883 resultados para Development programs
Resumo:
La presencia de microorganismos patógenos en alimentos es uno de los problemas esenciales en salud pública, y las enfermedades producidas por los mismos es una de las causas más importantes de enfermedad. Por tanto, la aplicación de controles microbiológicos dentro de los programas de aseguramiento de la calidad es una premisa para minimizar el riesgo de infección de los consumidores. Los métodos microbiológicos clásicos requieren, en general, el uso de pre-enriquecimientos no-selectivos, enriquecimientos selectivos, aislamiento en medios selectivos y la confirmación posterior usando pruebas basadas en la morfología, bioquímica y serología propias de cada uno de los microorganismos objeto de estudio. Por lo tanto, estos métodos son laboriosos, requieren un largo proceso para obtener resultados definitivos y, además, no siempre pueden realizarse. Para solucionar estos inconvenientes se han desarrollado diversas metodologías alternativas para la detección identificación y cuantificación de microorganismos patógenos de origen alimentario, entre las que destacan los métodos inmunológicos y moleculares. En esta última categoría, la técnica basada en la reacción en cadena de la polimerasa (PCR) se ha convertido en la técnica diagnóstica más popular en microbiología, y recientemente, la introducción de una mejora de ésta, la PCR a tiempo real, ha producido una segunda revolución en la metodología diagnóstica molecular, como pude observarse por el número creciente de publicaciones científicas y la aparición continua de nuevos kits comerciales. La PCR a tiempo real es una técnica altamente sensible -detección de hasta una molécula- que permite la cuantificación exacta de secuencias de ADN específicas de microorganismos patógenos de origen alimentario. Además, otras ventajas que favorecen su implantación potencial en laboratorios de análisis de alimentos son su rapidez, sencillez y el formato en tubo cerrado que puede evitar contaminaciones post-PCR y favorece la automatización y un alto rendimiento. En este trabajo se han desarrollado técnicas moleculares (PCR y NASBA) sensibles y fiables para la detección, identificación y cuantificación de bacterias patogénicas de origen alimentario (Listeria spp., Mycobacterium avium subsp. paratuberculosis y Salmonella spp.). En concreto, se han diseñado y optimizado métodos basados en la técnica de PCR a tiempo real para cada uno de estos agentes: L. monocytogenes, L. innocua, Listeria spp. M. avium subsp. paratuberculosis, y también se ha optimizado y evaluado en diferentes centros un método previamente desarrollado para Salmonella spp. Además, se ha diseñado y optimizado un método basado en la técnica NASBA para la detección específica de M. avium subsp. paratuberculosis. También se evaluó la aplicación potencial de la técnica NASBA para la detección específica de formas viables de este microorganismo. Todos los métodos presentaron una especificidad del 100 % con una sensibilidad adecuada para su aplicación potencial a muestras reales de alimentos. Además, se han desarrollado y evaluado procedimientos de preparación de las muestras en productos cárnicos, productos pesqueros, leche y agua. De esta manera se han desarrollado métodos basados en la PCR a tiempo real totalmente específicos y altamente sensibles para la determinación cuantitativa de L. monocytogenes en productos cárnicos y en salmón y productos derivados como el salmón ahumado y de M. avium subsp. paratuberculosis en muestras de agua y leche. Además este último método ha sido también aplicado para evaluar la presencia de este microorganismo en el intestino de pacientes con la enfermedad de Crohn's, a partir de biopsias obtenidas de colonoscopia de voluntarios afectados. En conclusión, este estudio presenta ensayos moleculares selectivos y sensibles para la detección de patógenos en alimentos (Listeria spp., Mycobacterium avium subsp. paratuberculosis) y para una rápida e inambigua identificación de Salmonella spp. La exactitud relativa de los ensayos ha sido excelente, si se comparan con los métodos microbiológicos de referencia y pueden serusados para la cuantificación de tanto ADN genómico como de suspensiones celulares. Por otro lado, la combinación con tratamientos de preamplificación ha resultado ser de gran eficiencia para el análisis de las bacterias objeto de estudio. Por tanto, pueden constituir una estrategia útil para la detección rápida y sensible de patógenos en alimentos y deberían ser una herramienta adicional al rango de herramientas diagnósticas disponibles para el estudio de patógenos de origen alimentario.
Resumo:
A sample of regular education teachers was surveyed to assess the social skills of recently mainstreamed students from oral deaf programs in their classrooms. In addition, a curriculum of social skills activities was developed to help prepare students from oral deaf schools to enter the mainstream.
