991 resultados para ID-TIMS
Resumo:
Aim: The movement from a medical model of disability to a more social model implies an imperative to include the views of people with ID in research regarding their care. Contemporary quality processes in improving care require consumer involvement at many levels and in doing so have shown better outcomes. A New Zealand research study is being undertaken utilizing focus groups with people with ID to understand their experiences during a psychiatric inpatient admission. The primary focus of this presentation will concern the literature review, undertaken as part of the study, of research in which people with ID have participated. Method: The literature review was conducted using a variety of electronic databases and search terms to identify studies with people with ID as active participants. Results: Only a few studies have been undertaken with people with ID as participants. While these studies demonstrate numerous benefits in including the voice of the person with ID this still remains absent from much of the research discourse. Conclusion: It is accepted and indeed advocated that people with ID have the same rights as others in regard to choosing whether or not they wish to participate in research. High response rates in the few identified studies indicated that people with ID are eager to be consulted. It is recommended that the unique needs of people with ID be taken into account in the research evidence base for future services.
Resumo:
One of the concerns about the use of Bluetooth MAC Scanner (BMS) data, especially from urban arterial, is the bias in the travel time estimates from multiple Bluetooth devices being transported by a vehicle. For instance, if a bus is transporting 20 passengers with Bluetooth equipped mobile phones, then the discovery of these mobile phones by BMS will be considered as 20 different vehicles, and the average travel time along the corridor estimated from the BMS data will be biased with the travel time from the bus. This paper integrates Bus Vehicle Identification system with BMS network to empirically evaluate such bias, if any. The paper also reports an interesting finding on the uniqueness of MAC IDs.
Resumo:
The only effective and scalable way to regulate the actions of people on the internet is through online intermediaries. These are the institutions that facilitate communication: internet service providers, search engines, content hosts, and social networks. Governments, private firms, and civil society organisations are increasingly seeking to influence these intermediaries to take more responsibility to prevent or respond to IP infringements. Around the world, intermediaries are increasingly subject to a variety of obligations to help enforce IP rights, ranging from informal social and governmental pressure, to industry codes and private negotiated agreements, to formal legislative schemes. This paper provides an overview of this emerging shift in regulatory approaches, away from legal liability and towards increased responsibilities for intermediaries. This shift straddles two different potential futures: an optimistic set of more effective, more efficient mechanisms for regulating user behaviour, and a dystopian vision of rule by algorithm and private power, without the legitimising influence of the rule of law.
Resumo:
Motivated by a suggestion in our earlier work [G. Baskaran, Phys. Rev. B 65, 212505 (2002)], we study electron correlation driven superconductivity in doped graphene where on-site correlations are believed to be of intermediate strength. Using an extensive variational Monte Carlo study of the repulsive Hubbard model and a correlated ground state wave function, we show that doped graphene supports a superconducting ground state with a d+id pairing symmetry. We estimate superconductivity reaching room temperatures at an optimal doping of about 15%-20%. Our work suggests that correlations can stabilize superconductivity even in systems with intermediate coupling.
Resumo:
Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.