205 resultados para Leonie Reygers


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Meal-Induced Thermogenesis (MIT) research findings are highly inconsistent, in part, due to the variety of durations and protocols used to measure MIT. We aimed to determine: 1) the proportion of a 6 h MIT response completed at 3, 4 and 5 h; 2) the associations between the shorter durations and the 6 h measure; 3) whether shorter durations improved the reproducibility of the measurement. MIT was measured in response to a 2410 KJ mixed composition meal in ten individuals (5 male, 5 female) on two occasions. Energy expenditure was measured continuously for 6 h post-meal using indirect calorimetry and MIT was calculated as the increase in energy expenditure above the pre-meal RMR. On average, 76%, 89%, and 96% of the 6 h MIT response was completed within 3, 4 and 5 h respectively, and the MIT at each of these time points was strongly correlated to the 6 h MIT (range for correlations, r = 0.990 to 0.998; p < 0.01). The between-day CV for the 6 h measurement was 33%, but was significantly lower after 3 h of measurement (CV = 26%, p = 0.02). Despite variability in the total MIT between days, the proportion of the MIT that was complete at 3, 4 and 5 h was reproducible (mean CV: 5%). While 6 h is typically required to measure the complete MIT response, 3 h measures provide sufficient information about the magnitude of the MIT response and may be applicable for measuring individuals on repeated occasions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maternal obesity, excess weight gain and lifestyle behaviours during pregnancy have been associated with future overweight and other adverse health outcomes for mothers and babies. This study compared the nutrition and physical activity behaviours of Australian healthy (BMI ≤ 25 k/m2) and overweight (BMI ≥ 25 kg/m2) pregnant women and described their knowledge and receipt of health professional advice early in pregnancy. Methods Pregnant women (n=58) aged 29±5 (mean±s.d.) years were recruited at 16±2 weeks gestation from an Australian metropolitan hospital. Height and weight were measured using standard procedures and women completed a self administered semi-quantitative survey. Results Healthy and overweight women had very similar levels of knowledge, behaviour and levels of advice provided except where specifically mentioned. Only 8% and 36% of participants knew the correct recommended daily number of fruit and vegetable serves respectively. Four percent of participants ate the recommended 5 serves/day of vegetables. Overweight women were less likely than healthy weight women to achieve the recommended fruit intake (4% vs. 8%, p=0.05), and more likely to consume soft drinks or cordial (55% vs 43%, p=0.005) and take away foods (37% vs. 25%, p=0.002) once a week or more. Less than half of all women achieved sufficient physical activity. Despite 80% of women saying they would have liked education about nutrition, physical activity and weight gain, particularly at the beginning of pregnancy, less than 50% were given appropriate advice regarding healthy eating and physical activity. Conclusion Healthy pregnancy behaviour recommendations were not being met, with overweight women less likely to meet some of the recommendations. Knowledge of dietary recommendations was poor and health care professional advice was limited. There are opportunities to improve the health care practices and education pregnant women received to improve knowledge and behaviours. Pregnant women appear to want this.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reflects on the wider potential of digital narratives as a useful tool for social work practitioners. Despite the multiple points of connection between narrative approaches and social work, the influence of narratives on practice remains limited. A case study of a digital storytelling (DST) process employed in a research project with a small group of lone mothers from refugee backgrounds is used to trigger discussion of broader applications of DST as part of everyday social work practice. The use of DST acknowledged women’s capacities for self-representation and agency, in line with participatory and strengths-based approaches inherent in contemporary social work. The benefits of using DST with lone mothers from refugee backgrounds illustrate how this method can act as a pathway to produce counter-narratives, both at the individual and broader community levels. Documenting life stories digitally provides the opportunity to construct narratives about experiences of relocation and settlement as tools for social advocacy, which can assist social workers to ensure meaningful outcomes for service-users. These propositions can serve to inform social work practices with people from refugee backgrounds and address some of the intricacies of working in diverse and challenging contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study was a phenomenological inquiry of the experience of auditory hallucinations as described by 13 Indonesian people diagnosed with schizophrenia. The interviewees included 6 men and 7 women and they were aged between 19 and 56 years. Four themes emerged from this study: feeling more like a robot than a human being; voices of contradiction - a point of confusion; tattered relationships and family disarray; and normalizing the presence of voices as part of everyday life. The findings of this study have the potential to contribute to new understandings of how people live with and manage auditory hallucinations and so enhance client-centered nursing care.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘SUGAR: Service users and carers group advising on research’ is an exciting initiative established to develop collaborative working in mental health nursing research between mental health service users, carers, researchers and practitioners at City University London, UK. This paper will describe the background to SUGAR and how and why it was established; how the group operates; some of the achievements to date including researcher reflections; and case studies of how this collaboration influences our research. Written reflective narratives of service user and carer experiences of SUGAR were analysed using constant comparative methods by the members. Common themes are presented with illustrative quotes. The article highlights the benefits and possible limitations identified so far by members of SUGAR; outlines future plans and considers the findings in relation to literature on involvement and empowerment. This paper has been written by staff and members of SUGAR and is the first venture into collaborative writing of the group and reflects the shared ethos of collaborative working.