273 resultados para ICD-10 codes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose The purpose of this study was to investigate the effectiveness of a 10 percent casein phosphopeptide-amorphous calcium phosphate (CPP-ACP) cream to reduce mutans streptococci (MS) colonization and prevent early childhood caries. Methods The cohort was randomized at mean age of 11 days old to receive once-daily CPP-ACP cream (n=102) or no product (comparison group; n=89) from the time of first tooth eruption. All mothers were contacted by telephone at six, 12, and 18 months and advised to brush their children's teeth twice daily with low-dose fluoride toothpaste. At 24 months, all children were examined at a community clinic. Results At 24 months old, one out of 65 (2 percent) children in the CPP-ACP group had caries vs. four out of 58 (seven percent) in the comparison group (difference not statistically significant). There were fewer MS-positive children in the CPP-ACP group (26 percent) vs. the comparison group (47 percent; P=.02). A dose-response effect of CPP-ACP usage on MS was observed, where MS was present in eight percent of regular CPP-ACP users, 28 percent of irregular users, and 47 percent of non-users (P<.02). Conclusions CPP-ACP reduced the percentages of mutans streptococci-positive 24-month-old children, although it did not reduce caries prevalence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Debilitating infectious diseases caused by Chlamydia are major contributors to the decline of Australia's iconic native marsupial species, the koala (Phascolarctos cinereus). An understanding of koala chlamydial disease pathogenesis and the development of effective strategies to control infections continue to be hindered by an almost complete lack of species-specific immunological reagents. The cell-mediated immune response has been shown to play an influential role in the response to chlamydial infection in other hosts. The objective of this study, hence, was to provide preliminary data on the role of two key cytokines, pro-inflammatory tumour necrosis factor alpha (TNFα) and anti-inflammatory interleukin 10 (IL10), in the koala Chlamydia pecorum response. Utilising sequence homology between the cytokine sequences obtained from several recently sequenced marsupial genomes, this report describes the first mRNA sequences of any koala cytokine and the development of koala specific TNFα and IL10 real-time PCR assays to measure the expression of these genes from koala samples. In preliminary studies comparing wild koalas with overt chlamydial disease, previous evidence of C. pecorum infection or no signs of C. pecorum infection, we revealed strong but variable expression of TNFα and IL10 in wild koalas with current signs of chlamydiosis. The description of these assays and the preliminary data on the cell-mediated immune response of koalas to chlamydial infection paves the way for future studies characterising the koala immune response to a range of its pathogens while providing reagents to assist with measuring the efficacy of ongoing attempts to develop a koala chlamydial vaccine.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many model-based investigation techniques, such as sensitivity analysis, optimization, and statistical inference, require a large number of model evaluations to be performed at different input and/or parameter values. This limits the application of these techniques to models that can be implemented in computationally efficient computer codes. Emulators, by providing efficient interpolation between outputs of deterministic simulation models, can considerably extend the field of applicability of such computationally demanding techniques. So far, the dominant techniques for developing emulators have been priors in the form of Gaussian stochastic processes (GASP) that were conditioned with a design data set of inputs and corresponding model outputs. In the context of dynamic models, this approach has two essential disadvantages: (i) these emulators do not consider our knowledge of the structure of the model, and (ii) they run into numerical difficulties if there are a large number of closely spaced input points as is often the case in the time dimension of dynamic models. To address both of these problems, a new concept of developing emulators for dynamic models is proposed. This concept is based on a prior that combines a simplified linear state space model of the temporal evolution of the dynamic model with Gaussian stochastic processes for the innovation terms as functions of model parameters and/or inputs. These innovation terms are intended to correct the error of the linear model at each output step. Conditioning this prior to the design data set is done by Kalman smoothing. This leads to an efficient emulator that, due to the consideration of our knowledge about dominant mechanisms built into the simulation model, can be expected