924 resultados para state-controlled contexts
Resumo:
Purpose: To analyse the effects of two interventions on the cognition and balance of institutionalized elderly people with mixed dementia.Methods: Fifty-four participants were allocated into three groups. Group 1 was assisted by an interdisciplinary programme comprising physiotherapy, occupational therapy and physical education. A physiotherapist alone carried out the intervention in group 2. Group 3 was considered as control. Assessors were blinded to guarantee the absence of bias. Cognitive functions were analysed with the Mini-Mental State Examination and the Brief Cognitive Screening Battery. Balance was assessed with the Berg Balance Scale and the Timed Get-Up-and-Go Test. Multiple analysis of variance (MANOVA) was used to test possible main effects of the interventions.Results: The results showed benefits on the balance of subjects in both groups 1 (F=3.9, P < 0.05) and 2 (F= 3.1, P < 0.05), compared with group 3. MANOVA did not indicate benefits on the cognitive functions between groups 1 and 3 (F= 1.1, P > 0.05) and groups 2 and 3 (F= 1.6, P > 0.05). However, univariate analysis indicated some benefits of the interdisciplinary intervention on two specific domains measured by the Brief Cognitive Screening Battery (F=26.5, P < 0.05; F= 4.4, P < 0.05).Conclusion: Six months of multidisciplinary or physiotherapeutic intervention were able to improve a person's balance. Although global cognition did not improve through treatment, when the intervention was carried out on a multidisciplinary basis we observed an attenuation in the decline of global cognition on two specific cognitive domains. Exercises applied in different contexts may have positive outcomes for people with dementia.
Resumo:
p13suc1 has two native states, a monomer and a domain-swapped dimer. We show that their folding pathways are connected by the denatured state, which introduces a kinetic barrier between monomer and dimer under native conditions. The barrier is lowered under conditions that speed up unfolding, thereby allowing, to our knowledge for the first time, a quantitative dissection of the energetics of domain swapping. The monomer–dimer equilibrium is controlled by two conserved prolines in the hinge loop that connects the exchanging domains. These two residues exploit backbone strain to specifically direct dimer formation while preventing higher-order oligomerization. Thus, the loop acts as a loaded molecular spring that releases tension in the monomer by adopting its alternative conformation in the dimer. There is an excellent correlation between domain swapping and aggregation, suggesting they share a common mechanism. These insights have allowed us to redesign the domain-swapping propensity of suc1 from a fully monomeric to a fully dimeric protein.
Resumo:
Dissatisfaction, internationally, with existing educational practices and outcomes since the early 1990s has led to increased educational reform. At the same time, there has also been a worldwide shift in control of education away from teachers toward the state for the purposes of restructuring economies. More bureaucratic forms of curriculum and assessment have resulted, with a return to the use of more techno-rational discourse in assessment and evaluation for purposes of efficiency, accountability, impact, and performance management. There has also been an increase in the use of economic and productivity models to study educational outcomes. These models fail to account for the range of outcomes achieved and fail to identify the factors responsible for such diversity in performance.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
As a strategy to identify child sexual abuse, most Australian States and Territories have enacted legislation requiring teachers to report suspected cases. Some Australian State and non-State educational authorities have also created policy-based obligations to report suspected child sexual abuse. Significantly, these can be wider than non-existent or limited legislative duties, and therefore are a crucial element of the effort to identify sexual abuse. Yet, no research has explored the existence and nature of these policy-based duties. The first purpose of this paper is to report the results of a three-State study into policy-based reporting duties in State and non-State schools in Australia. In an extraordinary coincidence, while conducting the study, a case of failure to comply with reporting policy occurred with tragic consequences. This led to a rare example in Australia (and one of only a few worldwide) of a professional being prosecuted for failure to comply with a legislative duty. It also led to disciplinary proceedings against school staff. The second purpose of this paper is to describe this case and connect it with findings from our policy analysis.
