827 resultados para Reflection protocol
Resumo:
It is now-a-days more and more common in the academic world to use new forms of “learning-tools”. One of those is the “reflection protocol”, which usually consist of a few pages of freely written text, related to something the students have read. There seems to be a lot of different opinions about the value to use this method. Some teachers and students are enthusiastic and others are rather critical. To write a “reflection protocol” is not in the first place to do a summery, a review, not even to analyze a text. Instead it is about to write down thoughts and questions that comes up as a result of the reading. It is also about doing associations, reflections and to interpret a text and relate this to a theme of some kind. The purpose to use “reflection protocols” is, as we see it, mainly for the student to practice independent thinking from a scientific point of view, but it also gives a possibility to a better understanding of another person’s thinking. This seems to open up for a fruitful dialogue and a way to learn. We will in this paper discuss if that could be the case.
Resumo:
Background. Continuous subcutaneous insulin infusion (CSII) treatment among children with type 1 diabetes is increasing in Sweden. However, studies evaluating glycaemic control in children using CSII show inconsistent results. Omitting bolus insulin doses using CSII may cause reduced glycaemic control among adolescents. The distribution of responsibility for diabetes self-management between children and parents is often unclear and needs clarification. There is much published support for continued parental involvement and shared diabetes management during adolescence. Guided Self-Determination (GSD) is an empowerment-based, person-centred, reflection and problem solving method intended to guide the patient to become self-sufficient and develop life skills for managing difficulties in diabetes self-management. This method has been adapted for adolescents and parents as Guided Self-Determination-Young (GSD-Y). This study aims to evaluate the effect of an intervention with GSD-Y in groups of adolescents starting on insulin pumps and their parents on diabetes-related family conflicts, perceived health and quality of life (QoL), and metabolic control. Here, we describe the protocol and plans for study enrolment. Methods. This study is designed as a randomized, controlled, prospective, multicentre study. Eighty patients between 12-18 years of age who are planning to start CSII will be included. All adolescents and their parents will receive standard insulin pump training. The education intervention will be conducted when CSII is to be started and at four appointments in the first 4 months after starting CSII. The primary outcome is haemoglobin A1c levels. Secondary outcomes are perceived health and QoL, frequency of blood glucose self-monitoring and bolus doses, and usage of carbohydrate counting. The following instruments will be used to evaluate perceived health and QoL: Disabkids, 'Check your health', the Diabetes Family Conflict Scale and the Swedish Diabetes Empowerment Scale. Outcomes will be evaluated within and between groups by comparing data at baseline, and at 6 and 12 months after starting treatment. Results and discussion. In this study, we will assess the effect of starting an insulin pump together with the model of Guided Self-Determination to determine whether this approach leads to retention of improved glycaemic control, QoL, responsibility distribution and reduced diabetes-related conflicts in the family. Trial registration: Current controlled trials: ISRCTN22444034
Resumo:
The use of indexing language in university libraries collective catalogs and the socio-cognitive context of indexing and users were evaluated. The methodology consisted of a diagnostic study elaboration of the functioning and treatment procedures of the indexing information from nine libraries of the UNESP Network, representing the Civil Engineering, Pedagogy and Dentistry areas from a data collection using the Verbal Protocol introspective technique in the Individual and Group forms. The study conducted a reflection upon the statements issued by the seventy-two participating individuals whose the results revealed unsatisfactory results about the use of the Subject Headings List of the BIBLIODATA Network, indexing language utilizing by the UNESP Libraries Network, Brazil, in the representation and in the information retrieval process in the ATHENA catalog, about the sequent aspects of the language: lack of specialized vocabulary as well as updated; lack of remissives and of specific headings, and others. We have concluded that the adequate use of indexing languages of specialized scientific areas becomes by means of evaluation as to updating, specificity and compatibility in order to meet the needs of indexing and information retrieval.
Resumo:
-
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.