658 resultados para regular identity
Resumo:
Following the seminal work on personal identity of Erikson, Marcia's identity status model has been one of the most enduring paradigms. The Ego Identity Process Questionnaire (EIPQ; Balistreri, Busch-Rossnagel, & Geissinger, 1995) is a widely used measure of identity status. The purpose of this study was to evaluate the factor structure and the reliability of a French version of the EIPQ. The hypothesized structures were not confirmed. In light of the failed attempts to validate the original version, an alternative short-form version of the EIPQ (EIPQ-SF), maintaining the integrity of the original model, was developed in one sample and cross-validated in another sample. Additionally, theoretically consistent associations between the EIPQ-SF dimensions and self-esteem confirmed convergent validity. Globally, the results indicated that the French short-version of the EIPQ might be a useful instrument for the assessment of the identity statuses in adolescence and emerging adulthood.
Resumo:
A cross-over controlled administration study of smoked cannabis was carried out on occasional and heavy smokers. The participants smoked a joint (11 % Δ9-tetrahydrocannabinol (THC)) or a matching placebo on two different occasions. Whole blood (WB) and oral fluid (OF) samples were collected before and up to 3.5 h after smoking the joints. Pharmacokinetic analyses were obtained from these data. Questionnaires assessing the subjective effects were administered to the subjects during each session before and after the smoking time period. THC, 11-hydroxy-THC (11-OH-THC) and 11-nor-9-carboxy-THC (THCCOOH) were analyzed in the blood by gas chromatography or liquid chromatography (LC)-tandem mass spectrometry (MS/MS). The determination of THC, THCCOOH, cannabinol (CBN), and Δ9-tetrahydrocannabinolic acid A (THC-A) was carried out on OF only using LC-MS/MS. In line with the widely accepted assumption that cannabis smoking results in a strong contamination of the oral cavity, we found that THC, and also THC-A, shows a sharp, high concentration peak just after smoking, with a rapid decrease in these levels within 3 h. No obvious differences were found between both groups concerning THC median maximum concentrations measured either in blood or in OF; these levels were equal to 1,338 and 1,041 μg/L in OF and to 82 and 94 μg/L in WB for occasional and heavy smokers, respectively. The initial WB THCCOOH concentration was much higher in regular smokers than in occasional users. Compared with the occasional smokers, the sensation of confusion felt by the regular smokers was much less while the feeling of intoxication remained almost unchanged.
Resumo:
Process variations are a major bottleneck for digital CMOS integrated circuits manufacturability and yield. That iswhy regular techniques with different degrees of regularity are emerging as possible solutions. Our proposal is a new regular layout design technique called Via-Configurable Transistors Array (VCTA) that pushes to the limit circuit layout regularity for devices and interconnects in order to maximize regularity benefits. VCTA is predicted to perform worse than the Standard Cell approach designs for a certain technology node but it will allow the use of a future technology on an earlier time. Ourobjective is to optimize VCTA for it to be comparable to the Standard Cell design in an older technology. Simulations for the first unoptimized version of our VCTA of delay and energy consumption for a Full Adder circuit in the 90 nm technology node are presented and also the extrapolation for Carry-RippleAdders from 4 bits to 64 bits.
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.
Resumo:
Essay on the origin, use and development of the arcuated lintel in ancient Rome and the configuration of the so– called ‘Serlian motif’. These architectural elements will be related to the architecture of prestige on its technical, functional, visual and symbolic sphere. Its depictions, in addition to buildings, can offer a rich repertory of images that speak about the relations between visual culture, religion and power. Furthermore, the analyzed motifs will become important elements of the Western cultural legacy for centuries. The analysis of these events will contribute to the comprehension of the role played by some resources of ancient Rome architecture of prestige and its success
Resumo:
3,537 men enrolling in 2007 for mandatory army recruitment procedures were assessed for the co-occurrence of risky licit substance use among risky cannabis users. Risky cannabis use was defined as at least twice weekly; risky alcohol use as 6+ drinks more than once/monthly, or more than 20 drinks per week; and risky tobacco use as daily smoking. Ninety-five percent of all risky cannabis users reported other risky use. They began using cannabis earlier than did non-risky users, but age of onset was unrelated to other risky substance use. A pressing public health issue among cannabis users stems from risky licit substance use warranting preventive efforts within this age group.
