286 research outputs found
The application of big data and AI in the upstream supply chain
The use of Big Data has grown in popularity in organisations to exploit the purpose of their primary data to enhance their competitiveness. In conjunction with the increased use of Big Data, there has also been a growth in the use of Artificial Intelligence (AI) to analyse the vast amounts of data generated and provide a mechanism for locating and constructing useable patterns that organisations can incorporate in their supply chain strategy programme. As these organisations embrace the use of technology and embed this in their supply chain strategy, there are questions as to how this may affect their upstream supply chains especially with regards to how SME’s may be able to cope with the potential changes. There exists the opportunity to conduct further research into this area, mainly focusing on three key industry sectors of aerospace, rail and automotive supply chains.N/
Defining the research agenda to measure and reduce tuberculosis stigmas
This is an Open Access article, © 2017 International Union Against Tuberculosis and Lung Disease. Content in the UH Research Archive is made available for personal research, educational, and non-commercial purposes only. Unless otherwise stated, all content is protected by copyright, and in the absence of an open license, permissions for further re-use should be sought from the publisher, the author, or other copyright holder.Crucial to finding and treating the 4 million tuberculosis (TB) patients currently missed by National TB Programs, TB stigma is receiving well-deserved and long-delayed attention at the global level. However, the ability to measure and evaluate the success of TB stigma reduction efforts is limited by the need for additional tools. At a 2016 TB stigma measurement meeting held in The Hague, stigma experts discussed and proposed a research agenda around four themes: (1) Drivers: What are the main drivers and domains of TB stigma(s)?; (2) Consequences: How consequential are TB stigmas? How are negative impacts most felt?; (3) Burden: What is the global prevalence and distribution of TB stigma(s)? What explains any variation? (4): Intervention: What can be done to reduce the extent and impact of TB stigma(s)? Each theme was further subdivided into research topics to be addressed to move the agenda forward. These include more clarity on what causes TB stigmas to emerge and thrive, the difficulty of measuring the complexity of stigma, and the improbability of a universal stigma ‘cure’. Notwithstanding, these challenges should not hinder investments in TB stigma measurement and reduction. We believe it is time to focus on how and not whether the global community should measure and reduce TB stigma.Peer reviewedFinal Published versio
Prevalence, prenatal screening and neonatal features in children with Down syndrome: a registry-based national study
BACKGROUND:
Down syndrome (DS) is one of the most common chromosomal abnormalities among newborns. In recent years advances in perinatal and neonatal care have improved chance of survival for the children with DS. The objective of this Registry-Based study was to get more accurate data of DS prevalence with evaluation of antenatal screening, neonatal and maternal features among total births in Croatia from 2009 to 2012. ----- METHODS:
We used retrospectively collected data for DS newborns from the medical birth database and perinatal mortality database for the period of 2009-2012. Differences between DS and the referent population for each year in quantitative measures were assessed with the independent t-test. Other differences in nominal and categorical values were analyzed with the chi-square test. ----- RESULTS:
The total prevalence for DS in the period of 2009-2012 was 7.01 per 10,000 births, while the live-birth prevalence was 6.49 per 10,000 births. The significant differences (p < 0.05) between the DS and reference populations for each year were noticed for birth weight and length, gestational age, mother age, Apgar score of ≥6 after 5 min and breastfeeding. Among newborns with DS, there were 64 (53.33 %) males and 56 (46.67 %) females versus 88,587 (51.76 %) males and 82,553 (48.23 %) females in the reference population. In the DS group compared to the reference population the mean birth weight was 2845 grams versus 3467 grams in males and 2834 grams versus 3329 grams in females, respectively, with a mean birth length of 47 cm versus 50 cm for both genders. The mean gestational age of the DS births was 37 weeks and the mean age of the mothers was 32.6 years, versus 39 weeks and 29.1 years, respectively, in the reference population. Only 68.3 % of children with DS were breastfed from birth, compared with 94.72 % of children in the reference population. ----- CONCLUSIONS:
The significant differences for neonatal and maternal features between DS and the referent population were found similar to other studies. The total prevalence of DS in Croatia in the period of 2009-2012 was lower than the previously estimated prevalence based on EUROCAT data. The establishment of a new national registry of congenital malformations covering 99 % of all births in Croatia is necessary to improve the health and prosperity of children, adolescents and adults with DS in Croatia
Development and testing of an online community care platform for frail older adults in the Netherlands: a user-centred design
Background
Recent transitions in long-term care in the Netherlands have major consequences for community-dwelling older adults. A new paradigm expects them to manage and arrange their own care and support as much as possible. Technology can support this shift. A study has been conducted to explore the needs of community-dwelling frail older adults with regard to an online platform. An existing platform was subsequently modified, based upon these needs, resulting in an online community care platform (OCC-platform) comprising of care, health, and communication functions. The purpose of this platform was to support frail older adults in their independence and functioning, by stimulating self-care and providing reliable information, products and services.
