204 resultados para 149-901


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Application of 'advanced analysis' methods suitable for non-linear analysis and design of steel frame structures permits direct and accurate determination of ultimate system strengths, without resort to simplified elastic methods of analysis and semi-empirical specification equations. However, the application of advanced analysis methods has previously been restricted to steel frames comprising only compact sections that are not influenced by the effects of local buckling. A research project has been conducted with the aim of developing concentrated plasticity methods suitable for practical advanced analysis of steel frame structures comprising non-compact sections. A primary objective was to produce a comprehensive range of new distributed plasticity analytical benchmark solutions for verification of the concentrated plasticity methods. A distributed plasticity model was developed using shell finite elements to explicitly account for the effects of gradual yielding and spread of plasticity, initial geometric imperfections, residual stresses and local buckling deformations. The model was verified by comparison with large-scale steel frame test results and a variety of existing analytical benchmark solutions. This paper presents a description of the distributed plasticity model and details of the verification study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim There is a growing population of people with cancer who experience physiological and psychological effects that persist long after treatment is complete. Interventions that enhance survivors’ self-management abilities might help offset these effects. The aim of this pilot study was to develop, implement and evaluate interventions tailored to assist patients to manage post-treatment health issues effectively. Method In this pre-post intervention cohort study, participants were recruited on completion of cancer treatment. Participants recruited preimplementation, who received usual care, comprised the control group. Participants recruited later formed the intervention group. In the intervention group, the Cancer Care Coordinator developed an individualised, structured Cancer Survivor Self-management Care Plan. Participants were interviewed on completion of treatment (baseline) and at three months. Assessments concerned health needs (CaSUN), self-efficacy in adjusting and coping with cancer and health-related quality of life (FACIT-B or FACT-C). The impact of the intervention was determined by independent t-tests of change scores. Results The intervention (n = 32) and control groups (n = 35) were comparable on demographic and clinical characteristics. Sample mean age was 54 + 10 years. Cancer diagnoses were breast (82%) and colorectal (18%). Statistically significant differences (p < 0.05) indicated improvement in the intervention group for: (a) functional well-being, from the FACIT, (Control: M = −0.69, SE = 0.91; Intervention: M = 3.04, SE = 1.13); and (b) self-efficacy in maintaining social relationships, (Control: M = −0.333, SE = 0.33; Intervention: M = 0.621, SE = 0.27). No significant differences were found in health needs, other subscales of quality of life, the extent and number of strategies used in coping and adjusting to cancer and in other domains of self-efficacy. Conclusions While the results should be interpreted with caution, due to the non-randomised nature of the study and the small sample size, they indicate the potential benefits of tailored self-management interventions warrant further investigation in this context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we will describe the contemporary variety of practice-oriented training institutions in Australia. We will examine the different ways in which public and private providers are managing the challenges of digitization and convergence. We will consider the logics governing film education this mix of providers pulls into focus, and we will outline some of the challenges providers face in educating, (re)training, and preparing their graduates for life and work beyond the film school. These challenges highlight questions about the accountabilities and responsibilities of practice-oriented film education institutions. This chapter begins with an introductory section that outlines these logics and questions. It explores some of the tensions and dynamics within the spectrum of issues through which we can understand film schools. The chapter then goes on briefly to describe the multifaceted training landscape in Australia, before profiling the leading public provider, the Australian Film, Television and Radio School (AFTRS), as well as the other leading public providers the Victorian College of the Arts, and the Griffith Film School. It concludes with a short section on film education in primary and secondary schools as the education sector prepares for the implementation of a national curriculum in which ‘media arts’ has a new centrality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective To estimate the burden of diseases in Shandong province by the means of DALY (Disability- adjusted life year) thus to investigate the key public health problems referencing for health policy making. Methods DALYs were calculated following the procedures developed for the Global Burden of Disease (GBD) study to ensure comparability. We measured YLLs using the mortality data of 19 Disease Surveillance Points (DSPs) in Shandong Province during 2000 and 2005. YLDs were estimated based on data for WPRO in the 2002 GBD study published by WHO. Results During this period, the average DALYs loss by all causes for the residents of DSPs in Shandong was 149.74 per thousand persons each year. Noncommunicable diseases