to outperform purely statistical emulators at least in cases in which the design data set is small. The feasibility and potential difficulties of the proposed approach are demonstrated by the application to a simple hydrological model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper contributes to critical policy research by theorising one aspect of policy enactment, the meaning making work of a cohort of mid-level policy actors. Specifically, we propose that Basil Bernstein’s work on the structuring of pedagogic discourse, in particular, the concept of recontextualisation, may add to understandings of the policy work of interpretation and translation. Recontextualisation refers to the relational processes of selecting and moving knowledge from one context to another, as well as to the distinctive re-organisation of knowledge as an instructional and regulative or moral discourse. Processes of recontextualisation necessitate an analysis of power and control relations, and therefore add to the Foucauldian theorisations of power that currently dominate the critical policy literature. A process of code elaboration (decoding and recoding) takes place in various recontextualising agencies, responsible for the production of professional development materials, teaching guidelines and curriculum resources. We propose that mid-level policy actors are crucial to the work of policy interpretation and translation because they are engaged in elaborating the condensed codes of policy texts to an imagined logic of teachers’ practical work. To illustrate our theoretical points we draw on data; collected for an Australian research project on the accounts of mid-level policy actors responsible for the interpretation of child protection and safety policies for staff in Queensland schools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The double Friedel–Crafts acylation of readily accessible biaryls with oxalyl chloride delivers the respective phenanthrene-9,10-diones, providing an alternative to the traditional methods, which require harsh oxidizing conditions and multistep sequences. This simple method allows the synthesis of various symmetrical and non-symmetrical targets, and is even effective for the synthesis of the parent ring system from (unactivated) biphenyl.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mineral lulzacite from Saint-Aubin des Chateaux mine, France, with theoretical formula Sr2Fe2+(Fe2+,Mg)2Al4(PO4)4(OH)10 has been studied using a combination of electron microscopy with EDX and vibrational spectroscopic techniques. Chemical analysis shows a Sr, Fe, Al phosphate with minor amounts of Ga, Ba and Mg. Raman spectroscopy identifies an intense band at 990 cm�1 with an additional band at 1011 cm�1. These bands are attributed to the PO3� 4 m1 symmetric stretching mode. The m3 antisymmetric stretching modes are observed by a large number of Raman bands. The Raman bands at 1034, 1051, 1058, 1069 and 1084 together with the Raman bands at 1098, 1116, 1133, 1155 and 1174 cm�1 are assigned to the m3 antisymmetric stretching vibrations of PO3� 4 and the HOPO2� 3 units. The observation of these multiple Raman bands in the symmetric and antisymmetric stretching region gives credence to the concept that both phosphate and hydrogen phosphate units exist in the structure of lulzacite. The series of Raman bands at 567, 582, 601, 644, 661, 673 and 687 cm�1 are assigned to the PO3� 4 m2 bending modes. The series of Raman bands at 437, 468, 478, 491, 503 cm�1 are attributed to the PO3� 4 and HOPO2� 3 m4 bending modes. No Raman bands of lulzacite which could be attributed to the hydroxyl stretching unit were observed. Infrared bands at 3511 and 3359 cm�1 are ascribed to the OH stretching vibration of the OH units. Very broad bands at 3022 and 3299 cm�1 are attributed to the OH stretching vibrations of water. Vibrational spectroscopy offers insights into the molecular structure of the phosphate mineral lulzacite.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Of all the stories to emerge from Queensland’s catastrophic summer of 2011, the most dramatic and starkly tragic were those that took place in Toowoomba and the Lockyer Valley. On January 10, 2011, after weeks of heavy rain and as floodwaters began to overwhelm much of south-east Queensland, an ‘inland tsunami’ hit the city of Toowoomba, the rural districts of Spring Bluff and Postmans Ridge, and the towns of Murphys Creek, Withcott, Helidon, and Grantham. The Torrent:Toowoomba and the Lockyer Valley, 10 January 2011 tells, for the first time, the extraordinary stories of survival and loss that emerged from that terrible day. Official figures state that twenty-four people died. Many escaped death only because they were rescued by members of the community or through sheer good fortune. Based on exclusive interviews with survivors, rescuers and with the families and friends of victims of the disaster, The Torrent is a unique and powerful account of human courage in the face of the devastating force of nature, and the enduring resilience of ordinary Australians.