960 resultados para revised
Resumo:
The processes used in Australian universities for reviewing the ethics of research projects are based on the traditions of research and practice from the medical and health sciences. The national guidelines for ethical conduct in research are heavily based on presumptions that the researcher–participant relationship is similar to a doctor–patient relationship. The National Health and Medical Research Council, Australian Research Council and Australian Vice-Chancellors’ Committee have made a laudable effort to fix this problem by releasing the National Statement on Ethical Conduct in Human Research in 2007, to replace the 1999 National Statement on Ethical Conduct in Research Involving Humans. The new statement better encompasses the needs of the humanities, social sciences and creative industries. However, this paper argues that the revised National Statement and ethical review processes within universities still do not fully encompass the definitions of ‘research’ and the requirements, traditions, codes of practice and standards of the humanities, social sciences and creative industries. The paper argues that scholars within these disciplines often lack the language to articulate their modes of practice and risk management strategies to university-level ethics committees. As a consequence, scholars from these disciplines may find their research is delayed or stymied. The paper focuses on creative industries researchers, and explores the issues that they face in managing the ethical review process, particularly when engaging in practice-based research. Although the focus is on the creative industries, the issues are relevant to most fields in the humanities and social sciences.
Resumo:
Evidence that our food environment can affect meal size is often taken to indicate a failure of ‘conscious control’. By contrast, our research suggests that ‘expected satiation’ (fullness that a food is expected to confer) predicts self-selected meal size. However, the role of meal planning as a determinant of actual meal size remains unresolved, as does the extent to which meal planning is commonplace outside the laboratory. Here, we quantified meal planning and its relation to meal size in a large-cohort study. Participants (N= 764; 25.6 yrs, 78% female) completed a questionnaire containing items relating to their last meal. The majority (91%) of meals were consumed in their entirety. Furthermore, in 92% of these cases the participants decided to consume the whole meal, even before it began. A second major objective was to explore the prospect that meal plans are revised based on within-meal experience (e.g., development of satiation). Only 8% of participants reported ‘unexpected’ satiation that caused them to consume less than anticipated. Moreover, at the end of the meal 57% indicated that they were not fully satiated, and 29% continued eating beyond comfortable satiation (often to avoid wasting food). This pattern was neither moderated by BMI nor dieting status, and was observed across meal types. Together, these data indicate that meals are often planned and that planning corresponds closely with amount consumed. By contrast, we find limited evidence for within-meal modification of these plans, suggesting that ‘pre-meal cognition’ is an important determinant of meal size in humans.
Resumo:
The use of professional competency standards to assess postgraduate nursing student’s clinical performance has been in place since 2004, at the Queensland University of Technology, School of Nursing & Midwifery (SONAM) when the Graduate Certificate in Emergency Nursing degree commenced. Emergency nursing students were assessed in their workplace, using a Clinical Performance Appraisal Tool or CPAT which was based on the Australian College of Critical Care Nurses (ACCCN) Competency Standards. With the subsequent formation of a separate Emergency Nursing Course advisory group in 2007, there was a review of clinical assessment course component. The release of the 2008 CENA revised Practice Standards for the Emergency Nursing Specialist’s, led to the emergency nursing course advisory committee supporting the integration of the CENA practice standards for assessment of emergency nurses in preference to the less relevant ACCCN competency standards. The SONAM emergency nursing study area team commenced the phasing in and progression of the CENA practice standards across the two Graduate Certificate units, and Graduate Diploma and Master of Nursing (emergency) clinical major options in 2009. As some units undertaken in the degree are available to nurses in other disciplines a separate CPAT was devised for the clinical assessments according to speciality context. The team has had to carefully consider how the professional standards are integrated into the teaching and assessment of the unit and not just applied instead of the ACCCN competency standards. Professional standards for the emergency context has also helped tailor course content and learning outcomes to be relevant across a number of emergency nursing contexts in Australia. The assessment of the CPAT is undertaken at the workplace by QUT appointed clinical lecturers. Clinical lecturers need to apply and have suitable postgraduate qualification to undertake the position. The clinical lecturer support role is well established at QUT. The integration of the new CENA practice standards has necessitated a review of the postgraduate assessment of emergency nurses. A clinical lecturer workshop has been organised to review role, scope and how to utilise the new look CENA based CPAT, clinical assessment format.
