984 resultados para Standard-setting


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Das Wort Transparenz ist aus den aktuellen, öffentlichen Debatten um Informationsfreiheit nicht mehr wegzudenken. Doch wer den Transparenzdiskurs ausschließlich auf politischer Ebene im Kontext von Whistleblowern, Wikileaks, NSA-Affäre oder Piraten-Partei verortet, verkennt, dass Transparenz, wie Han feststellt, als ein systematischer Zwang wirkt, der alle gesellschaftlichen Bereiche – also auch das Bildungswesen – erfasst und sie tiefgreifend verändert. [...] Die Hattie-Studie markiert hier einen besonderen Höhepunkt, da sie alle bisher veröffentlichten Studien an Umfang und Aufwand deutlich übertrifft und dabei den Anspruch erhebt, Lernen und Lehren sichtbar zu machen. Doch welches Recht hat der Sehende auf das Sichtbar-zu-Machende? Wer profitiert hier? Unter welchen Bedingungen kann der oder die Durch-Schaute diese Veräußerung des Selbst verweigern, d.h. seine bzw. ihre Undurchschaubarkeit geltend machen? Welche anthropologischen und gesellschaftlichen Konsequenzen folgen aus dem Anspruch, den Menschen durchschaubar zu machen? Und dürfen bzw. können wir die Preisgabe von Geheimnissen bedenkenlos fordern? Bevor diese Fragen rund um die Hattie-Studie erörtert werden, sei zum Zwecke eines tieferen Verständnisses zunächst nach der Herkunft dieses Transparenztraums und des damit verbundenen Strebens nach Durch-Sichtigkeit von Mensch und Gesellschaft gefragt. (DIPF/Orig.)

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Chronic leg ulcers are costly to manage for health service providers. Although evidence-based care leads to improved healing rates and reduced costs, a significant evidence-practice gap is known to exist. Lack of access to specialist skills in wound care is one reason suggested for this gap. The aim of this study was to model the change to total costs and health outcomes under two versions of health services for patients with leg ulcers: routine health services for community-living patients; and care provided by specialist wound clinics. Mean weekly treatment and health services costs were estimated from participants’ data (n=70) for the twelve months prior to their entry to a study specialist wound clinic, and prospectively for 24 weeks after entry. For the retrospective phase mean weekly costs of care were $AU130.30 (SD $12.64) and these fell to $AU53.32 (SD $6.47) for the prospective phase. Analysis at a population level suggests if 10,000 individuals receive 12 weeks of specialist evidence-based care, the cost savings are likely to be AU$9,238,800. Significant savings could be made by the adoption of evidence-based care such as that provided by the community and outpatient specialist wound clinics in this study.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An iterative based strategy is proposed for finding the optimal rating and location of fixed and switched capacitors in distribution networks. The substation Load Tap Changer tap is also set during this procedure. A Modified Discrete Particle Swarm Optimization is employed in the proposed strategy. The objective function is composed of the distribution line loss cost and the capacitors investment cost. The line loss is calculated using estimation of the load duration curve to multiple levels. The constraints are the bus voltage and the feeder current which should be maintained within their standard range. For validation of the proposed method, two case studies are tested. The first case study is the semi-urban 37-bus distribution system which is connected at bus 2 of the Roy Billinton Test System which is located in the secondary side of a 33/11 kV distribution substation. The second case is a 33 kV distribution network based on the modification of the 18-bus IEEE distribution system. The results are compared with prior publications to illustrate the accuracy of the proposed strategy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: The high rates of comorbid depression and substance use in young people have been associated with a range of adverse outcomes. Yet, few treatment studies have been conducted with this population. Objective: To determine if the addition of Motivational Interviewing and Cognitive Behaviour Therapy (MI/CBT) to standard alcohol and other drug (AOD) care improves the outcomes of young people with comorbid depression and substance use. Participants and Setting: Participants comprised 88 young people with comorbid depression (Kessler 10 score of > 17) and substance use (mainly alcohol/cannabis) seeking treatment at two youth AOD services in Melbourne, Australia. Sixty young people received MI/CBT in addition to standard care (SC) and 28 received SC alone. Outcomes Measures: Primary outcome measures were depressive symptoms and drug and alcohol use in the past month. Assessments were conducted at baseline, 3 and 6 months follow up. Results and Conclusions: The addition of MI/CBT to SC was associated with a significantly greater rate of change in depression, cannabis use, motivation to change substance use and social contact in the first 3 months. However, those who received SC had achieved similar improvements on these variables by 6 months follow up. All young people achieved significant improvements in functioning and quality of life variables over time, regardless of the treatment group. No changes in alcohol or other drug use were found in either group. The delivery of MI/CBT in addition to standard AOD care may offer accelerated treatment gains in the short-term.