896 resultados para Accepted Applicants
Resumo:
Background: Postoperative nausea and vomiting is one of the most common adverse reactions to surgery and all types of anaesthesia and despite the wide variety of available antiemetic and anti-nausea treatments, 20-30% of all patients still suffer moderate to severe nausea and vomiting following general anaesthesia. While aromatherapy is well-known and is used personally by nurses, it is less well utilised in the healthcare setting. If aromatherapy is to become an accepted adjunct treatment for postoperative nausea and vomiting, it is imperative that there is both an evidence base to support the use of aromatherapy, and a nursing workforce prepared to utilise it. Methods: This involved a Cochrane Systematic Review, a Delphi process to modify an existing tool to assess beliefs about aromatherapy to make it more relevant to nursing and midwifery practice, and a survey to test the modified tool in a population of nurses and midwives. Findings: The systematic review found that aromatherapy with isopropyl alcohol was more effective than placebo for reducing the number of doses of rescue antiemetics required but not more effective than standard antiemetic drugs. The Delphi panel process showed that the original Beliefs About Aromatherapy Scale was not completely relevant to nursing and midwifery practice. The modified Nurses' Beliefs About Aromatherapy Scale was found to be valid and reliable to measure nurses' and midwives' beliefs about aromatherapy. Factor analysis supported the construct validity of the scale by finding two sub-scales measuring beliefs about the 'usefulness of aromatherapy' and the 'scientific basis of aromatherapy'. Survey respondents were found to have generally positive beliefs about aromatherapy, with more strongly positive beliefs on the 'usefulness of aromatherapy' sub-scale. Conclusions: From the evidence of the systematic review, the use of isopropyl alcohol vapour inhalation as an adjunct therapy for postoperative nausea and vomiting is unlikely to be harmful and may reduce nausea for some adult patients. It may provide a useful therapeutic option, particularly when the alternative is no treatment at all. Given the moderately positive beliefs expressed by nurses and midwives particularly about the usefulness of aromatherapy there is potential for this therapy to be implemented and used to improve patient care.
Resumo:
We study a political economy model which aims to understand the diversity in the growth and technology-adoption experiences in different economies. In this model the cost of technology adoption is endogenous and varies across heterogeneous agents. Agents in the model vote on the proportion of revenues allocated towards such expenditures. In the early stages of development, the political-economy outcome of the model ensures that a sub-optimal proportion of government revenue is used to finance adoption-cost reducing expenditures. This sub-optimality is due to the presence of inequality; agents at the lower end of the distribution favor a larger amount of revenue allocated towards redistribution in the form of lump-sum transfers. Eventually all individuals make the switch to the better technology and their incomes converge. The outcomes of the model therefore explain why public choice is more likely to be conservative in nature; it represents the majority choice given conflicting preferences among agents. Consequently, the transition path towards growth and technology adoption varies across countries depending on initial levels of inequality.
Resumo:
Video presented as part of ACIS 2009 conference in Melbourne Australia. This movie is a demonstration of the use of 3D Virtual Environments to visualise 3D BPMN Process Models, and in particular, to highlight any issues with the process model that are spatial in nature. This work is part of a paper accepted for the Asia-Pacific Conference on Conceptual Modelling (APCCM 2010) to be held in Brisbane - http://2010.apccm.org/
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
Axial acoustic wave propagation has been widely used in evaluating the mechanical properties of human bone in vivo. However, application of this technique to monitor soft tissues, such as tendon, has received comparatively little scientific attention. Laboratory-based research has established that axial acoustic wave transmission is not only related to the physical properties of equine tendon but is also proportional to tensile load to which it is exposed (Miles et al., 1996; Pourcelot et al., 2005). The reproducibility of the technique for in vivo measurements in human tendon, however, has not been established. The aim of this study was to evaluate the limits of agreement for repeated measures of the speed of sound (SoS) in human Achilles tendon in vivo. Methods: A custom built ultrasound device, consisting of an A-mode 1MHz emitter and two regularly spaced receivers, was used to measure the SoS in the mid-portion of the Achilles tendon in ten healthy males and ten females (mean age: 33.8 years, range 23-56 yrs; height: 1.73±0.08 m; weight: 68.4±15.3 kg). The emitter and receivers were held at fixed positions by a polyethylene frame and maintained in close contact with the skin overlying the tendon by means of elasticated straps. Repeated SoS measurements were taken with the subject prone (non-weightbearing and relaxed Achilles tendon) and during quiet bipedal and unipedal stance. In each instance, the device was detached and repositioned prior to measurement. Results: Limits of agreement for repeated SoS measures during non-weightbearing and bipedal and unipedal stance were ±53, ±28 and ±21 m/s, respectively. The average SoS in the non-weightbearing Achilles tendon was 1804±198 m/s. There was a significant increase in the average SoS during bilateral (2122±135 m/s) (P < 0.05) and unilateral (2221±79 m/s) stance (P < 0.05). Conclusions: Repeated SoS measures in human Achilles tendon were more reliable during stance than under non-weightbearing conditions. These findings are consistent with previous research in equine tendon in which lower variability in SoS was observed with increasing tensile load (Crevier-Denoix et al, 2009). Since the limits of agreement for Achilles tendon SoS are nearly 5% of the changes previously observed during walking and therapeutic heel raise exercises, acoustic wave transmission provides a promising new non-invasive method for determining tendon properties during sports and rehabilitation related activities.
