987 resultados para Boyd, Mike


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Originating from the World Health Organization of alma Ata in 1978, the philosophy of Comprehensive Primary Health Care (CPHC) includes the interconnecting principles of equity, access, empowerment, community self-determination and intersectoral collaboration in order to achieve better health outcomes for all people. It encompasses addressing the social, economic, cultural and political determinants of health. CPHC when implemented correctly should lead to social inclusion. However, implementing CPHC is complex due to misunderstandings about what it encompasses and about how to achieve the intended goals. This workshop aims to explore a range of issues that are tackled through a diverse range of primary health care services that target: community health, youth mental health, HIV/AIDS, homelessness, and marginalised disadvantaged groups.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have identified a migraine locus on chromosome 19p13.3/2 using linkage and association analysis. We isolated 48 single-nucleotide polymorphisms within the locus, of which we genotyped 24 in a Caucasian population comprising 827 unrelated cases and 765 controls. Five single-nucleotide polymorphisms within the insulin receptor gene showed significant association with migraine. This association was independently replicated in a case-control population collected separately. We used experiments with insulin receptor RNA and protein to investigate functionality for the migraine-associated single-nucleotide polymorphisms. We suggest possible functions for the insulin receptor in migraine pathogenesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

I grew up in academic heaven. At least for me it was. Not only was Sweden in the late 1980s paradise for any kind of empirical research, with rich and high-quality business statistics being made available to researchers without them having to sign away their lives; 70+ percent response rates achieved in mail surveys to almost any group (if you knew how to do them), and boards of directors opening their doors to more qualitatively orientated researchers to sit in during their meetings. In addition, I perceived an environment with a very high degree of academic freedom, letting me do whatever I found interesting and important. I’m sure for others it was sheer hell, with very unclear career paths and rules of the game. Career progression (something which rarely entered my mind) meant that you tried as best you could and then you put all your work – reports, books, book chapters, conference papers, maybe even published articles – in a box and had some external committee of professors look at it. If you were lucky they liked what they saw for whatever reasons their professorial wisdom dictated, and you got hired or promoted. If you were not so lucky you wouldn’t get the job or the promotion, without quite knowing why. So people could easily imagine an old boys club – whose members were themselves largely unproven in international, peer review publishing – picking whoever they wanted by whatever criteria they choose to apply. Neither the fact that assessors were external nor the presence of an appeals system might have completely appeased your suspicious and skeptical mind, considering the balance of power.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The addition of surface tension to the classical Stefan problem for melting a sphere causes the solution to blow up at a finite time before complete melting takes place. This singular behaviour is characterised by the speed of the solid-melt interface and the flux of heat at the interface both becoming unbounded in the blow-up limit. In this paper, we use numerical simulation for a particular energy-conserving one-phase version of the problem to show that kinetic undercooling regularises this blow-up, so that the model with both surface tension and kinetic undercooling has solutions that are regular right up to complete melting. By examining the regime in which the dimensionless kinetic undercooling parameter is small, our results demonstrate how physically realistic solutions to this Stefan problem are consistent with observations of abrupt melting of nanoscaled particles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Energy policy is driving renewable energy deployment with most of the developed countries having some form of renewable energy portfolio standard and emissions reduction target. To deliver upon these ambitious targets, those renewable energy technologies that are commercially available, such as wind and solar, are being deployed, but inherently have issues with intermittency of supply. To overcome these issues, storage options will need to be introduced into the distribution network with benefits for both demand management and power systems quality. How this can be utilised most effectively within the distribution network will allow for an even greater proportion of our energy demand to be met through renewable resources and meet the aspirational targets set. The distribution network will become a network of smart-grids, but to work efficiently and effectively, power quality issues surrounding intermittency must be overcome, with storage being a major factor in this solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A 3-year longitudinal study Transforming Children’s Mathematical and Scientific Development integrates, through data modelling, a pedagogical approach focused on mathematical patterns and structural relationships with learning in science. As part of this study, a purposive sample of 21 highly able Grade 1 students was engaged in an innovative data modelling program. In the majority of students, representational development was observed. Their complex graphs depicting categorical and continuous data revealed a high level of structure and enabled identification of structural features critical to this development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Throughout Australia (and in comparable urban contexts around the world) public spaces may be said to be under attack by developers and also attempts by civic authorities to regulate, restrict, rebrand and reframe them. A consequence of the increasingly security driven, privatised and surveilled nature of public space is the exclusion and displacement of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, processes of securitisation, ‘gentrification’ and creative cities discourses can refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of punitive and/or remedial action. This paper discusses developments in the surveillance, governance and control of public space used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of place and belonging, and right to public space as an expression of their civil, political and social citizenship(s).