273 resultados para ICD-10 codes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many educators are currently interested in using computer-mediated communications (CMCs) to support learning and creative practice. In my work I have been looking at how we might create drama through using cyberspaces, working with teachers and students in secondary school contexts. In trying to understand issues that have arisen and ways of working with the data I have found a number of frameworks helpful for analysing the online interactions. These frameworks draw from O'Toole's work on contexts negotiated in the creation of drama and other frameworks drawn from Wertsch, Bakhtin and Vygotsky's work on speech utterances, dialogic processes and internalisation of learning. The contexts and factors which must be negotiated in online communications within learning contexts are quite complex and educators may need to provide parameters and protocols to ensure appropriate languages, genres and utterances are utilised. The paper explores some of the types of languages, genres and utterances that emerged from a co-curricula drama project and issues that arose, including the importance of establishing processes for giving and receiving critical feedback This paper is of relevance to those whose research strategies may involve the use of computer-mediated communications as well as those utilising cyberspaces in educational contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The question concerning what makes for good BPM is often raised. A recent call from Paul Harmon on the BPTrends Discussion LinkedIN Group for key issues in BPM received 189 answers within two months, with additional answers still appearing. I have teamed up with a number of BPM researchers and practitioners to bring together our joint experience in a BPM workshop at the University in Liechtenstein in 2013, where we developed ten principles of good BPM, later published in Business Process Management Journal (vom Brocke et al., 2014). The paper, which has received considerable attention in academia, was ranked the journal’s most downloaded paper the month it was published. Slides on Slideshare that provide a brief summary of the paper have been accessed more than 3,000 times since they were first put online in March 2014. Given the importance of the topic–what makes for good BPM–and the positive response to the ten principles, I wrote this note with the co-authors of the original BPMJ paper to outline the ten principles and illustrate how to use them in practice. We invite all readers to engage in this discussion via any channel they find appropriate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Early transcriptional activation events that occur in bladder immediately following bacterial urinary tract infection (UTI) are not well defined. In this study, we describe the whole bladder transcriptome of uropathogenic Escherichia coli (UPEC) cystitis in mice using genome-wide expression profiling to define the transcriptome of innate immune activation stemming from UPEC colonization of the bladder. Bladder RNA from female C57BL/6 mice, analyzed using 1.0 ST-Affymetrix microarrays, revealed extensive activation of diverse sets of innate immune response genes, including those that encode multiple IL-family members, receptors, metabolic regulators, MAPK activators, and lymphocyte signaling molecules. These were among 1564 genes differentially regulated at 2 h postinfection, highlighting a rapid and broad innate immune response to bladder colonization. Integrative systems-level analyses using InnateDB (http://www.innatedb.com) bioinformatics and ingenuity pathway analysis identified multiple distinct biological pathways in the bladder transcriptome with extensive involvement of lymphocyte signaling, cell cycle alterations, cytoskeletal, and metabolic changes. A key regulator of IL activity identified in the transcriptome was IL-10, which was analyzed functionally to reveal marked exacerbation of cystitis in IL-10–deficient mice. Studies of clinical UTI revealed significantly elevated urinary IL-10 in patients with UPEC cystitis, indicating a role for IL-10 in the innate response to human UTI. The whole bladder transcriptome presented in this work provides new insight into the diversity of innate factors that determine UTI on a genome-wide scale and will be valuable for further data mining. Identification of protective roles for other elements in the transcriptome will provide critical new insight into the complex cascade of events that underpin UTI.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the past decade, policymakers in over 70 markets have introduced corporate governance codes or best practice guidelines. In East Asia, they have been introduced in Hong Kong in 1999 and 2006, Indonesia in 2000 and 2007, Malaysia in 2000 and 2007, the Philippines in 2002, Singapore iu 2001 and 2005, South Korea in 2003, Taiwan iu 2002 and Thailand iu 2006. The common focus of these codes is to encourage but not force companies to improve their corporate governance practices to a specified target level, e.g., board independence of 30%. Another commonality is that the guidelines apply to all listed companies regardless of their ownership structure or other characteristics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aims to assess the accuracy of Digital Elevation Model (DEM) which is generated by using Toutin’s model. Thus, Toutin’s model was run by using OrthoEngineSE of PCI Geomatics 10.3.Thealong-track stereoimages of Advanced Spaceborne Thermal Emission and Reflection radiometer (ASTER) sensor with 15 m resolution were used to produce DEM on an area with low and near Mean Sea Level (MSL) elevation in Johor Malaysia. Despite the satisfactory pre-processing results the visual assessment of the DEM generated from Toutin’s model showed that the DEM contained many outliers and incorrect values. The failure of Toutin’s model may mostly be due to the inaccuracy and insufficiency of ASTER ephemeris data for low terrains as well as huge water body in the stereo images.