58 research outputs found

    THE KNOWLEDGE OF SOCIAL WORKERS IN PRIVATE PRACTICE REGARDING HUMAN SEXUALITY AND SEX THERAPY

    Get PDF
    Sexual problems or dysfunctions remain one of the prominent reasons for marital and relationship problems. Sexuality is, however, only one of many components of a marriage or of a committed relationship. Relationship problems and sexual problems are often interlinked. The fact that sexual problems are often only symptoms of deeper relationship issues makes the social worker the ideal person to treat these sexual problems from a holistic perspective and within a relationship context. The nature of this research study thus evolved from the presumed lack of knowledge of social workers in private practice, and who specialise in couples therapy, regarding human sexuality and sex therapy. A qualitative research approach is used and applied research was conducted. An exploratory research design is utilised and a self-constructed, mailed questionnaire was used as method of data collection. This research study found that the respondents answered only 58.53% of the knowledge-based questions correctly, thereby confirming their suspected lack of knowledge regarding human sexuality and sex therapy. The research results indicated a need for specialised education and training of social workers in the field of human sexuality and sex therapy

    The extent of dietary supplements use by male rugby players in Kenya

    Get PDF
    Objective: Dietary or nutritional supplements are substances which act either nutritionally to reverse or prevent deficiency or pharmacologically, to alter some physiological processes. The purpose of the present study was to determine the extent of knowledge, consumption levels and identify factors or reasons that influenced the utilization of dietary supplements by male rugby players in Kenya. Methodology and results: The study adopted the descriptive survey design. The target population was 210 players from seven teams that participated in the Kenya Cup League. Simple random sampling was used to select 140 (67%) respondents out of the target population of 210. Percentages were used to describe the players’ knowledge levels. Generally, rugby players had moderate knowledge about the dietary supplements. This was rated at 44.9% for creatine monohydrate, antioxidants - 11.3%, multivitamins – 44.2%, glutamine – 14%, whey protein – 37.3% and Zinc Magnesium Aspartate (ZMA) -8.6%. The consumption levels (15.1% took and 53.8% never took) were low. Hypothesis testing confirmed that there was significant difference (p\u3c0.005) between the variables (age, academic qualification, occupation, experience and club affiliation) and the reasons for taking dietary supplements as well as the consumption patterns by the male rugby players Conclusion and application of findings: There were definitely low levels of use of dietary supplements among rugby players. The Kenya Rugby Football Union should organize clinics, courses and seminars for rugby coaches and teachers regarding dietary supplementation and its role in enhancing the nutritional status of the players. Further research should be conducted on the use of other dietary supplements and their effect on performance

    Multifrequency Strategies for the Identification of Gamma-Ray Sources

    Full text link
    More than half the sources in the Third EGRET (3EG) catalog have no firmly established counterparts at other wavelengths and are unidentified. Some of these unidentified sources have remained a mystery since the first surveys of the gamma-ray sky with the COS-B satellite. The unidentified sources generally have large error circles, and finding counterparts has often been a challenging job. A multiwavelength approach, using X-ray, optical, and radio data, is often needed to understand the nature of these sources. This chapter reviews the technique of identification of EGRET sources using multiwavelength studies of the gamma-ray fields.Comment: 35 pages, 22 figures. Chapter prepared for the book "Cosmic Gamma-ray Sources", edited by K.S. Cheng and G.E. Romero, to be published by Kluwer Academic Press, 2004. For complete article and higher resolution figures, go to: http://www.astro.columbia.edu/~muk/mukherjee_multiwave.pd

    Block-Anti-Circulant Unbalanced Oil and Vinegar

    Get PDF
    We introduce a new technique for compressing the public keys of the UOV signature scheme that makes use of block-anti-circulant matrices. These matrices admit a compact representation as for every block, the remaining elements can be inferred from the first row. This space saving translates to the public key, which as a result of this technique can be shrunk by a small integer factor. We propose parameters sets that take into account several important attacks

    Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme

    Get PDF
    In 2017, Ward Beullens \textit{et al.} submitted Lifted Unbalanced Oil and Vinegar (LUOV)\cite{beullens2017field}, a signature scheme based on the famous multivariate public key cryptosystem (MPKC) called Unbalanced Oil and Vinegar (UOV), to NIST for the competition for post-quantum public key scheme standardization. The defining feature of LUOV is that, though the public key P\mathcal{P} works in the extension field of degree rr of F2\mathbb{F}_2, the coefficients of P\mathcal{P} come from F2\mathbb{F}_2. This is done to significantly reduce the size of P\mathcal{P}. The LUOV scheme is now in the second round of the NIST PQC standardization process. In this paper we introduce a new attack on LUOV. It exploits the lifted structure of LUOV to reduce direct attacks on it to those over a subfield. We show that this reduces the complexity below the targeted security for the NIST post-quantum standardization competition

    Intra-oral compartment pressures: a biofunctional model and experimental measurements under different conditions of posture

    Get PDF
    Oral posture is considered to have a major influence on the development and reoccurrence of malocclusion. A biofunctional model was tested with the null hypotheses that (1) there are no significant differences between pressures during different oral functions and (2) between pressure measurements in different oral compartments in order to substantiate various postural conditions at rest by intra-oral pressure dynamics. Atmospheric pressure monitoring was simultaneously carried out with a digital manometer in the vestibular inter-occlusal space (IOS) and at the palatal vault (sub-palatal space, SPS). Twenty subjects with normal occlusion were evaluated during the open-mouth condition (OC), gently closed lips (semi-open compartment condition, SC), with closed compartments after the generation of a negative pressure (CCN) and swallowing (SW). Pressure curve characteristics were compared between the different measurement phases (OC, SC, CCN, SW) as well as between the two compartments (IOS, SPS) using analysis of variance and Wilcoxon matched-pairs tests adopting a significance level of α = 0.05. Both null hypotheses were rejected. Average pressures (IOS, SPS) in the experimental phases were 0.0, −0.08 (OC); −0.16, −1.0 (SC); −48.79, −81.86 (CCN); and −29.25, −62.51 (SW) mbar. CCN plateau and peak characteristics significantly differed between the two compartments SPS and IOS. These results indicate the formation of two different intra-oral functional anatomical compartments which provide a deeper understanding of orofacial biofunctions and explain previous observations of negative intra-oral pressures at rest

    Proper Motions of Stellar Streams Discovered in the Dark Energy Survey

    Get PDF
    We cross-match high-precision astrometric data from Gaia DR2 with accurate multi-band photometry from the Dark Energy Survey (DES) DR1 to confidently measure proper motions for nine stellar streams in the DES footprint: Aliqa Uma, ATLAS, Chenab, Elqui, Indus, Jhelum, Phoenix, Tucana III, and Turranburra. We determine low-confidence proper motion measurements for four additional stellar streams: Ravi, Wambelong, Willka Yaku, and Turbio. We find evidence for a misalignment between stream tracks and the systemic proper motion of streams that may suggest a systematic gravitational in uence from the Large Magellanic Cloud. These proper motions, when combined with radial velocity measurements, will allow for detailed orbit modeling which can be used to constrain properties of the LMC and its on nearby streams, as well as global properties of the Milky Way's gravitational potential

    A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems

    Get PDF
    International audienceWe investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties. In particular, the MQQ-SIG signature scheme is the fastest scheme in the ECRYPT benchmarking of cryptographic systems (eBACS). We show that both the signature scheme MQQ-SIG and the encryption scheme MQQ-ENC, although using different types of MQQs, share a common algebraic structure that introduces a weakness in both schemes. We use this weakness to mount a successful polynomial time key-recovery attack. Our key-recovery attack finds an equivalent key using the idea of so-called {\it good keys} that reveals the structure gradually. In the process we need to solve a MinRank problem that, because of the structure, can be solved in polynomial-time assuming some mild algebraic assumptions. We highlight that our theoretical results work in characteristic 22 which is known to be the most difficult case to address in theory for MinRank attacks. Also, we emphasize that our attack works without any restriction on the number of polynomials removed from the public-key, that is, using the minus modifier. This was not the case for previous MinRank like-attacks against \MQ\ schemes. From a practical point of view, we are able to break an MQQ-SIG instance of 8080 bits security in less than 22 days, and one of the more conservative MQQ-ENC instances of 128128 bits security in little bit over 99 days. Altogether, our attack shows that it is very hard to design a secure public key scheme based on an easily invertible MQQ structure
    • …
    corecore