452 research outputs found

    His story/her story: A dialogue about including men and masculinities in the women’s studies curriculum

    Get PDF
    The article discusses the issue of inclusion of men and masculinities in the Women\u27s Studies curriculum. Women\u27s Studies programs were started to compensate for the male domination in the academics. Women\u27s Studies presented a platform where scholarship for women was produced and taken seriously, female students and faculty could find their say or voice, and theoretical investigations required for the advancement of the aims of the women\u27s movement could take place. If the academy as a whole does not sufficiently integrate Women\u27s Studies into the curriculum, integrating Men\u27s Studies into Women\u27s Studies might end up further marginalizing Women\u27s Studies by decreasing the number of classroom hours students spend engaging women\u27s lives and feminist scholarship. Such an integration would presents an another form of male privilege, with men manipulating their way into the only branch of scholarship that has consistently focused on women. On a ground level, feminist scholars are apprehensive that a move from a Women\u27s Studies program to a Gender Studies program will reduce the political aspect of women\u27s programs

    Supporting women who develop poor postnatal mental health: what support do fathers receive to support their partner and their own mental health?

    Get PDF
    Background: Research regarding support provided for poor maternal postnatal mental health (such as depression, anxiety disorders, and postpartum psychosis) is relatively common. Fathers appear to play an important role supporting partners but many feel alienated within maternity services. Research focusing on fathers is less common. Methods: The current qualitative study aimed to investigate fathers’ experience of support provided to fathers, to help support their partner should she experience poor postnatal mental health. Results: Twenty-five fathers participated in an online questionnaire regarding their experience of their partner’s poor postnatal mental health and the support provided to fathers to help her. Thematic analysis revealed three main themes and seven sub-themes. The themes were: ‘Support received to help support their partner’, ‘Support fathers wanted that was not received’ and ‘Father’s mental health’. The results highlight an overall lack of support for many fathers, despite many wanting support on how to help their partner, information on their own mental health and the services available. Fathers specifically wanted healthcare professionals to sign-post them to someone they can talk to for emotional support, and to be taught coping strategies which would help them to support both their partner and baby. Conclusions: The findings from this study suggest that health professionals and perinatal mental health services need a better understanding about what resources fathers need to support the mental health of themselves and their partner

    Whole Genome Sequencing of Rhodotorula Mucilaginosa Isolated from the Chewing Stick (Distemonanthus benthamianus): insights into Rhodotorula Phylogeny, Mitogenome Dynamics and Carotenoid Biosynthesis

    Get PDF
    In industry, the yeast Rhodotorula mucilaginosa is commonly used for the production of carotenoids. The production of carotenoids is important because they are used as natural colorants in food and some carotenoids are precursors of retinol (vitamin A). However, the identification and molecular characterization of the carotenoid pathway/s in species belonging to the genus Rhodotorula is scarce due to the lack of genomic information thus potentially impeding effective metabolic engineering of these yeast strains for improved carotenoid production. In this study, we report the isolation, identification, characterization and the whole nuclear genome and mitogenome sequence of the endophyte R. mucilaginosa RIT389 isolated from Distemonanthus benthamianus, a plant known for its anti-fungal and antibacterial properties and commonly used as chewing sticks. The assembled genome of R. mucilaginosa RIT389 is 19 Mbp in length with an estimated genomic heterozygosity of 9.29%. Whole genome phylogeny supports the species designation of strain RIT389 within the genus in addition to supporting the monophyly of the currently sequenced Rhodotorula species. Further, we report for the first time, the recovery of the complete mitochondrial genome of R. mucilaginosa using the genome skimming approach. The assembled mitogenome is at least 7,000 bases larger than that of Rhodotorula taiwanensiswhich is largely attributed to the presence of large intronic regions containing open reading frames coding for homing endonuclease from the LAGLIDADG and GIY-YIG families. Furthermore, genomic regions containing the key genes for carotenoid production were identified in R. mucilaginosa RIT389, revealing differences in gene synteny that may play a role in the regulation of the biotechnologically important carotenoid synthesis pathways in yeasts

    Genome-Scale Model Reveals Metabolic Basis of Biomass Partitioning in a Model Diatom

    Get PDF
    Diatoms are eukaryotic microalgae that contain genes from various sources, including bacteria and the secondary endosymbiotic host. Due to this unique combination of genes, diatoms are taxonomically and functionally distinct from other algae and vascular plants and confer novel metabolic capabilities. Based on the genome annotation, we performed a genome-scale metabolic network reconstruction for the marine diatom Phaeodactylum tricornutum. Due to their endosymbiotic origin, diatoms possess a complex chloroplast structure which complicates the prediction of subcellular protein localization. Based on previous work we implemented a pipeline that exploits a series of bioinformatics tools to predict protein localization. The manually curated reconstructed metabolic network iLB1027_lipid accounts for 1,027 genes associated with 4,456 reactions and 2,172 metabolites distributed across six compartments. To constrain the genome-scale model, we determined the organism specific biomass composition in terms of lipids, carbohydrates, and proteins using Fourier transform infrared spectrometry. Our simulations indicate the presence of a yet unknown glutamine-ornithine shunt that could be used to transfer reducing equivalents generated by photosynthesis to the mitochondria. The model reflects the known biochemical composition of P. tricornutum in defined culture conditions and enables metabolic engineering strategies to improve the use of P. tricornutum for biotechnological applications

    Computational Indistinguishability between Quantum States and Its Cryptographic Application

