520 resultados para requirement for consent discontinuance


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Circular shortest paths represent a powerful methodology for image segmentation. The circularity condition ensures that the contour found by the algorithm is closed, a natural requirement for regular objects. Several implementations have been proposed in the past that either promise closure with high probability or ensure closure strictly, but with a mild computational efficiency handicap. Circularity can be viewed as a priori information that helps recover the correct object contour. Our "observation" is that circularity is only one among many possible constraints that can be imposed on shortest paths to guide them to a desirable solution. In this contribution, we illustrate this opportunity under a volume constraint but the concept is generally applicable. We also describe several adornments to the circular shortest path algorithm that proved useful in applications. © 2011 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The goal of this study was to describe researchers' experiences in submitting ethical proposals focused on older adult populations, including studies with persons with dementia, to ethical review boards. Ethical approval was granted for an online survey. Researchers were recruited via listservs and snowballing techniques. Participants included 157 persons (73% female) from Australia and the United States, with a mean age of 46 (±13). Six main issues were encountered by researchers who participated in this survey. In descending order, these included questions regarding: informed consent and information requirements (61.1%), participants' vulnerability, particularly for those with cognitive impairments (58.6%), participant burden (44.6%), data access (29.3%), adverse effects of data collection/intervention (26.8%), and study methodology (25.5%). An inductive content analysis of responses revealed a range of encounters with ethical review panels spanning positive, negative, and neutral experiences. Concerns voiced about ethical review boards included committees being overly focused on legal risk, as well as not always hearing the voice of older research participants, both potential and actual. Respondents noted inability to move forward on studies, as well as loss of researchers and participant groups from gerontological and clinical research as a result of negative interactions with ethics committees. Positive interactions with the committees reinforced researchers' need to carefully construct their research approaches with persons with dementia in particular. Suggested guidelines for committees when dealing with ethics applications involving older adults include self-reflecting on potential biases and stereotypes, and seeking further clarification and information from gerontological researchers before arriving at decisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to the availability of huge number of web services, finding an appropriate Web service according to the requirements of a service consumer is still a challenge. Moreover, sometimes a single web service is unable to fully satisfy the requirements of the service consumer. In such cases, combinations of multiple inter-related web services can be utilised. This paper proposes a method that first utilises a semantic kernel model to find related services and then models these related Web services as nodes of a graph. An all-pair shortest-path algorithm is applied to find the best compositions of Web services that are semantically related to the service consumer requirement. The recommendation of individual and composite Web services composition for a service request is finally made. Empirical evaluation confirms that the proposed method significantly improves the accuracy of service discovery in comparison to traditional keyword-based discovery methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a rigorous validation of the analyticalAmadei solution for the stress concentration around arbitrarily orientated borehole in general anisotropic elastic media. First, we revisit the theoretical framework of the Amadei solution and present analytical insights that show that the solution does indeed contain all special cases of symmetry, contrary to previous understanding, provided that the reduced strain coefficients β11 and β55 are not equal. It is shown from theoretical considerations and published experimental data that the β11 and β55 are not equal for realistic rocks. Second, we develop a 3D finite-element elastic model within a hybrid analyticalnumerical workflow that circumvents the need to rebuild and remesh the model for every borehole and material orientation. Third, we show that the borehole stresses computed from the numerical model and the analytical solution match almost perfectly for different borehole orientations (vertical, deviated and horizontal) and for several cases involving isotropic and transverse isotropic symmetries. It is concluded that the analytical Amadei solution is valid with no restrictions on the borehole orientation or elastic anisotropy symmetry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

