845 resultados para child first -man next
Resumo:
Purpose: The aim was to document contact lens prescribing trends in Australia between 2000 and 2009. ---------- Methods: A survey of contact lens prescribing trends was conducted each year between 2000 and 2009. Australian optometrists were asked to provide information relating to 10 consecutive contact lens fittings between January and March each year. ---------- Results: Over the 10-year survey period, 1,462 practitioners returned survey forms representing a total of 13,721 contact lens fittings. The mean age (± SD) of lens wearers was 33.2 ± 13.6 years and 65 per cent were female. Between 2006 and 2009, rigid lens new fittings decreased from 18 to one per cent. Low water content lenses reduced from 11.5 to 3.2 per cent of soft lens fittings between 2000 and 2008. Between 2005 and 2009, toric lenses and multifocal lenses represented 26 and eight per cent, respectively, of all soft lenses fitted. Daily disposable, one- to two-week replacement and monthly replacement lenses accounted for 11.6, 30.0 and 46.5 per cent of all soft lens fittings over the survey period, respectively. The proportion of new soft fittings and refittings prescribed as extended wear has generally declined throughout the past decade. Multi-purpose lens care solutions dominate the market. Rigid lenses and monthly replacement soft lenses are predominantly worn on a full-time basis, whereas daily disposable soft lenses are mainly worn part-time.---------- Conclusions: This survey indicates that technological advances, such as the development of new lens materials, manufacturing methods and lens designs, and the availability of various lens replacement options, have had a significant impact on the contact lens market during the first decade of the 21st Century.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Twenty first century trends in silicone hydrogel contact lens fitting : an international perspective
Resumo:
Silicone hydrogel contact lenses were introduced into the market in 1999. To assess prescribing trends of this lens type since then, up to 1000 survey forms were sent to contact lens fitters in Australia, Canada, Japan, the Netherlands, Norway, the UK and the USA each year between 2000 and 2008. Practitioners were asked to record data relating to the first 10 contact lens fits or refits performed after receiving the survey form. Analysis of returned forms revealed a rapid increase in the prescribing of silicone hydrogel lenses over the survey period. In 2008, silicone hydrogel lenses represented 36% of all soft lenses prescribed. The categorization of the majority of lenses prescribed as ‘refits’ is primarily attributed to the mass conversion of lens wearers from hydrogel to silicone hydrogel lenses. Silicone hydrogels may soon represent the majority of soft contact lenses prescribed.
Resumo:
Background: The two-stage Total Laparoscopic Hysterectomy (TLH) versus Total Abdominal Hysterectomy (TAH) for stage I endometrial cancer (LACE) randomised controlled trial was initiated in 2005. The primary objective of stage 1 was to assess whether TLH results in equivalent or improved QoL up to 6 months after surgery compared to TAH. The primary objective of stage 2 was to test the hypothesis that disease-free survival at 4.5 years is equivalent for TLH and TAH. Results addressing the primary objective of stage 1 of the LACE trial are presented here. Methods: The first 361 LACE participants (TAH n= 142, TLH n=190) were enrolled in the QoL substudy at 19 centres across Australia, New Zealand and Hong Kong, and 332 completed the QoL analysis. Randomisation was performed centrally and independently from other study procedures via a computer generated, web-based system (providing concealment of the next assigned treatment) using stratified permuted blocks of 3 and 6, and assigned patients with histologically confirmed stage 1 endometrioid endometrial adenocarcinoma and ECOG performance status <2 to TLH or TAH stratified by histological grade and study centre. No blinding of patients or study personnel was attempted. QoL was measured at baseline, 1 and 4 weeks (early), and 3 and 6 months (late) after surgery using the Functional Assessment of Cancer Therapy-General (FACT-G) questionnaire. The primary endpoint was the difference between the groups in QoL change from baseline at early and late time points (a 5% difference was considered clinically significant). Analysis was performed according to the intention-to-treat principle using generalized estimating equations on differences from baseline for the early and late QoL recovery. The LACE trial is registered with clinicaltrials.gov (NCT00096408) and the Australian New Zealand Clinical Trials Registry (CTRN12606000261516). Patients for both stages of the trial have now been recruited and are being followed up for disease-specific outcomes. Findings: The proportion of missing values at the 5%, 10% 15% and 20% differences in the FACT-G scale was 6% (12/190) in the TLH and 14% (20/142) in the TAH group. There were 8/332 conversions (2.4%, 7 of which were from TLH to TAH). In the early phase of recovery, patients undergoing TLH reported significantly greater improvement of QoL from baseline compared to TAH in all subscales except the emotional and social well-being subscales. Improvements in QoL up to 6 months post-surgery continued to favour TLH except for the emotional and social well-being of the FACT and the visual analogue scale of the EuroQoL five dimensions (EuroQoL-VAS). Length of operating time was significantly longer in the TLH group (138±43 mins), than in the TAH group at (109±34 mins; p=0.001). While the proportion of intraoperative adverse events was similar between the treatment groups (TAH 8/142, 5.6%; TLH 14/190, 7.4%; p=0.55), postoperatively, twice as many patients in the TAH group experienced adverse events of CTC grade 3+ than in the TLH group (33/142, 23.2% and 22/190, 11.6%, respectively; p=0.004). Postoperative serious adverse events occurred more frequently in patients who had a TAH (27/142, 19.0%) than a TLH (15/190, 7.9%) (p=0.002). Interpretation: QoL improvements from baseline during early and later phases of recovery, and the adverse event profile significantly favour TLH compared to TAH for patients treated for Stage I endometrial cancer.
