Full Text Available Abstract Background Even though electronic prescribing systems are widely advocated as one of the most effective means of improving patient safety, they may also introduce new risks that are not immediately obvious. Through the study of specific incidents related to the processes involved in the administration of medication, we sought to find out if the prescribing system had unintended consequences in creating new errors. The focus of this study was a large acute hospital in the Midlands in the United Kingdom, which implemented a Prescribing, Information and Communication System (PICS. Methods This exploratory study was based on a survey of routinely collected medication incidents over five months. Data were independently reviewed by two of the investigators with a clinical pharmacology and nursing background respectively, and grouped into broad types: sociotechnical incidents (related to human interactions with the system and non-sociotechnical incidents. Sociotechnical incidents were distinguished from the others because they occurred at the point where the system and the professional intersected and would not have occurred in the absence of the system. The day of the week and time of day that an incident occurred were tested using univariable and multivariable analyses. We acknowledge the limitations of conducting analyses of data extracted from incident reports as it is widely recognised that most medication errors are not reported and may contain inaccurate data. Interpretation of results must therefore be tentative. Results Out of a total of 485 incidents, a modest 15% (n = 73 were distinguished as sociotechnical issues and thus may be unique to hospitals that have such systems in place. These incidents were further analysed and subdivided into categories in order to identify aspects of the context which gave rise to adverse situations and possible risks to patient safety. The analysis of sociotechnical incidents by time of day and day of

  6. Reproductive hacking. A male seminal protein acts through intact reproductive pathways in female Drosophila.

    Science.gov (United States)

    Rubinstein, C Dustin; Wolfner, Mariana F

    2014-01-01

    Seminal proteins are critical for reproductive success in all animals that have been studied. Although seminal proteins have been identified in many taxa, and female reproductive responses to receipt of these proteins have been documented in several, little is understood about the mechanisms by which seminal proteins affect female reproductive physiology. To explore this topic, we investigated how a Drosophila seminal protein, ovulin, increases ovulation rate in mated females. Ovulation is a relatively simple physiological process, with known female regulators: previous studies have shown that ovulation rate is promoted by the neuromodulator octopamine (OA) in D. melanogaster and other insects. We found that ovulin stimulates ovulation by increasing OA signaling in the female. This finding supports a model in which a male seminal protein acts through "hacking" a well-conserved, regulatory system females use to adjust reproductive output, rather than acting downstream of female mechanisms of control or in parallel pathways altogether. We also discuss similarities between 2 forms of intersexual control of behavior through chemical communication: seminal proteins and pheromones.

  7. Outcomes From AAS Hack Day at the 227th AAS Meeting

    Science.gov (United States)

    Kohler, Susanna

    2016-01-01

    Editors Note:This is a final post from the 227th AAS Meeting in Kissimmee, FL. This special summary of AAS Hack Day, a meeting of AAS members to collaboratively work on various small projects, was written by Meredith Rawls (@Merrdiff) and was originally posted on astrobites.com.As the 227thAmerican Astronomical Society meeting drew to a close (see highlights from Day 1, Day 2, Day 3, and Day 4), a group of at least 50 attendees spent Day 4working on small projects fondly called hacks. Thanks to sponsorship from LSST and Northrup Grumman, the industrious hackers werewell-caffeinated and fed so we could devote time and energy toworking in groups on one-day projects.TheHack Day beganat 10am with pitches. Anybody with a project idea was welcome to briefly speak and try to convince others to work with them. Only someideas panned out, but the enthusiasm was palpable. Its not every day you get a full room of astronomers and affiliates eager to spend hours working on fun and useful projects to benefit the community.#hackAAS is getting underway! #aas227 pic.twitter.com/yX7jlOnSCK James R A Davenport (@jradavenport) January 8, 2016Here is a rundown of what we accomplished. Pretty impressive for a single day! Many thanks to fellow astrobiter Erika Nesvold (now at Carnegie DTM; @erikanesvold) whose hack was live-documenting all the other hacks. Her tweets as @astrobites appeared with the #hackaas hashtag, and her notes made this recap post infinitely easier to write.Interested in joining the fun? Sign up for Hack Day at the 2017 JanuaryAAS meeting (its free with meeting registration), and consider applying for the .Astronomy conference this summer.Towards Optimal Session Scheduling:Adrian Price-Whelan (Columbia), David Hogg (NYU), and Scott Idem (AAS) began writing a program to take all submitted abstracts to a conference like AAS and sort them using keywords to avoid scheduling similar talks in parallel sessions. Its impossible to make everyone happy, but minimizing conflicts

  8. Substantiated Reports of Child Maltreatment From the Canadian Incidence Study of Reported Child Abuse and Neglect 2008: Examining Child and Household Characteristics and Child Functional Impairment

    Science.gov (United States)

    Afifi, Tracie O; Taillieu, Tamara; Cheung, Kristene; Katz, Laurence Y; Tonmyr, Lil; Sareen, Jitender

    2015-01-01

    Objective: Identifying child and household characteristics that are associated with specific child maltreatment types and child functional impairment are important for informing prevention and intervention efforts. Our objectives were to examine the distribution of several child and household characteristics among substantiated child maltreatment types in Canada; to determine if a specific child maltreatment type relative to all other types was associated with increased odds of child functional impairment; and to determine which child and household characteristics were associated with child functional impairment. Method: Data were from the Canadian Incidence Study of Reported Child Abuse and Neglect (collection 2008) from 112 child welfare sites across Canada (n = 6163 children). Results: Physical abuse, sexual abuse, and emotional maltreatment were highly prevalent among children aged 10 to 15 years. For single types of child maltreatment, the highest prevalence of single-parent homes (50.6%), social assistance (43.0%), running out of money regularly (30.7%), and unsafe housing (30.9%) were reported for substantiated cases of neglect. Being male, older age, living in a single-parent home, household running out of money, moving 2 or more times in the past year, and household overcrowding were associated with increased odds of child functional impairment. Conclusions: More work is warranted to determine if providing particular resources for single-parent families, financial counselling, and facilitating adequate and stable housing for families with child maltreatment histories or at risk for child maltreatment could be effective for improving child functional outcomes. PMID:26175390

  9. What Would You Like? Identifying the Required Characteristics of an Industry-Wide Incident Reporting and Learning System for the Led Outdoor Activity Sector

    Science.gov (United States)

    Goode, Natassia; Finch, Caroline F.; Cassell, Erin; Lenne, Michael G.; Salmon, Paul M.

    2014-01-01

    The aim of this study was to identify the characteristics that led outdoor activity providers agree are necessary for the development of a new industry-wide incident reporting and learning system (UPLOADS). The study involved: 1) a literature review to identify a set of characteristics that are considered to be hallmarks of successful reporting…

  10. Analysis of Aviation Safety Reporting System Incident Data Associated with the Technical Challenges of the System-Wide Safety and Assurance Technologies Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2015-01-01

    The Aviation Safety Program (AvSP) System-Wide Safety and Assurance Technologies (SSAT) Project asked the AvSP Systems and Portfolio Analysis Team to identify SSAT-related trends. SSAT had four technical challenges: advance safety assurance to enable deployment of NextGen systems; automated discovery of precursors to aviation safety incidents; increasing safety of human-automation interaction by incorporating human performance, and prognostic algorithm design for safety assurance. This report reviews incident data from the NASA Aviation Safety Reporting System (ASRS) for system-component-failure- or-malfunction- (SCFM-) related and human-factor-related incidents for commercial or cargo air carriers (Part 121), commuter airlines (Part 135), and general aviation (Part 91). The data was analyzed by Federal Aviation Regulations (FAR) part, phase of flight, SCFM category, human factor category, and a variety of anomalies and results. There were 38 894 SCFM-related incidents and 83 478 human-factorrelated incidents analyzed between January 1993 and April 2011.

  11. Opportunities for prevention and intervention with young children: lessons from the Canadian incidence study of reported child abuse and neglect

    Directory of Open Access Journals (Sweden)

    Fallon Barbara

    2013-02-01

    Full Text Available Abstract Background The most effective way to provide support to caregivers with infants in order to promote good health, social, emotional and developmental outcomes is the subject of numerous debates in the literature. In Canada, each province adopts a different approach which range from universal to targeted programs. Nonetheless, each year a group of vulnerable infants is identified to the child welfare system with concerns about their well-being and safety. This study examines maltreatment-related investigations in Canada involving children under the age of one year to identify which factors determine service provision at the conclusion of the investigation. Methods A secondary analysis of the Canadian Incidence Study of Reported Child Abuse and Neglect CIS-2008 (PHAC, 2010 dataset was conducted. Multivariate analyses were conducted to understand the profile of investigations involving infants (n=1,203 and which predictors were significant in the decision to transfer a case to ongoing services at the conclusion of the investigation. Logistic Regression and Classification and Regression Trees (CART were conducted to examine the relationship between the outcome and predictors. Results The results suggest that there are three main sources that refer infants to the Canadian child welfare system: hospital, police, and non-professionals. Infant maltreatment-related investigations involve young caregivers who struggle with poverty, single-parenthood, drug/solvent and alcohol abuse, mental health issues, lack of social supports, and intimate partner violence. Across the three referral sources, primary caregiver risk factors are the strongest predictor of the decision to transfer a case to ongoing services. Conclusions Multivariate analyses indicate that the presence of infant concerns does not predict ongoing service provision, except when the infant is identified with positive toxicology at birth. The opportunity for early intervention and the

  12. Workplace interpersonal conflicts among the healthcare workers: Retrospective exploration from the institutional incident reporting system of a university-affiliated medical center

    Science.gov (United States)

    Huang, Szu-Fen; Liang, Huey-Wen; Chen, Li-Chin; Lin, Chia-Kuei; Huang, Hsiao-Fang; Hsieh, Ming-Yuan; Sun, Jui-Sheng

    2017-01-01

    Objective There have been concerns about the workplace interpersonal conflict (WIC) among healthcare workers. As healthcare organizations have applied the incident reporting system (IRS) widely for safety-related incidents, we proposed that this system might provide a channel to explore the WICs. Methods We retrospectively reviewed the reports to the IRS from July 2010 to June 2013 in a medical center. We identified the WICs and typed these conflicts according to the two foci (task content/process and interpersonal relationship) and the three properties (disagreement, interference, and negative emotion), and analyzed relevant data. Results Of the 147 incidents with WIC, the most common related processes were patient transfer (20%), laboratory tests (17%), surgery (16%) and medical imaging (16%). All of the 147 incidents with WIC focused on task content or task process, but 41 (27.9%) also focused on the interpersonal relationship. We found disagreement, interference, and negative emotion in 91.2%, 88.4%, and 55.8% of the cases, respectively. Nurses (57%) were most often the reporting workers, while the most common encounter was the nurse-doctor interaction (33%), and the majority (67%) of the conflicts were experienced concurrently with the incidents. There was a significant difference in the distribution of worker job types between cases focused on the interpersonal relationship and those without (p = 0.0064). The doctors were more frequently as the reporter when the conflicts focused on the interpersonal relationship (34.1%) than not on it (17.0%). The distributions of worker job types were similar between those with and without negative emotion (p = 0.125). Conclusions The institutional IRS is a useful place to report the workplace interpersonal conflicts actively. The healthcare systems need to improve the channels to communicate, manage and resolve these conflicts. PMID:28166260

  13. [Natural or interactive kinds? The transient mental disorders in Ian Hacking's lectures at the Collège de France (2000-2006)].

    Science.gov (United States)

    Delille, Emmanuel; Kirsch, Marc

    2016-12-01

    The concepts developed by Ian Hacking during his lectures at the Collège de France (2000-2006) have provided an important contribution to the debates within the field of philosophy of psychiatry. Professor at the Chair of Philosophy and History of Scientific Concepts after Michel Foucault, Hacking is the author of a reflection on the classification of mental disorders, which arises from the problem of the natural kinds. In order to explain the case studies developed in Hacking's Paris lectures, we first go back to the definition of a series of concepts, then we discuss the status of his scientific metaphors. Finally we analyze the relationship between the notions, respectively, of "transient mental illness" and "culture-bound syndrome". We emphasize that the latter derives from the Canadian transcultural psychiatry.

  14. Lessons learnt from the development of the Patient Safety Incidents Reporting an Learning System for the Spanish National Health System: SiNASP.

    Science.gov (United States)

    Vallejo-Gutiérrez, Paula; Bañeres-Amella, Joaquim; Sierra, Eduardo; Casal, Jesús; Agra, Yolanda

    2014-01-01

    To describe the development process and characteristics of a patient safety incidents reporting system to be implemented in the Spanish National Health System, based on the context and the needs of the different stakeholders. Literature review and analysis of most relevant reporting systems, identification of more than 100 stakeholder's (patients, professionals, regional governments representatives) expectations and requirements, analysis of the legal context, consensus of taxonomy, development of the software and pilot test. Patient Safety Events Reporting and Learning system (Sistema de Notificación y Aprendizajepara la Seguridad del Paciente, SiNASP) is a generic reporting system for all types of incidents related to patient safety, voluntary, confidential, non punitive, anonymous or nominative with anonimization, system oriented, with local analysis of cases and based on the WHO International Classification for Patient Safety. The electronic program has an on-line form for reporting, a software to manage the incidents and improvement plans, and a scoreboard with process indicators to monitor the system. The reporting system has been designed to respond to the needs and expectations identified by the stakeholders, taking into account the lessons learned from the previous notification systems, the characteristics of the National Health System and the existing legal context. The development process presented and the characteristics of the system provide a comprehensive framework that can be used for future deployments of similar patient safety systems. Copyright © 2013 SECA. Published by Elsevier Espana. All rights reserved.

  15. Self-reported whole-grain intake and plasma alkylresorcinol concentrations in combination in relation to the incidence of colorectal cancer

    DEFF Research Database (Denmark)

    Knudsen, Markus Dines; Kyrø, Cecilie; Olsen, Anja;

    2014-01-01

    (colon, proximal, distal or rectum cancer) when using an FFQ as the measure/exposure variable for whole-grain intake. The results suggest that assessing whole-grain intake using a combination of FFQs and biomarkers slightly increases the precision in estimating the risk of colon or rectal cancer......-grain consumption (HELGA, 1992-1998). Incidence rate ratios and 95% confidence intervals were calculated using conditional logistic regression. Plasma alkylresorcinol concentrations alone and Howe's score with ranks were inversely associated with the incidence of distal colon cancer when the highest quartile......Self-reported food frequency questionnaires (FFQs) have occasionally been used to investigate the association between whole-grain intake and the incidence of colorectal cancer, but the results from those studies have been inconsistent. We investigated this association using intakes of whole grains...

  16. Drug related critical incidents.

    Science.gov (United States)

    Khan, F A; Hoda, M Q

    2005-01-01

    Drug related incidents are a common form of reported medical errors. This paper reviews the critical incidents related to drug errors reported from the main operating theatre suite in a teaching hospital in a developing country from January 1997 to December 2002. Each report was evaluated individually by two reviewers using a structured process. During this period, 44 874 anaesthetics were administered; 768 critical incidents were reported, 165 (21%) of which were related to drug errors. Underdosage, side-effect/drug reaction and syringe swap were the most common. A total of 76% were classified as preventable; 56% due to human error and 19% due to system error. High risk incidents accounted for 10% of all drug errors and most of these were related to the use of neuromuscular blocking drugs. This analysis has been found useful in addressing some issues about priorities.

  17. Police Incident Blotter (Archive)

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — The Police Blotter Archive contains crime incident data after it has been validated and processed to meet Uniform Crime Reporting (UCR) standards, published on a...

  18. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    Science.gov (United States)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is

  19. Trunk muscle activation in the back and hack squat at the same relative loads.

    Science.gov (United States)

    Clark, David R; Lambert, Michael I; Hunter, Angus M

    2017-07-12

    The hack squat (HS) is likely to produce a greater 1 repetition maximum (1RM) compared to the back squat (BS). This can be attributed to the support of the trunk during the HS compared to no support during BS. This support however, may compromise trunk muscle activation (TMA), therefore producing different training adaptations. Accordingly, the purpose of this study was to compare 1RM in BS and HS and TMA at 4 relative loads, 65, 75, 85 and 95% of maximal system mass. Ten males completed 3 test sessions:1) BS and HS 1RM, 2) HS & BS neuromuscular test familiarization, and, 3) Neuromuscular test for 3 reps at 4 loads for BS and HS. BS TMA was significantly greater (p<0.05) than HS for all muscles and phases except rectus abdominus in concentric phase. TMA increased (p<0.05) with load in all muscles for both exercises and phases apart from lumbar sacral erector spinae in HS eccentric phase. Mean HS 1RM and submaximal loads were significantly (p<0.0001) higher than the equivalent BS loads. Duration of the eccentric phase was higher (p<0.01) in HS than BS but not different in concentric phase. Duration increased significantly (p<0.01) with load in both exercises and both phases. Despite higher absolute tests loads in HS, TMA was higher in BS. TMA is sensitive to load in both exercises. BS is more effective than HS in activating the muscles of the trunk and therefore arguably more effective in developing trunk strength and stability for dynamic athletic performance.

  20. Can the surgical checklist reduce the risk of wrong site surgery in orthopaedics? - can the checklist help? Supporting evidence from analysis of a national patient incident reporting system

    Directory of Open Access Journals (Sweden)

    Cleary Kevin

    2011-04-01

    Full Text Available Abstract Background Surgical procedures are now very common, with estimates ranging from 4% of the general population having an operation per annum in economically-developing countries; this rising to 8% in economically-developed countries. Whilst these surgical procedures typically result in considerable improvements to health outcomes, it is increasingly appreciated that surgery is a high risk industry. Tools developed in the aviation industry are beginning to be used to minimise the risk of errors in surgery. One such tool is the World Health Organization's (WHO surgery checklist. The National Patient Safety Agency (NPSA manages the largest database of patient safety incidents (PSIs in the world, already having received over three million reports of episodes of care that could or did result in iatrogenic harm. The aim of this study was to estimate how many incidents of wrong site surgery in orthopaedics that have been reported to the NPSA could have been prevented by the WHO surgical checklist. Methods The National Reporting and Learning Service (NRLS database was searched between 1st January 2008- 31st December 2008 to identify all incidents classified as wrong site surgery in orthopaedics. These incidents were broken down into the different types of wrong site surgery. A Likert-scale from 1-5 was used to assess the preventability of these cases if the checklist was used. Results 133/316 (42% incidents satisfied the inclusion criteria. A large proportion of cases, 183/316 were misclassified. Furthermore, there were fewer cases of actual harm [9% (12/133] versus 'near-misses' [121/133 (91%]. Subsequent analysis revealed a smaller proportion of 'near-misses' being prevented by the checklist than the proportion of incidents that resulted in actual harm; 18/121 [14.9% (95% CI 8.5 - 21.2%] versus 10/12 [83.3% (95%CI 62.2 - 104.4%] respectively. Summatively, the checklist could have been prevented 28/133 [21.1% (95%CI 14.1 - 28.0%] patient safety

  1. Dutch perfusion incident survey.

    Science.gov (United States)

    Groenenberg, Ingrid; Weerwind, Patrick W; Everts, Peter A M; Maessen, Jos G

    2010-09-01

    Cardiopulmonary bypass procedures remain complex, involving many potential risks. Therefore, a nationwide retrospective study was conducted to gain insight into the number of incidents and accidents in Dutch adult perfusion practice. An anonymous postal survey (85 questions about hardware, disposables, fluids and medication, air emboli, anticoagulation, practice, and safety measures) was sent to all Dutch perfusionists involved in adult cardiovascular perfusion during 2006 and 2007. To guarantee complete anonymity, respondents were asked to return the survey to a notary who discarded personal information. The net response rate was 72% and covered 23,500 perfusions. Individual respondents performed 240 ± 103 perfusions during the 2-year study period and had 13.8 ± 8.7 years of practical experience. The incident rate was 1 per 15.6 perfusions and the adverse event rate was 1 per 1,236 perfusions. The three most reported incidents were: (1) persistent inability to raise the activated coagulation time above 400s during perfusion (184 incidents); (2) an allergic or anaphylactic reaction to drugs, fluids, or blood products (114 incidents); and (3) clotting formation in the extracorporeal circuit (74 incidents). Furthermore, pre-bypass safety measures showed no statistically significant association with the reported incidents. In comparison with data from the recent literature, the reported number of incidents is high. Nevertheless, the adverse outcome rate is well matched to other published surveys. The relatively high response rate conveys the impression that the Dutch perfusionist is vigilant and willing to report incidents. Hence, a web-based Dutch perfusion incident registration system is recommended.

  2. Increasing Incidence of Chronic Graft-versus-Host Disease in Allogeneic Transplantation – A Report from CIBMTR

    Science.gov (United States)

    Arai, Sally; Arora, Mukta; Wang, Tao; Spellman, Stephen R.; He, Wensheng; Couriel, Daniel R.; Urbano-Ispizua, Alvaro; Cutler, Corey S.; Bacigalupo, Andrea A.; Battiwalla, Minoo; Flowers, Mary E.; Juckett, Mark B.; Lee, Stephanie J.; Loren, Alison W.; Klumpp, Thomas R.; Prockup, Susan E.; Ringdén, Olle T.H.; Savani, Bipin N.; Socié, Gérard; Schultz, Kirk R.; Spitzer, Thomas; Teshima, Takanori; Bredeson, Christopher N.; Jacobsohn, David A.; Hayashi, Robert J.; Drobyski, William R.; Frangoul, Haydar A.; Akpek, Görgün; Ho, Vincent T.; Lewis, Victor A.; Gale, Robert Peter; DSc(hon); Koreth, John; Chao, Nelson J.; Aljurf, Mahmoud D.; Cooper, Brenda W.; Laughlin, Mary J.; Hsu, Jack W.; Hematti, Peiman; Verdonck, Leo F.; Solh, Melhelm M.; Norkin, Maxim; Reddy, Vijay; Martino, Rodrigo; Gadalla, Shahinaz; Goldberg, Jenna D.; McCarthy, Philip L.; Pérez-Simón, José A.; Khera, Nandita; Lewis, Ian D.; Atsuta, Yoshiko; Olsson, Richard F.; Saber, Wael; Waller, Edmund K.; Blaise, Didier; Pidala, Joseph A.; Martin, Paul J.; Satwani, Prakash; Bornhäuser, Martin; Inamoto, Yoshihiro; Weisdorf, Daniel J.; Horowitz, Mary M.; Pavletic, Steven Z.

    2015-01-01

    Although transplant practices have changed over the last decades there is no information on trends in incidence and outcome of cGVHD over time. This study utilized the central database of the Center for International Blood and Marrow Transplant Research (CIBMTR) to describe the time trends for cGVHD incidence, non-relapse mortality, and the risk factors for cGVHD. The 12-year period was divided into three intervals: 1995-1999, 2000-2003, 2004-2007, and included 26,563 patients with acute leukemia, chronic myeloid leukemia and myelodysplastic syndrome. In the multivariate analysis, the incidence of cGVHD was shown to be increased in more recent years (odds ratio= 1.19, p<0.0001) and this trend was still seen when adjusting for donor type, graft type, or conditioning intensity. In patients with cGVHD, non-relapse mortality has decreased over time, but at 5-years there were no significant differences among different time periods. Risk factors for cGVHD were in line with previous studies. This is the first comprehensive characterization of the trends in cGVHD incidence and underscores the mounting need for addressing this major late complication of transplantation in future research. PMID:25445023

  3. Reported incidence and treatment of dermatophytosis in children in general practice: a comparison between 1987 and 2001.

    NARCIS (Netherlands)

    Mohammedamin, R.S.A.; Wouden, J.C. van der; Koning, S.; Schellevis, F.G.; Suijlekom-Smit, L.W.A. van; Koes, B.W.

    2007-01-01

    Introduction: Dermatophytosis is a common skin infection in children. Although the epidemiology is relatively unknown it is becoming a major health problem in some countries. We determine the incidence and management of dermatophytosis in Dutch general practice in 1987 and 2001. Methods: We used da

  4. Correlation of multiple sclerosis (MS incidence trends with solar and geomagnetic indices: Time to revise the method of reporting MS epidemiological data.

    Directory of Open Access Journals (Sweden)

    Fahimeh Abdollahi

    2014-06-01

    Full Text Available Recently, we introduced solar related geomagnetic disturbances (GMD as a potential environmental risk factor for multiple sclerosis (MS. The aim of this study was to test probable correlation between solar activities and GMD with long-term variations of MS incidence.After a systematic review, we studied the association betwee n alterations in the solar wind velocity (VSW and planetary A index (AP, a GMD index with MS incidence in Tehran and western Greece, during the 23(rd solar cycle (1996-2008, by an ecological-correlational study.We found moderate to strong correlations among MS incidence of Tehran with VSW (rS = 0.665, P = 0.013, with 1 year delay, and also with AP (rS = 0.864, P = 0.001 with 2 year delay. There were very strong correlations among MS incidence data of Greece with VSW (r = 0.906, P < 0.001 and with AP (r = 0.844, P = 0.001, both with 1 year lag.It is the first time that a hypothesis has introduced an environmental factor that may describe MS incidence alterations; however, it should be reminded that correlation does not mean necessarily the existence of a causal relationship. Important message of these findings for researchers is to provide MS incidence reports with higher resolution for consecutive years, based on the time of disease onset and relapses, not just the time of diagnosis. Then, it would be possible to further investigate the validity of GMD hypothesis or any other probable environmental risk factors.

  5. SHOT conference report 2016: serious hazards of transfusion - human factors continue to cause most transfusion-related incidents.

