966 resultados para Visual Communication
Resumo:
The current state of empirical investigations refers to consciousness as an all-or-none phenomenon. However, a recent theoretical account opens up this perspective by proposing a partial level (between nil and full) of conscious perception. In the well-studied case of single-word reading, short-lived exposure can trigger incomplete word-form recognition wherein letters fall short of forming a whole word in one's conscious perception thereby hindering word-meaning access and report. Hence, the processing from incomplete to complete word-form recognition straightforwardly mirrors a transition from partial to full-blown consciousness. We therefore hypothesized that this putative functional bottleneck to consciousness (i.e. the perceptual boundary between partial and full conscious perception) would emerge at a major key hub region for word-form recognition during reading, namely the left occipito-temporal junction. We applied a real-time staircase procedure and titrated subjective reports at the threshold between partial (letters) and full (whole word) conscious perception. This experimental approach allowed us to collect trials with identical physical stimulation, yet reflecting distinct perceptual experience levels. Oscillatory brain activity was monitored with magnetoencephalography and revealed that the transition from partial-to-full word-form perception was accompanied by alpha-band (7-11 Hz) power suppression in the posterior left occipito-temporal cortex. This modulation of rhythmic activity extended anteriorly towards the visual word form area (VWFA), a region whose selectivity for word-forms in perception is highly debated. The current findings provide electrophysiological evidence for a functional bottleneck to consciousness thereby empirically instantiating a recently proposed partial perspective on consciousness. Moreover, the findings provide an entirely new outlook on the functioning of the VWFA as a late bottleneck to full-blown conscious word-form perception.
Resumo:
This study investigated the effectiveness of modules involving standardized patients and role-plays on training communication skills. The first module involved standardized patients and an Objective Structured Clinical Examination (OSCE); the second module consisted of peer role-plays and a written examination. A randomized posttest-only control group design with first-year nursing students was used. The intervention group received one-to-one communication training with direct oral feedback from the standardized patient. The control group had training with peer role-playing and mutual feedback. The posttest involved students' rating their self-efficacy, and real patients and clinical supervisors evaluated their communication skills. No significant differences were found between self-efficacy and patient ratings. However, the clinical supervisors rated the intervention group's communication skills to be significantly (p < 0.0001) superior. Assessments by clinical supervisors indicate that communication training modules including standardized patients and an OSCE are superior to communication training modules with peer role-playing.
Resumo:
This document produced by the Iowa Department of Administrative Services has been developed to provide a multitude of information about executive branch agencies/department on a single sheet of paper. The facts provides general information, contact information, workforce data, leave and benefits information and affirmative action data.
Resumo:
SUMMARY Inflammation has evolved as a mechanism to defend the body against invading microorganisms and to respond to injury. It requires the coordinated response of a large number of cell types from the whole organism in a time- and space-dependent fashion. This coordination involves several cell-cell communication mechanisms. Exchange of humoral mediators such as cytokines is a major one. Moreover, direct contact between cells happens and plays a primordial role, for example when macrophages present antigens to lymphocytes. Contact between endothelial cells and leucocytes occurs when the latter cross the blood vessel barrier and transmigrate to the inflammatory site. A particular way by which cells communicate with each other in the course of inflammation, which at this time starts to gain attention, is the intercellular communication mediated by gap junctions. Gap junctions are channels providing a direct pathway (i.e. without transit through the extracellular space) for the diffusion of small molecules between adjacent cells. This process is known as gap junctional intercellular communication (GJIC). The general aim of this thesis was to study a possible involvement of GJIC in the pathophysiology of inflammation. A first part of the work was dedicated to study the implication of GJIC in the modification of vascular endothelial function by inflammation. In a second part, we were interested in the possible role of GJIC in the transmigration of neutrophil polymorphonuclear leucocytes through the endothelium. The main positive finding of this work is that acute inflammation preferentially modulates the expression of connexin 40 (Cx40), a gap junction protein specifically expressed in vascular endothelium. The modulation could be towards overexpression (aortic endothelium of septic rats) or towards downregulation (acutely inflamed mouse lung). We put a lot of efforts in search of possible functions of these modulations, in two directions: a potential protective role of Cx40 increased expression against sepsis-induced endothelial dysfunction, and a facilitating role of Cx40 decreased expression in neutrophil transmigration. To pursue both directions, it seemed logical to study the impact of Cx40 deletion using knock-out mice. Concerning the potential protective role of Cx40 overexpression we encountered a roadblock as we observed, in the aorta, a Cx40 downregulation in wild type mouse whereas Cx40 was upregulated in the rat. Regarding the second direction and using an in vivo approach, we observed that pulmonary neutrophil transmigration was not affected by the genetic deletion of Cx40. In spite of their negative nature, these results are the very first ones regarding the potential implication of GJIC concerning leucocyte transmigration in vivo. Because this process involves such tight cell-cell physical contacts, the hypothesis for a role of GJIC remains attractive.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
This document produced by the Iowa Department of Administrative Services has been developed to provide a multitude of information about executive branch agencies/department on a single sheet of paper. The facts provides general information, contact information, workforce data, leave and benefits information and affirmative action data.
Resumo:
A 29-year-old pregnant woman noted acute visual loss following emergent Caesarean section complicated by excessive uterine bleeding. Postoperative visual acuity was count fingers in both eyes. Funduscopic changes were consistent with a diagnosis of anaemia-associated ischaemic optic neuropathy and retinopathy. One month later, because of persistent anaemia and poor visual recovery, blood transfusion was given. Following transfusion, the patient's vision improved over the next 6 months. In an otherwise healthy patient, visual loss associated with postoperative blood loss may still be partially reversible with correction of the anaemia, even after a delayed period of time.
Resumo:
This brochure explains Iowa's laws concerning the use of cell phones and other electronic communication devices while driving.
Resumo:
We present a simple model of communication in networks with hierarchical branching. We analyze the behavior of the model from the viewpoint of critical systems under different situations. For certain values of the parameters, a continuous phase transition between a sparse and a congested regime is observed and accurately described by an order parameter and the power spectra. At the critical point the behavior of the model is totally independent of the number of hierarchical levels. Also scaling properties are observed when the size of the system varies. The presence of noise in the communication is shown to break the transition. The analytical results are a useful guide to forecasting the main features of real networks.
Resumo:
Age related macular degeneration (AMD) is an ocular disease with high prevalence among elderly persons. Two different forms exist: dry AMD, usually slowly progressive, and neovascular AMD (wet form) more aggressive. Photodynamic therapy is used to treat the wet form and anti VEGF treatments recently became available and offer a real change in the prognostic of wet AMD. Two products are registered and used in Switzerland (Macugen and Lucentis), a third "off labels product", Avastin is also currently used in clinical practice. Nevertheless, both the duration of treatment and the number of injection requested to stabilise the disease were not defined in the studies. Ongoing studies are mainly evaluating combined treatments and long acting form of the drug.