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: This randomised trial was designed to investigate the activity and toxicity of continuous infusion etoposide phosphate (EP), targeting a plasma etoposide concentration of either 3 μg/ml for five days (5d) or 1 μg/ml for 15 days (15d), in previously untreated SCLC patients with extensive disease. Patients and methods: EP was used as a single agent. Plasma etoposide concentration was monitored on days 2 and 4 in patients receiving 5d EP and on days 2, 5, 8 and 11 in patients receiving 15d EP, with infusion modification to ensure target concentrations were achieved. Treatment was repeated every 21 days for up to six cycles, with a 25% reduction in target concentration in patients with toxicity. Results: The study has closed early after entry of 29 patients (14 with 5d EP, 15 with 15d EP). Objective responses were seen in seven of 12 (58%, confidence interval (CI): 27%-85%) evaluable patients after 5d EP, and two of 14 (14%, CI: 4%42%) evaluable patients after 15d EP (P = 0.038). Grade 3 or 4 neutropenia or leucopenia during the first cycle of treatment was observed in six of 12 patients after 5d EP and 0/14 patients after 15d EP (P = 0.004), with median nadir WBC count of 2.6 x 109/1 after 5d and 5.0 x 109/1 after 15d EP (P = 0.017). Only one of 49 cycles of 15d EP was associated with grade 3 or worse haematological toxicity, compared to 14 of 61 cycles of 5d EP. Conclusions: Although the number of patients entered into this trial was small, the low activity seen at 1 μg/ml in the 15d arm suggests that this concentration is below the therapeutic window in this setting. Further concentration- controlled studies with prolonged EP infusions are required.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cancer can be defined as a deregulation or hyperactivity in the ongoing network of intracellular and extracellular signaling events. Reverse phase protein microarray technology may offer a new opportunity to measure and profile these signaling pathways, providing data on post-translational phosphorylation events not obtainable by gene microarray analysis. Treatment of ovarian epithelial carcinoma almost always takes place in a metastatic setting since unfortunately the disease is often not detected until later stages. Thus, in addition to elucidation of the molecular network within a tumor specimen, critical questions are to what extent do signaling changes occur upon metastasis and are there common pathway elements that arise in the metastatic microenvironment. For individualized combinatorial therapy, ideal therapeutic selection based on proteomic mapping of phosphorylation end points may require evaluation of the patient's metastatic tissue. Extending these findings to the bedside will require the development of optimized protocols and reference standards. We have developed a reference standard based on a mixture of phosphorylated peptides to begin to address this challenge.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Many countries are scaling up malaria interventions towards elimination. This transition changes demands on malaria diagnostics from diagnosing ill patients to detecting parasites in all carriers including asymptomatic infections and infections with low parasite densities. Detection methods suitable to local malaria epidemiology must be selected prior to transitioning a malaria control programme to elimination. A baseline malaria survey conducted in Temotu Province, Solomon Islands in late 2008, as the first step in a provincial malaria elimination programme, provided malaria epidemiology data and an opportunity to assess how well different diagnostic methods performed in this setting. Methods During the survey, 9,491 blood samples were collected and examined by microscopy for Plasmodium species and density, with a subset also examined by polymerase chain reaction (PCR) and rapid diagnostic tests (RDTs). The performances of these diagnostic methods were compared. Results A total of 256 samples were positive by microscopy, giving a point prevalence of 2.7%. The species distribution was 17.5% Plasmodium falciparum and 82.4% Plasmodium vivax. In this low transmission setting, only 17.8% of the P. falciparum and 2.9% of P. vivax infected subjects were febrile (≥38°C) at the time of the survey. A significant proportion of infections detected by microscopy, 40% and 65.6% for P. falciparum and P. vivax respectively, had parasite density below 100/μL. There was an age correlation for the proportion of