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper analyses recent corporate governance codes issued by 20 countries for evidence of convergence in corporate governance systems in Europe. The analysis shows that there has been a degree of convergence towards an Anglo-Saxon model of corporate governance as the audit committee concept is widely accepted in countries with both unitary and two-tier governance systems. Further, the latest audit committee recommendations in countries that have issued several governance codes show a strengthening of the recommendations for an audit committee over time in line with the Anglo-Saxon audit committee concept and convergence with the debate in the US and UK on issues such as the independence and financial expertise of members. However, consistent with the literature on the convergence of European corporate governance systems, at an operational level there is limited consistency in the recommended structure and role of audit committees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Legislation giving prominence to psychosocial risk factors at work has changed the role of government occupational health and safety (OHS) inspectors in many countries. Yet little is known about how inspectorates have responded to these changes. Between 2003 and 2007 an Australian study was undertaken on OHS standards, entailing detailed documentary analysis, interviews with 36 inspectorate managers and 89 inspectors, and observations made when researchers accompanied inspectors on 120 typical workplace visits. Our study found that general duty provisions in OHS legislation clearly incorporated psychosocial hazards and inspectorates had introduced guidance material, pursued campaigns and increased interventions in this area. However, the regulatory framework remained narrow (focused on bullying/harassment, occupational violence and work stress) and workplace visits revealed psychosocial hazards as a marginal area of inspectorate activity. These findings were reinforced in interviews. While aware of psychosocial hazards inspectors often saw the issue as problematic due to limited training, resourcing constraints, deficiencies in regulation and fears of victimisation amongst workers. In order to address these problems a number of changes are required that recognize the distinctiveness of psychosocial hazards including their ‘invisibility’. Notable here are revisions to regulation (both general duty provisions and specific codes), the development of comprehensive guidance and assessment tools to be used by inspectors, greater use of procedural enforcement, and enhanced inspectorate resourcing and training. There is also a need to recognize complex inter-linkages between psychosocial hazards and the industrial relations context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Description of a patient's injuries is recorded in narrative text form by hospital emergency departments. For statistical reporting, this text data needs to be mapped to pre-defined codes. Existing research in this field uses the Naïve Bayes probabilistic method to build classifiers for mapping. In this paper, we focus on providing guidance on the selection of a classification method. We build a number of classifiers belonging to different classification families such as decision tree, probabilistic, neural networks, and instance-based, ensemble-based and kernel-based linear classifiers. An extensive pre-processing is carried out to ensure the quality of data and, in hence, the quality classification outcome. The records with a null entry in injury description are removed. The misspelling correction process is carried out by finding and replacing the misspelt word with a soundlike word. Meaningful phrases have been identified and kept, instead of removing the part of phrase as a stop word. The abbreviations appearing in many forms of entry are manually identified and only one form of abbreviations is used. Clustering is utilised to discriminate between non-frequent and frequent terms. This process reduced the number of text features dramatically from about 28,000 to 5000. The medical narrative text injury dataset, under consideration, is composed of many short documents. The data can be characterized as high-dimensional and sparse, i.e., few features are irrelevant but features are correlated with one another. Therefore, Matrix factorization techniques such as Singular Value Decomposition (SVD) and Non Negative Matrix Factorization (NNMF) have been used to map the processed feature space to a lower-dimensional feature space. Classifiers with these reduced feature space have been built. In experiments, a set of tests are conducted to reflect which classification method is best for the medical text classification. The Non Negative Matrix Factorization with Support Vector Machine method can achieve 93% precision which is higher than all the tested traditional classifiers. We also found that TF/IDF weighting which works well for long text classification is inferior to binary weighting in short document classification. Another finding is that the Top-n terms should be removed in consultation with medical experts, as it affects the classification performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Facial identity and facial expression matching tasks were completed by 5–12-year-old children and adults using stimuli extracted from the same set of normalized faces. Configural and feature processing were examined using speed and accuracy of responding and facial feature selection, respectively. Facial identity matching was slower than face expression matching for all age groups. Large age effects were found on both speed and accuracy of responding and feature use in both identity and expression matching tasks. Eye region preference was found on the facial identity task and mouth region preference on the facial expression task. Use of mouth region information for facial expression matching increased with age, whereas use of eye region information for facial identity matching peaked early. The feature use information suggests that the specific use of primary facial features to arrive at identity and emotion matching judgments matures across middle childhood.