- Gender dysphoria is a condition in which a child's subjectively felt identity and gender are not congruent with her or his biological sex. Because of this, the child suffers clinically significant distress or impairment in social functioning. - The Family Court of Australia has recently received an increasing number of applications seeking authorisation for the provision of hormones to treat gender dysphoria in children. - Some medical procedures and interventions performed on children are of such a grave nature that court authorisation must be obtained to render them lawful. These procedures are referred to as special medical procedures. - Hormonal therapy for the treatment of gender dysphoria in children is provided in two stages occurring years apart. Until recently, both stages of treatment were regarded by courts as special medical treatments, meaning court authorisation had to be provided for both stages. - In a significant recent development, courts have drawn a distinction between the two stages of treatment, permitting parents to consent to the first stage. In addition, it has been held that a child who is determined by a court to be Gillick competent can consent to stage 2 treatment. - The new legal developments concerning treatment for gender dysphoria are of ethical, clinical and practical importance to children and their families, and to medical practitioners treating children with gender dysphoria. Medical practitioners should benefit from an understanding of the recent developments in legal principles. This will ensure that they have up-to-date information about the circumstances under which treatment may be conducted with parental consent, and those in which they must seek court authorisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Post traumatic stress disorder (PTSD) is a serious medical condition effecting both military and civilian populations. While its etiology remains poorly understood it is characterized by high and prolonged levels of fear responding. One biological unknown is whether individuals expressing high or low conditioned fear memory encode the memory differently and if that difference underlies fear response. In this study we examined cellular mechanisms that underlie high and low conditioned fear behavior by using an advanced intercrossed mouse line (B6D2F1) selected for high and low Pavlovian fear response. A known requirement for consolidation of fear memory, phosphorylated mitogen activated protein kinase (p44/42 (ERK) MAPK (pMAPK)) in the lateral amygdala (LA) is a reliable marker of fear learning-related plasticity. In this study, we asked whether high and low conditioned fear behavior is associated with differential pMAPK expression in the LA and if so, is it due to an increase in neurons expressing pMAPK or increased pMAPK per neuron. To examine this, we quantified pMAPK-expressing neurons in the LA at baseline and following Pavlovian fear conditioning. Results indicate that high fear phenotype mice have more pMAPK-expressing neurons in the LA. This finding suggests that increased endogenous plasticity in the LA may be a component of higher conditioned fear responses and begins to explain at the cellular level how different fear responders encode fear memories. Understanding how high and low fear responders encode fear memory will help identify novel ways in which fear-related illness risk can be better predicted and treated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Blood metaphors abound in everyday social discourse among both Aboriginal and non-Aboriginal people. However, ‘Aboriginal blood talk’, more specifically, is located within a contradictory and contested space in terms of the meanings and values that can be attributed to it by Aboriginal and non-Aboriginal people. In the colonial context, blood talk operated as a tool of oppression for Aboriginal people via blood quantum discourses, yet today, Aboriginal people draw upon notions of blood, namely bloodlines, in articulating their identities. This paper juxtaposes contemporary Aboriginal blood talk as expressed by Aboriginal people against colonial blood talk and critically examines the ongoing political and intellectual governance regarding the validity of this talk in articulating Aboriginalities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Andreasen (2003) argues that there is a ‘starting change’ bias in the social marketing field as much research is centred on inducing initial behavioural change. However, repeat or maintenance behaviour is often critical to achieving social goals across many domains. For instance, the repeat use of professional therapeutic services is vital for improved mental health, although premature discontinuance of service use is common (Wang, 2007). This study contributes to addressing this gap in the social marketing literature by exploring key drivers of maintenance behaviour, in the form of repeat service use, in mental health. This is in line with Andreasen’s (1994) argument that social marketing is an appropriate approach to addressing mental health challenges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The requirement of isolated relays is one of the prime obstacles in utilizing sequential slotted cooperative protocols for Vehicular Ad-hoc Networks (VANET). Significant research advancement has taken place to improve the diversity multiplexing trade-off (DMT) of cooperative protocols in conventional mobile networks without much attention on vehicular ad-hoc networks. We have extended the concept of sequential slotted amplify and forward (SAF) protocols in the context of urban vehicular ad-hoc networks. Multiple Input Multiple Output (MIMO) reception is used at relaying vehicular nodes to isolate the relays effectively. The proposed approach adds a pragmatic value to the sequential slotted cooperative protocols while achieving attractive performance gains in urban VANETs. We have analysed the DMT bounds and the outage probabilities of the proposed scheme. The results suggest that the proposed scheme can achieve an optimal DMT similar to the DMT upper bound of the sequential SAF. Furthermore, the outage performance of the proposed scheme outperforms the SAF protocol by 2.5 dB at a target outage probability of 10-4.