    Full text link
    We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is "secure" against any polynomial-time quantum adversary. Our problem, QSCDff, is to distinguish between two types of random coset states with a hidden permutation over the symmetric group of finite degree. This naturally generalizes the commonly-used distinction problem between two probability distributions in computational cryptography. As our major contribution, we show that QSCDff has three properties of cryptographic interest: (i) QSCDff has a trapdoor; (ii) the average-case hardness of QSCDff coincides with its worst-case hardness; and (iii) QSCDff is computationally at least as hard as the graph automorphism problem in the worst case. These cryptographic properties enable us to construct a quantum public-key cryptosystem, which is likely to withstand any chosen plaintext attack of a polynomial-time quantum adversary. We further discuss a generalization of QSCDff, called QSCDcyc, and introduce a multi-bit encryption scheme that relies on similar cryptographic properties of QSCDcyc.Comment: 24 pages, 2 figures. We improved presentation, and added more detail proofs and follow-up of recent wor

    Task shifting and integration of HIV care into primary care in South Africa: The development and content of the streamlining tasks and roles to expand treatment and care for HIV (STRETCH) intervention

    Get PDF
    Background: Task shifting and the integration of human immunodeficiency virus (HIV) care into primary care services have been identified as possible strategies for improving access to antiretroviral treatment (ART). This paper describes the development and content of an intervention involving these two strategies, as part of the Streamlining Tasks and Roles to Expand Treatment and Care for HIV (STRETCH) pragmatic randomised controlled trial. Methods: Developing the intervention: The intervention was developed following discussions with senior management, clinicians, and clinic staff. These discussions revealed that the establishment of separate antiretroviral treatment services for HIV had resulted in problems in accessing care due to the large number of patients at ART clinics. The intervention developed therefore combined the shifting from doctors to nurses of prescriptions of antiretrovirals (ARVs) for uncomplicated patients and the stepwise integration of HIV care into primary care services. Results: Components of the intervention: The intervention consisted of regulatory changes, training, and guidelines to support nurse ART prescription, local management teams, an implementation toolkit, and a flexible, phased introduction. Nurse supervisors were equipped to train intervention clinic nurses in ART prescription using outreach education and an integrated primary care guideline. Management teams were set up and a STRETCH coordinator was appointed to oversee the implementation process. Discussion: Three important processes were used in developing and implementing this intervention: active participation of clinic staff and local and provincial management, educational outreach to train nurses in intervention sites, and an external facilitator to support all stages of the intervention rollout

    Composability in quantum cryptography

    Full text link
    In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission). To illustrate the practical use of composability, we show how to generate a continuous key stream by sequentially composing rounds of a quantum key distribution protocol. In a second part, we take a more general point of view, which is necessary for the study of cryptographic situations involving, for example, mutually distrustful parties. We explain the universal composability framework and state the composition theorem which guarantees that secure protocols can securely be composed to larger applicationsComment: 18 pages, 2 figure

    On Quantum Advantage in Information Theoretic Single-Server PIR

    Get PDF
    In (single-server) Private Information Retrieval (PIR), a server holds a large database DBDB of size nn, and a client holds an index i∈[n]i \in [n] and wishes to retrieve DB[i]DB[i] without revealing ii to the server. It is well known that information theoretic privacy even against an `honest but curious' server requires Ω(n)\Omega(n) communication complexity. This is true even if quantum communication is allowed and is due to the ability of such an adversarial server to execute the protocol on a superposition of databases instead of on a specific database (`input purification attack'). Nevertheless, there have been some proposals of protocols that achieve sub-linear communication and appear to provide some notion of privacy. Most notably, a protocol due to Le Gall (ToC 2012) with communication complexity O(n)O(\sqrt{n}), and a protocol by Kerenidis et al. (QIC 2016) with communication complexity O(log⁥(n))O(\log(n)), and O(n)O(n) shared entanglement. We show that, in a sense, input purification is the only potent adversarial strategy, and protocols such as the two protocols above are secure in a restricted variant of the quantum honest but curious (a.k.a specious) model. More explicitly, we propose a restricted privacy notion called \emph{anchored privacy}, where the adversary is forced to execute on a classical database (i.e. the execution is anchored to a classical database). We show that for measurement-free protocols, anchored security against honest adversarial servers implies anchored privacy even against specious adversaries. Finally, we prove that even with (unlimited) pre-shared entanglement it is impossible to achieve security in the standard specious model with sub-linear communication, thus further substantiating the necessity of our relaxation. This lower bound may be of independent interest (in particular recalling that PIR is a special case of Fully Homomorphic Encryption)

    Quantum key distribution based on orthogonal states allows secure quantum bit commitment

    Full text link
    For more than a decade, it was believed that unconditionally secure quantum bit commitment (QBC) is impossible. But basing on a previously proposed quantum key distribution scheme using orthogonal states, here we build a QBC protocol in which the density matrices of the quantum states encoding the commitment do not satisfy a crucial condition on which the no-go proofs of QBC are based. Thus the no-go proofs could be evaded. Our protocol is fault-tolerant and very feasible with currently available technology. It reopens the venue for other "post-cold-war" multi-party cryptographic protocols, e.g., quantum bit string commitment and quantum strong coin tossing with an arbitrarily small bias. This result also has a strong influence on the Clifton-Bub-Halvorson theorem which suggests that quantum theory could be characterized in terms of information-theoretic constraints.Comment: Published version plus an appendix showing how to defeat the counterfactual attack, more references [76,77,90,118-120] cited, and other minor change
    • 

    corecore