643 research outputs found

    Regionalizing healthcare: a vision for transforming Lebanon into a regional academic hub

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Lebanon suffers from a large scale emigration of physicians coupled with an oversaturation of the physician job market. Lebanon is currently witnessing an expansion of its medical education capacity with the establishment of new private medical schools, raising the fears of a worsening market oversaturation.</p> <p>Discussion</p> <p>The neighboring Arabian Gulf countries are suffering from a serious shortage of clinicians and academicians. In spite of their enormous investments in educational, clinical and research collaborative initiatives with some of the most renowned North American medical schools and institutions, their ability to recruit and retain highly qualified clinicians and academicians remains a major challenge. Lebanese universities have the opportunity to establish triangular collaborations with the Gulf regional medical centers and their North American partners. They could achieve this goal by tapping into the globalized and high quality Lebanese physician workforce and consequently regionalize healthcare delivery in the Middle East.</p> <p>Summary</p> <p>By recruiting its globalized and high quality physician workforce to establish collaborations with the Gulf regional, Lebanon could become a regional "academic hub".</p

    An educational game for teaching clinical practice guidelines to Internal Medicine residents: development, feasibility and acceptability

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Adherence to Clinical Practice Guidelines (CPGs) remains suboptimal among internal medicine trainees. Educational games are of growing interest and have the potential to improve adherence to CPGs. The objectives of this study were to develop an educational game to teach CPGs in Internal Medicine residency programs and to evaluate its feasibility and acceptability.</p> <p>Methods</p> <p>We developed the Guide-O-Game<sup>© </sup>in the format of a TV game show with questions based on recommendations of CPGs. The development of the Guide-O-Game<sup>© </sup>consisted of the creation of a multimedia interactive tool, the development of recommendation-based questions, and the definition of the game's rules. We evaluated its feasibility through pilot testing and its acceptability through a qualitative process.</p> <p>Results</p> <p>The multimedia interactive tool uses a Macromedia Flash web application and consists of a manager interface and a user interface. The user interface allows the choice of two game styles. We created so far 16 sets of questions relating to 9 CPGs. The pilot testing proved that the game was feasible. The qualitative evaluation showed that residents considered the game to be acceptable.</p> <p>Conclusion</p> <p>We developed an educational game to teach CPGs to Internal Medicine residents that is both feasible and acceptable. Future work should evaluate its impact on educational outcomes.</p

    On the Use of Key Assignment Schemes in Authentication Protocols

    Full text link
    Key Assignment Schemes (KASs) have been extensively studied in the context of cryptographically-enforced access control, where derived keys are used to decrypt protected resources. In this paper, we explore the use of KASs in entity authentication protocols, where we use derived keys to encrypt challenges. This novel use of KASs permits the efficient authentication of an entity in accordance with an authentication policy by associating entities with security labels representing specific services. Cryptographic keys are associated with each security label and demonstrating knowledge of an appropriate key is used as the basis for authentication. Thus, by controlling the distribution of such keys, restrictions may be efficiently placed upon the circumstances under which an entity may be authenticated and the services to which they may gain access. In this work, we explore how both standardized protocols and novel constructions may be developed to authenticate entities as members of a group associated to a particular security label, whilst protecting the long-term secrets in the system. We also see that such constructions may allow for authentication whilst preserving anonymity, and that by including a trusted third party we can achieve the authentication of individual identities and authentication based on timestamps without the need for synchronized clocks

    A well-separated pairs decomposition algorithm for k-d trees implemented on multi-core architectures

    Get PDF
    Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.Variations of k-d trees represent a fundamental data structure used in Computational Geometry with numerous applications in science. For example particle track tting in the software of the LHC experiments, and in simulations of N-body systems in the study of dynamics of interacting galaxies, particle beam physics, and molecular dynamics in biochemistry. The many-body tree methods devised by Barnes and Hutt in the 1980s and the Fast Multipole Method introduced in 1987 by Greengard and Rokhlin use variants of k-d trees to reduce the computation time upper bounds to O(n log n) and even O(n) from O(n2). We present an algorithm that uses the principle of well-separated pairs decomposition to always produce compressed trees in O(n log n) work. We present and evaluate parallel implementations for the algorithm that can take advantage of multi-core architectures.The Science and Technology Facilities Council, UK