Resumo:
This paper explores the tensions between the security that access to satellite television programming from mainland China lends its 'new migrants' (xin yimin) and the vulnerability the consumption of 'foreign' media leaves them open to in Perth. The indiscreet 2-3 metre satellite dishes are an increasingly common sight in Perth's suburban backyards and on first glance, their presence might be (mis)interpreted as attempts to turn Perth into the China's next province. However, it is our argument these attempts to manage multiple belongings can be better understood within a context of conditions. These include Perth's geographical and metaphoric distance from the metropolitan centres of Sydney and Melbourne; the intense media scrutiny of China in recent times; the rapid closeness and synchronicity between China and Perth for reasons of trade, the dynamics of China's media environment and the mainland Chinese's care for and regard for themselves as mobile, global citizens of contemporary society.
Resumo:
Introduction: Management of osteoarthritis (OA) includes the use of non-pharmacological and pharmacological therapies. Although walking is commonly recommended for reducing pain and increasing physical function in people with OA, glucosamine sulphate has also been used to alleviate pain and slow the progression of OA. This study evaluated the effects of a progressive walking program and glucosamine sulphate intake on OA symptoms and physical activity participation in people with mild to moderate hip or knee OA. Methods: Thirty-six low active participants (aged 42 to 73 years) were provided with 1500 mg glucosamine sulphate per day for 6 weeks, after which they began a 12-week progressive walking program, while continuing to take glucosamine. They were randomized to walk 3 or 5 days per week and given a pedometer to monitor step counts. For both groups, step level of walking was gradually increased to 3000 steps/day during the first 6 weeks of walking, and to 6000 steps/day for the next 6 weeks. Primary outcomes included physical activity levels, physical function (self-paced step test), and the WOMAC Osteoarthritis Index for pain, stiffness and physical function. Assessments were conducted at baseline and at 6-, 12-, 18-, and 24-week follow-ups. The Mann Whitney Test was used to examine differences in outcome measures between groups at each assessment, and the Wilcoxon Signed Ranks Test was used to examine differences in outcome measures between assessments. Results: During the first 6 weeks of the study (glucosamine supplementation only), physical activity levels, physical function, and total WOMAC scores improved (P<0.05). Between the start of the walking program (Week 6) and the final follow-up (Week 24), further improvements were seen in these outcomes (P<0.05) although most improvements were seen between Weeks 6 and 12. No significant differences were found between walking groups. Conclusions: In people with hip or knee OA, walking a minimum of 3000 steps (~30 minutes), at least 3 days/week, in combination with glucosamine sulphate, may reduce OA symptoms. A more robust study with a larger sample is needed to support these preliminary findings. Trial Registration: Australian Clinical Trials Registry ACTRN012607000159459.
Resumo:
This paper presents an approach to providing better safety for adolescents playing online games. We highlight an emerging paedophile presence in online games and offer a general framework for the design of monitoring and alerting tools. Our method is to monitor and detect relationships forming with a child in online games, and alert if the relationship indicates an offline meeting with the child has been arranged or has the potential to occur. A prototype implementation with demonstrative components of the framework has been created and is introduced. The prototype demonstration and evaluation uses a teen rated online relationship-building environment for its case study, specifically the predominant Massive Multiplayer Online Game (MMO) World of Warcraft.
