98 resultados para Republican Party (U.S. : 1854-)
Resumo:
Purpose – This paper adds to growing research of psychiatric intensive care units (PICU) by recounting descriptions of psychiatric intensive care settings and discusses the perceptions held by nurses of the organisational interfaces, arrangements and provisions of care in these settings. Design/methodology/approach – Data gathered from focus groups held with nurses from two PICUs was used to establish terminology, defining attributes, related concepts, antecedents, values, processes and concepts related to current practices. A literature search was conducted to permit a review of the conceptual arrangements and contemporary understanding of intensive care for people experiencing acute psychiatric illness based on the perspectives held by the nurses from the focus groups. Findings – Dissonance between service needs and the needs and management of individual patients overshadow strategies to implement comprehensive recovery-oriented approaches. Three factors are reported in this paper that influence standards and procedural practice in PICU; organisational structures; physical structures; and subtype nomenclature. Practical implications – Acute inpatient care is an important part of a comprehensive approach to mental health services. Commonly intensive acute care is delivered in specialised wards or units co-located with acute mental health inpatient units mostly known as PICU. Evidence of the most effective treatment and approaches in intensive care settings that support comprehensive recovery for improved outcomes is nascent. Originality/value – Current descriptions from nurses substantiate wide variations in the provisions, design and classifications of psychiatric intensive care. Idiosyncratic and localised conceptions of psychiatric intensive care are not adequately entailing effective treatment and methods in support of recovery principles for improved and comprehensive outcomes. The authors suggest that more concrete descriptions, guidelines, training and policies for provision of intensive psychiatric health care encompassing the perspective of nursing professionals, would reinforce conceptual construction and thus optimum treatments within a comprehensive, recovery-oriented approach to mental health services.
Resumo:
This paper projects the gender wage gap for 25–64 year old Americans for the period 2000–40. The analysis uses data from the Panel Survey of Income Dynamics (PSID) for 1995 and 1996 together with the U.S. Census Bureau demographic projections. The method combines the population projections with assumptions regarding the evolution of educational attainment in order to first project the future distribution of skills and, based on these projections, the future size of the gender wage gap. The main set of projections suggests that changing skill characteristics—specifically educational attainment—will continue to close the gender wage gap. However, even in 2040, a substantial pay gap of at least 75 percent of the size of that in 1995 will remain.
Resumo:
This article considers recent cases on guarantees of business loans to identify the lending practices that led the court to set aside the guarantee as against the creditor on the basis that the creditor had engaged in unconscionable conduct. It also explores the role of industry codes of practice in preventing unconscionable conduct, including whether there is a correlation between commitment to an industry code and higher standards of lending practices; whether compliance with an industry code would have produced different outcomes in the cases considered; and whether lenders need to do more than comply with an industry code to ensure their practices are fair and reasonable.
Resumo:
This thesis examines the stewardship and investment style monitoring by managers and boards of U.S. equity funds. Results indicate that complying with a fund’s declared style, especially in value-growth dimension, remains a challenge for fund managers and boards, and that style-based investors should be aware of the risk of style drift since fund managers and boards do not always monitor the fund’s investment style as stated in the prospectus. Results also show that the quality of fund stewardship, as reflected by fund board quality, corporate culture, manager compensation, regulatory history, and fees are effective in ensuring that fund managers and boards perform their fiduciary obligation by increasing monitoring of the fund investment style.
Resumo:
The Valley Mountain 15’ quadrangle straddles the Pinto Mountain Fault, which bounds the eastern Transverse Ranges in the south against the Mojave Desert province in the north. The Pinto Mountains, part of the eastern Transverse Ranges in the south part of the quadrangle expose a series of Paleoproterozoic gneisses and granite and the Proterozoic quartzite of Pinto Mountain. Early Triassic quartz monzonite intruded the gneisses and was ductiley deformed prior to voluminous Jurassic intrusion of diorite, granodiorite, quartz monzonite, and granite plutons. The Jurassic rocks include part of the Bullion Mountains Intrusive Suite, which crops out prominently at Valley Mountain and in the Bullion Mountains, as well as in the Pinto Mountains. Jurassic plutons in the southwest part of the quadrangle are deeply denuded from midcrustal emplacement levels in contrast to supracrustal Jurassic limestone and volcanic rocks exposed in the northeast. Dikes inferred to be part of the Jurassic Independence Dike Swarm intrude the Jurassic plutons and Proterozoic rocks. Late Cretaceous intrusion of the Cadiz Valley Batholith in the northeast caused contact metamorphism of adjacent Jurassic plutonic rocks...
