195 research outputs found

    Costs of publicly provided maternity services in Rosario, Argentina

    Get PDF
    This material is posted here with permission of the publishers, Instituto Nacional de Salud Pública. Internal or personal use of this material is permitted. However, permission to reprint/republish this material must be obtained from the Publisher.Objective. This study estimates the costs of maternal health services in Rosario, Argentina. Material and Methods. The rovider costs (US1999)ofantenatalcare,anormalvaginaldeliveryandacaesareansection,wereevaluatedretrospectivelyintwomunicipalhospitals.Thecostofanantenatalvisitwasevaluatedintwohealthcentresandthepatientcostsassociatedwiththevisitwereevaluatedinahospitalandahealthcentre.Results.Theaveragecostperhospitaldayis 1999) of antenatal care, a normal vaginal delivery and a caesarean section, were evaluated retrospectively in two municipal hospitals. The cost of an antenatal visit was evaluated in two health centres and the patient costs associated with the visit were evaluated in a hospital and a health centre. Results. The average cost per hospital day is 114.62. The average cost of a caesarean section (525.57)isfivetimesgreaterthanthatofanormalvaginaldelivery(525.57) is five times greater than that of a normal vaginal delivery (105.61). A normal delivery costs less at the general hospital and a c-section less at the aternity hospital. The average cost of an antenatal visit is 31.10.Theprovidercostisloweratthehealthcentrethanatthehospital.Personnelaccountedfor729431.10. The provider cost is lower at the health centre than at the hospital. Personnel accounted for 72-94% of the total cost and drugs and medical supplies between 4-26%. On average, an antenatal visit costs women 4.70. Direct costs are minimal compared to indirect costs of travel and waiting time. Conclusions. These results suggest the potential for increasing the efficiency of resource use by promoting antenatal care visits at the primary level. Women could also benefit from reduced travel and waiting time. Similar benefits could accrue to the provider by encouraging normal delivery at general hospitals, and complicated deliveries at specialised maternity hospitals.Josephine Borghi is funded by the Department for International Development through the Maternal Health Programme at the London School of Hygiene and Tropical Medicine. This project was conducted for and funded by the Human Reproduction Programme at WHO, Geneva

    Flexible and Configurable Verification Policies with Omnibus

    Get PDF
    The three main assertion-based verification approaches are: run-time assertion checking(RAC), extended static checking (ESC) and full formal verification (FFV). Each approach offers a different balance between rigour and ease of use, making them appropriate in different situations. Our goal is to explore the use of these approaches together in a flexible way, enabling an application to be broken down into parts with different reliability requirements and different verification approaches used in each part. We explain the benefits of using the approaches together, present a set of guidelines to avoid potential conflicts and give an overview of how the Omnibus IDE provides support for the full range of assertion-based verification approaches within a single tool

    System-level Non-interference for Constant-time Cryptography

    Get PDF
    International audienceCache-based attacks are a class of side-channel attacks that are particularly effective in virtualized or cloud-based en-vironments, where they have been used to recover secret keys from cryptographic implementations. One common ap-proach to thwart cache-based attacks is to use constant-time implementations, i.e. which do not branch on secrets and do not perform memory accesses that depend on secrets. How-ever, there is no rigorous proof that constant-time implemen-tations are protected against concurrent cache-attacks in virtualization platforms with shared cache; moreover, many prominent implementations are not constant-time. An alter-native approach is to rely on system-level mechanisms. One recent such mechanism is stealth memory, which provisions a small amount of private cache for programs to carry po-tentially leaking computations securely. Stealth memory in-duces a weak form of constant-time, called S-constant-time, which encompasses some widely used cryptographic imple-mentations. However, there is no rigorous analysis of stealth memory and S-constant-time, and no tool support for check-ing if applications are S-constant-time. We propose a new information-flow analysis that checks if an x86 application executes in constant-time, or in S-constant-time. Moreover, we prove that constant-time (resp. S-constant-time) programs do not leak confidential infor-mation through the cache to other operating systems exe-cuting concurrently on virtualization platforms (resp. plat-forms supporting stealth memory). The soundness proofs are based on new theorems of independent interest, includ-ing isolation theorems for virtualization platforms (resp. plat-forms supporting stealth memory), and proofs that constant-time implementations (resp. S-constant-time implementa-tions) are non-interfering with respect to a strict information flow policy which disallows that control flow and memory ac-cesses depend on secrets. We formalize our results using the Coq proof assistant and we demonstrate the effectiveness of our analyses on cryptographic implementations, including PolarSSL AES, DES and RC4, SHA256 and Salsa20

