435 research outputs found

    Expanding role of the internet in the orthopaedic outpatient setting

    Get PDF
    The number of patients requiring review after joint arthroplasty is increasing. With an ageing population, increasing expectations from patients, and improved diagnostic methods and treatments, the demand for these procedures will also increase.1 The Department of Orthopaedic Surgery at Royal Devon and Exeter Hospital (Exeter, UK) started to experience a backlog of long-term arthroplasty patients requiring follow-up owing to limited outpatient resources and clinical staff. This scenario led us to think about other ways of reviewing these patients and to explore the feasibility of ‘virtual’ follow-ups. In 2002, Gupte and colleagues reviewed Internet use in the setting of orthopaedic outpatient clinics. They investigated the: (i) prevalence of Internet use; (ii) perception of the quality of medical information provided by the Internet; (iii) future intentions and attitudes towards Internet-based consultations.2 Their study showed promising data about the potential use of Internet-based follow-up, concluding that more than half of the patients evaluated were willing to access the Internet for medical information, with younger patients more likely to do so. Moreover, a significant proportion of respondents were willing to undergo an Internet-based consultation. The decade between the study by Gupte and colleagues and the present study has seen huge expansion in the use and availability of the Internet in the domestic setting. In 2002, a poll by the UK Office of National Statistics (ONS) concluded that 46% of UK households had an Internet connection. In 2011, ONS data showed that 77% of UK homes had an active internet connection.3 This rise has continued and, in 2014, 84% of individuals used the internet and 76% of adults accessed the internet each day.4 In addition, the way in which individuals access the internet is evolving, with 45% of internet users now accessing it via mobile devices. An estimated 6 million people accessed the internet via a mobile device for the first time in 2011.3 With the huge growth in internet availability in the past decade, we aimed to: (i) ascertain how use, attitudes and perceptions of the internet have changed over this time; (ii) explore potential uses and problems of internet follow-up in a patient cohort; (iii) ascertain if patients had access to an email account and, if so, would consider using an email-based questionnaire on follow-up; (iv) discover if individuals who did not have direct access to the internet had friends or relatives who did, and whether they would be willing to engage in follow-up by ‘proxy’.This article is freely available via Open Access. Click on the Additional Link above to access the full-text via the publisher's site

    Variation in prescribing for anxiety and depression: a reflection of health inequalities, cultural differences or variations in access to care?

    Get PDF
    BACKGROUND: There are large variations in mental health prescribing in UK populations. However the underlying reasons for these differences, which may be related to differences in prevalence, cultural expectations or practical difficulties in access to treatment, remain uncertain. METHODS: Linear modelling was used to investigate whether population characteristics or access to primary care account for variations in mental health prescribing across 39 deprived neighbourhoods. RESULTS: The proportion of sampled respondents whose first language was not English and the ratio of general practitioners to population explained 61% of variation. Deprivation and mental health status were not significant predictors of prescribing in these relatively deprived communities. CONCLUSION: These findings suggest that mental health prescribing, within deprived areas, as well as reflecting cultural and social differences in prescribing, may also be a proxy measure of access to care

    A 3-player protocol preventing persistence in strategic contention with limited feedback

    Get PDF
    In this paper, we study contention resolution protocols from a game-theoretic perspective. In a recent work, we considered acknowledgment-based protocols, where a user gets feedback from the channel only when she attempts transmission. In this case she will learn whether her transmission was successful or not. One of the main results of ESA2016 was that no acknowledgment-based protocol can be in equilibrium. In fact, it seems that many natural acknowledgment-based protocols fail to prevent users from unilaterally switching to persistent protocols that always transmit with probability 1. It is therefore natural to ask how powerful a protocol must be so that it can beat persistent deviators. In this paper we consider age-based protocols, which can be described by a sequence of probabilities of transmitting in each time step. Those probabilities are given beforehand and do not change based on the transmission history. We present a 3-player age-based protocol that can prevent users from unilaterally deviating to a persistent protocol in order to decrease their expected transmission time. It is worth noting that the answer to this question does not follow from the results and proof ideas of ESA2016. Our protocol is non-trivial, in the sense that, when all players use it, finite expected transmission time is guaranteed. In fact, we show that this protocol is preferable to any deadline protocol in which, after some fixed time, attempt transmission with probability 1 in every subsequent step. An advantage of our protocol is that it is very simple to describe, and users only need a counter to keep track of time. Whether there exist nn-player age-based protocols that do not use counters and can prevent persistence is left as an open problem for future research.Comment: arXiv admin note: substantial text overlap with arXiv:1606.0658

    Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols

    Get PDF
    Many organisations enforce policies on the length and formation of passwords to encourage selection of strong passwords and protect their multi-user systems. For Two-Server Password Authenticated Key Exchange (2PAKE) and Two-Server Password Authenticated Secret Sharing (2PASS) protocols, where the password chosen by the client is secretly shared between the two servers, the initial remote registration of policy-compliant passwords represents a major problem because none of the servers is supposed to know the password in clear. We solve this problem by introducing Two-Server Blind Password Registration (2BPR) protocols that can be executed between a client and the two servers as part of the remote registration procedure. 2BPR protocols guarantee that secret shares sent to the servers belong to a password that matches their combined password policy and that the plain password remains hidden from any attacker that is in control of at most one server. We propose a security model for 2BPR protocols capturing the requirements of policy compliance for client passwords and their blindness against the servers. Our model extends the adversarial setting of 2PAKE/2PASS protocols to the registration phase and hence closes the gap in the formal treatment of such protocols. We construct an efficient 2BPR protocol for ASCII-based password policies, prove its security in the standard model, give a proof of concept implementation, and discuss its performance