Methods
The study used a User-Centred Design. The development processes involved the following steps: Step 1) Identification of the User Requirements. To assess the user requirements, direct observations (N = 3) and interviews (N = 14) were performed. Step 2) Modification of an Existing Online Platform. Based upon Step 1, available online platforms were explored to determine whether an existing useful product was available. Two companies collaborated in modifying such a platform; Step 3) Testing the Modified Platform. A total of 73 older adults were invited to test a prototype of the OCC-platform during 6 months, which comprised of two phases: (1) a training phase; and (2) a testing phase.
Results
An iterative process of modifications resulted in an interactive software concept on a Standard PC, containing 11 Functions. The Functions of ‘contacts’, ‘services’ and ‘messaging’, were by far, the most frequently used. The use was at its highest during the first 2 weeks of the testing and then its use steadily declined. The vast majority of the subjects (94%) were positive about the usability of the platform. Only a minority of the subjects (27%) indicated that the platform had added value for them.
Conclusion
The overall prospect was that an OCC-platform can contribute to the social participation and the self-management competencies of frail older adults, together with their social cohesion in the community. In order to validate these prospects, further research is needed on the characteristics and the impact of online platforms
CD24 Is Not Required for Tumor Initiation and Growth in Murine Breast and Prostate Cancer Models
CD24 is a small, heavily glycosylated, GPI-linked membrane protein, whose expression has been associated with the tumorigenesis and progression of several types of cancer. Here, we studied the expression of CD24 in tumors of MMTV-PyMT, Apc1572/T+ and TRAMP genetic mouse models that spontaneously develop mammary or prostate carcinoma, respectively. We found that CD24 is expressed during tumor development in all three models. In MMTV-PyMT and Apc1572T/+ breast tumors, CD24 was strongly but heterogeneously expressed during early tumorigenesis, but decreased in more advanced stages, and accordingly was increased in poorly differentiated lesions compared with well differentiated lesions. In prostate tumors developing in TRAMP mice, CD24 expression was strong within hyperplastic lesions in comparison with non-hyperplastic regions, and heterogeneous CD24 expression was maintained in advanced prostate carcinomas. To investigate whether CD24 plays a functional role in tumorigenesis in these models, we crossed CD24 deficient mice with MMTV-PyMT, Apc1572T/+ and TRAMP mice, and assessed the influence of CD24 deficiency on tumor onset and tumor burden. We found that mice negative or positive for CD24 did not significantly differ in terms of tumor initiation and burden in the genetic tumor models tested, with the exception of Apc1572T/+ mice, in which lack of CD24 reduced the mammary tumor burden slightly but significantly. Together, our data suggest that while CD24 is distinctively expressed during the early development of murine mammary and prostate tumors, it is not essential for the formation of tumors developing in MMTV-PyMT, Apc1572T/+ and TRAMP mice
Brain correlates of pro-social personality traits: a voxel-based morphometry study
Of the five personality dimensions described by the Big Five Personality Model (Costa and McCrae 1992), Extraversion and Agreeableness are the traits most commonly associated with a pro-social orientation. In this study we tested whether a pro-social orientation, as expressed in terms of Extraversion and Agreeableness, is associated with a specific grey matter phenotype. Fifty-two healthy participants underwent magnetic resonance imaging (MRI) and completed the NEO-Five Factor Inventory (NEO-FFI), a self-report measure of the Big Five personality traits. Voxel-based morphometry (VBM) was used to investigate the correlation between brain structure and the personality traits of Agreeableness and Extraversion. We found that Extraversion was negatively correlated with grey matter density in the middle frontal and orbitofrontal gyri while Agreeableness was negatively correlated with grey matter density in the inferior parietal, middle occipital and posterior cingulate gyri. No positive correlations were found. These results suggest that pro-social personality traits seem to be associated with decreases in grey matter density in more frontal regions for Extraversion, and more posterior regions for Agreeableness.This research was funded by the Portuguese Foundation for Science and Technology (FCT): PIC/IC/83290/2007, which is supported by FEDER (POFC - COMPETE), and postdoctoral grant number: SFRH/BPD/75014/2010
The road to successful implementation of innovation in radiotherapy: A research-based implementation protocol
BACKGROUND AND PURPOSE
Radiotherapy (RT) is rapidly advancing, yet only 50 % of innovations are implemented promptly. Despite the availability of Implementation Science (ImpSci) theories, models, and frameworks (TMFs), a theory-practice gap persists in effectively applying these insights in RT clinical practice. This study aims to develop a consensus-based implementation protocol for RT innovations using validated ImpSci knowledge.