Resumo:
The Perspex Machine arose from the unification of computation with geometry. We now report significant redevelopment of both a partial C compiler that generates perspex programs and of a Graphical User Interface (GUI). The compiler is constructed with standard compiler-generator tools and produces both an explicit parse tree for C and an Abstract Syntax Tree (AST) that is better suited to code generation. The GUI uses a hash table and a simpler software architecture to achieve an order of magnitude speed up in processing and, consequently, an order of magnitude increase in the number of perspexes that can be manipulated in real time (now 6,000). Two perspex-machine simulators are provided, one using trans-floating-point arithmetic and the other using transrational arithmetic. All of the software described here is available on the world wide web. The compiler generates code in the neural model of the perspex. At each branch point it uses a jumper to return control to the main fibre. This has the effect of pruning out an exponentially increasing number of branching fibres, thereby greatly increasing the efficiency of perspex programs as measured by the number of neurons required to implement an algorithm. The jumpers are placed at unit distance from the main fibre and form a geometrical structure analogous to a myelin sheath in a biological neuron. Both the perspex jumper-sheath and the biological myelin-sheath share the computational function of preventing cross-over of signals to neurons that lie close to an axon. This is an example of convergence driven by similar geometrical and computational constraints in perspex and biological neurons.
Resumo:
Using aggregate indices of education, health, demographic, and gender equality outcomes, we empirically investigate the hypothesis that Bangladesh achieved a higher level of social development compared with countries of similar level of per capita income. Stylized facts and cross-country regression results support this hypothesis for a broad range of dimensions. Further tests show that such achievements do not simply reflect income-mediated channels and social expenditure programs. We conclude by speculating on the role of Bangladesh’s development to sustain the process of growth and on the role of governance and institutional quality for the nexus between growth and development.
Resumo:
Aggression in children is associated with an enhanced tendency to attribute hostile intentions to others. However, limited information is available regarding the factors that contribute to the development of such hostile attribution tendencies. We examined factors that contribute to individual differences in child hostile attributions and aggression, focusing on potential pathways from maternal hostile attributions via negative parenting behavior. We conducted a longitudinal study of 98 mothers and children (47 male, 51 female), recruited from groups experiencing high and low levels of psychosocial adversity. Maternal hostile attributions, observed parenting, and child behaviour were assessed at 18 months and 5 years child age, and child hostile attributions were also examined at 5 years. Independent assessments of maternal and child processes were utilized where possible. Analyses provided support for a direct influence of maternal hostile attributions on the development of child hostile attributions and aggressive behaviour. Maternal hostile attributions were also associated with negative parenting behaviour, which in turn influenced child adjustment. Even taking account of possible parenting influences and preexisting child difficulties, hostile attributions in the mother showed a direct link with child aggression at 5 years. Maternal hostile attributions were themselves related to psychosocial adversity. We conclude that maternal hostile attributions are prevalent in high-risk samples and are related to less optimal parenting behaviour, child hostile attributions, and child aggression. Targeting hostile maternal cognitions may be a useful adjunct to parenting programs
Resumo:
Background 29 autoimmune diseases, including Rheumatoid Arthritis, gout, Crohn’s Disease, and Systematic Lupus Erythematosus affect 7.6-9.4% of the population. While effective therapy is available, many patients do not follow treatment or use medications as directed. Digital health and Web 2.0 interventions have demonstrated much promise in increasing medication and treatment adherence, but to date many Internet tools have proven disappointing. In fact, most digital interventions continue to suffer from high attrition in patient populations, are burdensome for healthcare professionals, and have relatively short life spans. Objective Digital health tools have traditionally centered on the transformation of existing interventions (such as diaries, trackers, stage-based or cognitive behavioral therapy programs, coupons, or symptom checklists) to electronic format. Advanced digital interventions have also incorporated attributes of Web 2.0 such as social networking, text messaging, and the use of video. Despite these efforts, there has not been little measurable impact in non-adherence for illnesses that require medical interventions, and research must look to other strategies or development methodologies. As a first step in investigating the feasibility of developing such a tool, the objective of the current study is to systematically rate factors of non-adherence that have been reported in past research studies. Methods Grounded Theory, recognized as a rigorous method that facilitates the emergence of new themes through systematic analysis, data collection and coding, was used to analyze quantitative, qualitative and mixed method studies addressing the following autoimmune diseases: Rheumatoid Arthritis, gout, Crohn’s Disease, Systematic Lupus Erythematosus, and inflammatory bowel disease. Studies were only included if they contained primary data addressing the relationship with non-adherence. Results Out of the 27 studies, four non-modifiable and 11 modifiable risk factors were discovered. Over one third of articles identified the following risk factors as common contributors to medication non-adherence (percent of studies reporting): patients not understanding treatment (44%), side effects (41%), age (37%), dose regimen (33%), and perceived medication ineffectiveness (33%). An unanticipated finding that emerged was the need for risk stratification tools (81%) with patient-centric approaches (67%). Conclusions This study systematically identifies and categorizes medication non-adherence risk factors in select autoimmune diseases. Findings indicate that patients understanding of their disease and the role of medication are paramount. An unexpected finding was that the majority of research articles called for the creation of tailored, patient-centric interventions that dispel personal misconceptions about disease, pharmacotherapy, and how the body responds to treatment. To our knowledge, these interventions do not yet exist in digital format. Rather than adopting a systems level approach, digital health programs should focus on cohorts with heterogeneous needs, and develop tailored interventions based on individual non-adherence patterns.
