943 resultados para Nil Ideal
Resumo:
Fables of sovereignty / Wayne Hudson Sovereignty discourse and practice : past and future / Joseph Camilleri Guises of sovereignty / Gerry Simpson Westphalian and Islamic concepts of sovereignty in the Middle East / Amin Saikal Wither sovereignty in Southeast Asia today? / See Seng Tan Ambivalent sovereignty : China and re-imagining the Westphalian ideal / Yongjin Zhang Confronting terrorism : dilemmas of principle and practice regarding sovereignty / Brian L. Job Sovereignty in the 21st century : security, immigration, and refugees / Howard Adelman State sovereignty and international refugee protection / Robyn Lui Do no harm : towards a Hippocratic standard for international civilisation / Neil Arya Sovereignty and the global politics of the environment : beyond Westphalia? / Lorraine Elliott Westphalian sovereignty in the shadow of international justice? a fresh coat of paint for a tainted concept / Jackson Nyamuya Maogoto Development assistance and the hollow sovereignty of the weak / Roland Rich Corruption and transparency in governance and development : reinventing sovereignty for promoting good governance / C. Raj Kumar Re-envisioning economic sovereignty : developing countries and the International Monetary Fund / Ross P. Buckley Trust, legitimacy, and the sharing of sovereignty / William Maley Sovereignty as indirect rule / Barry Hindess Indigenous sovereignty / Paul Keal Civil society in a post-statist circumstance / Jan Aart Scholte.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
In this paper we propose a new method for utilising phase information by complementing it with traditional magnitude-only spectral subtraction speech enhancement through Complex Spectrum Subtraction (CSS). The proposed approach has the following advantages over traditional magnitude-only spectral subtraction: (a) it introduces complementary information to the enhancement algorithm; (b) it reduces the total number of algorithmic parameters, and; (c) is designed for improving clean speech magnitude spectra and is therefore suitable for both automatic speech recognition (ASR) and speech perception applications. Oracle-based ASR experiments verify this approach, showing an average of 20% relative word accuracy improvements when accurate estimates of the phase spectrum are available. Based on sinusoidal analysis and assuming stationarity between observations (which is shown to be better approximated as the frame rate is increased), this paper also proposes a novel method for acquiring the phase information called Phase Estimation via Delay Projection (PEDEP). Further oracle ASR experiments validate the potential for the proposed PEDEP technique in ideal conditions. Realistic implementation of CSS with PEDEP shows performance comparable to state of the art spectral subtraction techniques in a range of 15-20 dB signal-to-noise ratio environments. These results clearly demonstrate the potential for using phase spectra in spectral subtractive enhancement applications, and at the same time highlight the need for deriving more accurate phase estimates in a wider range of noise conditions.
Resumo:
If the student wellbeing pedagogy characterised by the troika metaphor is to become more widely adopted, beginning teachers need to be inducted into service learning. In this chapter, we discuss the implementation and outcomes of a service learning program in a Bachelor of Education course in Australia. The program provides pre-service teachers with insights into service learning practice. Pre-service teachers are given supported opportunities to examine and challenge traditional beliefs and values about student diversity and the role of schools in developing a more inclusive society. They are supported in developing ethics of care and concern for inclusive and equitable practices – characteristics necessary for quality teaching. Thus, the Queensland University of Technology (QUT) service learning program is an ideal example of the troika effect in practice, in that the pedagogy fuses values education, quality teaching and service learning to develop within each student an inclusive ethical framework that will inform their classroom practice as beginning quality teachers.
