47 resultados para Secure Authentication for Broadcast (DNP3-SAB)

em Université de Lausanne, Switzerland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

BackgroundResearch indicates that the early attachment patterns of babies could influence their socio-emotional development and prevent the emergence of problematic behaviours in the child later in life. Many studies in the field of early attachment interventions have promoted a secure attachment bond between mother and infant. The purpose of this study was to evaluate the effectiveness of an early pilot intervention programme designed to promote a secure attachment bond in mother-infant dyads belonging to a population seeking regular treatment at urban health centres in Santiago, Chile.MethodsPrimipara mothers were randomly assigned to two intervention conditions: a secure attachment promotion programme (experimental group = 43) or an educational talk (control group = 29). The Strange Situation Assessment was used to collect data on the attachment patterns of babies.ResultsThe results show that after the intervention, there were more babies with secure attachment in the experimental group than in the control group.ConclusionsThese findings represent a preliminary step towards evaluating interventions aimed at promoting secure attachment in Chilean mother-child dyads. While the effect of the intervention is not significant, the effect size obtained is respectable and consistent with other meta-analytic findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The fatty acids of olive oils of distinct quality grade from the most important European Union (EU) producer countries were chemically and isotopically characterized. The analytical approach utilized combined capillary column gas chromatography-mass spectrometry (GC/MS) and the novel technique of compound-specific isotope analysis (CSIA) through gas chromatography coupled to a stable isotope ratio mass spectrometer (IRMS) via a combustion (C) interface (GC/C/IRMS). This approach provides further insights into the control of the purity and geographical origin of oils sold as cold-pressed extra virgin olive oil with certified origin appellation. The results indicate that substantial enrichment in heavy carbon isotope (C-13) of the bulk oil and of individual fatty acids are related to (1) a thermally induced degradation due to deodorization or steam washing of the olive oils and (2) the potential blend with refined olive oil or other vegetable oils. The interpretation of the data is based on principal component analysis of the fatty acids concentrations and isotopic data (delta(13)C(oil), delta(13)C(16:0), delta(13)C(18:1)) and on the delta(13)C(16:0) vs delta(13)C(18:1) covariations. The differences in the delta(13)C values of palmitic and oleic acids are discussed in terms of biosynthesis of these acids in the plant tissue and admixture of distinct oils.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigated the association between exposure to radio-frequency electromagnetic fields (RF-EMFs) from broadcast transmitters and childhood cancer. First, we conducted a time-to-event analysis including children under age 16 years living in Switzerland on December 5, 2000. Follow-up lasted until December 31, 2008. Second, all children living in Switzerland for some time between 1985 and 2008 were included in an incidence density cohort. RF-EMF exposure from broadcast transmitters was modeled. Based on 997 cancer cases, adjusted hazard ratios in the time-to-event analysis for the highest exposure category (>0.2 V/m) as compared with the reference category (<0.05 V/m) were 1.03 (95% confidence interval (CI): 0.74, 1.43) for all cancers, 0.55 (95% CI: 0.26, 1.19) for childhood leukemia, and 1.68 (95% CI: 0.98, 2.91) for childhood central nervous system (CNS) tumors. Results of the incidence density analysis, based on 4,246 cancer cases, were similar for all types of cancer and leukemia but did not indicate a CNS tumor risk (incidence rate ratio = 1.03, 95% CI: 0.73, 1.46). This large census-based cohort study did not suggest an association between predicted RF-EMF exposure from broadcasting and childhood leukemia. Results for CNS tumors were less consistent, but the most comprehensive analysis did not suggest an association.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The authenticity of vegetable oils consumed in Slovenia and Croatia was investigated by carbon isotope analysis of the individual fatty acids by the use of gas chromatography-combustion-isotope ratio mass spectrometry (GC/C/IRMS), and through carbon isotope analysis of the bulk oil. The fatty acids from samples of olive, pumpkin, sunflower, maize, rape, soybean, and sesame oils were separated by alkaline hydrolysis and derivatized to methyl esters for chemical characterization by capillary gas chromatography/mass spectrometry (GC/MS) prior to isotopic analysis. Enrichment in heavy carbon isotope (C-13) of th, bulk oil and of the individual fatty acids are related to (1) a thermally induced degradation during processing (deodorization, steam washing, or bleaching), (2) hydrolytic rancidity (lipolysis) and oxidative rancidity of the vegetable oils during storage, and (3) the potential blend with refined oil or other vegetable oils. The impurity or admixture of different oils may be assessed from the delta C-13(16:0) VS. delta C-13(18:1) covariations. The fatty acid compositions of Slovenian and Croatian olive oils are compared with those from the most important Mediterranean producer countries (Spain, Italy, Greece, and France).