    Can sand dunes be used to study historic storm events?

    Get PDF
    Knowing the long-term frequency of high magnitude storm events that cause coastal inundation is critical for present coastal management, especially in the context of rising sea levels and potentially increasing frequency and severity of storm events. Coastal sand dunes may provide a sedimentary archive of past storm events from which long-term frequencies of large storms can be reconstructed. This study uses novel portable optically stimulated luminescence (POSL) profiles from coastal dunes to reconstruct the sedimentary archive of storm and surge activity for Norfolk, UK. Application of POSL profiling with supporting luminescence ages and particle size analysis to coastal dunes provides not only information of dunefield evolution but also on past coastal storms. In this study, seven storm events, two major, were identified from the dune archive spanning the last 140 years. These appear to correspond to historical reports of major storm surges. Dunes appear to be only recording (at least at the sampling resolution used here) the highest storm levels that were associated with significant flooding. As such the approach seems to hold promise to obtain a better understanding of the frequency of large storms by extending the dune archive records further back to times when documentation of storm surges was sparse

    Social technologies for online learning: theoretical and contextual issues

    Get PDF
    Three exemplars are presented of social technologies deployed in educational contexts: wikis; a photo-sharing environment; and a social bookmarking tool. Students were found to engage with the technologies selectively, sometimes rejecting them, in the light of their prior conceptions of education. Some students (a minority in all the studies) were unsympathetic to the educational philosophy underpinning the technology’s adoption. The paper demonstrates, through an examination of in-context use, the importance of socio-cultural factors in relation to education, and the non-deterministic nature of educational technology. The academic study of technology has increasingly called into question the deterministic views which are so pervasive in popular discourse and among policy makers. Instead, socio-cultural factors play a crucial role in shaping and defining technology and educational technology is no exception, as the examples in the paper show. The paper concludes by drawing out some implications of the examples for the use of social technologies in education

    The play's the thing

    Get PDF
    For very understandable reasons phenomenological approaches predominate in the field of sensory urbanism. This paper does not seek to add to that particular discourse. Rather it takes Rorty’s postmodernized Pragmatism as its starting point and develops a position on the role of multi-modal design representation in the design process as a means of admitting many voices and managing multidisciplinary collaboration. This paper will interrogate some of the concepts underpinning the Sensory Urbanism project to help define the scope of interest in multi-modal representations. It will then explore a range of techniques and approaches developed by artists and designers during the past fifty years or so and comment on how they might inform the question of multi-modal representation. In conclusion I will argue that we should develop a heterogeneous tool kit that adopts, adapts and re-invents existing methods because this will better serve our purposes during the exploratory phase(s) of any design project that deals with complexity

    "It's not just about walking.....it's the practice nurse that makes it work": a qualitative exploration of the views of practice nurses delivering complex physical activity interventions in primary care