Resumo:
The ideal dermal matrix should be able to provide the right biological and physical environment to ensure homogenous cell and extracellular matrix (ECM) distribution, as well as the right size and morphology of the neo-tissue required. Four natural and synthetic 3D matrices were evaluated in vitro as dermal matrices, namely (1) equine collagen foam, TissuFleece®, (2) acellular dermal replacement, Alloderm®, (3) knitted poly(lactic-co-glycolic acid) (10:90)–poly(-caprolactone) (PLGA–PCL) mesh, (4) chitosan scaffold. Human dermal fibroblasts were cultured on the specimens over 3 weeks. Cell morphology, distribution and viability were assessed by electron microscopy, histology and confocal laser microscopy. Metabolic activity and DNA synthesis were analysed via MTS metabolic assay and [3H]-thymidine uptake, while ECM protein expression was determined by immunohistochemistry. TissuFleece®, Alloderm® and PLGA–PCL mesh supported cell attachment, proliferation and neo-tissue formation. However, TissuFleece® contracted to 10% of the original size while Alloderm® supported cell proliferation predominantly on the surface of the material. PLGA–PCL mesh promoted more homogenous cell distribution and tissue formation. Chitosan scaffolds did not support cell attachment and proliferation. These results demonstrated that physical characteristics including porosity and mechanical stability to withstand cell contraction forces are important in determining the success of a dermal matrix material.
Resumo:
The upper Condamine River in southern Queensland has formed extensive alluvial deposits which have been used for irrigation of cotton crops for over 40 years. Due to excessive use and long term drought conditions these groundwater resources are under substantial threat. This condition is now recognised by all stakeholders, and Qld Department of Environment and Resource Management (DERM) are currently undertaking a water planning process for the Central Condamine Alluvium with water users and other stakeholders. DERM aims to effectively demonstrate the character of the groundwater system and its current status, and notably the continued long-term drawdown of the watertable. It was agreed that 3D visualisation was an ideal tool to achieve this. The Groundwater Visualisation System (GVS) developed at QUT was utilised and the visualisation model developed in conjunction with DERM to achieve a planning-management tool for this particular application
Resumo:
The demand for high quality rail services in the twenty-first century has put an ever increasing demand on all rail operators. In order to meet the expectation of their patrons, the maintenance regime of railway systems has to be tightened up, the track conditions have to be well looked after, the rolling stock must be designed to withstand heavy duty. In short, in an ideal world where resources are unlimited, one needs to implement a very rigorous inspection regime in order to take care of the modem needs of a railway system [1]. If cost were not an issue, the maintenance engineers could inspect the train body by the most up-to-date techniques such as ultra-sound examination, x-ray inspection, magnetic particle inspection, etc. on a regular basis. However it is inconceivable to have such a perfect maintenance regime in any commercial railway. Likewise, it is impossible to have a perfect rolling stock which can weather all the heavy duties experienced in a modem railway. Hence it is essential that some condition monitoring schemes are devised to pick up potential defects which could manifest into safety hazards. This paper introduces an innovative condition monitoring system for track profile and, together with an instrumented car to carry out surveillance of the track, will provide a comprehensive railway condition monitoring system which is free from the usual difficulty of electromagnetic compatibility issues in a typical railway environment
Resumo:
This paper takes the position that children are at risk of being marginalised when research methods are not tailored to their requirements. In particular, children who are negotiating early adolescence are presented as an ideal group for involvement with narrative research approaches that attempt to be flexible and creative. With the premise that the need to juggle multiple realities within complex societal structures is challenging and isolating for such children, narrative methods offer a promising mode of access to their individual realities. Children's own self-narratives in the form of email journal entries are proposed as research tools that can help to minimise issues arising from resistance to adults and problems of shared vocabulary that may occur using more traditional methods. Digital journaling, as a means of capturing self-narratives, can provide a convenient space for young people to generate and share their own personal accounts of their lives and their experiences that can also serve to inform others. Guidelines are offered for how to manage a journaling project that is not reliant on children's physical presence within school settings. Digital journals are thus described as multi-function mechanisms that can support personal growth as well as promote shared understandings and social fairness between adults and children.
