• No results found

Use of structured musculoskeletal examination routines in undergraduate medical education and postgraduate clinical practice – a UK survey

N/A
N/A
Protected

Academic year: 2020

Share "Use of structured musculoskeletal examination routines in undergraduate medical education and postgraduate clinical practice – a UK survey"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 1 Demographics of trainee doctors who responded tothe survey
Fig. 1 Awareness (a) and use (b) of structured musculoskeletal examination routines by undergraduate tutors and postgraduate trainee doctors.Tutor awareness is shown as percentage of adult tutor responses received for GALS and REMS, and as percentage of to

References

Related documents

He, along with testing the difference between test scores of PBT and CBT, examined the effect of attitude towards the use of computer, familiarity with computer, prior

A CGP classifier is then applied to expression recognition using optical flow based features.. However, the imbalanced data set results in poor performance of the

this infant in a patient giving a strongly positive reaction to a scratch test for silk.. However, we have been unable thus

Following intratracheal administration of 1 mg/kg IC87114 to ovalbumin/lipopolysaccharide-sensitized/challenged mice, airway hyper-responsiveness and structural analysis was

Analysis of the lipids within the 3-dimensional human skin model indicated that treatment with d18:2 and t18:1 not only upregulated gene expression but also increased

The study was clinical study in which consists 30 patients after treatment 54% patients got markedly improvement in symptoms, the study has shown highly significant

(a) Sagittal fat-suppressed proton- density (PD) and (b) PD MR images through the lateral plantar plate of the second MTP joint demonstrate severe degeneration and nonretracted tear

Considering different packet loss rates [22] and bit error rates [30] concerning trans- mission security problems, we propose an access control strategy based on