342 resultados para WEAK
Resumo:
Background High-risk foot complications such as neuropathy, ischaemia, deformity, infections, ulcers and amputations consume considerable health care resources and typically result from chronic diseases. This study aimed to develop and test the validity and reliability of a Queensland High Risk Foot Form (QHRFF) tool. Methods Phase one involved developing a QHRFF using an existing diabetes high-risk foot tool, literature search, expert panel and several state-wide stakeholder groups. Phase two tested the criterion-related validity along with inter- and intra-rater reliability of the final QHRFF. Three cohorts of patients (n = 94) and four clinicians, representing different levels of expertise, were recruited. Validity was determined by calculating sensitivity, specificity and positive predictive values (PPV). Kappa and intra-class correlation (ICC) statistics were used to establish reliability. Results A QHRFF tool containing 46-items across seven domains was developed and endorsed. The majority of QHRFF items achieved moderate-to-perfect validity (PPV = 0.71 – 1) and reliability (Kappa/ICC = 0.41 – 1). Items with weak validity and/or reliability included those identifying health professionals previously attending the patient, other (non-listed) co-morbidity, previous foot ulcer, foot deformity, optimum offloading and optimum footwear. Conclusions The QHRFF had moderate-to-perfect validity and reliability across the majority of items, particularly identifying individual co-morbidities and foot complications. Items with weak validity or reliability need to be re-defined or removed. Overall, the QHRFF appears to be a valid and reliable tool to assess, collect and measure clinical data pertaining to high-risk foot complications for clinical or research purposes.
Resumo:
‘Sustainability’ provides the dominant frame within which environmental policy debate occurs, notwithstanding its divergent meanings. However, how different discourses combine to shape understanding of the environment, the causes of environmental issues, and the responses required, is less clear cut. Drawing primarily on the approach to critical discourse analysis (CDA) developed by Fairclough, this paper explores the way in which neoliberal and ecologically modern discourses combine to shape environmental policy. Environmental scholars have made relatively little use of this approach to CDA to date, despite the significant interest in the discursive aspects of environmental issues, and its wide use in other areas of policy interest. Using the case of environmental policy-making in Victoria, Australia, this paper illustrates how neoliberalism and weak ecological modernization represented sustainability in ways that seriously limited the importance of environmental issues.
Resumo:
Purpose Most barriers and enablers of sustainable projects are related to procurement. This study proposes a framework for evaluating green procurement practices throughout the lifecycle of road construction projects and demonstrates its application through an Australian case study. Design/methodology/approach The study is based on linking the phases of road construction with incentive mechanisms for proactively motivating behavioural change. A holistic view on utilised and potential incentives is attempted with a literature review and a state-of-practice review. The latter is based on interviews and 90 policy and procurement documents across five Australian states. Findings An evaluation framework with seven procurement stages is suggested to describe current state green procurement incentives throughout the delivery lifecycle of road construction projects. The Australian case study was found to provide useful data to identify gaps and strong points of the different states regarding their level of integration of sustainability and greenhouse gas emissions GHG) reduction elements in their procurement practices. This understanding was used to draw recommendations on future advancement of green procurement. Originality/value: Government entities across the globe can impact considerably the achievement of sustainability and GHG targets, by using their procurement practices and requirements to create incentives for contractors and suppliers to engage in more GHG conscious practices. The present study provides a systematic account of how green procurement practices can be underpinned using the Australian road construction industry as a case study, and distinguish between strong and weak links in the green procurement chain to draw recommendations for future initiatives.
Resumo:
Exploring advanced materials for efficient capture and separation of CO2 is important for CO2 reduction and fuel purification. In this study, we have carried out first-principles density functional theory calculations to investigate CO2, N2, CH4, and H2 adsorption on the amphoteric regioselective B80 fullerene. Based on our calculations, we find that CO2 molecules form strong interactions with the basic sites of the B80 by Lewis acid–base interactions, while there are only weak bindings between the other three gases (N2, CH4, and H2) and the B80 adsorbent. The study also provides insight into the reaction mechanism of capture and separation of CO2 using the electron deficient B80 fullerene.
Resumo:
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initialisation process. The recommendations given are based on both the results in the literature and the work in this thesis.
Resumo:
The international aid and development community has supported programs that aim to build the capacity of media professionals or contribute to an enabling environment throughout the past 20 years. However, two decades on from the first modern media assistance programs, the sector is still struggling to identify, measure and understand the changes effected by their programs. There are questions raised as to whether it is even feasible to identify impacts on society and governance. This paper draws on some preliminary findings from a comparative thematic analysis of 47 evaluation documents of media assistance programs. The aim of this analysis is to identify trends in impact evaluation practice in the media assistance field, as well as the strengths and weaknesses of different evaluation approaches. This paper presents four types of social change claims commonly presented in reports; hypothetical changes, introduction of new opportunities, concrete examples of immediate impacts, and analysis of ongoing social and political changes. Although these types may appear as a spectrum from weak to strong, the interactions are perhaps more accurately understood using metaphors such as building blocks. This paper explores these types in more detail and suggests that a robust set of impacts-types could be useful in developing more grounded theories of change and indicators.
