109 research outputs found

    Women's Perspectives on Contraceptive-Induced Amenorrhea in Burkina Faso and Uganda

    Get PDF
    CONTEXT: Women's concerns about contraceptive-induced menstrual changes can lead to method discontinuation and nonuse, contributing to unmet need for contraception. Research on women's perceptions of amenorrhea related to longer acting methods and in low-income countries is limited. METHODS: Data were from nationally representative household surveys and focus group discussions with women of reproductive age conducted in Burkina Faso and Uganda in 2016-2017. Bivariate cross-tabulations and multivariate logistic regression analyses were used to examine sociodemographic and reproductive characteristics associated with women's attitudes about contraceptive-induced amenorrhea (n=2,673 for Burkina Faso and 2,281 for Uganda); menstrual health determinants were also examined for Burkina Faso. Qualitative data from focus group discussions were analyzed to understand reasons behind women's attitudes and how they influence contraceptive decision making. RESULTS: Sixty-five percent of women in Burkina Faso and 40% in Uganda reported they would choose a method that caused amenorrhea during use. In Burkina Faso, the predicted probability of accepting amenorrhea was higher for women aged 15-19 (compared with older women), living in rural areas, married and cohabiting (compared with never married), currently using a contraceptive method (compared with never users) and from Mossi households (compared with Gourmantché); menstrual health practices were not associated with amenorrhea acceptability. In Uganda, the least wealthy women had the highest predicted probability of accepting amenorrhea (51%). Qualitative analysis revealed a variety of reasons for women's attitudes about amenorrhea and differences by country, but the relationship between these attitudes and contraceptive decision making was similar across countries. CONCLUSIONS: Addressing misconceptions about contraception and menstruation may result in more informed method decision making

    ACCIO: How to Make Location Privacy Experimentation Open and Easy

    Get PDF
    The advent of mobile applications collecting and exploiting the location of users opens a number of privacy threats. To mitigate these privacy issues, several protection mechanisms have been proposed this last decade to protect users' location privacy. However, these protection mechanisms are usually implemented and evaluated in monolithic way, with heterogeneous tools and languages. Moreover, they are evaluated using different methodologies, metrics and datasets. This lack of standard makes the task of evaluating and comparing protection mechanisms particularly hard. In this paper, we present ACCIO, a unified framework to ease the design and evaluation of protection mechanisms. Thanks to its Domain Specific Language, ACCIO allows researchers and practitioners to define and deploy experiments in an intuitive way, as well as to easily collect and analyse the results. ACCIO already comes with several state-of-the-art protection mechanisms and a toolbox to manipulate mobility data. Finally, ACCIO is open and easily extensible with new evaluation metrics and protection mechanisms. This openness, combined with a description of experiments through a user-friendly DSL, makes ACCIO an appealing tool to reproduce and disseminate research results easier. In this paper, we present ACCIO's motivation and architecture, and demonstrate its capabilities through several use cases involving multiples metrics, state-of-the-art protection mechanisms, and two real-life mobility datasets collected in Beijing and in the San Francisco area

    Enhancement strategies for transdermal drug delivery systems: current trends and applications

    Get PDF

    Crystal structure of dititanium monoselenide, Ti 2

    No full text

    An Investigation on the Unwillingness of Nodes to Participate in Mobile Delay Tolerant Network Routing

    No full text
    Message routing in mobile delay tolerant networks inherently relies on the cooperationbetweennodes. Inmostexistingroutingprotocols,theparticipation of nodes in the routing process is taken as granted. However, in reality, nodes can be unwilling to participate. We first show in this paper the impact of the unwillingness of nodes to participate in existing routing protocols through a set of experiments. Results show that in the presence of even a small proportion of nodes that do not forward messages, performance is heavily degraded. We then analyze two major reasons of the unwillingness of nodes to participate, i.e., their rational behavior (also called selfishness) and their wariness of disclosing private mobility information. Our main contribution in this paper is to survey the existing related research works that overcome these two issues. We provide a classification of the existing approaches for protocols that deal with selfish behavior. We then conduct experiments to compare the performance of these strategies for preventing different types of selfish behavior. For protocols that preserve the privacy of users, we classify the existing approaches and provide an analytical comparison of their security guarantees
    • …
    corecore