436 resultados para Offenses against property
Resumo:
OBJECTIVE: To optimize the animal model of liver injury that can properly represent the pathological characteristics of dampness-heat jaundice syndrome of traditional Chinese medicine. METHODS: The liver injury in the model rat was induced by alpha-naphthylisothiocyanate (ANIT) and carbon tetrachloride (CCl(4) ) respectively, and the effects of Yinchenhao Decoction (, YCHD), a proved effective Chinese medical formula for treating the dampness-heat jaundice syndrome in clinic, on the two liver injury models were evaluated by analyzing the serum level of alanine aminotransferase (ALT), asparate aminotransferase (AST), alkaline phosphatase (ALP), malondialchehyche (MDA), total bilirubin (T-BIL), superoxide dismutase (SOD), glutathione peroxidase (GSH-PX) as well as the ratio of liver weight to body weight. The experimental data were analyzed by principal component analytical method of pattern recognition. RESULTS: The ratio of liver weight to body weight was significantly elevated in the ANIT and CCl(4) groups when compared with that in the normal control (P<0.01). The contents of ALT and T-BIL were significantly higher in the ANIT group than in the normal control (P<0.05,P<0.01), and the levels of AST, ALT and ALP were significantly elevated in CCl(4) group relative to those in the normal control P<0.01). In the YCHD group, the increase in AST, ALT and ALP levels was significantly reduced (P<0.05, P<0.01), but with no significant increase in serum T-BIL. In the CCl(4) intoxicated group, the MDA content was significantly increased and SOD, GSH-PX activities decreased significantly compared with those in the normal control group, respectively (P<0.01). The increase in MDA induced by CCl(4) was significantly reduced by YCHD P<0.05). CONCLUSION: YCHD showed significant effects on preventing liver injury progression induced by CCl(4), and the closest or most suitable animal model for damp-heat jaundice syndrome may be the one induced by CCl(4).
Resumo:
We report an efficient solar-light-driven photocatalyst based on three-dimensional nanoporous tungsten trioxide (WO3) films. These films are obtained by anodizing W foils in fluoride-containing electrolytes at room temperature and under low applied voltages with an efficient growth rate of 2 μm h− 1. The maximum thickness of the films is ~ 3 μm that exceeds those of previously reported anodized WO3 films in fluoride-containing electrolytes. By investigating the photocatalytic properties of the films with thicknesses ranging from ~ 0.5 to ~ 3 μm, the optimum thickness of the nanoporous film is found to be ~ 1 μm, which demonstrates an impressive 120% improvement in the photocatalytic performance compared to that of a RF-sputtered nanotextured film with similar weights. We mainly ascribe this to large surface area and smaller bandgap.
Resumo:
Bayesian networks (BNs) provide a statistical modelling framework which is ideally suited for modelling the many factors and components of complex problems such as healthcare-acquired infections. The methicillin-resistant Staphylococcus aureus (MRSA) organism is particularly troublesome since it is resistant to standard treatments for Staph infections. Overcrowding and understa�ng are believed to increase infection transmission rates and also to inhibit the effectiveness of disease control measures. Clearly the mechanisms behind MRSA transmission and containment are very complicated and control strategies may only be e�ective when used in combination. BNs are growing in popularity in general and in medical sciences in particular. A recent Current Content search of the number of published BN journal articles showed a fi�ve fold increase in general and a six fold increase in medical and veterinary science from 2000 to 2009. This chapter introduces the reader to Bayesian network (BN) modelling and an iterative modelling approach to build and test the BN created to investigate the possible role of high bed occupancy on transmission of MRSA while simultaneously taking into account other risk factors.
Resumo:
Objective To evaluate the effectiveness of the 7-valent pneumococcal conjugate vaccine (PCV7) in preventing pneumonia, diagnosed radiologically according to World Health Organization (WHO) criteria, among indigenous infants in the Northern Territory of Australia. Methods We conducted a historical cohort study of consecutive indigenous birth cohorts between 1 April 1998 and 28 February 2005. Children were followed up to 18 months of age. The PCV7 programme commenced on 1 June 2001. All chest X-rays taken within 3 days of any hospitalization were assessed. The primary endpoint was a first episode of WHO-defined pneumonia requiring hospitalization. Cox proportional hazards models were used to compare disease incidence. Findings There were 526 pneumonia events among 10 600 children - an incidence of 3.3 per 1000 child-months; 183 episodes (34.8%) occurred before 5 months of age and 247 (47.0%) by 7 months. Of the children studied, 27% had received 3 doses of vaccine by 7 months of age. Hazard ratios for endpoint pneumonia were 1.01 for 1 versus 0 doses; 1.03 for 2 versus 0 doses; and 0.84 for 3 versus 0 doses. Conclusion There was limited evidence that PCV7 reduced the incidence of radiologically confirmed pneumonia among Northern Territory indigenous infants, although there was a non-significant trend towards an effect after receipt of the third dose. These findings might be explained by lack of timely vaccination and/or occurrence of disease at an early age. Additionally, the relative contribution of vaccine-type pneumococcus to severe pneumonia in a setting where multiple other pathogens are prevalent may differ with respect to other settings where vaccine efficacy has been clearly established.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
Objective To compare the diagnostic accuracy of the interRAI Acute Care (AC) Cognitive Performance Scale (CPS2) and the Mini-Mental State Examination (MMSE), against independent clinical diagnosis for detecting dementia in older hospitalized patients. Design, Setting, and Participants The study was part of a prospective observational cohort study of patients aged ≥70 years admitted to four acute hospitals in Queensland, Australia, between 2008 and 2010. Recruitment was consecutive and patients expected to remain in hospital for ≥48 hours were eligible to participate. Data for 462 patients were available for this study. Measurements Trained research nurses completed comprehensive geriatric assessments and administered the interRAI AC and MMSE to patients. Two physicians independently reviewed patients’ medical records and assessments to establish the diagnosis of dementia. Indicators of diagnostic accuracy included sensitivity, specificity, predictive values, likelihood ratios and areas under receiver (AUC) operating characteristic curves. Results 85 patients (18.4%) were considered to have dementia according to independent clinical diagnosis. The sensitivity of the CPS2 [0.68 (95%CI: 0.58–0.77)] was not statistically different to the MMSE [0.75 (0.64–0.83)] in predicting physician diagnosed dementia. The AUCs for the 2 instruments were also not statistically different: CPS2 AUC = 0.83 (95%CI: 0.78–0.89) and MMSE AUC = 0.87 (95%CI: 0.83–0.91), while the CPS2 demonstrated higher specificity [0.92 95%CI: 0.89–0.95)] than the MMSE [0.82 (0.77–0.85)]. Agreement between the CPS2 and clinical diagnosis was substantial (87.4%; κ=0.61). Conclusion The CPS2 appears to be a reliable screening tool for assessing cognitive impairment in acutely unwell older hospitalized patients. These findings add to the growing body of evidence supporting the utility of the interRAI AC, within which the CPS2 is embedded. The interRAI AC offers the advantage of being able to accurately screen for both dementia and delirium without the need to use additional assessments, thus increasing assessment efficiency.
