324 resultados para Panic attacks
Resumo:
Migraines are particularly common in young adults, with the prevalence reducing after the late 40s and early 50s years of age.1,2 Migraines are headaches that can have a throbbing or pulsating feeling, and often occur with nausea, vomiting, and sensitivity to light and sound. These headaches can last between a few hours to three days.1,3 They place a significant burden of disease on quality of life, and have a socio-economic impact through loss of productiveness and sick days.4 Most people report experiencing at least one migraine attack each month, with many reporting that migraine attacks interfered with their daily activities.2 Migraines have been ranked as the third most prevalent and seventh highest specific cause of disability around the world...
Resumo:
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between satellite phones and satellites. The keystream generator may be considered as a finite state machine, with an internal state of 81 bits. The design is based on four linear feedback shift registers, three of which are irregularly clocked. The keystream generator takes a 64-bit secret key and 19-bit frame number as inputs, and produces an output keystream of length between $2^8$ and $2^{10}$ bits. Analysis of the initialisation process for the keystream generator reveals serious flaws which significantly reduce the number of distinct keystreams that the generator can produce. Multiple (key, frame number) pairs produce the same keystream, and the relationship between the various pairs is easy to determine. Additionally, many of the keystream sequences produced are phase shifted versions of each other, for very small phase shifts. These features increase the effectiveness of generic time-memory tradeoff attacks on the cipher, making such attacks feasible.
Resumo:
Ten Percent Terror brings together leading creatives from the fields of contemporary theatre, contemporary dance, music theatre, circus and digital arts in the first collaboration of its kind. Commissioned by Brisbane Powerhouse, with support from the Anzac Centenary Arts and Culture Fund and in partnership with Dancenorth and Company 2, this is an inter-disciplinary work that combines theatrical narrative with eloquent physicality, through circus and dance, to express certain truths of the soldiers' experience. This production will be a circus-narrative that uses the form and language of circus to express the key themes of risk, panic and brotherhood. Ten Percent Terror is intended to be a work of scale, yet also intimacy: of stillness and panic, inertia and chaos. Project partners, Dancenorth and Company 2, share the vision to use contemporary artistic disciplines to connect younger and modern audiences to the ANZAC legacy, perhaps offering a connection for those audiences that they may not find through more traditional art forms. The development process has included a community research project in Townsville, conducted by Shane Pike, which explored contemporary Australians’ stories through interviews with serving military personnel and the local community, as well as collecting photographic documentation and other artefacts from around Townsville. This was followed by an archival research project in Brisbane, where Pike reviewed letters, photographs and personal accounts of soldiers from WW1. The results of these projects will be used by the creative team to inform the development of Ten Percent Terror. Given Townsville’s reputation as Australia’s ‘garrison’ city, the project partners plan to deliver the world premiere performance of Ten Percent Terror in Townsville in late 2015. It is intended that Ten Percent Terror will receive its Brisbane premiere in November 2015 at Brisbane Powerhouse, as part of a four-performance season. This expert panel included discussion of the project and its place in analysing key aspects of Australia's wartime history.
Resumo:
Migraine is a complex neurological disorder with a well-documented genetic basis. Migraine is a product of allelic variation in genes of neurological, vascular and hormonal origin interacting with environmental triggers. Presentation can include attacks of head pain with symptoms of nausea, emesis, photophobia, phonophobia, and occasionally, visual sensory disturbances, known as aura. Migraine pain is difficult to ignore, associated with a deep sense of malaise and manifests as a throbbing, pulsatile headache, localized to one side of the head that intensifies with physical activity and that can last from 4-72 hours. Migraine is diagnosed according to criteria developed by the International Headache Society (IHS) and is subdivided into two main types based on the occurrence of aura symptoms that may be present in the early stages of the headache: migraine with aura (MA) and migraine without aura (MO). The majority (about 70%) of migraineurs are diagnosed with the MO subtype whilst the remaining 30% experience MA accompanied by neurological symptoms that manifest as fully reversible, visual, sensory and/or dysphasic speech disturbances in conjunction with their headache. Glutamate is the primary excitatory neurotransmitter in the central nervous system (CNS) and over-excitation of glutamate receptors is regarded as a contributing factor, through various mechanisms, to the pathology of migraine. In this chapter we present an overview of the pathophysiology and co-morbidity of migraine with other psychiatric disorders and discuss the role of the glutamatergic system in migraine, its molecular components as potential drug targets, in addition to the current treatments and progress of modulators of glutamatergic signaling.