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article discusses the situation of income support claimants in Australia, constructed as faulty citizens and flawed welfare subjects. Many are on the receiving end of complex, multi-layered forms of surveillance aimed at securing socially responsible and compliant behaviours. In Australia, as in other Western countries, neoliberal economic regimes with their harsh and often repressive treatment of welfare recipients operate in tandem with a burgeoning and costly arsenal of CCTV and other surveillance and governance assemblages. Through a program of ‘Income Management’, initially targeting (mainly) Indigenous welfare recipients in Australia’s Northern Territory, the BasicsCard (administered by Centrelink, on behalf of the Australian Federal Government’s Department of Human Services) is one example of this welfare surveillance. The scheme operates by ‘quarantining’ a percentage of a claimant’s welfare entitlements to be spent by way of the BasicsCard on ‘approved’ items only. The BasicsCard scheme raises significant questions about whether it is possible to encourage people to take responsibility for themselves if they no longer have real control over the most important aspects of their lives. Some Indigenous communities have resisted the BasicsCard, criticising it because the imposition of income management leads to a loss of trust, dignity, and individual agency. Further, income management of individuals by the welfare state contradicts the purported aim that they become less ‘welfare dependent’ and more ‘self-reliant’. In highlighting issues around compulsory income management this paper makes a contribution to the largely under discussed area of income management and welfare surveillance, with its propensity for function creep, garnering large volumes of data on BasicsCard user’s approved (and declined) purchasing decisions, complete with dates, amounts, times and locations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Throughout much of the world, urban and rural public spaces may be said to be under attack by property developers, commercial interests and also attempts by civic authorities to regulate, restrict, reframe and rebrand these spaces. A consequence of the increasingly security driven, privatised, commercial and surveilled nature of public space is the exclusion and displacement of those considered ‘flawed’ and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, processes of securitisation, ‘gentrification’ and creative cities initiatives can act to refashion public space as sites of selective inclusion and exclusion. The use of surveillance and other control technologies as deployed in and around the UK ‘Riots’ of 2011 may help to promote and encourage a passing sense of personal safety and confidence in using public space. Through systems of social sorting, the same surveillance assemblages can also further the physical, emotional and psychological exclusion of certain groups and individuals, deemed to be both ‘out of time and out of place’ in major zones of urban, conspicuous, consumption. In this harsh environment of monitoring and control procedures, children and young people’s use of public spaces and places in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to social order, requiring various forms of punitive and/or remedial action. Much of this civic action actively excludes some children and young people from participation and as a consequence, their trust in local processes and communities is eroded. This paper discusses worldwide developments in the surveillance, governance and control of the public space environments used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of belonging, wellbeing and rights to public space as an expression of their social, political and civil citizenship(s).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to various regulations that require data and operations to reside in specific geographic locations. Thus, cloud users may want to be sure that their stored data have not been relocated into unknown geographic regions that may compromise the security of their stored data. Albeshri et al. (2012) combined proof of storage (POS) protocols with distance-bounding protocols to address this problem. However, their scheme involves unnecessary delay when utilising typical POS schemes due to computational overhead at the server side. The aim of this paper is to improve the basic GeoProof protocol by reducing the computation overhead at the server side. We show how this can maintain the same level of security while achieving more accurate geographic assurance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The introduction of Systematized Nomenclature of Medicine - Clinical Terms (Snomed CT) for diagnosis coding in emergency departments (EDs) in New South Wales (NSW) has implications for injury surveillance abilities. This study aimed to assess the consequences of its introduction, as implemented as part of the ED information system in NSW, for identifying road trauma-related injuries in EDs. It involved a retrospective analysis of road trauma-related injuries identified in linked police, ED and mortality records during March 2007 to December 2009. Between 53.7% to 78.4% of all Snomed CT classifications in the principal provisional diagnosis field referred to the type of injury or symptom experienced by the individual. Of the road users identified by police, 3.2% of vehicle occupants, 6% of motorcyclists, 10.0% of pedal cyclists and 5.2% of pedestrians were identified using Snomed CT classifications in the principal provisional diagnosis field. The introduction of Snomed CT may provide flexible terminologies for clinicians. However, unless carefully implemented in information systems, its flexibility can lead to mismatches between the intention and actual use of defined data fields. Choices available in Snomed CT to indicate either symptoms, diagnoses, or injury mechanisms need to be controlled and these three concepts need to be retained in separate data fields to ensure a clear distinction between their classification in the ED.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In October 2012, Simone presented her book Architecture for a Free Subjectivity to the University of Michigan, Taubman College of Architecture and Urban Planning. This book explores the architectural significance of Deleuze’s philosophy of subjectivization, and Guattari’s overlooked dialogue on architecture and subjectivity. In doing so, it proposes that subjectivity is no longer the exclusive provenance of human beings, but extends to the architectural, the cinematic, the erotic, and the political. It defines a new position within the literature on Deleuze and architecture, while highlighting the neglected issue of subjectivity in contemporary discussion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Pattern and Structure Mathematics Awareness Project (PASMAP) has investigated the development of patterning and early algebraic reasoning among 4 to 8 year olds over a series of related studies. We assert that an awareness of mathematical pattern and structure (AMPS) enables mathematical thinking and simple forms of generalization from an early age. This paper provides an overview of key findings of the Reconceptualizing Early Mathematics Learning empirical evaluation study involving 316 Kindergarten students from 4 schools. The study found highly significant differences on PASA scores for PASMAP students. Analysis of structural development showed increased levels for the PASMAP students; those categorised as low ability developed improved structural responses over a short period of time.