Resumo:
Smut fungi are important pathogens of grasses, including the cultivated crops maize, sorghum and sugarcane. Typically, smut fungi infect the inflorescence of their host plants. Three genera of smut fungi (Ustilago, Sporisorium and Macalpinomyces) form a complex with overlapping morphological characters, making species placement problematic. For example, the newly described Macalpinomyces mackinlayi possesses a combination of morphological characters such that it cannot be unambiguously accommodated in any of the three genera. Previous attempts to define Ustilago, Sporisorium and Macalpinomyces using morphology and molecular phylogenetics have highlighted the polyphyletic nature of the genera, but have failed to produce a satisfactory taxonomic resolution. A detailed systematic study of 137 smut species in the Ustilago-Sporisorium- Macalpinomyces complex was completed in the current work. Morphological and DNA sequence data from five loci were assessed with maximum likelihood and Bayesian inference to reconstruct a phylogeny of the complex. The phylogenetic hypotheses generated were used to identify morphological synapomorphies, some of which had previously been dismissed as a useful way to delimit the complex. These synapomorphic characters are the basis for a revised taxonomic classification of the Ustilago-Sporisorium-Macalpinomyces complex, which takes into account their morphological diversity and coevolution with their grass hosts. The new classification is based on a redescription of the type genus Sporisorium, and the establishment of four genera, described from newly recognised monophyletic groups, to accommodate species expelled from Sporisorium. Over 150 taxonomic combinations have been proposed as an outcome of this investigation, which makes a rigorous and objective contribution to the fungal systematics of these important plant pathogens.
Resumo:
We read the excellent review of telemonitoring in chronic heart failure (CHF)1 with interest and commend the authors on the proposed classification of telemedical remote management systems according to the type of data transfer, decision ability and level of integration. However, several points require clarification in relation to our Cochrane review of telemonitoring and structured telephone support2. We included a study by Kielblock3. We corresponded directly with this study team specifically to find out whether or not this was a randomised study and were informed that it was a randomised trial, albeit by date of birth. We note in our review2 that this randomisation method carries a high risk of bias. Post-hoc metaanalyses without these data demonstrate no substantial change to the effect estimates for all cause mortality (original risk ratio (RR) 0·66 [95% CI 0·54, 0·81], p<0·0001; revised RR 0·72 [95% CI 0·57, 0·92], p=0·008), all-cause hospitalisation (original RR 0·91 [95% CI 0·84, 0·99] p=0·02; revised RR 0.92 [95% CI 0·84, 1·02], p=0·10 ) or CHF-related hospitalisation (original RR 0·79 [95% CI 0·67, 0·94] p=0·008; revised RR 0·75 [95% CI 0·60, 0·94] p=0·01). Secondly, we would classify the Tele-HF study4, 5 as structured telephone support, rather than telemonitoring. Again, inclusion of these data alters the point-estimate but not the overall result of the meta-analyses4. Finally, our review2 does not include invasive telemonitoring as the search strategy was not designed to capture these studies. Therefore direct comparison of our review findings with recent studies of these interventions is not recommended.
Resumo:
Gray‘s (2000) revised Reinforcement Sensitivity Theory (r-RST) was used to investigate personality effects on information processing biases to gain-framed and loss-framed anti-speeding messages and the persuasiveness of these messages. The r-RST postulates that behaviour is regulated by two major motivational systems: reward system or punishment system. It was hypothesised that both message processing and persuasiveness would be dependent upon an individual‘s sensitivity to reward or punishment. Student drivers (N = 133) were randomly assigned to view one of four anti-speeding messages or no message (control group). Individual processing differences were then measured using a lexical decision task, prior to participants completing a personality and persuasion questionnaire. Results indicated that participants who were more sensitive to reward showed a marginally significant (p = .050) tendency to report higher intentions to comply with the social gain-framed message and demonstrate a cognitive processing bias towards this message, than those with lower reward sensitivity.
Resumo:
In the third year of the Link the Wiki track, the focus has been shifted to anchor-to-bep link discovery. The participants were encouraged to utilize different technologies to resolve the issue of focused link discovery. Apart from the 2009 Wikipedia collection, the Te Ara collection was introduced for the first time in INEX. For the link the wiki tasks, 5000 file-to-file topics were randomly selected and 33 anchor-to-bep topics were nominated by the participants. The Te Ara collection does not contain hyperlinks and the task was to cross link the entire collection. A GUI tool for self-verification of the linking results was distributed. This helps participants verify the location of the anchor and bep. The assessment tool and the evaluation tool were revised to improve efficiency. Submission runs were evaluated against Wikipedia ground-truth and manual result set respectively. Focus-based evaluation was undertaken using a new metric. Evaluation results are presented and link discovery approaches are described
Resumo:
Attachment difficulties have been proposed as a key risk factor for the development of alexithymia, a multifaceted personality trait characterised by difficulties identifying and describing feelings, a lack of imagination and an externally oriented thinking style. The present study investigated the relationship between attachment and alexithymia in an alcohol dependent population. Participants were 210 outpatients in a Cognitive Behavioural Treatment Program assessed on the Toronto Alexithymia Scale (TAS-20) and the Revised Adult Attachment Scale (RAAS). Significant relationships between anxious attachment and alexithymia factors were confirmed. Furthermore, alexithymic alcoholics reported significantly higher levels of anxious attachment and significantly lower levels of closeness (secure attachment) compared to non-alexithymic alcoholics. These findings highlight the importance of assessing and targeting anxious attachment among alexithymic alcoholics in order to improve alcohol treatment outcomes. Keywords: Attachment, alexithymia, alcohol dependence.
