71 research outputs found

    Perceptions and experiences of using a nipple shield among parents and staff - an ethnographic study in neonatal units

    Get PDF
    Background: Preterm infants have an immature sucking behavior and the capacity to be exclusively breastfed may be reduced for a period of weeks or months, depending on gestational age. Nipple shields have been used, not only as a device to help mothers with sore nipples, but also to facilitate the infant’s latch on to the breast. However, the benefits of using nipple shields have been debated. The aim of this study was to explore perceptions and experiences of using a nipple shield among parents and staff in neonatal units in Sweden and England. Methods: An ethnographic study was undertaken where observations and interviews were conducted in four neonatal units in Sweden and England. The data were analyzed using a thematic networks analysis. Result: The global theme was developed and named, ‘Nipple shield in a liminal time’. This comprised of two organizing themes: ‘Relational breastfeeding’ and ‘Progression’. ‘Relational breastfeeding’ was underpinned by the basic themes, ‘good enough breast’, ‘something in between’ and ‘tranquil moment’. ‘Progression’ was underpinned by the basic themes, ‘learning quicker’, ‘short-term solution’ and ‘rescue remedy’. Although breastfeeding was seen primarily as a nutritive transaction, the relational aspects of breastfeeding were of crucial importance. These two organizing themes show the tension between acknowledging the relational aspects of breastfeeding and yet facilitating or supporting the progression of breastfeeding in the period from tube feeding or cup feeding to breastfeeding. It is a liminal time as mothers and their infants are “in between” phases and the outcome, in terms of breastfeeding, is yet to be realized. Conclusion: This study demonstrates parents’ and staffs’ perceptions of the nipple shield as a short term solution to help initiation of breastfeeding but also as a barrier between the mother and infant. It is important that the mother and baby’s own particular needs are taken into account, in a person-centred way and on an ongoing basis. Furthermore, we need to emphasise the importance of the ‘relational’ whilst understanding the need for ‘progression’. Holding these in balance may be the key to appropriate use of the nipple shield

    Amoebic liver abscess – a cause of acute respiratory distress in an infant: a case report

    Get PDF
    <p>Abstract</p> <p>Introduction</p> <p>The usual presentation of amebic liver abscess in children is extremely variable and unpredictable. It presents with a picture of common pediatric illness that is fever, lethargy, and abdominal pain, and can go on to develop into a rare complication of rupture into the pleura to cause acute respiratory distress, which is another common pediatric illness. In our patient, diagnosis was not made or suspected in these two stages.</p> <p>Case presentation</p> <p>This is the report of a 2-year-old male infant who presented with a 2-week history of anorexia, fever, and abdominal pain. A few hours after admission, he suddenly developed acute respiratory distress; chest X-ray demonstrated massive right pleural effusion that failed to response to tube thoracostomy. Limited thoracotomy revealed a ruptured amebic liver abscess through the right cupola of the diaphragm. The content of the abscess was evacuated from the pleural cavity, which was drained with two large chest tubes. Serological examination confirmed the diagnosis of ruptured amebic liver abscess. Postoperative treatment with antibiotics including metronidazole continued until full recovery.</p> <p>Conclusion</p> <p>Diagnosis of such a rare disease requires a high degree of suspicion. In this patient, the diagnosis was only made postoperatively. The delay in presentation and the sudden onset of respiratory distress must be emphasized for all those physicians who care for children.</p

    Education and training of healthcare staff in the knowledge, attitudes and skills needed to work effectively with breastfeeding women:a systematic review

    Get PDF
    BACKGROUND: Current evidence suggests that women need effective support to breastfeed, but many healthcare staff lack the necessary knowledge, attitudes and skills. There is therefore a need for breastfeeding education and training for healthcare staff. The primary aim of this review is to determine whether education and training programs for healthcare staff have an effect on their knowledge and attitudes about supporting breastfeeding women. The secondary aim of this review was to identify whether any differences in type of training or discipline of staff mattered. METHODS: A systematic search of the literature was conducted using the Cochrane Pregnancy and Childbirth Group’s trial register. Randomised controlled trials comparing breastfeeding education and training for healthcare staff with no or usual training and education were included if they measured the impact on staff knowledge, attitudes or compliance with the Baby Friendly Hospital Initiative (BFHI). RESULTS: From the 1192 reports identified, four distinct studies were included. Three studies were two-arm cluster-randomised trials and one was a two-arm individual randomised trial. Of these, three contributed quantitative data from a total of 250 participants. Due to heterogeneity of outcome measures meta-analysis was not possible. Knowledge was included as an outcome in two studies and demonstrated small but significant positive effects. Attitudes towards breastfeeding was included as an outcome in two studies, however, results were inconsistent both in terms of how they were measured and the intervention effects. One study reported a small but significant positive effect on BFHI compliance. Study quality was generally deemed low with the majority of domains being judged as high or unclear risk of bias. CONCLUSIONS: This review identified a lack of good evidence on breastfeeding education and training for healthcare staff. There is therefore a critical need for research to address breastfeeding education and training needs of multidisciplinary healthcare staff in different contexts through large, well-conducted RCTs

