246 resultados para One session

em Queensland University of Technology - ePrints Archive


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Data analysis sessions are a common feature of discourse analytic communities, often involving participants with varying levels of expertise to those with significant expertise. Learning how to do data analysis and working with transcripts, however, are often new experiences for doctoral candidates within the social sciences. While many guides to doctoral education focus on procedures associated with data analysis (Heath, Hindmarsh, & Luff, 2010; McHoul & Rapley, 2001; Silverman, 2011; Wetherall, Taylor, & Yates, 2001), the in situ practices of doing data analysis are relatively undocumented. This chapter has been collaboratively written by members of a special interest research group, the Transcript Analysis Group (TAG), who meet regularly to examine transcripts representing audio- and video-recorded interactional data. Here, we investigate our own actual interactional practices and participation in this group where each member is both analyst and participant. We particularly focus on the pedagogic practices enacted in the group through investigating how members engage in the scholarly practice of data analysis. A key feature of talk within the data sessions is that members work collaboratively to identify and discuss ‘noticings’ from the audio-recorded and transcribed talk being examined, produce candidate analytic observations based on these discussions, and evaluate these observations. Our investigation of how talk constructs social practices in these sessions shows that participants move fluidly between actions that demonstrate pedagogic practices and expertise. Within any one session, members can display their expertise as analysts and, at the same time, display that they have gained an understanding that they did not have before. We take an ethnomethodological position that asks, ‘what’s going on here?’ in the data analysis session. By observing the in situ practices in fine-grained detail, we show how members participate in the data analysis sessions and make sense of a transcript.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Brief interventions are effective for problem drinking and reductions are known to occur in association with screening and assessment. The present study sought to assess, among participants (N=202) in a clinical trial, how much change occurred between baseline assessment and a one-session brief intervention (S1), and the predictors of early change. The primary focus was on changes in the Beck Depression Inventory Fast Screen scores and alcohol consumption (standard drinks per week) prior to random allocation to nine further sessions addressing either depression, alcohol, or both problems. There were large and clinically significant reductions between baseline and S1, with the strongest predictors being baseline scores in the relevant domain and change in the other domain. Client engagement was also predictive of early depression changes. Monitoring progress in both domains from first contact, and provision of empathic care, followed by brief intervention appear to be useful for this high prevalence comorbidity.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Brief interventions are effective for problem drinking and reductions are known to occur in association with screening and assessment. Design and methods: This study aimed to determine how much change occurred between baseline assessment and a one-session brief intervention (S1), and the predictors of early change among adults with comorbid depression and alcohol misuse (n=202) participating in a clinical trial. The primary focus was on changes in Beck Depression Inventory fastscreen scores and alcohol consumption (standard drinks per week) prior to random allocation to nine further sessions addressing either depression, alcohol, or both problems. Results: There were large and clinically significant reductions between baseline and S1, with the strongest predictors being baseline scores in the relevant domain and change in the other domain. Client engagement was also predictive of early depression changes. Discussion and Conclusion: Monitoring progress in both domains from first contact, and provision of empathic care, followed by brief intervention appear to be useful for this high prevalence comorbidity...

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Purpose Most studies that use either a single exercise session, exercise training, or a cross-sectional design have failed to find a relationship between exercise and plasma lipoprotein(a) [Lp(a)] concentrations. However, a few studies investigating the effects of longer and/or more strenuous exercise have shown elevated Lp(a) concentrations, possibly as an acute-phase reactant to muscle damage. Based on the assumption that greater muscle damage would occur with exercise of longer duration, the purpose of the present study was to determine whether exercise of longer duration would increase Lp(a) concentration and creatine kinase. (CK) activity more than exercise of shorter duration. Methods Ten endurance-trained men (mean +/- SD: age, 27 +/- 6 yr; maximal oxygen consumption [(V)over dotO(2max)], 57 +/- 7 mL(.)kg(-1) min(-1)) completed two separate exercise sessions at 70% (V)over dotO(2max). One session required 900 kcal of energy expenditure (60 +/- 6 min), and the other required 1500 kcal (112 +/- 12 min). Fasted blood samples were taken immediately before (0-pre), immediately after (0-post), 1 d after (1-post), and 2 d after (2-post) each exercise session. Results CK activity increased after both exercise sessions (mean +/- SE; 800 kcal: 0-pre 55 +/- 11, 1-post 168 +/- 64 U(.)L(-1.)min(-1); 1500 kcal: 0-pre 51 +/- 5, 1-post 187 +/- 30, 2-post 123 +/- 19 U(.)L(-1.)min(-1); P < 0.05). However, median Lp(a) concentrations were not altered by either exercise session (800 kcal: 0-pre 5.0 mg(.)dL(-1), 0-post 3.2 mg(.)dL(-1), 1-post 4.0 mg(.)dL(-1), 2-post 3.4 mg(.)dL(-1); 1500 kcal: 0-pre 5.8 mg(.)dL(-1), 0-post 4.3 mg(.)dL(-1), 1-post 3.2 mg(.)dL(-1), 2-post 5.3 mg(.)dL(-1)). In addition, no relationship existed between exercise-induced changes in CK activity and Lp(a) concentration (800 kcal: r = -0.26; 1500 kcal: r = -0.02). Conclusion These results suggest that plasma Lp(a) concentration will not increase in response to minor exercise-induced muscle damage in endurance-trained runners.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

