982 resultados para Boyd, Alan
Resumo:
The relationship between radiologic union and clinical outcomes in thoracoscopic scoliosis surgery is not clear, as apparent non-union of a spinal fusion does not always correspond to a poor clinical result. The aim of this study was to evaluate for the first time the interbody fusion rates using low dose CT scans at minimum 24 months after thoracoscopic scoliosis surgery, and to explore the relationship between fusion scores and; (i) rod diameter, (ii) graft type, (iii) fusion level, (iv) implant failure, and (v) lateral position in the disc space. The study found that moderate fusion scores on the Sucato scale secure successful clinical outcomes in thoracoscopic scoliosis surgery.
Resumo:
Research Question How do women who choose not to breastfeed perceive their healthcare experience? Method This qualitative research study used a phenomenographic approach to explore the healthcare experience of women who do not breastfeed. Seven women were interviewed about their healthcare experience relating to their choice of feeding, approximately four weeks after giving birth. Six conceptions were identified and an outcome space was developed to demonstrate the relationships and meaning of the conceptions in a visual format. Findings There were five unmet needs identified by the participants during this study. These needs included equity, self sufficiency, support, education and the need not to feel pressured. Conclusion Women in this study who chose not to breastfeed identified important areas where they felt that their needs were not met. In keeping with the Code of Ethics for Nurses and Midwives, the identified needs of women who do not breastfeed must be addressed in a caring, compassionate and just manner. The care and education of women who formula feed should be of the highest standard possible, even if the choice not to breastfeed is not the preferred choice of healthcare professionals.
Resumo:
This paper presents a key based generic model for digital image watermarking. The model aims at addressing an identified gap in the literature by providing a basis for assessing different watermarking requirements in various digital image applications. We start with a formulation of a basic watermarking system, and define system inputs and outputs. We then proceed to incorporate the use of keys in the design of various system components. Using the model, we also define a few fundamental design and evaluation parameters. To demonstrate the significance of the proposed model, we provide an example of how it can be applied to formally define common attacks.
Resumo:
This paper explores student self-censorship within an online learning environment. Self-censorship in group activity can be seen as a two-edged sword. While it can be advantageous that a student censor personal frustration and angst when working with others, if the self-censorship impacts on the cognitive contribution a student makes then this may significantly impact upon the overall quality of the group’s collective knowledge artefact. This paper reports on a study where it was found that students had self censored both their feelings and ideas as they collaboratively worked together.
Resumo:
Entertainment Industries is the first book to map entertainment as a cultural system. Including work from world-renowned analysts such as Henry Jenkins and Jonathan Gray, this innovative collection explains what entertainment is and how it works. Entertainment is audience-centred culture. The Entertainment Industries are a uniquely interdisciplinary collection of evolving businesses that openly monitor evolving cultural trends and work within them. The producers of entertainment – central to that practice– are the new artists. They understand audiences and combine creative, business and legal skills in order to produce cultural products that cater to them. Entertainment Industries describes the characteristics of entertainment, the systems that produce it, and the role of producers and audiences in its development, as well as explaining the importance of this area of study, and how it might be better integrated into Universities.
Resumo:
Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.
Resumo:
According to the diagnosis of schizophrenia in the DSM-IV-TR (American Psychiatric Association, 2000), negative symptoms are those personal characteristics that are thought to be reduced from normal functioning, while positive symptoms are aspects of functioning that exist as an excess or distortion of normal functioning. Negative symptoms are generally considered to be a core feature of people diagnosed with schizophrenia. However, negative symptoms are not always present in those diagnosed, and a diagnosis can be made with only negative or only positive symptoms, or with a combination of both. Negative symptoms include an observed loss of emotional expression (affective flattening), loss of motivation or self directedness (avolition), loss of speech (alogia), and also a loss of interests and pleasures (anhedonia). Positive symptoms include the perception of things that others do not perceive (hallucinations), and extraordinary explanations for ordinary events (delusions) (American Psychiatric Association, 2000). Both negative and positive symptoms are derived from watching the patient and thus do not consider the patient’s subjective experience. However, aspects of negative symptoms, such as observed affective flattening are highly contended. Within conventional psychiatry, the absence of emotional expression is assumed to coincide with an absence of emotional experience. Contrasting research findings suggests that patients who were observed to score low on displayed emotional expression, scored high on self ratings of emotional experience. Patients were also observed to be significantly lower on emotional expression when compared with others (Aghevli, Blanchard, & Horan, 2003; Selton, van der Bosch, & Sijben, 1998). It appears that there is little correlation between emotional experience and emotional expression in patients, and that observer ratings cannot help us to understand the subjective experience of the negative symptoms. This chapter will focus on research into the subjective experiences of negative symptoms. A framework for these experiences will be used from the qualitative research findings of the primary author (Le Lievre, 2010). In this study, the primary author found that subjective experiences of the negative symptoms belonged to one of the two phases of the illness experience; “transitioning into emotional shutdown” or “recovering from emotional shutdown”. This chapter will use the six themes from the phase of “transitioning into emotional shutdown”. This phase described the experience of turning the focus of attention away from the world and onto the self and the past, thus losing contact with the world and others (emotional shutdown). Transitioning into emotional shutdown involved; “not being acknowledged”, “relational confusion”, “not being expressive”, “reliving the past”, “detachment”, and “no sense of direction” (Le Lievre, 2010). Detail will be added to this framework of experience from other qualitative research in this area. We will now review the six themes that constitute a “transition into emotional shutdown” and corresponding previous research findings.
Resumo:
Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.
Resumo:
Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denial-of-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisional Diffie-Hellman (DDH) assumption. We show that security of the JFK protocol, when reusing ephemeral Diffie-Hellman keys, appears to require the Gap Diffie-Hellman (GDH) assumption in the random oracle model. We propose a new variant of JFK that avoids the identified DoS vulnerability and provides perfect forward secrecy even under the DDH assumption, achieving the full security promised by the JFK protocol.