parasite density below 100/μL for P. vivax infections, but not for P. falciparum infections. PCR detected substantially more infections than microscopy (point prevalence of 8.71%), indicating a large number of subjects had sub-microscopic parasitemia. The concordance between PCR and microscopy in detecting single species was greater for P. vivax (135/162) compared to P. falciparum (36/118). The malaria RDT detected the 12 microscopy and PCR positive P. falciparum, but failed to detect 12/13 microscopy and PCR positive P. vivax infections. Conclusion Asymptomatic malaria infections and infections with low and sub-microscopic parasite densities are highly prevalent in Temotu province where malaria transmission is low. This presents a challenge for elimination since the large proportion of the parasite reservoir will not be detected by standard active and passive case detection. Therefore effective mass screening and treatment campaigns will most likely need more sensitive assays such as a field deployable molecular based assay.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background. Cause-of-death statistics are an essential component of health information. Despite improvements, underregistration and misclassification of causes make it difficult to interpret the official death statistics. Objective. To estimate consistent cause-specific death rates for the year 2000 and to identify the leading causes of death and premature mortality in the provinces. Methods. Total number of deaths and population size were estimated using the Actuarial Society of South Africa ASSA2000 AIDS and demographic model. Cause-of-death profiles based on Statistics South Africa's 15% sample, adjusted for misclassification of deaths due to ill-defined causes and AIDS deaths due to indicator conditions, were applied to the total deaths by age and sex. Age-standardised rates and years of life lost were calculated using age weighting and discounting. Results. Life expectancy in KwaZulu-Natal and Mpumalanga is about 10 years lower than that in the Western Cape, the province with the lowest mortality rate. HIV/AIDS is the leading cause of premature mortality for all provinces. Mortality due to pre-transitional causes, such as diarrhoea, is more pronounced in the poorer and more rural provinces. In contrast, non-communicable disease mortality is similar across all provinces, although the cause profiles differ. Injury mortality rates are particularly high in provinces with large metropolitan areas and in Mpumalanga. Conclusion. The quadruple burden experienced in all provinces requires a broad range of interventions, including improved access to health care; ensuring that basic needs such as those related to water and sanitation are met; disease and injury prevention; and promotion of a healthy lifestyle. High death rates as a result of HIV/AIDS highlight the urgent need to accelerate the implementation of the treatment and prevention plan. In addition, there is an urgent need to improve the cause-of-death data system to provide reliable cause-of-death statistics at health district level.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

AIM The aim of this evidence-based practice (EBP) project was to promote adherence to the current best practice in monitoring and optimal replacement of peripheral intravenous device (PIVD). METHODS This EBP project took place in a 30-bed acute general surgical ward. Twenty in-patients with PIVD in situ for 4 days or more were recruited. There were five stages in the project: identification of EBP topic, criteria, sample and setting; baseline; dissemination of baseline audit results and identification of best practice barriers; identification of barriers to EBP and implementation of strategies promoting EBP; and postimplementation audit. RESULTS There were eight criteria in this project. The first audit showed moderate compliance in PIVD monitoring and optimal replacement. The project identified three barriers: lack of awareness of the current evidence-based guidelines, hospital policy not being aligned with current guidelines and no standard form of documentation. In order to overcome these barriers the following strategies were used: audit and feedback, interactive educational meetings, reminders and hospital policy change. The second audit showed minor improvements in each criterion. Compliance with documentation remained a challenge, possibly because of the lack of standardised documentation. DISCUSSION Although the project did not render us the results we aimed for, it was successful because it highlighted the current EBP in PIVD management. The major challenges of the project were time and the lack of opinion leaders in our project team. We felt that more time was needed to adapt to the practice change and standardised documentation could not be developed in such a short time period. Further, the role of the opinion leader proved to be vital in this project. We felt that had we recruited more than one opinion leader, the results would have been different.