    Meta-analysis of antibiotics versus appendicectomy for non-perforated acute appendicitis

    Get PDF
    Background: For more than a century, appendicectomy has been the treatment of choice for appendicitis. Recent trials have challenged this view. This study assessed the benefits and harms of antibiotic therapy compared with appendicectomy in patients with non-perforated appendicitis. Methods: A comprehensive search was conducted for randomized trials comparing antibiotic therapy with appendicectomy in patients with non-perforated appendicitis. Key outcomes were analysed using random-effects meta-analysis, and the quality of evidence was assessed using the Grading of Recommendations Assessment, Development and Evaluation (GRADE) approach. Results: Five studies including 1116 patients reported major complications in 25 (4.9 per cent) of 510 patients in the antibiotic and 41 (8.4 per cent) of 489 in the appendicectomy group: risk difference -2.6 (95 per cent c.i. -6.3 to 1.1) per cent (low-quality evidence). Minor complications occurred in 11 (2.2 per cent) of 510 and 61 (12.5 per cent) of 489 patients respectively: risk difference -7.2 (-18.1 to 3.8) per cent (very low-quality evidence). Of 550 patients in the antibiotic group, 47 underwent appendicectomy within 1 month: pooled estimate 8.2 (95 per cent c.i. 5.2 to 11.8) per cent (high-quality evidence). Within 1 year, appendicitis recurred in 114 of 510 patients in the antibiotic group: pooled estimate 22.6 (15.6 to 30.4) per cent (high-quality evidence). For every 100 patients with non-perforated appendicitis, initial antibiotic therapy compared with prompt appendicectomy may result in 92 fewer patients receiving surgery within the first month, and 23 more experiencing recurrent appendicitis within the first year. Conclusion: The choice of medical versus surgical management in patients with clearly uncomplicated appendicitis is value-and preference-dependent, suggesting a change in practice towards shared decision-making is necessary.Peer reviewe

    What guidance are researchers given on how to present network meta-analyses to end-users such as policymakers and clinicians? A systematic review

    Get PDF
    © 2014 Sullivan et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.Introduction: Network meta-analyses (NMAs) are complex methodological approaches that may be challenging for non-technical end-users, such as policymakers and clinicians, to understand. Consideration should be given to identifying optimal approaches to presenting NMAs that help clarify analyses. It is unclear what guidance researchers currently have on how to present and tailor NMAs to different end-users. Methods: A systematic review of NMA guidelines was conducted to identify guidance on how to present NMAs. Electronic databases and supplementary sources were searched for NMA guidelines. Presentation format details related to sample formats, target audiences, data sources, analysis methods and results were extracted and frequencies tabulated. Guideline quality was assessed following criteria developed for clinical practice guidelines. Results: Seven guidelines were included. Current guidelines focus on how to conduct NMAs but provide limited guidance to researchers on how to best present analyses to different end-users. None of the guidelines provided reporting templates. Few guidelines provided advice on tailoring presentations to different end-users, such as policymakers. Available guidance on presentation formats focused on evidence networks, characteristics of individual trials, comparisons between direct and indirect estimates and assumptions of heterogeneity and/or inconsistency. Some guidelines also provided examples of figures and tables that could be used to present information. Conclusions: Limited guidance exists for researchers on how best to present NMAs in an accessible format, especially for non-technical end-users such as policymakers and clinicians. NMA guidelines may require further integration with end-users' needs, when NMAs are used to support healthcare policy and practice decisions. Developing presentation formats that enhance understanding and accessibility of NMAs could also enhance the transparency and legitimacy of decisions informed by NMAs.The Canadian Institute of Health Research (CIHR) Drug Safety and Effectiveness Network (Funding reference number – 116573)

