989 resultados para Prove
Resumo:
Aim To explore the effects of a dementia-specific, aquatic exercise intervention on behavioural and psychological symptoms in people with dementia (BPSD). Method Residents from two aged care facilities in Queensland, Australia, received a 12-week intervention consisting of aquatic exercises for strength, agility, flexibility, balance and relaxation. The Psychological Well-Being in Cognitively Impaired Persons Scale (PW-BCIP) and the Revised Memory and Behaviour Problems Checklist (RMBPC) were completed by registered nurses at baseline, week 6, week 9 and post intervention. Results Ten women and one man (median age = 88.4 years, interquartile range = 12.3) participated. Statistically significant declines in the RMBPC and PW-BCIP were observed over the study period. Conclusion Preliminary evidence suggests that a dementia-specific, aquatic exercise intervention reduces BPSD and improves psychological well-being in people with moderate to severe dementia. With further testing, this innovative intervention may prove effective in addressing some of the most challenging aspects of dementia care.
Resumo:
Although at present, there is a high incidence of prostate cancer, particularly in the Western world, mortality from this disease is declining and occurs primarily only from clinically significant late stage tumors with a poor prognosis. A major current focus of this field is the identification of new biomarkers which can detect earlier, and more effectively, clinically significant tumors from those deemed “low risk”, as well as predict the prognostic course of a particular cancer. This strategy can in turn offer novel avenues for targeted therapies. The large family of Receptor Tyrosine Kinases, the Ephs, and their binding partners, the ephrins, has been implicated in many cancers of epithelial origin through stimulation of oncogenic transformation, tumor angiogenesis, and promotion of increased cell survival, invasion and migration. They also show promise as both biomarkers of diagnostic and prognostic value and as targeted therapies in cancer. This review will briefly discuss the complex roles and biological mechanisms of action of these receptors and ligands and, with regard to prostate cancer, highlight their potential as biomarkers for both diagnosis and prognosis, their application as imaging agents, and current approaches to assessing them as therapeutic targets. This review demonstrates the need for future studies into those particular family members that will prove helpful in understanding the biology and potential as targets for treatment of prostate cancer.
Resumo:
In cases involving allegations of price fixing under the former s 45A of the Trade Practices Act 1974 (Cth), it was necessary to prove that at least two parties to the arrangement or understanding at issue were “in competition with each other”. The same requirement is contained in the cartel provisions of the Competition and Consumer Act 2010 (Cth) (CCA) that replaced s 45A. The so-called “competition condition” is set out in s 44ZZRD (4) of the CCA. Where a supplier enters into vertical supply arrangements with agents or brokers, problems can arise if the supplier also has a downstream presence. At that functional level there may be a horizontal and therefore competitive dimension, and the competition condition may be satisfied. In such circumstances, great care will need to be taken in any discussions between the supplier and its downstream agents or distributors about the prices, discounts, allowances, rebates or credits that the agent or distributor may charge. Whether agents or brokers competed with their suppliers in vertical supply arrangements arose for consideration in two decisions handed down by the Federal Court in Brisbane...
Resumo:
The existence of travelling wave solutions to a haptotaxis dominated model is analysed. A version of this model has been derived in Perumpanani et al. (1999) to describe tumour invasion, where diffusion is neglected as it is assumed to play only a small role in the cell migration. By instead allowing diffusion to be small, we reformulate the model as a singular perturbation problem, which can then be analysed using geometric singular perturbation theory. We prove the existence of three types of physically realistic travelling wave solutions in the case of small diffusion. These solutions reduce to the no diffusion solutions in the singular limit as diffusion as is taken to zero. A fourth travelling wave solution is also shown to exist, but that is physically unrealistic as it has a component with negative cell population. The numerical stability, in particular the wavespeed of the travelling wave solutions is also discussed.
Resumo:
NSW Supreme Court decision - claim resulting from alleged damaging dental treatment of healthy teeth - failure of plaintiff to prove dishonest and fraudulent behaviour - assessment of damages.
Resumo:
Purpose To investigate the application of retinal nerve fibre layer (RNFL) thickness as a marker for severity of diabetic peripheral neuropathy (DPN) in people with Type 2 diabetes. Methods This was a cross-sectional study whereby 61 participants (mean age 61 [41-75 years], mean duration of diabetes 14 [1-40 years], 70% male) with Type 2 diabetes and DPN underwent optical coherence tomography (OCT) scans. Global and 4 quadrant (TSNI) RNFL thicknesses were measured at 3.45mm around the optic nerve head of one eye. Neuropathy disability score (NDS) was used to assess the severity of DPN on a 0 to 10 scale. Participants were divided into three age-matched groups representing mild (NDS=3-5), moderate (NDS=6-8) and severe (NDS=9-10) neuropathy. Two regression models were fitted for statistical analysis: 1) NDS scores as co-variate for global and quadrant RNFL thicknesses, 2) NDS groups as a factor for global RNFL thickness only. Results Mean (SD) RNFL thickness (µm) was 103(9) for mild neuropathy (n=34), 101(10) for moderate neuropathy (n=16) and 95(13) in the group with severe neuropathy (n=11). Global RNFL thickness and NDS scores were statistically significantly related (b=-1.20, p=0.048). When neuropathy was assessed across groups, a trend of thinner mean RNFL thickness was observed with increasing severity of neuropathy; however, this result was not statistically significant (F=2.86, p=0.065). TSNI quadrant analysis showed that mean RNFL thickness reduction in the inferior quadrant was 2.55 µm per 1 unit increase in NDS score (p=0.005). However, the regression coefficients were not statistically significant for RNFL thickness in the superior (b=-1.0, p=0.271), temporal (b=-0.90, p=0.238) and nasal (b=-0.99, p=0.205) quadrants. Conclusions RNFL thickness was reduced with increasing severity of DPN and the effect was most evident in the inferior quadrant. Measuring RNFL thickness using OCT may prove to be a useful, non-invasive technique for identifying severity of DPN and may also provide additional insight into common mechanisms for peripheral neuropathy and RNFL damage.