accounted for 76.63% of the disability adjusted life years, communicable diseases and other disorders represented 14.13%, and injuries 9.24%. Nearly half of the DALYs (45%) happened among the elderly (60+). Malignant neoplasm was the number one cause of DALYs loss in the male, followed by neuropsychiatric disorder, injury, cerebrovascular disease, heart disease,etc. However, neuropsychiatric disorder possessed the largest single contributor to DALY in the female and followed by heart disease, malignant neoplasm, cerebrovascular disease and respiratory disease. Conclusion Non-communicable diseases such as circulatory diseases, neuropsychiatric disorders and malignant neoplasms were the main causes of disease burden in Shandong province. The importance of neuropsychiatric disorders was more striking and should be recognized properly. The lack of morbidity data is the main limitation of this study. Abstract in Chinese 目的 应用伤残调整寿命年测量山东省居民疾病负担,提出该地区主要卫生问题,为卫生决策提供科学依据. 方法 以山东省2000-2005年19个疾病监测点的死因监测资料为基础,利用世界卫生组织(WHO)提供的方法计算不同疾病在不同性别年龄人群所造成的伤残调整寿命年(DALYs),其中,YIJDs根据WHO公布的亚太区2002年疾病负担数据进行估算. 结果 2000-2005年山东省疾病监测系统居民因为早死和残疾年平均损失149.74个DALYs/千人,其中,76.6%的DALYs损失因慢性非传染性疾病所致,14.1%由传染性疾病等引起,9.2%因为意外伤害造成;接近1/2(45%)的DALYs损失发生在60岁以上人群;恶性肿瘤为造成男性居民DALYs损失的首位原因,其次为精神行为疾患、意外伤害、脑血管病和心脏病等,女性居民则以精神行为疾患为DALYs首位原因,其次为心脏病、恶性肿瘤、脑血管病和呼吸系统疾病. 结论 以循环系统疾病、精神行为疾惠和恶性肿瘤为首的慢性非传染性疾病为造成山东省疾病负担DALYs损失的主要原因.对于精神行为疾患的重要性的认识有待于进一步提高,研究的主要局限性在于发病率资料的缺乏.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Neo-angiogenesis during neoplastic growth involves endothelial mitogenic and migration stimuli produced by cancer or tumour stromal cells. Although this active angiogenesis takes place in the tumour periphery, the process of vessel growth and survival in inner areas and its clinical role remain largely unexplored. The present study compared the microvessel score (MS) as well as the single endothelial cell score (ECS) in the invading edge and in inner areas of non-small cell lung carcinomas (NSCLCs). Three different patterns of vascular growth were distinguished: the edvin (edge vs. inner) type 1, where a low MS was observed in both peripheral and inner tumour areas; the edvin type 2, where a high MS was noted in the invading front but a low MS in inner areas; and the edvin type 3, where both peripheral and inner tumour areas had a high MS. The ECS was high in the invading edge in edvin type 2 and 3 cases and was sharply decreased in both types in inner areas, suggesting that endothelial cell migration is unlikely to contribute to the angiogenic process in areas away from the tumour front. Expression of the vascular endothelial growth factor (VEGF) and of thymidine phosphorylase (TP) was associated with a high MS in the invading edge. VEGF was associated with a high MS in inner areas (edvin 3), while TP expression was associated with edvin type 2, showing that VEGF (and not TP) contributes to the preservation of the inner vasculature. Both edvin type 2 and 3 cases showed an increased incidence of node metastasis, but edvin type 3 cases had a poorer prognosis, even in the N1-stage group. The present study suggests that tumour factors regulating angiogenesis and vascular survival are not identical. A possible method is reported to quantify these two parameters by comparing the MS in the invading edge and inner areas (edvin types). This observation may contribute to the evaluation of the effectiveness of different therapeutic approaches, namely vascular targeting vs. anti-angiogenesis. Copyright (C) 2000 John Wiley and Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective Analgesia and early quality of recovery may be improved by epidural analgesia. We aimed to assess the effect of receiving epidural analgesia on surgical adverse events and quality of life after laparotomy for endometrial cancer. Methods Patients were enrolled in an international, multicentre, prospective randomised trial of outcomes for laparoscopic versus open surgical treatment for the management of apparent stage I endometrial cancer (LACE trial). The current analysis focussed on patients who received an open abdominal hysterectomy via vertical midline incision only (n = 257), examining outcomes in patients who did (n = 108) and did not (n = 149) receive epidural analgesia. Results Baseline characteristics were comparable between patients with or without epidural analgesia. More patients without epidural (34%) ceased opioid analgesia 3–5 days after surgery compared to patients who had an epidural (7%; p < 0.01). Postoperative complications (any grade) occurred in 86% of patients with and in 66% of patients without an epidural (p < 0.01) but there was no difference in serious adverse events (p = 0.19). Epidural analgesia was associated with increased length of stay (up to 48 days compared to up to 34 days in the non-epidural group). There was no difference in postoperative quality of life up to six months after surgery. Conclusions Epidural analgesia was associated with an increase in any, but not serious, postoperative complications and length of stay after abdominal hysterectomy. Randomised controlled trials are needed to examine the effect of epidural analgesia on surgical adverse events, especially as the present data do not support a quality of life benefit with epidural analgesia. Keywords Endometrial cancer; Hysterectomy; Epidural; Adverse events