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is composed of three main parts. The first consists of a state of the art of the different notions that are significant to understand the elements surrounding art authentication in general, and of signatures in particular, and that the author deemed them necessary to fully grasp the microcosm that makes up this particular market. Individuals with a solid knowledge of the art and expertise area, and that are particularly interested in the present study are advised to advance directly to the fourth Chapter. The expertise of the signature, it's reliability, and the factors impacting the expert's conclusions are brought forward. The final aim of the state of the art is to offer a general list of recommendations based on an exhaustive review of the current literature and given in light of all of the exposed issues. These guidelines are specifically formulated for the expertise of signatures on paintings, but can also be applied to wider themes in the area of signature examination. The second part of this thesis covers the experimental stages of the research. It consists of the method developed to authenticate painted signatures on works of art. This method is articulated around several main objectives: defining measurable features on painted signatures and defining their relevance in order to establish the separation capacities between groups of authentic and simulated signatures. For the first time, numerical analyses of painted signatures have been obtained and are used to attribute their authorship to given artists. An in-depth discussion of the developed method constitutes the third and final part of this study. It evaluates the opportunities and constraints when applied by signature and handwriting experts in forensic science. A brief summary covering each chapter allows a rapid overview of the study and summarizes the aims and main themes of each chapter. These outlines presented below summarize the aims and main themes addressed in each chapter. Part I - Theory Chapter 1 exposes legal aspects surrounding the authentication of works of art by art experts. The definition of what is legally authentic, the quality and types of the experts that can express an opinion concerning the authorship of a specific painting, and standard deontological rules are addressed. The practices applied in Switzerland will be specifically dealt with. Chapter 2 presents an overview of the different scientific analyses that can be carried out on paintings (from the canvas to the top coat). Scientific examinations of works of art have become more common, as more and more museums equip themselves with laboratories, thus an understanding of their role in the art authentication process is vital. The added value that a signature expertise can have in comparison to other scientific techniques is also addressed. Chapter 3 provides a historical overview of the signature on paintings throughout the ages, in order to offer the reader an understanding of the origin of the signature on works of art and its evolution through time. An explanation is given on the transitions that the signature went through from the 15th century on and how it progressively took on its widely known modern form. Both this chapter and chapter 2 are presented to show the reader the rich sources of information that can be provided to describe a painting, and how the signature is one of these sources. Chapter 4 focuses on the different hypotheses the FHE must keep in mind when examining a painted signature, since a number of scenarios can be encountered when dealing with signatures on works of art. The different forms of signatures, as well as the variables that may have an influence on the painted signatures, are also presented. Finally, the current state of knowledge of the examination procedure of signatures in forensic science in general, and in particular for painted signatures, is exposed. The state of the art of the assessment of the authorship of signatures on paintings is established and discussed in light of the theoretical facets mentioned previously. Chapter 5 considers key elements that can have an impact on the FHE during his or her2 examinations. This includes a discussion on elements such as the skill, confidence and competence of an expert, as well as the potential bias effects he might encounter. A better understanding of elements surrounding handwriting examinations, to, in turn, better communicate results and conclusions to an audience, is also undertaken. Chapter 6 reviews the judicial acceptance of signature analysis in Courts and closes the state of the art section of this thesis. This chapter brings forward the current issues pertaining to the appreciation of this expertise by the non- forensic community, and will discuss the increasing number of claims of the unscientific nature of signature authentication. The necessity to aim for more scientific, comprehensive and transparent authentication methods will be discussed. The theoretical part of this thesis is concluded by a series of general recommendations for forensic handwriting examiners in forensic science, specifically for the expertise of signatures on paintings. These recommendations stem from the exhaustive review of the literature and the issues exposed from this review and can also be applied to the traditional examination of signatures (on paper). Part II - Experimental part Chapter 7 describes and defines the sampling, extraction and analysis phases of the research. The sampling stage of artists' signatures and their respective simulations are presented, followed by the steps that were undertaken to extract and determine sets of characteristics, specific to each artist, that describe their signatures. The method is based on a study of five artists and a group of individuals acting as forgers for the sake of this study. Finally, the analysis procedure of these characteristics to assess of the strength of evidence, and based on a Bayesian reasoning process, is presented. Chapter 8 outlines the results concerning both the artist and simulation corpuses