Resumo:
Objective: The aim of the present study was to investigate whether parent report of family resilience predicted children’s disaster-induced post-traumatic stress disorder (PTSD) and general emotional symptoms, independent of a broad range of variables including event-related factors, previous child mental illness and social connectedness. ---------- Methods: A total of 568 children (mean age = 10.2 years, SD = 1.3) who attended public primary schools, were screened 3 months after Cyclone Larry devastated the Innisfail region of North Queensland. Measures included parent report on the Family Resilience Measure and Strengths and Difficulties Questionnaire (SDQ)–emotional subscale and child report on the PTSD Reaction Index, measures of event exposure and social connectedness. ---------- Results: Sixty-four students (11.3%) were in the severe–very severe PTSD category and 53 families (28.6%) scored in the poor family resilience range. A lower family resilience score was associated with child emotional problems on the SDQ and longer duration of previous child mental health difficulties, but not disaster-induced child PTSD or child threat perception on either bivariate analysis, or as a main or moderator variable on multivariate analysis (main effect: adjusted odds ratio (ORadj) = 0.57, 95% confidence interval (CI) = 0.13–2.44). Similarly, previous mental illness was not a significant predictor of child PTSD in the multivariate model (ORadj = 0.75, 95%CI = 0.16–3.61). ---------- Conclusion: In this post-disaster sample children with existing mental health problems and those of low-resilience families were not at elevated risk of PTSD. The possibility that the aetiological model of disaster-induced child PTSD may differ from usual child and adolescent conceptualizations is discussed.
Resumo:
The broad objective of this study was to understand the incidence and severity of aggression among sexually abused girls who were trafficked and who were then further used for commercial sexual exploitation (referred to subsequently as sexually abused trafficked girls). In addition, the impact of counseling for minimizing aggression in these girls was investigated. A group of 120 sexually abused trafficked Indian girls and a group of 120 nonsexually abused Indian girls, aged 13 to 18, participated in the study. The sexually abused trafficked girls were purposively selected from four shelters located in and around Kolkata, India. The nonsexually abused girls were selected randomly from four schools situated near the shelters, and these girls were matched by age with the sexually abused trafficked girls. Data were collected using a Background Information Schedule and a standardized psychological test, that is, The Aggression Scale. Results revealed that 16.7% of the girls were first sexually abused between 6 and 9 years of age, 37.5% between 10 and 13 years of age, and 45.8% between 14 and 17 years of age. Findings further revealed that 4.2% of the sexually abused trafficked girls demonstrated saturated aggression, and 26.7% were highly aggressive, that is, extremely frustrated and rebellious. Across age groups, the sexually abused trafficked girls suffered from more aggression (p < .05), compared with the nonvictimized girls. Psychological interventions, such as individual and group counseling, were found to have a positive impact on the sexually abused trafficked girls. These findings should motivate counselors to deal with sexually abused children. It is also hoped that authorities in welfare homes will understand the importance of counseling for sexually abused trafficked children, and will appoint more counselors for this purpose.
Resumo:
In normal child development, both individual and group pretense first emerges at approximately two years of age. The metarepresentational account of pretense holds that children already have the concept PRETEND when they first engage in early group pretense. A behavioristic account suggests that early group pretense is analogous to early beliefs or desires and thus require no mental state concepts. I argue that a behavioral account does not explain the actual behavior observed in children and it cannot explain how children come to understand that a specific action is one of pretense versus one of belief. I conclude that a mentalistic explanation of pretense best explains the behavior under consideration.
Resumo:
Many developing countries are afflicted by persistent inequality in the distribution of income. While a growing body of literature emphasizes differential fertility as a channel through which income inequality persists, this paper investigates differential child mortality – differences in the incidence of child mortality across socioeconomic groups – as a critical link in this regard. Using evidence from cross-country data to evaluate this linkage, we find that differential child mortality serves as a stronger channel than differential fertility in the transmission of income inequality over time. We use random effects and generalized estimating equations techniques to account for temporal correlation within countries. The results are robust to the use of an alternate definition of fertility that reflects parental preference for children instead of realized fertility.
