3,899 research outputs found

    The Bradford & Airedale Health of Men initiative: a study of its effectiveness in engaging with men

    Get PDF
    The Health of Men (HoM) network received funding from the Big Lottery Fund in 2003 to establish a five year programme of dedicated work with men and boys. This enabled a team of practitioners to be creative and to build upon their existing skills to generate models of working with those men in the community that are usually seen as hard to reach. The research which has accompanied of the work of team has explored why men use these new services and has demonstrated the following: • Men do care about their health • Men are willing and able to engage with their health when services are tailored to their needs • Men from different culture groups and socio-economic backgrounds who are normally seen as hard to reach were accessed. • A model encompassing a dedicated team working with men is worthy of further development Much has been learnt from this project that has great relevance to the local Primary Care Trust (PCT), but has also proved a great source of information for the development of services to men on a Regional, National and International level

    The utility of diagnostic tests in irritable bowel syndrome patients: a systematic review

    Full text link
    The aim of this study was to determine the pretest probability of organic GI disease and the accuracy of diagnostic tests for organic GI disease in patients who meet symptom-based criteria for irritable bowel syndrome (IBS). METHODS : After a comprehensive literature search for studies examining the accuracy of diagnostic tests for organic GI disease among patients who meet symptom-based criteria for IBS, two independent observers qualitatively assessed the methodology of selected studies and extracted data. Data on the pretest probability of organic GI disease in this population and the accuracy of currently recommended diagnostic tests were converted to descriptive tables. RESULTS : Among patients meeting symptom-based criteria for IBS, the pretest probability of inflammatory bowel disease, colorectal cancer, or infectious diarrhea is less than 1%. Currently recommended diagnostic tests rarely identify organic GI disease in patients fulfilling symptom-based criteria for IBS. However, the pretest probability of celiac disease in patients meeting symptom-based criteria for IBS was 10 times higher than the prevalence of celiac disease in the general population. CONCLUSION : There is insufficient evidence to recommend the routine performance of a standardized battery of diagnostic tests in patients who meet symptom-based criteria for IBS. Based upon the increased pretest probability of celiac disease, routine performance of serological tests for celiac disease may be useful in this patient population, though additional study is needed in this area.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/72511/1/j.1572-0241.2002.07027.x.pd

    HardIDX: Practical and Secure Index with SGX

    Get PDF
    Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that are not specifically tailored to the hardware architecture, and are rarely well analyzed for their security (e.g., the impact of side channels). Additionally, existing hardware-based solutions often have a large code footprint in the trusted environment susceptible to software compromises. In this paper we present HardIDX: a hardware-based approach, leveraging Intel's SGX, for search over encrypted data. It implements only the security critical core, i.e., the search functionality, in the trusted environment and resorts to untrusted software for the remainder. HardIDX is deployable as a highly performant encrypted database index: it is logarithmic in the size of the index and searches are performed within a few milliseconds rather than seconds. We formally model and prove the security of our scheme showing that its leakage is equivalent to the best known searchable encryption schemes. Our implementation has a very small code and memory footprint yet still scales to virtually unlimited search index sizes, i.e., size is limited only by the general - non-secure - hardware resources

    Alzheimer Disease and Oxidative Stress

    Get PDF
    Research in Alzheimer disease has recently demonstrated compelling evidence on the importance of oxidative processes in its pathogenesis. Cellular changes show that oxidative stress is an event that precedes the appearance of the hallmark pathologies of the disease, neurofibrillary tangles, and senile plaques. While it is still unclear what the initial source of the oxidative stress is in Alzheimer disease, it is likely that the process is highly dependent on redox-active transition metals such as iron and copper. Further investigation into the role that oxidative stress mechanisms seem to play in the pathogenesis of Alzheimer disease may lead to novel clinical interventions

    Avalanche analysis from multi-electrode ensemble recordings in cat, monkey and human cerebral cortex during wakefulness and sleep

    Get PDF
    Self-organized critical states are found in many natural systems, from earthquakes to forest fires, they have also been observed in neural systems, particularly, in neuronal cultures. However, the presence of critical states in the awake brain remains controversial. Here, we compared avalanche analyses performed on different in vivo preparations during wakefulness, slow-wave sleep and REM sleep, using high-density electrode arrays in cat motor cortex (96 electrodes), monkey motor cortex and premotor cortex and human temporal cortex (96 electrodes) in epileptic patients. In neuronal avalanches defined from units (up to 160 single units), the size of avalanches never clearly scaled as power-law, but rather scaled exponentially or displayed intermediate scaling. We also analyzed the dynamics of local field potentials (LFPs) and in particular LFP negative peaks (nLFPs) among the different electrodes (up to 96 sites in temporal cortex or up to 128 sites in adjacent motor and pre-motor cortices). In this case, the avalanches defined from nLFPs displayed power-law scaling in double log representations, as reported previously in monkey. However, avalanche defined as positive LFP (pLFP) peaks, which are less directly related to neuronal firing, also displayed apparent power-law scaling. Closer examination of this scaling using more reliable cumulative distribution functions (CDF) and other rigorous statistical measures, did not confirm power-law scaling. The same pattern was seen for cats, monkey and human, as well as for different brain states of wakefulness and sleep. We also tested other alternative distributions. Multiple exponential fitting yielded optimal fits of the avalanche dynamics with bi-exponential distributions. Collectively, these results show no clear evidence for power-law scaling or self-organized critical states in the awake and sleeping brain of mammals, from cat to man.Comment: In press in: Frontiers in Physiology, 2012, special issue "Critical Brain Dynamics" (Edited by He BY, Daffertshofer A, Boonstra TW); 33 pages, 13 figures. 3 table

    Keyword-Based Delegable Proofs of Storage

    Full text link
    Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files. However, a large fraction of the data files the client outsources to the server is often archival in nature that the client uses for backup purposes and accesses less frequently. An untrusted server can thus delete some of these archival data files in order to save some space (and allocate the same to other clients) without being detected by the client (data owner). Proofs of storage enable the client to audit her data files uploaded to the server in order to ensure the integrity of those files. In this work, we introduce one type of (selective) proofs of storage that we call keyword-based delegable proofs of storage, where the client wants to audit all her data files containing a specific keyword (e.g., "important"). Moreover, it satisfies the notion of public verifiability where the client can delegate the auditing task to a third-party auditor who audits the set of files corresponding to the keyword on behalf of the client. We formally define the security of a keyword-based delegable proof-of-storage protocol. We construct such a protocol based on an existing proof-of-storage scheme and analyze the security of our protocol. We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction.Comment: A preliminary version of this work has been published in International Conference on Information Security Practice and Experience (ISPEC 2018
    corecore