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge of the pollutant build-up process is a key requirement for developing stormwater pollution mitigation strategies. In this context, process variability is a concept which needs to be understood in-depth. Analysis of particulate build-up on three road surfaces in an urban catchment confirmed that particles <150µm and >150µm have characteristically different build-up patterns, and these patterns are consistent over different field conditions. Three theoretical build-up patterns were developed based on the size-fractionated particulate build-up patterns, and these patterns explain the variability in particle behavior and the variation in particle-bound pollutant load and composition over the antecedent dry period. Behavioral variability of particles <150µm was found to exert the most significant influence on the build-up process variability. As characterization of process variability is particularly important in stormwater quality modeling, it is recommended that the influence of behavioral variability of particles <150µm on pollutant build-up should be specifically addressed. This would eliminate model deficiencies in the replication of the build-up process and facilitate the accounting of the inherent process uncertainty, and thereby enhance the water quality predictions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we derive a new nonlinear two-sided space-fractional diffusion equation with variable coefficients from the fractional Fick’s law. A semi-implicit difference method (SIDM) for this equation is proposed. The stability and convergence of the SIDM are discussed. For the implementation, we develop a fast accurate iterative method for the SIDM by decomposing the dense coefficient matrix into a combination of Toeplitz-like matrices. This fast iterative method significantly reduces the storage requirement of O(n2)O(n2) and computational cost of O(n3)O(n3) down to n and O(nlogn)O(nlogn), where n is the number of grid points. The method retains the same accuracy as the underlying SIDM solved with Gaussian elimination. Finally, some numerical results are shown to verify the accuracy and efficiency of the new method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The requirement for dual screening of titles and abstracts to select papers to examine in full text can create a huge workload, not least when the topic is complex and a broad search strategy is required, resulting in a large number of results. An automated system to reduce this burden, while still assuring high accuracy, has the potential to provide huge efficiency savings within the review process. Objectives To undertake a direct comparison of manual screening with a semi‐automated process (priority screening) using a machine classifier. The research is being carried out as part of the current update of a population‐level public health review. Methods Authors have hand selected studies for the review update, in duplicate, using the standard Cochrane Handbook methodology. A retrospective analysis, simulating a quasi‐‘active learning’ process (whereby a classifier is repeatedly trained based on ‘manually’ labelled data) will be completed, using different starting parameters. Tests will be carried out to see how far different training sets, and the size of the training set, affect the classification performance; i.e. what percentage of papers would need to be manually screened to locate 100% of those papers included as a result of the traditional manual method. Results From a search retrieval set of 9555 papers, authors excluded 9494 papers at title/abstract and 52 at full text, leaving 9 papers for inclusion in the review update. The ability of the machine classifier to reduce the percentage of papers that need to be manually screened to identify all the included studies, under different training conditions, will be reported. Conclusions The findings of this study will be presented along with an estimate of any efficiency gains for the author team if the screening process can be semi‐automated using text mining methodology, along with a discussion of the implications for text mining in screening papers within complex health reviews.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lipopolysaccharide is a major immunogenic structure for the pathogen Yersinia pseudotuberculosis, which contains the O-specific polysaccharide (OPS) that is presented on the cell surface. The OPS contains many repeats of the oligosaccharide O-unit and exhibits a preferred modal chain length that has been shown to be crucial for cell protection in Yersinia. It is well established that the Wzz protein determines the preferred chain length of the OPS, and in its absence, the polymerization of O units by the Wzy polymerase is uncontrolled. However, for Y. pseudotuberculosis, a wzz mutation has never been described. In this study, we examine the effect of Wzz loss in Y. pseudotuberculosis serotype O:2a and compare the lipopolysaccharide chain-length profile to that of Escherichia coli serotype O111. In the absence of Wzz, the lipopolysaccharides of the two species showed significant differences in Wzy polymerization. Yersinia pseudotuberculosis O:2a exhibited only OPS with very short chain lengths, which is atypical of wzz-mutant phenotypes that have been observed for other species. We hypothesise that the Wzy polymerase of Y. pseudotuberculosis O:2a has a unique default activity in the absence of the Wzz, revealing the requirement of Wzz to drive O-unit polymerization to greater lengths.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An increasing number of Australian children are accessing specialist health services for gender dysphoria treatment, largely because of a growing awareness among doctors about available specialist health services. But the law is not in step with the needs of these children...