Resumo:
The integration of computer technologies into everyday classroom life continues to provide pedagogical challenges for school systems, teachers and administrators. Data from an exploratory case study of one teacher and a multiage class of children in the first years of schooling in Australia show that when young children are using computers for set tasks in small groups, they require ongoing support from teachers, and to engage in peer interactions that are meaningful and productive. Classroom organization and the nature of teacher-child talk are key factors in engaging children in set tasks and producing desirable learning and teaching outcomes.
Resumo:
The concept of asset management is not a new but an evolving idea that has been attracting attention of many organisations operating and/or owning some kind of infrastructure assets. The term asset management have been used widely with fundamental differences in interpretation and usage. Regardless of the context of the usage of the term, asset management implies the process of optimising return by scrutinising performance and making key strategic decisions throughout all phases of an assets lifecycle (Sarfi and Tao, 2004). Hence, asset management is a philosophy and discipline through which organisations are enabled to more effectively deploy their resources to provide higher levels of customer service and reliability while balancing financial objectives. In Australia, asset management made its way into the public works in 1993 when the Australian Accounting Standard Board issued the Australian Accounting Standard 27 – AAS27. Standard AAS27 required government agencies to capitalise and depreciate assets rather than expense them against earnings. This development has indirectly forced organisations managing infrastructure assets to consider the useful life and cost effectiveness of asset investments. The Australian State Treasuries and the Australian National Audit Office was the first organisation to formalise the concepts and principles of asset management in Australia in which they defined asset management as “ a systematic, structured process covering the whole life of an asset”(Australian National Audit Office, 1996). This initiative led other Government bodies and industry sectors to develop, refine and apply the concept of asset management in the management of their respective infrastructure assets. Hence, it can be argued that the concept of asset management has emerged as a separate and recognised field of management during the late 1990s. In comparison to other disciplines such as construction, facilities, maintenance, project management, economics, finance, to name a few, asset management is a relatively new discipline and is clearly a contemporary topic. The primary contributors to the literature in asset management are largely government organisations and industry practitioners. These contributions take the form of guidelines and reports on the best practice of asset management. More recently, some of these best practices have been made to become a standard such as the PAS 55 (IAM, 2004, IAM, 2008b) in UK. As such, current literature in this field tends to lack well-grounded theories. To-date, while receiving relatively more interest and attention from empirical researchers, the advancement of this field, particularly in terms of the volume of academic and theoretical development is at best moderate. A plausible reason for the lack of advancement is that many researchers and practitioners are still unaware of, or unimpressed by, the contribution that asset management can make to the performance of infrastructure asset. This paper seeks to explore the practices of organisations that manage infrastructure assets to develop a framework of strategic infrastructure asset management processes. It will begin by examining the development of asset management. This is followed by the discussion on the method to be adopted for this paper. Next, is the discussion of the result form case studies. It first describes the goals of infrastructure asset management and how they can support the broader business goals. Following this, a set of core processes that can support the achievement of business goals are provided. These core processes are synthesised based on the practices of asset managers in the case study organisations.
Resumo:
National estimates of the prevalence of child abuse-related injuries are obtained from a variety of sectors including welfare, justice, and health resulting in inconsistent estimates across sectors. The International Classification of Diseases (ICD) is used as the international standard for categorising health data and aggregating data for statistical purposes, though there has been limited validation of the quality, completeness or concordance of these data with other sectors. This research study examined the quality of documentation and coding of child abuse recorded in hospital records in Queensland and the concordance of these data with child welfare records. A retrospective medical record review was used to examine the clinical documentation of over 1000 hospitalised injured children from 20 hospitals in Queensland. A data linkage methodology was used to link these records with records in the child welfare database. Cases were sampled from three sub-groups according to the presence of target ICD codes: Definite abuse, Possible abuse, unintentional injury. Less than 2% of cases coded as being unintentional were recoded after review as being possible abuse, and only 5% of cases coded as possible abuse cases were reclassified as unintentional, though there was greater variation in the classification of cases as definite abuse compared to possible abuse. Concordance of health data with child welfare data varied across patient subgroups. This study will inform the development of strategies to improve the quality, consistency and concordance of information between health and welfare agencies to ensure adequate system responses to children at risk of abuse.
Resumo:
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and integrity of the navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of navigation message authentication for Galileo and next generation GPS systems.