842 resultados para IL Task Force


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Introducción: El conocimiento actual de la fisiopatología del envejecimiento periorbitario justifica la aplicación de materiales de relleno inyectables, dado que se enfocan en la restauración del volumen perdido en esta zona, convirtiéndose en una excelente alternativa a procedimientos quirúrgicos que remueven el tejido excedente. Sin embargo los efectos y la seguridad de esta naciente tendencia terapéutica aún no se sustentan en una sólida base científica. El objetivo de esta revisión es identificar el material de relleno inyectable más adecuado para el manejo de los defectos volumétricos estéticos de la región periorbitaria. Metodología: Se realizó una búsqueda exhaustiva de los artículos indexados publicados del 1º de enero de 2.000 al 30 de septiembre de 2.013, en diversas bases de datos electrónicas, se seleccionaron catorce publicaciones, se extrajo la información referente a datos demográficos, la intervención, el seguimiento y los desenlaces y se realizó un análisis de 14 estudios que cumplieron los criterios. Resultados: Todos los artículos incluidos poseían un bajo nivel de evidencia y del grado de recomendación. Todos los materiales de relleno se asociaron a altos niveles de satisfacción para el paciente, adecuada mejoría de la apariencia estética y similares efectos colaterales, el ácido hialurónico fue el material de relleno inyectable más utilizado en la región periorbitaria. Discusión: Los materiales de relleno inyectable mejoran los defectos volumétricos estéticos de la región periorbitaria pero es necesaria mayor evidencia para determinar el tipo relleno más apropiado para esta condición.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Pós-graduação em Ciência da Computação - IBILCE

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper is meant to provide guidance to anyone wishing to write a neurological guideline for diagnosis or treatment, and is directed at the Scientist Panels and task forces of the European Federation of Neurological Societies (EFNS). It substitutes the previous guidance paper from 2004. It contains several new aspects: the guidance is now based on a change of the grading system for evidence and for the resulting recommendations, and has adopted The Grading of Recommendations, Assessment, Development and Evaluation system (GRADE). The process of grading the quality of evidence and strength of recommendations can now be improved and made more transparent. The task forces embarking on the development of a guideline must now make clearer and more transparent choices about outcomes considered most relevant when searching the literature and evaluating their findings. Thus, the outcomes chosen will be more critical, more patient-oriented and easier to translate into simple recommendations. This paper also provides updated practical recommendations for planning a guideline task force within the framework of the EFNS. Finally, this paper hopes to find the approval also by the relevant bodies of our future organization, the European Academy of Neurology.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

"Printed by Division of Water Resources, Illinois Dept. of Transportation, and Illinois Environmental Protection Agency." -- Cover.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This document was prepared in response to a recommendation by the Governor's Small Business Environmental Task Force. It is intended to provide a guide or roadmap to assist you in determining whether your business requires an Air, Land or Water Pollution Control Permit from the Illinois EPA.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Le apparecchiature di manovra tramite isolamento a gas (GIS) sono in funzione da più di 45 anni e hanno dimostrato un alto livello di affidabilità, con tassi di difetto molto bassi. Tuttavia, il riscontro pratico indica che alcuni dei guasti che si verificano durante il servizio sono legati a difetti del sistema di isolamento. Molti di questi difetti possono essere rilevati tramite diagnostica con scariche parziali (PD). Per la rilevazione PD, viene utilizzato il metodo UHF perché meno sensibile ai disturbi e quindi più facile da gestire in confronto al metodo convenzionale secondo IEC 60270. Un rapporto di Electra pubblicato nel 1999 dal CIGRE Task Force 15/33.03.05 descrive la procedura in due fasi per la verifica della sensibilità del sistema UHF in modo molto generale. Dopo 15 anni dalla sua applicazione, è diventata necessaria una descrizione più dettagliata, sia su misure necessarie al test di laboratorio (Passaggio 1) che sul test in loco (Passaggio 2).