176 research outputs found

    First-line therapy for post-traumatic stress disorder : a systematic review of cognitive behavioural therapy and psychodynamic approaches

    Get PDF
    Background: Despite evidence supporting cognitive behavioural therapy (CBT) based interventions as the most effective approach for treating posttraumatic stress disorder (PTSD) in randomised control trials, alternative treatment interventions are often used in clinical practice. Psychodynamic (PDT) based interventions are one example of such preferred approaches, this is despite comparatively limited available evidence supporting their effectiveness for treating PTSD. Aims: Existing research exploring effective therapeutic interventions for PTSD includes trauma-focused CBT involving exposure techniques. The present review sought to establish the treatment efficacy of CBT and PDT approaches, and considers the potential impact of selecting PDT-based techniques over CBT-based techniques for the treatment of PTSD.Results: The evidence reviewed provided examples supporting PDT-based therapy as an effective treatment for PTSD, but confirmed CBT as more effective in the treatment of this particular disorder. Comparable dropout rates were reported for both treatment approaches, suggesting that relative dropout rate should not be a pivotal factor in the selection of a PDT approach over CBT for treatment of PTSD.Conclusion/Implications: The need to routinely observe evidence-based recommendations for effective treatment of PTSD is highlighted and factors undermining practitioner engagement with CBT-based interventions for the treatment of PTSD are identified

    Roadmap on digital holography [Invited]

    Get PDF
    This Roadmap article on digital holography provides an overview of a vast array of research activities in the field of digital holography. The paper consists of a series of 25 sections from the prominent experts in digital holography presenting various aspects of the field on sensing, 3D imaging and displays, virtual and augmented reality, microscopy, cell identification, tomography, label-free live cell imaging, and other applications. Each section represents the vision of its author to describe the significant progress, potential impact, important developments, and challenging issues in the field of digital holography

    Roadmap on optical security

    Get PDF
    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Centro de Investigaciones ÓpticasConsejo Nacional de Investigaciones Científicas y Técnica

    What is the value of orthodontic treatment?

    Get PDF
    Orthodontic treatment is as popular as ever. Orthodontists frequently have long lists of people wanting treatment and the cost to the NHS in England was £258m in 2010-2011 (approximately 10% of the NHS annual spend on dentistry). It is important that clinicians and healthcare commissioners constantly question the contribution of interventions towards improving the health of the population. In this article, the authors outline some of the evidence for and against the claims that people with a malocclusion are at a disadvantage compared with those without a malocclusion and that orthodontic treatment has significant health benefits. The authors would like to point out that this is not a comprehensive and systematic review of the entire scientific literature. Rather the evidence is presented in order to stimulate discussion and debate

    On the Introduction of an Agile, Temporary Workforce into a Tandem Queueing System

    Full text link
    We consider a two-station tandem queueing system where customers arrive according to a Poisson process and must receive service at both stations before leaving the system. Neither queue is equipped with dedicated servers. Instead, we consider three scenarios for the fluctuations of workforce level. In the first, a decision-maker can increase and decrease the capacity as is deemed appropriate; the unrestricted case. In the other two cases, workers arrive randomly and can be rejected or allocated to either station. In one case the number of workers can then be reduced (the controlled capacity reduction case). In the other they leave randomly (the uncontrolled capacity reduction case). All servers are capable of working collaboratively on a single job and can work at either station as long as they remain in the system. We show in each scenario that all workers should be allocated to one queue or the other (never split between queues) and that they should serve exhaustively at one of the queues depending on the direction of an inequality. This extends previous studies on flexible systems to the case where the capacity varies over time. We then show in the unrestricted case that the optimal number of workers to have in the system is non-decreasing in the number of customers in either queue.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/47647/1/11134_2005_Article_2441.pd
    corecore