after their optical observation, followed by the results of the analysis phase of the research. The feature selection process and the likelihood ratio evaluation are the main themes that are addressed. The discrimination power between both corpuses is illustrated through multivariate analysis. Part III - Discussion Chapter 9 discusses the materials, the methods, and the obtained results of the research. The opportunities, but also constraints and limits, of the developed method are exposed. Future works that can be carried out subsequent to the results of the study are also presented. Chapter 10, the last chapter of this thesis, proposes a strategy to incorporate the model developed in the last chapters into the traditional signature expertise procedures. Thus, the strength of this expertise is discussed in conjunction with the traditional conclusions reached by forensic handwriting examiners in forensic science. Finally, this chapter summarizes and advocates a list of formal recommendations for good practices for handwriting examiners. In conclusion, the research highlights the interdisciplinary aspect of signature examination of signatures on paintings. The current state of knowledge of the judicial quality of art experts, along with the scientific and historical analysis of paintings and signatures, are overviewed to give the reader a feel of the different factors that have an impact on this particular subject. The temperamental acceptance of forensic signature analysis in court, also presented in the state of the art, explicitly demonstrates the necessity of a better recognition of signature expertise by courts of law. This general acceptance, however, can only be achieved by producing high quality results through a well-defined examination process. This research offers an original approach to attribute a painted signature to a certain artist: for the first time, a probabilistic model used to measure the discriminative potential between authentic and simulated painted signatures is studied. The opportunities and limits that lie within this method of scientifically establishing the authorship of signatures on works of art are thus presented. In addition, the second key contribution of this work proposes a procedure to combine the developed method into that used traditionally signature experts in forensic science. Such an implementation into the holistic traditional signature examination casework is a large step providing the forensic, judicial and art communities with a solid-based reasoning framework for the examination of signatures on paintings. The framework and preliminary results associated with this research have been published (Montani, 2009a) and presented at international forensic science conferences (Montani, 2009b; Montani, 2012).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective : The main objective of this study was to assess mother-child patterns of interaction in relation to later quality of attachment in a group of children with an orofacial cleft compared with children without cleft. Design : Families were contacted when the child was 2 months old for a direct assessment of mother-child interaction and then at 12 months for a direct assessment of the child's attachment. Data concerning socioeconomical information and posttraumatic stress symptoms in mothers were collected at the first appointment. Participants : Forty families of children with a cleft and 45 families of children without cleft were included in the study. Families were recruited at birth in the University Hospital of Lausanne. Results : Results showed that children with a cleft were more difficult and less cooperative during interaction at 2 months of age with their mother compared with children without a cleft. No significant differences were found in mothers or in dyadic interactive styles. Concerning the child's attachment at 12 months old, no differences were found in attachment security. However, secure children with a cleft were significantly more avoidant with their mother during the reunion episodes than secure children without cleft. Conclusion : Despite the facial disfigurement and the stress engendered by treatment during the first months of the infant's life, children with cleft and their mothers are doing as well as families without cleft with regard to the mothers' mental health, mother-child relationships, and later quality of attachment. A potential contribution for this absence of difference may be the pluridisciplinary support that families of children with cleft benefit from in Lausanne.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Whereas the use of helicopters as a rapid means toreach victims and to bring them to a secure place is well-recognized,very few data are available about the value of winching physicians toprovide medical care for the victims directly on-site. We sought to studythe medical aspects of alpine helicopter rescue operations involving thewinching of an emergency physician to the victim.Methods: We retrospectively reviewed the medical reports of a singlehelicopter-based emergency medical service. Data from 1 January 2003to 31 December 2008 were analyzed. Cases with emergency callindicating that the victim was deceased were excluded. Data includedthe category (trauma or illnesses), and severity (NACA score) of theinjuries, along with the main medical procedures performed on site.Results: 9879 rescue missions were conducted between 1 January2003 and 31 December 2008. The 921 (9.3%) missions involvingwinching of the emergency physician were analysed. 