2 resultados para Customer Experience Management
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
The goal of this prospective randomized clinical trial was to compare 2 cohorts of standardized cleft patients with regard to functional speech outcome and the presence or absence of palatal fistulae. The 2 cohorts are randomized to undergo either a conventional von Langenbeck repair with intravelar velarplasty or the double-opposing Z-plasty Furlow procedure. A prospective 2 x 2 x 2 factorial clinical trial was used in which each subject was randomly assigned to 1 of 8 different groups: 1 of 2 different lip repairs (Spina vs. Millard), 1 of 2 different palatal repair (von Langenbeck vs. Furlow), and 1 of 2 different ages at time of palatal surgery (9-12 months vs. 15-18 months). All surgeries were performed by the same 4 surgeons. A cul-de-sac test of hypernasality and a mirror test of nasal air emission were selected as primary outcome measures for velopharyngeal function. Both a surgeon and speech pathologist examined patients for the presence of palatal fistulae. In this study, the Furlow double-opposing Z-palatoplasty resulted in significantly better velopharyngeal function for speech than the von Langenbeck procedure as determined by the perceptual cul-de-sac test of hypernasality. Fistula occurrence was significantly higher for the Furlow procedure than for the von Langenbeck. Fistulas were more likely to occur in patients with wider clefts and when relaxing incisions were not used.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.