87 research outputs found

    Including the 'spiritual' within mental health care in the UK, from experiences of people with mental health problems.

    Get PDF
    Spirituality as a dimension of quality of life and well-being has recently begun to be more valued within person-centred treatment approaches to mental health in the UK. The aim of this paper is to provide indicators of the extent to which accessing a spiritual support group may be useful within mental health recovery from the view point of those in receipt of it. The study design was a small scale exploratory study utilising mixed methods. Quantitative methods were used to map the mental health, general well-being and social networks of the group. These were complimented by a semi-structured open-ended interview which allowed for Interpretative Phenomenological Analysis (IPA) of the life-history accounts of nine individuals with mental health problems who attended a ‘spirituality support group’. Data from unstructured open-ended interviews with five faith chaplains and a mental health day centre manager were also analysed using thematic analysis. The views of 15 participants are therefore recounted. Participants reported that the group offered them: an alternative to more formal religious organisations, and an opportunity to settle spiritual confusions/fears. The ‘group’ was also reported to generally help individual’s subjective feelings of mental wellness through social support. Whilst the merits of spiritual care are appealing, convincing services to include it within treatment may still be difficult

    Wear Minimization for Cuckoo Hashing: How Not to Throw a Lot of Eggs into One Basket

    Full text link
    We study wear-leveling techniques for cuckoo hashing, showing that it is possible to achieve a memory wear bound of loglogn+O(1)\log\log n+O(1) after the insertion of nn items into a table of size CnCn for a suitable constant CC using cuckoo hashing. Moreover, we study our cuckoo hashing method empirically, showing that it significantly improves on the memory wear performance for classic cuckoo hashing and linear probing in practice.Comment: 13 pages, 1 table, 7 figures; to appear at the 13th Symposium on Experimental Algorithms (SEA 2014

    Annotating Relationships between Multiple Mixed-media Digital Objects by Extending Annotea

    Get PDF
    Annotea provides an annotation protocol to support collaborative Semantic Web-based annotation of digital resources accessible through the Web. It provides a model whereby a user may attach supplementary information to a resource or part of a resource in the form of: either a simple textual comment; a hyperlink to another web page; a local file; or a semantic tag extracted from a formal ontology and controlled vocabulary. Hence, annotations can be used to attach subjective notes, comments, rankings, queries or tags to enable semantic reasoning across web resources. More recently tabbed Browsers and specific annotation tools, allow users to view several resources (e.g., images, video, audio, text, HTML, PDF) simultaneously in order to carry out side-by-side comparisons. In such scenarios, users frequently want to be able to create and annotate a link or relationship between two or more objects or between segments within those objects. For example, a user might want to create a link between a scene in an original film and the corresponding scene in a remake and attach an annotation to that link. Based on past experiences gained from implementing Annotea within different communities in order to enable knowledge capture, this paper describes and compares alternative ways in which the Annotea Schema may be extended for the purpose of annotating links between multiple resources (or segments of resources). It concludes by identifying and recommending an optimum approach which will enhance the power, flexibility and applicability of Annotea in many domains

    Resonant nonlinear magneto-optical effects in atoms

    Get PDF
    In this article, we review the history, current status, physical mechanisms, experimental methods, and applications of nonlinear magneto-optical effects in atomic vapors. We begin by describing the pioneering work of Macaluso and Corbino over a century ago on linear magneto-optical effects (in which the properties of the medium do not depend on the light power) in the vicinity of atomic resonances, and contrast these effects with various nonlinear magneto-optical phenomena that have been studied both theoretically and experimentally since the late 1960s. In recent years, the field of nonlinear magneto-optics has experienced a revival of interest that has led to a number of developments, including the observation of ultra-narrow (1-Hz) magneto-optical resonances, applications in sensitive magnetometry, nonlinear magneto-optical tomography, and the possibility of a search for parity- and time-reversal-invariance violation in atoms.Comment: 51 pages, 23 figures, to appear in Rev. Mod. Phys. in Oct. 2002, Figure added, typos corrected, text edited for clarit

    Phase II study of weekly oxaliplatin plus infusional fluorouracil and folinic acid (FUFOX regimen) as first-line treatment in metastatic gastric cancer

    Get PDF
    Oxaliplatin plus fluorouracil/folinic acid (5-FU/FA) every 2 weeks has shown promising activity in advanced gastric cancer. This study assessed the efficacy and safety of weekly oxaliplatin plus 5-FU/FA (FUFOX regimen) in the metastatic setting. Patients with previously untreated metastatic gastric cancer received oxaliplatin (50 mg m−2) plus FA (500 mg m−2, 2-h infusion) followed by 5-FU (2000 mg m−2, 24-h infusion) given on days 1, 8, 15 and 22 of a 5-week cycle. The primary end point of this multicentre phase II study was the response rate according to RECIST criteria. A total of 48 patients were enrolled. Median age was 62 years and all patients had metastatic disease, with a median number of three involved organs. The most common treatment-related grade 3/4 adverse events were diarrhoea (17%), deep vein thrombosis (15%), neutropenia (8%), nausea (6%), febrile neutropenia (4%), fatigue (4%), anaemia (4%), tumour bleeding (4%), emesis (2%), cardiac ischaemia (2%) and pneumonia (2%). Grade 1/2 sensory neuropathy occurred in 67% of patients but there were no episodes of grade 3 neuropathy. Intent-to-treat analysis showed a response rate of 54% (95% CI, 39–69%), including two complete responses. At a median follow-up of 18.1 months (range 11.2–26.2 months), median survival is 11.4 months (95% CI, 8.0–14.9 months) and the median time to progression is 6.5 months (95% CI, 3.9–9.2 months). The weekly FUFOX regimen is well tolerated and shows notable activity as first-line treatment in metastatic gastric cancer

    Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH

    Get PDF
    We construct efficient and tightly secure pseudorandom functions (PRFs) with only logarithmic security loss and short secret keys. This yields very simple and efficient variants of well-known constructions, including those of Naor-Reingold (FOCS 1997) and Lewko-Waters (ACM CCS 2009). Most importantly, in combination with the construction of Banerjee, Peikert and Rosen (EUROCRYPT 2012) we obtain the currently most efficient LWE-based PRF from a weak LWE-assumption with a much smaller modulus than the original construction. In comparison to the only previous construction with this property, which is due to Doettling and Schroeder (CRYPTO 2015), we use a modulus of similar size, but only a single instance of the underlying PRF, instead of λω(logλ)\lambda \cdot \omega(\log \lambda) parallel instances, where λ\lambda is the security parameter. Like Doettling and Schroeder, our security proof is only almost back-box, due to the fact that the number of queries made by the adversary and its advantage must be known a-priori. Technically, we introduce all-prefix universal hash functions (APUHFs), which are hash functions that are (almost-)universal, even if any prefix of the output is considered. We give simple and very efficient constructions of APUHFs, and show how they can be combined with the augmented cascade of Boneh et al. (ACM CCS 2010) to obtain our results. Along the way, we develop a new and more direct way to prove security of PRFs based on the augmented cascade
    corecore