INTRODUCTION Icing (cryotherapy) is being widely used for the treatment of closed soft tissue trauma (CSTT), such as those resulting from sport injuries. It is believed that cryotherapy induces vasoconstriction and through this mechanism reduces inflammation [1]. However, the impact of this technique on the healing of impaired vasculature and muscle injuries following trauma remains controversial. Recent evidence suggests that the muscle regeneration is delayed after cryotherapy [2]. Consequently, we aimed to investigate the effect of cryotherapy on the vascular morphology following CSTT using an experimental model in rats by contrast-enhanced micro-CT imaging. METHODS Fifty four rats were divided into three main groups: control (no injury, n=6), sham (CSTT but no icing treatment, n=24) and icing (CSTT, treated with one session of ice block massaged directly on the injured muscle for 20 minutes, n=24). The CSTT was induced to the left thigh (Biceps Femoris) of anaesthetised rats (Male, Wistar) to create a standardized and reproducible vascular and muscle injury using an impact device [3]. Following trauma, animals were euthanized after 1, 3, 7, and 28 days healing time (n=6 for each time point). For a three-dimensional vascular morphological assessment, the blood vessels of euthanised rats were flushed with heparinised saline and then perfused with a radio-opaque contrast agent (Microfil, MV 122, Flowtech, USA) using an infusion pump. Both hind-limbs were dissected, and then the injured and non-injured limbs were imaged using a micro-CT scanner (µCT 40, Scanco Medical, Switzerland) and total volume of the perfused blood vessels (TVV) was calculated. More detailed morphological parameters such as vessel volume (VV), diameter (VD), spacing (VSp), number (VN) and connectivity (VConn) were quantified through high resolution (6 µm), micro-CT-scanned biopsy samples (diameter: 8mm) taken directly from the region of the injured muscles. The biopsies were then analysed histologically to confirm the results derived from contrast-enhanced micro-CT imaging. RESULTS AND DISCUSSION The TVV was significantly higher in the injured legs compared to the non-injured legs at day 1 and 7 in the sham group and at day 28 in both sham and icing groups. The biopsies from the injured legs of the icing group showed a significant reduction in VV, VN, VD, VConn and an increase in VSp compared to those in the sham and control groups at days 1, 3 and 7, post injury. While the injured legs of the sham group exhibited a decrease in VN and VConn 28 days post trauma, indicating a return to the original values prior to trauma, these parameters had increased in the icing group (Figure 1). Also, at day 1 post injury, VV and VD of the injured legs were significantly higher in the sham group compared to the icing group, which may be attributed to the effect of vasoconstriction induced by icing. Further histomorphological evaluation of day 1 post injury, indicated that although cryotherapy significantly reduced the injury size and influx of inflammatory cells, including macrophages and neutrophils, a delay in vascular and muscle fiber regeneration was found at later time points confirming other reports from the literature [2]. CONCLUSIONS We have demonstrated using micro-CT imaging that the vascular morphology changes after CSTT, and that its recovery is affected by therapeutic modalities such as icing. This may be useful for the development of future clinical monitoring, diagnosis and treatment of CSTT. While icing reduces the swelling after trauma, our results suggest that it may delay the recovery of the vasculature in the injured tissue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Programme: In these microlectures, developers, educators, critics, and artists give you the one piece of advice that they hold above all others. That one piece of advice: It's about the passion: Excerpt: Shades of madness - Creativity - Passion: There is something very important to observe about an industry that engages in these intense weekends. The monolithic Hollywood model is not viable, we need to scaffold the next gen of game designers, foster the passion, provide opportunity, CHANGE the model – not just dress it in new clothes

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This nuts and bolts session discusses QUT Library’s Study Solutions service which is staffed by academic skills advisors and librarians as the 2nd tier of its learning and study support model. Firstly, it will discuss the rationale behind the Study Solutions model and provide a brief profile of the service. Secondly, it will outline what distinguishes it from other modes of one-to-one learning support. Thirdly, it will report findings from a student perception study conducted to determine what difference this model of individual study assistance made to academic confidence, ability to transfer academic skills and capacity to assist peers. Finally, this session will include small group discussions to consider the feasibility of this model as best practice for other tertiary institutions and student perception as a valuable measure of the impact of learning support services.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Object classification is plagued by the issue of session variation. Session variation describes any variation that makes one instance of an object look different to another, for instance due to pose or illumination variation. Recent work in the challenging task of face verification has shown that session variability modelling provides a mechanism to overcome some of these limitations. However, for computer vision purposes, it has only been applied in the limited setting of face verification. In this paper we propose a local region based intersession variability (ISV) modelling approach, and apply it to challenging real-world data. We propose a region based session variability modelling approach so that local session variations can be modelled, termed Local ISV. We then demonstrate the efficacy of this technique on a challenging real-world fish image database which includes images taken underwater, providing significant real-world session variations. This Local ISV approach provides a relative performance improvement of, on average, 23% on the challenging MOBIO, Multi-PIE and SCface face databases. It also provides a relative performance improvement of 35% on our challenging fish image dataset.