MATERIAL AND METHODS
A literature review of TMFs (May-August 2023) and 20 semi-structured interviews with Dutch RT professionals (August-December 2023) identified key RT components for implementation. These insights informed a draft RT implementation protocol, which was refined through a three-round international Delphi study (March-September 2024) involving 11 RT and 5 ImpSci experts. Consensus was determined using a 5-point Likert scale, analysing medians, interquartile ranges (IQRs), and percentage scoring.
RESULTS
The Knowledge-to-Action (KTA) Framework and input from expert interviews were used to draft the protocol. Delphi response rates were 100 %, 93.8 %, and 88.9 % across rounds. In round 1, 88.9 % of elements achieved consensus (median = 4.0, IQR = 0.0-1.3); only the application of a prediction model for timely implementation (step 3c) needed revision after rounds 1 and 2. In round 3, also for step 3c consensus was reached (median = 4.0, IQR = 0.3). The protocol includes defining innovation types, stakeholder analysis, tailored implementation strategies, and a phased evaluation plan to ensure sustainability.
CONCLUSION
This is the first consensus-based RT innovation implementation protocol, addressing the theory-practice gap with a structured clinical approach. Future research should validate the protocol and assess the impact of preparation on implementation success
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA
[EN] Maude-NPA is an analysis tool for cryptographic security
protocols that takes into account the algebraic properties of the cryptosystem. Maude-NPA can reason about a wide range of cryptographic
properties. However, some algebraic properties, and protocols using them,
have been beyond Maude-NPA capabilities, either because the cryptographic properties cannot be expressed using its equational unification
features or because the state space is unmanageable. In this paper, we
provide a protocol transformation that can safely get rid of cryptographic
properties under some conditions. The time and space difference between
verifying the protocol with all the crypto properties and verifying the
protocol with a minimal set of the crypto properties is remarkable. We
also provide, for the first time, an encoding of the theory of bilinear pairing into Maude-NPA that goes beyond the encoding of bilinear pairing
available in the Tamarin toolPartially supported by the EU (FEDER) and the Spanish MCIU under grant RTI2018-094403-B-C32, by the Spanish Generalitat Valenciana under grant PROMETEO/2019/098, and by the US Air Force Office of Scientific Research under award number FA9550-17-1-0286. Julia Sapiña has been supported by the Generalitat Valenciana APOSTD/2019/127 grantAparicio-Sánchez, D.; Escobar Román, S.; Gutiérrez Gil, R.; Sapiña-Sanchis, J. (2020). An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA. Springer Nature. 230-250. https://doi.org/10.1007/978-3-030-59013-0_12S230250Maude-NPA manual v3.1. http://maude.cs.illinois.edu/w/index.php/Maude_Tools:_Maude-NPAThe Tamarin-Prover Manual, 4 June 2019. https://tamarin-prover.github.io/manual/tex/tamarin-manual.pdfAl-Riyami, S.S., Paterson, K.G.: Tripartite authenticated key agreement protocols from pairings. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 332–359. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40974-8_27Baader, F., Snyder, W.: Unification theory. In: Robinson, J.A., Voronkov, A. (eds.) Handbook of Automated Reasoning, vol. 1, pp. 447–533. Elsevier Science (2001)Baelde, D., Delaune, S., Gazeau, I., Kremer, S.: Symbolic verification of privacy-type properties for security protocols with XOR. In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, pp. 234–248. IEEE Computer Society (2017)Blanchet, B.: Modeling and verifying security protocols with the applied pi calculus and ProVerif. Found. Trends Privacy Secur. 1(1–2), 1–135 (2016)Clavel, M., et al.: Maude manual (version 3.0). Technical report, SRI International, Computer Science Laboratory (2020). http://maude.cs.uiuc.eduComon-Lundh, H., Delaune, S.: The finite variant property: how to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294–307. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-32033-3_22Cremers, C.J.F.: The scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70545-1_38Dreier, J., Duménil, C., Kremer, S., Sasse, R.: Beyond subterm-convergent equational theories in automated verification of stateful protocols. In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 117–140. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_6Escobar, S., Hendrix, J., Meadows, C., Meseguer, J.: Diffie-Hellman cryptographic reasoning in the Maude-NRL protocol analyzer. In: Proceedings of 2nd International Workshop on Security and Rewriting Techniques (SecReT 2007) (2007)Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1–2), 162–202 (2006)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007-2009. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03829-7_1Escobar, S., et al.: Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. In: Proceedings of PPDP 2011, pp. 65–76. ACM (2011)Escobar, S., Meadows, C.A., Meseguer, J., Santiago, S.: State space reduction in the Maude-NRL protocol analyzer. Inf. Comput. 238, 157–186 (2014)Escobar, S., Sasse, R., Meseguer, J.: Folding variant narrowing and optimal variant termination. J. Log. Algebr. Program. 