Resumo:
Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.
Resumo:
House loss during unplanned bushfires is a complex phenomenon where design, configuration, material and siting, can significantly influence the loss. In collaboration with the Bushfire Cooperative Research Centre the CSIRO has developed a tool to assess the vulnerability of a specific house at the urban interface. The tool is based on a spatial profiling of urban assets including their design, material, surrounding objects and their relationship amongst one another. The analysis incorporates both probabilistic and deterministic parameters, and is based on the impact of radiant heat, flame and embers on the surrounding elements and the structure itself. It provides a breakdown of the attributes and design parameters that contribute to the vulnerability level. This paper describes the tool which allows the user to explore the vulnerability of a house to varying levels of bushfire attacks. The tool is aimed at government agencies interested in building design, town planning and community education for bushfire risk mitigation.
Resumo:
An amorphous silicon carbonitride (Si1-x-yCxN y, x = 0:43, y = 0:31) coating was deposited on polyimide substrate using the magnetron-sputtering method. Exposure tests of the coated polyimide in atomic oxygen beam and vacuum ultraviolet radiation were performed in a ground-based simulator. Erosion kinetics measurements indicated that the erosion yield of the Si0.26C0.43N0.31 coating was about 1.5x and 1.8 × 10-26 cm3 /atom during exposure in single atomic oxygen beam, simultaneous atomic oxygen beam, and vacuum ultraviolet radiation, respectively. These values were 2 orders of magnitude lower than that of bare polyimide substrate. Scanning electron and atomic force microscopy, X-ray photoelectron spectrometer, and Fourier transformed infrared spectroscopy investigation indicated that during exposures, an oxide-rich layer composed of SiO2 and minor Si-C-O formed on the surface of the Si 0.26C0.43N0.31 coating, which was the main reason for the excellent resistance to the attacks of atomic oxygen. Moreover, vacuum ultraviolet radiation could promote the breakage of chemical bonds with low binding energy, such as C-N, C = N, and C-C, and enhance atomic oxygen erosion rate slightly.
Resumo:
Lana Nowakowski's opinion piece on the High Court decision in the Zaburoni HIV case attacks "Queensland's absurd necessity to prove intention on transmission" and argues that "changes to the law are long overdue". Both claims are wrong...
Resumo:
Bees are well known for being industrious pollinators. Some species, however, have taken to invading the nests of other colonies to steal food, nest material or the nest site itself. Despite the potential mortality costs due to fighting with an aggressive opponent, the prospects of a large bounty can be worth the risk. In this review, we aim to bring together current knowledge on intercolony fighting with a view to better understand the evolution of warfare in bees and identify avenues for future research. A review of literature reveals that at least 60 species of stingless bees are involved in heterospecific conflicts, either as attacking or victim colonies. The threat of invasion has led to the evolution of architectural, behavioural and morphological adaptations, such as narrow entrance tunnels, mud balls to block the entrance, decoy nests that direct invaders away from the brood chamber, fighting swarms, and soldiers that are skilled at immobilising attackers. Little is known about how victim colonies are selected, but a phylogenetically controlled analysis suggests that the notorious robber bee Lestrimelitta preferentially attacks colonies of species with more concentrated honey. Warfare among bees poses many interesting questions, including why species differ so greatly in their response to attacks and how these alternative strategies of obtaining food or new nest sites have evolved.