Resumo:
In this paper we describe our system for automatically extracting "correct" programs from proofs using a development of the Curry-Howard process. Although program extraction has been developed by many authors, our system has a number of novel features designed to make it very easy to use and as close as possible to ordinary mathematical terminology and practice. These features include 1. the use of Henkin's technique to reduce higher-order logic to many-sorted (first-order) logic; 2. the free use of new rules for induction subject to certain conditions; 3. the extensive use of previously programmed (total, recursive) functions; 4. the use of templates to make the reasoning much closer to normal mathematical proofs and 5. a conceptual distinction between the computational type theory (for representing programs)and the logical type theory (for reasoning about programs). As an example of our system we give a constructive proof of the well known theorem that every graph of even parity, which is non-trivial in the sense that it does not consist of isolated vertices, has a cycle. Given such a graph as input, the extracted program produces a cycle as promised.
Resumo:
In this paper we describe a new protocol that we call the Curry-Howard protocol between a theory and the programs extracted from it. This protocol leads to the expansion of the theory and the production of more powerful programs. The methodology we use for automatically extracting “correct” programs from proofs is a development of the well-known Curry-Howard process. Program extraction has been developed by many authors, but our presentation is ultimately aimed at a practical, usable system and has a number of novel features. These include 1. a very simple and natural mimicking of ordinary mathematical practice and likewise the use of established computer programs when we obtain programs from formal proofs, and 2. a conceptual distinction between programs on the one hand, and proofs of theorems that yield programs on the other. An implementation of our methodology is the Fred system. As an example of our protocol we describe a constructive proof of the well-known theorem that every graph of even parity can be decomposed into a list of disjoint cycles. Given such a graph as input, the extracted program produces a list of the (non-trivial) disjoint cycles as promised.
Resumo:
We present a method using an extended logical system for obtaining programs from specifications written in a sublanguage of CASL. These programs are “correct” in the sense that they satisfy their specifications. The technique we use is to extract programs from proofs in formal logic by techniques due to Curry and Howard. The logical calculus, however, is novel because it adds structural rules corresponding to the standard ways of modifying specifications: translating (renaming), taking unions, and hiding signatures. Although programs extracted by the Curry-Howard process can be very cumbersome, we use a number of simplifications that ensure that the programs extracted are in a language close to a standard high-level programming language. We use this to produce an executable refinement of a given specification and we then provide a method for producing a program module that maximally respects the original structure of the specification. Throughout the paper we demonstrate the technique with a simple example.
Resumo:
This article provides a blueprint for successful library strategies in support of accreditations for regional bodies as well as reviews of discipline-specific academic programs spanning a wide range of knowledge areas.
Resumo:
Expediting new program development can help universities meet student and employer demand while gaining an edge over competitors, but coordinating program development and approval requires careful preparation and execution. This report profiles strategies to measure market demand for new programs, choose programs for accelerated development, and leverage internal resources. The report also suggests ways to structure and staff program development to maximize speed and effectiveness.
Resumo:
O aumento de empresas que operam internacionalmente requer o desenvolvimento de líderes mundiais para colocar as estratégias em prática. Embora este processo de desenvolvimento é importante para o mundo corporativo, muitos futuros executivos são graduados de escolas de administração de empresas que estão intimamente ligados ao mundo de negócios e, portanto, desempenhão um papel importante no processo. Esta pesquisa examina se os programas europeus “Master in Management” classificado pelo Financial Times em 2010 selecionam aqueles candidatos que são mais adequados para o desenvolvimento de liderança global. Portanto, três anteriores meta-estudos são sintetizados para produzir um perfil de competências classificadas de um líder global. Então, informações sobre os critérios de admissão dos programas de mestrado são coletadas e comparadas com este perfil. Os resultados mostram que seis competências são medidas por mais da metade dos programas: proficiência em Inglês, capacidade analítica (racionamento lógico e quantitativo), capacidade de comunicação, conhecimento do negócio global, determinação para alcançar, motivação e capacidade interpessoal. Além disso, as habilidades operacionais requerentes pelos líderes globais não são significativas no processo de admissão e o foco é sobre as habilidades analíticas. Comparação dos resultados com o perfil anteriormente desenvolvido abrangente indica que uma quantidade significativa de programas pode subestimar o significado de habilidades pessoais e características para o desenvolvimento de líderes globais.
Resumo:
A common feature in programs of the International Monetary Fund (IMF) is the use of conditionalities, macroeconomic and structural measures that a requesting country should adopt to obtain an assistance package. The objective of this work is to conduct an empirical analysis of the economic and political determinants of such conditionalities. In particular, our main contribution consists in the development of a new measure of conditionality, fiscal adjustment, and its comparison with the most used in the literature, the number of conditions. We choose fiscal adjustment because it is an adequate proxy for program austerity, since its implementation carries economic and political costs. In the empirical exercise, we use data from 184 programs in the period of 1999 and 2012, and estimate how our two measures of conditionalities respond to the economic and political factors. Our results suggest that they are quite different. The main determinant of the number of conditions is the political proximity of the borrowing country to the Fund’s major shareholders, the members of G5. On the other hand, the main determinant of fiscal adjustment is the size of the government fiscal deficit. Finally, we did not find correlation between the size of fiscal adjustment and the number of conditions. These results suggest that the analysis of the content of IMF programs should take into account the different measures of agreed conditionality.