999 resultados para key issuing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aims
This study examined how family, peer and school factors are related to different trajectories of adolescent alcohol use at key developmental periods.

Design
Latent class growth analysis was used to identify trajectories based on five waves of data (from grade 6, age 12 to grade 11, age 17), with predictors at grades 5, 7 and 9 included as covariates.

Setting
Adolescents completed surveys during school hours.

Participants
A total of 808 students in Victoria, Australia.

Measurements
Alcohol use trajectories were based on self-reports of 30-day frequency of alcohol use. Predictors included sibling alcohol use, attachment to parents, parental supervision, parental attitudes favourable to adolescent alcohol use, peer alcohol use and school commitment.

Findings
A total of 8.2% showed steep escalation in alcohol use. Relative to non-users, steep escalators were predicted by age-specific effects for low school commitment at grade 7 (P = 0.031) and parental attitudes at grade 5 (P = 0.003), and age-generalized effects for sibling alcohol use (Ps = 0.001, 0.012, 0.033 at grades 5, 7 and 9, respectively) and peer alcohol use (Ps = 0.041, < 0.001, < 0.001 at grades 5, 7 and 9, respectively). Poor parental supervision was associated with steep escalators at grade 9 (P < 0.001) but not the other grades. Attachment to parents was unrelated to alcohol trajectories.

Conclusions
Parental disapproval of alcohol use before transition to high school, low school commitment at transition to high school, and sibling and peer alcohol use during adolescence are associated with a higher risk of steep escalations in alcohol use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background
Patient safety depends on nurses' clinical judgment. In post-anaesthetic care, objective scoring systems are commonly used to help nurses assess when a patient is ready to go back to the ward or be discharged home after day surgery. Although there are several criteria used to assess patient readiness for discharge from the post-anaesthetic care unit, evaluation of the validity and reliability of these criteria is scarce.

Aims
This article presents key findings from a systematic review conducted to identify the essential components of an effective and feasible scoring system to assess patients following surgical anaesthesia for discharge from the post-anaesthetic care unit.

Methods
The protocol for the systematic review of quantitative studies investigating assessment criteria for discharge of adult patients from the post-anaesthetic care unit was approved by the Joanna Briggs Institute and conducted consistent with the methodology of the Institute. Twelve databases and grey literature, such as conference proceedings, were searched for published studies between 1970 and 2010. Two reviewers independently assessed study eligibility for inclusion. Reference lists of included studies were appraised.

Results
Eight studies met the inclusion criteria; only one was a randomised controlled trial. Variables identified as essential when assessing a patient's readiness for discharge from the post-anaesthetic care unit were conscious state, blood pressure, nausea and vomiting, and pain. Assessment of psychomotor and cognitive recovery and other vital signs were also identified as relevant variables to consider.