Resumo:
How do humans respond to their social context? This question is becoming increasingly urgent in a society where democracy requires that the citizens of a country help to decide upon its policy directions, and yet those citizens frequently have very little knowledge of the complex issues that these policies seek to address. Frequently, we find that humans make their decisions more with reference to their social setting, than to the arguments of scientists, academics, and policy makers. It is broadly anticipated that the agent based modelling (ABM) of human behaviour will make it possible to treat such social effects, but we take the position here that a more sophisticated treatment of context will be required in many such models. While notions such as historical context (where the past history of an agent might affect its later actions) and situational context (where the agent will choose a different action in a different situation) abound in ABM scenarios, we will discuss a case of a potentially changing context, where social effects can have a strong influence upon the perceptions of a group of subjects. In particular, we shall discuss a recently reported case where a biased worm in an election debate led to significant distortions in the reports given by participants as to who won the debate (Davis et al 2011). Thus, participants in a different social context drew different conclusions about the perceived winner of the same debate, with associated significant differences among the two groups as to who they would vote for in the coming election. We extend this example to the problem of modelling the likely electoral responses of agents in the context of the climate change debate, and discuss the notion of interference between related questions that might be asked of an agent in a social simulation that was intended to simulate their likely responses. A modelling technology which could account for such strong social contextual effects would benefit regulatory bodies which need to navigate between multiple interests and concerns, and we shall present one viable avenue for constructing such a technology. A geometric approach will be presented, where the internal state of an agent is represented in a vector space, and their social context is naturally modelled as a set of basis states that are chosen with reference to the problem space.
Resumo:
Volatile properties of particle emissions from four compressed natural gas (CNG) and four diesel buses were investigated under steady state and transient driving modes on a chassis dynamometer. The exhaust was diluted utilising a full-flow continuous volume sampling system and passed through a thermodenuder at controlled temperature. Particle number concentration and size distribution were measured with a condensation particle counter and a scanning mobility particle sizer, respectively. We show that, while almost all the particles emitted by the CNG buses were in the nanoparticle size range, at least 85% and 98% were removed at 100ºC and 250ºC, respectively. Closer analysis of the volatility of particles emitted during transient cycles showed that volatilisation began at around 40°C with the majority occurring by 80°C. Particles produced during hard acceleration from rest exhibited lower volatility than that produced during other times of the cycle. Based on our results and the observation of ash deposits on the walls of the tailpipes, we suggest that these non-volatile particles were composed mostly of ash from lubricating oil. Heating the diesel bus emissions to 100ºC removed ultrafine particle numbers by 69% to 82% when a nucleation mode was present and just 18% when it was not.
Resumo:
This paper discusses the technique of ‘yarning’ as an action research process relevant for policy development work with Aboriginal peoples. Through a case study of an Aboriginal community-based smoking project in the Australian State of Victoria, the paper demonstrates how the Aboriginal concept of ‘yarning’ can be used to empower people to create policy change that not only impacts on their own health, but also impacts on the health of others and the Aboriginal organisation for which they work. The paper presents yarning within the context of models of empowerment and a methodological approach of participatory action research. The method is based on respect and inclusivity, with the final policy developed by staff for staff. Yarning is likely to be successful for action researchers working within a variety of Indigenous contexts.
Resumo:
We report a method for controlling the exposed facets and hence the dimensionality and shape of ZnO nanocrystals using a non-hydrolytic aminolysis synthesis route. The effects of changes to reaction conditions on ZnO formation were investigated and possible self-assembly mechanisms proposed. The crystal facet growth and hence morphologies of the ZnO nanocrystals were controlled by varying reaction temperature and the reactant ratio. Four distinct ZnO nanocrystal types were produced (nanocones, nanobullets, nanorods and nanoplates). The relative photocatalytic activities of the exposed facets of these ZnO nanostructures were also examined, which showed the activities obviously depended on the reactivity of exposed crystal facets in the order: {1011}>>{0001}, {1010}.
