56 resultados para messages
Resumo:
Human longevity is a complex trait and increasingly we understand that both genes and lifestyle interact in the longevity phenotype. Non-genetic factors, including diet, physical activity, health habits, and psychosocial factors contribute approximately 50 % of the variability in human lifespan with another 25 % explained by genetic differences. Family clusters of nonagenarian and centenarian siblings, who show both exceptional age-span and health-span, are likely to have inherited facilitatory gene groups, but also have nine decades of life experiences and behaviours which have interacted with their genetic profiles. Identification of their shared genes is just one small step in the link from genes to their physical and psychological profiles. Behavioural genomics is beginning to demonstrate links to biological mechanisms through regulation of gene expression, which directs the proteome and influences the personal phenotype. Epigenetics has been considered the missing link between nature and nurture. Although there is much that remains to be discovered, this article will discuss some of genetic and environmental factors which appear important in good quality longevity and link known epigenetic mechanisms to themes identified by nonagenarians themselves related to their longevity. Here we suggest that exceptional 90-year old siblings have adopted a range of behaviours and life-styles which have contributed to their ageing-well-phenotype and which link with important public health messages.
Resumo:
Nearly 4000 people died in Northern Ireland’s long running conflict, 314 of them police officers (Brewer and Magee 1991, Brewer 1996, Hennessey 1999, Guelke and Milton-Edwards 2000). The republican and loyalist ceasefires of 1994 were the first significant signal that NI society was moving beyond the ‘troubles’ and towards a normalised political environment. The Belfast (Good Friday) Agreement of 1998 cemented that movement (Hennessey 1999). Policing was a key and seemingly unresolvable element of the conflict, seen as unrepresentative and partisan. Its reform or ‘recasting’ in a new dispensation was an integral part of the conflict transformation endeavour(Ellison 2010). As one of the most controversial elements of the conflicted past, it had remained outside the Agreement and was subject to a specific commission of interest (1999), generally known as the Patten Commission. The Commission’s far reaching proposals included a change of name, badge and uniform, the introduction of 50/50 recruitment (50% Roman Catholic and 50% other), a new focus on human rights, a new district command and headquarter structure, a review of ‘Special Branch’ and covert techniques, a concern for ‘policing with the community’ and a significant voluntary severance process to make room for new recruits, unconnected with the past history of the organisation(Murphy 2013).
This paper reflects upon the first data collection phase of a long term processual study of organisational change within the Royal Ulster Constabulary / Police Service of Northern Ireland. This phase (1996-2002) covers early organisational change initiation (including the pre-change period) and implementation including the instigation of symbolic changes (name, badge, and crest) and structural changes (new HQ structure and District Command structure). It utilises internal documentation including messages from the organisations leaders, interviews with forty key informants (identified through a combination of snow-balling from referrals by initial contacts, and key interviews with significant individuals), as well as external documentation and commentary on public perceptions of the change. Using a processual lens (Langley, Smallman et al. 2013) it seeks to understand this initial change phase and its relative success in a highly politicised environment.
By engaging key individuals internally and externally, setting up a dedicated change team, adopting a non normative, non urgent, calming approach to dissent, communicating in orthodox and unorthodox ways with members, acknowledging the huge emotional strain of letting go of the organisation’s name and all it embodied, and re-emphasising the role of officers as ‘police first’, rather than ‘RUC first’, the organisations leadership remained in control of a volatile and unhappy organisational body and succeeded in moving it on through this initial phase, even while much of the political establishment lambasted them externally. Three years into this change process the organisation had a new name, a new crest, new structures, procedures and was deeply engaged in embedding the joint principles of human rights and community policing within its re-woven fabric. While significant problems remained, the new Police Service of Northern Ireland had successfully begun a long journey to full community acceptance in a post conflict context.
This case illustrates the significant challenges of leading change under political pressure, with external oversight and no space for failure(Hannah, Uhl-Bien et al. 2009). It empirically reflects the reality of change implementation as messy, disruptive and unpredictable and highlights the significance of political skill and contextual understanding to success in the early stages(Buchanan and Boddy 1992). The implications of this for change theory and the practice of change implementation are explored (Eisenhardt and Graebner 2007) and some conclusions drawn about what such an extreme case tells us about change generally and change implementation under pressure.
Resumo:
Created over a couple of Sunday mornings in the Fall of 1960, the twenty-six collaborative Poem-Paintings of the artist Norman Bluhm and the poet Frank O'Hara represent what Bluhm later called a spontaneous 'conversation' between the painter and the poet. In this essay, Catherine Gander adopts a number of pragmatist positions to reconsider these overlooked works as essential examples of verbal-visual interaction that extend their 'conversation' to greet and involve us in a relationship that is at once interpersonal, integrated, and embodied. The works, Gander argues, constitute what John Dewey terms 'art as experience'; in their back and forth exchange of verbal and visual gesture, abstraction and denotation, the Poem-Paintings are the 'cumulative continuity' of 'the process of living', dramatising the shifting, spontaneous and multiple dimensions of interpersonal conversation, and in so doing, indicating a new path toward interconnective and equal exchange between word and image.
Resumo:
In this extended introductory essay, Catherine Gander and Sarah Garland suggest new ways of looking at the correspondences between visual and verbal practices to consider their material and conceptual connections in a specifically American set of histories, contexts and interpretive traditions. Tracing a lineage of experiential philosophy that is grounded in the overturning of a Cartesian mind/body split, the authors argue for pluralistic perspectives on intermedial innovations that situate embodied and imaginative reader-viewer response as vital to the life of the artwork. Gander and Garland chart two main strands to this approach: the pragmatist strain of American aesthetics and social politics, rooted in the essays of transcendentalist Ralph Waldo Emerson and emanating from the writings of John Dewey and William James; and the conceptualist strain of French-American Marcel Duchamp, whose ground-breaking ideas both positioned the artwork as a phenomenological construction and liberated the artist from established methods of practice and discourse. The ‘imagetext’ (after W. J. T. Mitchell) is therefore, argue Gander and Garland, a site consisting of far more than word and image – but a living assemblage of language, idea, thing, cognition, affect and shared experience.