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
This book examines the principles and practice of real estate mortgages in an easily accessible text referenced to all the Australian States. It specifically deals with the major theoretical and practical aspects of the land mortgage, including vitiating factors in formation, mortgagees’ powers and duties and mortgagors’ rights – both statutory and other – as well as assignment, insurance and discharge. It focuses exclusively on real estate mortgages and provides a thorough account of the law through analysis of the plethora of court decisions and statutory provisions in this area. Duncan and Dixon analyse the substance of the mortgage transaction from creation through to rights of enforcement. In its detailed consideration of the rights and obligations of mortgagors and mortgagees, it covers topics such as priorities and tacking, insurance, variation and assignment, rights of discharge, entry into possession, foreclosure and power of sale. In addition, the book contains a separate chapter on factors that may affect the validity and enforcement of a mortgage, together with separate consideration of a mortgagee’s right to enforce a guarantee provided on behalf of a mortgagor, and the rights and liabilities associated with a receivership regime initiated by
Resumo:
This paper aims to evaluate the brand value of property in subdivision developments in the Bangkok Metropolitan Region (BMR), Thailand. The result has been determined by the application of a hedonic price model. The development of the model is developed based on a sample of 1,755 property sales during the period of 1992-2010 in eight zones of the BMR. The results indicate that the use of a semi-logarithmic model has stronger explanatory power and is more reliable. Property price increases 12.90% from the branding. Meanwhile, the price annually increases 2.96%; lot size and dwelling area have positive impacts on the price. In contrast, duplexes and townhouses have a negative impact on the price compared to single detached houses. Moreover, the price of properties which are located outside the Bangkok inner city area is reduced by 21.26% to 43.19%. These findings also contribute towards a new understanding of the positive impact of branding on the property price in the BMR. The result is useful for setting selling prices for branded and unbranded properties, and the model could provide a reference for setting property prices in subdivision developments in the BMR.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
The difficulties of re-imagining the possible relationships between crime and justice in capitalist societies, and imagining the possible meanings of democracy in societies characterised by gross inequalities of knowledge, and exclusion of the majority from political decisions are well known. One such difficulty stems from the impossible necessity of maintaining stances of both constant reform and constant critique (see Carlen, 2012). Confronted with economic and cultural inequalities which routinely deny ideals of justice and democracy, there can be a temptation to suppress (or bracket-off) troubling knowledge of criminal justice's and democracy's maligned underbellies and instead talk 'as if' criminal justice's ideal play of governance is always and already realised in its rhetoric. In some senses, this 'as if' talk is aspirational and it is difficult to see how it could be otherwise if more just conceptions of criminal justice and more democratic forms of democracy are to be conceived. However, when, as often happens, aspirational criminal justice concepts become routinised and acted upon as if they can be realised without fundamental social change, they become penal imaginaries, part of a taken-for-granted ideological baggage which, because it is taken-for-granted, obstructs critique (see Carlen, 2008). One such penal imaginary is the concept of rehabilitation, a concept which has a long history of justifying almost every kind of non-lethal response to lawbreaking and which is currently being reborn yet again in theories of criminal desistance and anti-prison campaigns as well as in the more invidious rehabilitation industry with its sales of programmes for cognitive reform.
Resumo:
This paper reports on a qualitative study of community health workers from a predominantly rural based region in Queensland. The purpose of this study was to determine the community health worker barriers to identification, assessment and intervention on the issue of violence against women. The qualitative research method comprised five structured focus group interviews with 28 community health workers using open-ended questions to explore their perceptions. Analysis of the focus group data revealed that community health workers expressed reluctance to become involved in cases of violence against women. The reasons they provided are grouped under three main themes: barriers to identification; barriers to assessment; and barriers to intervention. Training programs offered to rural community health workers need to be aware of the barriers to identifying, assessing and intervening in cases of violence against women that are highlighted by this study. Further studies are needed to assess the wider relevance of these findings to other groups of community health workers in rural and non-rural settings.