    Fused Traditional and Geometric Morphometrics Demonstrate Pinniped Whisker Diversity

    Get PDF
    Vibrissae (whiskers) are important components of the mammalian tactile sensory system, and primarily function as detectors of vibrotactile information from the environment. Pinnipeds possess the largest vibrissae among mammals and their vibrissal hair shafts demonstrate a diversity of shapes. The vibrissae of most phocid seals exhibit a beaded morphology with repeating sequences of crests and troughs along their length. However, there are few detailed analyses of pinniped vibrissal morphology, and these are limited to a few species. Therefore, we comparatively characterized differences in vibrissal hair shaft morphologies among phocid species with a beaded profile, phocid species with a smooth profile, and otariids with a smooth profile using traditional and geometric morphometric methods. Traditional morphometric measurements (peak-to-peak distance, crest width, trough width and total length) were collected using digital photographs. Elliptic Fourier analysis (geometric morphometrics) was used to quantify the outlines of whole vibrissae. The traditional and geometric morphometric datasets were subsequently combined by mathematically scaling each to true rank, followed by a single eigendecomposition. Quadratic discriminant function analysis demonstrated that 79.3, 97.8 and 100% of individuals could be correctly classified to their species based on vibrissal shape variables in the traditional, geometric and combined morphometric analyses, respectively. Phocids with beaded vibrissae, phocids with smooth vibrissae, and otariids each occupied distinct morphospace in the geometric morphometric and combined data analyses. Otariids split into two groups in the geometric morphometric analysis and gray seals appeared intermediate between beaded- and smooth-whiskered species in the traditional and combined analyses. Vibrissal hair shafts modulate the transduction of environmental stimuli to the mechanoreceptors in the follicle-sinus complex (F-SC), which results in vibrotactile reception, but it is currently unclear how the diversity of shapes affects environmental signal modulation

    Benthic community structure and ecosystem functions in above- and below-waterfall pools in Borneo

    Get PDF
    Waterfalls are geomorphic features that often partition streams into discrete zones. Our study examined aquatic communities, litter decomposition and periphyton growth rates for above- and below-waterfall pools in Ulu Temburong National Park, Brunei. We observed higher fish densities in below-waterfall pools (0.24 fish m−2 vs. 0.02 fish m−2 in above-waterfall pools) and higher shrimp abundance in above-waterfall pools (eight shrimp/pool vs. less than one shrimp/pool in below-waterfall pools). However, macroinvertebrate densities (excluding shrimp) were similar among both pool types. Ambient periphyton was higher in below-waterfall pools in 2013 (4.3 vs. 2.8 g m−2 in above-waterfall pools) and 2014 (4.8 vs. 3.4 g m−2 in above-waterfall pools), while periphyton growth rates varied from 0.05 to 0.26 g m−2 days−1 and were significantly higher in below-waterfall pools in 2014. Leaf litter decomposition rates (0.001 to 0.024 days−1) did not differ between pool types, suggesting that neither shrimp nor fish densities had consistent impacts on this ecosystem function. Regardless, this research demonstrates the varied effects of biotic and abiotic factors on community structure and ecosystem function. Our results have highlighted the importance of discontinuities, such as waterfalls, in tropical streams.</p