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Physical symptoms are common in pregnancy and are predominantly associated with normal physiological changes. These symptoms have a social and economic cost, leading to absenteeism from work and additional medical interventions. There is currently no simple method for identifying common pregnancy related problems in the antenatal period. A validated tool, for use by pregnancy care providers would be useful. The aim of this study was to develop and validate a Pregnancy Symptoms Inventory for use by health professionals. Methods A list of symptoms was generated via expert consultation with health professionals. Focus groups were conducted with pregnant women. The inventory was tested for face validity and piloted for readability and comprehension. For test-re-test reliability, the tool was administered to the same women 2 to 3 days apart. Finally, midwives trialled the inventory for 1 month and rated its usefulness on a 10cm visual analogue scale (VAS). Results A 41-item Likert inventory assessing how often symptoms occurred and what effect they had, was developed. Individual item test re-test reliability was between .51 to 1, the majority (34 items) scoring ≥0.70. The top four “often” reported symptoms were urinary frequency (52.2%), tiredness (45.5%), poor sleep (27.5%) and back pain (19.5%). Among the women surveyed, 16.2% claimed to sometimes or often be incontinent. Referrals to the incontinence nurse increased > 8 fold during the study period. Conclusions The PSI provides a comprehensive inventory of pregnancy related symptoms, with a mechanism for assessing their effect on function. It was robustly developed, with good test re-test reliability, face validity, comprehension and readability. This provides a validated tool for assessing the impact of interventions in pregnancy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the fact that Australia is a socially progressive country and boasts one of the largest Gender Dysphoria Clinics in the Southern Hemisphere, delivering services for almost four decades, Australian Governments fail to arrive at any consensus on the legal and human rights approaches to Trans*people. The subsequent lack of recognition does little more than increase the levels of frustration of and the continued discrimination to Trans*people, including adverse mental health problems, in this country. The purpose of this presentation is to provide an overview of the Australian systems that govern Trans*people and to identify how Trans*identities are manipulated in our Federal system of government; a system which offers little to protect the human rights of Trans*people. In order to contextualise the Australian situation, I commence with a brief description on the layers of government which will include how Australian Trans*people are currently protected under the law in those jurisdictions. I then present some of the impracticalities endured by the transitioning individual (single or married) including change of documentation and legal gender status before, during and after surgical transition for both those born on and off shore. This presentation will also include discussion of legislation that has been described by Trans*advocates as “Gesture”, “Cart before the Horse” and “Harmful”. I will conclude with a way forward by suggesting the development of a coordinated all of government approach in consultation with key stakeholders for “Trans* Friendly Legislation” to improve the human and legal rights, and ultimately the health and wellbeing of Australian Trans*identities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present article gives an overview of the reversible addition fragmentation chain transfer (RAFT) process. RAFT is one of the most versatile living radical polymerization systems and yields polymers of predictable chain length and narrow molecular weight distribution. RAFT relies on the rapid exchange of thiocarbonyl thio groups between growing polymeric chains. The key strengths of the RAFT process for polymer design are its high tolerance of monomer functionality and reaction conditions, the wide range of well-controlled polymeric architectures achievable, and its (in-principle) non-rate-retarding nature. This article introduces the mechanism of polymerization, the range of polymer molecular weights achievable, the range of monomers in which polymerization is controlled by RAFT, the various polymeric architectures that can be obtained, the type of end-group functionalities available to RAFT-made polymers, and the process of RAFT polymerization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years there has been considerable discussion afforded to the challenges facing the future of information education in Australia. This paper reports a study that explored the characteristics and experiences of Australia’s information educators. The study was undertaken as part of a larger project, which was designed to establish a consolidated and holistic picture of the Australian information profession, and identify how its future education could be mediated in a cohesive and sustainable manner. Sixty-nine of Australia’s information educators completed an online questionnaire that gathered data on aspects such as age, gender, rank, qualifications, work activities, and job satisfaction. The key findings from this study confirm that a number of pressing issues are confronting information educators in Australia. For example, Australia’s information educators are considerably older than that the total Australian academic workforce; over half the information educators who participated in the study are looking to retire in the next ten years; and, Australia’s information educators spend more time on service activities then other disciplines within Australia’s education system and are place a stronger importance on teaching over research. Left unaddressed these issues will have significant implications for the future of information education as well as the broader information profession. Many of the key observations drawn from this study may also have relevance to other disciplines in the Australian educational context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital disruption and an increasingly networked society drive rapid change in many professions and a corresponding need for change in tertiary education. Across the world, information education has, to date, prepared graduates for employment in discrete professions, such as librarianship, records management, archives, and teacher librarianship. However, contemporary information practices are less defined and are demanding of new professional skill-sets and understandings. This paper reports a study that consulted Australia’s tertiary academics about the current circumstances of information education in the academy and elicited a vision and a concern for future directions in Australian information education.