    Science.gov (United States)

    Bolton-Maggs, P H B

    2016-12-01

    The Annual SHOT Report for incidents reported in 2015 was published on 7 July at the SHOT symposium. Once again, the majority of reports (77·7%) were associated with mistakes ('human factors'). Pressures and stress in the hospital environment contributed to several error reports. There were 26 deaths where transfusion played a part, one due to haemolysis from anti-Wr(a) (units issued electronically). The incidence of haemolysis due to this antibody has increased in recent years. Transfusion-associated circulatory overload is the most common contributor to death and major morbidity. Reports of delays to transfusion have increased, some caused by the failure of correct patient identification. There were seven ABO-incompatible red cell transfusions (one death) with an additional six to allogeneic stem cell transplant recipients. Near-miss reporting and analysis is useful and demonstrated nearly 300 instances of wrong blood in tube, which could have resulted in ABO-incompatible transfusion had the error not been detected. Errors with anti-D immunoglobulin continue, and preliminary data from the new survey of new anti-D found in pregnancy has shown that sensitisation occurs in some women even with apparently 'ideal' care. For the first time, the SHOT report now incorporates a chapter on donor events.

  6. Examining the Relationship between Economic Hardship and Child Maltreatment Using Data from the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013)

    OpenAIRE

    Rachael Lefebvre; Barbara Fallon; Melissa Van Wert; Joanne Filippelli

    2017-01-01

    There is strong evidence that poverty and economic disadvantage are associated with child maltreatment; however, research in this area is underdeveloped in Canada. The purpose of this paper is to examine the relationship between economic hardship and maltreatment for families and children identified to the Ontario child protection system for a maltreatment concern. Secondary analyses of the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013) were conducted. The OIS-201...

  7. Predicting discordance between self-reports of sexual behavior and incident sexually transmitted infections with African American female adolescents: results from a 4-city study.

    Science.gov (United States)

    Brown, Jennifer L; Sales, Jessica M; DiClemente, Ralph J; Salazar, Laura F; Vanable, Peter A; Carey, Michael P; Brown, Larry K; Romer, Daniel; Valois, Robert F; Stanton, Bonita

    2012-08-01

    This study examined correlates of the discordance between sexual behavior self-reports and Incident Sexually Transmitted Infections. African American adolescent females (N = 964) from four U.S. cities were recruited for an HIV/STI prevention trial. Self-reported sexual behaviors, demographics, and hypothesized psychosocial antecedents of sexual risk behavior were collected at baseline, 6-, 12-, and 18-month follow-up assessments. Urine specimens were collected and tested for three prevalent STIs (chlamydia, gonorrhea, trichomonas) at each assessment. Seventeen percent of participants with a laboratory-confirmed STI reported either lifetime abstinence or recent abstinence from vaginal sex (discordant self-report). Lower STI knowledge, belief that fewer peers were engaging in sex, and belief that more peers will wait until marriage to have sex were associated with discordant reports. Discordance between self-reported abstinence and incident STIs was marked among African American female adolescents. Lack of STI knowledge and sexual behavior peer norms may result in underreporting of sexual behaviors.

  8. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    Directory of Open Access Journals (Sweden)

    Mehri Mowlaie

    2016-01-01

    Full Text Available Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597 junior and senior high school students (boys and girls in academic year 2014-2015 in Ardabil, Iran. 380 subjects were selected as the study sample by multistage cluster sampling. The instruments for data collection in this research were addiction to internet questionnaire, Iranian adolescent's risk-taking scale and the researcher-made tendency to chat and hacking questionnaire. The data were analyzed by SPSS-22 software using correlation coefficient and simultaneous regression analysis. Results: The results showed a significantly positive correlation between addiction to internet and sexual behavior, tendency toward opposite sex, aggression, chatting and hacking (P<0.001, but there was no significant relationship between addiction to internet and alcohol. Conclusion: The results of the present study showed that addiction to internet was able to significantly predict sexual behavior, tendency toward opposite sex, aggression, chatting and hacking.

  9. A global model of malaria climate sensitivity: comparing malaria response to historic climate data based on simulation and officially reported malaria incidence.

    Science.gov (United States)

    Edlund, Stefan; Davis, Matthew; Douglas, Judith V; Kershenbaum, Arik; Waraporn, Narongrit; Lessler, Justin; Kaufman, James H

    2012-09-18

    The role of the Anopheles vector in malaria transmission and the effect of climate on Anopheles populations are well established. Models of the impact of climate change on the global malaria burden now have access to high-resolution climate data, but malaria surveillance data tends to be less precise, making model calibration problematic. Measurement of malaria response to fluctuations in climate variables offers a way to address these difficulties. Given the demonstrated sensitivity of malaria transmission to vector capacity, this work tests response functions to fluctuations in land surface temperature and precipitation. This study of regional sensitivity of malaria incidence to year-to-year climate variations used an extended Macdonald Ross compartmental disease model (to compute malaria incidence) built on top of a global Anopheles vector capacity model (based on 10 years of satellite climate data). The predicted incidence was compared with estimates from the World Health Organization and the Malaria Atlas. The models and denominator data used are freely available through the Eclipse Foundation's Spatiotemporal Epidemiological Modeller (STEM). Although the absolute scale factor relating reported malaria to absolute incidence is uncertain, there is a positive correlation between predicted and reported year-to-year variation in malaria burden with an averaged root mean square (RMS) error of 25% comparing normalized incidence across 86 countries. Based on this, the proposed measure of sensitivity of malaria to variations in climate variables indicates locations where malaria is most likely to increase or decrease in response to specific climate factors. Bootstrapping measures the increased uncertainty in predicting malaria sensitivity when reporting is restricted to national level and an annual basis. Results indicate a potential 20x improvement in accuracy if data were available at the level ISO 3166-2 national subdivisions and with monthly time sampling. The

  10. Prevalence, Incidence, and Clearance of Anogenital Warts in Kenyan Men Reporting High-Risk Sexual Behavior, Including Men Who Have Sex With Men

    Science.gov (United States)

    Neme, Santiago; Wahome, Elizabeth; Mwashigadi, Grace; Thiong'o, Alexander N.; Stekler, Joanne D.; Wald, Anna; Sanders, Eduard J.; Graham, Susan M.

    2015-01-01

    Background. Human papillomavirus (HPV) causes a spectrum of disease, ranging from warts to cancer. Prevalence, incidence, and factors associated with anogenital warts in East African men are unknown. Methods. Kenyan men reporting high-risk sexual behavior were inspected for anogenital warts at enrollment and follow-up visits. Logistic regression was performed to identify associations with anogenital warts at baseline. Cox regression was performed to analyze predictors of incident anogenital warts, and Kaplan–Meier curves were used to estimate clearance. Results. Baseline anogenital wart prevalence in 1137 men was 2.9% (95% confidence interval [CI], 2.0%–4.0%) overall, 2.0% in human immunodeficiency virus (HIV)-uninfected men, and 9.4% in HIV-1-infected men (adjusted odds ratio, 5.43; 95% CI, 2.03–11.29). Over a median of 1.4 years, anogenital wart incidence among 1104 men was 5.3 (95% CI, 4.3–6.5) per 100 person-years. Having HIV-1 infection at baseline (adjusted hazard ratio [aHR], 1.66; 95% CI, 1.01–2.72) or a genital syndrome during follow-up (aHR, 4.78; 95% CI, 3.03–7.56) was associated with increased wart incidence. Wart clearance was lower in HIV-1-infected men (log-rank Pwart prevalence and incidence were increased in HIV-1-infected men, and anogenital warts co-occurred with other genital syndromes. Quadrivalent HPV vaccination should be recommended for young men in settings with high HIV-1 prevalence. PMID:26110169

  11. 内核入侵隐藏技术的研究与实现%Research and Realization of Concealment Technology Based on Kernel Hacking

    Institute of Scientific and Technical Information of China (English)

    李鹏; 王汝传

    2011-01-01

    Makes research on code concealment technology based on kernel hacking module without loadable kernel.It firstly analyzes the difference in kernel hacking method between module with loadable kernel and module without loadable kernel.Then.it expatiates the eight main steps of kernel hacking, which includes computing the address of system call table, calculating the address of kmalloc function, programming kernel space memory assignment function, implementing invasion codes, processing assembly code, extracting code segments and relocation information, assigning kernel space memory, and writing assigned memory.Based on summarizing the concealment technical principles of kernel hacking codes, finally designs and implements the kernel hacking technologies, which includes concealing file information, process information and network connections.%对不支持可加载模块的系统内核入侵代码隐藏技术进行了研究.比较了内核支持可加载模块和内核不支持可加载模块的内核入侵的方法区别,阐述了内核入侵在求解系统调用表的地址、kmalloc函数的地址、编写函数分配内核空间内存、编写入侵代码、汇编代码处理、提取代码段及重定位信息、分配内核空间的内存、代码写入分配的内存等八个主要流程.在总结入侵代码隐藏技术原理的基础上,给出了入侵代码隐藏文件信息、进程信息和网络连接技术的详细设计实现.

  12. Seventy Years of Asthma in Italy: Age, Period and Cohort Effects on Incidence and Remission of Self-Reported Asthma from 1940 to 2010.

    Directory of Open Access Journals (Sweden)

    Giancarlo Pesce

    Full Text Available It is well known that asthma prevalence has been increasing all over the world in the last decades. However, few data are available on temporal trends of incidence and remission of asthma.To evaluate the rates of asthma incidence and remission in Italy from 1940 to 2010.The subjects were randomly sampled from the general Italian population between 1991 and 2010 in the three population-based multicentre studies: ECRHS, ISAYA, and GEIRD. Individual information on the history of asthma (age at onset, age at the last attack, use of drugs for asthma control, co-presence of hay-fever was collected on 35,495 subjects aged 20-84 and born between 1925-1989. Temporal changes in rates of asthma incidence and remission in relation to age, birth cohort and calendar period (APC were modelled using Poisson regression and APC models.The average yearly rate of asthma incidence was 2.6/1000 (3,297 new cases among 1,263,885 person-years. The incidence rates have been linearly increasing, with a percentage increase of +3.9% (95%CI: 3.1-4.5, from 1940 up to the year 1995, when the rates begun to level off. The stabilization of asthma incidence was mainly due to a decrease in the rates of atopic asthma after 1995, while non-atopic asthma has continued to increase. The overall rate of remission was 43.2/1000person-years, and it did not vary significantly across generations, but was associated with atopy, age at asthma onset and duration of the disease.After 50 years of a continuous upward trend, the rates of asthma incidence underwent a substantial stabilization in the late 90s. Despite remarkable improvements in the treatment of asthma, the rate of remission did not change significantly in the last seventy years. Some caveats are required in interpreting our results, given that our estimates are based on self-reported events that could be affected by the recall bias.

  13. Disparities in Reportable Communicable Disease Incidence by Census Tract-Level Poverty, New York City, 2006–2013

    Science.gov (United States)

    Levin-Rector, Alison; Hadler, James L.; Fine, Annie D.

    2015-01-01

    Objectives. We described disparities in selected communicable disease incidence across area-based poverty levels in New York City, an area with more than 8 million residents and pronounced household income inequality. Methods. We geocoded and categorized cases of 53 communicable diseases diagnosed during 2006 to 2013 by census tract-based poverty level. Age-standardized incidence rate ratios (IRRs) were calculated for areas with 30% or more versus fewer than 10% of residents below the federal poverty threshold. Results. Diseases associated with high poverty included rickettsialpox (IRR = 3.69; 95% confidence interval [CI] = 2.29, 5.95), chronic hepatitis C (IRR for new reports = 3.58; 95% CI = 3.50, 3.66), and malaria (IRR = 3.48; 95% CI = 2.97, 4.08). Diseases associated with low poverty included domestic tick-borne diseases acquired through travel to areas where infected vectors are prevalent, such as human granulocytic anaplasmosis (IRR = 0.08; 95% CI = 0.03, 0.19) and Lyme disease (IRR = 0.34; 95% CI = 0.32, 0.36). Conclusions. Residents of high poverty areas were disproportionately affected by certain communicable diseases that are amenable to public health interventions. Future work should clarify subgroups at highest risk, identify reasons for the observed associations, and use findings to support programs to minimize disparities. PMID:26180961

  14. State Methods for a Cyber Incident

    Science.gov (United States)

    2012-03-01

    Statewide Emergency Response and Response Plan SIPC State Infrastructure Protection Center SIRT Security Incident Response Team SIRT State Incident...by statute and policy to report agency information security incidents to the state Security Incident Response Team ( SIRT ). Those reports are made...through recent state statutes. P-16 Yes, agencies are required by statute and policy to report information security incidents to the SIRT . Q-17

  15. Report from Mongolia – How much do we know about the incidence of rare cases in less developed countries: a case series

    Directory of Open Access Journals (Sweden)

    Dünser Martin W

    2008-11-01

    Full Text Available Abstract Introduction Case reports are important instruments to describe rare disease conditions and give a rough estimation of their global incidence. Even though collected in international databases, most case reports are published by clinicians from industrialized nations and little is known about the incidence of rare cases in less developed countries, which are home to 75% of the world's population. Case presentation We present seven patients who suffered from diseases which are either considered to be rare or have not yet been described before according to international databases, but occurred during a 5-month period in one intensive care unit of a less developed country. During the observation period, patients with a spontaneous infratentorial subdural hematoma (Asian, female, 41 years, general exanthema and acute renal failure after diesel ingestion (Asian, male, 30 years, transient cortical blindness complicating hepatic encephalopathy (Asian, female, 49 years, Fournier gangrene complicating acute necrotizing pancreatitis (Asian, male, 37 years, acute renal failure due to acetic acid intoxication (Asian, male, 42 years, haemolytic uremic syndrome following septic abortion (Asian, female, 45 years, and a metal needle as an unusual cause of chest pain (Asian, male, 41 years were treated. According to the current literature, all seven disease conditions are considered either rare or have so far not yet been reported. Conclusion The global incidence of rare cases may be underestimated by contemporary international databases. Diseases which are currently considered to be rare in industrialized nations may occur at a higher frequency in less developed countries. Reasons may not only be a geographically different burden of certain diseases, limited diagnostic and therapeutic facilities, but also a relevant publication bias.

  16. Neurofibromatosis with male breast cancer--risk factor or co-incidence? Report of two rare cases.

    Science.gov (United States)

    Tandon, Megha; Panwar, Pankaj; Garg, Praveen; Chintamani; Siraj, Fauzia

    2015-01-01

    The genetic link between neurofibromatosis and breast cancer has recently intrigued the researchers and breast practitioners alike. While the association is well established in females, the same cannot be said for the male breast cancer due to paucity of cases. With only two cases reported previously, our knowledge is sparse. We hereby report two cases of male breast cancer with neurofibromatosis.

  17. Hacking for astronomy: can 3D printers and open-hardware enable low-cost sub-/millimeter instrumentation?

    Science.gov (United States)

    Ferkinhoff, Carl

    2014-07-01

    There have been several exciting developments in the technologies commonly used n in the hardware hacking community. Advances in low cost additive-manufacturing processes (i.e. 3D-printers) and the development of openhardware projects, which have produced inexpensive and easily programmable micro-controllers and micro-computers (i.e. Arduino and Raspberry Pi) have opened a new door for individuals seeking to make their own devices. Here we describe the potential for these technologies to reduce costs in construction and development of submillimeter/millimeter astronomical instrumentation. Specifically we have begun a program to measure the optical properties of the custom plastics used in 3D-printers as well as the printer accuracy and resolution to assess the feasibility of directly printing sub- /millimeter transmissive optics. We will also discuss low cost designs for cryogenic temperature measurement and control utilizing Arduino and Raspberry Pi.

  18. Monozygotic twinning after assisted reproductive technologies: a case report of asymmetric development and incidence during 19 years in an international group of in vitro fertilization clinics.

    Science.gov (United States)

    Tocino, Antonia; Blasco, Víctor; Prados, Nicolás; Vargas, Manuel J; Requena, Antonio; Pellicer, Antonio; Fernández-Sánchez, Manuel

    2015-05-01

    To describe a case of monozygotic twinning with asymmetric development following a single fresh embryo transfer as part of an intracytoplasmic sperm injection (ICSI) treatment. Secondarily, to report the incidence of monozygotic twinning at the IVI (Instituto Valenciano de Infertilidad) clinics. Case report. Private fertility centers. A 33-year-old woman with a 2-year history of primary infertility. Controlled ovarian hyperstimulation and ICSI treatment with single-embryo transfer. Incidence of monozygotic twinning at the IVI clinics. We report a twin pregnancy after a single-embryo transfer. Twins were dichorionic and diamniotic. One fetus had a 6-day delay in its growth compared with the other when observed by ultrasound. Two female infants were delivered, and despite presenting congenital diseases, they were successfully treated and evolved correctly. A subsequent DNA analysis confirmed that the infants were monozygotic. Furthermore, we estimated a monozygotic twinning rate of 1.17% at the IVI clinics, taking into account those cases in which two or more embryos with heart beats were observed by ultrasound scanning after single-embryo transfers. Ultrasound scans performed during pregnancy suggested a possible dizygotic origin of the twins, but DNA analysis performed after birth established that they were monozygotic. Genetic analysis is the only valid tool to confirm if like-sex dichorionic twins are monozygotic or dizygotic. Copyright © 2015 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  19. Field evidence of bird poisonings by imidacloprid-treated seeds: a review of incidents reported by the French SAGIR network from 1995 to 2014.

    Science.gov (United States)

    Millot, Florian; Decors, Anouk; Mastain, Olivier; Quintaine, Thomas; Berny, Philippe; Vey, Danièle; Lasseur, Romain; Bro, Elisabeth

    2017-02-01

    The large-scale use of neonicotinoid insecticides has raised growing concerns about their potential adverse effects on farmland birds, and more generally on biodiversity. Imidacloprid, the first neonicotinoid commercialized, has been identified as posing a risk for seed-eating birds when it is used as seed treatment of some crops since the consumption of a few dressed seeds could cause mortality. But evidence of direct effects in the field is lacking. Here, we reviewed the 103 wildlife mortality incidents reported by the French SAGIR Network from 1995 to 2014, for which toxicological analyses detected imidacloprid residues. One hundred and one incidents totalling at least 734 dead animals were consistent with an agricultural use as seed treatment. Grey partridges (Perdix perdix) and "pigeons" (Columba palumbus, Columba livia and Columba oenas) were the main species found. More than 70% of incidents occurred during autumn cereal sowings. Furthermore, since there is no biomarker for diagnosing neonicotinoid poisonings, we developed a diagnostic approach to estimate the degree of certainty that these mortalities were due to imidacloprid poisoning. By this way, the probability that mortality was due to poisoning by imidacloprid-treated seeds was ranked as at least "likely" in 70% of incidents. As a result, this work provides clear evidence to risk managers that lethal effects due to the consumption by birds of imidacloprid-treated seeds regularly occur in the field. This in turn raises the question of the effectiveness of the two main factors (seed burying and imidacloprid-treated seeds avoidance) that are supposed to make the risk to birds negligible. Risk factors and the relevance of mitigation measures are discussed.

  20. A Decade of Child-Initiated Family Violence: Comparative Analysis of Child-Parent Violence and Parricide Examining Offender, Victim, and Event Characteristics in a National Sample of Reported Incidents, 1995-2005

    Science.gov (United States)

    Walsh, Jeffrey A.; Krienert, Jessie L.

    2009-01-01

    This article examines 11 years (1995-2005) of National Incident Based Reporting System data comparing victim, offender, and incident characteristics for two types of child-initiated family violence: child-parent violence (CPV) and parricide. The objective is to better understand the victim-offender relationship for CPV and parricide and to…

  1. Incidence and body location of reported acute sport injuries in seven sports using a national insurance database.

    Science.gov (United States)

    Åman, M; Forssblad, M; Larsén, K

    2017-08-07

    Sports with high numbers of athletes and acute injuries are an important target for preventive actions at a national level. Both for the health of the athlete and to reduce costs associated with injury. The aim of this study was to identify injuries where injury prevention should focus, in order to have major impact on decreasing acute injury rates at a national level. All athletes in the seven investigated sport federations (automobile sports, basketball, floorball, football (soccer), handball, ice hockey, and motor sports) were insured by the same insurance company. Using this insurance database, the incidence and proportion of acute injuries, and injuries leading to permanent medical impairment (PMI), at each body location, was calculated. Comparisons were made between sports, sex, and age. In total, there were 84 754 registered injuries during the study period (year 2006-2013). Athletes in team sports, except in male ice hockey, had the highest risk to sustain an injury and PMI in the lower limb. Females had higher risk of injury and PMI in the lower limb compared to males, in all sports except in ice hockey. This study recommends that injury prevention at national level should particularly focus on lower limb injuries. In ice hockey and motor sports, head/neck and upper limb injuries also need attention. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. Examining the Relationship between Economic Hardship and Child Maltreatment Using Data from the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013)

    Science.gov (United States)

    Lefebvre, Rachael; Fallon, Barbara; Van Wert, Melissa; Filippelli, Joanne

    2017-01-01

    There is strong evidence that poverty and economic disadvantage are associated with child maltreatment; however, research in this area is underdeveloped in Canada. The purpose of this paper is to examine the relationship between economic hardship and maltreatment for families and children identified to the Ontario child protection system for a maltreatment concern. Secondary analyses of the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013) were conducted. The OIS-2013 examines the incidence of reported maltreatment and the characteristics of children and families investigated by child welfare authorities in Ontario in 2013. Descriptive and bivariate chi-square analyses were conducted in addition to a logistic regression predicting the substantiation of maltreatment. In 9% of investigations, the household had run out of money for food, housing, and/or utilities in the past 6 months. Children in these households were more likely to have developmental concerns, academic difficulties, and caregivers with mental health concerns and substance use issues. Controlling for key clinical and case characteristics, children living in families facing economic hardship were almost 2 times more likely to be involved in a substantiated maltreatment investigation (OR = 1.91, p < 0.001). The implications in regard to future research and promoting resilience are discussed. PMID:28208690

  3. Examining the Relationship between Economic Hardship and Child Maltreatment Using Data from the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013).

    Science.gov (United States)

    Lefebvre, Rachael; Fallon, Barbara; Van Wert, Melissa; Filippelli, Joanne

    2017-02-08

    There is strong evidence that poverty and economic disadvantage are associated with child maltreatment; however, research in this area is underdeveloped in Canada. The purpose of this paper is to examine the relationship between economic hardship and maltreatment for families and children identified to the Ontario child protection system for a maltreatment concern. Secondary analyses of the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013) were conducted. The OIS-2013 examines the incidence of reported maltreatment and the characteristics of children and families investigated by child welfare authorities in Ontario in 2013. Descriptive and bivariate chi-square analyses were conducted in addition to a logistic regression predicting the substantiation of maltreatment. In 9% of investigations, the household had run out of money for food, housing, and/or utilities in the past 6 months. Children in these households were more likely to have developmental concerns, academic difficulties, and caregivers with mental health concerns and substance use issues. Controlling for key clinical and case characteristics, children living in families facing economic hardship were almost 2 times more likely to be involved in a substantiated maltreatment investigation (OR = 1.91, p < 0.001). The implications in regard to future research and promoting resilience are discussed.

  4. Examining the Relationship between Economic Hardship and Child Maltreatment Using Data from the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013

    Directory of Open Access Journals (Sweden)

    Rachael Lefebvre

    2017-02-01

    Full Text Available There is strong evidence that poverty and economic disadvantage are associated with child maltreatment; however, research in this area is underdeveloped in Canada. The purpose of this paper is to examine the relationship between economic hardship and maltreatment for families and children identified to the Ontario child protection system for a maltreatment concern. Secondary analyses of the Ontario Incidence Study of Reported Child Abuse and Neglect-2013 (OIS-2013 were conducted. The OIS-2013 examines the incidence of reported maltreatment and the characteristics of children and families investigated by child welfare authorities in Ontario in 2013. Descriptive and bivariate chi-square analyses were conducted in addition to a logistic regression predicting the substantiation of maltreatment. In 9% of investigations, the household had run out of money for food, housing, and/or utilities in the past 6 months. Children in these households were more likely to have developmental concerns, academic difficulties, and caregivers with mental health concerns and substance use issues. Controlling for key clinical and case characteristics, children living in families facing economic hardship were almost 2 times more likely to be involved in a substantiated maltreatment investigation (OR = 1.91, p < 0.001. The implications in regard to future research and promoting resilience are discussed.

  5. Emergency preparedness incident response and radiation monitoring in Finland. Annual report 1998; Valmiustapahtumat ja valtakunnallinen saeteilyvalvonta. Vuosiraportti 1998

    Energy Technology Data Exchange (ETDEWEB)

    Ristonmaa, S. [ed.

    1999-03-01

    The Radiation and Nuclear Safety Authority (STUK) publishes annually a report about STUK's preparedness measures. The report describes notifications received by STUK's on duty system and further measures carried out after receiving a message. In addition, the emergence exercises STUK participated in during the year are described. The radiation situation in Finland is continuously monitored. STUK is the authority who carries out a wide range of environmental measurements, sampling and sensitive laboratory analyses. The measurement results are presented in the form of tables and graphically. (editor)

  6. Emergency preparedness incident response and radiation monitoring in Finland. Annual report 1999; Valmiustapahtumat ja saeteilyvalvonta. Vuosiraportti 1999

    Energy Technology Data Exchange (ETDEWEB)

    Ristonmaa, S. [ed.

    2000-04-01

    The Radiation and Nuclear Safety Authority (STUK) publishes annually a report about STUK's preparedness measures. The report describes notifications received by STUK's on duty system and further measures carried out after receiving a message. In addition, the emergence exercises STUK participated in during the year are described. The radiation situation in Finland is continuously monitored. STUK is the authority who carries out a wide range of environmental measurements, sampling and sensitive laboratory analyses. The measurement results are presented in the form of tables and graphically. (editor)

  7. Emergency preparedness incident response and radiation monitoring in Finland. Annual report 1999; Valmiustapahtumat ja saeteilyvalvonta. Vuosiraportti 1999

    Energy Technology Data Exchange (ETDEWEB)

    Ristonmaa, S. [ed.