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A total of 1,625 tornadoes occurred in the United States in 2011, resulting in economic losses that exceeded $25 billion. Two tornado outbreaks stand out because they caused more than half of those losses. The tornadoes that cut through Tuscaloosa, Alabama, on April 27 and Joplin, Missouri, on May 22 were responsible for a combined 223 fatalities and more than 13,000 damaged buildings in the two cities. Although the economic losses associated with tornado damage are well documented, the writers argue that the overall impact should encompass longer term, broader considerations such as the social disruption and psychological effects that impact communities. This paper examines observations by tornado damage assessment teams led by the first author in these two medium-sized cities and suggests that the evolution of building codes and past approaches to construction have led to conditions that made this extent of damage possible. The authors outline a multidisciplinary path forward that incorporates engineering research and social and economic studies into a new design paradigm leading to building code changes and social practices that will improve resistance and mitigate future losses at a community level from tornadoes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transposable elements, which are DNA sequences that can move between different sites in genomes, comprise approximately 40% of the genome of mammals and are emerging as important contributors to biological diversity. Here we report a transcription unit lying within intron 1 of the murine Magi1 (membrane associated guanylate kinase inverted 1) gene that codes for a cell-cell junction scaffolding protein. The transcription unit, termed Magi1OS (Magi1 Opposite Strand), originates from a region with tandem B1 short interspersed nuclear elements (SINEs) and is an antisense gene to Magi1. Mag1OS transcription initiates in a proximal B1 element that shows only 4% divergence from the consensus sequence, indicating that it has been recently inserted into the mouse genome and could be replication competent. Moreover, a chimaeric transcript may result from intra-chromosomal interaction and trans-splicing of the Magi1 antisense transcript (Magi1OS) and Ghrl, which codes for the multifunctional peptide hormone ghrelin. These two genes are 20 megabases apart on chromosome 6 and are transcribed in opposite directions. We propose that the Magi1OS locus may serve as a useful model system to study exaptation and retrotransposition of B1 SINEs, as well as to examine the mechanisms of intra-chromosomal trans-splicing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing efficiency are two parameters to be taken into account when designing a multicast stream protocol. In this paper, we propose to use two families of erasure codes to deal with this problem, namely, rateless codes and maximum distance separable codes. Our constructions will have the following advantages. First, our packet overhead will be small. Second, the number of signature verifications to be performed at the receiver is O(1). Third, every receiver will be able to recover all the original data packets emitted by the sender despite losses and injection occurred during the transmission of information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We identify the 10 major terrestrial and marine ecosystems in Australia most vulnerable to tipping points, in which modest environmental changes can cause disproportionately large changes in ecosystem properties. To accomplish this we independently surveyed the coauthors of this paper to produce a list of candidate ecosystems, and then refined this list during a 2-day workshop. The list includes (1) elevationally restricted mountain ecosystems, (2) tropical savannas, (3) coastal floodplains and wetlands, (4) coral reefs, (5) drier rainforests, (6) wetlands and floodplains in the Murray-Darling Basin, (7) the Mediterranean ecosystems of southwestern Australia, (8) offshore islands, (9) temperate eucalypt forests, and (10) salt marshes and mangroves. Some of these ecosystems are vulnerable to widespread phase-changes that could fundamentally alter ecosystem properties such as habitat structure, species composition, fire regimes, or carbon storage. Others appear susceptible to major changes across only part of their geographic range, whereas yet others are susceptible to a large-scale decline of key biotic components, such as small mammals or stream-dwelling amphibians. For each ecosystem we consider the intrinsic features and external drivers that render it susceptible to tipping points, and identify subtypes of the ecosystem that we deem to be especially vulnerable. © 2011 Elsevier Ltd.