Resumo:
This research evaluated the effect of obesity on the acute cumulative transverse strain of the Achilles tendon in response to exercise. Twenty healthy adult males were categorized into ‘low normal-weight’ (BMI <23 kg m−2) and ‘overweight’ (BMI >27.5 kg m−2) groups based on intermediate cut-off points recommended by the World Health Organization. Longitudinal sonograms of the right Achilles tendon were acquired immediately prior and following weight-bearing ankle exercises. Achilles tendon thickness was measured 20-mm proximal to the calcaneal insertion and transverse tendon strain was calculated as the natural log of the ratio of post- to pre-exercise tendon thickness. The Achilles tendon was thicker in the overweight group both prior to (t18 = −2.91, P = 0.009) and following (t18 = −4.87, P < 0.001) exercise. The acute transverse strain response of the Achilles tendon in the overweight group (−10.7 ± 2.5%), however, was almost half that of the ‘low normal-weight’ (−19.5 ± 7.4%) group (t18 = −3.56, P = 0.004). These findings suggest that obesity is associated with structural changes in tendon that impairs intra-tendinous fluid movement in response to load and provides new insights into the link between tendon pathology and overweight and obesity.
Resumo:
Aim: The movement from a medical model of disability to a more social model implies an imperative to include the views of people with ID in research regarding their care. Contemporary quality processes in improving care require consumer involvement at many levels and in doing so have shown better outcomes. A New Zealand research study is being undertaken utilizing focus groups with people with ID to understand their experiences during a psychiatric inpatient admission. The primary focus of this presentation will concern the literature review, undertaken as part of the study, of research in which people with ID have participated. Method: The literature review was conducted using a variety of electronic databases and search terms to identify studies with people with ID as active participants. Results: Only a few studies have been undertaken with people with ID as participants. While these studies demonstrate numerous benefits in including the voice of the person with ID this still remains absent from much of the research discourse. Conclusion: It is accepted and indeed advocated that people with ID have the same rights as others in regard to choosing whether or not they wish to participate in research. High response rates in the few identified studies indicated that people with ID are eager to be consulted. It is recommended that the unique needs of people with ID be taken into account in the research evidence base for future services.
Resumo:
“Informed learning” is a pedagogy that focuses on learning subject content through engaging with academic or professional information practices. Adopting the position that more powerful learning is achieved where students are taught how to use information and subject content simultaneously, the research reported here investigated an informed learning lesson. Using phenomenographic methods, student’s experiences of the lesson were compared to what the teacher enacted in the classroom. Based on an analysis of student interviews using variation theory, three ways of experiencing the informed learning lesson emerged. Some students understood the lesson to be about learning to use information, i.e., researching and writing an academic paper, while others understood it as focusing on understanding both subject content and information use simultaneously. Although the results of this study are highly contextualized, the findings suggest criteria to consider when designing informed learning lessons.
Resumo:
Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.
Resumo:
The purpose of this article is to examine the role of the alignment between technological innovation effectiveness and operational effectiveness after the implementation of enterprise information systems, and the impact of this alignment on the improvement in operational performance. Confirmatory factor analysis was used to examine structural relationships between the set of observed variables and the set of continuous latent variables. The findings from this research suggest that the dimensions stemming from technological innovation effectiveness such as system quality, information quality, service quality, user satisfaction and the performance objectives stemming from operational effectiveness such as cost, quality, reliability, flexibility and speed are important and significantly well-correlated factors. These factors promote the alignment between technological innovation effectiveness and operational effectiveness and should be the focus for managers in achieving effective implementation of technological innovations. In addition, there is a significant and direct influence of this alignment on the improvement of operational performance. The principal limitation of this study is that the findings are based on investigation of small sample size.
Resumo:
This research develops a new framework to be used as a tool for analysing and designing walkable communities. The literature review recognises the work of other researchers combining their findings with the theory of activity nodes and considers how a framework may be used on a more global basis. The methodology develops a set of criteria through the analysis of noted successful case studies and this is then tested against an area with very low walking rates in Brisbane, Australia. Results of the study suggest that as well as the accepted criteria of connectivity, accessibility, safety, security, and path quality further criteria in the form or planning hierarchy, activity nodes and climate mitigation could be added to allow the framework to cover a broader context. Of particular note is the development of the nodal approach, which allows simple and effective analysis of existing conditions, and may also prove effective as a tool for planning and design of walkable communities.