Resumo:
The use of porous structures as tissue engineering scaffolds imposes demands on structural parameters such as porosity, pore size and interconnectivity. For the structural analysis of porous scaffolds, micro-computed tomography (μCT) is an ideal tool. μCT is a 3D X-ray imaging method that has several advantages over scanning electron microscopy (SEM) and other conventional characterisation techniques: • visualisation in 3D • quantitative results • non-destructiveness • minimal sample preparation
Resumo:
“You need to be able to tell stories. Illustration is a literature, not a pure fine art. It’s the fine art of writing with pictures.” – Gregory Rogers. This paper reads two recent wordless picture books by Australian illustrator Gregory Rogers in order to consider how “Shakespeare” is produced as a complex object of consumption for the implied child reader: The Boy, The Bear, The Baron, The Bard (2004) and Midsummer Knight (2006). In these books other worlds are constructed via time-travel and travel to a fantasy world, and clearly presume reader competence in narrative temporality and structure, and cultural literacy (particularly in reference to Elizabethan London and William Shakespeare), even as they challenge normative concepts via use of the fantastic. Exploring both narrative sequences and individual images reveals a tension in the books between past and present, and real and imagined. Where children’s texts tend to privilege Shakespeare, the man and his works, as inherently valuable, Rogers’s work complicates any sense of cultural value. Even as these picture books depend on a lexicon of Shakespearean images for meaning and coherence, they represent William Shakespeare as both an enemy to children (The Boy), and a national traitor (Midsummer). The protagonists, a boy in the first book and the bear he rescues in the second, effect political change by defeating Shakespeare. However, where these texts might seem to be activating a postcolonial cultural critique, this is complicated both by presumed readerly competence in authorized cultural discourses and by repeated affirmation of monarchies as ideal political systems. Power, then, in these picture books is at once rewarded and withheld, in a dialectic of (possibly postcolonial) agency, and (arguably colonial) subjection, even as they challenge dominant valuations of “Shakespeare” they do not challenge understandings of the “Child”.
Resumo:
It is noted from observations of Compton (2009), Richards (2008), Taylor and Bennett (2002), and others that succession leadership planning and development fails to receive adequate attention in the corporate sector (see Byham 2002; Richards 2008; Wellins and Byham 2001). This paper acknowledges a marked paucity of systematic succession leadership development in education organisations. The need would seem to be compounded at a time when substantial attrition in the leadership ranks is expected over the next five years, reflecting widespread workforce demographics (Busine and Watt 2005; Jacobzone, Cambois, Chaplain, and Robine 1998; Taylor and Bennett 2002). The Lantern model has been developed in response to a perceived need to offer an integrated, systematic approach to organisational and succession leadership development. The model offers an organising framework for considering succession leadership development in a strategic, integrated way. The concept is based on organisational development and leadership literature which sees leadership development not as a series of 'tacked on' activities but as an organic 'whole of organisation' approach fostering the relevant knowledge, skills and understandings which support and 'grow' leaders as the organisation goes about its business. This paper explores how such an ideal might happen, and it suggests that pursuing such an ideal is timely. The leadership baton is set to shift at an accelerated rate in universities, as for organisations broadly, owing to age-related attrition. Moreover, given the increased complexity and demands of the leadership remit in the education leadership environment, it would seem particularly opportune to explore a framework concentrating on engendering a positive, connected organisational climate capable of growing strategic leadership strength from within. Eight core elements of the model, derived from the literature and practice research, are explored. The Lantern model purports to 'cover the bases' of succession leadership development, with particular reference to the education environment. The model is next described