    Breakdown of Fermi-liquid theory in a cuprate superconductor

    Full text link
    The behaviour of electrons in solids is remarkably well described by Landau's Fermi-liquid theory, which says that even though electrons in a metal interact they can still be treated as well-defined fermions, called ``quasiparticles''. At low temperature, the ability of quasiparticles to transport heat is strictly given by their ability to transport charge, via a universal relation known as the Wiedemann-Franz law, which no material in nature has been known to violate. High-temperature superconductors have long been thought to fall outside the realm of Fermi-liquid theory, as suggested by several anomalous properties, but this has yet to be shown conclusively. Here we report on the first experimental test of the Wiedemann-Franz law in a cuprate superconductor, (Pr,Ce)2_2CuO4_4. Our study reveals a clear departure from the universal law and provides compelling evidence for the breakdown of Fermi-liquid theory in high-temperature superconductors.Comment: 7 pages, 3 figure

    Surfactant protein D modulates HIV infection of both T-cells and dendritic cells

    Get PDF
    Surfactant Protein D (SP-D) is an oligomerized C-type lectin molecule with immunomodulatory properties and involvement in lung surfactant homeostasis in the respiratory tract. SP-D binds to the enveloped viruses, influenza A virus and respiratory syncytial virus and inhibits their replication in vitro and in vivo. SP-D has been shown to bind to HIV via the HIV envelope protein gp120 and inhibit infectivity in vitro. Here we show that SP-D binds to different strains of HIV (BaL and IIIB) and the binding occurs at both pH 7.4 and 5.0 resembling physiological relevant pH values found in the body and the female urogenital tract, respectively. The binding of SP-D to HIV particles and gp120 was inhibited by the presence of several hexoses with mannose found to be the strongest inhibitor. Competition studies showed that soluble CD4 and CVN did not interfere with the interaction between SP-D and gp120. However, soluble recombinant DC-SIGN was shown to inhibit the binding between SP-D and gp120. SP-D agglutinated HIV and gp120 in a calcium dependent manner. SP-D inhibited the infectivity of HIV strains at both pH values of 7.4 and 5.0 in a concentration dependent manner. The inhibition of the infectivity was abolished by the presence of mannose. SP-D enhanced the binding of HIV to immature monocyte derived dendritic cells (iMDDCs) and was also found to enhance HIV capture and transfer to the T-cell like line PM1. These results suggest that SP-D can bind to and inhibit direct infection of T-cells by HIV but also enhance the transfer of infectious HIV particles from DCs to T-cells in vivo

    PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update

    Get PDF
    A single-sign-on (SSO) is an authentication system that allows a user to log in with a single identity and password to any of several related, yet independent, server applications. SSO solutions eliminate the need for users to repeatedly prove their identities to different applications and hold different credentials for each application. Token-based authentication is commonly used to enable an SSO experience on the web, and on enterprise networks. A large body of work considers distributed token generation which can protect the long-term keys against a subset of breached servers. A recent work (CCS\u2718) introduced the notion of Password-based Threshold Authentication (PbTA) with the goal of making password-based token generation for SSO secure against server breaches that could compromise both long-term keys and user credentials. They also introduced a generic framework called PASTA that can instantiate a PbTA system. The existing SSO systems built on distributed token generation techniques, including the PASTA framework, do not admit password-update functionality. In this work, we address this issue by proposing a password-update functionality into the PASTA framework. We call the modified framework PAS-TA-U. As a concrete application, we instantiate PAS-TA-U to implement in Python a distributed SSH key manager for enterprise networks (ESKM) that also admits a password-update functionality for its clients. Our experiments show that the overhead of protecting secrets and credentials against breaches in our system compared to a traditional single server setup is low (average 119 ms in a 10-out-of-10 server setting on Internet with 80 ms round trip latency)

    Improving Practical UC-Secure Commitments based on the DDH Assumption

    Get PDF
    At Eurocrypt 2011, Lindell presented practical static and adaptively UC-secure commitment schemes based on the DDH assumption. Later, Blazy {\etal} (at ACNS 2013) improved the efficiency of the Lindell\u27s commitment schemes. In this paper, we present static and adaptively UC-secure commitment schemes based on the same assumption and further improve the communication and computational complexity, as well as the size of the common reference string

    Incidentalomas during imaging for primary hyperparathyroidism—incidence and clinical outcomes

    Get PDF
    Background: Imaging for pre-operative localisation of parathyroid glands in primary hyperparathyroidism is now routine. This has led to the detection of incidental lesions (incidentalomas) in other organs, the nature of which is not well characterised. The aim of this study was to determine the incidence, characteristics and outcomes in patients who had incidental findings on parathyroid imaging. Methods: Records of patients who underwent imaging for primary hyperparathyroidism over 2 years were reviewed to identify incidental lesions detected on parathyroid imaging. Patients with persistent or renal hyperparathyroidism were excluded. Details on the management of detected incidentalomas were obtained from patient records. Results: Incidentalomas were identified in 17 of 170 patients (10 %) undergoing parathyroid imaging. Incidentalomas included thyroid (n = 11), breast (n = 3), lateral compartment of the neck (n = 1), lung (n = 1) and clavicle (n = 1). However, no disease of clinical significance needing treatment was detected on further investigation. Conclusions: Although a significant proportion of patients undergoing parathyroid imaging had incidental lesions detected, these seem to be of little clinical significance. The morbidity and cost of further interventions on these incidentalomas need to be weighed against the benefits of routine imaging in improving outcomes of first-time surgery in patients with primary hyperparathyroidism. Keywords: Parathyroid gland, Primary hyperparathyroidism, Imaging, Incidentaloma
    • …
    corecore