Resumo:
Advances in solid-state switches and power electronics techniques have led to the development of compact, efficient and more reliable pulsed power systems. This paper proposes an efficient scheme that utilizes modular switch-capacitor units in obtaining high voltage levels with fast rise time (dv/dt) using low voltage solid-state switches. The proposed pulsed power supply has flexibility in terms of controlling energy and generating broad range of voltage levels. The energy flow can be controlled as the stored energy can be adjusted by a current source utilized at the first stage of the system. Desirable voltage level can be obtained by connecting adequate number of switch-capacitor units. Moreover, the proposed topology is load independent. Therefore it can easily supply wide range of applications especially the low impedance ones. The effectiveness of the proposed approach is verified by simulations
Resumo:
Controlled drug delivery is a key topic in modern pharmacotherapy, where controlled drug delivery devices are required to prolong the period of release, maintain a constant release rate, or release the drug with a predetermined release profile. In the pharmaceutical industry, the development process of a controlled drug delivery device may be facilitated enormously by the mathematical modelling of drug release mechanisms, directly decreasing the number of necessary experiments. Such mathematical modelling is difficult because several mechanisms are involved during the drug release process. The main drug release mechanisms of a controlled release device are based on the device’s physiochemical properties, and include diffusion, swelling and erosion. In this thesis, four controlled drug delivery models are investigated. These four models selectively involve the solvent penetration into the polymeric device, the swelling of the polymer, the polymer erosion and the drug diffusion out of the device but all share two common key features. The first is that the solvent penetration into the polymer causes the transition of the polymer from a glassy state into a rubbery state. The interface between the two states of the polymer is modelled as a moving boundary and the speed of this interface is governed by a kinetic law. The second feature is that drug diffusion only happens in the rubbery region of the polymer, with a nonlinear diffusion coefficient which is dependent on the concentration of solvent. These models are analysed by using both formal asymptotics and numerical computation, where front-fixing methods and the method of lines with finite difference approximations are used to solve these models numerically. This numerical scheme is conservative, accurate and easily implemented to the moving boundary problems and is thoroughly explained in Section 3.2. From the small time asymptotic analysis in Sections 5.3.1, 6.3.1 and 7.2.1, these models exhibit the non-Fickian behaviour referred to as Case II diffusion, and an initial constant rate of drug release which is appealing to the pharmaceutical industry because this indicates zeroorder release. The numerical results of the models qualitatively confirms the experimental behaviour identified in the literature. The knowledge obtained from investigating these models can help to develop more complex multi-layered drug delivery devices in order to achieve sophisticated drug release profiles. A multi-layer matrix tablet, which consists of a number of polymer layers designed to provide sustainable and constant drug release or bimodal drug release, is also discussed in this research. The moving boundary problem describing the solvent penetration into the polymer also arises in melting and freezing problems which have been modelled as the classical onephase Stefan problem. The classical one-phase Stefan problem has unrealistic singularities existed in the problem at the complete melting time. Hence we investigate the effect of including the kinetic undercooling to the melting problem and this problem is called the one-phase Stefan problem with kinetic undercooling. Interestingly we discover the unrealistic singularities existed in the classical one-phase Stefan problem at the complete melting time are regularised and also find out the small time behaviour of the one-phase Stefan problem with kinetic undercooling is different to the classical one-phase Stefan problem from the small time asymptotic analysis in Section 3.3. In the case of melting very small particles, it is known that surface tension effects are important. The effect of including the surface tension to the melting problem for nanoparticles (no kinetic undercooling) has been investigated in the past, however the one-phase Stefan problem with surface tension exhibits finite-time blow-up. Therefore we investigate the effect of including both the surface tension and kinetic undercooling to the melting problem for nanoparticles and find out the the solution continues to exist until complete melting. The investigation of including kinetic undercooling and surface tension to the melting problems reveals more insight into the regularisations of unphysical singularities in the classical one-phase Stefan problem. This investigation gives a better understanding of melting a particle, and contributes to the current body of knowledge related to melting and freezing due to heat conduction.
