10,944 research outputs found
Information technology revolution in the Republic of Korea
노트 : Title: Bytes and Bullets in KoreaChapter 3 title: Information Technology Revolution in the Republic of Kore
A high-gain omnidirectional satellite antenna technique Final report
High gain omnidirectional satellite system design, using planar and circular multiple beam arrays and solid state switchin
Liquid rocket performance computer model with distributed energy release Interim final report, 15 Aug. 1969 - 15 Aug. 1970
Liquid propellant rocket engine performance computer program with distributed energy releas
Recommended from our members
Epigenetic Applications in Adverse Outcome Pathways and Chemical Risk Evaluation
Assessing the short-term outcomes of a community-based intervention for overweight and obese children: The MEND 5-7 programme
Objective The aim of this study was to report outcomes of the UK service level delivery of MEND (Mind,Exercise,Nutrition...Do it!) 5-7, a multicomponent, community-based, healthy lifestyle intervention designed for overweight and obese children aged 5–7 years and their families.
Design Repeated measures.
Setting Community venues at 37 locations across the UK.
Participants 440 overweight or obese children (42% boys; mean age 6.1 years; body mass index (BMI) z-score 2.86) and their parents/carers participated in the intervention.
Intervention MEND 5-7 is a 10-week, family-based, child weight-management intervention consisting of weekly group sessions. It includes positive parenting, active play, nutrition education and behaviour change strategies. The intervention is designed to be scalable and delivered by a range of health and social care professionals.
Primary and secondary outcome measures The primary outcome was BMI z-score. Secondary outcome measures included BMI, waist circumference, waist circumference z-score, children's psychological symptoms, parenting self-efficacy, physical activity and sedentary behaviours and the proportion of parents and children eating five or more portions of fruit and vegetables.
Results 274 (62%) children were measured preintervention and post-intervention (baseline; 10-weeks). Post-intervention, mean BMI and waist circumference decreased by 0.5 kg/m2 and 0.9 cm, while z-scores decreased by 0.20 and 0.20, respectively (p<0.0001). Improvements were found in children's psychological symptoms (−1.6 units, p<0.0001), parent self-efficacy (p<0.0001), physical activity (+2.9 h/week, p<0.01), sedentary activities (−4.1 h/week, p<0.0001) and the proportion of parents and children eating five or more portions of fruit and vegetables per day (both p<0.0001). Attendance at the 10 sessions was 73% with a 70% retention rate.
Conclusions Participation in the MEND 5-7 programme was associated with beneficial changes in physical, behavioural and psychological outcomes for children with complete sets of measurement data, when implemented in UK community settings under service level conditions. Further investigation is warranted to establish if these findings are replicable under controlled conditions
How to break access control in a controlled manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and Medical Informatics Department from Porto Faculty of Medicine has recently implemented a Virtual EMR (VEMR) in order to integrate patient information and clinical reports within a university hospital. With more than 500 medical doctors using the system on a daily basis, an access control policy and model were implemented. However, the healthcare environment has unanticipated situations (i.e. emergency situations) where access to information is essential. Most traditional policies do not allow for overriding. A policy that allows for Break-The-Glass (BTG) was implemented in order to override access control whilst providing for non-repudiation mechanisms for its usage. The policy was easily integrated within the model confirming its modularity and the fact that user intervention in defining security procedures is crucial to its successful implementation and use
- …