Resumo:
The purpose of this chapter is to address the question of how communication studies can prove its value in relation to corporate social responsibility (CSR). As many disciplines seek to understand CSR, the role of communication has been relatively underexplored despite its prevalence in demonstrating and shaping social responsibility positions and practice. Literature review. The literature review points to what we consider as four aces. Communication studies alert us to (1) how meaning is constructed through communication, something that has implications for the management of organizations as publics hold different views of CSR and expect different things from them; (2) how a dialogue between an organization and its publics should unfold; (3) how practices of transparency can assist organizations to come across as trustworthy actors; and, importantly, (4) how a complexity view is fruitful to grasp the CSR communication process. These four key themes could be instructive for practitioners who want to argue for and demonstrate the usefulness of strategic communication for the management of CSR and bridge meso and macro levels of analysis.
Resumo:
The approach adopted for investigating the relationship between rainfall characteristics and pollutant wash-off process is commonly based on the use of parameters which represent the entire rainfall event. This does not permit the investigation of the influence of rainfall characteristics on different sectors of the wash-off process such as first flush where there is a high pollutant wash-off load at the initial stage of the runoff event. This research study analysed the influence of rainfall characteristics on the pollutant wash-off process using two sets of innovative parameters by partitioning wash-off and rainfall characteristics. It was found that the initial 10% of the wash-off process is closely linked to runoff volume related rainfall parameters including rainfall depth and rainfall duration while the remaining part of the wash-off process is primarily influenced by kinetic energy related rainfall parameters, namely, rainfall intensity. These outcomes prove that different sectors of the wash-off process are influenced by different segments of a rainfall event.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
Introduction The presentation of pulmonary embolism to the emergency department (ED) can prove challenging because of the myriad of potential disease processes that mimic its signs and symptoms. The incidence of pulmonary embolism and indeed the mortality associated with it is relatively high. Early diagnosis and treatment is crucial in off-setting the potential deleterious effects associated with this condition. The aim of this article is to present a nursing case review of a patient presenting to the ED with a diagnosis of pulmonary embolism. Method We chose to use a case review to highlight the nursing and medical care that was provided for a patient who presented to the emergency department acutely with dyspnoea, chest pain and pyrexia. The use of case reviews are useful in reporting unusual or rare cases and this format is typically seen more in medicine than in nursing. They can naturally take one of two formats—a single case report or a series of case reports; in this case we opted to report on a single case. Discussion The gentleman in question was an ambulance admissionto the ED with a three day history of chest pain, shortness of breath and one episode of syncope which brought him to the ED. Over the course of his admission a variety of treatment modalities were used successfully to alleviate the problem. More notable from a nursing perspective was the use of diagnostic tools as an interpretation to guide his care and provide a platform from which a deeper understanding and appreciation of the intricacies the critically ill patient often presents. Conclusion We found the use of case review very enlightening in understanding the disease process and the decision-making that accompanies this. Whilst our patient was successfully rehabilitated home, we learnt a lot from the experience which has been most beneficial in supporting our understanding of pulmonary embolism.
Resumo:
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchical identity-based encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based HIBEs and in some cases result in shorter ciphertexts and private keys. We prove security from classic lattice hardness assumptions.
Resumo:
Construction delay has been a protracted problem for the Malaysian construction industry. Recent report showed that 80% of public sector projects are behind schedule. This underachieving time performance has led to many problems including public complaints, loss of reputation and revenue for the government and a slump in the industry’s GDP contribution. Research in the area of project delay has mushroomed worldwide with attempts to place mitigation plans, but delay remains a global phenomenon. There is now an urgent need for revolutionizing construction practices and past research, backed up with few successful cases suggests that Supply Chain Management (SCM) could prove beneficial to reduce or eliminate delays in construction. SCM which originated from the automotive manufacturing industry promotes a more collaborative approach to construction management and has recently gained attention of the construction industry. However every country, including Malaysia, would certainly have disparities of their own compared to others being it from the cultural point of view, nature of problems, locality or improvements needed. Therefore, this paper will present part of a Ph.D. research which aims at illustrating the Malaysian construction industry experts’ perception of the Malaysian public sector project delay, provide insight into these dilemmas, highlights the problems with current practices, its effects and the improvements needed. Subsequently, this paper would propose ratification to the problems using SCM. A semi-structured interview has been conducted to practitioners with at least 20 years’ experience in the industry. The findings showed that Malaysia may be unique compared to other countries and that by considering a number of additional factors, SCM could prove beneficial to increase efficiency of the Malaysian public sector projects.
Resumo:
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.
Resumo:
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.