Dienst van SURF
© 2025 SURF
Background: Knee and hip osteoarthritis (OA) among older adults account for substantial disability and extensive healthcare use. Effective pain coping strategies help to deal with OA. This study aims to determine the long-term relationship between pain coping style and the course of healthcare use in patients with knee and/or hip OA over 10 years. Methods: Baseline and 10-year follow-up data of 861 Dutch participants with early knee and/or hip OA from the Cohort Hip and Cohort Knee (CHECK) cohort were used. The amount of healthcare use (HCU) and pain coping style were measured. Generalized Estimating Equations were used, adjusted for relevant confounders. Results: At baseline, 86.5% of the patients had an active pain coping style. Having an active pain coping style was significantly (p = 0.022) associated with an increase of 16.5% (95% CI, 2.0–32.7) in the number of used healthcare services over 10 years. Conclusion: Patients with early knee and/or hip OA with an active pain coping style use significantly more different healthcare services over 10 years, as opposed to those with a passive pain coping style. Further research should focus on altered treatment (e.g., focus on self-management) in patients with an active coping style, to reduce HCU.
Background: Different surgical approaches for total hip arthroplasty (THA) exist, without predisposition when it comes to dislocation risk. The direct anterior approach (DAA) is thought to have reduced risk since soft tissue trauma is minimalized. Therefore, we assessed the dislocation risk for different surgical approaches, and the relative dislocation risk of DAA compared to other approaches. Methods: Six electronic databases were systematically searched for prospective studies reporting dislocation following THA. Proportion meta-analyses were performed to assess the dislocation rate for subgroups of the surgical approach. Meta-analysis for binary outcomes was performed to determine the relative risk of dislocation for the DAA compared to other approaches. Results: Eleven studies with 2025 patients were included (mean age 64.6 years, 44% male, mean follow-up 10.5 months), of which four studies were also used in the risk ratio meta-analysis. Overall dislocation rate was 0.79% (95% CI 0.37–1.69). Subgroup analyses showed that most dislocations occurred in the posterior approaches group (1.38%), however non-significant. Furthermore, the DAA emerged with a non-significant lower risk of dislocation (RR 0.37, 95% CI 0.05–2.46) compared to other surgical approaches. Conclusion: Current literature shows non-significant predisposition for a surgical approach to THA regarding dislocation risk. To what extent patient characteristics influence the risk of dislocation could not be determined. Future research should focus on this, as well as on the influence of a surgeon's experience with a specific approach.
BACKGROUND: Patients with knee osteoarthritis can adapt their gait to unload the most painful knee joint in order to try to reduce pain and improve physical function. However, these gait adaptations can cause higher loads on the contralateral joints. The aim of the study was to investigate the interlimb differences in knee and hip frontal plane moments during gait in patients with knee osteoarthritis and in healthy controls.METHODS: Forty patients with knee osteoarthritis and 19 healthy matched controls were measured during comfortable treadmill walking. Frontal plane joint moments were obtained of both hip and knee joints. Differences in interlimb moments within each group were assessed using statistical parametric mapping and discrete gait parameters.FINDINGS: No interlimb differences were observed in patients with knee osteoarthritis and control subjects at group level. Furthermore, the patients presented similar interlimb variability as the controls. In a small subgroup (n = 12) of patients, the moments in the most painful knee were lower than in the contralateral knee, while the other patients (n = 28) showed higher moments in the most painful knee compared to the contralateral knee. However, no interlimb differences in the hip moments were observed within the subgroups.INTERPRETATION: Patients with knee osteoarthritis do not have interlimb differences in knee and hip joint moments. Patients and healthy subjects demonstrate a similar interlimb variability in the moments of the lower extremities. In this context, differences in knee pain in patients with knee osteoarthritis did not induce any interlimb differences in the frontal plane knee and hip moments.
Students in Higher Music Education (HME) are not facilitated to develop both their artistic and academic musical competences. Conservatoires (professional education, or ‘HBO’) traditionally foster the development of musical craftsmanship, while university musicology departments (academic education, or ‘WO’) promote broader perspectives on music’s place in society. All the while, music professionals are increasingly required to combine musical and scholarly knowledge. Indeed, musicianship is more than performance, and musicology more than reflection—a robust musical practice requires people who are versed in both domains. It’s time our education mirrors this blended profession. This proposal entails collaborative projects between a conservatory and a university in two cities where musical performance and musicology equally thrive: Amsterdam (Conservatory and University of Amsterdam) and Utrecht (HKU Utrechts Conservatorium and Utrecht University). Each project will pilot a joint program of study, combining existing modules with newly developed ones. The feasibility of joint degrees will be explored: a combined bachelor’s degree in Amsterdam; and a combined master’s degree in Utrecht. The full innovation process will be translated to a transferable infrastructural model. For 125 students it will fuse praxis-based musical knowledge and skills, practice-led research and academic training. Beyond this, the partners will also use the Comenius funds as a springboard for collaboration between the two cities to enrich their respective BA and MA programs. In the end, the programme will diversify the educational possibilities for students of music in the Netherlands, and thereby increase their professional opportunities in today’s job market.
The energy transition is a highly complex technical and societal challenge, coping with e.g. existing ownership situations, intrusive retrofit measures, slow decision-making processes and uneven value distribution. Large scale retrofitting activities insulating multiple buildings at once is urgently needed to reach the climate targets but the decision-making of retrofitting in buildings with shared ownership is challenging. Each owner is accountable for his own energy bill (and footprint), giving a limited action scope. This has led to a fragmented response to the energy retrofitting challenge with negligible levels of building energy efficiency improvements conducted by multiple actors. Aggregating the energy design process on a building level would allow more systemic decisions to happen and offer the access to alternative types of funding for owners. “Collect Your Retrofits” intends to design a generic and collective retrofit approach in the challenging context of monumental areas. As there are no standardised approaches to conduct historical building energy retrofits, solutions are tailor-made, making the process expensive and unattractive for owners. The project will develop this approach under real conditions of two communities: a self-organised “woongroep” and a “VvE” in the historic centre of Amsterdam. Retrofit designs will be identified based on energy performance, carbon emissions, comfort and costs so that a prioritisation strategy can be drawn. Instead of each owner investing into their own energy retrofitting, the neighbourhood will invest into the most impactful measures and ensure that the generated economic value is retained locally in order to make further sustainable investments and thus accelerating the transition of the area to a CO2-neutral environment.
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.