973 resultados para Delegates list updates
Resumo:
Background Cancer can be a distressing experience for cancer patients and carers, impacting on psychological, social, physical and spiritual functioning. However, health professionals often fail to detect distress in their patients due to time constraints and a lack of experience. Also, with the focus on the patient, carer needs are often overlooked. This study investigated the acceptability of brief distress screening with the Distress Thermometer (DT) and Problem List (PL) to operators of a community-based telephone helpline, as well as to cancer patients and carers calling the service. Methods Operators (n = 18) monitored usage of the DT and PL with callers (cancer patients/carers, >18 years, and English-speaking) from September-December 2006 (n = 666). The DT is a single item, 11-point scale to rate level of distress. The associated PL identifies the cause of distress. Results The DT and PL were used on 90% of eligible callers, most providing valid responses. Benefits included having an objective, structured and consistent means for distress screening and triage to supportive care services. Reported challenges included apparent inappropriateness of the tools due to the nature of the call or level of caller distress, the DT numeric scale, and the level of operator training. Conclusions We observed positive outcomes to using the DT and PL, although operators reported some challenges. Overcoming these challenges may improve distress screening particularly by less experienced clinicians, and further development of the PL items and DT scale may assist with administration. The DT and PL allow clinicians to direct/prioritise interventions or referrals, although ongoing training and support is critical in distress screening.
Resumo:
Invited book review of Carolyn Carpan, 2009, Sisters, Schoolgirls and Sleuths : Girls' Series Books in America, MD: Scarecrow Press
Resumo:
Despite opposition from environmentalists, farmers and parts of the fishing industry, on 23 August 2012, the $6.4bn Alpha Coal mine and rail project in Queensland was approved under the EPBC Act, subject to 19 conditions.1 The approval relates to the proposed construction and operation of an open-cut coal mine and 495km railway line to Abbott Point...
Resumo:
This study investigates grade eight girls’ use of status updates on Facebook in order to create identities online. Using sociologist Erving Goffman’s theory of self-presentation as a framework, Jones and Pittman’s subsequent strategies of self-presentation are used to discover the ways in which teenage girls use status updates in order to create identities online and manage audience impressions. Using a mixed methods design, the results showed that, while existing self-presentation strategies persist, social networking has created new means of self-presentation. This study adds to a growing pool of research regarding teens’ engagement with social networking websites to form identities.
Resumo:
A dynamic accumulator is an algorithm, which gathers together a large set of elements into a constant-size value such that for a given element accumulated, there is a witness confirming that the element was indeed included into the value, with a property that accumulated elements can be dynamically added and deleted into/from the original set such that the cost of an addition or deletion operation is independent of the number of accumulated elements. Although the first accumulator was presented ten years ago, there is still no standard formal definition of accumulators. In this paper, we generalize formal definitions for accumulators, formulate a security game for dynamic accumulators so-called Chosen Element Attack (CEA), and propose a new dynamic accumulator for batch updates based on the Paillier cryptosystem. Our construction makes a batch of update operations at unit cost. We prove its security under the extended strong RSA (es-RSA) assumption
Resumo:
The prospect of economically producing useful biologics in plants has greatly increased with the advent of viral vectors. The ability of viral vectors to amplify transgene expression has seen them develop into robust transient platforms for the high-level, rapid production of recombinant proteins. To adapt these systems to stably transformed plants, new ways of deconstructing the virus machinery and linking its expression and replication to chemically controlled promoters have been developed. The more advanced of these stable, inducible hyper-expression vectors provide both activated and amplified heterologous transgene expression. Such systems could be deployed in broad acre crops and provide a pathway to fully exploit the advantages of plants as a platform for the manufacture of a wide spectrum of products.
Resumo:
Long-term systematic population monitoring data sets are rare but are essential in identifying changes in species abundance. In contrast, community groups and natural history organizations have collected many species lists. These represent a large, untapped source of information on changes in abundance but are generally considered of little value. The major problem with using species lists to detect population changes is that the amount of effort used to obtain the list is often uncontrolled and usually unknown. It has been suggested that using the number of species on the list, the "list length," can be a measure of effort. This paper significantly extends the utility of Franklin's approach using Bayesian logistic regression. We demonstrate the value of List Length Analysis to model changes in species prevalence (i.e., the proportion of lists on which the species occurs) using bird lists collected by a local bird club over 40 years around Brisbane, southeast Queensland, Australia. We estimate the magnitude and certainty of change for 269 bird species and calculate the probabilities that there have been declines and increases of given magnitudes. List Length Analysis confirmed suspected species declines and increases. This method is an important complement to systematically designed intensive monitoring schemes and provides a means of utilizing data that may otherwise be deemed useless. The results of List Length Analysis can be used for targeting species of conservation concern for listing purposes or for more intensive monitoring. While Bayesian methods are not essential for List Length Analysis, they can offer more flexibility in interrogating the data and are able to provide a range of parameters that are easy to interpret and can facilitate conservation listing and prioritization. © 2010 by the Ecological Society of America.
Resumo:
In this paper, we show implementation results of various algorithms that sort data encrypted with Fully Homomorphic Encryption scheme based on Integers. We analyze the complexities of sorting algorithms over encrypted data by considering Bubble Sort, Insertion Sort, Bitonic Sort and Odd-Even Merge sort. Our complexity analysis together with implementation results show that Odd-Even Merge Sort has better performance than the other sorting techniques. We observe that complexity of sorting in homomorphic domain will always have worst case complexity independent of the nature of input. In addition, we show that combining different sorting algorithms to sort encrypted data does not give any performance gain when compared to the application of sorting algorithms individually.
Resumo:
An annotated check list of Ramularia species in Australia, based on re-examinations of collections deposited at BRIP, DAR and VPRI, is presented. Twenty-eight species are reported in Australia, most of them on introduced host plants. The new species Cladosporium myrtacearum, Ramularia craspediicola and R. muehlenbeckiae are described. Collections of Cladosporium uredinicola, Neoramularia karelii, Passalora perfoliati and Pseudocercospora pongamiae-pinnatae, previously deposited in Australian herbaria under 'Ramularia sp.', are newly recognised for Australia.