    2000-04-01

    The Radiation and Nuclear Safety Authority (STUK) publishes annually a report about STUK's preparedness measures. The report describes notifications received by STUK's on duty system and further measures carried out after receiving a message. In addition, the emergence exercises STUK participated in during the year are described. The radiation situation in Finland is continuously monitored. STUK is the authority who carries out a wide range of environmental measurements, sampling and sensitive laboratory analyses. The measurement results are presented in the form of tables and graphically. (editor)

  8. Análisis filosófico de la construcción social de la escuela: claves críticas a partir de Ian Hacking

    Directory of Open Access Journals (Sweden)

    José PENALVA BUITRAGO

    2009-01-01

    Full Text Available RESUMEN: Este artículo ofrece un análisis filosófico de la idea de la construcción social de la escuela. Tomando como punto de partida algunas de las claves críticas que I. Hacking señala respecto del constructivismo, el autor ensaya una nueva ruta de análisis, no explorada por Hacking: el análisis del constructivismo social en los procesos educativos y en las instituciones educativas. Con ello se intenta poner de relieve cuestiones teóricas de fondo –principalmente de carácter ontológico– acerca de las cuales la comunidad pedagógica ha prestado escasa atención. El análisis se desarrolla en cuatro pasos: en primer lugar, se ofrecen las ideas de Hacking más relevantes al respecto; después, se expone una síntesis de la posición dominante acerca de la construcción social de la escuela. Seguidamente, se analizan los aspectos ontológicos implicados en tal idea, y, por último, se extraen las consecuencias educativas.ABSTRACT: This paper offers a philosophical analysis of the idea of the social construction of School. Taking as a standpoint some critical questions which I. Hacking proposed regarding constructivism, the author examines a new route, not explored by Hacking, i.e., the analysis of social constructivism in educational processes and educational institutions. In this way we expect to throw light on certain deep theoretical questions –of an ontological nature, mainly– to which the educational community has paid little attention. The analysis follows four steps: first, it describes Hacking’s most important ideas in this regard; second, it synthesises the dominant stance concerning the social construction of School. Third, it examines the ontological assumptions of this idea, and, finally, describes some educational consequences.SOMMAIRE: Cet article offre une analyse philosophique de la structure sociale des écoles. L’auteur, à partir de quelques idées critiques signalées par I. Hacking à propos du

  9. En torno a la construcción social de la locura. Ian Hacking y la historia cultural de la psiquiatría.

    Directory of Open Access Journals (Sweden)

    Rafael Huertas García-Alejo

    2011-01-01

    Full Text Available El objetivo de este trabajo es analizar la contribución del filósofo de la ciencia Ian Hacking a la historia cultural de la psiquiatría. Partiendo de conceptos propuestos por el autor, como “enfermedad mental transitoria” o “inventar/construir gente”, se reflexiona en torno a la construcción socio-cultural de la enfermedad mental. Se examinan y discuten los dos estudios de caso propuestos por Hacking: la fuga disociativa y la personalidad múltiple, identificando las fortalezas y debilidades de sus planteamientos y la posible aplicación de los mismos a la historia y a la teoría psicopatológica.

  10. Etiology of Fall-Related Injuries in the Army: Review of Narrative Incident Reports, January to December 2011

    Science.gov (United States)

    2015-12-01

    Volleyball .8Game(recess/camp/children) .9 Other Other sports E008.X .0 Boxing .1 Wrestling .2 Racquet/hand sports .3 Frisbee .4 Martial arts ...sports, followed by a mix of human movement activities, including walking/marching and climbing. In non-deployed the most frequently reported types...Cochrane Database of Systematic Reviews 2013, Issue 9. Art . No.: CD007146. 33. Osullivan JO, Wakai A, Osullivan RO, Luke C, Cusack S. Ladder Fall

  11. Efficacy of ‘hack and squirt’ application of imazapyr, triclopyr, and glyphosate to control the invasive tree species Chinese tallowtree

    Science.gov (United States)

    Charles A. Gresham

    2010-01-01

    In May 2005, 12 plots approximately 21 by 27 m each were established on the exterior bank of a dredge spoil area in Georgetown, SC. The tree cover was primarily Chinese tallowtree, but there were also live oak trees in each plot. Also in May 2005, Chinese tallowtree s (d.b.h. > 2.4 cm) in three randomly selected plots received a ‘hack and squirt’ application of...

  12. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    OpenAIRE

    Mehri Mowlaie; Setareh Jani

    2016-01-01

    Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597) junior and senior high school students (boys and girls) in academic year 2014-2015 in Ardabil, Iran. 38...

  13. Wrong intraocular lens events-what lessons have we learned? A review of incidents reported to the National Reporting and Learning System: 2010-2014 versus 2003-2010.

    Science.gov (United States)

    Steeples, L R; Hingorani, M; Flanagan, D; Kelly, S P

    2016-08-01

    PurposeTo identify the causal factors in wrong intraocular lens (IOL) events from a national data set and to compare with similar historical data (2003-2010) prior to mandatory checklist use, for the purpose of developing strategies to prevent never events.MethodsData from wrong IOL patient safety incidents (PSIs) submitted to the National Reporting and Learning System (2010-2014) were reviewed by thematic analysis and compared with the data previously collected by the group using the same methodology.ResultsOne hundred and seventy eight wrong IOL PSIs were identified. The contributory factors included: transcription errors (n=26); wrong patient biometry (n=21); wrong IOL selection (n=16); changes in planned procedure (n=16); incorrect IOL brought into theatre (n=11); left/right eye selection errors (n=9); communication errors (n=9); and positive/negative IOL power errors (n=9). In 44 PSIs, no causal factor was reported, limiting the learning value of such reports. Compared with the data from previous years, biometry errors were much reduced but IOL transcription and documentation errors were greater, particularly if further checks did not refer to the original source documentation. IOL exchange surgery was reported in 45 cases.ConclusionsThe selection and implantation of the correct IOL is a complex process which is not adequately addressed by existing checking procedures. Despite the introduction of surgical checklists, wrong IOL incidents continue to occur and are probably under-reported. Human or behavioural factors are heavily implicated in these errors and need to be addressed by novel approaches, including simulation training. There is also scope to further improve the quality and detail of incident reporting and analysis to enhance patient safety.

  14. Incidence, puberty, and fertility in 45,X/47,XXX mosaicism: Report of a patient and a literature review.

    Science.gov (United States)

    Lim, Han Hyuk; Kil, Hong Ryang; Koo, Sun Hoe

    2017-05-09

    Turner syndrome (TS), characterized by short stature and premature ovarian failure, is caused by chromosomal aberrations with total or partial loss of one of the two X chromosomes. Spontaneous puberty, menarche, and pregnancy occur in some patients depending on the abnormality of the X. Moreover, spontaneous pregnancy is uncommon (XXX karyotype is extremely rare. Previous reports have demonstrated that TS with 45,X/47,XXX is less severe than common TS due to higher occurrence of puberty (83%), menarche (57-67%), and fertility (14%) and lower occurrence of congenital anomalies (XXX mosaicism who presented with short stature. She showed mild TS phenotype including short stature but had spontaneous puberty. Based on our case and previous reports, we expect that girls with 45,X/47,XXX mosaicism may progress through puberty normally, without estrogen therapy. Therefore, it is necessary to consider specific guidelines for clinical decisions surrounding pubertal development and fertility in TS with 45,X/47,XXX karyotype. © 2017 Wiley Periodicals, Inc.

  15. Foodborne disease in Australia: incidence, notifications and outbreaks. Annual report of the OzFoodNet network, 2002.

    Science.gov (United States)

    2003-01-01

    In 2002, OzFoodNet continued to enhance surveillance of foodborne diseases across Australia. The OzFoodNet network expanded to cover all Australian states and territories in 2002. The National Centre for Epidemiology and Population Health together with OzFoodNet concluded a national survey of gastroenteritis, which found that there were 17.2 (95% C.I. 14.5-19.9) million cases of gastroenteritis each year in Australia. The credible range of gastroenteritis that may be due to food each year is between 4.0-6.9 million cases with a mid-point of 5.4 million. During 2002, there were 23,434 notifications of eight bacterial diseases that may have been foodborne, which was a 7.7 per cent increase over the mean of the previous four years. There were 14,716 cases of campylobacteriosis, 7,917 cases of salmonellosis, 505 cases of shigellosis, 99 cases of yersiniosis, 64 cases of typhoid, 62 cases of listeriosis, 58 cases of shiga toxin producing E. coli and 13 cases of haemolytic uraemic syndrome. OzFoodNet sites reported 92 foodborne disease outbreaks affecting 1,819 persons, of whom 5.6 per cent (103/1,819) were hospitalised and two people died. There was a wide range of foods implicated in these outbreaks and the most common agent was Salmonella Typhimurium. Sites reported two outbreaks with potential for international spread involving contaminated tahini from Egypt resulting in an outbreak of Salmonella Montevideo infection and an outbreak of suspected norovirus infection associated with imported Japanese oysters. In addition, there were three outbreaks associated with animal petting zoos or poultry hatching programs and 318 outbreaks of suspected person-to-person transmission. Sites conducted 100 investigations into clusters of gastrointestinal illness where a source could not be identified, including three multi-state outbreaks of salmonellosis. OzFoodNet identified important risk factors for foodborne disease infection, including: Salmonella infections due to chicken and

  16. Para-clinico-pathological observations of insidious incidence of canine hepatozoonosis from a mongrel dog: a case report.

    Science.gov (United States)

    Kaur, Paramjit; Deshmukh, S; Singh, Rajsukhbir; Bansal, B K; Randhawa, C S; Singla, L D

    2012-04-01

    A rare case of canine hepatozoonosis in a mongrel dog with para-clinico-pathological observations has been reported. The study included detailed haemato-biochemical changes at two stages, i.e. before treatment and after treatment with adopted therapy. Before therapy, blood picture revealed normocytic hypochromic anaemia and neutrophilic leucocytosis with variable counts of platelets. Thirty-seven percent of neutrophils were found infected with gametocytes of Hepatozoon canis. Following treatment, further decrease in haemoglobin value with a relative increase in lymphocyte count was seen. Biochemically, increase in alkaline phosphatase, blood urea nitrogen and creatinine levels along with hyperproteinemia was seen. The 14 days chemotherapy did not bring a respite for the dog and the level of parasitaemia was 33% after the treatment. The alkaline phosphatase and creatinine level further rose up following therapy with sulphadiazine and clindamycin. Continual study is required to explain the best possible therapeutic combination to deal H. canis.

  17. Intricate correlation between body posture, personality trait and incidence of body pain: a cross-referential study report.

    Directory of Open Access Journals (Sweden)

    Sylvain Guimond

    Full Text Available OBJECTIVE: Occupational back pain is a disorder that commonly affects the working population, resulting in disability, health-care utilization, and a heavy socioeconomic burden. Although the etiology of occupational pain remains largely unsolved, anecdotal evidence exists for the contribution of personality and posture to long-term pain management, pointing to a direct contribution of the mind-body axis. In the current study, we have conducted an extensive evaluation into the relationships between posture and personality. METHOD: We have sampled a random population of 100 subjects (50 men and 50 women in the age range of 13-82 years based on their personality and biomechanical profiles. All subjects were French-Canadian, living in Canada between the Québec and Sorel-Tracy areas. The Biotonix analyses and report were used on the subjects being tested in order to distinguish postural deviations. Personality was determined by using the Myers-Briggs Type Indicator questionnaire. RESULTS: We establish a correlation between ideal and kyphosis-lordosis postures and extraverted personalities. Conversely, our studies establish a correlative relationship between flat back and sway-back postures with introverted personalities. CONCLUSION: Overall, our studies establish a novel correlative relationship between personality, posture and pain.

  18. Concentrated bovine colostrum protein supplementation reduces the incidence of self-reported symptoms of upper respiratory tract infection in adult males.

    Science.gov (United States)

    Brinkworth, Grant D; Buckley, Jonathan D

    2003-08-01

    Anecdotal reports suggest that bovine colostrum may prevent upper respiratory tract infection (URTI). There is scant evidence to support such claims, although salivary IgA protects against URTI, and it was recently shown that bovine colostrum increases salivary IgA. The present invesigation examined whether concentrated bovine colostrum protein (CBC) affected the incidence or duration of self-reported symptoms of URTI in adult males. We examined logbooks containing self-reported symptoms of illness from previous studies which examined physiological effects of CBC. In these double-blind, placebo controlled studies, subjects had been randomly allocated to consume 60g. day(-1) of CBC (n = 93) or whey protein (WP) (n = 81) for eight weeks. Symptoms were coded using established criteria to identify those related to URTI. Since the incubation period for an URTI is up to five days, symptoms reported during the first week of supplementation (PRE-EXP) were analysed separately to preclude those arising from infection prior to study commencement. During PRE-EXP, there was no difference in the proportion of subjects taking the different supplements who reported symptoms of URTI (CBC, 11%,WP, 5%; 95% Confidence Interval (95% CI) -14% to 2%; P = 0.16). During the subsequent seven weeks (i. e. the experimental period), a significantly lesser proportion of subjects taking CBC reported symptoms of URTI compared with those taking WP (CBC, 32%,WP, 48%, P = 0.03; 95 % CI -30 % to -2 %), but symptom duration did not differ (CBC, 6.8 +/- 4.2 days,WP, 6.0 +/- 4.4 days; P = 0.27). This study provides preliminary evidence that CBC may enhance resistance to the development of symptoms of URTI.

  19. The association between incident self-reported fibromyalgia and nonpsychiatric factors: 25-years follow-up of the Adventist Health Study.

    Science.gov (United States)

    Choi, Chan-Jin; Knutsen, Raymond; Oda, Keiji; Fraser, Gary E; Knutsen, Synnove Fonnebo

    2010-10-01

    The purpose of the study was to investigate the association between incident self-reported fibromyalgia (FM) and prior somatic diseases, lifestyle factors, and health behaviors among 3,136 women who participated in 2 cohort studies 25 to 26 years apart (the Adventist Health Study 1 and 2). The women completed a comprehensive lifestyle and medical history questionnaire at baseline in 1976. Information on new diagnosis of doctor-told FM was obtained at the second survey in 2002. A total of 136 women reported a diagnosis of FM during 25 years of follow-up, giving a period incidence of 43/1,000 or 1.72/1000 per year. In multivariable logistic regression analyses, a significant, dose-response association was found with number of allergies with OR of 1.61 (95% CI: .92-2.83) and 3.99 (95% CI: 2.31-6.88), (P[trend] < .0001), respectively, for 1 and 2 or more allergies versus none. A history of hyperemesis gravidarum was also associated with FM with OR of 1.32 (95% CI: .75-2.32) and 1.73 (95% CI: .99-3.03), (P[trend] < .05), respectively, for some or all pregnancies versus none. A positive association with smoking was also found with OR of 2.37 (95% CI: 1.33-4.23) for ever smokers versus never smokers. No significant association was found with number of surgeries, history of peptic ulcer, or taking medications to control various symptoms. Smoking as well as prevalent allergies, and a history of hyperemesis gravidarum, seem to predict development of FM in women during 25 years of follow-up. This information may help in identifying persons at high risk of developing FM and thus initiate effective prevention strategies. Copyright © 2010 American Pain Society. Published by Elsevier Inc. All rights reserved.

  20. APLICAÇÃO DO ÍNDICE DE HACK (SL A UM TRECHO DO RIO ZÊZERE, PORTUGAL

    Directory of Open Access Journals (Sweden)

    Daniel Vieira Souza

    2011-11-01

    Full Text Available Os perfis longitudinais de rios são sensíveis a movimentações tectônicas causando alterações no nível de base. Devido a isto, verifica-se incisão fluvial a montante de compartimentos abatidos e agradação a jusante de compartimentos levantados. Os canais fl uviais são dinâmicos e se modificam através da incisão e da agradação periódicas, o estudo destes processos reveste-se de grande importância na compreensão das alterações do relevo. A formação de vales encaixados com perfis típicos em V, ou o aparecimento de trechos de agradação pode ter origem em causas tectônicas, ou outras. Hack (1973 propôs um índice (stream-gradient index para detectar estas alterações em cursos fluviais, decorrentes de mudanças no substrato geológico, aporte de carga, ou tectonismo. O stream-gradient index, ou simplesmente índice SL, relação declive (slope vs. comprimento do curso (length. O presente trabalho objetiva identificar rupturas de declive, num trecho do rio Zêzere, afluente do rio Tejo. O rio Zêzere corre num vale encaixado no interior da Cordilheira Central Portuguesa. Para identificar as roturas de declive utilizou-se o perfil longitudinal, índice de Hack, SL (slope VS. Lenght. Como resultado foi possível detectar locais onde sofreram abatimentos tectônicos, principalmente entre Pedrógão e Bogas de Baixo, foi possível também observar a influência de processos de erosão diferencial e de soleiras Quartzíticas de Farjão a Sarzedas na regularização dos processos tectônicos a montante daqueles níveis de base locais.

  1. Study Progress in Germplasm Resources of Eremochloa ophiuroides (Munro.)Hack.%假俭草(Eremochloa ophiuroides(Munro.)Hack.)种质资源改良研究进展

    Institute of Scientific and Technical Information of China (English)

    郑玉红; 刘建秀

    2004-01-01

    假俭草(Eremochloa ophiuroides(Munro.)Hack.)是主产于中国的世界著名的暖季型草坪草.全面系统地研究假俭草在遗传多样性和抗性生理等各方面的变异变化规律对于开发利用假俭草种质资源具有十分重要的意义.在综述假俭草种质资源的收集、整理和初步评价的基础上,重点介绍了近年来国内外在其遗传多样性(包括形态水平、细胞水平和分子水平)、抗性生理、育种进程和栽培管理措施等方面的研究进展.

  2. Hacking the thylakoid proton motive force for improved photosynthesis: modulating ion flux rates that control proton motive force partitioning into Δψ and ΔpH.

    Science.gov (United States)

    Davis, Geoffry A; Rutherford, A William; Kramer, David M

    2017-09-26

    There is considerable interest in improving plant productivity by altering the dynamic responses of photosynthesis in tune with natural conditions. This is exemplified by the 'energy-dependent' form of non-photochemical quenching (qE), the formation and decay of which can be considerably slower than natural light fluctuations, limiting photochemical yield. In addition, we recently reported that rapidly fluctuating light can produce field recombination-induced photodamage (FRIP), where large spikes in electric field across the thylakoid membrane (Δψ) induce photosystem II recombination reactions that produce damaging singlet oxygen ((1)O2). Both qE and FRIP are directly linked to the thylakoid proton motive force (pmf), and in particular, the slow kinetics of partitioning pmf into its ΔpH and Δψ components. Using a series of computational simulations, we explored the possibility of 'hacking' pmf partitioning as a target for improving photosynthesis. Under a range of illumination conditions, increasing the rate of counter-ion fluxes across the thylakoid membrane should lead to more rapid dissipation of Δψ and formation of ΔpH. This would result in increased rates for the formation and decay of qE while resulting in a more rapid decline in the amplitudes of Δψ-spikes and decreasing (1)O2 production. These results suggest that ion fluxes may be a viable target for plant breeding or engineering. However, these changes also induce transient, but substantial mismatches in the ATP : NADPH output ratio as well as in the osmotic balance between the lumen and stroma, either of which may explain why evolution has not already accelerated thylakoid ion fluxes. Overall, though the model is simplified, it recapitulates many of the responses seen in vivo, while spotlighting critical aspects of the complex interactions between pmf components and photosynthetic processes. By making the programme available, we hope to enable the community of photosynthesis researchers to

  3. The Regressivity of the Property Tax. The Incidence of the Property Tax Under Alternative Assumptions of Incidence in Four States--Connecticut, Minnesota, Missouri and South Dakota. Report No. F76-4.

    Science.gov (United States)

    Odden, Allan; Vincent, Phillip E.

    This booklet summarizes the recent debate over the regressivity or progressivity of the property tax and presents some evidence on how the property tax burden is distributed among income classes. Section 1 discusses property tax incidence under both the conventional and new economic views. Discussed specifically are the conditions under which…

  4. Using hacked point and shoot cameras for time-lapse snow cover monitoring in an Alpine valley

    Science.gov (United States)

    Weijs, S. V.; Diebold, M.; Mutzner, R.; Golay, J. R.; Parlange, M. B.

    2012-04-01

    In Alpine environments, monitoring snow cover is essential get insight in the hydrological processes and water balance. Although measurement techniques based on LIDAR are available, their cost is often a restricting factor. In this research, an experiment was done using a distributed array of cheap consumer cameras to get insight in the spatio-temporal evolution of snowpack. Two experiments are planned. The first involves the measurement of eolic snow transport around a hill, to validate a snow saltation model. The second monitors the snowmelt during the melting season, which can then be combined with data from a wireless network of meteorological stations and discharge measurements at the outlet of the catchment. The poster describes the hardware and software setup, based on an external timer circuit and CHDK, the Canon Hack Development Kit. This latter is a flexible and developing software package, released under a GPL license. It was developed by hackers that reverse engineered the firmware of the camera and added extra functionality such as raw image output, more full control of the camera, external trigger and motion detection, and scripting. These features make it a great tool for geosciences. Possible other applications involve aerial stereo photography, monitoring vegetation response. We are interested in sharing experiences and brainstorming about new applications. Bring your camera!

  5. Sécurité informatique ethical hacking : apprendre l'attaque pour mieux se défendre

    CERN Document Server

    ACISSI

    2009-01-01

    Ce livre sur la sécurité informatique (et le ethical hacking) s'adresse à tout utilisateur d'ordinateur sensibilisé au concept de la sécurité informatique. Il a pour objectif d'initier le lecteur aux techniques des attaquants pour lui apprendre comment se défendre. ACISSI (Audit, Conseil, Installation et Sécurisation des Systèmes d'Information) est une association à but non lucratif qui forme et conseille, depuis plusieurs années, sur les enjeux de la sécurité informatique. Les auteurs de ce livre sont bien sûr membres actifs de l'association, chacun détenteur d'une spécialité, et forment une équipe de personnes de conviction qui se donnent pour mission de rendre la sécurité informatique accessible à tous : ""apprendre l'attaque pour mieux se défendre"" est leur adage. Hackers blancs dans l'âme, ils ouvrent au lecteur les portes de la connaissance underground. Aperçu de la table des matières : Introduction et Définitions - La méthodologie d'une attaque - Le Social Engineering - Les ...

  6. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    Science.gov (United States)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  7. 黑客入侵技术分析及防范对策%Hacking technology analysis and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    曹弘毅

    2014-01-01

    当今社会,随着互联网技术的突飞猛进,计算机网络安全问题存在着各种各样的威胁,其中对互联网威胁最为严重的就是黑客,随着黑客的入侵手段和方式不断变异,致使黑客犯罪越来越猖狂,给打击黑客犯罪的带来了更大的困难。本文主要对黑客入侵的技术方法进行分析,并提出防范和控制黑客入侵的对策。%In today's society,with make a spurt of progress of Internet technology,computer network security problems exist in all kinds of threats,including threats to the Internet is the most serious hacker hackers,with the means and methods of continuous variation,the hacker crime increasingly rampant,more difficult to combat hackers crime. This paper mainly carries on the analysis to the technology and methods of the hack,and puts forward the countermeasures to prevent and control the hacker.

  8. Incidence, management, and reporting of severe and fatal Plasmodium falciparum malaria in secondary and tertiary health facilities of Alipurduar, India in 2009.

    Science.gov (United States)

    Sarkar, Jagannath; Shah, Naman K; Murhekar, Manoj V

    2012-09-01

    The proportion of malaria cases that are complicated and fatal are not well described in India. Alipurduar sub-division of Jalpaiguri district in West Bengal is highly endemic for malaria. We constructed a retrospective cohort of severe malaria patients admitted in the secondary and tertiary care facilities in Alipurduar to determine the incidence, assess the management, and evaluate the reporting of severe and fatal malaria. We reviewed routine surveillance data and the case records of all the malaria patients admitted in all secondary and tertiary care facilities, both public and private. We defined severe malaria cases as Plasmodium falciparum infection with clinical signs and symptoms of organ involvement in a resident of Alipurduar admitted during January to December 2009. We compared clinical and demographic characteristics of severe malaria cases that died with those who survived. We also reviewed human resources and laboratory facilities available for the treatment of severe malaria in these health facilities. During 2009, 6191 cases of P. falciparum in Alipurduar were reported to the malaria surveillance system. We identified 336 (5.4%) cases of severe malaria among which 33 (9.8%) patients died. Four malaria deaths were also recorded from primary health centres. Only 17 of the 37 (46%) total deaths recorded were reported to the routine surveillance system. Most severe cases were males (65%), aged >15 years (72%), and nearly half were admitted to secondary care hospitals (48%). In multivariate analysis, the risk factors associated with death included increased delay fever onset and hospitalization, treatment in a secondary level hospital, younger age, and multi-organ involvement. The secondary level public hospital had too few physicians and nurses for supporting severe malaria patients as well as inadequate laboratory facilities for monitoring such patients. Severe and fatal malaria continue to burden Alipurduar and record keeping in health facilities was

  9. Police Incident Blotter (30 Day)

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — The 30 Day Police Blotter contains the most recent initial crime incident data, updated on a nightly basis. All data is reported at the block/intersection level,...

  10. USFA NFIRS 2013 Fire Incident & Cause Data

    Data.gov (United States)

    Department of Homeland Security — The 2013 Fire Causes & Incident data was provided by the U.S. Fire Administration’s (USFA) National Fire Data Center’s (NFDC’s) National Fire Incident Reporting...