81(7–8), 898–928 (2012)Fabrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: why is a security protocol correct? In: Proceedings of IEEE Symposium on Security and Privacy, pp. 160–171 (1998)Guttman, J.D.: Security goals and protocol transformations. In: Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol. 6993, pp. 130–147. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27375-9_8Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–393. Springer, Heidelberg (2000). https://doi.org/10.1007/10722028_23Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: Dupuy, M., Paradinas, P. (eds.) SEC 2001. IIFIP, vol. 65, pp. 229–244. Springer, Boston, MA (2002). https://doi.org/10.1007/0-306-46998-7_16Küsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: IEEE Computer Security Foundations, pp. 157–171 (2009)Küsters, R., Truderung, T.: Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. J. Autom. Reason. 46(3–4), 325–352 (2011)Meadows, C.: The NRL protocol analyzer: an overview. J. Logic Program. 26(2), 113–131 (1996)Meier, S., Cremers, C., Basin, D.: Strong invariants for the efficient construction of machine-checked protocol security proofs. In: 2010 23rd IEEE Computer Security Foundations Symposium, pp. 231–245 (2010)Meseguer, J.: Conditional rewriting logic as a united model of concurrency. Theoret. Comput. Sci. 96(1), 73–155 (1992)Meseguer, J.: Variant-based satisfiability in initial algebras. Sci. Comput. Program. 154, 3–41 (2018)Meseguer, J.: Generalized rewrite theories, coherence completion, and symbolic methods. J. Log. Algebr. Meth. Program. 110, 100483 (2020)Mödersheim, S., Viganò, L.: The open-source fixed-point model checker for symbolic analysis of security protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007-2009. LNCS, vol. 5705, pp. 166–194. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03829-7_6Sasse, R., Escobar, S., Meadows, C., Meseguer, J.: Protocol analysis modulo combination of theories: a case study in Maude-NPA. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 163–178. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22444-7_11Schmidt, B., Sasse, R., Cremers, C., Basin, D.A.: Automated verification of group key agreement protocols. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, pp. 179–194. IEEE Computer Society (2014)Skeirik, S., Meseguer, J.: Metalevel algorithms for variant satisfiability. J. Log. Algebraic Methods Program. 96, 81–110 (2018)TeReSe: Term Rewriting Systems. Cambridge University Press, Cambridge (2003)Yang, F., Escobar, S., Meadows, C.A., Meseguer, J., Narendran, P.: Theories of homomorphic encryption, unification, and the finite variant property. In: Proceedings of PPDP 2014, pp. 123–133. ACM (2014
Prediction of brain clozapine and norclozapine concentrations in humans from a scaled pharmacokinetic model for rat brain and plasma pharmacokinetics
Effectiveness of service models and organisational structures supporting tuberculosis identification and management in hard-to-reach populations in countries of low and medium tuberculosis incidence: a systematic review
OBJECTIVE:
To determine which service models and organisational structures are effective and cost-effective for delivering tuberculosis (TB) services to hard-to-reach populations.
DESIGN:
Embase and MEDLINE (1990–2017) were searched in order to update and extend the 2011 systematic review commissioned by National Institute for Health and Care Excellence (NICE), discussing interventions targeting service models and organisational structures for the identification and management of TB in hard-to-reach populations. The NICE and Cochrane Collaboration standards were followed.
SETTING:
European Union, European Economic Area, European Union candidate countries and Organisation for Economic Co-operation and Development countries.
PARTICIPANTS:
Hard-to-reach populations, including migrants, homeless people, drug users, prisoners, sex workers, people living with HIV and children within vulnerable and hard-to-reach populations.
PRIMARY AND SECONDARY OUTCOME MEASURES:
Effectiveness and cost-effectiveness of the interventions.
RESULTS:
From the 19 720 citations found, five new studies were identified, in addition to the six discussed in the NICE review. Community health workers from the same migrant community, street teams and peers improved TB screening uptake by providing health education, promoting TB screening and organising contact tracing. Mobile TB clinics, specialised TB clinics and improved cooperation between healthcare services can be effective at identifying and treating active TB cases and are likely to be cost-effective. No difference in treatment outcome was detected when directly observed therapy was delivered at a health clinic or at a convenient location in the community.
CONLCUSIONS:
Although evidence is limited due to the lack of high-quality studies, interventions using peers and community health workers, mobile TB services, specialised TB clinics and improved cooperation between health services can be effective to control TB in hard-to-reach populations. Future studies should evaluate the (cost-)effectiveness of interventions on TB identification and management in hard-to-reach populations and countries should be urged to publish the outcomes of their TB control systems
- …