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Il presente elaborato esplora l’attitudine delle organizzazioni nei confronti dei processi di business che le sostengono: dalla semi-assenza di struttura, all’organizzazione funzionale, fino all’avvento del Business Process Reengineering e del Business Process Management, nato come superamento dei limiti e delle problematiche del modello precedente. All’interno del ciclo di vita del BPM, trova spazio la metodologia del process mining, che permette un livello di analisi dei processi a partire dagli event data log, ossia dai dati di registrazione degli eventi, che fanno riferimento a tutte quelle attività supportate da un sistema informativo aziendale. Il process mining può essere visto come naturale ponte che collega le discipline del management basate sui processi (ma non data-driven) e i nuovi sviluppi della business intelligence, capaci di gestire e manipolare l’enorme mole di dati a disposizione delle aziende (ma che non sono process-driven). Nella tesi, i requisiti e le tecnologie che abilitano l’utilizzo della disciplina sono descritti, cosi come le tre tecniche che questa abilita: process discovery, conformance checking e process enhancement. Il process mining è stato utilizzato come strumento principale in un progetto di consulenza da HSPI S.p.A. per conto di un importante cliente italiano, fornitore di piattaforme e di soluzioni IT. Il progetto a cui ho preso parte, descritto all’interno dell’elaborato, ha come scopo quello di sostenere l’organizzazione nel suo piano di improvement delle prestazioni interne e ha permesso di verificare l’applicabilità e i limiti delle tecniche di process mining. Infine, nell’appendice finale, è presente un paper da me realizzato, che raccoglie tutte le applicazioni della disciplina in un contesto di business reale, traendo dati e informazioni da working papers, casi aziendali e da canali diretti. Per la sua validità e completezza, questo documento è stata pubblicato nel sito dell'IEEE Task Force on Process Mining.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Introducción La ventilación mecánica es fundamental en el manejo de la falla respiratoria aguda, actualmente no existe consenso sobre el momento exacto de extubación. Este estudio describe el comportamiento de la escala OMAHA+ en nuestra institución. Objetivo Principal Describir los desenlaces clínicos relacionados con la escala OMAHA+ durante la extubación de los pacientes de las unidades de cuidado intensivo del hospital universitario. Métodos Estudio descriptivo, retrospectivo, basado en el registro de la escala OMAHA+ de 68 pacientes durante el proceso de extubación en las Unidades de cuidado intensivo adulto de la Fundación Santa Fe de Bogotá durante Agosto de 2014 a Mayo de 2015. Resultados Se encontraron valores gasométricos cercanos a la normalidad, con una PaO2/FiO2 media de 261 (DS 60,6), SaO2 media de 96% (DS 2%), media de lactato sérico de 1.5 mmol/L (DS 1,2 mmol/L), con signos vitales normales. La causa más común de ingreso a UCI fue Neumonía, seguida por cirugía cardiaca y abdominal. Las medias de parámetros ventilatorios al momento de extubación fueron; PEEP de 6 (DS 0,8), volumen corriente de 8ml/Kg (DS 1,4 ml/Kg), índice de Tobín de 34 (DS 11,9), test de fuga positivo 94%, y sólo una extubación fallida. Conclusiones La escala OMAHA+ puede ser una herramienta útil, aplicable y fácilmente reproducible en los pacientes con soporte ventilatorio mecánico invasivo previo al proceso de extubación, con baja proporción de fallo. Estos resultados deben ser evaluados en estudios prospectivos.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background: Indices predictive of central obesity include waist circumference (WC) and waist-to-height ratio (WHtR). The aims of this study were 1) to establish a Colombian youth smoothed centile charts and LMS tables for WC and WHtR and 2) to evaluate the utility of these parameters as predictors of overweight and obesity. Method: A cross-sectional study whose sample population comprised 7954 healthy Colombian schoolchildren [boys n=3460 and girls n=4494, mean (standard deviation) age 12.8 (2.3) years old]. Weight, height, body mass index (BMI), WC and WHtR and its percentiles were calculated. Appropriate cut-offs point of WC and WHtR for overweight and obesity, as defined by the International Obesity Task Force (IOTF) definitions, were selected using receiver operating characteristic (ROC) analysis. The discriminating power of WC and WHtR was expressed as area under the curve (AUC). Results: Reference values for WC and WHtR are presented. Mean WC increased and WHtR decreased with age for both genders. We found a moderate positive correlation between WC and BMI (r= 0.756, P < 0.01) and WHtR and BMI (r= 0.604, P < 0.01). The ROC analysis showed a high discrimination power in the identification of overweight and obesity for both measures in our sample population. Overall, WHtR was slightly a better predictor for overweight/obesity (AUC 95% CI 0.868-0.916) than the WC (AUC 95% CI 0.862-0.904). Conclusion: This paper presents the first sex- and age-specific WC and WHtR percentiles for both measures among Colombian children and adolescents aged 9–17.9 years. By providing LMS tables for Latin-American people based on Colombian reference data, we hope to provide quantitative tools for the study of obesity and its comorbidities.