  11. The incidence of transient neurologic syndrome after spinal anesthesia with lidocaine or bupivacaine: The effects of needle type and surgical position: brief report

    Directory of Open Access Journals (Sweden)

    Etezadi F

    2011-10-01

    Full Text Available "nBurning Transient Neurologic Syndrome (TNS which was first described by Schneider et al in 1993, is defined as a transient pain and dysesthesia in waist, buttocks and the lower limbs after spinal anesthesia.1,2 The incidence of TNS after spinal anesthesia with lidocaine is reported to be as high as 10-40%.3,4 This prospective study was designed to determine the incidence of TNS with two different types of drugs, lidocaine and bupivacaine, in lithotomy or supine positions as the primary outcomes and to determine the association between two different types of needles and surgical positions with the occurrence of TNS as the secondary outcome."nThe present study was conducted on 250 patients (ASA I-II, aged 18-60 years old, who were candidates for surgery in supine or lithotomy positions. According to the needle type (Sprotte or Quincke and the local anesthetic (lidocaine or bupivacaine all patients were randomly divided into four groups. After establishing standard monitoring, spinal anesthesia was performed in all sitting patients by attending anesthesiologists at L2-L3 or L3-L4 levels. The patients were placed in supine or lithotomy position, in regards to the surgical procedure. During the first three postoperative days, patients were observed for post spinal anesthesia complications, especially TNS. Any sensation of pain, dysesthesia, paresthesia or hyperalgesia in the low back area, buttocks, the anterior or posterior thigh, knees, either foot or both feet were recorded. Moreover, duration of pain, its radiation and its relation to sleep and the patients' position were all carefully considered. Ultimately, the patients' response to opioid (pethidine for analgesia was determined."nThe incidence of TNS was higher when spinal anesthesia was induced with lidocaine (68% vs. 22%, P=0.003. TNS developed in 85% of the patients in lidocaine group and 58% in bupivacaine group after surgery in lithotomy position (P=0.002. In 77 patients pain

  12. Comparing electronic news media reports of potential bioterrorism-related incidents involving unknown white powder to reports received by the United States Centers for Disease Control and Prevention and the Federal Bureau of Investigation: U.S.A., 2009-2011.

    Science.gov (United States)

    Fajardo, Geroncio C; Posid, Joseph; Papagiotas, Stephen; Lowe, Luis

    2015-01-01

    There have been periodic electronic news media reports of potential bioterrorism-related incidents involving unknown substances (often referred to as "white powder") since the 2001 intentional dissemination of Bacillus anthracis through the U.S. Postal System. This study reviewed the number of unknown "white powder" incidents reported online by the electronic news media and compared them with unknown "white powder" incidents reported to the U.S. Centers for Disease Control and Prevention (CDC) and the U.S. Federal Bureau of Investigation (FBI) during a 2-year period from June 1, 2009 and May 31, 2011. Results identified 297 electronic news media reports, 538 CDC reports, and 384 FBI reports of unknown "white powder." This study showed different unknown "white powder" incidents captured by each of the three sources. However, the authors could not determine the public health implications of this discordance.

  13. SeaWIFS Postlaunch Technical Report Series. Volume 13; The SeaWiFS Photometer Revision for Incident Surface Measurement (SeaPRISM) Field Commissioning

    Science.gov (United States)

    Hooker, Stanford B. (Editor); Zibordi, Giuseppe; Berthon, Jean-Francois; Bailey, Sean W.; Pietras, Christophe M.; Firestone, Elaine R. (Editor)

    2000-01-01

    This report documents the scientific activities that took place at the Acqua Alta Oceanographic Tower (AAOT) in the northern Adriatic Sea off the coast of Italy from 2-6 August 1999. The ultimate objective of the field campaign was to evaluate the capabilities of a new instrument called the SeaWiFS Photometer Revision for Incident Surface Measurements (SeaPRISM). SeaPRISM is based on a CE-318 sun photometer made by CIMEL Electronique (Paris, France). The CE-318 is an automated, robotic system which measures the direct sun irradiance plus the sky radiance in the sun plane and in the almucantar plane. The data are transmitted over a satellite link, and this remote operation capability has made the device very useful for atmospheric measurements. The revision to the CE-318 that makes the instrument potentially useful for SeaWiFS calibration and validation activities is to include a capability for measuring the radiance leaving the sea surface in wavelengths suitable for the determination of chlorophyll a concentration. The initial evaluation of this new capability involved above- and in-water measurement protocols. An intercomparison of the water-leaving radiances derived from SeaPRISM and an in-water system showed the overall spectral agreement was approximately 8.6%, but the blue-green channels intercompared at the 5% level. A blue-green band ratio comparison was at the 4% level.

  14. Association between isotretinoin use and central retinal vein occlusion in an adolescent with minor predisposition for thrombotic incidents: a case report

    Directory of Open Access Journals (Sweden)

    Labiris Georgios

    2009-02-01

    Full Text Available Abstract Introduction We report an adolescent boy with minimal pre-existing risk for thromboses who suffered central retinal vein occlusion associated with isotretinoin use for acne. To the best of our knowledge, this is the first well documented case of this association. Case presentation An otherwise healthy 17-year-old white man who was treated with systemic isotretinoin for recalcitrant acne was referred with central retinal vein occlusion in one eye. Although a detailed investigation was negative, DNA testing revealed that the patient was a heterozygous carrier of the G20210A mutation of the prothrombin gene. Despite the fact that this particular mutation is thought to represent only a minor risk factor for thromboses, it is probable that isotretinoin treatment greatly increased the risk of a vaso-occlusive incident in this patient. Conclusion Isotretinoin use may be associated with sight- and life-threatening thrombotic adverse effects even in young patients with otherwise minimal thrombophilic risk. Physicians should be aware of such potential dangers.

  15. Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software

    Directory of Open Access Journals (Sweden)

    Ariel Giannone

    2017-01-01

    Full Text Available Debido al crecimiento exponencial de Internet y a que las organizaciones poseen cada vez mas información, se hace imprescindible bloquear y eliminar todas las intrusiones posibles. Gracias al hacking ético es posible detectar y corregir algunas de las vulnerabilidades antes que el sistema salga a la luz. Con el fin de mejorar este proceso se intentan incluir estas técnicas y métodos en el proceso tradicional de testing de software dentro de las organizaciones.

  16. Cyber Incidents Involving Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this

  17. Cyber-Security Concerns Mount as Student Hacking Hits Schools: Districts Straining to Safeguard Online Networks

    Science.gov (United States)

    Borja, Rhea R.

    2006-01-01

    While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…

  18. Cyber-Security Concerns Mount as Student Hacking Hits Schools: Districts Straining to Safeguard Online Networks

    Science.gov (United States)

    Borja, Rhea R.

    2006-01-01

    While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…

  19. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants

    Science.gov (United States)

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings. PMID:27242491

  20. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants.

    Science.gov (United States)

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders-attention to detail and systemizing-may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

  1. Influence of a Weak Field of Pulsed DC Electricity on the Behavior and Incidence of Injury in Adult Steelhead and Pacific Lamprey, Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Mesa, Matthew

    2009-02-13

    Predation by pinnipeds, such as California sea lions Zalophus californianus, Pacific harbor seals Phoca vitulina, and Stellar sea lions Eumetopias jubatus on adult Pacific salmon Oncorhynchus spp in the lower Columbia River has become a serious concern for fishery managers trying to conserve and restore runs of threatened and endangered fish. As a result, Smith-Root, Incorporated (SRI; Vancouver, Washington), manufacturers of electrofishing and closely-related equipment, proposed a project to evaluate the potential of an electrical barrier to deter marine mammals and reduce the amount of predation on adult salmonids (SRI 2007). The objectives of their work were to develop, deploy, and evaluate a passive, integrated sonar and electric barrier that would selectively inhibit the upstream movements of marine mammals and reduce predation, but would not injure pinnipeds or impact anadromous fish migrations. However, before such a device could be deployed in the field, concerns by regional fishery managers about the potential effects of such a device on the migratory behavior of Pacific salmon, steelhead O. mykiss, Pacific lampreys Entoshpenus tridentata, and white sturgeon Acipenser transmontanus, needed to be addressed. In this report, we describe the results of laboratory research designed to evaluate the effects of prototype electric barriers on adult steelhead and Pacific lampreys. The effects of electricity on fish have been widely studied and include injury or death (e.g., Sharber and Carothers 1988; Dwyer et al. 2001; Snyder 2003), physiological dysfunction (e.g., Schreck et al. 1976; Mesa and Schreck 1989), and altered behavior (Mesa and Schreck 1989). Much of this work was done to investigate the effects of electrofishing on fish in the wild. Because electrofishing operations would always use more severe electrical settings than those proposed for the pinniped barrier, results from these studies are probably not relevant to the work proposed by SRI. Field

  2. Performance of the Hack's Impairment Index Score: A Novel Tool to Assess Impairment from Alcohol in Emergency Department Patients.

    Science.gov (United States)

    Hack, Jason B; Goldlust, Eric J; Ferrante, Dennis; Zink, Brian J

    2017-07-30

    Over 35 million alcohol-impaired (AI) patients are cared for in emergency departments (EDs) annually. Emergency physicians are charged with ensuring AI patients' safety by identifying resolution of alcohol-induced impairment. The most common standard evaluation is an extemporized clinical examination, as ethanol levels are not reliable or predictive of clinical symptoms. There is no standard assessment of ED AI patients. The objective was to evaluate a novel standardized ED assessment of alcohol impairment, Hack's Impairment Index (HII score), in a busy urban ED. A retrospective chart review was performed for all AI patients seen in our busy urban ED over 24 months. Trained nurses evaluated AI patients with both "usual" and HII score every 2 hours. Patients were stratified by frequency of visits for AI during this time: high (≥ 6), medium (2-5), and low (1). Within each category, comparisons were made between HII scores, measured ethanol levels, and usual nursing assessment of AI. Changes in HII scores over time were also evaluated. A total of 8,074 visits from 3,219 unique patients were eligible for study, including 7,973 (98.7%) with ethanol levels, 5,061 (62.7%) with complete HII scores, and 3,646 (45.2%) with health care provider assessments. Correlations between HII scores and ethanol levels were poor (Pearson's R(2)  = 0.09, 0.09, and 0.17 for high-, medium-, and low-frequency strata). HII scores were excellent at discriminating nursing assessment of AI, while ethanol levels were less effective. Omitting extrema, HII scores fell consistently an average 0.062 points per hour, throughout patients' visits. The HII score applied a quantitative, objective assessment of alcohol impairment. HII scores were superior to ethanol levels as an objective clinical measure of impairment. The HII declines in a reasonably predictable manner over time, with serial evaluations corresponding well with health care provider evaluations. © 2017 by the Society for Academic

  3. Nephrogenic systemic fibrosis: change in incidence following a switch in gadolinium agents and adoption of a gadolinium policy--report from two U.S. universities.

    Science.gov (United States)

    Altun, Ersan; Martin, Diego R; Wertman, Rebecca; Lugo-Somolinos, Aida; Fuller, Edwin R; Semelka, Richard C

    2009-12-01

    To determine the incidence of nephrogenic systemic fibrosis (NSF) in tertiary care centers of two U.S. universities following the switch from the use of gadodiamide to gadobenate dimeglumine and gadopentetate dimeglumine, and the adoption of restrictive gadolinium-based contrast agent (GBCA) policies. Institutional review board approval with waiver of informed consent was obtained for this Health Insurance Portability and Accountability Act-compliant retrospective study. NSF patients were identified between January 2000 and December 2006 at center A and between October 2003 and February 2007 at center B (preadoption periods); and from June 2007 to June 2008 at both centers (postadoption period). The numbers of patients who underwent gadolinium-enhanced magnetic resonance at each center, patients at risk for NSF at center A, and dialysis patients at center B were identified in the pre- and postadoption periods. Gadodiamide was the only agent used in the preadoption period. Gadobenate dimeglumine and gadopentetate dimeglumine were the agents used in the postadoption period. A restrictive GBCA policy that limits the use and dose of GBCAs in patients with risk factors was adopted in the postadoption period. Follow-up lasted 9 months from July 2008 to March 2009. Corresponding incidences were determined and compared with the Fisher exact test. Respective total benchmark incidence of NSF at both centers, at-risk incidence of NSF at center A, and dialysis incidence of NSF at center B were 37 of 65 240, 28 of 925, and nine of 312 in the preadoption period and zero of 25 167, zero of 147, and zero of 402 in the postadoption period. All three incidences demonstrated significant differences (P < .0001, .024, and .001, respectively) between the pre- and postadoption periods. Following the switch from gadodiamide to gadobenate dimeglumine and gadopentetate dimeglumine, and the adoption of restrictive GBCA policies, no NSF cases were observed at either center.

  4. Scanning electron microscopy analysis of experimental bone hacking trauma of the mandible.

    Science.gov (United States)

    Alunni-Perret, Véronique; Borg, Cybèle; Laugier, Jean-Pierre; Bertrand, Marie-France; Staccini, Pascal; Bolla, Marc; Quatrehomme, Gérald; Muller-Bolla, Michèle

    2010-12-01

    The authors report on a macroscopic and microscopic study of human mandible bone lesions achieved by a single-blade knife and a hatchet. The aim of this work was to complete the previous data (scanning electron microscopy analysis of bone lesions made by a single-blade knife and a hatchet, on human femurs) and to compare the lesions of the femur with those of the mandible. The results indicate that the mandible is a more fragile bone, but the features observed on the mandible are quite similar to those previously observed on the femur. This work spells out the main scanning electron microscopy characteristics of sharp (bone cutting) and blunt (exerting a pressure on the bone) mechanisms on human bone. Weapon characteristics serve to explain all of these features.

  5. Decreasing incidence rates of bacteremia

    DEFF Research Database (Denmark)

    Nielsen, Stig Lønberg; Pedersen, C; Jensen, T G

    2014-01-01

    BACKGROUND: Numerous studies have shown that the incidence rate of bacteremia has been increasing over time. However, few studies have distinguished between community-acquired, healthcare-associated and nosocomial bacteremia. METHODS: We conducted a population-based study among adults with first......-time bacteremia in Funen County, Denmark, during 2000-2008 (N = 7786). We reported mean and annual incidence rates (per 100,000 person-years), overall and by place of acquisition. Trends were estimated using a Poisson regression model. RESULTS: The overall incidence rate was 215.7, including 99.0 for community......-acquired, 50.0 for healthcare-associated and 66.7 for nosocomial bacteremia. During 2000-2008, the overall incidence rate decreased by 23.3% from 254.1 to 198.8 (3.3% annually, p bacteremia decreased by 25.6% from 119.0 to 93.8 (3.7% annually, p

  6. Increasing incidence of chronic graft-versus-host disease in allogeneic transplantation: a report from the Center for International Blood and Marrow Transplant Research.

    Science.gov (United States)

    Arai, Sally; Arora, Mukta; Wang, Tao; Spellman, Stephen R; He, Wensheng; Couriel, Daniel R; Urbano-Ispizua, Alvaro; Cutler, Corey S; Bacigalupo, Andrea A; Battiwalla, Minoo; Flowers, Mary E; Juckett, Mark B; Lee, Stephanie J; Loren, Alison W; Klumpp, Thomas R; Prockup, Susan E; Ringdén, Olle T H; Savani, Bipin N; Socié, Gérard; Schultz, Kirk R; Spitzer, Thomas; Teshima, Takanori; Bredeson, Christopher N; Jacobsohn, David A; Hayashi, Robert J; Drobyski, William R; Frangoul, Haydar A; Akpek, Görgün; Ho, Vincent T; Lewis, Victor A; Gale, Robert Peter; Koreth, John; Chao, Nelson J; Aljurf, Mahmoud D; Cooper, Brenda W; Laughlin, Mary J; Hsu, Jack W; Hematti, Peiman; Verdonck, Leo F; Solh, Melhelm M; Norkin, Maxim; Reddy, Vijay; Martino, Rodrigo; Gadalla, Shahinaz; Goldberg, Jenna D; McCarthy, Philip L; Pérez-Simón, José A; Khera, Nandita; Lewis, Ian D; Atsuta, Yoshiko; Olsson, Richard F; Saber, Wael; Waller, Edmund K; Blaise, Didier; Pidala, Joseph A; Martin, Paul J; Satwani, Prakash; Bornhäuser, Martin; Inamoto, Yoshihiro; Weisdorf, Daniel J; Horowitz, Mary M; Pavletic, Steven Z

    2015-02-01

    Although transplant practices have changed over the last decades, no information is available on trends in incidence and outcome of chronic graft-versus-host disease (cGVHD) over time. This study used the central database of the Center for International Blood and Marrow Transplant Research (CIBMTR) to describe time trends for cGVHD incidence, nonrelapse mortality, and risk factors for cGVHD. The 12-year period was divided into 3 intervals, 1995 to 1999, 2000 to 2003, and 2004 to 2007, and included 26,563 patients with acute leukemia, chronic myeloid leukemia, and myelodysplastic syndrome. Multivariate analysis showed an increased incidence of cGVHD in more recent years (odds ratio = 1.19, P < .0001), and this trend was still seen when adjusting for donor type, graft type, or conditioning intensity. In patients with cGVHD, nonrelapse mortality has decreased over time, but at 5 years there were no significant differences among different time periods. Risk factors for cGVHD were in line with previous studies. This is the first comprehensive characterization of the trends in cGVHD incidence and underscores the mounting need for addressing this major late complication of transplantation in future research. Copyright © 2015 American Society for Blood and Marrow Transplantation. All rights reserved.

  7. Leukaemia incidence and survival in children and adolescents in Europe during 1978-1997. Report from the Automated Childhood Cancer Information System project

    NARCIS (Netherlands)

    Coebergh, J. W. W.; Reedijk, A. M. J.; de Vries, E.; Martos, C.; Jakab, Z.; Steliarova-Foucher, E.; Kamps, W. A.

    2006-01-01

    Leukaemias constitute approximately one-third of cancers in children (age 0-14 years) and 10% in adolescents (age 15-19 years). Geographical patterns (1988-1997) and time trends (1978-1997) of incidence and survival from leukaemias in children (n = 29,239) and adolescents (n = 1929) were derived fro

  8. Quantum hacking on a practical continuous-variable quantum cryptosystem by inserting an external light

    Science.gov (United States)

    Qin, Hao; Kumar, Rupesh; Alleaume, Romain

    2015-10-01

    We report here a new side channel attack on a practical continuous-variable (CV) quantum key distribution (QKD) system. Inspired by blinding attack in discrete-variable QKD, we formalize an attack strategy by inserting an external light into a CV QKD system implemented Gaussian-modulated coherent state protocol and show that our attack can compromise its practical security. In this attack, we concern imperfections of a balanced homodyne detector used in CV QKD. According to our analysis, if one inserts an external light into Bob's signal port, due to the imperfect subtraction from the homodyne detector, the leakage of the external light contributes a displacement on the homodyne signal which causes detector electronics saturation. In consequence, Bob's quadrature measurement is not linear with the quadrature sent by Alice. By considering such vulnerability, a potential Eve can launch a full intercept-resend attack meanwhile she inserts an external light into Bob's signal port. By selecting proper properties of the external light, Eve actively controls the induced displacement value from the inserted light which results saturation of homodyne detection. In consequence, Eve can bias the excess noise due to the intercept-resend attack and the external light, such that Alice and Bob believe their excess noise estimation is below the null key threshold and they can still share a secret key. Our attack shows that the detector loopholes also exist in CV QKD, and it seems influence all the CV QKD systems using homodyne detection, since all the practical detectors have finite detection range.

  9. Incidence of and survival after glottic squamous cell carcinoma in Denmark from 1971 to 2011-A report from the Danish Head and Neck Cancer Group

    DEFF Research Database (Denmark)

    Lyhne, Nina Munk; Johansen, Jørgen; Kristensen, Claus Andrup

    2016-01-01

    .4 to 0.6). The 5-year DSM was 16% (15–17%) and the 5-year OS was 63% (61–64). The hazard rate of DSM adjusted for patient characteristics, tumour characteristics and waiting-time was significantly lower in the 2000s (p ...Aim To describe the incidence, disease-specific mortality (DSM), and overall survival (OS) of patients with glottic squamous cell carcinomas (SCC) in Denmark from 1971–2011 in a national population-based cohort of consecutive patients. Materials and methods All patients diagnosed with glottic SCC...... and national registries. Results In total 5132 patients with glottic SCC were included. The yearly number of new cases increased from 107 in the 1970s to 139 in the 2000s. Overall, the incidence increased from 1.9 to 2.6 per 100,000, with a more prominent increase in men (3.5 to 4.7) compared with women (0...

  10. Computer Simulation for Emergency Incident Management

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L

    2004-12-03

    This report describes the findings and recommendations resulting from the Department of Homeland Security (DHS) Incident Management Simulation Workshop held by the DHS Advanced Scientific Computing Program in May 2004. This workshop brought senior representatives of the emergency response and incident-management communities together with modeling and simulation technologists from Department of Energy laboratories. The workshop provided an opportunity for incident responders to describe the nature and substance of the primary personnel roles in an incident response, to identify current and anticipated roles of modeling and simulation in support of incident response, and to begin a dialog between the incident response and simulation technology communities that will guide and inform planned modeling and simulation development for incident response. This report provides a summary of the discussions at the workshop as well as a summary of simulation capabilities that are relevant to incident-management training, and recommendations for the use of simulation in both incident management and in incident management training, based on the discussions at the workshop. In addition, the report discusses areas where further research and development will be required to support future needs in this area.

  11. Incident Information Management Tool

    CERN Document Server

    Pejovic, Vladimir

    2015-01-01

    Flaws of\tcurrent incident information management at CMS and CERN\tare discussed. A new data\tmodel for future incident database is\tproposed and briefly described. Recently developed draft version of GIS-­‐based tool for incident tracking is presented.

  12. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    as musician and performer or meets him as teacher, lecturer, or mediator of thoughts on computer music. Goodiepal advocates a new computer music of the future – Radical Computer Music, which is not dependent on existing or soon to be software and technologies, but which is executed e.g. by working...... with handwritten scores not readable for existing computer technology. Hereby Radical Computer Music encourages utopia and dialogue with artificial and alternative intelligences. The project has been presented and discussed through Goodiepal’s teaching at the Academy of Music, Aarhus, in various lecture-performances......), and to previous discussions within the field of electro acoustic music, in which technology, future and utopia also have been countlessly addressed. Inspired by one of Goodiepal’s former students Morten Riis, who is now devoting his artistic work to the theoretical field of media archaeology, I will finally raise...

  13. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    with handwritten scores not readable for existing computer technology. Hereby Radical Computer Music encourages utopia and dialogue with artificial and alternative intelligences. The project has been presented and discussed through Goodiepal’s teaching at the Academy of Music, Aarhus, in various lecture...

  14. hack/Link

    Institute of Scientific and Technical Information of China (English)

    周+1

    2010-01-01

    你要敲哪扇门?“漫游猛敲门”已经开通“动漫点播”。你想了解哪部动漫或诚心推荐一部心爱的作品吗?赶快填写调查表吧!只要你推荐或建议的动漫专题刊登在本栏目,就有机会获得猪齿大礼包一份!

  15. .hack//Link

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    首先要说的是.这是一部剧情意义远大于实际游戏内容的作品.因此在制作本篇攻略时,笔者采用了剧情为主、攻略为辅的写作方法。其次,熟悉《.hack》的玩家应该清楚,系列的故事背景实在是太过庞大,作为完结篇的《hack,//Link))即便对整个系列进行了概括性的回顾,也依然很多重要剧情无法顾及。另外,制作小组对于系列作品的艺术加工,希望FANS能以宽容的心态去面对。

  16. Ajax hacking with XSS

    Institute of Scientific and Technical Information of China (English)

    梦之光芒(Monyer)

    2006-01-01

    在十期发表《Ajax hacking》后.网友给我的反馈中关于XSS技术方面的问题主要有以下几个为什么在Ajaxhacking中使用XSS?它与传统的XSS又有什么区别?它们各有怎么样的利弊端?大型网站的所谓的XSS漏洞是否为鸡肋?下面我们一起来详细分析一下。

  17. .hack//Link

    Institute of Scientific and Technical Information of China (English)

    九兵卫

    2009-01-01

    由空架的网络游戏世界“The World”中各类变异的出现作为整个游戏的主线,早在PS2上的作品便以其独特的世界观吸引了一大批玩家,其后推出了动画、小说之类的周边。各代中的登场人物都有着一定的联系,在“The World”这个虚拟的游戏世界中展开不同的冒险之旅。

  18. #HackLibSchool

    Directory of Open Access Journals (Sweden)

    Micah Vandegrift

    2010-10-01

    Full Text Available In the Library with the Lead Pipe welcomes guest poster Micah Vandegrift. Micah is a graduate student in Library and Information Studies at Florida State University. He currently lives in Brooklyn, NY, and is interning at the Brooklyn Public Library. Micah’s education has focused on 20th century American culture, digital media and the humanities and [...

  19. Smart Home Hacking

    OpenAIRE

    Kodra, Suela

    2016-01-01

    Smart Home is an intelligent home equipped with devices and communications systems that enables the residents to connect and control their home appliances and systems. This technology has changed the way a consumer interacts with his home, enabling more control and convenience. Another advantage of this technology is the positive impact it has on savings on energy and other resources. However, despite the consumer's excitement about smart home, security and privacy have shown to be the strong...

  20. Hacking the Kinect

    CERN Document Server

    Kramer, Jeff; Castro, Daniel; Burrus, Nicolas; Echtler, Florian

    2012-01-01

    Plays to a fast-growing audience of tech-savvy artists, hobbyists, electronic and software enthusiasts. Takes advantage of the firestorm of interest in what is said to be the fastest-selling electronic gadget of all time. Lead author is a robotics expert from the National Robotics Engineering Center.

  1. P-hacking.

    Science.gov (United States)

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Sarode, Gargi

    2017-08-01

    Due to increasing rate of research articles getting published in recent times, medical science is evolving very fast. Open access policies of the journals make information easily available to the stakeholders for building future research proposal. Blindly having faith in whatever is published in the literature is detrimental for science; however, it is hard to find out the correctness of the data analysis.

  2. Hacking the Matrix.

    Science.gov (United States)

    Czerwinski, Michael; Spence, Jason R

    2017-01-05

    Recently in Nature, Gjorevski et al. (2016) describe a fully defined synthetic hydrogel that mimics the extracellular matrix to support in vitro growth of intestinal stem cells and organoids. The hydrogel allows exquisite control over the chemical and physical in vitro niche and enables identification of regulatory properties of the matrix. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    2013-01-01

    The article is a discussion of works by two Danish composers who both, with self-constructed instruments challenge computer music both as genre, the understanding and use of conventional technology and the relation to history. At first glance, the use of the homemade instruments appears as a common...

