985 resultados para maintenance program
Resumo:
The aim of the research project was to identify the efficacy of the family psychoeducation program as a strategy for reducing the hospital admissions of young people. It also aimed to determine if the family psychoeducation program had an impact on the experience of caregiving and knowledge and satisfaction of services provided by the mental health service. A retrospective chart audit compared readmission history of 27 clients whose families attended a psychoeducation program with readmission history of a matched group of young people whose families did not attend the program. A telephone survey was conducted for both groups of families to investigate knowledge and understanding of services and burden of care. The results indicated that family participation in a brief multiple family psychoeducation program did not reduce the number or duration of admissions of the young people. There was no impact on the level of care for families who attended the psychoeducation program, however, this group showed some evidence of increased knowledge and understanding of services as compared to the control group.
Resumo:
This paper examines the use of on-line discussion as a medium for learning in a pre-service teacher education program. As part of an Education Studies course student teachers engaged in a discussion of issues related to technology and equity in schools. The design of the task and the subsequent analysis of the on-line text were part of a research project investigating whether and how communications technology can be used to integrate and extend the learning of teacher education students. The main argument developed in the paper is that through the on-line activity distinctive sets of writing practices were created. These practices enabled students to make connections between the often disparate parts of teacher education programs-theory and practice, campus and school, research and experience. (C) 2002 Elsevier Science Ltd. All rights reserved.
Resumo:
Chen and Popova [Res. Engng Syst. Saf. 77 (2002) 61] discuss maintenance policies for items sold with a two-dimensional warranty. However, their paper fails to give a proper review of the literature and it also contains errors. In this note we first review the relevant literature and then comment on the errors in their analysis. (C) 2003 Elsevier Ltd. All rights reserved.
Resumo:
Objectives: The aim was to determine whether methadone maintenance treatment reduced heroin use, syringe sharing and HIV or hepatitis C incidence among prisoners. Methods: All eligible prisoners seeking drug treatment were randomised to methadone or a waitlist control group from 1997 to 1998 and followed up after 4 months. Heroin use was measured by hair analysis and self report; drugs used and injected and syringe sharing were measured by self report. Hepatitis C and HIV incidence was measured by serology. Results: Of 593 eligible prisoners, 382 (64%) were randomised to MMT (n = 191) or control (n = 191). 129 treated and 124 control subjects were followed up at 5 months. Heroin use was significantly lower among treated than control subjects at follow up. Treated subjects reported lower levels of drug injection and syringe sharing at follow up. There was no difference in HIV or hepatitis C incidence. Conclusions: Consideration should be given to the introduction of prison methadone programs particular where community based programs exist. (C) 2003 Elsevier Ireland Ltd. All rights reserved.
Resumo:
Purpose: The purpose of this investigation was to evaluate the impact of undertaking peripheral blood stem cell transplantation (PBST) on T-cell number and function, and to determine the role of a mixed type, moderate intensity exercise program in facilitating the recovery of T-cell number and function. Methods: Immunological measures of white blood cell, lymphocyte, CD3(+), CD4(+), and CD8(+) counts, and CD3(+) cell function were assessed pretransplant (PI), immediately posttransplant (PII), and 1 month (II), 2 months (12) and 3 months (PIII) posttransplant. After PII, 12 patients were divided equally into a control group (CG) or exercise intervention group (EG). Results: Lower total T-cell, helper T-cell, and suppressor T-cell counts (P < 0.01), as well as lower T-cell function (P < 0.01), when compared with normative data, were found at PI. More specifically, 88% of the group had CD3(+), CD4(+), and CD8(+) counts that were more than 40%, 20%, and 50% below normal at PI, respectively. Undertaking a PBST caused further adverse changes to the total leukocyte, lymphocyte, CD3(+), CD4(+) and CD8(+) count. and the helper/suppressor ratio. Although CD8(+) counts had returned to normal by PIII, CD3(+), CD4(+), and the CD4(+)/CD8(+) ratio remained significantly lower than normative data (P < 0.01), with 66%, 100%, and 100% of the subject group reporting counts and ratios, respectively, below the normal range. Conclusion: The PBST patients were immunocompromised before undertaking the transplant, and the transplant procedure imposed further adverse changes to the leukocyte and lymphocyte counts. The leukocyte and CD8(+) counts returned to normal within 3 months posttransplant; however, the other immunological parameters assessed demonstrated a delayed recovery. Although participation in the exercise program did not facilitate a faster immune cell recovery, neither did the exercise program hinder or delay recovery.