    Wireless Monitoring of Liver Hemodynamics In Vivo

    Get PDF
    Abstract Liver transplants have their highest technical failure rate in the first two weeks following surgery. Currently, there are limited devices for continuous, real-time monitoring of the graft. In this work, a three wavelengths system is presented that combines near-infrared spectroscopy and photoplethysmography with a processing method that can uniquely measure and separate the venous and arterial oxygen contributions. This strategy allows for the quantification of tissue oxygen consumption used to study hepatic metabolic activity and to relate it to tissue stress. The sensor is battery operated and communicates wirelessly with a data acquisition computer which provides the possibility of implantation provided sufficient miniaturization. In two in vivo porcine studies, the sensor tracked perfusion changes in hepatic tissue during vascular occlusions with a root mean square error (RMSE) of 0.135 mL/min/g of tissue. We show the possibility of using the pulsatile wave to measure the arterial oxygen saturation similar to pulse oximetry. The signal is also used to extract the venous oxygen saturation from the direct current (DC) levels. Arterial and venous oxygen saturation changes were measured with an RMSE of 2.19% and 1.39% respectively when no vascular occlusions were induced. This error increased to 2.82% and 3.83% when vascular occlusions were induced during hypoxia. These errors are similar to the resolution of a commercial oximetry catheter used as a reference. This work is the first realization of a wireless optical sensor for continuous monitoring of hepatic hemodynamics

    Nano silica particles loaded with CYANEX-921 for removal of iron(III) from phosphoric acid

    Get PDF
    303-310A simple route for preparation of organically modified spherical silica (SiO2) nanoparticles with CYANEX 921 has been discussed. These modified particles has been used to remove Fe3+-SCN complex from 9M phosphoric acid. SEM, XRD, IR and EDS have been used to Characterized the powder in its several stages. The effect of SiO2 weight, thiocyanate concentration, initial Fe (III) concentration, H3PO4 concentration, stirring time, temperature and loaded SiO2 weight have been used to study the removal percent. The loaded silica succeeded in removal of 70% of Fe (III). Langmuir isotherm model well fit the experimental data with maximum sorption capacity 45.45 mg/g. The reaction kinetic is found to follow the pseudo second order kinetic model the adsorption reaction shows exothermic behavior

    Current practices and challenges in adaptation of clinical guidelines : A qualitative study based on semistructured interviews

    Get PDF
    Funding YS is funded by China Scholarship Council (No 201707040103).Altres ajuts: CSC/201707040103Objective This study aims to better understand the current practice of clinical guideline adaptation and identify challenges raised in this process, given that published adapted clinical guidelines are generally of low quality, poorly reported and not based on published frameworks. Design A qualitative study based on semistructured interviews. We conducted a framework analysis for the adaptation process, and thematic analysis for participants' views and experiences about adaptation process. Setting Nine guideline development organisations from seven countries. Participants Guideline developers who have adapted clinical guidelines within the last 3 years. We identified potential participants through published adapted clinical guidelines, recommendations from experts, and a review of the Guideline International Network Conference attendees' list. Results We conducted ten interviews and identified nine adaptation methodologies. The reasons for adapting clinical guidelines include developing de novo clinical guidelines, implementing source clinical guidelines, and harmonising and updating existing clinical guidelines. We identified the following core steps of the adaptation process (1) selection of scope and source guideline(s), (2) assessment of source materials (guidelines, recommendations and evidence level), (3) decision-making process and (4) external review and follow-up process. Challenges on the adaptation of clinical guidelines include limitations from source clinical guidelines (poor quality or reporting), limitations from adaptation settings (lacking resources or skills), adaptation process intensity and complexity, and implementation barriers. We also described how participants address the complexities and implementation issues of the adaptation process. Conclusions Adaptation processes have been increasingly used to develop clinical guidelines, with the emergence of different purposes. The identification of core steps and assessment levels could help guideline adaptation developers streamline their processes. More methodological research is needed to develop rigorous international standards for adapting clinical guidelines
    corecore