  4. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    2013-01-01

    The article is a discussion of works by two Danish composers who both, with self-constructed instruments challenge computer music both as genre, the understanding and use of conventional technology and the relation to history. At first glance, the use of the homemade instruments appears as a comm...

  5. Flow: Cut and Hack

    Directory of Open Access Journals (Sweden)

    Bárbara Sainza Fraga

    2016-11-01

    Full Text Available Time without sequence, vertiginous processing and acceleration of circulation are some of the features of the informationalist paradigm in the network system. The microelectronics and the genetic engineering are writing the code of our societies. The emergence of a synchronic bio-cultural dimension can make us think about organic and fluid forms of writing, molecular, forms of writing that replicate and propagate, parasitic, fertile... for what?

  6. Hacking the hospital environment

    DEFF Research Database (Denmark)

    Boisen, Kirsten A; Boisen, Anne Bank; Thomsen, Stine Legarth

    2017-01-01

    BACKGROUND: There is a need for youth-friendly hospital environments as the ward environment may affect both patient satisfaction and health outcomes. OBJECTIVE: To involve young people in designing youth-friendly ward environment. METHODS: We arranged a design competition lasting 42 h (Hackathon...

  7. Incidence Density and Risk Factors of Diabetic Retinopathy Within Type 2 Diabetes: A Five-Year Cohort Study in China (Report 1

    Directory of Open Access Journals (Sweden)

    Lei Liu

    2015-07-01

    Full Text Available A prospective study was carried out from August 2010 to August 2014 in the community of Fengyutan (China. Six hundred and twenty two T2D subjects were collected. The incidence density of diabetic retinopathy (DR was 1.81% person-year (95% confidence interval, CI: 1.21–2.43% person-year. After a Cox regression model analysis and adjusted confounding factors, independent predictors related to the incidence of DR including male gender (adjusted hazard ratios, aHR: 1.47, 95% CI: 1.21–1.62, with hypertension (aHR: 1.49, 95%: 1.12–1.73, duration of diabetes > 10 years (aHR: 2.28, 95%: 2.05–2.42, uncontrolled diabetes (aHR: 1.76, 95%: 1.41–2.01, total cholesterol ≥ 200 mg/dL (aHR: 1.54, 95%: 1.34–1.72 and HbA1c ≥ 7% (mmol/mol (aHR: 2.12, 95%: 1.87–2.32. Duration of T2D revealed the significantly dose-response relationship to the onset of DR. The incidence density of DR in the Chinese community was relatively low in comparison with other studies. More attention should be paid to the T2D patients, especially of male gender, with hypertension, longer duration of diabetes, uncontrolled diabetes, total cholesterol ≥ 200mg/dL and HbA1c ≥ 7% (mmol/mol.

  8. Incidence, patterns and severity of reported unintentional injuries in Pakistan for persons five years and older: results of the National Health Survey of Pakistan 1990–94

    Directory of Open Access Journals (Sweden)

    Qureshi Huma I

    2007-07-01

    Full Text Available Abstract Background National level estimates of injuries are not readily available for developing countries. This study estimated the annual incidence, patterns and severity of unintentional injuries among persons over five years of age in Pakistan. Methods National Health Survey of Pakistan (NHSP 1990–94 is a nationally representative survey of the household. Through a two-stage stratified design, 18, 315 persons over 5 years of age were interviewed to estimate the overall annual incidence, patterns and severity of unintentional injuries for males and females in urban and rural areas over the preceding one year. Weighted estimates were computed adjusting for complex survey design using surveyfreq and surveylogistic option of SAS 9.1 software. Results The overall annual incidence of all unintentional injuries was 45.9 (CI: 39.3–52.5 per 1000 per year; 59.2 (CI: 49.2–69.2 and 33.2 (CI: 27.0–39.4 per 1000 per year among males and females over five years of age, respectively. An estimated 6.16 million unintentional injuries occur in Pakistan annually among persons over five years of age. Urban and rural injuries were 55.9 (95% CI: 48.1–63.7 and 41.2 (95% CI: 32.2–50.0 per 1000 per year, respectively. The annual incidence of injuries due to falls were 22.2 (95% CI: 18.0–26.4, poisoning 3.3 (95%CI: 0.5–6.1 and burn was 1.5 (95%CI: 0.9–2.1 per 1000 per year. The majority of injuries occurred at home 19.2 (95%CI: 16.0–22.4 or on the roads 17.0 (95%CI: 13.8–20.2. Road traffic/street, school and urban injuries were more likely to result in handicap. Conclusion There is high burden of unintentional injuries among persons over five years of age in Pakistan. These results are useful to plan further studies and prioritizing prevention programs on injuries nationally and other developing countries with similar situation.

  9. A decade of child-initiated family violence: comparative analysis of child--parent violence and parricide examining offender, victim, and event characteristics in a national sample of reported incidents, 1995-2005.

    Science.gov (United States)

    Walsh, Jeffrey A; Krienert, Jessie L

    2009-09-01

    This article examines 11 years (1995-2005) of National Incident Based Reporting System data comparing victim, offender, and incident characteristics for two types of child-initiated family violence: child-parent violence (CPV) and parricide. The objective is to better understand the victim-offender relationship for CPV and parricide and to highlight distinguishing features between the two offenses. This work extends the research and addresses shortcomings in the extant literature. Data analysis consists of chi-square tests and logistic regression. Findings suggest that CPV and parricide are distinct and unique crimes. In short, parricide offenders and victims are both older than CPV offenders and victims, with CPV offenders more likely to be female, more likely to be African American, and less likely to use a weapon than parricide offenders. The study calls for future research and exploration of preliminary support for a family violence escalation hypothesis.

  10. Incidence of Narcolepsy in Germany.

    Science.gov (United States)

    Oberle, Doris; Drechsel-Bäuerle, Ursula; Schmidtmann, Irene; Mayer, Geert; Keller-Stanislawski, Brigitte

    2015-10-01

    Following the 2009 pandemic, reports of an association between an AS03 adjuvanted H1N1 pandemic influenza vaccine and narcolepsy were published. Besides determining background incidence rates for narcolepsy in Germany this study aimed at investigating whether there was a change in incidence rates of narcolepsy between the pre-pandemic, pandemic, and the post-pandemic period on the population level. Retrospective epidemiological study on the incidence of narcolepsy with additional capture-recapture analysis. German sleep centers. Eligible were patients with an initial diagnosis of narcolepsy (ICD10 Code G47.4) within the period from January 1, 2007 to December 31, 2011. None; observational study. A total of 342 sleep centers were invited to participate in the study. Adequate and suitable data were provided by 233 sleep centers (68.1%). A total of 1,198 patients with an initial diagnosis of narcolepsy within the observed period were included, of whom 106 (8.8%) were children and adolescents under the age of 18 years and 1,092 (91.2%) were adults. In children and adolescents, the age-standardized adjusted incidence rate significantly increased from 0.14/100,000 person-years in the pre-pandemic period to 0.50/100,000 person-years in the post-pandemic period (incidence density ratio, IDR 3.57; 95% CI 1.94-7.00). In adults, no significant change was detectable. This increase started in spring 2009. For the years 2007-2011, valid estimates for the incidence of narcolepsy in Germany were provided. In individuals under 18, the incidence rates continuously increased from spring 2009. © 2015 Associated Professional Sleep Societies, LLC.

  11. Avaliação da notificação no Distrito Federal de casos de tuberculose residentes em dez municípios goianos do entorno e análise da incidência de tuberculose nestas localidades Evaluation of tuberculosis cases occurring in ten outlying cities and reported in the Entorno region of the state of Goiás and reported in the neighboring Federal District: analysis of the incidence of tuberculosis in those cites

    Directory of Open Access Journals (Sweden)

    Maria Auxiliadora Carmo Moreira

    2007-06-01

    Full Text Available OBJETIVO: Avaliar a notificação, no Distrito Federal (DF, de casos de tuberculose em residentes nos municípios goianos da região do Entorno e possíveis influências no Plano de Controle da Tuberculose; analisar a taxa de incidência da tuberculose nos municípios e a interferência da situação socioeconômica e das características demográficas sobre esta taxa. MÉTODO: Analisaram-se dados relativos à incidência de tuberculose, taxas de cura, abandono, falência de tratamento, óbito, transferência e informações socioeconômicas e demográficas de dez municípios goianos. RESULTADOS: No período de 2000 a 2004, foram notificados 714 casos novos de tuberculose em residentes nos municípios estudados, sendo que 436 (61,0% foram atendidos no DF, não sendo registrados no Sistema de Informação de Goiás. Considerando-se os casos atendidos somente em Goiás, a média de incidência de tuberculose do grupo variou de 4,40 a 10,02/100.000 habitantes; somando-se os atendidos no DF, a incidência aumentou significativamente, variando de 15,16 a 20,54/100.000 habitantes (p OBJECTIVE: To evaluate tuberculosis cases occurring in the greater metropolitan area of the Distrito Federal (MADF, encompassing the Federal District, i.e., the national capital of Brasília, located in the state of Goiás but reported in Brasília itself and to analyze the influence that this has on the effectiveness of the tuberculosis control program, as well as on the collection of socioeconomic and demographic data related to tuberculosis incidence rates. METHODS: Rates of tuberculosis incidence, cure, noncompliance, treatment failure, mortality, and referral, as well as socioeconomic and demographic data, were reviewed for patients from ten MADF cities. RESULTS: From 2000 to 2004, 714 new cases of tuberculosis were reported in the cities studied, 436 (61% of which were treated in Brasília and were therefore not included in the Goiás database. Among patients treated

  12. 究竟什么是"社会建构"——伊恩·哈金论社会建构主义%Ian Hacking's s Social Constructivism: What is "Social Construction" ?

    Institute of Scientific and Technical Information of China (English)

    安维复; 梁立新

    2008-01-01

    社会建构主义成为热点话题,但"社会建构"这个范畴本身成为问题.伊恩·哈金(Ian Hacking)详细地考察了"社会建构"一词的各种含义,指出社会建构主义在本质上是一种新形式的哲学批判.

  13. Cancer incidence among waiters

    DEFF Research Database (Denmark)

    Reijula, Jere; Kjaerheim, Kristina; Lynge, Elsebeth

    2015-01-01

    INCIDENCE IN SOME CANCER SITES CAN LIKELY BE EXPLAINED BY HIGHER ALCOHOL CONSUMPTION, THE PREVALENCE OF SMOKING AND OCCUPATIONAL EXPOSURE TO TOBACCO SMOKE HOPEFULLY, THE INCIDENCE OF CANCER AMONG WAITERS WILL DECREASE IN THE FUTURE, DUE TO THE BANNING OF TOBACCO SMOKING IN RESTAURANTS AND BARS IN THE NORDIC...

  14. Customer focused incident monitoring in anaesthesia.

    Science.gov (United States)

    Khan, F A; Khimani, S

    2007-06-01

    The database of incident forms relating to anaesthesia services in an institutional risk management programme were reviewed for 2003-2005, the aim being to identify any recurring patterns. Incidents were prospectively categorised as relating to attitude/behaviour, communication breakdown, delay in service, or were related to care, cost, environment, equipment, security, administrative process, quality of service or miscellaneous. The total number of anaesthesia-related incidents reported during the period was 287, which related to 0.44% of the total number of anaesthetics administered during the time period. In all, 170 incidents were reported by the department, 96 by internal customers and 21 by external customers. Only 30% of the complaints came from the operating room. Thirty-four per cent of all incidents related to communication, behaviour and delay in service. A requirement to teach communication skills and stress handling formally in anaesthesia training programmes, and at the time of induction of staff into the department, has been identified.

  15. Psychological Trauma in the Workplace: Variation of Incident Severity among Industry Settings and between Recurring vs Isolated Incidents

    Directory of Open Access Journals (Sweden)

    GS DeFraia

    2015-07-01

    Full Text Available Background: Psychologically traumatic workplace events (known as critical incidents occur within various work environments, with workgroups in certain industries vulnerable to multiple incidents. With the increasing prevalence of incidents in the USA, incident response is a growing practice area within occupational medicine, industrial psychology, occupational social work and other occupational health professions.Objective: To analyze a measure of incident severity based on level of disruption to the workplace and explore whether incident severity varied among different industry settings or between workgroups experiencing multiple vs single traumatic incidents.Methods: Administrative data mining was employed to examine practice data from a workplace trauma response unit in the USA. Bivariate analyses were conducted to test whether scores from an instrument measuring incident severity level varied among industry settings or between workgroups impacted by multiple vs isolated events.Results: Incident severity level differed among various industry settings. Banks, retail stores and fast food restaurants accounted for the most severe incidents, while industrial and manufacturing sites reported less severe incidents. Workgroups experiencing multiple incidents reported more severe incidents than workgroups experiencing a single incident.Conclusion: Occupational health practitioners should be alert to industry differences in several areas: pre-incident resiliency training, the content of business recovery plans, assessing worker characteristics, strategies to assist continuous operations and assisting workgroups impacted by multiple or severe incidents.

  16. The reported incidence of man-machine interface issues in Army aviators using the Aviator's Night Vision System (ANVIS) in a combat theatre

    Science.gov (United States)

    Hiatt, Keith L.; Rash, Clarence E.

    2011-06-01

    Background: Army Aviators rely on the ANVIS for night operations. Human factors literature notes that the ANVIS man-machine interface results in reports of visual and spinal complaints. This is the first study that has looked at these issues in the much harsher combat environment. Last year, the authors reported on the statistically significant (p89,000 flight hours of which >22,000 were with ANVIS) participated. Analysis demonstrated high complaints of almost all levels of back and neck pain. Additionally, the use of body armor and other Aviation Life Support Equipment (ALSE) caused significant ergonomic complaints when used with ANVIS. Conclusions: ANVIS use in a combat environment resulted in higher and different types of reports of spinal symptoms and other man-machine interface issues over what was previously reported. Data from this study may be more operationally relevant than that of the peacetime literature as it is derived from actual combat and not from training flights, and it may have important implications about making combat predictions based on performance in training scenarios. Notably, Aircrew remarked that they could not execute the mission without ANVIS and ALSE and accepted the degraded ergonomic environment.

  17. The Report of the Working Group Concerning the Deterrence of and Response to Incidents of Sexual Assault at the U.S. Air Force Academy

    Science.gov (United States)

    2003-06-01

    Committee initially met every month, but the frequency of the meetings tapered off over the years.455 Recent Committee “Minutes of Meetings” show the...first chairperson (November 1995 to May 1998), although she thought meetings might have tapered off to twice a quarter towards the end of the period...409. The fourth case, AFOSI Report of Investigation, Exhibit 343, involved a civilian female minor. The subject took the basketball the victim was

  18. Large whale incident database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Large whale stranding, death, ship strike and entanglement incidents are all recorded to monitor the health of each population and track anthropogenic factors that...

  19. 哈金长篇小说男主人公形象分析%An Analysis of the Image of the Hero in Hackingˊs Novels

    Institute of Scientific and Technical Information of China (English)

    陈燕琼

    2015-01-01

    In Hacking’s five novels there altogether molded fi ve heros: Shao Bin, Kong Lin, Professor Yang, Yu Yuan and Wu Nan. Basically, they have different jobs and experiences. But Hacking endowed them with some common features. In the perspective of temperament, they all branded with the image of intelligentsia. And on the view of mundane life, they all have conflictive affection, lingering heavy lonely atmosphere in their own world of spirit.%哈金创作的五部长篇小说分别塑造了五位男主人公:邵彬、孔林、杨教授、俞元和武男。他们表面上职业不同、经历迥异,但哈金同时也赋予了他们一些共同的特质:从气质上讲,他们五人都被打上了清晰的知识分子烙印;从世俗生活的角度看,他们都有着分裂的情感,各自的精神世界里则弥漫着厚重的孤独气息。

  20. La filosofía de I. Hacking:El giro hacia la práctica en Filosofía de la ciencia

    Directory of Open Access Journals (Sweden)

    Mercedes Iglesias De Castro

    2004-01-01

    Full Text Available El estudio muestra a Ian Hacking como uno de los iniciadores del giro hacia la práctica en filosofía de la ciencia. Diversasredes de conexiones atraviesan su pensamiento. Se enfatizan tres aspectos de su pensamiento: i su con - cepción en torno al lenguaje, la historia y el conocimien to; ii su posición con respecto a las prácticas experimentales, y iii su posición sobre las prácticas clasificatorias o el modo como se constru en las personas. Fun da men tal men te, cri ti ca el én fa sis dado a la teo ría y al idea lis mo en casi toda la filosfía del siglo XX y reflexiona a través de las prácticas de los científicos de la naturaleza y de los que trabajan con problemas humanos cómo se construye eso que llamamos conocimiento.

  1. A review of 29 incidents involving 4-aminopyridine in non-target species reported to the ASPCA Animal Poison Control Center.

    Science.gov (United States)

    McLean, Mary Kay; Khan, Safdar

    2013-12-01

    4-Aminopyridine (4-AP) is an avicide used in products that are approved by the Environmental Protection Agency (EPA) to control populations of various birds. Pharmaceutical 4-AP is also used in humans to treat neural and muscular dysfunctions associated with multiple sclerosis. Although strict restrictions for its use are in place, exposures to 4-AP bait by non-target species still occur. Twenty-nine exposures of 4-AP bait involving non-target species were identified and retrieved from the ASPCA Animal Poison Control Center medical record database. Canines were the most commonly exposed (86 %) species followed by felines (10 %). The highest frequency of exposures was reported from Colorado (22 %). Most commonly reported clinical signs in canines were tremors, hypersalivation, seizures, tachycardia, and ataxia. The onset time of signs ranged from 5 to 300 min with an average of 89 min. Clinical signs lasted from 15 to 84 h with an average of 37 h. Patient outcome was known in six cases; one dog died 4 h after the exposure and five made full recovery with supportive care. Treatment of five surviving patients included administration of activated charcoal, use of anticonvulsants and muscle relaxants like diazepam and methocarbamol, and intravenous fluids. Diagnosis of 4-AP toxicosis can be supported by testing the gastric contents of the exposed patient. Due to the rapid absorption, samples need to be collected and frozen/chilled promptly. For successful patient outcome, treatment must be implemented quickly after an exposure.

  2. The incidence and nature of adverse events during pediatric sedation/anesthesia with propofol for procedures outside the operating room: a report from the Pediatric Sedation Research Consortium.

    Science.gov (United States)

    Cravero, Joseph P; Beach, Michael L; Blike, George T; Gallagher, Susan M; Hertzog, James H

    2009-03-01

    We used a large database of prospectively collected data on pediatric sedation/anesthesia outside the operating room provided by a wide range of pediatric specialists to delineate the nature and frequency of adverse events associated with propofol-based sedation/anesthesia care. Data were collected by the Pediatric Sedation Research Consortium, a collaborative group of institutions dedicated to improving sedation/anesthesia care for children internationally. Members prospectively enrolled consecutive patients receiving sedation or sedation/anesthesia for procedures. The primary inclusion criterion was the need for some form of sedation/anesthesia to perform a diagnostic or therapeutic procedure outside the operating room. There were no exclusion criteria. Data on demographics, primary illness, coexisting illness, procedure performed, medications used, procedure and recovery times, medication doses outcomes of anesthesia, airway interventions and adverse events were collected and reported using web-based data collection tool. For this study, we evaluated all instances where propofol was used as the primary drug in the sedation/anesthesia technique. Thirty-seven locations submitted data on 49,836 propofol sedation/anesthesia encounters during the study period from July 1, 2004 until September 1, 2007. There were no deaths. Cardiopulmonary resuscitation was required twice. Aspiration during sedation/anesthesia occurred four times. Less serious events were more common with O(2) desaturation below 90% for more than 30 s, occurring 154 times per 10,000 sedation/anesthesia administrations. Central apnea or airway obstruction occurred 575 times per 10,000 sedation/anesthesia administrations. Stridor, laryngospasm, excessive secretions, and vomiting had frequencies of 50, 96, 341, and 49 per 10,000 encounters, respectively. Unexpected admissions (increases in levels of care required) occurred at a rate of 7.1 per 10,000 encounters. In an unadjusted analysis, the rate of

  3. Forecasting Zika Incidence in the 2016 Latin America Outbreak Combining Traditional Disease Surveillance with Search, Social Media, and News Report Data

    Science.gov (United States)

    McGough, Sarah F.; Brownstein, John S.; Hawkins, Jared B.; Santillana, Mauricio

    2017-01-01

    Background Over 400,000 people across the Americas are thought to have been infected with Zika virus as a consequence of the 2015–2016 Latin American outbreak. Official government-led case count data in Latin America are typically delayed by several weeks, making it difficult to track the disease in a timely manner. Thus, timely disease tracking systems are needed to design and assess interventions to mitigate disease transmission. Methodology/Principal Findings We combined information from Zika-related Google searches, Twitter microblogs, and the HealthMap digital surveillance system with historical Zika suspected case counts to track and predict estimates of suspected weekly Zika cases during the 2015–2016 Latin American outbreak, up to three weeks ahead of the publication of official case data. We evaluated the predictive power of these data and used a dynamic multivariable approach to retrospectively produce predictions of weekly suspected cases for five countries: Colombia, El Salvador, Honduras, Venezuela, and Martinique. Models that combined Google (and Twitter data where available) with autoregressive information showed the best out-of-sample predictive accuracy for 1-week ahead predictions, whereas models that used only Google and Twitter typically performed best for 2- and 3-week ahead predictions. Significance Given the significant delay in the release of official government-reported Zika case counts, we show that these Internet-based data streams can be used as timely and complementary ways to assess the dynamics of the outbreak. PMID:28085877

  4. Radiation incidents in dentistry

    Energy Technology Data Exchange (ETDEWEB)

    Lovelock, D.J. [Dental Hospital and School, Newcastle upon Tyne (United Kingdom). Dept. of Radiology

    1996-12-31

    Most dental practitioners act as their own radiographer and radiologist, unlike their medical colleagues. Virtually all dental surgeons have a dental X-ray machine for intraoral radiography available to them and 40% of dental practices have equipment for dental panoramic tomography. Because of the low energy of X-ray equipment used in dentistry, radiation incidents tend to be less serious than those associated with other aspects of patient care. Details of 47 known incidents are given. The advent of the 1985 and 1988 Ionising Radiation Regulations has made dental surgeons more aware of the hazards of radiation. These regulations, and general health and safety legislation, have led to a few dental surgeons facing legal action. Because of the publicity associated with these court cases, it is expected that there will be a decrease in radiation incidents arising from the practice of dentistry. (author).

  5. Control of Bovine Brucellosis from Persistently Infected Holdings Using RB51 Vaccination with Test-and-Slaughter: A Comparative Case Report from a High Incidence Area in Portugal.

    Science.gov (United States)

    Caetano, M C; Afonso, F; Ribeiro, R; Fonseca, A P; Abernethy, D A; Boinas, F

    2016-02-01

    Bovine brucellosis due to Brucella abortus infection causes significant reproductive and production losses in cattle and is a major zoonosis. Eradication of this disease has proved difficult to achieve in Portugal where it still occurs in some regions despite an ongoing national eradication programme. In 2004, the Alentejo region, a major cattle producing area, reported one of the highest levels of bovine brucellosis in the country, especially in one divisional area. In that area, bovine brucellosis was particularly problematic in a holding of ten herds, the largest extensive cattle unit in the country, which remained infected despite an extensive test-and-slaughter programme and depopulation of five herds. A 5-year programme of RB51 vaccination with biannual test-and-slaughter was thus implemented in 2004. The apparent animal seroprevalence decreased from 19% (646/3,400) to 3% (88/2930) on the third herd-level test and remained below 0.8% (27/3324) after the fourth test. After the tenth test, the holding had a prevalence of 0.1% (2/2332) and only one herd remained positive with a within-herd prevalence of 1.1% (2/177). The results were compared to all other herds (n = 10) in the divisional area that were also persistently infected but were subject only to test-and-slaughter before being depopulated. In these herds, the strategy of test-and-slaughter did not reduce the prevalence, which remained significantly higher than the vaccinated group (median = 0.48% and 8.5% in vaccinated versus non-vaccinated herds; Wilcoxon rank sum test; P Portugal provided a valuable case study to the official veterinary services by illustrating the value of RB51 vaccination with parallel testing and improved biosecurity as a comprehensive and sustainable strategy for bovine brucellosis control in persistently infected herds.

  6. Recording pressure ulcer risk assessment and incidence.

    Science.gov (United States)

    Plaskitt, Anne; Heywood, Nicola; Arrowsmith, Michaela

    2015-07-15

    This article reports on the introduction of an innovative computer-based system developed to record and report pressure ulcer risk and incidence at an acute NHS trust. The system was introduced to ensure that all patients have an early pressure ulcer risk assessment, which prompts staff to initiate appropriate management if a pressure ulcer is detected, thereby preventing further patient harm. Initial findings suggest that this electronic process has helped to improve the timeliness and accuracy of data on pressure ulcer risk and incidence. In addition, it has resulted in a reduced number of reported hospital-acquired pressure ulcers.

  7. Lightning incidents in Mongolia

    Directory of Open Access Journals (Sweden)

    Myagmar Doljinsuren

    2015-11-01

    Full Text Available This is one of the first studies that has been conducted in Mongolia on the distribution of lightning incidents. The study covers a 10-year period from 2004 to 2013. The country records a human death rate of 15.4 deaths per 10 million people per year, which is much higher than that of many countries with similar isokeraunic level. The reason may be the low-grown vegetation observed in most rural areas of Mongolia, a surface topography, typical to steppe climate. We suggest modifications to Gomes–Kadir equation for such countries, as it predicts a much lower annual death rate for Mongolia. The lightning incidents spread over the period from May to August with the peak of the number of incidents occurring in July. The worst lightning affected region in the country is the central part. Compared with impacts of other convective disasters such as squalls, thunderstorms and hail, lightning stands as the second highest in the number of incidents, human deaths and animal deaths. Economic losses due to lightning is only about 1% of the total losses due to the four extreme weather phenomena. However, unless precautionary measures are not promoted among the public, this figure of losses may significantly increase with time as the country is undergoing rapid industrialization at present.