    A spontaneous ad hoc network to share www access

    Get PDF
    In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.Authors want to give thanks to the anonymous reviewers for their valuable suggestions, useful comments, and proofreading of this paper. This work was partially supported by the Ministerio de Educacion y Ciencia, Spain, under Grant no. TIN2008-06441-C02-01, and by the "Ayudas complementarias para proyectos de I+D para grupos de calidad de la Generalitat Valenciana" (ACOMP/2010/005).Lacuesta Gilaberte, R.; Lloret, J.; GarcĂ­a Pineda, M.; Peñalver Herrero, ML. (2010). A spontaneous ad hoc network to share www access. EURASIP Journal on Wireless Communications and Networking. 2010:1-16. https://doi.org/10.1155/2010/232083S1162010Preuß S, Cap CH: Overview of spontaneous networking-evolving concepts and technologies. In Rostocker Informatik-Berichte. Volume 24. Fachbereich Informatik der Universit at Rostock; 2000:113-123.Gallo S, Galluccio L, Morabito G, Palazzo S: Rapid and energy efficient neighbor discovery for spontaneous networks. Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 2004, Venice, ItalyLatvakoski J, Pakkala D, PÀÀkkönen P: A communication architecture for spontaneous systems. IEEE Wireless Communications 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Zarate Silva VH, De Cruz Salgado EI, Quintana FR: AWISPA: an awareness framework for collaborative spontaneous networks. Proceedings of the 36th ASEE/IEEE Frontiers in Education Conference (FIE '06), October 2006 1-6.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine 2001, 39(6):176-181. 10.1109/35.925687Perkins CE, Bhagwat P: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94), August 1994 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, Ad Hoc Networking. Addison-Wesley Longman Publishing, Boston, Mass, USA; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, July 2003Park V, Corson MS: IETF MANET Internet Draft "draft-ietf-MANET-tora-spe03.txt". Novemmer 2000.Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Gilaberte RL, Herrero LP: IP addresses configuration in spontaneous networks. Proceedings of the 9th WSEAS International Conference on Computers, July 2005, Athens, GreeceViana AC, Dias de Amorim M, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Alvarez-Hamelin JI, Carneiro Viana A, Dias De Amorim M: Architectural considerations for a self-configuring routing scheme for spontaneous networks.,Tech. Rep. 1 October 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '07), October 2007, Valencia, SpainFoulks EF: Social network therapies and society: an overview. Contemporary Family Therapy 1985, 3(4):316-320.Wang Y, Wu H: DFT-MSN: the delay/fault-tolerant mobile sensor network for pervasive information gathering. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006Kindberg T, Zhang K: Validating and securing spontaneous associations between wireless devices. In Proceedings of the 6th Information Security Conference (ISC '03), 2003. Springer; 44-53.Al-Jaroodi J: Routing security in open/dynamic mobile ad hoc networks. The International Arab Journal of Information Technology 2007, 4(1):17-25.Stajano F, Anderson RJ: The resurrecting duckling: security issues for ad-hoc wireless networks. Proceedings of the 7th International Workshop on Security Protocols, April 1999 172-194.Zhou L, Haas ZJ: Securing ad hoc networks. IEEE Network 1999, 13(6):24-30. 10.1109/65.806983Hauspie M, Simplot-Ryl I: Cooperation in ad hoc networks: enhancing the virtual currency based models. Proceedings of the 1st International Conference on Integrated Internet Ad Hoc and Sensor Networks (InterSense '06), May 2006, Nice, FranceWang X, Dai F, Qian L, Dong H: A way to solve the threat of selfish and malicious nodes for ad hoc networks. Proceedings of the International Symposium on Information Science and Engieering (ISISE '08), December 2008, Shanghai, China 1: 368-370.Kargl F, Klenk A, Weber M, Schlott S: Sensors for detection of misbehaving nodes in MANETs. Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA '04), July 2004, Dortmund, Germany 83-97.Kargl F, Geiss A, Scholott S, Weber M: Secure dynamic source routing. Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS '05), January 2005, Big Island, Hawaii, USAGokhale S, Dasgupta P: Distributed authentication for peer-to-peer networks. Proceedings of the Symposium on Applications and the Internet Workshops, January 2003 347-353.Capkun S, ButtyĂĄn L, Hubaux J-P: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2003, 2(1):52-64. 10.1109/TMC.2003.1195151Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, 1999, Berlin, Germany, Lecture Notes in Computer Science. Volume 1796. Springer; 172-194.Balfanz D, Smetters DK, Stewart P, Wong HC: Talking to strangers: authentication in ad-hoc wireless networks. Proceedings of the International Symposium on Network and Distributed Systems Security (NDSS '02), February 2002, San Diego, Calif, USABarbara D, Imielinski T: Sleepers and workaholics: caching strategies in mobile environments. Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1994 1-12.Cao G: A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering 2003, 15(5):1251-1265. 10.1109/TKDE.2003.1232276Hu Q, Lee D: Cache algorithms based on adaptive invalidation reports for mobile environments. Cluster Computing 1998, 1(1):39-50. 10.1023/A:1019012927328Jing J, Elmagarmid A, Helal A, Alonso R: Bit-sequences: an adaptive cache invalidation method in mobile client/server environments. Mobile Networks and Applications 1997, 2(2):115-127. 