840 (91%)patients suffered from trauma-related injuries. The cases of the 81 (9%)people presenting with medical emergencies were, when compared tothe trauma victims, significantly more severe according to the NACAindex (p <0.001). Overall, 246 (27%) patients had a severe injury orillness, namely, a potential or overt vital threat (NACA score between4-6, table 1). A total of 478 (52%) patients required administration ofmajor analgesics: fentanyl (443 patients; 48%), ketamine (42 patients;5%) or morphine (7 patients; 1%). The mean dose of fentanyl was 188micrograms (range 25-750, SD 127). Major medical interventions wereperformed 72 times on 39 (4%) patients (table 2).Conclusions: The severity of the patients' injuries or illnesses alongwith the high proportion of medical procedures performed directlyon-site validate emergency physician winching for advanced life supportprocedures and analgesia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Tiwi people of northern Australia have managed natural resources continuously for 6000-8000 years. Tiwi management objectives and outcomes may reflect how they gather information about the environment. We qualitatively analyzed Tiwi documents and management techniques to examine the relation between the social and physical environment of decision makers and their decision-making strategies. We hypothesized that principles of bounded rationality, namely, the use of efficient rules to navigate complex decision problems, explain how Tiwi managers use simple decision strategies (i.e., heuristics) to make robust decisions. Tiwi natural resource managers reduced complexity in decision making through a process that gathers incomplete and uncertain information to quickly guide decisions toward effective outcomes. They used management feedback to validate decisions through an information loop that resulted in long-term sustainability of environmental use. We examined the Tiwi decision-making processes relative to management of barramundi (Lates calcarifer) fisheries and contrasted their management with the state government's management of barramundi. Decisions that enhanced the status of individual people and their attainment of aspiration levels resulted in reliable resource availability for Tiwi consumers. Different decision processes adopted by the state for management of barramundi may not secure similarly sustainable outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Animals communicate with conspecifics to resolve conflicts over how resources are shared. Since signals reflect individuals' resource-holding potential and motivation to compete, it is crucial that opponents efficiently transmit and receive information to adjust investment optimally in competitive interactions. Acoustic communication is particularly flexible as it can be quickly modulated according to background noise and audience. Diverse mechanisms have evolved to minimize acoustic signal interference, one being the avoidance of signal overlap by adjusting the timing of call production to alternate calls with those of competitors. However, the occurrence and function of overlap avoidance in the resolution of competition among relatives have barely been studied. Using young barn owl siblings, Tyto alba, which vocally negotiate over who will have priority access to food provided by parents, we investigated the extent to which nestlings avoid calling simultaneously and the function of this behaviour. We found that nestlings overlapped both their live siblings' calls and experimentally broadcast calls at least five times less often than expected at random. Furthermore, a focal nestling engaged more intensely in vocal negotiation when competing with nestmates that called simultaneously compared to those that did not overlap their respective calls. This suggests that barn owl nestlings avoid calling simultaneously, as overlapped calls are less efficient at deterring siblings from competing. Overlap avoidance reduces signal interference and, as a consequence, would improve the efficiency of communication among kin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To examine whether a caregiver's attachment style is associated with patient cognitive trajectory after traumatic brain injury (TBI). SETTING: National Institute of Neurological Disorders and Stroke, National Institutes of Health, Bethesda, Maryland. PARTICIPANTS: Forty Vietnam War veterans with TBI and their caregivers. MAIN OUTCOME MEASURE: Cognitive performance, measured by the Armed Forces Qualification Test percentile score, completed at 2 time points: preinjury and 40 years postinjury. DESIGN: On the basis of caregivers' attachment style (secure, fearful, preoccupied, dismissing), participants with TBI were grouped into a high or low group. To examine the association between cognitive trajectory of participants with TBI and caregivers' attachment style, we ran four 2 × 2 analysis of covariance on cognitive performances. RESULTS: After controlling for other factors, cognitive decline was more pronounced in participants with TBI with a high fearful caregiver than among those with a low fearful caregiver. Other attachment styles were not associated with decline. CONCLUSION AND IMPLICATION: Caregiver fearful attachment style is associated with a significant decline in cognitive status after TBI. We interpret this result in the context of the neural plasticity and cognitive reserve literatures. Finally, we discuss its impact on patient demand for healthcare services and potential interventions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The risk of adverse psychological outcomes in adult victims of childhood and adolescent sexual abuse (CSA) has been documented; however, research on possible mediating variables is still required, namely with a clinical perspective. The attachment literature suggests that secure interpersonal relationships may represent such a variable. Twenty-eight women who had experienced episodes of CSA, and 16 control women, were interviewed using Bremner's Early Trauma Inventory and the DSM-IV Global Assessment of Functioning; they also responded to Collins' Relationship Scales Questionnaire, evaluating adult attachment representations in terms of Closeness, Dependence and Anxiety. Subjects with an experience of severe abuse reported significantly more interpersonal distance in relationships (low index of Closeness) than other subjects. The index of psychopathological functioning was correlated with both the severity of abuse and attachment (low index of Closeness). Regression analysis on the sample of abused women revealed that attachment predicted psychopathology when abuse was controlled for, whereas abuse did not predict psychopathology when attachment was controlled for. Therefore, preserving a capacity for closeness with attachment figures in adulthood appears to mediate the consequences of CSA on subsequent psychopathological outcome.