Resumo:
The production and use of false identity and travel documents in organized crime represent a serious and evolving threat. However, a case-by-case perspective, thus suffering from linkage blindness and a limited analysis capacity, essentially drives the present-day fight against this criminal problem. To assist in overcoming these limitations, a process model was developed using a forensic perspective. It guides the systematic analysis and management of seized false documents to generate forensic intelligence that supports strategic and tactical decision-making in an intelligence-led policing approach. The model is articulated on a three-level architecture that aims to assist in detecting and following-up on general trends, production methods and links between cases or series. Using analyses of a large dataset of counterfeit and forged identity and travel documents, it is possible to illustrate the model, its three levels and their contribution. Examples will point out how the proposed approach assists in detecting emerging trends, in evaluating the black market's degree of structure, in uncovering criminal networks, in monitoring the quality of false documents, and in identifying their weaknesses to orient the conception of more secured travel and identity documents. The process model proposed is thought to have a general application in forensic science and can readily be transposed to other fields of study.
Resumo:
Gender identity disorder is defined as a permanent desire to relieve one's own sexual features to acquire the sexual features and line to life of the opposite sex. The diagnosis is based on the psychiatric evaluation and treatment on an interdisciplinary approach by endocrinologists, surgeons and psychiatrists, and can be conceptualized into distinct phases: diagnostic evaluation, real life experience, hormonal treatment and surgery. Multiples challenges have to be faced, especially by the psychiatrist who follows the patient during the whole process.
Resumo:
Forensic intelligence is a distinct dimension of forensic science. Forensic intelligence processes have mostly been developed to address either a specific type of trace or a specific problem. Even though these empirical developments have led to successes, they are trace-specific in nature and contribute to the generation of silos which hamper the establishment of a more general and transversal model. Forensic intelligence has shown some important perspectives but more general developments are required to address persistent challenges. This will ensure the progress of the discipline as well as its widespread implementation in the future. This paper demonstrates that the description of forensic intelligence processes, their architectures, and the methods for building them can, at a certain level, be abstracted from the type of traces considered. A comparative analysis is made between two forensic intelligence approaches developed independently in Australia and in Europe regarding the monitoring of apparently very different kind of problems: illicit drugs and false identity documents. An inductive effort is pursued to identify similarities and to outline a general model. Besides breaking barriers between apparently separate fields of study in forensic science and intelligence, this transversal model would assist in defining forensic intelligence, its role and place in policing, and in identifying its contributions and limitations. The model will facilitate the paradigm shift from the current case-by-case reactive attitude towards a proactive approach by serving as a guideline for the use of forensic case data in an intelligence-led perspective. A follow-up article will specifically address issues related to comparison processes, decision points and organisational issues regarding forensic intelligence (part II).
Resumo:
Purpose The purpose of our multidisciplinary study was to define a pragmatic and secure alternative to the creation of a national centralised medical record which could gather together the different parts of the medical record of a patient scattered in the different hospitals where he was hospitalised without any risk of breaching confidentiality. Methods We first analyse the reasons for the failure and the dangers of centralisation (i.e. difficulty to define a European patients' identifier, to reach a common standard for the contents of the medical record, for data protection) and then propose an alternative that uses the existing available data on the basis that setting up a safe though imperfect system could be better than continuing a quest for a mythical perfect information system that we have still not found after a search that has lasted two decades. Results We describe the functioning of Medical Record Search Engines (MRSEs), using pseudonymisation of patients' identity. The MRSE will be able to retrieve and to provide upon an MD's request all the available information concerning a patient who has been hospitalised in different hospitals without ever having access to the patient's identity. The drawback of this system is that the medical practitioner then has to read all of the information and to create his own synthesis and eventually to reject extra data. Conclusions Faced with the difficulties and the risks of setting up a centralised medical record system, a system that gathers all of the available information concerning a patient could be of great interest. This low-cost pragmatic alternative which could be developed quickly should be taken into consideration by health authorities.