10.1023/A:1013616213333Kahol A, Khurana S, Gupta S, Srimani P: An efficient cache management scheme for mobile environment. Proceedings of the 20th International Conference on Distributied Computing System (ICDCS '00), April 2000, Taipei, Taiwan 530-537.Kazar M: Synchronization and caching issues in the Andrew file system. Proceedings of USENIX Conference, February 1988, Dallas, Tex, USA 27-36.Roussopoulos M, Baker M: CUP: controlled update propagation in peer-to-peer networks. Proceedings of USENIX Annual Technical Conference, June 2003, San Antonio, Tex, USASandberg S, Kleiman S, Goldberg D, Walsh D, Lyon B: Design and implementation of the sun network file system. Proceedings of USENIX Summer Conference, June 1985, Portland, Ore, USA 119-130.Wu K, Yu PS, Chen M: Energy-efficient caching for wireless mobile computing. Proceedings of the 12th IEEE International Conference on Data Engineering, February-March 1996, New Orleans, La, USA 336-343.Yeung MKH, Kwok Y-K: Wireless cache invalidation schemes with link adaptation and downlink traffic. IEEE Transactions on Mobile Computing 2005, 4(1):68-83.Wessels D, Claffy K: Internet cache protocol (IC) v.2. http://www.ietf.org/rfc/rfc2186.txtFan L, Cao P, Almeida J, Broder AZ: Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking 2000, 8(3):281-293. 10.1109/90.851975Dykes SG, Robbins KA: A viability analysis of cooperative proxy caching. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 3: 1205-1214.Wessels D, Claffy K: RFC 2186: Internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Wessels D, Claffy K: RFC 2187: application of internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Ren Q, Dunhan MH: Using semantic caching to manage location dependent data in mobile computing. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 2000, Boston, Mass, USA 210-221.Lim S, Lee W-C, Cao G, Das CR: Cache invalidation strategies for internet-based mobile ad hoc networks. Computer Communications 2007, 30(8):1854-1869. 10.1016/j.comcom.2007.02.020Park B-N, Lee W, Lee C: QoS-aware internet access schemes for wireless mobile ad hoc networks. Computer Communications 2007, 30(2):369-384. 10.1016/j.comcom.2006.09.004Hara T: Effective replica allocation in ad hoc networks for improving data accessibility. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 1568-1576.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless converage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Can P, Irani S: Cost-aware WWW proxy caching algorithms. Proceedings of the USENIX Symposium on lnternet Technology and Systems, December 1997Rizzo L, Vicisano L: Replacement policies for a proxy cache. IEEE/ACM Transactions on Networking 2000, 8(2):158-170. 10.1109/90.842139Williams S, Abrams M, Strandridge CR, Abdulla G, Fox EA: Removal policies in network caches for world-wide web documents. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August 1996, Palo Alto, Calif, USA 293-305.Hara T: Replica allocation in ad hoc networks with period data update. Proceedings of the 3rd International Conference on Mobile Data Management (MDM '02), July 2002, Edmonton, Canada 79-86.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Sailhan F, Issarny V: Cooperative caching in ad hoc networks. Proceedings of the 4th International Conference on Mobile Data Management (MDM '03), January 2003, Melbourne, Australia, Lecture Notes in Computer Science 2574: 13-28.Yin L, Cao G: Supporting cooperative caching in ad hoc networks. IEEE Transactions on Mobile Computing 2006, 5(1):77-89.Karumanchi G, Muralidharan S, Prakash R: Information dissemination in partitionable mobile ad hoc networks. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (SRDS '99), October 1999, Lausanne, Switzerland 4-13.Corson MS, Macker JP, Cirincione GH: Internet-based mobile ad hoc networking. IEEE Internet Computing 1999, 3(4):63-70. 10.1109/4236.780962Lim S, Lee W-C, Cao G, Das CR: A novel caching scheme for improving internet-based mobile ad hoc networks performance. Ad Hoc Networks 2006, 4(2):225-239. 10.1016/j.adhoc.2004.04.013Opnet Modeler http://www.opnet.com/solutions/network_rd/modeler_wireless.htmlLacuesta R, Lloret J, Garcia M, Peñalver L: Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks. Journal of Network and Computer Applications. In pres

    Identification of molecular signatures specific for distinct cranial sensory ganglia in the developing chick

    Get PDF
    Background The cranial sensory ganglia represent populations of neurons with distinct functions, or sensory modalities. The production of individual ganglia from distinct neurogenic placodes with different developmental pathways provides a powerful model to investigate the acquisition of specific sensory modalities. To date there is a limited range of gene markers available to examine the molecular pathways underlying this process. Results Transcriptional profiles were generated for populations of differentiated neurons purified from distinct cranial sensory ganglia using microdissection in embryonic chicken followed by FAC-sorting and RNAseq. Whole transcriptome analysis confirmed the division into somato- versus viscerosensory neurons, with additional evidence for subdivision of the somatic class into general and special somatosensory neurons. Cross-comparison of distinct ganglia transcriptomes identified a total of 134 markers, 113 of which are novel, which can be used to distinguish trigeminal, vestibulo-acoustic and epibranchial neuronal populations. In situ hybridisation analysis provided validation for 20/26 tested markers, and showed related expression in the target region of the hindbrain in many cases. Results One hundred thirty-four high-confidence markers have been identified for placode-derived cranial sensory ganglia which can now be used to address the acquisition of specific cranial sensory modalities.</p
    • 

    corecore