825 resultados para Event Procedure
Resumo:
In Jacobs v Woolworths Limited [2010] QSC 24 Jones J was required to determine whether a worker who had lodged an application for compensation for an injury outside the time prescribed under the Workers Compensation and Rehabilitation Act 2003 (Qld) (“the Act”) was precluded from seeking common law damages for that injury. This determination depended upon the proper construction of s 131 of the Act, and what was to be understood by the words “worker who has not lodged an application for compensation for the injury” for the purpose of s 237(1)(d).
Resumo:
In Bazley v Wesley Monash IVF Pty Ltd [2010] QSC 118 an order was made under r 250 of the Uniform Civil Procedure Rules 1999 (Qld) (“UCPR”) requiring the respondent to continue to hold and maintain straws of semen belonging to the applicant’s deceased husband. The decision includes a useful analysis of the development of the common law regarding property rights in human bodies and body parts.
Resumo:
In McIntosh & Anor as Trustees of the Estate of Camm (A Bankrupt) v Linke Nominees Pty Ltd & Anor [2008] QCA 410 the Queensland Court of Appeal considered the extent of the court’s power under r 7(1) of the Uniform Civil Procedure Rules 1999 (Qld) (“UCPR”) to extend time, and in particular whether the rule applied so as to permit extension of the period specified under rule 667 for varying or setting aside an order. The case also provides an illustration of circumstances in which the court might be expected to depart from the general principle that a successful litigant is entitled to the costs of the litigation.
Resumo:
In BHP Coal Pty Ltd v K Orenstein & Koppel AG (No 2) [2009] QSC 64 McMurdo J considered the circumstances in which the ordinary rule under r 681 of the Uniform Civil Procedure Rules 1999 (Qld) (UCPR) that costs should follow the event should be departed from in favour of a party who was unsuccessful overall, but who succeeded on particular questions. When the court is satisfied that a departure from the usual order under r 681 of the UCPR is justified, it appears increasingly willing to exercise the power in r 684(2) to declare what percentage of costs was applicable to a particular issue
Resumo:
The judgment of Daubney J in Magnamain Investments Pty Ltd v Baker Johnson Lawyers [2008] QSC 245 provides guidance on a number of aspects concerning the scope and maintenance of a solicitor’s retaining lien for costs.
Resumo:
Extracting and aggregating the relevant event records relating to an identified security incident from the multitude of heterogeneous logs in an enterprise network is a difficult challenge. Presenting the information in a meaningful way is an additional challenge. This paper looks at solutions to this problem by first identifying three main transforms; log collection, correlation, and visual transformation. Having identified that the CEE project will address the first transform, this paper focuses on the second, while the third is left for future work. To aggregate by correlating event records we demonstrate the use of two correlation methods, simple and composite. These make use of a defined mapping schema and confidence values to dynamically query the normalised dataset and to constrain result events to within a time window. Doing so improves the quality of results, required for the iterative re-querying process being undertaken. Final results of the process are output as nodes and edges suitable for presentation as a network graph.
Resumo:
In order to develop more inclusive products and services, designers need a means of assessing the inclusivity of existing products and new concepts. Following previous research on the development of scales for inclusive design at University of Cambridge, Engineering Design Centre (EDC) [1], this paper presents the latest version of the exclusion audit method. For a specific product interaction, this estimates the proportion of the Great British population who would be excluded from using a product or service, due to the demands the product places on key user capabilities. A critical part of the method involves rating of the level of demand placed by a task on a range of key user capabilities, so the procedure to perform this assessment was operationalised and then its reliability was tested with 31 participants. There was no evidence that participants rated the same demands consistently. The qualitative results from the experiment suggest that the consistency of participants’ demand level ratings could be significantly improved if the audit materials and their instructions better guided the participant through the judgement process.
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
This presentation uses a case study approach to describe the Nuss procedure for pectus excavatum - and implications for imaging
Resumo:
Risk identification is one of the most challenging stages in the risk management process. Conventional risk management approaches provide little guidance and companies often rely on the knowledge of experts for risk identification. In this paper we demonstrate how risk indicators can be used to predict process delays via a method for configuring so-called Process Risk Indicators(PRIs). The method learns suitable configurations from past process behaviour recorded in event logs. To validate the approach we have implemented it as a plug-in of the ProM process mining framework and have conducted experiments using various data sets from a major insurance company.
