2 resultados para Reporting concerns

em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a controversy about the best way to report results after bariatric surgery. Several indices have been proposed over the years such as percentage of total weight loss (%TWL), percentage of excess weight loss (%EWL), and percentage of excess body mass index loss (%EBMIL). More recently, it has been suggested to individualize the body mass index (BMI) goal to be achieved by the patients (predicted BMI-PBMI). The objective was to assess the reproducibility of this PBMI in our service. In this retrospective study, we assessed the %TWL, %EWL, %EBMIL (with expected BMI of 25 kg/m(2)), and %EBMIL (with PBMI) over 4 years of observation in two groups of patients: BMI < 50 kg/m(2) and BMI a parts per thousand yen50 kg/m(2). The medical records of 403 patients were studied. From 18 to 42 months after surgery, %TWL was higher in the superobese group, whereas %EWL was similar for the two groups. %EBMIL was higher in less obese patients up to 24 months and similar thereafter. In contrast, %EBMIL with PBMI was greater in the superobese group, although it never reached the 100% goal. We conclude that %EBMIL results according to PBMI were not reproducible in our institution. There is a need to elaborate a new easy-to-obtain and reproducible index.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.