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study was designed to assess sex-related differences in the selection of an appropriate strategy when facing novelty. A simple visuo-spatial task was used to investigate exploratory behavior as a specific response to novelty. The exploration task was followed by a visual discrimination task, and the responses were analyzed using signal detection theory. During exploration women selected a local searching strategy in which the metric distance between what is already known and what is unknown was reduced, whereas men adopted a global strategy based on an approximately uniform distribution of choices. Women's exploratory behavior gives rise to a notion of a secure base warranting a sense of safety while men's behavior does not appear to be influenced by risk. This sex-related difference was interpreted as a difference in beliefs concerning the likelihood of uncertain events influencing risk evaluation. Keywords: exploration, spontaneous strategies, sex differences, decision-making.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: Quality assurance (QA) in clinical trials is essential to ensure treatment is safely and effectively delivered. As QA requirements have increased in complexity in parallel with evolution of radiation therapy (RT) delivery, a need to facilitate digital data exchange emerged. Our objective is to present the platform developed for the integration and standardization of QART activities across all EORTC trials involving RT. METHODS: The following essential requirements were identified: secure and easy access without on-site software installation; integration within the existing EORTC clinical remote data capture system; and the ability to both customize the platform to specific studies and adapt to future needs. After retrospective testing within several clinical trials, the platform was introduced in phases to participating sites and QART study reviewers. RESULTS: The resulting QA platform, integrating RT analysis software installed at EORTC Headquarters, permits timely, secure, and fully digital central DICOM-RT based data review. Participating sites submit data through a standard secure upload webpage. Supplemental information is submitted in parallel through web-based forms. An internal quality check by the QART office verifies data consistency, formatting, and anonymization. QART reviewers have remote access through a terminal server. Reviewers evaluate submissions for protocol compliance through an online evaluation matrix. Comments are collected by the coordinating centre and institutions are informed of the results. CONCLUSIONS: This web-based central review platform facilitates rapid, extensive, and prospective QART review. This reduces the risk that trial outcomes are compromised through inadequate radiotherapy and facilitates correlation of results with clinical outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While mobile technologies can provide great personalized services for mobile users, they also threaten their privacy. Such personalization-privacy paradox are particularly salient for context aware technology based mobile applications where user's behaviors, movement and habits can be associated with a consumer's personal identity. In this thesis, I studied the privacy issues in the mobile context, particularly focus on an adaptive privacy management system design for context-aware mobile devices, and explore the role of personalization and control over user's personal data. This allowed me to make multiple contributions, both theoretical and practical. In the theoretical world, I propose and prototype an adaptive Single-Sign On solution that use user's context information to protect user's private information for smartphone. To validate this solution, I first proved that user's context is a unique user identifier and context awareness technology can increase user's perceived ease of use of the system and service provider's authentication security. I then followed a design science research paradigm and implemented this solution into a mobile application called "Privacy Manager". I evaluated the utility by several focus group interviews, and overall the proposed solution fulfilled the expected function and users expressed their intentions to use this application. To better understand the personalization-privacy paradox, I built on the theoretical foundations of privacy calculus and technology acceptance model to conceptualize the theory of users' mobile privacy management. I also examined the role of personalization and control ability on my model and how these two elements interact with privacy calculus and mobile technology model. In the practical realm, this thesis contributes to the understanding of the tradeoff between the benefit of personalized services and user's privacy concerns it may cause. By pointing out new opportunities to rethink how user's context information can protect private data, it also suggests new elements for privacy related business models.