246 resultados para Predecessor Existence Problem
Resumo:
Background There are no prospective studies that have examined for chronic cough in children without lung disease but with gastroesophageal reflux (GER). In otherwise healthy children undergoing flexible upper gastrointestinal endoscopy (esophago-gastroscopy), the aims of the study were to (1) define the frequency of cough in relation to symptoms of GER, (2) examine if children with cough and reflux esophagitis (RE) have different airway cellularity and microbiology in bronchoalveolar lavage (BAL) when compared to those without. Methods Data specific for chronic cough (>4-weeks), symptoms of GER and cough severity were collected. Children aged <16-years (n = 150) were defined as 'coughers' (C+) if a history of cough in association with their GER symptoms was elicited before BAL were obtained during elective esophago-gastroscopy. Presence of esophagitis on esophageal biopsies was considered reflux esophagitis positive (E+). Results C+ (n = 69) were just as likely as C- (n = 81) to have esophagitis, odds ratio 0.87 (95%CI 0.46, 1.7). Median neutrophil percentage in BAL was significantly different between groups; highest in C+E- (7, IQR 28) and lowest in C-E+ (5, IQR 6). BAL positive bacterial culture occurred in 20.7% and were more likely present in current coughers (OR 3.37, 95%CI 1.39, 8.08). Airway neutrophilia (median 20%, IQR 34) was significantly higher in those with BAL positive bacterial cultures than those without (5%, 4; p = 0.0001). Conclusion In children without lung disease, the common co-existence of cough with symptoms of GER is independent of the occurrence of esophagitis. Airway neutrophilia when present in these children is more likely to be related to airway bacterial infection and not to esophagitis.
Resumo:
Objective This study aims to identify the main reasons for which first time and multiple users seek medical care through Queensland emergency departments (ED). Methods A cross-sectional survey was conducted at eight public EDs among presenting patients (n = 911). The questions measured the socio-demographic characteristics of patients, their beliefs and attitudes towards EDs services, and perceptions of health status. Bivariate and binary logistic regression analyses were performed to examine the differences between first time and multiple users of EDs. Results First time and multiple users accounted for 55.5% and 44.5%, respectively. Multiple users themselves believed to be sicker, have poorer health status, and additional and/or chronic health conditions. Multiple users more strongly believed that their condition required treatment at an ED and perceived their condition as being very serious. Multiple users reported weekly household incomes below $600, and half of the multiple users were not working as compared to 35% first time users. Multivariate analysis showed that multiple use was significantly associated with the existence of additional health problems, having chronic condition, lower self-efficacy, and need for ED treatment. Conclusions Patients who sought care for multiple times at EDs more often than first time users suffered from additional and chronic conditions. Their opinion of an ED as the most suitable place to address their current health problem was stronger than first time users. Any proposed demand management strategies need to address these beliefs together with the reasoning of patients to provide effective and appropriate care outside or within ED services.
Resumo:
In the past few years, the virtual machine (VM) placement problem has been studied intensively and many algorithms for the VM placement problem have been proposed. However, those proposed VM placement algorithms have not been widely used in today's cloud data centers as they do not consider the migration cost from current VM placement to the new optimal VM placement. As a result, the gain from optimizing VM placement may be less than the loss of the migration cost from current VM placement to the new VM placement. To address this issue, this paper presents a penalty-based genetic algorithm (GA) for the VM placement problem that considers the migration cost in addition to the energy-consumption of the new VM placement and the total inter-VM traffic flow in the new VM placement. The GA has been implemented and evaluated by experiments, and the experimental results show that the GA outperforms two well known algorithms for the VM placement problem.
Resumo:
This chapter addresses opportunities for problem posing in developing young children’s statistical literacy, with a focus on student-directed investigations. Although the notion of problem posing has broadened in recent years, there nevertheless remains limited research on how problem posing can be integrated within the regular mathematics curriculum, especially in the areas of statistics and probability. The chapter first reviews briefly aspects of problem posing that have featured in the literature over the years. Consideration is next given to the importance of developing children’s statistical literacy in which problem posing is an inherent feature. Some findings from a school playground investigation conducted in four, fourth-grade classes illustrate the different ways in which children posed investigative questions, how they made predictions about their outcomes and compared these with their findings, and the ways in which they chose to represent their findings.
Resumo:
Engineering-based modeling activities provide a rich source of meaningful situations that capitalize on and extend students’ routine learning. By integrating such activities within existing curricula, students better appreciate how their school learning in mathematics and science applies to problems in the outside world...