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Prostate cancer is the second most common cause of cancer-related deaths in Western males. Current diagnostic, prognostic and treatment approaches are not ideal and advanced metastatic prostate cancer is incurable. There is an urgent need for improved adjunctive therapies and markers for this disease. GPCRs are likely to play a significant role in the initiation and progression of prostate cancer. Over the last decade, it has emerged that G protein coupled receptors (GPCRs) are likely to function as homodimers and heterodimers. Heterodimerisation between GPCRs can result in the formation of novel pharmacological receptors with altered functional outcomes, and a number of GPCR heterodimers have been implicated in the pathogenesis of human disease. Importantly, novel GPCR heterodimers represent potential new targets for the development of more specific therapeutic drugs. Ghrelin is a 28 amino acid peptide hormone which has a unique n-octanoic acid post-translational modification. Ghrelin has a number of important physiological roles, including roles in appetite regulation and the stimulation of growth hormone release. The ghrelin receptor is the growth hormone secretagogue receptor type 1a, GHS-R1a, a seven transmembrane domain GPCR, and GHS-R1b is a C-terminally truncated isoform of the ghrelin receptor, consisting of five transmembrane domains. Growing evidence suggests that ghrelin and the ghrelin receptor isoforms, GHS-R1a and GHS-R1b, may have a role in the progression of a number of cancers, including prostate cancer. Previous studies by our research group have shown that the truncated ghrelin receptor isoform, GHS-R1b, is not expressed in normal prostate, however, it is expressed in prostate cancer. The altered expression of this truncated isoform may reflect a difference between a normal and cancerous state. A number of mutant GPCRs have been shown to regulate the function of their corresponding wild-type receptors. Therefore, we investigated the potential role of interactions between GHS-R1a and GHS-R1b, which are co-expressed in prostate cancer and aimed to investigate the function of this potentially new pharmacological receptor. In 2005, obestatin, a 23 amino acid C-terminally amidated peptide derived from preproghrelin was identified and was described as opposing the stimulating effects of ghrelin on appetite and food intake. GPR39, an orphan GPCR which is closely related to the ghrelin receptor, was identified as the endogenous receptor for obestatin. Recently, however, the ability of obestatin to oppose the effects of ghrelin on appetite and food intake has been questioned, and furthermore, it appears that GPR39 may in fact not be the obestatin receptor. The role of GPR39 in the prostate is of interest, however, as it is a zinc receptor. Zinc has a unique role in the biology of the prostate, where it is normally accumulated at high levels, and zinc accumulation is altered in the development of prostate malignancy. Ghrelin and zinc have important roles in prostate cancer and dimerisation of their receptors may have novel roles in malignant prostate cells. The aim of the current study, therefore, was to demonstrate the formation of GHS-R1a/GHS-R1b and GHS-R1a/GPR39 heterodimers and to investigate potential functions of these heterodimers in prostate cancer cell lines. To demonstrate dimerisation we first employed a classical co-immunoprecipitation technique. Using cells co-overexpressing FLAG- and Myc- tagged GHS-R1a, GHS-R1b and GPR39, we were able to co-immunoprecipitate these receptors. Significantly, however, the receptors formed high molecular weight aggregates. A number of questions have been raised over the propensity of GPCRs to aggregate during co-immunoprecipitation as a result of their hydrophobic nature and this may be misinterpreted as receptor dimerisation. As we observed significant receptor aggregation in this study, we used additional methods to confirm the specificity of these putative GPCR interactions. We used two different resonance energy transfer (RET) methods; bioluminescence resonance energy transfer (BRET) and fluorescence resonance energy transfer (FRET), to investigate interactions between the ghrelin receptor isoforms and GPR39. RET is the transfer of energy from a donor fluorophore to an acceptor fluorophore when they are in close proximity, and RET methods are, therefore, applicable to the observation of specific protein-protein interactions. Extensive studies using the second generation bioluminescence resonance energy transfer (BRET2) technology were performed, however, a number of technical limitations were observed. The substrate used during BRET2 studies, coelenterazine 400a, has a low quantum yield and rapid signal decay. This study highlighted the requirement for the expression of donor and acceptor tagged receptors at high levels so that a BRET ratio can be determined. After performing a number of BRET2 experimental controls, our BRET2 data did not fit the predicted results for a specific interaction between these receptors. The interactions that we observed may in fact represent ‘bystander BRET’ resulting from high levels of expression, forcing the donor and acceptor into close proximity. Our FRET studies employed two different FRET techniques, acceptor photobleaching FRET and sensitised emission FRET measured by flow cytometry. We were unable to observe any significant FRET, or FRET values that were likely to result from specific receptor dimerisation between GHS-R1a, GHS-R1b and GPR39. While we were unable to conclusively demonstrate direct dimerisation between GHS-R1a, GHS-R1b and GPR39 using several methods, our findings do not exclude the possibility that these receptors interact. We aimed to investigate if co-expression of combinations of these receptors had functional effects in prostate cancers cells. It has previously been demonstrated that ghrelin stimulates cell proliferation in prostate cancer cell lines, through ERK1/2 activation, and GPR39 