Resumo:
O objeto de estudo dessa pesquisa é a política de segurança pública brasileira visando compreender o seu percurso ideológico e político no contexto de retomada e da consolidação da democracia no Brasil, após 21 anos de ditadura militar. Considerando o contexto no qual se verifica a existência de disputa política em torno da concepção de segurança pública, o objetivo geral deste trabalho é compreender a matriz estruturante da política de segurança pública no Brasil contemporâneo. Seu intuito visa responder à pergunta inicial e condutora do interesse que estrutura este trabalho, aqui apresentada nos seguintes termos: a política de segurança pública no Brasil após o restabelecimento das eleições diretas para a Presidência da República está em vias de transição, tendendo a assumir caráter democrático ou a força da tradição autoritária na cultura política brasileira tem-se garantido a sua continuidade neste campo da intervenção estatal? Ancoramos a nossa reflexão nas categorias teóricas de dominação, coerção e consenso no pensamento clássico de Hobbes, Marx, Weber e Gramsci, extraindo deles os elementos que nos auxiliam no entendimento da política de segurança pública brasileira. Para o estudo dessa política foi fundamental operarmos uma profunda revisão bibliográfica, especialmente para entender como a manutenção da ordem foi se desenhando no contexto brasileiro e como historicamente tem prevalecido um modelo de segurança pública marcado pelo autoritarismo. Entretanto, a partir da redemocratização brasileira há a emergência de outro paradigma para a política de segurança pública, a segurança cidadã, propondo, entre outras coisas, a reforma das instituições de segurança pública e a formação em direitos humanos nas instituições policiais. Para a análise do paradigma emergente de segurança, buscamos apoio no Programa Nacional dos Direitos Humanos e no Plano Nacional de Segurança Pública, documentos federais que representam a construção de uma nova intencionalidade para a segurança pública no Brasil. Finalmente, reconhecemos que, embora haja significativas reformas na segurança pública, tal política, diante da prevalência de um paradigma de segurança tradicional com fortes componentes autoritários, se encontra entre a segurança cidadã e a continuidade autoritária.
Resumo:
Backcrossing has been little used in cacao breeding, particularly due to the long time required to transfer genes and recover the genetic background of the recurrent parent. The objective of this study was to select individuals, resulting from the backcross CEPEC-42 x SIC-19, genetically related to the recurrent parent SIC-19 by using RAPD molecular markers, among those with resistance to witches' broom. Of the 31 plants that clustered with SIC-19, 18 from the replanted material remained free of the disease in the field, with good vegetative aspect and, therefore can be used for backcross to reach the desired objective.
Resumo:
This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic code. An associated tool is also introduced. This piece of research is part of a broader project on program understanding and re-engineering of legacy code supported by formal methods
Resumo:
Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, and corresponding tools, target either the imperative or the object oriented paradigms, where program slices are computed with respect to a variable or a program statement. Taking a complementary point of view, this paper focuses on the slicing of higher-order functional programs under a lazy evaluation strategy. A prototype of a Haskell slicer, built as proof-of-concept for these ideas, is also introduced
Resumo:
A large and growing amount of software systems rely on non-trivial coordination logic for making use of third party services or components. Therefore, it is of outmost importance to understand and capture rigorously this continuously growing layer of coordination as this will make easier not only the veri cation of such systems with respect to their original speci cations, but also maintenance, further development, testing, deployment and integration. This paper introduces a method based on several program analysis techniques (namely, dependence graphs, program slicing, and graph pattern analysis) to extract coordination logic from legacy systems source code. This process is driven by a series of pre-de ned coordination patterns and captured by a special purpose graph structure from which coordination speci cations can be generated in a number of di erent formalisms
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.
Resumo:
Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually targeting either the imperative or the object oriented paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird- Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general alternative to slicing functional programs
Resumo:
This paper presents a catalog of smells in the context of interactive applications. These so-called usability smells are indicators of poor design on an application’s user interface, with the potential to hinder not only its usability but also its maintenance and evolution. To eliminate such usability smells we discuss a set of program/usability refactorings. In order to validate the presented usability smells catalog, and the associated refactorings, we present a preliminary empirical study with software developers in the context of a real open source hospital management application. Moreover, a tool that computes graphical user interface behavior models, giving the applications’ source code, is used to automatically detect usability smells at the model level.
Resumo:
In this paper we discuss interesting developments of expert systems for machine diagnosis and condition-based maintenance. We review some elements of condition-based maintenance and its applications, expert systems for machine diagnosis, and an example of machine diagnosis. In the last section we note some problems to be resolved so that expert systems for machine diagnosis may gain wider acceptance in the future.