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Democracy is a multi-dimensional concept, ranging from definitions based exclusively on institutional frameworks (for example, Held, 2005, Przeworski, Alvarez, Cheibub and Limongi, 2000) to complex and integrated measures that include political and civil rights, democratic practices, values and, finally, a diverse set of institutional arrangements in society, including welfare, education, industrial relations and the legal system (Inglehart and Welzel, 2005, Jaggers and Gurr, 1995, O'Donnell, Cullel and Iazetta, 2004). This reflects the range of and distinction between merely formal electoral democracy and genuinely 'effective liberal democracy' (Inglehart and Welzel, 2005: 149), where democracy is firmly embedded not only in its institutions but in the values of its citizenry. Evidence from cross-national research confirms that formal democratic institutions, different dimensions of effective democracy, and democratic values are indeed strongly linked (Inglehart and Welzel, 2005: 154, Jaggers and Gurr, 1995: 446). Democracy is more than just a set of institutions, rules and mechanisms: it is a set of core values engrained in the 'lived experience' of its citizens. Core values of democracies are individual autonomy and egalitarianism, tolerance of diversity, and freedom from oppression for both individuals and institutions. Democracies restrain their governments by the rule of law and grant its citizens equal access to and equal treatment by legal institutions. Among these institutions, criminal justice and the treatment of those who violated rules and regulations represent sensitive seismographs for the quality of effective democracies, and the ways how democracies realise their core values.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

INFORMAS (International Network for Food and Obesity/non-communicable diseases Research, Monitoring and Action Support) aims to monitor and benchmark the healthiness of food environments globally. In order to assess the impact of food environments on population diets, it is necessary to monitor population diet quality between countries and over time. This paper reviews existing data sources suitable for monitoring population diet quality, and assesses their strengths and limitations. A step-wise framework is then proposed for monitoring population diet quality. Food balance sheets (FBaS), household budget and expenditure surveys (HBES) and food intake surveys are all suitable methods for assessing population diet quality. In the proposed ‘minimal’ approach, national trends of food and energy availability can be explored using FBaS. In the ‘expanded’ and ‘optimal’ approaches, the dietary share of ultra-processed products is measured as an indicator of energy-dense, nutrient-poor diets using HBES and food intake surveys, respectively. In addition, it is proposed that pre-defined diet quality indices are used to score diets, and some of those have been designed for application within all three monitoring approaches. However, in order to enhance the value of global efforts to monitor diet quality, data collection methods and diet quality indicators need further development work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated the influences of business prosperity on small business owners’ wellbeing with gender as a moderator. A sample of 687 Australian small business owners from the Household, Income and Labour Dynamics in Australia Survey (HILDA) from 2008 to 2010 was utilised. Findings suggest that procedural utility contributed to small business owners’ wellbeing over economic utility. Procedural utility was significantly related to small business owners’ wellbeing for males and females. However, economic utility contributed only to male small business owners’ wellbeing. In order to increase the understanding of these findings it is suggested that more theoretical work regarding gender differences in procedural and economic utility should be carried out.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Efficient transformation of barley cv. Schooner was achieved using Agrobacterium delivery, hygromycin or bialaphos selection and embryogenic callus. Using this system, transgenic plants were generated that contained either the green fluorescent protein gene, or transgenes derived from barley yellow dwarf (BYDV) and cereal yellow dwarf (CYDV) viruses. Many of these plants contained 1-3 transgene copies that were inherited in a simple Mendelian manner. Some plants containing BYDV and/or CYDV derived transgenes showed reduced virus symptoms and rates of viral replication when challenged with the appropriate virus. The ability to transform Schooner is a significant advance for the Australian barley industry, as this elite malting variety is, and has for the last 15 years been, the most widely grown barley variety in eastern Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Relationships between LGBT people and police have been turbulent for some time now, and have been variously characterized as supportive (McGhee, 2004) and antagonistic (Radford, Betts, & Ostermeyer, 2006). These relationships were, and continue to be, influenced by a range of political, legal, cultural, and social factors. This chapter will examine historical and social science accounts of LGBT-police histories to chart the historical peaks and troughs in these relationships. The discussion demonstrates how, in Western contexts, we oscillate between historical moments of police criminalizing homosexual perversity and contemporary landscapes of partnership between police and LGBT people. However, the chapter challenges the notion that it is possible to trace this as a lineal progression from a painful past to a more productive present. Rather, it focuses on specific moments, marked by pain or pleasure or both, and how these moments emerge and re-emerge in ways that shaped LGBT-police landscapes in potted, uneven ways. The chapter concludes noting how, although certain ideas and police practices may shift towards more progressive notions of partnership policing, we cannot just take away the history that emerged out of mistrust and pain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.