Resumo:
Research on problem solving in the mathematics curriculum has spanned many decades, yielding pendulum-like swings in recommendations on various issues. Ongoing debates concern the effectiveness of teaching general strategies and heuristics, the role of mathematical content (as the means versus the learning goal of problem solving), the role of context, and the proper emphasis on the social and affective dimensions of problem solving (e.g., Lesh & Zawojewski, 2007; Lester, 2013; Lester & Kehle, 2003; Schoenfeld, 1985, 2008; Silver, 1985). Various scholarly perspectives—including cognitive and behavioral science, neuroscience, the discipline of mathematics, educational philosophy, and sociocultural stances—have informed these debates, often generating divergent resolutions. Perhaps due to this uncertainty, educators’ efforts over the years to improve students’ mathematical problem-solving skills have had disappointing results. Qualitative and quantitative studies consistently reveal mathematics students’ struggles to solve problems more significant than routine exercises (OECD, 2014; Boaler, 2009)...
What triggers problem recognition? An exploration on young Australian male problematic online gamers
Resumo:
Help-seeking is a complex decision-making process that first begins with problem recognition. However, little is understood about the conceptualisation of the helpseeking process and the triggers of problem recognition. This research proposes the use of the Critical Incident Technique (CIT) to examine and classify incidents that serve as key triggers of problem recognition among young Australian male problematic online gamers. The research provides a classification of five different types of triggers that will aid social marketers into developing effective early detection, prevention and treatment focused social marketing interventions.
Resumo:
Concept mapping involves determining relevant concepts from a free-text input, where concepts are defined in an external reference ontology. This is an important process that underpins many applications for clinical information reporting, derivation of phenotypic descriptions, and a number of state-of-the-art medical information retrieval methods. Concept mapping can be cast into an information retrieval (IR) problem: free-text mentions are treated as queries and concepts from a reference ontology as the documents to be indexed and retrieved. This paper presents an empirical investigation applying general-purpose IR techniques for concept mapping in the medical domain. A dataset used for evaluating medical information extraction is adapted to measure the effectiveness of the considered IR approaches. Standard IR approaches used here are contrasted with the effectiveness of two established benchmark methods specifically developed for medical concept mapping. The empirical findings show that the IR approaches are comparable with one benchmark method but well below the best benchmark.
Resumo:
Messenger RNAs (mRNAs) can be repressed and degraded by small non-coding RNA molecules. In this paper, we formulate a coarsegrained Markov-chain description of the post-transcriptional regulation of mRNAs by either small interfering RNAs (siRNAs) or microRNAs (miRNAs). We calculate the probability of an mRNA escaping from its domain before it is repressed by siRNAs/miRNAs via cal- culation of the mean time to threshold: when the number of bound siRNAs/miRNAs exceeds a certain threshold value, the mRNA is irreversibly repressed. In some cases,the analysis can be reduced to counting certain paths in a reduced Markov model. We obtain explicit expressions when the small RNA bind irreversibly to the mRNA and we also discuss the reversible binding case. We apply our models to the study of RNA interference in the nucleus, examining the probability of mRNAs escaping via small nuclear pores before being degraded by siRNAs. Using the same modelling framework, we further investigate the effect of small, decoy RNAs (decoys) on the process of post-transcriptional regulation, by studying regulation of the tumor suppressor gene, PTEN : decoys are able to block binding sites on PTEN mRNAs, thereby educing the number of sites available to siRNAs/miRNAs and helping to protect it from repression. We calculate the probability of a cytoplasmic PTEN mRNA translocating to the endoplasmic reticulum before being repressed by miRNAs. We support our results with stochastic simulations
Resumo:
Background The Palliative Care Problem Severity Score is a clinician-rated tool to assess problem severity in four palliative care domains (pain, other symptoms, psychological/spiritual, family/carer problems) using a 4-point categorical scale (absent, mild, moderate, severe). Aim To test the reliability and acceptability of the Palliative Care Problem Severity Score. Design: Multi-centre, cross-sectional study involving pairs of clinicians independently rating problem severity using the tool. Setting/participants Clinicians from 10 Australian palliative care services: 9 inpatient units and 1 mixed inpatient/community-based service. Results A total of 102 clinicians participated, with almost 600 paired assessments completed for each domain, involving 420 patients. A total of 91% of paired assessments were undertaken within 2 h. Strength of agreement for three of the four domains was moderate: pain (Kappa = 0.42, 95% confidence interval = 0.36 to 0.49); psychological/spiritual (Kappa = 0.48, 95% confidence interval = 0.42 to 0.54); family/carer (Kappa = 0.45, 95% confidence interval = 0.40 to 0.52). Strength of agreement for the remaining domain (other symptoms) was fair (Kappa = 0.38, 95% confidence interval = 0.32 to 0.45). Conclusion The Palliative Care Problem Severity Score is an acceptable measure, with moderate reliability across three domains. Variability in inter-rater reliability across sites and participant feedback indicate that ongoing education is required to ensure that clinicians understand the purpose of the tool and each of its domains. Raters familiar with the patient they were assessing found it easier to assign problem severity, but this did not improve inter-rater reliability.
