939 resultados para Muscular strengthening exercises


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this proof-of-concept study was to determine the relevance of direct measurements to monitor the load applied on the osseointegrated fixation of transfemoral amputees during static load bearing exercises. The objectives were (A) to introduce an apparatus using a three-dimensional load transducer, (B) to present a range of derived information relevant to clinicians, (C) to report on the outcomes of a pilot study and (D) to compare the measurements from the transducer with those from the current method using a weighing scale. One transfemoral amputee fitted with an osseointegrated implant was asked to apply 10 kg, 20 kg, 40 kg and 80 kg on the fixation, using self-monitoring with the weighing scale. The loading was directly measured with a portable kinetic system including a six-channel transducer, external interface circuitry and a laptop. As the load prescribed increased from 10 kg to 80 kg, the forces and moments applied on and around the antero-posterior axis increased by 4 fold anteriorly and 14 fold medially, respectively. The forces and moments applied on and around the medio-lateral axis increased by 9 fold laterally and 16 fold from anterior to posterior, respectively. The long axis of the fixation was overloaded and underloaded in 17 % and 83 % of the trials, respectively, by up to ±10 %. This proof-of-concept study presents an apparatus that can be used by clinicians facing the challenge of improving basic knowledge on osseointegration, for the design of equipment for load bearing exercises and for rehabilitation programs.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the behaviour of very high strength (VHS) circular steel tubes strengthened by carbon fibre reinforced polymer (CFRP) and subjected to axial tension. A series of tests were conducted with different bond lengths and number of layers. The distribution of strain through the thickness of CFRP layers and along CFRP bond length was studied. The strain was found to generally decrease along the CFRP bond length far from the joint. The strain through the thickness of the CFRP layers was also found to decrease from bottom to top layer. The effective bond length for high modulus CFRP was established. Finally empirical models were developed to estimate the maximum load for a given CFRP arrangement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The central contention of this article is that there is a need for greater involvement of legislators in overseeing a systematic and rights-based scrutiny of the impact of legislation and policy. The recent operation of Australia s asylum laws and policies, in particular provides an illustration of the reforms required. Challenges to the rights of non-citizens in Australia and other jurisdictions serve as a reminder of the extent of change required before rights are firmly entrenched in the processes of government. A useful step forward would be to enhance the role of legislators in setting the criteria and agenda for post-enactment scrutiny in light of issues raised during pre-legislative scrutiny.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reviews the methods used in cross-cultural studies of menopausal symptoms with the goal of formulating recommendations to facilitate comparisons of menopausal symptoms across cultures. It provides an overview of existing approaches and serves to introduce four separate reviews of vasomotor, psychological, somatic, and sexual symptoms at midlife. Building on an earlier review of cross-cultural studies of menopause covering time periods until 2004, these reviews are based on searches of Medline, PsycINFO, CINAHL and Google Scholar for English-language articles published from 2004 to 2010 using the terms “cross cultural comparison” and “menopause.” Two major criteria were used: a study had to include more than one culture, country, or ethnic group and to have asked about actual menopausal symptom experience. We found considerable variation across studies in age ranges, symptom lists, reference period for symptom recall, variables included in multivariate analyses, and the measurement of factors (e.g., menopausal status and hormonal factors, demographic, anthropometric, mental/physical health, and lifestyle measures) that influence vasomotor, psychological, somatic and sexual symptoms. Based on these reviews, we make recommendations for future research regarding age range, symptom lists, reference/recall periods, and measurement of menopausal status. Recommendations specific to the cross-cultural study of vasomotor, psychological, somatic, and sexual symptoms are found in the four reviews that follow this introduction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2009, QUT’s Office of Research and the Institute for Adult Learning Singapore funded a six-month pilot project that represented the first stage of a larger international comparative study. The study is the first of its kind to investigate to what extent and how digital content workers’ learning needs are being met by adult education and training in Australia and Singapore. The pilot project involved consolidating key theoretical literature, studies, policies, programs and statistical data relevant to the digital content industries in Australia and Singapore. This had not been done before, and represented new knowledge generation. Digital content workers include professionals within and beyond the creative industries as follows: Visual effects and animation (including virtual reality and 3D products); Interactive multimedia (e.g. websites, CD-ROMs) and software development; Computer and online games; and Digital film & TV production and film & TV post-production. In the last decade, the digital content industries have been recognised as an industry sector of strong and increasing significance. The project compared Australia and Singapore on aspects of the digital content industries’ labour market, skill requirements, human capital challenges, the role of adult education in building a workforce for the digital content industries, and innovation policies. The consolidated report generated from the project formed the basis of the proposal for an ARC Linkage Project application submitted in the May 2010 round.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Following the positive response by governments to the report of Helen Nugent's major performing arts inquiry, urgent attention needs to be given to the seedbed companies where so often audiences are introduced to the performing arts and practitioners are launched on their professional careers. Doing so calls for lateral thinking such as will enable the widest possible range of stakeholders to become involved. One solution may be to develop multi-stakeholder arts mutuals from the simpler arts mutuals such as co-operatives which are already widespread in many spheres of arts activity. Relevant models include the multi-stakeholder mutuals of the Mondragon Co-operative Corporation and the employee mutuals which are being trialled currently in Britain. Possible stakeholders in an arts mutual could include employed, unemployed and trainee practitioners, professional, quasi-professional and amateur theatre bodies, community groups, municipal councils and statutory bodies such as the ABC. Mutualist models may also be helpful to major performing arts companies facing erosion of their subscription incomes or incurring higher support services costs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The federal policy document, 'Strengthening Australia's Schools' (SAS), signified a new approach to commonwealth-state relations in schooling policy making--corporate federalism. Corporate federalism extended the application of neocorporatist strategies for managing and responding to crisis (here, in particular, Australia's worsening national and international economic situation) from the private to the public sector. The paper documents and evaluates the rationale for corporate federalism in SAS. Some possible future developments within federalism and schooling policy are also considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Manufacturing companies have strived to enhance managerial and technical capabilities to improve business performance. Building these capabilities requires effective share of knowledge - the strategic resource. Specifically, knowledge sharing (KS) between different manufacturing departments can improve manufacturing processes since leveraging organisational knowledge plays an enssential role in achieving competitive advantage. This paper presents an empirical investigation into the impact of KS on the effectiveness of supply chain management (SCM) and the product development process (PDP) in achieving desired business performance (BP). A questionnaire survey was administered from electronic manufacturing companies operating in Taiwan. 168 valid responses were received and used to statistically examine the relationships between the concepts (SCM, PDP, KS, BP). The study findings reveal that within the Taiwanese electronic manufacturing companies KS is an essential enabler for facilitating the effectiveness of SCM and PDP in achieving desired BP.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cu/Ni/W nanolayered composites with individual layer thickness ranging from 5nm to 300nm were prepared by a magnetron sputtering system. Microstructures and strength of the nanolayered composites were investigated by using the nanoindentation method combined with theoretical analysis. Microstructure characterization revealed that the Cu/Ni/W composite consists of a typical Cu/Ni coherent interface and Cu/W and Ni/W incoherent interfaces. Cu/Ni/W composites have an ultrahigh strength and a large strengthening ability compared with bi-constituent Cu–X(X¼Ni, W, Au, Ag, Cr, Nb, etc.) nanolayered composites. Summarizing the present results and those reported in the literature, we systematically analyze the origin of the ultrahigh strength and its length scale dependence by taking into account the constituent layer properties, layer scales and heterogeneous layer/layer interface characteristics, including lattice and modulus mismatch as well as interface structure.