196 research outputs found

    How old are you? Newborn gestational age discriminates neonatal resuscitation practices in the Italian debate

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Multidisciplinary study groups have produced documents in an attempt to support decisions regarding whether to resuscitate "at risk" newborns or not. Moreover, there has been an increasingly insistent request for juridical regulation of neonatal resuscitation practices as well as for clarification of the role of parents in decisions regarding this kind of assistance. The crux of the matter is whether strict guidelines, reference standards based on the parameter of gestational age and authority rules are necessary.</p> <p>Discussion</p> <p>The Italian scenario reflects the current animated debate, illustrating the difficulty intrinsic in rigid guidelines on the subject, especially when gestational age is taken as a reference parameter for the medical decision.</p> <p>Summary</p> <p>Concerning the decision to interrupt or not to initiate resuscitation procedures on low gestational age newborns, physicians do not need rigid rules based on inflexible gestational age and birth weight guidelines. Guidance in addressing the difficult and trying issues associated with infants born at the margins of viability with a realistic assessment of the infant's clinical condition must be based on the infant's best interests, with clinicians and parents entering into what has been described as a "partnership of care".</p

    From offender to victim-oriented monitoring : a comparative analysis of the emergence of electronic monitoring systems in Argentina and England and Wales

    Get PDF
    The increasingly psychological terrain of crime and disorder management has had a transformative impact upon the use of electronic monitoring technologies. Surveillance technologies such as electronic monitoring ‑ EM, biometrics, and video surveillance have flourished in commercial environments that market the benefits of asocial technologies in managing disorderly behavior and which, despite often chimerical crime prevention promises, appeal to the ontologically insecure social imagination. The growth of EM in criminal justice has subsequently taken place despite, at best, equivocal evidence that it protects the public and reduces recidivism. Innovative developments in Portugal, Argentina and the United States have re-imagined EM technologies as more personalized devices that can support victims rather than control offenders. These developments represent a re-conceptualization of the use of the technology beyond the neoliberal prism of rational choice theories and offender-oriented thinking that influenced first generation thinking about EM. This paper identifies the socio-political influences that helped conceptualize first generation thinking about EM as, firstly, a community sentence and latterly, as a technique of urban security. The paper reviews attempts to theorize the role and function of EM surveillance technologies within and beyond criminal justice and explores the contribution of victimological perspectives to the use of EM 2.0

    Computing convexity properties of images on a pyramid computer

    Full text link
    We present efficient parallel algorithms for using a pyramid computer to determine convexity properties of digitized black/white pictures and labeled figures. Algorithms are presented for deciding convexity, identifying extreme points of convex hulls, and using extreme points in a variety of fashions. For a pyramid computer with a base of n simple processing elements arranged in an n 1/2 × n 1/2 square, the running times of the algorithms range from Θ(log n ) to find the extreme points of a convex figure in a digitized picture, to Θ( n 1/6 ) to find the diameter of a labeled figure, Θ( n 1/4 log n ) to find the extreme points of every figure in a digitized picture, to Θ( n 1/2 ) to find the extreme points of every labeled set of processing elements. Our results show that the pyramid computer can be used to obtain efficient solutions to nontrivial problems in image analysis. We also show the sensitivity of efficient pyramid-computer algorithms to the rate at which essential data can be compressed. Finally, we show that a wide variety of techniques are needed to make full and efficient use of the pyramid architecture.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/41351/1/453_2005_Article_BF01759066.pd

    The moral economy of security

    Get PDF
    In this article we draw upon our recent research into security consumption to answer two questions: first, under what conditions do people experience the buying and selling of security goods and services as morally troubling? Second, what are the theoretical implications of understanding private security as, in certain respects, tainted trade? We begin by drawing on two bodies of work on morality and markets (one found in political theory, the other in cultural sociology) in order to develop what we call a moral economy of security. We then use this theoretical resource to conduct an anatomy of the modes of ambivalence and unease that the trade in security generates. Three categories organize the analysis: blocked exchange; corrosive exchange; and intangible exchange. In conclusion, we briefly spell out the wider significance of our claim that the buying and selling of security is a morally charged and contested practice of governance

    Police Culture and Police Leadership

    Get PDF
    Police leadership is a key focus for police practitioners and academics. However, little attention has been paid to the relationship between police leadership and police culture. In a policing field where, in rhetorical terms, leadership is presented as a means of limiting the damage caused by occupational culture, it is important for commentary to provide a critical focus upon the relationship between these two complex concepts. This chapter provides, by drawing on international policing literature and contexts, a conceptual and critical account of three main issues. First, whether or not police leaders can be conceptualized as having a particular cultural orientation. Second, by explaining the inherent conceptual tensions in the relationship. Finally, it explores the assumption that police culture represents a barrier to police leadership

    CASPER: A Case-Based Poker-Bot

    No full text
    corecore