Resumo:
This paper emphasizes material nonlinear effects on composite beams with recourse to the plastic hinge method. Numerous combinations of steel and concrete sections form arbitrary composite sections. Secondly, the material properties of composite beams vary remarkably across its section from ductile steel to brittle concrete. Thirdly, concrete is weak in tension, so composite section changes are dependent on load distribution. To this end, the plastic zone approach is convenient for inelastic analysis of composite sections that can evaluate member resistance, including material nonlinearities, by routine numerical integration with respect to every fiber across the composite section. As a result, many researchers usually adopt the plastic zone approach for numerical inelastic analyses of composite structures. On the other hand, the plastic hinge method describes nonlinear material behaviour of an overall composite section integrally. Consequently, proper section properties for use in plastic hinge spring stiffness are required to represent the material behaviour across the arbitrary whole composite section. In view of numerical efficiency and convergence, the plastic hinge method is superior to the plastic zone method. Therefore, based on the plastic hinge approach, how to incorporate the material nonlinearities of the arbitrary composite section into the plastic hinge stiffness formulation becomes a prime objective of the present paper. The partial shear connection in this paper is by virtue of the effective flexural rigidity as AISC 1993 [American Institute of Steel Construction (AISC). Load and resistance factor design specifications. 2nd ed., Chicago; 1993]. Nonlinear behaviour of different kinds of composite beam is investigated in this paper, including two simply supported composite beams, a cantilever and a two span continuous composite beam.
Resumo:
Personal identity and intimacy levels change over time and this can influence the way consumers buy and use goods and services. This thesis examined how levels of personal identity and intimacy influence the use of social media by consumers of different ages. A survey of 208 users of facebook demonstrated that consumers with weak levels of personal identity use social media to increase their identity and popularity, while consumers with strong levels of personal identity use social media for self-expression. Consumers with high intimacy levels use social media for socian connection and social investigation.
Resumo:
Ideals of productivist agriculture in the Western world have faded as the unintended consequences of intensive agriculture and pastoralism have contributed to rural decline and environmental problems. In Norway and Australia, there has been an increasing acceptance of the equal importance of social and environmental sustainability as well as economic sustainability. Alongside this shift is a belief that primary production needs to move away from an intensive, productivist-based agriculture to one that may be defined as post-productivist. In this paper, we argue that the dualism of productivism and post-productivism as concepts on agricultural policy regimes are too simplistic and discuss whether multifunctional agriculture is a better concept for a comparison of rural primary production at two extreme points of the scale, the market-oriented, liberalistic Australian agriculture and the market-protected small-scale Norwegian agriculture. We argue that multifunctionality in Australia rates relatively weakly as an ideology or policy and even less as a discourse or practice and hence is situated toward a ‘weak’ end of a continuum of a level of multifunctional agriculture. In Norwegian agriculture, multifunctional agriculture has thrived within a protectionist setting with the support of the public, the state and agricultural actors. In this sense it is very clearly a policy, practice and discourse that aims to preserve and conserve rural spaces, the cultural landscape, the farming way of life and food safety. Norway is as such situated toward a ‘strong’ end of a continuum of a level of multifunctional agriculture.
Resumo:
Arid systems are markedly different from non-arid systems. This distinctiveness extends to arid-social networks, by which we mean social networks which are influenced by the suite of factors driving arid and semi-arid regions. Neither the process of how aridity interacts with social structure, nor what happens as a result of this interaction, is adequately understood. This paper postulates three relative characteristics which make arid-social networks distinct: that they are tightly bound, are hierarchical in structure and, hence, prone to power abuses, and contain a relatively higher proportion of weak links, making them reactive to crisis. These ideas were modified from workshop discussions during 2006. Although they are neither tested nor presented as strong beliefs, they are based on the anecdotal observations of arid-system scientists with many years of experience. This paper does not test the ideas, but rather examines them in the context of five arid-social network case studies with the aim of hypotheses building. Our cases are networks related to pastoralism, Aboriginal outstations, the ‘Far West Coast Aboriginal Enterprise Network’ and natural resources in both the Lake-Eyre basin and the Murray–Darling catchment. Our cases highlight that (1) social networks do not have clear boundaries, and that how participants perceive their network boundaries may differ from what network data imply, (2) although network structures are important determinants of system behaviour, the role of participants as individuals is still pivotal, (3) and while in certain arid cases weak links are engaged in crisis, the exact structure of all weak links in terms of how they place participants in relation to other communities is what matters.
