Background: Different surgical approaches for total hip arthroplasty (THA) exist, without predisposition when it comes to dislocation risk. The direct anterior approach (DAA) is thought to have reduced risk since soft tissue trauma is minimalized. Therefore, we assessed the dislocation risk for different surgical approaches, and the relative dislocation risk of DAA compared to other approaches. Methods: Six electronic databases were systematically searched for prospective studies reporting dislocation following THA. Proportion meta-analyses were performed to assess the dislocation rate for subgroups of the surgical approach. Meta-analysis for binary outcomes was performed to determine the relative risk of dislocation for the DAA compared to other approaches. Results: Eleven studies with 2025 patients were included (mean age 64.6 years, 44% male, mean follow-up 10.5 months), of which four studies were also used in the risk ratio meta-analysis. Overall dislocation rate was 0.79% (95% CI 0.37–1.69). Subgroup analyses showed that most dislocations occurred in the posterior approaches group (1.38%), however non-significant. Furthermore, the DAA emerged with a non-significant lower risk of dislocation (RR 0.37, 95% CI 0.05–2.46) compared to other surgical approaches. Conclusion: Current literature shows non-significant predisposition for a surgical approach to THA regarding dislocation risk. To what extent patient characteristics influence the risk of dislocation could not be determined. Future research should focus on this, as well as on the influence of a surgeon's experience with a specific approach.
Background: Falls in stroke survivors can lead to serious injuries and medical costs. Fall risk in older adults can be predicted based on gait characteristics measured in daily life. Given the different gait patterns that stroke survivors exhibit it is unclear whether a similar fall-prediction model could be used in this group. Therefore the main purpose of this study was to examine whether fall-prediction models that have been used in older adults can also be used in a population of stroke survivors, or if modifications are needed, either in the cut-off values of such models, or in the gait characteristics of interest. Methods: This study investigated gait characteristics by assessing accelerations of the lower back measured during seven consecutive days in 31 non fall-prone stroke survivors, 25 fall-prone stroke survivors, 20 neurologically intact fall-prone older adults and 30 non fall-prone older adults. We created a binary logistic regression model to assess the ability of predicting falls for each gait characteristic. We included health status and the interaction between health status (stroke survivors versus older adults) and gait characteristic in the model. Results: We found four significant interactions between gait characteristics and health status. Furthermore we found another four gait characteristics that had similar predictive capacity in both stroke survivors and older adults. Conclusion: The interactions between gait characteristics and health status indicate that gait characteristics are differently associated with fall history between stroke survivors and older adults. Thus specific models are needed to predict fall risk in stroke survivors.
BackgroundOcclusions of intravenous (IV) tubing can prevent vital and time-critical medication or solutions from being delivered into the bloodstream of patients receiving IV therapy. At low flow rates (≤ 1 ml/h) the alarm delay (time to an alert to the user) can be up to 2 h using conventional pressure threshold algorithms. In order to reduce alarm delays we developed and evaluated the performance of two new real-time occlusion detection algorithms and one co-occlusion detector that determines the correlation in trends in pressure changes for multiple pumps.MethodsBench-tested experimental runs were recorded in triplicate at rates of 1, 2, 4, 8, 16, and 32 ml/h. Each run consisted of 10 min of non-occluded infusion followed by a period of occluded infusion of 10 min or until a conventional occlusion alarm at 400 mmHg occurred. The first algorithm based on binary logistic regression attempts to detect occlusions based on the pump’s administration rate Q(t) and pressure sensor readings P(t). The second algorithm continuously monitored whether the actual variation in the pressure exceeded a threshold of 2 standard deviations (SD) above the baseline pressure. When a pump detected an occlusion using the SD algorithm, a third algorithm correlated the pressures of multiple pumps to detect the presence of a shared occlusion. The algorithms were evaluated using 6 bench-tested baseline single-pump occlusion scenarios, 9 single-pump validation scenarios and 7 multi-pump co-occlusion scenarios (i.e. with flow rates of 1 + 1, 1 + 2, 1 + 4, 1 + 8, 1 + 16, and 1 + 32 ml/h respectively). Alarm delay was the primary performance measure.ResultsIn the baseline single-pump occlusion scenarios, the overall mean ± SD alarm delay of the regression and SD algorithms were 1.8 ± 0.8 min and 0.4 ± 0.2 min, respectively. Compared to the delay of the conventional alarm this corresponds to a mean time reduction of 76% (P = 0.003) and 95% (P = 0.001), respectively. In the validation scenarios the overall mean ± SD alarm delay of the regression and SD algorithms were respectively 1.8 ± 1.6 min and 0.3 ± 0.2 min, corresponding to a mean time reduction of 77% and 95%. In the multi-pump scenarios a correlation > 0.8 between multiple pump pressures after initial occlusion detection by the SD algorithm had a mean ± SD alarm delay of 0.4 ± 0.2 min. In 2 out of the 9 validation scenarios an occlusion was not detected by the regression algorithm before a conventional occlusion alarm occurred. Otherwise no occlusions were missed.ConclusionsIn single pumps, both the regression and SD algorithm considerably reduced alarm delay compared to conventional pressure limit-based detection. The SD algorithm appeared to be more robust than the regression algorithm. For multiple pumps the correlation algorithm reliably detected co-occlusions. The latter may be used to localize the segment of tubing in which the occlusion occurs.
LINK
The project aim is to improve collusion resistance of real-world content delivery systems. The research will address the following topics: • Dynamic tracing. Improve the Laarhoven et al. dynamic tracing constructions [1,2] [A11,A19]. Modify the tally based decoder [A1,A3] to make use of dynamic side information. • Defense against multi-channel attacks. Colluders can easily spread the usage of their content access keys over multiple channels, thus making tracing more difficult. These attack scenarios have hardly been studied. Our aim is to reach the same level of understanding as in the single-channel case, i.e. to know the location of the saddlepoint and to derive good accusation scores. Preferably we want to tackle multi-channel dynamic tracing. • Watermarking layer. The watermarking layer (how to embed secret information into content) and the coding layer (what symbols to embed) are mostly treated independently. By using soft decoding techniques and exploiting the “nuts and bolts” of the embedding technique as an extra engineering degree of freedom, one should be able to improve collusion resistance. • Machine Learning. Finding a score function against unknown attacks is difficult. For non-binary decisions there exists no optimal procedure like Neyman-Pearson scoring. We want to investigate if machine learning can yield a reliable way to classify users as attacker or innocent. • Attacker cost/benefit analysis. For the various use cases (static versus dynamic, single-channel versus multi-channel) we will devise economic models and use these to determine the range of operational parameters where the attackers have a financial benefit. For the first three topics we have a fairly accurate idea how they can be achieved, based on work done in the CREST project, which was headed by the main applicant. Neural Networks (NNs) have enjoyed great success in recognizing patterns, particularly Convolutional NNs in image recognition. Recurrent NNs ("LSTM networks") are successfully applied in translation tasks. We plan to combine these two approaches, inspired by traditional score functions, to study whether they can lead to improved tracing. An often-overlooked reality is that large-scale piracy runs as a for-profit business. Thus countermeasures need not be perfect, as long as they increase the attack cost enough to make piracy unattractive. In the field of collusion resistance, this cost analysis has never been performed yet; even a simple model will be valuable to understand which countermeasures are effective.