can stimulate ERK1/2 signalling in response to zinc treatments. Additionally, both GHS-R1a and GPR39 display a high level of constitutive signalling and these constitutively active receptors can attenuate apoptosis when overexpressed individually in some cell types. We, therefore, investigated ERK1/2 and AKT signalling and cell survival in prostate cancer the potential modulation of these functions by dimerisation between GHS-R1a, GHS-R1b and GPR39. Expression of these receptors in the PC-3 prostate cancer cell line, either alone or in combination, did not alter constitutive ERK1/2 or AKT signalling, basal apoptosis or tunicamycin-stimulated apoptosis, compared to controls. In summary, the potential interactions between the ghrelin receptor isoforms, GHS-R1a and GHS-R1b, and the related zinc receptor, GPR39, and the potential for functional outcomes in prostate cancer were investigated using a number of independent methods. We did not definitively demonstrate the formation of these dimers using a number of state of the art methods to directly demonstrate receptor-receptor interactions. We investigated a number of potential functions of GPR39 and GHS-R1a in the prostate and did not observe altered function in response to co-expression of these receptors. The technical questions raised by this study highlight the requirement for the application of extensive controls when using current methods for the demonstration of GPCR dimerisation. Similar findings in this field reflect the current controversy surrounding the investigation of GPCR dimerisation. Although GHS-R1a/GHS-R1b or GHS-R1a/GPR39 heterodimerisation was not clearly demonstrated, this study provides a basis for future investigations of these receptors in prostate cancer. Additionally, the results presented in this study and growing evidence in the literature highlight the requirement for an extensive understanding of the experimental method and the performance of a range of controls to avoid the spurious interpretation of data gained from artificial expression systems. The future development of more robust techniques for investigating GPCR dimerisation is clearly required and will enable us to elucidate whether GHS-R1a, GHS-R1b and GPR39 form physiologically relevant dimers.
Resumo:
The purpose of this article is to examine how a consumer’s weight control beliefs (WCB), a female advertising model’s body size (slim or large) and product type influence consumer evaluations and consumer body perceptions. The study uses an experiment of 371 consumers. The design of the experiment was a 2 (weight control belief: internal, external) X 2 (model size: larger sized, slim) X 2 (product type: weight controlling, non-weight controlling) between-participants factorial design. Results reveal two key contributions. First, larger sized models result in consumers feeling less pressure from society to be thin, viewing their actual shape as slimmer relative to viewing a slim model and wanting a thinner ideal body shape. Slim models result in the opposite effects. Second this research reveals a boundary condition for the extent to which endorser–product congruency theory can be generalized to endorsers of a larger body size. Results indicate that consumer WCB may be a useful variable to consider when marketers consider the use of larger models in advertising.
Resumo:
Objective: To identify agreement levels between conventional longitudinal evaluation of change (post–pre) and patient-perceived change (post–then test) in health-related quality of life. Design: A prospective cohort investigation with two assessment points (baseline and six-month follow-up) was implemented. Setting: Community rehabilitation setting. Subjects: Frail older adults accessing community-based rehabilitation services. Intervention: Nil as part of this investigation. Main measures: Conventional longitudinal change in health-related quality of life was considered the difference between standard EQ-5D assessments completed at baseline and follow-up. To evaluate patient-perceived change a ‘then test’ was also completed at the follow-up assessment. This required participants to report (from their current perspective) how they believe their health-related quality of life was at baseline (using the EQ-5D). Patient-perceived change was considered the difference between ‘then test’ and standard follow-up EQ-5D assessments. Results: The mean (SD) age of participants was 78.8 (7.3). Of the 70 participants 62 (89%) of data sets were complete and included in analysis. Agreement between conventional (post–pre) and patient-perceived (post–then test) change was low to moderate (EQ-5D utility intraclass correlation coefficient (ICC)¼0.41, EQ-5D visual analogue scale (VAS) ICC¼0.21). Neither approach inferred greater change than the other (utility P¼0.925, VAS P¼0.506). Mean (95% confidence interval (CI)) conventional change in EQ-5D utility and VAS were 0.140 (0.045,0.236) and 8.8 (3.3,14.3) respectively, while patient-perceived change was 0.147 (0.055,0.238) and 6.4 (1.7,11.1) respectively. Conclusions: Substantial disagreement exists between conventional longitudinal evaluation of change in health-related quality of life and patient-perceived change in health-related quality of life (as measured using a then test) within individuals.