Resumo:
We appreciate Holmes' body of work relating to transitions within the Australian landscape, and welcome the opportunity to engage in a discussion on this topic. The paper to which Holmes refers (Bjørkhaug and Richards, 2008) examined the application of agricultural (rather than landscape) multifunctionality in both Norway and Australia. Of specific focus was how non-tradeable concerns, such as environmental sustainability, faired under these divergent systems. We argued that Norway's multifunctionality was strong, due to it being embraced at both the policy and actor level, whereas Australia's could be described as weak. This ‘weak multifunctionality’ that we observed in Australia was due to an emerging bi-lateral (state and federal) policy framework that advocated the importance of environmental values which was rarely embraced by landholders who found themselves trapped on the ‘agricultural treadmill’. The nature of the treadmill is that alternative forms of land use are unthinkable when on-farm investments have been made that support the status quo – to get bigger and/or more efficient. For many of the Australian landholders interviewed in relation to this study, efficiency in production was at odds with the values necessary to effect a transition toward multifunctionality. For instance, graziers in Central Queensland were unconvinced of the value of conserving native flora and fauna when economic viability can be better assured through clear felling native forests to increase the productive capacity of the land.
Resumo:
Whole-body cryotherapy (WBC) involves short exposures to air temperatures below –100°C. WBC is increasingly accessible to athletes, and is purported to enhance recovery after exercise and facilitate rehabilitation postinjury. Our objective was to review the efficacy and effectiveness of WBC using empirical evidence from controlled trials. We found ten relevant reports; the majority were based on small numbers of active athletes aged less than 35 years. Although WBC produces a large temperature gradient for tissue cooling, the relatively poor thermal conductivity of air prevents significant subcutaneous and core body cooling. There is weak evidence from controlled studies that WBC enhances antioxidant capacity and parasympathetic reactivation, and alters inflammatory pathways relevant to sports recovery. A series of small randomized studies found WBC offers improvements in subjective recovery and muscle soreness following metabolic or mechanical overload, but little benefit towards functional recovery. There is evidence from one study only that WBC may assist rehabilitation for adhesive capsulitis of the shoulder. There were no adverse events associated with WBC; however, studies did not seem to undertake active surveillance of predefined adverse events. Until further research is available, athletes should remain cognizant that less expensive modes of cryotherapy, such as local ice-pack application or cold-water immersion, offer comparable physiological and clinical effects to WBC.
Resumo:
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.
Resumo:
To minimise the number of load sheddings in a microgrid (MG) during autonomous operation, islanded neighbour MGs can be interconnected if they are on a self-healing network and an extra generation capacity is available in the distributed energy resources (DER) of one of the MGs. In this way, the total load in the system of interconnected MGs can be shared by all the DERs within those MGs. However, for this purpose, carefully designed self-healing and supply restoration control algorithm, protection systems and communication infrastructure are required at the network and MG levels. In this study, first, a hierarchical control structure is discussed for interconnecting the neighbour autonomous MGs where the introduced primary control level is the main focus of this study. Through the developed primary control level, this study demonstrates how the parallel DERs in the system of multiple interconnected autonomous MGs can properly share the load of the system. This controller is designed such that the converter-interfaced DERs operate in a voltage-controlled mode following a decentralised power sharing algorithm based on droop control. DER converters are controlled based on a per-phase technique instead of a conventional direct-quadratic transformation technique. In addition, linear quadratic regulator-based state feedback controllers, which are more stable than conventional proportional integrator controllers, are utilised to prevent instability and weak dynamic performances of the DERs when autonomous MGs are interconnected. The efficacy of the primary control level of the DERs in the system of multiple interconnected autonomous MGs is validated through the PSCAD/EMTDC simulations considering detailed dynamic models of DERs and converters.
Resumo:
RC4(n, m) is a stream cipher based on RC4 and is designed by G. Gong et al. It can be seen as a generalization of the famous RC4 stream cipher designed by Ron Rivest. The authors of RC4(n, m) claim that the cipher resists all the attacks that are successful against the original RC4. The paper reveals cryptographic weaknesses of the RC4(n, m) stream cipher. We develop two attacks. The first one is based on non-randomness of internal state and allows to distinguish it from a truly random cipher by an algorithm that has access to 24·n bits of the keystream. The second attack exploits low diffusion of bits in the KSA and PRGA algorithms and recovers all bytes of the secret key. This attack works only if the initial value of the cipher can be manipulated. Apart from the secret key, the cipher uses two other inputs, namely, initial value and initial vector. Although these inputs are fixed in the cipher specification, some applications may allow the inputs to be under the attacker control. Assuming that the attacker can control the initial value, we show a distinguisher for the cipher and a secret key recovery attack that for the L-bit secret key, is able to recover it with about (L/n) · 2n steps. The attack has been implemented on a standard PC and can reconstruct the secret key of RC(8, 32) in less than a second.