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In Australia, an average 49 building and construction workers have been killed at work each year since 1997-98. Building/construction workers are more than twice as likely to be killed at work, than the average worker in all Australian industries. The ‘Safer Construction’ project, funded by the CRC-Construction Innovation and led by a task force comprising representatives of construction clients, designers and constructors, developed a Guide to Best Practice for Safer Construction. The Guide, which was informed by research undertaken at RMIT University, Queensland University of Technology and Curtin University, establishes broad principles for the improvement of safety in the industry and provides a ‘roadmap’ for improvement based upon lifecycle stages of a building/construction project. Within each project stage, best practices for the management of safety are identified. Each best practice is defined in terms of the recommended action, its key benefits, desirable outcomes, performance measures and leadership. ‘Safer Construction’ practices are identified from the planning to commissioning stages of a project. The ‘Safer Construction’ project represents the first time that key stakeholder groups in the Australian building/construction industry have worked together to articulate best practice and establish an appropriate basis for allocating (and sharing) responsibility for project safety performance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This report is the primary output of Project 4: Copyright and Intellectual Property, the aim of which was to produce a report considering how greater access to and use of government information could be achieved within the scope of the current copyright law. In our submission for Project 4, we undertook to address: •the policy rationales underlying copyright and how they apply in the context of materials owned, held and used by government; • the recommendations of the Copyright Law Review Committee (CLRC) in its 2005 report on Crown copyright; • the legislative and regulatory barriers to information sharing in key domains, including where legal impediments such as copyright have been relied upon (whether rightly or wrongly) to justify a refusal to provide access to government data; • copyright licensing models appropriate to government materials and examples of licensing initiatives in Australia and other relevant jurisdictions; and • issues specific to the galleries, libraries, archives and museums (“GLAM”) sector, including management of copyright in legacy materials and “orphan” works. In addressing these areas, we analysed the submissions received in response to the Government 2.0 Taskforce Issues Paper, consulted with members of the Task Force as well as several key stakeholders and considered the comments posted on the Task Force’s blog. This Project Report sets out our findings on the above issues. It puts forward recommendations for consideration by the Government 2.0 Task Force on steps that can be taken to ensure that copyright and intellectual property promote access to and use of government information.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This document describes algorithms based on Elliptic Cryptography (ECC) for use within the Secure Shell (SSH) transport protocol. In particular, it specifies Elliptic Curve Diffie-Hellman (ECDH) key agreement, Elliptic Curve Menezes-Qu-Vanstone (ECMQV) key agreement, and Elliptic Curve Digital Signature Algorithm (ECDSA) for use in the SSH Transport Layer protocol.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper examines the anti-money laundering systems of Australia, the United Arab Emirates (UAE), the United Kingdom (UK) and the United States of America (USA), the extent to which they have implemented the Financial Action Task Force (FATF) recommendations, and how compliance with these recommendations is affected by local cultural and economic factors. The paper makes use of FATF evaluation reports to compare the countries’ compliance; it examines some of the underlying cultural considerations and culture-specific ethical issues that affect the extent of compliance, and how cultural and ethical considerations may affect good governance. The findings indicate that the UK and the USA are the most advanced with regards to their compliance with the FATF recommendations and Australia and the UAE less so. The UAE is in particular found to be least compliant. We relate this finding to previous work on how a country’s legal and financial systems develop in line with its religion, culture and socio-economic situation, and examine how such local factors have affected the UAE’s financial and anti-money laundering and combating the financing of terrorism (AML/CFT) systems. This research will be of interest to policy-makers and government agencies involved in addressing money laundering and its successful detection and prosecution.