Conclusions
There was limited high-quality research regarding criteria to assess patient readiness for discharge from the post-anaesthetic unit. The key recommendations, with moderate to high risk of bias, include that assessment of specific variables (pain, conscious state, blood pressure, and nausea and vomiting) should be made before patient discharge. These key findings have informed a subsequent study to reach international consensus on effective assessment criteria and a project to test the clinical reliability of a tool for use by nurses in assessing patient readiness for discharge from post-anaesthetic care.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the magnitude of influence of climate, architectural design and occupants on thermal comfort and final energy consumption in offices in different climates. A parametric study for a typical cellular office room has been conducted using the simulation software EnergyPlus. Two different occupant scenarios are each compared with three different architectural design variations and modelled in the context of three different locations for the IPCC climate change scenario A2 for 2030. The parameters evaluated in this study are final energy consumption and adaptive thermal comfort according to ASHRAE Standard 55. The study shows that the impact of occupants on final energy performance is larger than the impact of architectural design in all investigated climates, but the impact of architectural design is predominant concerning thermal comfort. Warmer climates show larger optimisation potential for comfort and energy performance in offices compared to colder climates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to the nature of wireless transmission, communication in wireless mesh networks (WMNs) is vulnerable to many adversarial activities including eavesdropping. Pairwise key establishment is one of the fundamental issues in securing WMNs. This paper presents a new matrix-based pairwise key establishment scheme for mesh clients. Our design is motivated by the fact that in WMNs, mesh routers are more powerful than mesh clients, both in computation and communication. By exploiting this heterogeneity, expensive operations can be delegated to mesh routers, which help alleviate the overhead of mesh clients during key establishment. The new scheme possesses two desirable features: (1) Neighbor mesh clients can directly establish pairwise keys; and (2) Communication and storage costs at mesh clients are significantly reduced.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Having initially not had the attention of Sartre or Heidegger, Merleau-Ponty’s work is arguably now more widely influential than either of his two contemporaries. Merleau-Ponty: Key Concepts presents an accessible guide to the core ideas which structure Merleau-Ponty’s thinking as well as to his influences and the value of his ideas to a wide range of disciplines. The first section of the book presents the context of Merleau-Ponty’s thinking, the major debates of his time, particularly existentialism, phenomenology, the history of philosophy and the philosophy of history and society. The second section outlines his major contributions and conceptual innovations. The final section focuses upon how his work has been taken up in other fields besides philosophy, notably in sociology, cognitive science, health studies and feminism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A substantial proportion of the problems associated with alcohol and interpersonal violence arise in or around licensed premises. One intervention, called lockouts, involves stopping people entering venues at an allocated time (for example, 1:30 am), although the venue can continue to sell alcohol until a specified closing time (for example, 3:30 am). 


The current study examines perceptions of the effectiveness of lockouts as a means of controlling violence in and around licensed premises. This article focuses on the views of key stakeholders drawn from industry, policing agencies and other key stakeholders using in-depth qualitative interviews (n=97) in two Australian regional cities. 

The data was analysed using thematic analysis. While a majority of interviewees believed lockouts were ineffective, thematic analysis highlighted six additional areas of consideration: the reasons for implementing lockouts; the impact on police resources; the benefits in changing patron behaviour; the limits to lockouts; the need for jurisdictional and/or market consistency; and the unintended consequences arising from the use of lockouts.

Two additional findings raise important crime prevention and community safety policy considerations. First, lockouts favoured large venues that closed late rather than smaller, earlier closing venues. Second, concerns were raised about the potential for a lockout to cause an increase in alcohol-related harm by channelling patrons to larger, later closing venues and/or increasing the number of late-night trading venues by creating conditions that forced smaller venues to close or trade later in order to remain viable business.

The article concludes by suggesting that crime prevention and community safety policy development needs to consider the potential harms that might arise from well intentioned but hasty desires to ‘do something now’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Certificateless public key encryption can be classified into two types, namely, CLE and CLE † , both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certificateless public key encryption belong to CLE, where the partial secret key is uniquely determined by an entity’s identity. In CLE † , an entity’s partial secret key is not only determined by the identity information but also by his/her (partial) public key. Such techniques can enhance the resilience of certificateless public key encryption against a cheating KGC. In this paper, we first formalize the security definitions of CLE † . After that, we demonstrate the gap between the security model of CLE † and CLE, by showing the insecurity of a CLE † scheme proposed by Lai and Kou in PKC 2007. We give an attack that can successfully break the indistinguishability of their CLE † scheme, although their scheme can be proved secure in the security model of CLE. Therefore, it does not suffice to consider the security of CLE † in the security model of CLE. Finally, we show how to secure Lai-Kou’s scheme by providing a new scheme with the security proof in the model of CLE †

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The nature of wireless transmission leads to vulnerabilities to many malicious activities, and communication in wireless mesh networks (WMNs) must be protected by proper security measures. This paper focuses on symmetric pair wise key establishment and presents a new matrix-based pair wise key establishment scheme for mesh clients. In WMNs, mesh routers are much more powerful than mesh clients, both in communication and computation. By taking advantage of this heterogeneity, our new scheme delegates energy-consuming operations to mesh routers when establishing pair wise keys for mesh clients. Additionally, neighbor mesh clients in our scheme can directly establish pair wise keys with significantly reduced communication and storage costs, due to the use of both pre and post deployment knowledge.