Resumo:
With the increasing number of XML documents in varied domains, it has become essential to identify ways of finding interesting information from these documents. Data mining techniques were used to derive this interesting information. Mining on XML documents is impacted by its model due to the semi-structured nature of these documents. Hence, in this chapter we present an overview of the various models of XML documents, how these models were used for mining and some of the issues and challenges in these models. In addition, this chapter also provides some insights into the future models of XML documents for effectively capturing the two important features namely structure and content of XML documents for mining.
Resumo:
A scaling analysis for the natural convection boundary layer adjacent to an inclined semi-infinite plate subject to a non-instantaneous heating in the form of an imposed wall temperature which increases linearly up to a prescribed steady value over a prescribed time is reported. The development of the boundary layer flow from start-up to a steady-state has been described based on scaling analyses and verified by numerical simulations. The analysis reveals that, if the period of temperature growth on the wall is sufficiently long, the boundary layer reaches a quasi-steady mode before the growth of the temperature is completed. In this mode the thermal boundary layer at first grows in thickness and then contracts with increasing time. However, if the imposed wall temperature growth period is sufficiently short, the boundary layer develops differently, but after the wall temperature growth is completed, the boundary layer develops as though the startup had been instantaneous. The steady state values of the boundary layer for both cases are ultimately the same.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
Providing effective IT support for business processes has become crucial for enterprises to stay competitive. In response to this need numerous process support paradigms (e.g., workflow management, service flow management, case handling), process specification standards (e.g., WS-BPEL, BPML, BPMN), process tools (e.g., ARIS Toolset, Tibco Staffware, FLOWer), and supporting methods have emerged in recent years. Summarized under the term “Business Process Management” (BPM), these paradigms, standards, tools, and methods have become a success-critical instrument for improving process performance.
Resumo:
The trucking industry has played a significant role in the economic growth in Texas by transporting and distributing commodities using commercial motor vehicles. The Texas Department of Transportation (TxDOT), however, has recognized that the large number of overweight trucks operating on the state highway system has resulted in the deterioration of pavement condition. In addition, the permit fee to carry higher loads above legal limits is much lower than the cost to treat the increase in pavement damage. The primary purpose of the research presented in this paper is to investigate current TxDOT overweight permit structures to support pavement management. The research team analyzed the TxDOT “1547” Over-axle Weight Tolerance Permit structure to support an increase in the fee structure, bringing it more in line with the actual pavement damage. The analysis showed that the revised overweight permit structure could provide an additional $9.3 million annually for pavement maintenance needs by increasing current permit fees. These results were supported by the 2030 Committee for recommendation to the Texas Transportation Commission and consideration by the State Legislature [1]. The research team recommends conducting further research to identify methods for working cooperatively with the trucking industry to develop improved methods for assessing weight damage relationships and developing more effective and accurate means for assessing overweight permit fees.
Resumo:
Survivin is a member of the family of proteins known as 'inhibitors of apoptosis proteins'. Survivin has a role in cellular decisions concerning division and survival and is frequently expressed in neoplastic cells. The aim of the present study was to investigate immunohistochemically the expression of survivin in normal canine tissues and in canine lymphoma. A representative range of fetal and adult normal tissues as well as biopsy samples from dogs with lymphoma were assembled in tissue arrays. The lymphomas were classified according to the revised Kiel and to the Revised European American Lymphoma - World Health Organization (REAL-WHO) schemes. Polyclonal and monoclonal antisera cross-reactive with canine survivin identified cytoplasmic expression of the molecule in a broad range of normal canine cells. The same reagents demonstrated cytoplasmic labelling of more than 5% of cells in all 83 lymphoma samples tested with polyclonal antiserum and in 67 of 82 (82%) of samples tested with monoclonal antiserum. Survivin was expressed by a wide range of canine lymphoma subtypes, but the expression of this molecule in normal canine tissues must be considered if novel therapies targeting survivin are applied to the management of canine lymphoma. © 2010 Elsevier Ltd.
Resumo:
An Introduction to Political Communication introduces students to the complex relationship between politics, the media and democracy in the United Kingdom, United States and other contemporary societies. Brian McNair examines how politicians, trade unions, pressure groups, NGOs and terrorist organisations make use of the media. Individual chapters look at political media and their effects, the work of political advertising, marketing and public relations, and the communicative practices of organizations at all levels, from grass-root campaigning through to governments and international bodies. This fifth edition has been revised and updated to include: • the 2008 US presidential election, and the early years of Barack Obama’s term • the MPs’ expenses scandal in Britain, and the 2010 UK election campaign • the growing role of bloggers and online pundits such as Guido Fawkes in the political agenda setting process • the emergence of social media platforms such as Twitter, YouTube and Facebook, and their destabiising impact on the management of political crises all over the world, including the Iranian pro-reform protests of July 2009 and the Israeli atack on the anti-blockade flotilla of May 2010 • the growing power of Wikileaks and other online information sources to challenge state control of classified information