1,063 research outputs found
Outcomes after angiography with sodium bicarbonate and acetylcysteine
Background:
Intravenous sodium bicarbonate and oral acetylcysteine are widely used to prevent acute kidney injury and associated adverse outcomes after angiography without definitive evidence of their efficacy.
Methods:
Using a 2-by-2 factorial design, we randomly assigned 5177 patients at high risk for renal complications who were scheduled for angiography to receive intravenous 1.26% sodium bicarbonate or intravenous 0.9% sodium chloride and 5 days of oral acetylcysteine or oral placebo; of these patients, 4993 were included in the modified intention-to-treat analysis. The primary end point was a composite of death, the need for dialysis, or a persistent increase of at least 50% from baseline in the serum creatinine level at 90 days. Contrast-associated acute kidney injury was a secondary end point.
Results:
The sponsor stopped the trial after a prespecified interim analysis. There was no interaction between sodium bicarbonate and acetylcysteine with respect to the primary end point (P=0.33). The primary end point occurred in 110 of 2511 patients (4.4%) in the sodium bicarbonate group as compared with 116 of 2482 (4.7%) in the sodium chloride group (odds ratio, 0.93; 95% confidence interval [CI], 0.72 to 1.22; P=0.62) and in 114 of 2495 patients (4.6%) in the acetylcysteine group as compared with 112 of 2498 (4.5%) in the placebo group (odds ratio, 1.02; 95% CI, 0.78 to 1.33; P=0.88). There were no significant between-group differences in the rates of contrast-associated acute kidney injury.
Conclusions:
Among patients at high risk for renal complications who were undergoing angiography, there was no benefit of intravenous sodium bicarbonate over intravenous sodium chloride or of oral acetylcysteine over placebo for the prevention of death, need for dialysis, or persistent decline in kidney function at 90 days or for the prevention of contrast-associated acute kidney injury. (Funded by the U.S. Department of Veterans Affairs Office of Research and Development and the National Health and Medical Research Council of Australia; PRESERVE ClinicalTrials.gov number, NCT01467466.
ROLE AND PROSPECTS OF ENTREPRENEURSHIP DEVELOPMENT IN MYANMAR (Mie Mie Yu Thwin, 2018)
This thesis examines entrepreneurship development from two aspects, the first part, Myanmar entrepreneurs’ mind set, motivation and success factors by qualitative and quantitative research. The second part is main part of this thesis, the challenges that faced by entrepreneurs regarding to necessary pillars of entrepreneurial ecosystem: Policy, Finance, Infrastructure, Human capital, Market and Supportive networks. This survey is conducted to 260 entrepreneurs of established firms across the country. The data was collected through structured questionnaires and analyzed using SPSS 23. It was found that most entrepreneurs are optimistic, hardworking, risk taker, lifelong learners and have perseverance. In the second part, screening the six pillars of entrepreneurship ecosystem, entrepreneurs have urgent major obstacles in Infrastructure 21%, Business Environment 18%, Access to Market 17%, Policy 16%, Finance 14% and Human Capital 14%. For sustainable development for entrepreneurship ecosystem, the important pillars that needed to improve are Human Capital, Access to Finance, Policy Environment, Access to Market, Business Environment, and Infrastructure
A STUDY OF THE ARTICLE ON ENVIRONMENTAL ISSUES PUBLISHED IN MYANMAALINN DAILY AND KYEMON (THE MIRROR DAILY)
The media in Myanmar today have developed and there have now
emerged privately-owned media companies. This paper examines the
background of newspaper in Myanmar and the coverage of environmental-
related issues published in state-owned media, Myanma Alinn Daily and
Kyemon Daily (The Mirror Daily).How effective have been the Myanma
Alinn Daily and Kyemon Daily newspapers in their coverage of
environmental and climate change issues? In this study, quantification of
survey and interview method was used. Data were collected through content
analysis. There are a total of 245 items concerning environmental and
environmentally related articles in the two newspapers. Among all the
topics, climate change and global warming got the highest priority with
22% of the total articles. In 2016, environmental related reporting was not
covered sufficiently in these two newspapers. But the Myanma Alinn Daily
published a total of 145 items on issues related to the environment which
was more than those in the kyemon Daily. In terms of the extent of
coverage and types of environmental items in these two newspapers, they
differed considerably and 17% of the total articles were presented with
photographs. The two newspapers have played an important role in
informing the community by sharing their knowledge on environmental
related issues
HUMAN RESOURCE MANAGEMENT PRACTICES AFFECTING EMPLOYEE ENGAGEMENT IN RAFT MYANMAR COMPANY LIMITED (Zin Mar Thwin, 2019)
The research focuses on how HRM practices have affected on the employee
engagement. Descriptive study is used in this study. Total population of RAFT
Myanmar is 183 staff, out of which 73 are selected in this study. The study used the
primary data and secondary data. The primary data are collected from the HR &
Operations Department and staff of the organization by answering structured
questionnaires. The secondary data are used from related textbooks, research papers,
articles, journals and websites. Seven HRM practices including training and
development, compensation, job security, promotion opportunity, relations with
supervisor, teamwork and recognition are used to measure what extent employees are
engaged in the company. The study revealed that higher level of engagement was found
mainly due to factors such as relations with supervisor, compensation, teamwork,
promotion opportunity, and job security. However, the regression result highlighted
that increase in promotion opportunities and relations with supervisor have negative
impact on employee engagement in RAFT Myanmar. RAFT Myanmar needs to
emphasize on the handling of HRM practices because it directly affect employee