  8. 假俭草杂交试验初报(简报)%Preliminary Study on Hybridization of Eremochloa ophiuroides (Munro.) Hack.

    Institute of Scientific and Technical Information of China (English)

    宗俊勤; 刘建秀; 王海燕; 王秀娥

    2009-01-01

    @@ 假俭草(Eremochloa ophiuroides (Munro.) Hack.) 起源于中国中部和南部,以养护水平低、容易建植、耐贫瘠且病虫害少而著称,是国外公认的中国最好的暖季型草坪草,所以又称为"中国草坪草"(Chinese lawn grass)[1].虽然假俭草主要分布在中国,而且我国的东部和南部很可能是假俭草的起源中心[2],但它真正得到深入研究和广泛应用的国家却是美国.江苏省中国科学院植物研究所自1993年起就开始了假俭草种源的收集工作,并对其进行了初步评价.结果表明,不同种源的假俭草在茎色、柱头色泽、花药色泽、匍匐茎长、草层高度、叶长、以及单位小花数和种子产量上都存在丰富的变异[3,4].要将这些优良变异进行整合,最经济有效的途径就是通过人工控制授粉进行杂交育种,而进行杂交育种就需要了解假俭草的开花习性.

  9. 中国肿瘤登记地区2007年肿瘤发病和死亡分析%A Report of Cancer Incidence and Mortality from 38 Cancer Registries in China,2007

    Institute of Scientific and Technical Information of China (English)

    陈万青; 张思维; 郑荣寿; 雷正龙; 李光琳; 邹小农; 赵平

    2011-01-01

    [目的]对全国肿瘤登记中心收集的2007年肿瘤的发病和死亡数据进行汇总,描述和分析中国肿瘤登记覆盖地区肿瘤负担情况.[方法]2010年,上报2007年肿瘤登记资料的登记处共48个,其中数据符合标准的登记处有38个.38个登记处覆盖人口59809313人(其中城市44609139人,农村15200174人),共报告新发病例165171例,死亡病例105916例.病理诊断比例为65.83%,只有死亡证明书比例为1.95%,死亡/发病比为0.64.分别计算38个登记地区发病率、死亡率,地区别、性别、年龄别发病死亡率,年龄调整率,疾病构成比和累积率,以反映登记地区恶性肿瘤的负担情况及其特征.[结果]38个中国肿瘤登记地区恶性肿瘤发病率为276.16/10万(其中男性305.22/10万,女性246.46/10万;城市地区为284.71/10万,农村地区为251.07/10万),中标率145.39/10万,世标率189.46/10万,0~74岁累积发病率为21.68%.恶性肿瘤死亡率为177.09/10万(其中男性219.15/10万,女性134.10/10万;城市地区为173.55/10万,农村地区为187.49/10万),中标率86.06/10万,世标率116.46/10万,0~74岁累积死亡率为13.06%.常见肿瘤发病前10位是肺癌、胃癌、结直肠癌、肝癌、女性乳腺癌、食管癌、胰腺癌、膀胱癌、脑瘤和淋巴瘤,占全部恶性肿瘤发病的76.12%.死亡前10位的肿瘤是肺癌、肝癌、胃癌、食管癌、结直肠癌、胰腺癌、乳腺癌、白血病、脑瘤和淋巴瘤,占全部恶性肿瘤死亡的84.37%.[结论]恶性肿瘤依然是威胁我国居民健康的重大疾病,其中肺癌、肝癌、胃癌、食管癌、结直肠癌和女性乳腺癌负担明显,应进一步加强对主要肿瘤的预防和控制.%[Purpose] To analyze cancer incidence and mortality data collected from Chinese cancer registries to evaluate cancer burden in 2007. [ Methods] In 2010, 48 cancer registries reported cancer incidence and mortality data of 2007. Among them 38 registries' data met the

  10. Increase of Prostate Cancer Incidence in Martinique

    Directory of Open Access Journals (Sweden)

    Dominique Belpomme

    2011-01-01

    Full Text Available Prostate cancer incidence is steadily increasing in many developed countries. Because insular populations present unique ethnic, geographical, and environmental characteristics, we analyzed the evolution of prostate cancer age-adjusted world standardized incidence rates in Martinique in comparison with that of metropolitan France. We also compared prostate cancer incidence rates, and lifestyle-related and socioeconomic markers such as life expectancy, dietary energy, and fat supply and consumption, with those in other Caribbean islands, France, UK, Sweden, and USA. The incidence rate of prostate cancer in Martinique is one of the highest reported worldwide; it is continuously growing since 1985 in an exponential mode, and despite a similar screening detection process and lifestyle-related behaviour, it is constantly at a higher level than in metropolitan France. However, Caribbean populations that are genetically close to that of Martinique have generally much lower incidence of prostate cancer. We found no correlation between prostate cancer incidence rates, life expectancy, and diet westernization. Since the Caribbean African descent-associated genetic susceptibility factor would have remained constant during the 1980–2005, we suggest that in Martinique some environmental change including the intensive use of carcinogenic organochlorine pesticides might have occurred as key determinant of the persisting highly growing incidence of prostate cancer.

  11. Regeneração de espécies arbóreas sob a influência de Merostachys multiramea Hack. (Poaceae em uma floresta subtropical Regeneration of tree species influenced by Merostachys multiramea Hack. (Poaceae in a subtropical forest

    Directory of Open Access Journals (Sweden)

    Suzana Cyrino dos Santos

    2012-03-01

    Full Text Available A ocorrência de bambúseas é comum em muitas fisionomias florestais, sendo que a elevada abundância destas espécies pode interagir com a regeneração de espécies arbóreas. Foi avaliada a regeneração de espécies arbóreas e de Merostachys multiramea Hack. em uma área de transição entre Floresta Ombrófila Mista e Floresta Estacional no Sul do Brasil e comparada a estrutura de regeneração da área entre dois e quatro anos após floração, frutificação e morte de M. multiramea. Foram alocadas 25 unidades amostrais de 100 m² dispostas de forma aleatória, onde foram amostrados todos os colmos vivos de M. multiramea e indivíduos regenerantes de espécies arbóreas > 30 cm de altura e com perímetro à altura do peito The occurrence of bamboo species is common in several forest physiognomies, and the high abundance of these species may affect the regeneration of other ones. We evaluated both tree species and Merostachys multiramea Hack. recruitment in a transition area between mixed Araucaria rain forest and seasonal semideciduous forests in southern Brazil. We compared the regeneration structure of the areas evaluated two and four years after flowering, fruiting and death of M. multiramea. We randomly distributed 25 100 m² sampling units, and surveyed all living culms of M. multiramea and tree saplings. We sampled 4,372 living bamboos and 2,918 tree saplings, belonging to 32 plant families and 75 species. Most species were classified as zoochorous and canopy light-demanding. On the other hand, plant abundance revealed a greater contribution of autochorous, understory and shade-tolerant trees. M. multiramea density was higher over the four years after the reproductive event (p<0.05, with taller culms (p<0.01, but with the same mean number of culms (p=0.46. A NPMANOVA revealed significant differences in composition and abundance between surveys, with higher similarity among samplings two years after the reproductive event of M

  12. Systemizers are better code-breakers:Self-reported systemizing predicts code-breaking performance in expert hackers and naïve participants

    Directory of Open Access Journals (Sweden)

    India eHarvey

    2016-05-01

    Full Text Available Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders - attention to detail and systemizing - may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e. crypto-analysis or code-breaking. A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001; Baron-Cohen et al., 2003. They were also tested with behavioural tasks involving code-breaking and a control task involving security x-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing was related with performance in the x-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015. We discuss the theoretical and translational implications of our findings.

  13. Reported incidences and factors associated with percutaneous ...

    African Journals Online (AJOL)

    Microsoft Office User

    included HCWs experience at work (71%), long working hours (29%), type of workplace (48%) and .... p-value less than 0.05. Ethical considerations. Ethical approval was sought from the joint Catholic University of Health and Allied Sciences.

  14. Incidence and epidemiology of tibial shaft fractures

    DEFF Research Database (Denmark)

    Larsen, Peter; Elsøe, Rasmus; Hansen, Sandra Hope

    2015-01-01

    Introduction: The literature lacks recent population-based epidemiology studies of the incidence, trauma mechanism and fracture classification of tibial shaft fractures. The purpose of this study was to provide up-to-date information on the incidence of tibial shaft fractures in a large...... and complete population and report the distribution of fracture classification, trauma mechanism and patient baseline demographics. Methods: Retrospective reviews of clinical and radiological records. Results: A total of 196 patients were treated for 198 tibial shaft fractures in the years 2009 and 2010....... The mean age at time of fracture was 38.5 (21.2SD) years. The incidence of tibial shaft fracture was 16.9/100,000/year. Males have the highest incidence of 21.5/100,000/year and present with the highest frequency between the age of 10 and 20, whereas women have a frequency of 12.3/100,000/year and have...

  15. Occupational bloodborne exposure incident survey & management of exposure incidents in a dental teaching environment.

    Science.gov (United States)

    Sedky, Nabila A

    2013-06-01

    The purpose of this study was to investigate the prevalence of occupational exposure incidents among undergraduate dental students and the factors associated with it in the educational dental clinics at Pharos University in Alexandria - Egypt, and to measure the commitment with applying infection control policy in the form of compliance with post-exposure management protocol and reporting exposure incidents. An anonymous self-administered questionnaire consisting of thirteen multiple-choice questions was distributed among 350 undergraduate dental students in mid-senior and senior levels during lectures at the end of the second semester of 2011, with a response rate of 90.00%. About 62.00% of the senior students reported that exposures occurred outside the patient's mouth. A high percentage of both the mid-senior and senior students (74.70% and 70.70%, respectively) reported that they were exposed to multiple sources of incidents. The vast majority of studied groups stated that they didn't follow Infection Control Protocol after Incident Exposure. The findings of this study confirm that dental students experience exposure incidents but are not likely to report them, thus it is important that the principles of infection control training and reporting of all exposure incidents continue to be emphasized throughout undergraduate dental education.

  16. Incidence of ascariasis in gastric carcinoma

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Woo; Rhee, Hak Song; Bahk, Yong Whee [St Mary' s Hospital Catholic Medical College, Seoul (Korea, Republic of)

    1972-09-15

    Prompted by the finding that the radiological incidence of small bowel ascariasis in the patient with gastric carcinoma was unexpectedly lower than the incidence in the normal population, a clinical study was performed to investigate possible relationship between gastric carcinoma and intestinal ascariasis. As a preliminary survey, we reviewed the radiological incidence of ascariasis in a total of 2,446 cases of upper GI series performed at the Department of Radiology, St Mary's Hospital Catholic Medical College. These included 1,573 normal subjects, 146 gastric carcinoma patients, 100 benign gastric ulcer and 249 duodenal ulcer patients and 378 other upper GI diseases. Following the preliminary study, a more accurate parasitologic study was conducted in another 578 normal subjects and 51 gastric carcinoma patients. The radiological incidences of ascaiasis in normal subjects and gastric carcinoma patients were 15.1% and 28.1%, respectively. The incidence of overall helminthiasis including ascaris lumbricoides, trichocephalus trichiurus and trichostrongyloides orientalis in normal subjects of the present series was 73.5%. This figure is virtually the same with 69.1% of the general population incidence reported by Kim, et al. (1971), but the incidence in gastric carcinoma patients was 94.1%. The high incidence pattern of overall helminthiasis in gastric carcinoma patients is, however, reversed as for as ascariasis is concerned. Thus, the incidence of ascariasis of gastric carcinoma patients was much lower than that of normal subjects (9.8% vs 19.4%). From the present observation, it is postulated that there can be some possible antagonistic relationship between evolution of gastric carcinoma and small bowel infestation of ascaris lumbricoides.

  17. Incidence and overall survival of malignant ameloblastoma.

    Directory of Open Access Journals (Sweden)

    Alexandra Rizzitelli

    Full Text Available Malignant ameloblastoma, comprising metastasizing ameloblastoma and ameloblastic carcinoma, represents 1.6-2.2% of all odontogenic tumors. Due to its rare nature, malignant ameloblastoma has only been reported in the literature in small case series or case reports. Using the Surveillance, Epidemiology and End-Results (SEER database, we have performed a population-based study to determine the incidence rate and the absolute survival of malignant ameloblastoma.Using the International Classification of Diseases for Oncology (ICD-O codes 9310/3 and 9270/3, data from the SEER database were used to calculate the incidence rate and absolute survival rate of population with malignant ameloblastoma.The overall incidence rate of malignant ameloblastoma was 1.79 per 10 million person/year. The incidence rate was higher in males than females and also higher in black versus white population. The median overall survival was 17.6 years from the time of diagnosis and increasing age was associated with a statistically significant poorer survival.To our best knowledge, we report the largest population-based series of malignant ameloblastoma. The incidence rate was 1.79 per 10 million person/year and the overall survival was 17.6 years.

  18. Incidence and overall survival of malignant ameloblastoma.

    Science.gov (United States)

    Rizzitelli, Alexandra; Smoll, Nicolas R; Chae, Michael P; Rozen, Warren M; Hunter-Smith, David J

    2015-01-01

    Malignant ameloblastoma, comprising metastasizing ameloblastoma and ameloblastic carcinoma, represents 1.6-2.2% of all odontogenic tumors. Due to its rare nature, malignant ameloblastoma has only been reported in the literature in small case series or case reports. Using the Surveillance, Epidemiology and End-Results (SEER) database, we have performed a population-based study to determine the incidence rate and the absolute survival of malignant ameloblastoma. Using the International Classification of Diseases for Oncology (ICD-O) codes 9310/3 and 9270/3, data from the SEER database were used to calculate the incidence rate and absolute survival rate of population with malignant ameloblastoma. The overall incidence rate of malignant ameloblastoma was 1.79 per 10 million person/year. The incidence rate was higher in males than females and also higher in black versus white population. The median overall survival was 17.6 years from the time of diagnosis and increasing age was associated with a statistically significant poorer survival. To our best knowledge, we report the largest population-based series of malignant ameloblastoma. The incidence rate was 1.79 per 10 million person/year and the overall survival was 17.6 years.

  19. Incidence of Adult Illiteracy in Sydney Metropolitan Area

    Science.gov (United States)

    Goyen, Judith D.

    1976-01-01

    A study to determine the incidence of functional illiteracy in English among adults in the metropolitan area of Sydney is reported, which showed the incidence of illiteracy among Australian/English born adults to be lower than previously reported while that among non-English born is very high. (WL)

  20. Comparative Incidence of Conformational, Neurodegenerative Disorders.

    Directory of Open Access Journals (Sweden)

    Jesús de Pedro-Cuesta

    Full Text Available The purpose of this study was to identify incidence and survival patterns in conformational neurodegenerative disorders (CNDDs.We identified 2563 reports on the incidence of eight conditions representing sporadic, acquired and genetic, protein-associated, i.e., conformational, NDD groups and age-related macular degeneration (AMD. We selected 245 papers for full-text examination and application of quality criteria. Additionally, data-collection was completed with detailed information from British, Swedish, and Spanish registries on Creutzfeldt-Jakob disease (CJD forms, amyotrophic lateral sclerosis (ALS, and sporadic rapidly progressing neurodegenerative dementia (sRPNDd. For each condition, age-specific incidence curves, age-adjusted figures, and reported or calculated median survival were plotted and examined.Based on 51 valid reported and seven new incidence data sets, nine out of eleven conditions shared specific features. Age-adjusted incidence per million person-years increased from ≤1.5 for sRPNDd, different CJD forms and Huntington's disease (HD, to 1589 and 2589 for AMD and Alzheimer's disease (AD respectively. Age-specific profiles varied from (a symmetrical, inverted V-shaped curves for low incidences to (b those increasing with age for late-life sporadic CNDDs and for sRPNDd, with (c a suggested, intermediate, non-symmetrical inverted V-shape for fronto-temporal dementia and Parkinson's disease. Frequently, peak age-specific incidences from 20-24 to ≥90 years increased with age at onset and survival. Distinct patterns were seen: for HD, with a low incidence, levelling off at middle age, and long median survival, 20 years; and for sRPNDd which displayed the lowest incidence, increasing with age, and a short median disease duration.These results call for a unified population view of NDDs, with an age-at-onset-related pattern for acquired and sporadic CNDDs. The pattern linking age at onset to incidence magnitude and survival might

  1. Perceived job insecurity as a risk factor for incident coronary heart disease

    DEFF Research Database (Denmark)

    Virtanen, Marianna; Nyberg, Solja T; Batty, George David;

    2013-01-01

    To determine the association between self reported job insecurity and incident coronary heart disease.......To determine the association between self reported job insecurity and incident coronary heart disease....

  2. Constipation - prevalence and incidence among medical patients acutely admitted to hospital with a medical condition

    DEFF Research Database (Denmark)

    Noiesen, Eline; Trosborg, Ingelise; Bager, Louise;

    2014-01-01

    To examine the prevalence and incidence of patient-reported symptoms of constipation in acutely hospitalised medical patients.......To examine the prevalence and incidence of patient-reported symptoms of constipation in acutely hospitalised medical patients....

  3. Re-analysis by fluorescence in situ hybridisation of spare embryos cultured until Day 5 after preimplantation genetic diagnosis for a 47, XYY infertile patient demonstrates a high incidence of diploid mosaic embryos: a case report.

    Science.gov (United States)

    Emiliani, S; Merino, E G; Van den Bergh, M; Abramowicz, M; Vassart, G; Englert, Y; Delneste, D

    2000-12-01

    Mosaicism in 4-8-cell human embryos analysed by fluorescence in situ hybridisation (FISH) has been widely reported, but few studies have addressed the incidence of mosaicism in more advanced embryonic stages. In the present study we analysed spare human embryos in a case of preimplantation genetic diagnosis (PGD) for increased risk of aneuploidy because of an infertile 47,XYY man. After replacement of two embryos typed as 1818XX at PGD, six spare embryos (not frozen because of their low quality) were re-analysed on Day 5 for PGD confirmation. Out of five embryos typed as 1818XY at PGD, four were diploid mosaic (DM) and one was normal in all cells. The sixth embryo, typed as 18XYY/1818181818X at PGD, was a DM. In spite of the bias of our small series of morphologically low-quality embryos, the surprisingly high proportion of mosaics (which confirms previous findings) questions the validity of PGD, but supports the strategy of transferring only the embryos where two blastomeres gave normal and concordant results at PGD. More data are required to understand the clinical significance of early diploid mosaicism (and its impact on implantation rate) and to determine whether some diploid mosaic embryos might be considered safe for transfer.

  4. Congestion with incidents

    DEFF Research Database (Denmark)

    Fosgerau, Mogens

    2010-01-01

    This paper considers the impact of random delays during a repeatedly occurring demand peak in a congested facility, such as an airport or an urban road. Congestion is described in the form of a dynamic queue using the Vickrey bottleneck model and assuming Nash equilibrium in departure times. Every...... period an incident may occur at a random time, temporarily reducing the bottleneck capacity to zero. The paper gives some properties of Nash equilibrium and the social optimum as well as a pretty good welfare improving tolling scheme....

  5. Incident users of antipsychotics

    DEFF Research Database (Denmark)

    Baandrup, Lone; Kruse, Marie

    2016-01-01

    PURPOSE: In Denmark, as well as in many other countries, consumption of antipsychotics is on the rise, partly due to increasing off-label use. The aim of this study was to analyze and quantify the extent of off-label use and polypharmacy in incident users of antipsychotic medication, and to examine...... polypharmacy (HR 1.38; 95 % CI 1.32-1.45), whereas antipsychotic discontinuation was associated with decreased hospitalization risk in most off-label conditions. CONCLUSIONS: The brief duration of most antipsychotic prescriptions suggests that antipsychotics are prescribed more liberally than recommended...

  6. 確立前史研究序説-Ian Hacking 『確率の出現』をめぐって-

    OpenAIRE

    藤江, 昌嗣; FUJIE, Masatsugu

    1986-01-01

    確率に関する歴史的研究は,Ⅰ.Todohunter の大著“A History of the Mathenmatical Theory of Probability”[1865](『確率論史パスカルからラプラスの時代までの数学史の一断面』安藤洋美訳1975)をはじめとして多くの蓄積があるが,それらの対象の扱い方は, Todohunter の著名(副題)に見られるように,確率に関する諸法則・諸定理が各人によってどの程度まで完成されたものになっているかという観点が柱になっていると思われる1)。確率 Probability という概念がどのように形成されてきたかをその前提条件と共に問い直すという作業は著者の知る限りではあるがほとんど存在していないといえる。こうした問い直しは,頻度説・信頼度説として一般に知られているD.Huffによる統計的確率と帰納的確率の関係,更に確率的思考の認識あるいは科学にとっての意味を考えることにとり決して無意味なものとはならないであろう2)。本稿は,こうした問い直し作業の一つとしてなされた I.Hacking の『確率の出現一確率,帰納そして統計的推測について...

  7. Incident Duration Modeling Using Flexible Parametric Hazard-Based Models

    Directory of Open Access Journals (Sweden)

    Ruimin Li

    2014-01-01

    Full Text Available Assessing and prioritizing the duration time and effects of traffic incidents on major roads present significant challenges for road network managers. This study examines the effect of numerous factors associated with various types of incidents on their duration and proposes an incident duration prediction model. Several parametric accelerated failure time hazard-based models were examined, including Weibull, log-logistic, log-normal, and generalized gamma, as well as all models with gamma heterogeneity and flexible parametric hazard-based models with freedom ranging from one to ten, by analyzing a traffic incident dataset obtained from the Incident Reporting and Dispatching System in Beijing in 2008. Results show that different factors significantly affect different incident time phases, whose best distributions were diverse. Given the best hazard-based models of each incident time phase, the prediction result can be reasonable for most incidents. The results of this study can aid traffic incident management agencies not only in implementing strategies that would reduce incident duration, and thus reduce congestion, secondary incidents, and the associated human and economic losses, but also in effectively predicting incident duration time.

  8. Incident duration modeling using flexible parametric hazard-based models.

    Science.gov (United States)

    Li, Ruimin; Shang, Pan

    2014-01-01

    Assessing and prioritizing the duration time and effects of traffic incidents on major roads present significant challenges for road network managers. This study examines the effect of numerous factors associated with various types of incidents on their duration and proposes an incident duration prediction model. Several parametric accelerated failure time hazard-based models were examined, including Weibull, log-logistic, log-normal, and generalized gamma, as well as all models with gamma heterogeneity and flexible parametric hazard-based models with freedom ranging from one to ten, by analyzing a traffic incident dataset obtained from the Incident Reporting and Dispatching System in Beijing in 2008. Results show that different factors significantly affect different incident time phases, whose best distributions were diverse. Given the best hazard-based models of each incident time phase, the prediction result can be reasonable for most incidents. The results of this study can aid traffic incident management agencies not only in implementing strategies that would reduce incident duration, and thus reduce congestion, secondary incidents, and the associated human and economic losses, but also in effectively predicting incident duration time.

  9. Investigation of KW reactor incident

    Energy Technology Data Exchange (ETDEWEB)

    Sturges, D G [USAEC Hanford Operations Office, Richland, WA (United States); Hauff, T W; Greager, O H [General Electric Co., Richland, WA (United States). Hanford Atomic Products Operation

    1955-02-11

    The new KW reactor was placed in operation on January 4, 1955, and had been running at relatively low power levels for only 17 hours when it was shut down because of a process tube water leak which appeared to be associated with a slug rupture. After several days of unrewarding effort to remove the slugs and tube by customary methods, it developed that considerable melting of the tube and slugs had taken place. It was then evident that removal of the stuck mass and repairs to the damaged tube channel would require unusual measures that were certain to extend the reactor outage for several weeks. This report documents the work and findings of the Committee which investigated the KW reactor incident. Its content represents unanimous agreement among the three Committee members.

  10. Incident Management Organization succession planning stakeholder feedback

    Science.gov (United States)

    Anne E. Black

    2013-01-01

    This report presents complete results of a 2011 stakeholder feedback effort conducted for the National Wildfire Coordination Group (NWCG) Executive Board concerning how best to organize and manage national wildland fire Incident Management Teams in the future to meet the needs of the public, agencies, fire service and Team members. Feedback was collected from 858...

  11. Preparing for major incidents in Kenya

    Directory of Open Access Journals (Sweden)

    B.W. Wachira*

    2013-12-01

    This report provides a review of some of the major incidents in Kenya for the period 2000–2012, with the hope of highlighting the importance of developing an integrated and well-trained Ambulance and Fire and Rescue service appropriate for the local health care system.

  12. Security incidents on the Internet, 1989--1995

    Energy Technology Data Exchange (ETDEWEB)

    Howard, J.D.

    1995-12-31

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  13. Transportation accidents/incidents involving radioactive materials (1971--1991)

    Energy Technology Data Exchange (ETDEWEB)

    Cashwell, C. E. [Applied Physics, Inc., Albuquerque, NM (United States); McClure, J. D. [Sandia National Labs., Albuquerque, NM (United States)

    1992-01-01

    The Radioactive Materials Incident Report (RMIR) database contains information on transportation-related accidents and incidents involving radioactive materials that have occurred in the United States. The RMIR was developed at Sandia National Laboratories (SNL) to support its research and development program efforts for the US Department of Energy (DOE). This paper will address the following topics: background information on the regulations and process for reporting a hazardous materials transportation incident, overview data of radioactive materials transportation accidents and incidents, and additional information and summary data on how packagings have performed in accident conditions.