    Get PDF
    Background: Physical activity (PA) is important for physical and mental health in adults and older adults. Interventions incorporating theory-based behaviour change techniques (BCTs) can be useful in helping people to increase their PA levels and can be delivered by practice nurses in primary care. We undertook two primary care based complex walking interventions among adults and older adults. Both interventions were underpinned by BCTs and delivered by practice nurses and we sought their views and experiences of delivering over 1400 complex PA consultations.  Methods: Semi structured interviews with two practice nurse groups (n = 4 and n = 5) and two individual interviews (total n = 11) were conducted by independent facilitators; audio-recorded, transcribed verbatim and analysed using thematic analysis.  Results: Five key themes emerged as enablers and/or barriers to delivering the intervention: preparation and training; initial and ongoing support; adherence to the protocol; the use of materials and equipment; and engagement of participants. The themes were organised into a framework of 'pre-trial' and 'delivery of the intervention'. Two additional 'post-trial' themes were identified; changed practice and the future feasibility of the intervention. Nurses believed that taking part in the trial, especially the BCT training, enhanced the quality and delivery of advice and support they provided within routine consultations, although the lack of time available routinely makes this challenging.  Conclusion: Delivering an effective behaviour change intervention in primary care requires adequate training and support for practice nurses both initially and throughout the trial as well as adequate consultation time. Enhanced skills from participating in such trials can lead to long-term changes, including more patient-centred consulting.  Trial registration: PACE-Lift ISRCTN 42122561, PACE-UP ISRCTN 98538934

    A crossover randomised controlled trial of oral mandibular advancement devices for obstructive sleep apnoea-hypopnoea (TOMADO)

    Get PDF
    Rationale Mandibular advancement devices (MADs) are used to treat obstructive sleep apnoea-hypopnoea syndrome (OSAHS) but evidence is lacking regarding their clinical and cost-effectiveness in less severe disease. Objectives To compare clinical- and cost-effectiveness of a range of MADs against no treatment in mild to moderate OSAHS. Measurements and methods This open-label, randomised, controlled, crossover trial was undertaken at a UK sleep centre. Adults with Apnoea-Hypopnoea Index (AHI) 5–<30/h and Epworth Sleepiness Scale (ESS) score ≥9 underwent 6 weeks of treatment with three nonadjustable MADs: self-moulded (SleepPro 1; SP1); semi-bespoke (SleepPro 2; SP2); fully-bespoke MAD (bMAD); and 4 weeks no treatment. Primary outcome was AHI scored by a polysomnographer blinded to treatment. Secondary outcomes included ESS, quality of life, resource use and cost. Main results 90 patients were randomised and 83 were analysed. All devices reduced AHI compared with no treatment by 26% (95% CI 11% to 38%, p=0.001) for SP1, 33% (95% CI 24% to 41%) for SP2 and 36% (95% CI 24% to 45%, p<0.001) for bMAD. ESS was 1.51 (95% CI 0.73 to 2.29, p<0.001, SP1) to 2.37 (95% CI 1.53 to 3.22, p<0.001, bMAD) lower than no treatment (p<0.001 for all). Compliance was lower for SP1, which was the least preferred treatment at trial exit. All devices were cost-effective compared with no treatment at a £20 000/quality-adjusted life year (QALY) threshold. SP2 was the most cost-effective up to £39 800/QALY. Conclusions Non-adjustable MADs achieve clinically important improvements in mild to moderate OSAHS and are cost-effective

    Formal Model-Based Assurance Cases in Isabelle/SACM : An Autonomous Underwater Vehicle Case Study

    Get PDF
    Isabelle/SACM is a tool for automated construction of model-based assurance cases with integrated formal methods, based on the Isabelle proof assistant. Assurance cases show how a system is safe to operate, through a human comprehensible argument demonstrating that the requirements are satisfied, using evidence of various provenances. They are usually required for certification of critical systems, often with evidence that originates from formal methods. Automating assurance cases increases rigour, and helps with maintenance and evolution. In this paper we apply Isabelle/SACM to a fragment of the assurance case for an autonomous underwater vehicle demonstrator. We encode the metric unit system (SI) in Isabelle, to allow modelling requirements and state spaces using physical units. We develop a behavioural model in the graphical RoboChart state machine language, embed the artifacts into Isabelle/SACM, and use it to demonstrate satisfaction of the requirements
    corecore