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Ten years after the publication of Elaborated Intrusion (EI) Theory, there is now substantial research into its key predictions. The distinction between intrusive thoughts, which are driven by automatic processes, and their elaboration, involving controlled processing, is well established. Desires for both addictive substances and other desired targets are typically marked by imagery, especially when they are intense. Attention training strategies such as body scanning reduce intrusive thoughts, while concurrent tasks that introduce competing sensory information interfere with elaboration, especially if they compete for the same limited-capacity working memory resources. Conclusion: EI Theory has spawned new assessment instruments that are performing strongly and offer the ability to more clearly delineate craving from correlated processes. It has also inspired new approaches to treatment. In particular, training people to use vivid sensory imagery for functional goals holds promise as an intervention for substance misuse, since it is likely to both sustain motivation and moderate craving.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Chlamydia pecorum is an important pathogen of domesticated livestock including sheep, cattle and pigs. This pathogen is also a key factor in the decline of the koala in Australia. We sequenced the genomes of three koala C. pecorum strains, isolated from the urogenital tracts and conjunctiva of diseased koalas. The genome of the C. pecorum VR629 (IPA) strain, isolated from a sheep with polyarthritis, was also sequenced. Results Comparisons of the draft C. pecorum genomes against the complete genomes of livestock C. pecorum isolates revealed that these strains have a conserved gene content and order, sharing a nucleotide sequence similarity > 98%. Single nucleotide polymorphisms (SNPs) appear to be key factors in understanding the adaptive process. Two regions of the chromosome were found to be accumulating a large number of SNPs within the koala strains. These regions include the Chlamydia plasticity zone, which contains two cytotoxin genes (toxA and toxB), and a 77 kbp region that codes for putative type III effector proteins. In one koala strain (MC/MarsBar), the toxB gene was truncated by a premature stop codon but is full-length in IPTaLE and DBDeUG. Another five pseudogenes were also identified, two unique to the urogenital strains C. pecorum MC/MarsBar and C. pecorum DBDeUG, respectively, while three were unique to the koala C. pecorum conjunctival isolate IPTaLE. An examination of the distribution of these pseudogenes in C. pecorum strains from a variety of koala populations, alongside a number of sheep and cattle C. pecorum positive samples from Australian livestock, confirmed the presence of four predicted pseudogenes in koala C. pecorum clinical samples. Consistent with our genomics analyses, none of these pseudogenes were observed in the livestock C. pecorum samples examined. Interestingly, three SNPs resulting in pseudogenes identified in the IPTaLE isolate were not found in any other C. pecorum strain analysed, raising questions over the origin of these point mutations. Conclusions The genomic data revealed that variation between C. pecorum strains were mainly due to the accumulation of SNPs, some of which cause gene inactivation. The identification of these genetic differences will provide the basis for further studies to understand the biology and evolution of this important animal pathogen. Keywords: Chlamydia pecorum; Single nucleotide polymorphism; Pseudogene; Cytotoxin

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Cardiovascular disease and mental health both hold enormous public health importance, both ranking highly in results of the recent Global Burden of Disease Study 2010 (GBD 2010). For the first time, the GBD 2010 has systematically and quantitatively assessed major depression as an independent risk factor for the development of ischemic heart disease (IHD) using comparative risk assessment methodology. Methods A pooled relative risk (RR) was calculated from studies identified through a systematic review with strict inclusion criteria designed to provide evidence of independent risk factor status. Accepted case definitions of depression include diagnosis by a clinician or by non-clinician raters adhering to Diagnostic and Statistical Manual of Mental Disorders (DSM) or International Classification of Diseases (ICD) classifications. We therefore refer to the exposure in this paper as major depression as opposed to the DSM-IV category of major depressive disorder (MDD). The population attributable fraction (PAF) was calculated using the pooled RR estimate. Attributable burden was calculated by multiplying the PAF by the underlying burden of IHD estimated as part of GBD 2010. Results The pooled relative risk of developing IHD in those with major depression was 1.56 (95% CI 1.30 to 1.87). Globally there were almost 4 million estimated IHD disability-adjusted life years (DALYs), which can be attributed to major depression in 2010; 3.5 million years of life lost and 250,000 years of life lived with a disability. These findings highlight a previously underestimated mortality component of the burden of major depression. As a proportion of overall IHD burden, 2.95% (95% CI 1.48 to 4.46%) of IHD DALYs were estimated to be attributable to MDD in 2010. Eastern Europe and North Africa/Middle East demonstrate the highest proportion with Asia Pacific, high income representing the lowest. Conclusions The present work comprises the most robust systematic review of its kind to date. The key finding that major depression may be responsible for approximately 3% of global IHD DALYs warrants assessment for depression in patients at high risk of developing IHD or at risk of a repeat IHD event.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.