Resumo:
Poor complaint management may result in organizations losing customers and revenue. Consumers exhibit negative emotional responses when dissatisfied and this may lead to a complaint to a third-party organization. Since little information is available on the role of emotion in the consumer complaint process or how to manage complaints effectively, we offer an emotions perspective by applying Affective Events Theory (AET) to complaint behavior. This study presents the first application of AET in a consumption context and advances a theoretical framework supported by qualitative research for emotional responses to complaints. In contrast to commonly held views on gender and emotion, men as well as women use emotion-focused coping to complain.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
It is increasingly apparent that sea-level data (e.g. microfossil transfer functions, dated coral microatolls and direct observations from satellite and tidal gauges) vary temporally and spatially at regional to local scales, thus limiting our ability to model future sea-level rise for many regions. Understanding sealevel response at ‘far-field’ locations at regional scales is fundamental for formulating more relevant sea-level rise susceptibility models within these regions under future global change projections. Fossil corals and reefs in particular are valuable tools for reconstructing past sea levels and possible environmental phase shifts beyond the temporal constraints of instrumental records. This study used abundant surface geochronological data based on in situ subfossil corals and precise elevation surveys to determine previous sea level in Moreton Bay, eastern Australia, a far-field site. A total of 64 U-Th dates show that relative sea level was at least 1.1 m above modern lowest astronomical tide (LAT) from at least ˜6600 cal. yr BP. Furthermore, a rapid synchronous demise in coral reef growth occurred in Moreton Bay ˜5800 cal. yr BP, coinciding with reported reef hiatus periods in other areas around the Indo-Pacific region. Evaluating past reef growth patterns and phases allows for a better interpretation of anthropogenic forcing versus natural environmental/climatic cycles that effect reef formation and demise at all scales and may allow better prediction of reef response to future global change.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.
Resumo:
Opposition to men’s violence against women who are their intimate partners has become politically popular in the United States. The Violence Against Women Act (VAWA) has enjoyed broad-based support for over 15 years. VAWA has been refined and expanded with each reauthorization. Resistance to the battered women’s movement is often overlooked in this political context. However, woman abuse and state responses to it are mired in cultural tensions about crime, law, gender, economics, scholarship, and the family. Based on interviews with 35 advocates in the United States, this paper outlines key tactics of antifeminist backlash against the battered women’s movement.
Resumo:
In ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2006] QCA 540 the Queensland Court of Appeal dismissed an appeal from the decision of Mullins J at first instance in ASIC v Atlantic 3 Financial (Aust) Pty LTd [2006] QSC 152, the majority concluding that the client agreement in issue was not inconsistent with s48 of the Queensland Law Society Act 1952.
Resumo:
Parametric ship roll resonance is a phenomenon where a ship can rapidly develop high roll motion while sailing in longitudinal waves. This effect can be described mathematically by periodic changes of the parameters of the equations of motion, which lead to a bifurcation. In this paper, the control design of an active u-tank stabilizer is carried out using Lyapunov theory. A nonlinear backstepping controller is developed to provide global exponential stability of roll. An extension of commonly used u-tank models is presented to account for large roll angles, and the control design is tested via simulation on a high-fidelity model of a vessel under parametric roll resonance.
Resumo:
In Kimtran Pty Ltd v Downie [2003] QDC 043 the court allowed in part an appeal from the refusal by the Queensland Building Tribunal to order the respondent liquidators pay the appellants' costs of proceedings in the Tribunal. The decision involved an examination of authorities which have considered the circumstances in which it is in the interests of justice to make an order for costs against a non-party.
Resumo:
The decision in Hook v Boreham & QBE Insurance (Australia) Limited [2006] QDC 304 considered whether the court should go further than order that costs be assessed on the indemnity basis, but should also specify the basis by which those indemnity costs should be determined. The decision makes it clear that under r704(3) of the Uniform Civil Procedure Rules, questions of that nature are ordinarily preserved to the discretion of the Registrar.