Resumo:
Taking in recent advances in neuroscience and digital technology, Gander and Garland assess the state of the inter-arts in America and the Western world, exploring and questioning the primacy of affect in an increasingly hypertextual everyday environment. In this analysis they signal a move beyond W. J. T. Mitchell’s coinage of the ‘imagetext’ to an approach that centres the reader-viewer in a recognition, after John Dewey, of ‘art as experience’. New thinking in cognitive and computer sciences about the relationship between the body and the mind challenges any established definitions of ‘embodiment’, ‘materiality’, ‘virtuality’ and even ‘intelligence, they argue, whilst ‘Extended Mind Theory’, they note, marries our cognitive processes with the material forms with which we engage, confirming and complicating Marshall McLuhan’s insight, decades ago, that ‘all media are “extensions of man”’. In this chapter, Gander and Garland open paths and suggest directions into understandings and critical interpretations of new and emerging imagetext worlds and experiences.
Resumo:
An efficient and robust case sorting algorithm based on Extended Equal Area Criterion (EEAC) is proposed in this paper for power system transient stability assessment (TSA). The time-varying degree of an equivalent image system can be deduced by comparing the analysis results of Static EEAC (SEEAC) and Dynamic EEAC (DEEAC), the former of which neglects all time-varying factors while the latter partially considers the time-varying factors. Case sorting rules according to their transient stability severity are set combining the time-varying degree and fault messages. Then a case sorting algorithm is designed with the “OR” logic among multiple rules, based on which each case can be identified into one of the following five categories, namely stable, suspected stable, marginal, suspected unstable and unstable. The performance of this algorithm is verified by studying 1652 contingency cases from 9 real Chinese provincial power systems under various operating conditions. It is shown that desirable classification accuracy can be achieved for all the contingency cases at the cost of very little extra computational burden and only 9.81% of the whole cases need to carry out further detailed calculation in rigorous on-line TSA conditions.
Resumo:
This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 210 implementations. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers have been withdrawn from the competition. We have developed a testing framework, BRUTUS, to facilitate automatic detection of simple security lapses and susceptible statistical structures across all ciphers. From this testing, we have security usage notes on four submissions and statistical notes on a further four. We highlight that some of the CAESAR algorithms pose an elevated risk if employed in real-life protocols due to a class of adaptive-chosen-plaintext attacks. Although authenticated encryption with associated data are often defined (and are best used) as discrete primitives that authenticate and transmit only complete messages, in practice, these algorithms are easily implemented in a fashion that outputs observable ciphertext data when the algorithm has not received all of the (attacker-controlled) plaintext. For an implementor, this strategy appears to offer seemingly harmless and compliant storage and latency advantages. If the algorithm uses the same state for secret keying information, encryption, and integrity protection, and the internal mixing permutation is not cryptographically strong, an attacker can exploit the ciphertext–plaintext feedback loop to reveal secret state information or even keying material. We conclude that the main advantages of exhaustive, automated cryptanalysis are that it acts as a very necessary sanity check for implementations and gives the cryptanalyst insights that can be used to focus more specific attack methods on given candidates.
Resumo:
Authenticated encryption algorithms protect both the confidentiality and integrity of messages in a single processing pass. We show how to utilize the L◦P ◦S transform of the Russian GOST R 34.11-2012 standard hash “Streebog” to build an efficient, lightweight algorithm for Authenticated Encryption with Associated Data (AEAD) via the Sponge construction. The proposed algorithm “StriBob” has attractive security properties, is faster than the Streebog hash alone, twice as fast as the GOST 28147-89 encryption algorithm, and requires only a modest amount of running-time memory. StriBob is a Round 1 candidate in the CAESAR competition.
Resumo:
Public health risk communication during emergencies should be rapid and accurate in order to allow the audience to take steps to prevent adverse outcomes. Delays to official communications may cause unnecessary anxiety due to uncertainty or inaccurate information circulating within the at-risk group. Modern electronic communications present opportunities for rapid, targeted public health risk communication. We present a case report of a cluster of invasive meningococcal disease in a primary school in which we used the school's mass short message service (SMS) text message system to inform parents and guardians of pupils about the incident, to tell them that chemoprophylaxis would be offered to all pupils and staff, and to advise them when to attend the school to obtain further information and antibiotics. Following notification to public health on a Saturday, an incident team met on Sunday, sent the SMS messages that afternoon, and administered chemoprophyaxis to 93% of 404 pupils on Monday. The use of mass SMS messages enabled rapid communication from an official source and greatly aided the public health response to the cluster.
Resumo:
The notion of educating the public through generic healthy eating messages has pervaded dietary health promotion efforts over the years and continues to do so through various media, despite little evidence for any enduring impact upon eating behaviour. There is growing evidence, however, that tailored interventions such as those that could be delivered online can be effective in bringing about healthy dietary behaviour change. The present paper brings together evidence from qualitative and quantitative studies that have considered the public perspective of genomics, nutrigenomics and personalised nutrition, including those conducted as part of the EU-funded Food4Me project. Such studies have consistently indicated that although the public hold positive views about nutrigenomics and personalised nutrition, they have reservations about the service providers' ability to ensure the secure handling of health data. Technological innovation has driven the concept of personalised nutrition forward and now a further technological leap is required to ensure the privacy of online service delivery systems and to protect data gathered in the process of designing personalised nutrition therapies.