engagement. Therefore, organization should review and update the HRM policies
accordingly
Prediction of software development faults in PL/SQL files using neural network models
Database application constitutes one of the largest and most important software domains in the world. Some classes or modules in suchapplications are responsible for database operations. Structured Query Language (SQL) is used to communicate with database middleware inthese classes or modules. It can be issued interactively or embedded in a host language. This paper aims to predict the software developmentfaults in PL/SQL files using SQL metrics. Based on actual project defect data, the SQL metrics are empirically validated by analyzing theirrelationship with the probability of fault detection across PL/SQL files. SQL metrics were extracted from Oracle PL/SQL code of awarehouse management database application system. The faults were collected from the journal files that contain the documentation of allchanges in source files. The result demonstrates that these measures may be useful in predicting the fault concerning with database accesses.In our study, General Regression Neural Network and Ward Neural Network are used to evaluate the capability of this set of SQL metrics inpredicting the number of faults in database applications
Proposed ApplicableFramework for Extracting Rootkits Features and Clustering through Dynamic Analysis for Incident Handling Systems
Today’s threats have become complex multi-modulesystems using sophisticated techniques to target andattack vulnerable systems. The use of rootkits androotkit technologies in malware and cybercrime isincreasing. To remain undetected, malware creatorsincorporate rootkit components to maximize theirstealth capabilities. The main reason to develop thisresearch is the longer the malware can remainundetected on a compromised machine, the more thecybercriminal can profit. Therefore, the proposedsystem will focus on analyzing the kernel and user levelrootkits based on Window operating system withCuckoo sandbox. This system performs automated andmanual analysis for ensuring the important of theircharacteristics. The objectives are to identify therootkits based on their natures and complexity, and topropose feature extraction algorithm for improving thedetection model.Effective MalwareFeature ExtractionAlgorithm(EMFEA) is proposed in this framework fordetecting the future malware in Incident HandlingSystems. Moreover, the proposed system categorizesthe rootkits based on their relevant and prominentfeatures by using Hierarchical Clustering algorithm inWEKA
Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography
"Security is a major concern for wide applications in
large hostile networks like internet. More and More
people are willing to access information anytime and
anywhere. The advances in mobile devices and wireless
networks lead to requirements to tackle the problems
like high error rates and frequent disconnections.
Currently, the two modern technologies: Mobile Agents
and Web Services are used altogether to achieve
ubiquitous service access. Mobile Agent technology is
applicable to devices with limited bandwidth and
computing resources and long-term transactions
without constant interactions. Web Services are an
emerging technology that provides interoperability
between applications running in different platforms. As
a result of applications using combination of mobile
agent and web services, security becomes a big
concern for applications. The integration of mobile
agent and cryptography technologies provide benefits
such as improved accessibility wirelessly and increased
security. In this paper, the job search system for mobile
phone users is proposed .The problems encountered by
mobile phone users like frequent connection loss and
security issues can be overcome by using the
combination of Mobile Agent and appropriate
cryptography technique, certificateless cryptography.
The solution may therefore be ideal in a wireless
environment or in low-power devices where resources
are limited. Moreover, (TPHK) two party hashing key
agreement protocol is also proposed to save
communication costs with third parties each time and
to securely establish a common secret key preventing
an undesired third-party from injecting any weak keys
on the agreeing parties.
Electronic case report forms and electronic data capture within clinical trials and pharmacoepidemiology
Aims: Researchers in clinical and pharmacoepidemiology fields have adopted information technology (IT) and electronic data capture, but these remain underutilised despite the benefits. This review discusses electronic case report forms and electronic data capture, specifically within pharmacoepidemiology and clinical research.Methods: The review used PubMed and the Institute of Electrical and Electronic Engineers library (IEEE). Search terms used were agreed by the authors and documented. PubMed is medical and health based, whereas IEEE is technology based. The review focuses on electronic case report forms and electronic data capture, but considers briefly other relevant topics; consent, ethics, and security.Results: One thousand, one hundred and twenty six papers were found using the search terms. Manual filtering and reviewing of abstracts further condensed this number to 136 relevant manuscripts. The papers were further categorised; 17 containing study data, 40 containing observational data, 27 anecdotal data, 47 covering methodology or design of systems, 1 case study, 1 literature review, 2 feasibility studies, and 1 cost analysis.Conclusion: Electronic case report forms, electronic data capture, and IT in general, are viewed with enthusiasm and are seen as a cost effective means of improving research efficiency, educating participants, and improving trial recruitment, provided concerns about how data will be protected from misuse can be addressed. Clear operational guidelines and best practices are key for healthcare providers, and researchers adopting IT, and further work is needed on improving integration of new technologies with current systems. A robust method of evaluation for technical innovation is required
- …