Resumo:
Background Falls are one of the most frequently occurring adverse events that impact upon the recovery of older hospital inpatients. Falls can threaten both immediate and longer-term health and independence. There is need to identify cost-effective means for preventing falls in hospitals. Hospital-based falls prevention interventions tested in randomized trials have not yet been subjected to economic evaluation. Methods Incremental cost-effectiveness analysis was undertaken from the health service provider perspective, over the period of hospitalization (time horizon) using the Australian Dollar (A$) at 2008 values. Analyses were based on data from a randomized trial among n = 1,206 acute and rehabilitation inpatients. Decision tree modeling with three-way sensitivity analyses were conducted using burden of disease estimates developed from trial data and previous research. The intervention was a multimedia patient education program provided with trained health professional follow-up shown to reduce falls among cognitively intact hospital patients. Results The short-term cost to a health service of one cognitively intact patient being a faller could be as high as A$14,591 (2008). The education program cost A$526 (2008) to prevent one cognitively intact patient becoming a faller and A$294 (2008) to prevent one fall based on primary trial data. These estimates were unstable due to high variability in the hospital costs accrued by individual patients involved in the trial. There was a 52% probability the complete program was both more effective and less costly (from the health service perspective) than providing usual care alone. Decision tree modeling sensitivity analyses identified that when provided in real life contexts, the program would be both more effective in preventing falls among cognitively intact inpatients and cost saving where the proportion of these patients who would otherwise fall under usual care conditions is at least 4.0%. Conclusions This economic evaluation was designed to assist health care providers decide in what circumstances this intervention should be provided. If the proportion of cognitively intact patients falling on a ward under usual care conditions is 4% or greater, then provision of the complete program in addition to usual care will likely both prevent falls and reduce costs for a health service.
Resumo:
The encapsulation and release of bioactive molecules from polymeric vehicles represents the holy grail of drug and growth factor delivery therapies, whereby sustained and controlled release is crucial in eliciting a positive therapeutic effect. To this end, electrospraying is rapidly emerging as a popular technology for the production of polymeric particles containing bioactive molecules. Compared with traditional emulsion fabrication techniques, electrospraying has the potential to reduce denaturation of protein drugs and affords tighter regulation over particle size distribution and morphology. In this article, we review the importance of the electrospraying parameters that enable reproducible tailoring of the particles' physical and in vitro drug release characteristics, along with discussion of existing in vivo data. Controlled morphology and monodispersity of particles can be achieved with electrospraying, with high encapsulation efficiencies and without unfavorable denaturation of bioactive molecules throughout the process. Finally, the combination of electrospraying with electrospun scaffolds, with an emphasis on tissue regeneration is reviewed, depicting a technique in its relative infancy but holding great promise for the future of regenerative medicine.
Resumo:
Introduction Falls are the most frequent adverse event reported in hospitals. Approximately 30% of in-hospital falls lead to an injury and up to 2% result in a fracture. A large randomised trial found that a trained health professional providing individualised falls prevention education to older inpatients reduced falls in a cognitively intact subgroup. This study aims to investigate whether this efficacious intervention can reduce falls and be clinically useful and cost-effective when delivered in the real-life clinical environment. Methods A stepped-wedge cluster randomised trial will be used across eight subacute units (clusters) which will be randomised to one of four dates to start the intervention. Usual care on these units includes patient's screening, assessment and implementation of individualised falls prevention strategies, ongoing staff training and environmental strategies. Patients with better levels of cognition (Mini-Mental State Examination >23/30) will receive the individualised education from a trained health professional in addition to usual care while patient's feedback received during education sessions will be provided to unit staff. Unit staff will receive training to assist in intervention delivery and to enhance uptake of strategies by patients. Falls data will be collected by two methods: case note audit by research assistants and the hospital falls reporting system. Cluster-level data including patient's admissions, length of stay and diagnosis will be collected from hospital systems. Data will be analysed allowing for correlation of outcomes (clustering) within units. An economic analysis will be undertaken which includes an incremental cost-effectiveness analysis. Ethics and dissemination The study was approved by The University of Notre Dame Australia Human Research Ethics Committee and local hospital ethics committees. Results The results will be disseminated through local site networks, and future funding and delivery of falls prevention programmes within WA Health will be informed. Results will also be disseminated through peer-reviewed publications and medical conferences.