Resumo:
Curriculum developers and researchers have promoted context-based programmes to arrest waning student interest and participation in the enabling sciences at high school and university. Context-based programmes aim for student connections between scientific discourse and real-world contexts to elevate curricular relevance without diminishing conceptual understanding. This interpretive study explored the learning transactions in one 11th grade context-based chemistry classroom where the context was the local creek. The dialectic of agency/structure was used as a lens to examine how the practices in classroom interactions afforded students the agency for learning. The results suggest that first, fluid transitions were evident in the student–student interactions involving successful students; and second, fluid transitions linking concepts to context were evident in the students’ successful reports. The study reveals that the structures of writing and collaborating in groups enabled students’ agential and fluent movement between the field of the real-world creek and the field of the formal chemistry classroom. Furthermore, characteristics of academically successful students in context-based chemistry are highlighted. Research, teaching, and future directions for context-based science teaching are discussed.
Resumo:
This paper has presented the details of an investigation into the flexural and flexuraltorsional buckling behaviour of cold-formed structural steel columns with pinned and fixed ends. Current design rules for the member capacities of cold-formed steel columns are based on the same non-dimensional strength curve for both fixed and pinned-ended columns. This research has reviewed the accuracy of the current design rules in AS/NZS 4600 and the North American Specification in determining the member capacities of cold-formed steel columns using the results from detailed finite element analyses and an experimental study of lipped channel columns. It was found that the current Australian and American design rules accurately predicted the member capacities of pin ended lipped channel columns undergoing flexural and flexural torsional buckling. However, for fixed ended columns with warping fixity undergoing flexural-torsional buckling, it was found that the current design rules significantly underestimated the column capacities as they disregard the beneficial effect of warping fixity. This paper has therefore proposed improved design rules and verified their accuracy using finite element analysis and test results of cold-formed lipped channel columns made of three cross-sections and five different steel grades and thicknesses.
Resumo:
We show that SiGe islands are transformed into nanoholes and rings by annealing treatments only and without Si capping. Rings are produced by a rapid flash heating at temperatures higher than the melting point of Ge, whereas nanoholes are produced by several minute annealing. The rings are markedly rich in Si with respect to the pristine islands, suggesting that the evolution path from islands to rings is driven by the selective dissolution of Ge occurring at high temperature.
Resumo:
It has been known since Rhodes Fairbridge’s first attempt to establish a global pattern of Holocene sea-level change by combining evidence from Western Australia and from sites in the northern hemisphere that the details of sea-level history since the Last Glacial Maximum vary considerably across the globe. The Australian region is relatively stable tectonically and is situated in the ‘far-field’ of former ice sheets. It therefore preserves important records of post-glacial sea levels that are less complicated by neotectonics or glacio-isostatic adjustments. Accordingly, the relative sea-level record of this region is dominantly one of glacio-eustatic (ice equivalent) sea-level changes. The broader Australasian region has provided critical information on the nature of post-glacial sea level, including the termination of the Last Glacial Maximum when sea level was approximately 125 m lower than present around 21,000–19,000 years BP, and insights into meltwater pulse 1A between 14,600 and 14,300 cal. yr BP. Although most parts of the Australian continent reveals a high degree of tectonic stability, research conducted since the 1970s has shown that the timing and elevation of a Holocene highstand varies systematically around its margin. This is attributed primarily to variations in the timing of the response of the ocean basins and shallow continental shelves to the increased ocean volumes following ice-melt, including a process known as ocean siphoning (i.e. glacio-hydro-isostatic adjustment processes). Several seminal studies in the early 1980s produced important data sets from the Australasian region that have provided a solid foundation for more recent palaeo-sea-level research. This review revisits these key studies emphasising their continuing influence on Quaternary research and incorporates relatively recent investigations to interpret the nature of post-glacial sea-level change around Australia. These include a synthesis of research from the Northern Territory, Queensland, New South Wales, South Australia and Western Australia. A focus of these more recent studies has been the re-examination of: (1) the accuracy and reliability of different proxy sea-level indicators; (2) the rate and nature of post-glacial sea-level rise; (3) the evidence for timing, elevation, and duration of mid-Holocene highstands; and, (4) the notion of mid- to late Holocene sea-level oscillations, and their basis. Based on this synthesis of previous research, it is clear that estimates of past sea-surface elevation are a function of eustatic factors as well as morphodynamics of individual sites, the wide variety of proxy sea-level indicators used, their wide geographical range, and their indicative meaning. Some progress has been made in understanding the variability of the accuracy of proxy indicators in relation to their contemporary sea level, the inter-comparison of the variety of dating techniques used and the nuances of calibration of radiocarbon ages to sidereal years. These issues need to be thoroughly understood before proxy sea-level indicators can be incorporated into credible reconstructions of relative sea-level change at individual locations. Many of the issues, which challenged sea-level researchers in the latter part of the twentieth century, remain contentious today. Divergent opinions remain about: (1) exactly when sea level attained present levels following the most recent post-glacial marine transgression (PMT); (2) the elevation that sea-level reached during the Holocene sea-level highstand; (3) whether sea-level fell smoothly from a metre or more above its present level following the PMT; (4) whether sea level remained at these highstand levels for a considerable period before falling to its present position; or (5) whether it underwent a series of moderate oscillations during the Holocene highstand.