  14. Critical Incidents in Internal Relationships

    OpenAIRE

    Voima, Päivi

    2000-01-01

    Critical incidents have had an important role in service quality and service management research. The focus of critical-incident studies has gradually shifted from separate acts and episodes towards relationships, and even switching from one relationship to another. The Critical Incident Technique has mainly been used when studying the service sector, concentrating on the customer's perception of critical incidents. Although some studies have considered the perceptions of employees important,...

  15. Incident Management: Process into Practice

    Science.gov (United States)

    Isaac, Gayle; Moore, Brian

    2011-01-01

    Tornados, shootings, fires--these are emergencies that require fast action by school district personnel, but they are not the only incidents that require risk management. The authors have introduced the National Incident Management System (NIMS) and the Incident Command System (ICS) and assured that these systems can help educators plan for and…

  16. Grazing incidence beam expander

    Energy Technology Data Exchange (ETDEWEB)

    Akkapeddi, P.R.; Glenn, P.; Fuschetto, A.; Appert, Q.; Viswanathan, V.K.

    1985-01-01

    A Grazing Incidence Beam Expander (GIBE) telescope is being designed and fabricated to be used as an equivalent end mirror in a long laser resonator cavity. The design requirements for this GIBE flow down from a generic Free Electron Laser (FEL) resonator. The nature of the FEL gain volume (a thin, pencil-like, on-axis region) dictates that the output beam be very small. Such a thin beam with the high power levels characteristic of FELs would have to travel perhaps hundreds of meters or more before expanding enough to allow reflection from cooled mirrors. A GIBE, on the other hand, would allow placing these optics closer to the gain region and thus reduces the cavity lengths substantially. Results are presented relating to optical and mechanical design, alignment sensitivity analysis, radius of curvature analysis, laser cavity stability analysis of a linear stable concentric laser cavity with a GIBE. Fabrication details of the GIBE are also given.

  17. Sea Kayaking Incidents in Norway 2000-2014: An Issue of Bad Weather or Poor Judgement?

    Science.gov (United States)

    Aadland, Eivind; Noer, Gunnar; Vikene, Odd Lennart

    2016-01-01

    The aims of this study were to analyse recreational sea kayaking and touring incidents in Norway with a specific focus on wind conditions and to elaborate on practical implications for the prevention of future incidents. We included 49 incidents reported by the media between 2000 and 2014. Incidents occurred in various wind conditions, but most…

  18. [Causal inference in medicine: a reaction to the report, "incidence of Minamata disease in communities along the Agano River, Niigata, Japan--patterns of the exposure and official diagnosis of patients"].

    Science.gov (United States)

    Tsuda, T; Mino, Y; Yamamoto, E; Matsuoka, H; Babazono, A; Shigemi, J; Miyai, M

    1997-07-01

    Kondo's "Incidence of Minamata Disease in Communities along the Agano River, Niigata, Japan (Jap. J. Hyg. 51:599-611;1996)" is critically reviewed. The data of the article were obtained from most of the residents living in the Agano river villages where Minamata disease was discovered in June, 1965. However, sampling proportions were much different between in the population base and in the cases. The method of identification of cases from the data and the reason for the difference were not clearly demonstrated. The citations of reference articles are insufficient despite the fact that other epidemiologic studies on methyl-mercury poisoning have been reported not only in Japan, but also around the world. His "analysis of the recognized patients" is erroneous. Both the sampling scheme of information of hair mercury and the modeling of the analysis are based on Kondo's arbitrary interpretation, not on epidemiologic theory. His "analysis of the rejected applicants" is also erroneous. His calculations of the attributable proportion are incorrect and self-induced in both the assignments of data and analysis of data. Kondo has failed to study the epidemiologic theories in light of changes in the field. Therefore, his article is lacking in epidemiologic theory, a logical base and scientific inference. In Japan, epidemiologic methodology has rarely been used in studies on Minamata Disease in either Kumamoto and Niigata. The government has used neurologically specific diagnosis based on combinations of symptoms to judge the causality between each of symptoms and methyl-mercury poisoning. Epidemiologic data obtained in Minamata, Kumamoto in 1971 indicate that the criteria set by the government in 1977 have produced much more false-negative patients than false-positive patients. As a result, a huge number of symptomatic patients, including those with peripheral neuropathy or with constriction of the visual field, did not receive any help or compensation until 1995. The authors

  19. Human Factors in Financial Trading: An Analysis of Trading Incidents.

    Science.gov (United States)

    Leaver, Meghan; Reader, Tom W

    2016-09-01

    This study tests the reliability of a system (FINANS) to collect and analyze incident reports in the financial trading domain and is guided by a human factors taxonomy used to describe error in the trading domain. Research indicates the utility of applying human factors theory to understand error in finance, yet empirical research is lacking. We report on the development of the first system for capturing and analyzing human factors-related issues in operational trading incidents. In the first study, 20 incidents are analyzed by an expert user group against a referent standard to establish the reliability of FINANS. In the second study, 750 incidents are analyzed using distribution, mean, pathway, and associative analysis to describe the data. Kappa scores indicate that categories within FINANS can be reliably used to identify and extract data on human factors-related problems underlying trading incidents. Approximately 1% of trades (n = 750) lead to an incident. Slip/lapse (61%), situation awareness (51%), and teamwork (40%) were found to be the most common problems underlying incidents. For the most serious incidents, problems in situation awareness and teamwork were most common. We show that (a) experts in the trading domain can reliably and accurately code human factors in incidents, (b) 1% of trades incur error, and (c) poor teamwork skills and situation awareness underpin the most critical incidents. This research provides data crucial for ameliorating risk within financial trading organizations, with implications for regulation and policy. © 2016, Human Factors and Ergonomics Society.

  20. Cancer incidence of Nordic asphalt workers.

    Science.gov (United States)

    Randem, Britt Grethe; Burstyn, Igor; Langård, Sverre; Svane, Ole; Järvholm, Bengt; Kauppinen, Timo; Bergdahl, Ingvar A; Johansen, Christoffer; Hansen, Johnni; Partanen, Timo; Kromhout, Hans; Ferro, Gilles; Boffetta, Paolo

    2004-10-01

    The aim of the study was to investigate cancer risk following employment in the asphalt industry. Cancer incidence was studied among 22 362 male asphalt workers employed for more than one season in jobs entailing exposure to bitumen (mainly road pavers) in Denmark, Finland, Norway, and Sweden. These workers are part of a European cohort of asphalt workers, for which results on mortality have been reported. The follow-up was almost complete, and reference rates were obtained from national cancer registries. The incidence of cancer was reduced in all four countries [overall standardized incidence ratio (SIR) 0.89, 95% confidence interval (95% CI) 0.86-0.94]. Lung cancer incidence was increased in all four countries, yielding an overall SIR of 1.21 (95% CI 1.07-1.36), but no trend was detected according to time since first employment. No overall increased incidence of bladder cancer was observed, but there was a suggestion of a tendency towards higher risk with longer time since first employment, with a relative risk of 1.85 (95% CI 0.90-3.78) for more than 30 years versus 1-14 years (P-value for trend 0.1). The incidence of lip and stomach cancer was nonsignificantly increased, and the excess was present mainly in Denmark. No increased incidence was detected for other neoplasms, notably malignant melanoma, nonmelanoma skin cancer, and kidney cancer. The results of this study confirm the pattern of cancer risk detected in the mortality analysis of the European cohort; in addition, they provide suggestive evidence of an excess risk of bladder cancer among asphalt workers.

  1. Invasive cancer incidence - United States, 2010.

    Science.gov (United States)

    Henley, S Jane; Singh, Simple; King, Jessica; Wilson, Reda; Ryerson, Blythe

    2014-03-28

    Cancer has many causes, some of which can, at least in part, be avoided through interventions known to reduce cancer risk. Healthy People 2020 objectives call for reducing colorectal cancer incidence to 38.6 per 100,000 persons, reducing late-stage breast cancer incidence to 41.0 per 100,000 women, and reducing cervical cancer incidence to 7.1 per 100,000 women. To assess progress toward reaching these Healthy People 2020 targets, CDC analyzed data from U.S. Cancer Statistics (USCS) for 2010. USCS includes incidence data from CDC's National Program of Cancer Registries and the National Cancer Institute's Surveillance, Epidemiology, and End Results (SEER) program and mortality data from the National Vital Statistics System. In 2010, a total of 1,456,496 invasive cancers were reported to cancer registries in the United States (excluding Arkansas and Minnesota), an annual incidence rate of 446 cases per 100,000 persons, compared with 459 in 2009. Cancer incidence rates were higher among men (503) than women (405), highest among blacks (455), and ranged by state from 380 to 511 per 100,000 persons. Many factors, including tobacco use, obesity, insufficient physical activity, and human papilloma virus (HPV) infection, contribute to the risk for developing cancer, and differences in cancer incidence indicate differences in the prevalence of these risk factors. These differences can be reduced through policy approaches such as the Affordable Care Act, which could increase access for millions of persons to appropriate and timely cancer preventive services, including help with smoking cessation, cancer screening, and vaccination against HPV.

  2. Injury incidence and cause in elite gymnasts.

    Science.gov (United States)

    Felländer-Tsai, L; Wredmark, T

    1995-01-01

    This report describes the incidence, localization, and cause of injuries in Swedish male and female elite gymnasts during 18 active months (three seasons). Thirty-one elite gymnast clubs with all together 437 gymnasts were included in the study, which consisted of a written questionnaire reporting morphometric facts as well as data concerning the injury. There were in total 82 injury reports. The injury incidence was 6.25 per 100 elite gymnasts and season. A majority of the injuries occurred in the lower extremities. The right leg was injured more often than the left. Most of the severe injuries occurred during mounting and dismounting which advocates the need for preventive measures in association with these particular events. Male gymnasts were more prone to sustain severer injuries such as dislocations and fractures. Severe injuries affected the upper extremity in 83%, and the right side was injured more often than the left.

  3. Surface Processes and Hack's law

    Science.gov (United States)

    Walcott, R.

    2010-12-01

    Hack’s law describes the non-linear relationship between the area of a catchment and the length of the longest stream within it. First described in the 1950’s based on a small area in the Appalachians, more recent studies have suggested that this relationship is consistent for over 13 orders of magnitude. As a result Hack’s law is generally considered as one of the fundamental morphological relationships of geomorphology and much effort has been devoted to understanding its origins. This law suggests that catchments are scale independent, however, recent work has demonstrated that the form of catchments varies depending on the type of surface processes operating within the catchment. In this paper we analyse the relationship between hillslope processes and Hack’s law for catchments that range over several orders of magnitude in size in the Himalaya and Chile. We show that Hack’s law varies systematically depending on the mean slope of a catchment. As the dominant process that operates within a catchment also varies with slope and scales with catchment size our findings have important implications for the robustness of Hack’s law and the scale independence of catchments.

  4. Bluetooth Hacking: A Case Study

    Directory of Open Access Journals (Sweden)

    Dennis Browning

    2009-06-01

    Full Text Available This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

  5. Learning from incidents and accidents

    NARCIS (Netherlands)

    Drupsteen, L.; Kampen, J. van

    2014-01-01

    There are many different definitions for what constitutes an incident or an accident, however the focus is always on unintended and often unforeseen events that cause unintended consequences. This article is focused on the process of learning from incidents and accidents. The focus is on making sure

  6. Harnessing Critical Incidents for Learning

    Science.gov (United States)

    Patahuddin, Sitti Maesuri; Lowrie, Tom

    2015-01-01

    A critical incident is a situation or event that holds significance for learning, both for the students and teachers. This paper presents four examples of critical incidents from a Year 7 teacher's lesson excerpts in Indonesia involving teaching of fractions, to show how they shaped classroom situation, brought forward elements of conflict, and…

  7. Learning from incidents and accidents

    NARCIS (Netherlands)

    Drupsteen, L.; Kampen, J. van

    2014-01-01

    There are many different definitions for what constitutes an incident or an accident, however the focus is always on unintended and often unforeseen events that cause unintended consequences. This article is focused on the process of learning from incidents and accidents. The focus is on making sure

  8. Learning from radiation incidents: the new OTHEA website.

    Science.gov (United States)

    Shaw, P V; Croüail, P; Bataille, C; Ely, S Y

    2010-12-01

    OTHEA is the name of a new website (www.othea.net), created by the Health Protection Agency (UK) and the Centre d'étude sur l'évaluation de la protection dans le domaine nucléaire (CEPN, France), and supported by several other stakeholders including national societies and associations. The website is bi-lingual (French and English) and the purpose is to share the lessons learnt from radiological incidents that have occurred in the industrial, medical, research and teaching, and other non-nuclear sectors. OTHEA contains a collection of incident reports, categorised according to the sector and the type of application, and a search facility. The reports can be freely downloaded and printed, for example for use in radiation protection training activities. To encourage dissemination, the incident reports have been made anonymous, i.e. any information that could identify a particular individual, organisation or site has been removed. Each report contains a brief summary of the incident, the radiological consequences, and the lessons learnt. The aim is not to capture every single incident, but to provide a range of reports selected according to the value of the lessons learnt. For OTHEA to be a long-term success, it needs to be sustained with new reports. Therefore users are encouraged to submit incident reports that can be considered for inclusion in OTHEA. This note summarises the background to OTHEA, and provides a description of the operating features and content at its launch in summer 2010.

  9. Retrospective Analysis of Opioid Medication Incidents Requiring Administration of Naloxone

    Science.gov (United States)

    Neil, Katherine; Marcil, Allison; Kosar, Lynette; Dumont, Zack; Ruda, Lisa; McMillan, Kaitlyn

    2013-01-01

    Background: Opioid analgesics are high-alert medications known to cause adverse drug events. Objectives: The purpose of this study was to determine the cause of opioid incidents requiring administration of naloxone, an opioid reversal agent. The specific objectives were to determine the number of opioid incidents and the proportion of incidents documented through occurrence reporting and to characterize the incidents by phase in the medication-use process, by type of incident, and by drug responsible for toxic effects. Methods: A retrospective chart analysis was conducted using records from 2 acute care centres in the Regina Qu’Appelle Health Region. The study included inpatients who received naloxone for reversal of opioid toxicity resulting from licit, in-hospital opioid use. Cases were classified as preventable or nonpreventable. Preventable cases were analyzed to determine the phase of the medication-use process during which the incident occurred. These cases were also grouped thematically by the type of incident. The drug most likely responsible for opioid toxicity was determined for each case. The proportion of cases documented by occurrence reporting was also noted. Results: Thirty-six cases involving administration of naloxone were identified, of which 29 (81%) were deemed preventable. Of these 29 preventable cases, the primary medication incident occurred most frequently in the prescribing phase (23 [79%]), but multiple phases were often involved. The cases were grouped into 6 themes according to the type of incident. Morphine was the drug that most frequently resulted in toxic effects (18 cases [50%]). Only two of the cases (5.6%) were documented by occurrence reports. Conclusion: Preventable opioid incidents occurred in the acute care centres under study. A combination of medication safety initiatives involving multiple disciplines may be required to decrease the incidence of these events and to better document their occurrence. PMID:24159230

  10. Testosterone Replacement Therapy and Prostate Cancer Incidence

    OpenAIRE

    Eisenberg, Michael Louis

    2015-01-01

    While early studies demonstrated a positive association between testosterone and prostate cancer, evidence on the nature of the relationship has evolved with time and newer data. Studies examining links between baseline testosterone levels as well as testosterone therapy and incident prostate cancer, reveal a more complex relationship. Moreover, investigators have reported their initial experiences with supplementing testosterone in men with a history of both treated and untreated prostate ca...

  11. Global incidence and outcome of testicular cancer

    Science.gov (United States)

    Shanmugalingam, Thurkaa; Soultati, Aspasia; Chowdhury, Simon; Rudman, Sarah; Van Hemelrijck, Mieke

    2013-01-01

    Background Testicular cancer is a rare tumor type accounting for 1% of malignancies in men. It is, however, the most common cancer in young men in Western populations. The incidence of testicular cancer is increasing globally, although a decline in mortality rates has been reported in Western countries. It is important to identify whether the variations in trends observed between populations are linked to genetic or environmental factors. Methods Age-standardized incidence rates and age-standardized mortality rates for testicular cancer were obtained for men of all ages in ten countries from the Americas, Asia, Europe, and Oceania using the Cancer Incidence in Five Continents (CI5plus) and World Health Organization (WHO) mortality databases. The annual percent change was calculated using Joinpoint regression to assess temporal changes between geographical regions. Results Testicular cancer age-standardized incidence rates are highest in New Zealand (7.8), UK (6.3), Australia (6.1), Sweden (5.6), USA (5.2), Poland (4.9), and Spain (3.8) per 100,000 men. India, China, and Colombia had the lowest incidence (0.5, 1.3, and 2.2, respectively) per 100,000 men. The annual percent changes for overall testicular cancer incidence significantly increased in the European countries Sweden 2.4%, (2.2; 2.6); UK 2.9%, (2.2; 3.6); and Spain 5.0%, (1.7; 8.4), Australia 3.0%, (2.2; 3.7), and China 3.5%, (1.9; 5.1). India had the lowest overall testicular cancer incidence −1.7%, (−2.5; −0.8). Annual percent changes for overall testicular cancer mortality rates were decreasing in all study populations, with the greatest decline observed in Sweden −4.2%, (−4.8; −3.6) and China −4.9%, (−6.5; −3.3). Conclusion Testicular cancer is increasing in incidence in many countries; however, mortality rates remain low and most men are cured. An understanding of the risks and long-term side effects of treatment are important in managing men with this disease. PMID:24204171

  12. European Clearinghouse - Contributing Factors to Incidents Related to Reactivity Management

    OpenAIRE

    BRUYNOOGHE Christiane; NOEL MARC

    2009-01-01

    In this paper shortcomings in reactivity management reported to the IAEA Incident Reporting System in the period 1981-2008 are investigated and contributing factors to reactivity management incidents are analysed. The aim of theworkwas to identify the initiating factors and associated root causes. Five of the seven factors identified for all events were present in the 1999 Shika-1 event where criticality has been unexpectedly reached and maintained during fifteen minutes. Most of the events r...

  13. Incidence of injury in kickboxing participation.

    Science.gov (United States)

    Romaine, Linda J; Davis, Shala E; Casebolt, Kevin; Harrison, Kelly A

    2003-08-01

    Cardio kickboxing classes have become a popular form of exercise to enhance fitness. This study surveyed kickboxing participants and instructors to ascertain the severity, type, and incidence of injuries sustained while performing cardio kickboxing exercise. The respondents consisted of 77.4% instructors and 29.3% participants with a mean age of 32.29 years (+/-8.98 years). Injury from kickboxing exercise was reported by 29.3% of the respondents, 31% of the instructors, and 15.5% of the participants. The most common site of injury for instructors was the back, followed by the knee, hip, and shoulder. The most common site of injury for participants was the back, knee, and ankle. Strains were the most common type of injury reported, followed by sprains and tendinitis. More than half of the injuries reported were new injuries (64%), with almost 59% of the total injuries reported causing a disruption of the normal exercise routine or an alteration of normal daily activities. Instructors who reported using music speeds greater than 140 beats per minute had a higher incidence of injury, compared with instructors who used music between 125 and 139 beats per minute. The wrist and elbow had the highest percentage of new injuries reported. This study suggests that kickboxing exercise can be a safe form of exercise for fitness purposes. Keeping music speeds below 140 beats per minute and limiting the number of kickboxing sessions per week may help to reduce injury rates.

  14. Effect of Body Mass Index on All-cause Mortality and Incidence of Cardiovascular Diseases - Report for Meta-Analysis of Prospective Studies on Optimal Cut-off Points of Body Mass Index in Chinese Adults

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Objective To verify the optimal cut-off points for overweight and obesity in Chinese adults based on the relationship of baseline body mass index (BMI) to all-cause mortality, and incidence of cardiovascular diseases from pooled data of Chinese cohorts. Methods The prospective study data of existing cohort studies in China were collected, and the age-adjusted all-cause mortality stratified by BMI were estimated. The similar analysis was repeated after excluding deaths within the first three years of follow-up and after excluding smokers. The incidence of age-adjusted coronary heart disease (CHD) and stroke stratified by BMI were also analyzed. Multiple Cox regression coefficients of BMI for the incidence of CHD and stroke after controlling other risk factors were pooled utilizing the methods of weighting by inverse of variance to reveal whether BMI had independent effect and its strength on the incidence of CHD and stroke. Results The data of 4 cohorts including 76 227persons, with 745 346 person-years of follow-up were collected and analyzed. The age-adjusted allcause mortality stratified by BMI showed a U-shaped curve, even after excluding deaths within the first three years of follow-up and excluding smokers. Age-adjusted all-cause mortality increased when BMI was lower than 18.5 and higher than 28. The incidence of CHD and stroke, especially ishemic stroke increased with increasing BMI, this was consistent with parallel increasing of risk factors. Cox regression analysis showed that BMI was an independent risk factor for both CHD and stroke. Each amount of 2 kg/m2 increase in baseline BMI might cause 15.4%, 6.1% and 18.8 % increase in relative risk of CHD, total stroke and ischemic stroke. Reduction of BMI to under 24 might prevent the incidence of CHD by 11% and that of stroke by15 % for men, and 22 % of both diseases for women. Conclusion BMI ≤18.5, 24-27.9 and ≥28 (kg/m2) is the appropriate cut-off points for underweight, overweight and obesity in

  15. Incidence of late-life depression: a systematic review.

    Science.gov (United States)

    Büchtemann, Dorothea; Luppa, Melanie; Bramesfeld, Anke; Riedel-Heller, Steffi

    2012-12-15

    In the past years, many studies have examined the prevalence of late-life depression. However, incidence studies, especially those including the oldest age groups, remained rare. The objective of this article is therefore to provide a systematic review on incidence of depressive disorders in latest life. A systematic search of the literature published between 1985 and 2011 was conducted using MEDLINE, Web of Science, PsycInfo and Cochrane databases. Inclusion criteria were: incidence specified for persons aged≥70 years at baseline, population-based sample or primary care sample. Incidence rates or risks were extracted or calculated. We found 20 studies reporting incidence according to categorical (n=14) or dimensional diagnoses (n=6). The incidence of depressive disorders varied considerably. Major Depression (MD) was found to occur less often than Minor Depression (MinD), whereas clinically relevant depressive symptoms are at least as frequent as MinD. The incidence rate of MD was 0.2-14.1/100 person-years, and incidence of clinically relevant depressive symptoms was 6.8/100 person-years. Female incidence was mostly higher than male. Associations between age and incidence revealed to be rather inconsistent between studies. Methodological diversity of the studies concerning diagnostics, data collection methods, incidence definitions and sampling make the results difficult to interprete. This review is the first to have focused on incidence studies on depression in latest life. The frequent occurrence of clinically relevant depressive symptoms will have to be considered in future health care planning. Physical health and psychosocial influences appear to be key variables in depression prevention. Copyright © 2012 Elsevier B.V. All rights reserved.

  16. Cancer incidence in Italian contaminated sites

    Directory of Open Access Journals (Sweden)

    Pietro Comba

    2014-06-01

    Full Text Available INTRODUCTION. The incidence of cancer among residents in sites contaminated by pollutants with a possible health impact is not adequately studied. In Italy, SENTIERI Project (Epidemiological study of residents in National Priority Contaminated Sites, NPCSs was implemented to study major health outcomes for residents in 44 NPCSs. METHODS. The Italian Association of Cancer Registries (AIRTUM records cancer incidence in 23 NPCSs. For each NPCSs, the incidence of all malignant cancers combined and 35 cancer sites (coded according to ICD-10, was analysed (1996-2005. The observed cases were compared to the expected based on age (5-year period,18 classes, gender, calendar period (1996-2000; 2001-2005, geographical area (North-Centre and Centre-South and cancer sites specific rates. Standardized Incidence Ratios (SIR with 90% Confidence Intervals were computed. RESULTS. In both genders an excess was observed for overall cancer incidence (9% in men and 7% in women as well as for specific cancer sites (colon and rectum, liver, gallbladder, pancreas, lung, skin melanoma, bladder and Non Hodgkin lymphoma. Deficits were observed for gastric cancer in both genders, chronic lymphoid leukemia (men, malignant thyroid neoplasms, corpus uteri and connective and soft-tissue tumours and sarcomas (women. DISCUSSION. This report is, to our knowledge, the first one on cancer risk of residents in NPCSs. The study, although not aiming to estimate the cancer burden attributable to the environment as compared to occupation or life-style, supports the credibility of an etiologic role of environmental exposures in contaminated sites. Ongoing analyses focus on the interpretation of risk factors for excesses of specific cancer types overall and in specific NPCSs in relation to the presence of carcinogenic pollutants.

  17. Cancer Incidence and Mortality in China, 2007

    Institute of Scientific and Technical Information of China (English)

    Wan-qing Chen; Hong-mei Zeng; Rong-shou Zheng; Si-wei Zhang; Jie He

    2012-01-01

    Objective:Cancer incidence and mortality data collected from population-based cancer registries were analyzed to present the overall cancer statistics in Chinese registration areas by age,sex and geographic area in 2007.Methods:In 2010,48 cancer registries reported cancer incidence and mortality data of 2007 to National Central Cancer Registry of China.Of them,38 registries' data met the national criteria.Incidence and mortality were calculated by cancer sites,age,gender,and area.Age-standardized rates were described by China and World population.Results:The crude incidence rate for all cancers was 276.16/100,000 (305.22/100,000 for male and 246.46/100,000 for female; 284.71/100,000 in urban and 251.07/100,000 in rural).Age-standardized incidence rates by China and World population were 145.39/100,000 and 189.46/100,000 respectively.The crude mortality rate for all cancers was 177.09/100,000 (219.15/100,000 for male and 134.10/100,000 for female; 173.55/100,000 in urban and 187.49/100,000 in rural).Age-standardized mortality rates by China and World population were 86.06/100,000 and 116.46/100,000,respectively.The top 10 most frequently common cancer sites were the lung,stomach,colon and rectum,liver,breast,esophagus,pancreas,bladder,brain and lymphoma,accounting for 76.12% of the total cancer cases.The top 10 causes of cancer death were cancers of the lung,liver,stomach,esophagus,colon and rectum,pancreas,breast,leukemia,brain and lymphoma,accounting for 84.37% of the total cancer deaths.Conclusion:Cancer remains a major disease threatening people's health in China.Prevention and control should be enhanced,especially for the main cancers.

