517 resultados para Two-soliton resonances
Resumo:
Background Pharmacist prescribing has been introduced in several countries and is a possible future role for pharmacy in Australia. Objective To assess whether patient satisfaction with the pharmacist as a prescriber, and patient experiences in two settings of collaborative doctor-pharmacist prescribing may be barriers to implementation of pharmacist prescribing. Design Surveys containing closed questions, and Likert scale responses, were completed in both settings to investigate patient satisfaction after each consultation. A further survey investigating attitudes towards pharmacist prescribing, after multiple consultations, was completed in the sexual health clinic. Setting and Participants A surgical pre-admission clinic (PAC) in a tertiary hospital and an outpatient sexual health clinic at a university hospital. Two hundred patients scheduled for elective surgery, and 17 patients diagnosed with HIV infection, respectively, recruited to the pharmacist prescribing arm of two collaborative doctor-pharmacist prescribing studies. Results Consultation satisfaction response rates in PAC and the sexual health clinic were 182/200 (91%) and 29/34 (85%), respectively. In the sexual health clinic, the attitudes towards pharmacist prescribing survey response rate were 14/17 (82%). Consultation satisfaction was high in both studies, most patients (98% and 97%, respectively) agreed they were satisfied with the consultation. In the sexual health clinic, all patients (14/14) agreed that they trusted the pharmacist’s ability to prescribe, care was as good as usual care, and they would recommend seeing a pharmacist prescriber to friends. Discussion and Conclusion Most of the patients had a high satisfaction with pharmacist prescriber consultations, and a positive outlook on the collaborative model of care in the sexual health clinic.
Resumo:
Effective fuel injector operation and efficient combustion are two of the most critical aspects when Diesel engine performance, efficiency and reliability are considered. Indeed, it is widely acknowledged that fuel injection equipment faults lead to increased fuel consumption, reduced power, greater levels of exhaust emissions and even unexpected engine failure. Previous investigations have identified fuel injector related acoustic emission activity as being caused by mechanisms such as fuel line pressure build-up; fuel flow through injector nozzles, injector needle opening and closing impacts and premixed combustion related pulses. Few of these investigations however, have attempted to categorise the close association and interrelation that exists between fuel injection equipment function and the acoustic emission generating mechanisms. Consequently, a significant amount of ambiguity remains in the interpretation and categorisation of injector related AE activity with respect to the functional characteristics of specific fuel injection equipment. The investigation presented addresses this ambiguity by detailing a study in which AE signals were recorded and analysed from two different Diesel engines employing the two commonly encountered yet fundamentally different types of fuel injection equipment. Results from tests in which faults were induced into fuel injector nozzles from both indirect-injection and direct-injection engines show that functional differences between the main types of fuel injection equipment results in acoustic emission activity which can be specifically related to the type of fuel injection equipment used.
Resumo:
Bushfire Responsive Architecture proposals (2) detailed in a 144 page document containing orginal architectural designs and site surveys by Dr Ian Weir. Presented in support of Dr Weir's sucessful planning application for the perminant artwork/land art project "Lightsite Perminant" situated on Point Henry, Western Australia.
Resumo:
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.
Resumo:
Deliberate firesetting costs our community in destruction to property and lives. Public concern heightens when similar fires occur in a series, raising the specter of copycat firesetting. Difficulties associated with researching copycat crimes in general mean that not a lot is known about copycat firesetting. As an initial step toward filling this research gap, we explore connections between research on copycat crime and research into deliberate firesetting. The intention is to extract salient features from what is known about the phenomena of deliberate firesetting and copycat crime, map them together, and point out shared and unique characteristics. It is argued that a “copycat firesetter” is likely to exist as a distinct subgroup and potentially requiring targeted interventions.
Resumo:
A one size fits all approach dominates alcohol programs in school settings (Botvin et al., 2007), which may limit program effectiveness (Snyder et al., 2004). Programs tailored to the meet the needs and wants of adolescent groups may be more effective. Limited attention has been directed towards employing a full segmentation process. Where segmentation has been examined, the focus has remained on socio-demographic characteristics and more recently psychographic variables (Mathijssen et al., 2012). The current study aimed to identify whether the addition of behaviour could be used to identify segments. Variables included attitudes towards binge drinking (α = 0.86), behavioral intentions’ (α = 0.97), perceived behavioral control (PBC), injunctive norms (α = 0.94); descriptive norms (α = 0.87), knowledge and reported behaviour. Data was collected from five schools, n = 625 (32.96% girls). Two-Step cluster analysis produced a sample (n = 625) with a silhouette measure of cohesion and separation of 0.4. The intention measure and whether students reported previously consuming alcohol were the most distinguishing characteristics - predictor importance scores of (1.0). A four segment solution emerged. The first segment (“Male abstainers” – 37.2%) featured the highest knowledge score (M: 5.9) along with the lowest-risk drinking attitudes and intentions to drink excessively. Segment 2 (“At risk drinkers” - 11.2%) were characterised by their high-risk attitudes and high-risk drinking intentions. Injunctive (M: 4.1) and descriptive norms (M: 4.9) may indicate a social environment where drinking is the norm. Segment 3 (”Female abstainers” – 25.9%) represents young girls, who have the lowest-risk attitudes and low intentions to drink excessively. The fourth and final segment (boys = 67.4%) (“Moderate drinkers” – 25.7%) all report previously drinking alcohol yet their attitudes and intentions towards excessive alcohol consumption are lower than other segments. Segmentation focuses on identifying groups of individuals who feature similar characteristics. The current study illustrates the importance of including reported behaviour in addition to psychographic and demographic characteristics to identify unique groups to inform intervention planning and design. Key messages The principle of segmentation has received limited attention in the context of school-based alcohol education programs. This research identified four segments amongst 14-16 year high school students, each of which can be targeted with a unique, tailored program to meet the needs and wants of the target audience.
Resumo:
It is becoming increasingly popular to consider species interactions when managing ecological foodwebs. Such an approach is useful in determining how management can affect multiple species, with either beneficial or detrimental consequences. Identifying such actions is particularly valuable in the context of conservation decision making as funding is severely limited. This paper outlines a new approach that simplifies the resource allocation problem in a two species system for a range of species interactions: independent, mutualism, predator-prey, and competitive exclusion. We assume that both species are endangered and we do not account for decisions over time. We find that optimal funding allocation is to the conservation of the species with the highest marginal gain in expected probability of survival and that, across all except mutualist interaction types, optimal conservation funding allocation differs between species. Loss in efficiency from ignoring species interactions was most severe in predator-prey systems. The funding problem we address, where an ecosystem includes multiple threatened species, will only become more commonplace as increasing numbers of species worldwide become threatened. © 2011 Elsevier B.V.