Resumo:
Cardiovascular diseases are a leading cause of death throughout the developed world. With the demand for donor hearts far exceeding the supply, a bridge-to-transplant or permanent solution is required. This is currently achieved with ventricular assist devices (VADs), which can be used to assist the left ventricle (LVAD), right ventricle (RVAD), or both ventricles simultaneously (BiVAD). Earlier generation VADs were large, volume-displacement devices designed for temporary support until a donor heart was found. The latest generation of VADs use rotary blood pump technology which improves device lifetime and the quality of life for end stage heart failure patients. VADs are connected to the heart and greater vessels of the patient through specially designed tubes called cannulae. The inflow cannulae, which supply blood to the VAD, are usually attached to the left atrium or ventricle for LVAD support, and the right atrium or ventricle for RVAD support. Few studies have characterized the haemodynamic difference between the two cannulation sites, particularly with respect to rotary RVAD support. Inflow cannulae are usually made of metal or a semi-rigid polymer to prevent collapse with negative pressures. However suction, and subsequent collapse, of the cannulated heart chamber can be a frequent occurrence, particularly with the relatively preload insensitive rotary blood pumps. Suction events may be associated with endocardial damage, pump flow stoppages and ventricular arrhythmias. While several VAD control strategies are under development, these usually rely on potentially inaccurate sensors or somewhat unreliable inferred data to estimate preload. Fixation of the inflow cannula is usually achieved through suturing the cannula, often via a felt sewing ring, to the cannulated chamber. This technique extends the time on cardiopulmonary bypass which is associated with several postoperative complications. The overall objective of this thesis was to improve the placement and design of rotary LVAD and RVAD inflow cannulae to achieve enhanced haemodynamic performance, reduced incidence of suction events, reduced levels of postoperative bleeding and a faster implantation procedure. Specific objectives were: * in-vitro evaluation of LVAD and RVAD inflow cannula placement, * design and in-vitro evaluation of a passive mechanism to reduce the potential for heart chamber suction, * design and in-vitro evaluation of a novel suture-less cannula fixation device. In order to complete in-vitro evaluation of VAD inflow cannulae, a mock circulation loop (MCL) was developed to accurately replicate the haemodynamics in the human systemic and pulmonary circulations. Validation of the MCL’s haemodynamic performance, including the form and magnitude of pressure, flow and volume traces was completed through comparisons of patient data and the literature. The MCL was capable of reproducing almost any healthy or pathological condition, and provided a useful tool to evaluate VAD cannulation and other cardiovascular devices. The MCL was used to evaluate inflow cannula placement for rotary VAD support. Left and right atrial and ventricular cannulation sites were evaluated under conditions of mild and severe heart failure. With a view to long term LVAD support in the severe left heart failure condition, left ventricular inflow cannulation was preferred due to improved LVAD efficiency and reduced potential for thrombus formation. In the mild left heart failure condition, left atrial cannulation was preferred to provide an improved platform for myocardial recovery. Similar trends were observed with RVAD support, however to a lesser degree due to a smaller difference in right atrial and ventricular pressures. A compliant inflow cannula to prevent suction events was then developed and evaluated in the MCL. As rotary LVAD or RVAD preload was reduced, suction events occurred in all instances with a rigid inflow cannula. Addition of the compliant segment eliminated suction events in all instances. This was due to passive restriction of the compliant segment as preload dropped, thus increasing the VAD circuit resistance and decreasing the VAD flow rate. Therefore, the compliant inflow cannula acted as a passive flow control / anti-suction system in LVAD and RVAD support. A novel suture-less inflow cannula fixation device was then developed to reduce implantation time and postoperative bleeding. The fixation device was evaluated for LVAD and RVAD support in cadaveric animal and human hearts attached to a MCL. LVAD inflow cannulation was achieved in under two minutes with the suture-less fixation device. No leakage through the suture-less fixation device – myocardial interface was noted. Continued development and in-vivo evaluation of this device may result in an improved inflow cannulation technique with the potential for off-bypass insertion. Continued development of this research, in particular the compliant inflow cannula and suture-less inflow cannulation device, will result in improved postoperative outcomes, life span and quality of life for end-stage heart failure patients.
Resumo:
Part of the chapter: "Sale of Sperm, Health Records, Minimally Conscious States, and Duties of Candour" Although ethical obligations and good medical practice guidelines clearly contemplate open disclosure, there is a dearth of authority as to the nature and extent of a legal duty on Australian doctors to disclose adverse events to patients.
Resumo:
Time plays an important role in norms. In this paper we start from our previously proposed classification of obligations, and point out some shortcomings of Event Calculus (EC) to represent obligations. We proposed an extension of EC that avoids such shortcomings and we show how to use it to model the various types of obligations.
Resumo:
This paper elaborates the approach used by the Applied Data Mining Research Group (ADMRG) for the Social Event Detection (SED) Tasks of the 2013 MediaEval Benchmark. We extended the constrained clustering algorithm to apply to the first semi-supervised clustering task, and we compared several classifiers with Latent Dirichlet Allocation as feature selector in the second event classification task. The proposed approach focuses on scalability and efficient memory allocation when applied to a high dimensional data with large clusters. Results of the first task show the effectiveness of the proposed method. Results from task 2 indicate that attention on the imbalance categories distributions is needed.
Resumo:
Using the belief basis of the theory of planned behavior (TPB), the current study explored the rate of mild reactions reported by donors in relation to their first donation and the intention and beliefs of those donors with regard to returning to donate again. A high proportion of first-time donors indicated that they had experienced a reaction to blood donation. Further, donors who reacted were less likely to intend to return to donate. Regression analyses suggested that targeting different beliefs for those donors who had and had not reacted would yield most benefit in bolstering donors’ intentions to remain donating. The findings provide insight into those messages that could be communicated via the mass media or in targeted communications to retain first-time donors who have experienced a mild vasovagal reaction.