  18. The Chappaquiddick Incident

    Science.gov (United States)

    Cross, Rod

    2016-12-01

    On July 19, 1969, Senator Edward Kennedy drove his vehicle off a low bridge on Chappaquiddick Island in Massachusetts. The vehicle sank in 2.1 m of water, coming to rest on its roof. According to Kennedy's version of events, he managed to escape from the submerged vehicle without injury, but his female companion, Mary Jo Kopechne, drowned without any sign of injury. He did not report the accident to police until 10 hours later. Kennedy's version of the events was widely disbelieved but was never seriously challenged by the local police or accident investigators or at the subsequent inquest. The accident effectively put an end to Kennedy's bid for the presidency of the United States. At least a dozen books have been written on the subject, offering alternative explanations but the physics of the accident itself has never been properly investigated. In this paper experiments using a toy vehicle are described where the vehicle was projected into a container of water to investigate how the roof may have been damaged. The trajectory through the water was filmed and is explained in terms of elementary physics. Further investigation could be the subject of student projects and would provide an interesting introduction to forensic physics.

  19. Idiot Savants: Rate of Incidence

    Science.gov (United States)

    Hill, A. Lewis

    1977-01-01

    A survey of 300 public residential facilities for the mentally retarded revealed a .06 percent incidence rate for idiot savants, persons of low intelligence who possess an unusually high skill in some special task. (CL)

  20. High Injury Incidence in Adolescent Female Soccer

    DEFF Research Database (Denmark)

    Clausen, Mikkel Bek; Zebis, Mette Kreutzfeldt; Møller, Merete

    2014-01-01

    BACKGROUND: Previous studies report varying rates of time-loss injuries in adolescent female soccer, ranging from 2.4 to 5.3 per 1000 athlete-exposures or 2.5 to 3.7 per 1000 hours of exposure. However, these studies collected data using traditional injury reports from coaches or medical staff......, with methods that significantly underestimate injury rates compared with players' self-reports. PURPOSE: The primary aim was to investigate the injury incidence in adolescent female soccer using self-reports via mobile telephone text messaging. The secondary aim was to explore the association between soccer...... exposure, playing level, and injury risk. STUDY DESIGN: Descriptive epidemiology study and cohort study; Level of evidence, 2 and 3. METHODS: During a full adolescent female soccer season in Denmark (February-June 2012), a population-based sample of 498 girls aged 15 to 18 years was included...

  1. Early estimates of SEER cancer incidence, 2014.

    Science.gov (United States)

    Lewis, Denise Riedel; Chen, Huann-Sheng; Cockburn, Myles G; Wu, Xiao-Cheng; Stroup, Antoinette M; Midthune, Douglas N; Zou, Zhaohui; Krapcho, Martin F; Miller, Daniel G; Feuer, Eric J

    2017-07-01

    Cancer incidence rates and trends for cases diagnosed through 2014 using data reported to the Surveillance, Epidemiology, and End Results (SEER) program in February 2016 and a validation of rates and trends for cases diagnosed through 2013 and submitted in February 2015 using the November 2015 submission are reported. New cancer sites include the pancreas, kidney and renal pelvis, corpus and uterus, and childhood cancer sites for ages birth to 19 years inclusive. A new reporting delay model is presented for these estimates for more consistent results with the model used for the usual November SEER submissions, adjusting for the large case undercount in the February submission. Joinpoint regression methodology was used to assess trends. Delay-adjusted rates and trends were checked for validity between the February 2016 and November 2016 submissions. Validation revealed that the delay model provides similar estimates of eventual counts using either February or November submission data. Trends declined through 2014 for prostate and colon and rectum cancer for males and females, male and female lung cancer, and cervical cancer. Thyroid cancer and liver and intrahepatic bile duct cancer increased. Pancreas (male and female) and corpus and uterus cancer demonstrated a modest increase. Slight increases occurred for male kidney and renal pelvis, and for all childhood cancer sites for ages birth to 19 years. Evaluating early cancer data submissions, adjusted for reporting delay, produces timely and valid incidence rates and trends. The results of the current study support using delay-adjusted February submission data for valid incidence rate and trend estimates over several data cycles. Cancer 2017;123:2524-34. © 2017 American Cancer Society. © 2017 American Cancer Society. This article has been contributed to by US Government employees and their work is in the public domain in the USA.

  2. Report of Incidence and Mortality from China Cancer Registries in 2008%中国肿瘤登记地区2008年恶性肿瘤发病和死亡分析

    Institute of Scientific and Technical Information of China (English)

    郑荣寿; 张思维; 吴良有; 李光琳; 赵平; 赫捷; 陈万青

    2012-01-01

    [Purpose] To investigate the cancer incidence and mortality in cancer registration areas in 2008. [ Methods ] After checking and evaluating the cancer registry data in 2008 from 56 cancer registries, of them 41 registries' data were selected for this analysis. We classified cancer registries into two categories: urban and rural. Incidence and mortality rates,age-specific rates,age-standardized rates,proportions,cumulative rates were calculated. [Results] The population coverage of all 41 registries were 66 138 784 (52 158 495 in urban areas and 13 980 289 in rural areas). The total cancer incident cases and deaths were 197 833 and 122 136,respectively with mortality to incidence rate ratio of 0.62. The morphological verified rate was 69.33% and 2.23% of cases were identified by death certificate only. The crude cancer incidence in registration areas was 299.12/105(330.16/105 in male and 267.56/105 in female) and age-standardized incidence rates by Chinese standard population (ASIRC) and by world standard population (ASIRW) were 148.75/105 and 194.99/105,respectively with cumulative incidence rate (0~74 age years old) of 22.27%. Both of crude and adjusted incidence rates in urban areas were higher than that in rural areas. The crude cancer mortality was 184.67/105 (228.14/105 in male, 140.48/105 in female),and age-standardized mortality rates by Chinese standard population (ASMRC) and by world population were 84.36/105 and 114.32/105 respectively with cumulative mortality rate (0~74 age years old) of 12.89%. Age-adjusted mortality rates in urban areas were lower than that in rural areas. The top ten commonest cancer types were lung, stomach, colorectum, liver, esophagus , pancreas, brain, lymphoma, breast and cervix, accounting for 75% of all cancer incidence in registration areas. Lung cancer was the leading cause of cancer death,followed by gastric cancer,liver cancer, esophageal cancer,colorectum cancer and pancreas cancer. The mortality of top ten cancers

  3. Cancer incidence in children after the Chernobyl reactor accident. Report prepared within the framework of the radiobiological environmental monitoring programme in Bavaria; Inzidenz boesartiger Neubildungen bei Kindern nach dem Reaktorunfall von Tschernobyl. Bericht im Rahmen des Strahlenbiologischen Umweltmonitorings Bayern

    Energy Technology Data Exchange (ETDEWEB)

    Irl, C.; Schoetzau, A.; Santen, F. von; Grosche, B.

    1996-04-01

    The impact of the radiological contamination in Bavaria after the Chernobyl accident on childhood cancer was evaluated. According to caesium 137 in soil samples, Bavaria was subdivided in four regions with different contamination levels. The malignancies selected for analysis were: Leukaemia and non-Hodgkin lymphoma, tumors orginating in the embryonic period, tumors of the central nervous system and thyroid cancer. The temporal changes in the incidence of the selected tumors in the four regions were compared with the temporal changes in the rest of the Federal Republic of Germany (old laender). In addition, it was investigated, whether the tumor incidence after the Chernobyl accident showed a trend in connection with the degree of contamination. The results of the study neither show significant differences in the tumor incidence of regions with different contamination levels, nor are they indicative of a trend in the incidence in relation with contamination. Consequently, this study provides no evidence that the Chernobyl accident caused an increase in childhood cancer. Considering the latency periods of malignant diseases, however, a final evaluation is not yet possible. (orig.) [Deutsch] Der vorliegende Bericht untersucht die Frage einer nach dem Reaktorunfall in Tschernobyl erhoehten Inzidenz boesartiger Neubildungen bei Kindern in Bayern, demjenigen unter den alten Bundeslaendern, das durch den Unfall am staerksten kontaminiert wurde. Von den boesartigen Neubildungen wurden solche ausgewaehlt, bei denen ionisierende Strahlung als ein aetiologisch relevanter Faktor in Frage kommt. Im einzelnen handelt es sich um die Gruppe der Leukaemien und Non-Hodgkin-Lymphome, Tumoren mit Ursprung in der Embryonalzeit (maligne Keimzelltumoren, Nephroblastom, Neuroblastom, Retinoblastom), Tumoren des Zentrahnervensystems und Schilddruesenkarzinome. Die Analyse besteht einerseits in einem Vergleich zwischen unterschiedlich hohen exponierten Bevoelkerungsgruppen Bayerns mit der

  4. Malaria incidence in Limpopo Province, South Africa, 1998–2007

    Directory of Open Access Journals (Sweden)

    Grobusch Martin P

    2008-08-01

    Full Text Available Abstract Background Malaria is endemic in the low-altitude areas of the northern and eastern parts of South Africa with seasonal transmission. The aim of this descriptive study is to give an overview of the malaria incidence and mortality in Limpopo Province for the seasons 1998–1999 to 2006–2007 and to detect trends over time and place. Methods Routinely collected data on diagnosed malaria cases and deaths were available through the provincial malaria information system. In order to calculate incidence rates, population estimates (by sex, age and district were obtained from Statistics South Africa. The Chi squared test for trend was used to detect temporal trends in malaria incidence over the seasons, and a trend in case fatality rate (CFR by age group. The Chi squared test was used to calculate differences in incidence rate and CFR between both sexes and in incidence by age group. Results In total, 58,768 cases of malaria were reported, including 628 deaths. The mean incidence rate was 124.5 per 100,000 person-years and the mean CFR 1.1% per season. There was a decreasing trend in the incidence rate over time (p Conclusion Information from this study may serve as baseline data to determine the course and distribution of malaria in Limpopo province over time. In the study period there was a decreasing trend in the incidence rate. Furthermore, the study addresses the need for better data over a range of epidemic-prone settings.

  5. Incidence of self-reported hearing loss and associated risk factors among the elderly in São Paulo, Brazil: the SABE survey La incidencia de pérdida de la audición auto-reportada entre los ancianos en São Paulo, Brasil, y factores asociados: Estudio SABE Incidência de deficiência auditiva referida em idosos no Município de São Paulo, Brasil, e fatores associados: Estudo SABE

    Directory of Open Access Journals (Sweden)

    Yeda Aparecida de Oliveira Duarte

    2013-04-01

    Full Text Available This study aimed to estimate the incidence of self-reported hearing loss among the elderly in the city of São Paulo, Brazil, and identify associated risk factors. A longitudinal study based on a representative sample of individuals aged 60 years and over interviewed in 2000 was conducted in 2006. The sample was obtained in two stages using the cluster sampling method, adopting the criterion distribution proportional to size, and replacement with probability proportional to population for subjects aged 75 years and over. Statistical analysis was performed using the likelihood ratio test to compare survival curves based on the Cox regression model. A total of 765 individuals were interviewed. The hearing loss incidence rate was 28.9/1,000 persons/year and proportional incidence was 17.4%. Associated risk factors were being aged 80 years and over, being male, having an occupation related to agricultural, industrial or maintenance sectors and having osteoporosis. Steps must be taken to reduce incidence by ameliorating the risks identified, particularly those related to occupational noise and specific diseases, notably osteoporosis.El objetivo fue estimar la incidencia de pérdida de audición auto-reportada por ancianos en São Paulo, Brasil, y factores de riesgo asociados. Se realizó estudio longitudinal en 2006, con base en la población de 60 años o más entrevistada en el año 2000. La muestra se obtuvo por el método de muestreo por conglomerados en dos etapas, según el criterio de reparto proporcional a su tamaño, y la sustitución con una probabilidad proporcional a la población, para los sujetos de 75 años o más. El análisis estadístico se realizó mediante la prueba de razón de verosimilitud para la igualdad de las curvas de supervivencia y regresión de Cox. Se entrevistaron 765 ancianos, con una tasa de incidencia de pérdida de audición auto-reportada de 28,9/1.000 personas-año y una proporción de 17,4%. Los factores de

  6. Cardiovascular disease incidence and survival

    DEFF Research Database (Denmark)

    Byberg, Stine; Agyemang, Charles; Zwisler, Ann Dorthe

    2016-01-01

    and differences in incidence were assessed by Poisson regression and stratified by sex. Survival differences were assessed by Cox regression using all-cause and cause-specific mortality as outcome. Male refugees had significantly lower incidence of CVD (RR = 0.89; 95 % CI 0.85-0.93) and stroke (IRR = 0.62; 95...... significantly lower incidence of CVD, AMI and stroke. All-cause and cause-specific survival after CVD, AMI and stroke was similar or significantly better for migrants compared to Danish-born, regardless of type of migrant (refugee vs. family-reunified) or country of origin. Refugees are disadvantaged in terms...... % CI 0.56-0.69) compared to Danish-born, but significantly higher incidence of AMI (IRR = 1.12; 95 % CI 1.02-1.24). Female refugees had similar rates of CVD and AMI, but significantly lower incidence of stroke (RR = 0.76; 95 % CI 0.67-0.85). Both male and female family-reunified immigrants had...

  7. Incidence of granulomatosis with polyangiitis (Wegener`s) in Greenland and the Faroe Islands

    DEFF Research Database (Denmark)

    Faurschou, M; Helleberg, M; Obel, N

    2013-01-01

    Previous studies suggest that the incidence of granulomatosis with polyangiitis (Wegener's; GPA) increases along a south-north gradient in the Northern Hemisphere with an incidence of 8.0/million/year reported for the population of Northern Norway. In the present study, we assessed the incidence ...

  8. Ethnic density of neighborhoods and incidence of psychotic disorders among immigrants

    NARCIS (Netherlands)

    Veling, Wim; Susser, Ezra; van Os, Jim; Mackenbach, Johan P; Selten, Jean-Paul; Hoek, Hans W

    OBJECTIVE: A high incidence of psychotic disorders has been reported in immigrant ethnic groups in Western Europe. Some studies suggest that ethnic density may influence the incidence of schizophrenia. The authors investigated whether this increased incidence among immigrants depends on the ethnic

  9. Incidence of granulomatosis with polyangiitis (Wegener`s) in Greenland and the Faroe Islands

    DEFF Research Database (Denmark)

    Faurschou, M; Helleberg, M; Obel, N

    2013-01-01

    Previous studies suggest that the incidence of granulomatosis with polyangiitis (Wegener's; GPA) increases along a south-north gradient in the Northern Hemisphere with an incidence of 8.0/million/year reported for the population of Northern Norway. In the present study, we assessed the incidence ...

  10. 浙江省绍兴市2012年恶性肿瘤患病现状分析%Incidence of malignant tumor in Shaoxing of Zhejiang Province: 2012 report

    Institute of Scientific and Technical Information of China (English)

    周伟; 方益荣; 马岩

    2014-01-01

    Objective To analyze the incidence of malignant tumor in Shaoxing of Zhejiang Province in 2012.Methods Descriptive analysis was carried out based on our chronic disease monitoring information management system.Age-standardized incidence was calculated according to Chinese standard population in 1982 and the Segi's world population.Results The crude incidence of malignant tumor was 291.34/100 000,age-standardized rate by Chinese standard population (ASR China) and by world population was 137.29/100 000 or 176.72/100 000,respectively.The cumulative rate of the 0-74 years old group was 20.27% and the cut rate of the 35-64 years old group was 301.49/100 000.Male crude incidence of cancer and ASR China were 330.46/100 000 and 149.28/100 000,respectively; for female,the figure was 251.93/ 100 000 and 124.79/100 000,respectively.The crude incidence and ASR China were 364.85/100 000 and 171.77/100 000 in urban area residents,and 277.86/100 000 and 130.93/100 000 for those living in rural areas.Age-specific incidence of the 0-29 years old group remained low,although the incidence was increased after 30 years old and reached the peak in the 80-84 years old group.The most common malignancy were lung cancer,gastric cancer,colorectal cancer,liver cancer,breast cancer,thyroid cancer,esophageal cancer,pancreatic cancer,cervical cancer and leukemia (76.77%).Conclusions Lung cancer,gastrointestinal cancer and female reproductive system cancer were most common malignancy in Shaoxing of Zhejiang Province in 2012.The incidence of thyroid cancer,leukemia and brain tumor is significantly increased over the past few years,which may need effective control and prevention strategies.%目的 分析2012年浙江省绍兴市恶性肿瘤患病现状.方法 从浙江省慢性病监测信息管理系统中提取绍兴市2012年肿瘤患病数据,进行描述性分析.人口标准化率采用1982年中国人口构成和Segi's世界标准人口构成进行计算.结果 2012年绍兴

  11. Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2017-01-09

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  12. Additional renal arteries: incidence and morphometry.

    Science.gov (United States)

    Satyapal, K S; Haffejee, A A; Singh, B; Ramsaroop, L; Robbs, J V; Kalideen, J M

    2001-01-01

    Advances in surgical and uro-radiological techniques dictate a reappraisal and definition of renal arterial variations. This retrospective study aimed at establishing the incidence of additional renal arteries. Two subsets were analysed viz.: a) Clinical series--130 renal angiograms performed on renal transplant donors, 32 cadaver kidneys used in renal transplantation b) Cadaveric series--74 en-bloc morphologically normal kidney pairs. The sex and race distribution was: males 140, females 96; African 84, Indian 91, White 43 and "Coloured" 18, respectively. Incidence of first and second additional arteries were respectively, 23.2% (R: 18.6%; L: 27.6%) and 4.5% (R: 4.7%; L: 4.4%). Additional arteries occurred more frequently on the left (L: 32.0%; R: 23.3%). The incidence bilaterally was 10.2% (first additional arteries, only). The sex and race incidence (first and second additional) was: males, 28.0%, 5.1%; females, 16.4%, 3.8% and African 31.1%, 5.4%; Indian 13.5%, 4.5%; White 30.9%, 4.4% and "Coloured" 18.5%, 0%; respectively. Significant differences in the incidence of first additional arteries were noted between sex and race. The morphometry of additional renal arteries were lengths (cm) of first and second additional renal arteries: 4.5 and 3.8 (right), 4.9 and 3.7 (left); diameters: 0.4 and 0.3 (right), 0.3 and 0.3 (left). Detailed morphometry of sex and race were also recorded. No statistically significant differences were noted. Our results of the incidence of additional renal arteries of 27.7% compared favourably to that reported in the literature (weighted mean 28.1%). The study is unique in recording detailed morphometry of these vessels. Careful techniques in the identification of this anatomical variation is important since it impacts on renal transplantation surgery, vascular operations for renal artery stenosis, reno-vascular hypertension, Takayasu's disease, renal trauma and uro-radiological procedures.

  13. Increasing incidence of coeliac disease in Sweden.

    Science.gov (United States)

    Ascher, H; Krantz, I; Kristiansson, B

    1991-01-01

    Changes in the incidence of coelic disease was studied among children born in Göteborg, Sweden, between 1970 and 1988. A total of 188 patients with coeliac disease were found. Of these, 83% were less than 2 years old at the time of their first duodenal biopsy and 74% of them have so far been verified according to the criteria of the European Society for Gastroenterology and Nutrition (ESPGAN). The cumulative incidence at 2 years of age/1000 liveborn infants increased significantly from 0.31 in the first birth cohort to 2.93 in the last. This increase could only partly be explained by improvements in detection. Weight for age at diagnosis was generally considerably below the reference value, but was slightly less affected towards the end of the period. The increase in incidence of coeliac disease is the first reported since the middle 1970s and makes the disease one of the most common chronic diseases among Swedish children. PMID:2039251

  14. Development of First Responders Equipment at RN Incident Sites

    Science.gov (United States)

    Tsuchiya, K.; Kuroki, K.; Kurosawa, K.; Akiba, N.

    2015-10-01

    On site categorization and collection of radioactive and nuclear materials are required at radiological and nuclear incident site. We are developing portable equipment and radiation protection for radiological emergency response team to carry out emergency missions safely at the incident sites. In this report, we review radiation monitoring system including wireless dosimeter system and neutron shield with water developed in our institute. Also the development of fast-neutron directional detector with a micro pattern gas detector is described.

  15. Incidence and risk factors for capecitabine-induced symptomatic cardiotoxicity

    DEFF Research Database (Denmark)

    Polk, Anne; Shahmarvand, Nahid; Vistisen, Kirsten

    2016-01-01

    OBJECTIVES: Case reports of capecitabine cardiotoxicity resemble those seen with intravenous 5-fluorouracil (5-FU) with chest pain as the predominant manifestation, but few studies of capecitabine cardiotoxicity are available. We aimed to determine the incidence of symptomatic cardiotoxicity from.......020) were risk factors of cardiotoxicity. CONCLUSIONS: The incidence of cardiotoxicity from capecitabine resembles that of intravenous 5-FU (≈5%). Cardiac comorbidity, hypercholesterolaemia and current smoking were associated with development of cardiotoxicity....

  16. Leptospirosis in Ireland: annual incidence and exposures associated with infection.

    LENUS (Irish Health Repository)

    Garvey, P

    2013-08-05

    SUMMARY Human leptospirosis is found throughout the world, albeit with a higher incidence in tropical regions. In temperate regions it is associated with certain occupational and recreational activities. This paper reports both on the incidence of human leptospirosis in Ireland and on possible associated exposures, using leptospirosis case notification, enhanced surveillance, hospital discharge data and death registrations. Based on official notification data, there was a threefold increase in the reported incidence of leptospirosis in Ireland between 1995-1999 and 2004-2009, which appears partially to be due to improved reporting. The exposures most associated with infection were those involving contact with livestock or water-based recreational sports, in particular kayaking. Advice on prevention should continue to be targeted in the first instance at these groups. The variety of potential transmission routes reported should inform clinicians to consider leptospirosis in individuals with a compatible clinical profile who were not from occupational groups historically considered at risk.

  17. Leptospirosis in Ireland: annual incidence and exposures associated with infection.

    Science.gov (United States)

    Garvey, P; Connell, J; O'Flanagan, D; McKeown, P

    2014-04-01

    Human leptospirosis is found throughout the world, albeit with a higher incidence in tropical regions. In temperate regions it is associated with certain occupational and recreational activities. This paper reports both on the incidence of human leptospirosis in Ireland and on possible associated exposures, using leptospirosis case notification, enhanced surveillance, hospital discharge data and death registrations. Based on official notification data, there was a threefold increase in the reported incidence of leptospirosis in Ireland between 1995-1999 and 2004-2009, which appears partially to be due to improved reporting. The exposures most associated with infection were those involving contact with livestock or water-based recreational sports, in particular kayaking. Advice on prevention should continue to be targeted in the first instance at these groups. The variety of potential transmission routes reported should inform clinicians to consider leptospirosis in individuals with a compatible clinical profile who were not from occupational groups historically considered at risk.

  18. Importance of debriefing following critical incidents.

    Science.gov (United States)

    Healy, Sonya; Tyrrell, Mark

    2013-03-01

    Working in emergency departments (EDs) is inherently stressful, and stress caused by events such as witnessed death, elder or child abuse, and aggression and violence can have profound effects on staff. One strategy that can be effective in helping staff deal with such events is critical incident stress debriefing but, as the literature suggests, this is poorly established in ED settings. This article reports the results of a study in three EDs in Ireland of nurses' and doctors' perceived needs for debriefing and makes recommendations to improve this area of practice.

  19. Incidence of Trypanosoma evansi in Thrissur town

    Directory of Open Access Journals (Sweden)

    Deepa G Menon and Litty Mathew

    Full Text Available There were report of two cases of Trypanosomiasis in thrissur town. It is a disease complex caused by several species of blood-and tissue-dwelling protozoan parasites. It affects cattle, sheep, goats, pigs, horses, camels wild animals and man. Severity of disease varies with species and age of the animal infected and the species of trypanosome involved. Confirmation depends on demonstrating trypanosomes in stained blood smears or wet mounts. Animals can be given drugs prophylactically in areas with an incidence. Drug resistance must be carefully monitored by frequent blood examinations for trypanosomes in treated animals. [Veterinary World 2008; 1(9.000: 275-277

  20. Emotional impact of patient safety incidents on family physicians and their office staff.

    Science.gov (United States)

    O'Beirne, Maeve; Sterling, Pam; Palacios-Derflingher, Luz; Hohman, Stacey; Zwicker, Karen

    2012-01-01

    The objective of this study was to investigate the emotional responses and coping strategies that family physicians and their office staff reported in response to a patient safety incident. Two questions contained in a patient safety incident report developed for a study of patient safety in family practice were analyzed. The questions asked reporters to indicate their emotional response to a patient safety incident and how they coped with it. A total of 264 confidential patient safety incident reports collected from September 2007 to August 2010 were analyzed. An emotional response was reported on 82.4% of reports. Of those reports on which an emotional response was reported, a coping strategy was reported on 62.8%. The top 4 reported emotional responses were frustration (48.3%), embarrassment (31.5%), anger (12.6%), and guilt (10.1%). Physicians reported an emotional response more often than clinic staff. An emotional response was reported more often when there was a possibility of harm. Coping strategies were reported as follows: 52% talked to someone about the incident, 37.2% did nothing in response to the incident, 17.9% told the patient about the incident, and 3.6% did something else. Female physicians reported using coping strategies less often than male physicians. A coping strategy was reported more often when there was a possibility of harm. All members of the health care team report experiencing emotions related to patient safety incidents in their practice. Incidents with minor or no harm still invoked emotional responses from the providers. It is important to understand the impact that patient safety incidents have on the medical clinic as a whole.