Resumo:
This study investigated within-person relationships between daily problem solving demands, selection, optimization, and compensation (SOC) strategy use, job satisfaction, and fatigue at work. Based on conservation of resources theory, it was hypothesized that high SOC strategy use boosts the positive relationship between problem solving demands and job satisfaction, and buffers the positive relationship between problem solving demands and fatigue. Using a daily diary study design, data were collected from 64 administrative employees who completed a general questionnaire and two daily online questionnaires over four work days. Multilevel analyses showed that problem solving demands were positively related to fatigue, but unrelated to job satisfaction. SOC strategy use was positively related to job satisfaction, but unrelated to fatigue. A buffering effect of high SOC strategy use on the demands-fatigue relationship was found, but no booster effect on the demands-satisfaction relationship. The results suggest that high SOC strategy use is a resource that protects employees from the negative effects of high problem solving demands.
Resumo:
Instead of regarding a particular type of gambling activity (for example, electronic gambling machines, table games) as an isolated factor for problem gambling, recent research suggests that gambling involvement (for example, as measured by the number of different types of gambling activities played) should also be considered. Using a large sample of the Victorian adult population, this study found that the strength of association between problem gambling and the type of gambling reduced after adjusting for gambling involvement. This finding supports recent research that gambling involvement is an important factor in assessing the risk of problem gambling. The study also provides insights into the measurements of gambling involvement and provides alternative statistical modelling to analyse problem gambling.
Resumo:
Background Despite decades of research, bullying in all its forms is still a significant problem within schools in Australia, as it is internationally. Anti-bullying policies and guidelines are thought to be one strategy as part of a whole school approach to reduce bullying. However, although Australian schools are required to have these policies, their effectiveness is not clear. As policies and guidelines about bullying and cyberbullying are developed within education departments, this paper explores the perspectives of those who are involved in their construction. Purpose This study examined the perspectives of professionals involved in policy construction, across three different Australian states. The aim was to determine how their relative jurisdictions define bullying and cyberbullying, the processes for developing policy, the bullying prevention and intervention recommendations given to schools and the content considered essential in current policies. Sample Eleven key stakeholders from three Australian states with similar education systems were invited to participate. The sample selection criteria included professionals with experience and training in education, cyber-safety and the responsibility to contribute to or make decisions which inform policy in this area for schools in their state. Design and methods Participants were interviewed about the definitions of bullying they used in their state policy frameworks; the extent to which cyberbullying was included; and the content they considered essential for schools to include in anti-bullying policies. Data were collected through in-depth, semi-structured interviews and analysed thematically. Findings Seven themes were identified in the data: - (1) Definition of bullying and cyberbullying; - (2) Existence of a policy template; - (3) Policy location; - (4) Adding cyberbullying; - (5) Distinguishing between bullying and cyberbullying; - (6) Effective policy, and; - (7) Policy as a prevention or intervention tool. The results were similar both across state boundaries and also across different disciplines. Conclusion Analysis of the data suggested that, across the themes, there was some lack of information about bullying and cyberbullying. This limitation could affect the subsequent development, dissemination and sustainability of school anti-bullying policies, which have implications for the translation of research to inform better student outcomes.
Resumo:
In this paper we consider HCI's role in technology interventions for health and well-being. Three projects carried out by the authors are analysed by appropriating the idea of a value chain to chart a causal history from proximal effects generated in early episodes of design through to distal health and well-being outcomes. Responding to recent arguments that favour bounding HCI's contribution to local patterns of use, we propose an unbounded view of HCI that addresses an extended value chain of influence. We discuss a view of HCI methods as mobilising this value chain perspective in multi-disciplinary collaborations through its emphasis on early prototyping and naturalistic studies of use.
Resumo:
Since the declaration by the United Nations that awareness raising should be a key part of efforts to combat human trafficking, government and non-government organisations have produced numerous public awareness campaigns designed to capture the public’s attention and sympathy. These campaigns represent the ‘problem’ of trafficking in specific ways, creating heroes and villains by placing the blame for trafficking on some, while obscuring the responsibility of others. This paper adopts Carol Bacchi’s ‘What is the problem represented to be?’ framework for examining the politicisation of problem representation in 18 anti-trafficking awareness campaigns. It is argued that these campaigns construct a narrow understanding of the problem through the depiction of ‘ideal offenders’. In particular, a strong focus on the demand for commercial sex as causative of human trafficking serves to obscure the problematic role of consumerism in a wide range of industries, and perpetuates an understanding of trafficking that fails to draw a necessary distinction between the demand for labour, and the demand for ‘exploitable’ labour. This problem representation also obscures the role governments in destination countries may play in causing trafficking through imposing restrictive migration regimes that render migrants vulnerable to traffickers.