988 resultados para reference point


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The purpose of this paper is to describe the development and to test the reliability of a new method called INTERMED, for health service needs assessment. The INTERMED integrates the biopsychosocial aspects of disease and the relationship between patient and health care system in a comprehensive scheme and reflects an operationalized conceptual approach to case mix or case complexity. The method is developed to enhance interdisciplinary communication between (para-) medical specialists and to provide a method to describe case complexity for clinical, scientific, and educational purposes. First, a feasibility study (N = 21 patients) was conducted which included double scoring and discussion of the results. This led to a version of the instrument on which two interrater reliability studies were performed. In study 1, the INTERMED was double scored for 14 patients admitted to an internal ward by a psychiatrist and an internist on the basis of a joint interview conducted by both. In study 2, on the basis of medical charts, two clinicians separately double scored the INTERMED in 16 patients referred to the outpatient psychiatric consultation service. Averaged over both studies, in 94.2% of all ratings there was no important difference between the raters (more than 1 point difference). As a research interview, it takes about 20 minutes; as part of the whole process of history taking it takes about 15 minutes. In both studies, improvements were suggested by the results. Analyses of study 1 revealed that on most items there was considerable agreement; some items were improved. Also, the reference point for the prognoses was changed so that it reflected both short- and long-term prognoses. Analyses of study 2 showed that in this setting, less agreement between the raters was obtained due to the fact that the raters were less experienced and the scoring procedure was more susceptible to differences. Some improvements--mainly of the anchor points--were specified which may further enhance interrater reliability. The INTERMED proves to be a reliable method for classifying patients' care needs, especially when used by experienced raters scoring by patient interview. It can be a useful tool in assessing patients' care needs, as well as the level of needed adjustment between general and mental health service delivery. The INTERMED is easily applicable in the clinical setting at low time-costs.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This school in the course of Marketing Business Management and specifically Entrepr This school in the course of Marketing Business Management and specifically Entrepreneurship in the discipline of Simulation - Games Marketing year was accordingly for the creation of a company in the computer business in business online simulator called Marketplace, in order to put into practice all the theoretical knowledge acquired during all previous semesters. This platform we were confronted with decisions in eight quarters corresponding 4 every year , in order to encourage learning in a practical way, a virtual and dynamic environment. Every quarter acareados with well organized tasks taking as a reference point defined strategies such as market research analysis, branding , store management after its creation , development of the policy of the 4Ps , identifying opportunities , monitoring of finances and invest heavily . All quarters were subjected decisions and are then given the results , such as: market performance , financial performance, investments in the future , the "health" of the company 's marketing efficiency then analyzed by our company , teaching and also by competition Balanced Scorecard ie , semi-annual and cumulative . For the start of activities it was awarded the 1st year a total of 2,000,000, corresponding to 500,000 out of 4 first quarter , and 5,000,000 in the fifth quarter in a total of 7,000,000 . The capital invested was used to buy market research, opening sales offices , create brands , contract sales force , advertise products created and perform activity R & D in order to make a profit and become self- sufficient to guarantee the payment of principal invested to headquarters ( Corporate Headquarters ) .

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the context of severe economic recession, the Library is compelled to adapt to this changing environment, in order to meet the requirements and demands of users with very specific needs. Taking the pillars of sustainable development as a reference point, and extrapolating them to our domain, we establish the next main goals

Relevância:

60.00% 60.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis studies gray-level distance transforms, particularly the Distance Transform on Curved Space (DTOCS). The transform is produced by calculating distances on a gray-level surface. The DTOCS is improved by definingmore accurate local distances, and developing a faster transformation algorithm. The Optimal DTOCS enhances the locally Euclidean Weighted DTOCS (WDTOCS) with local distance coefficients, which minimize the maximum error from the Euclideandistance in the image plane, and produce more accurate global distance values.Convergence properties of the traditional mask operation, or sequential localtransformation, and the ordered propagation approach are analyzed, and compared to the new efficient priority pixel queue algorithm. The Route DTOCS algorithmdeveloped in this work can be used to find and visualize shortest routes between two points, or two point sets, along a varying height surface. In a digital image, there can be several paths sharing the same minimal length, and the Route DTOCS visualizes them all. A single optimal path can be extracted from the route set using a simple backtracking algorithm. A new extension of the priority pixel queue algorithm produces the nearest neighbor transform, or Voronoi or Dirichlet tessellation, simultaneously with the distance map. The transformation divides the image into regions so that each pixel belongs to the region surrounding the reference point, which is nearest according to the distance definition used. Applications and application ideas for the DTOCS and its extensions are presented, including obstacle avoidance, image compression and surface roughness evaluation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Although classic bankruptcy problems take into account a single claims vector, Pulido et al. (2008) show that there are real bankruptcy situations where agents face more than one reference vector. In particular, they consider the claims and an additional reference vector. To analyze these situations, they propose the extreme and the diagonal approaches. Nonetheless, the former approach depends on the order of the vectors: if we interchange the claims and the reference vectors, the result changes. Moreover their study is limited to the case in which the reference vector is lower than the claims vector. In the present note, we propose an extension that solves these short- comings by introducing the idea of impartiality. Keywords: bankruptcy problems; reference point; compromise solution; impartiality.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The present PhD dissertation consists of three papers, organized in chapters, in the field of behavioral economics. This discipline studies economic behavior of individuals subject to limitations, such as bounded self-interest and bounded willpower. The behavior studied in the present thesis ranges from the complex decision to register as an organ donor, decision¬making in the presence of uncertainty and the decision to give money to a charitable organization. The first chapter aims at testing the effectiveness of an active-decision (AD) mechanism on the decision to become an organ donor in Switzerland, using field experiments. We found that stimulating participants' reflection on the topic of organ donation had a negative effect on the decision to become an organ donor. Moreover, a non-binding commitment nudge reduces putting off the decision, but does not lead to donation rates higher than in the control group. The results suggest that AD may be far more limited than previously thought and raise doubts about the efficacy of engaging potential donors to reflect on the topic of organ donation. Beyond carrying for others, behavioral economics also recognizes that individuals do not evaluate outcomes in absolute terms but rather by comparing them to some reference levels, called reference points. Above the reference points, economic outcomes are perceived as gains, while below these levels the same outcomes are felt as losses. The last two chapters analyze the importance of reference points in the evaluation of economic outcomes. Using a laboratory experiment where subjects played two consecutive lotteries, Chapter 2 studies the speed of adjustment of the reference point. We find that varying the probability of winning the first lottery has no effect on subjects' risk behavior regarding the second lottery. This result indicates a very fast adjustment of the reference point to the latest information. Chapter 3 investigates whether reference points are relevant for charitable preferences. Using actual donation decisions of participants in a laboratory experiment, the results suggest that reference points are not crucial for shaping charitable giving. -- Cette thèse de doctorat consiste en trois articles, organisés en chapitres, dans le domaine de l'économie comportementale. Cette discipline étudie le comportement d'agents économiques sujets à des limitations, telles qu'un égoïsme limité et une volonté limitée. Le comportement étudié dans cette thèse va de la décision complexe de devenir donneur d'organes, la prise de décision en présence d'incertitude à la décision de donner de l'argent à une oeuvre caritative. Le premier chapitre vise à tester l'efficacité d'un mécanisme de « décision active » (active decision, AD) sur la décision de devenir donneur d'organes en Suisse, et ce en recourant à deux expériences hors-laboratoire. Les résultats montrent que stimuler la réflexion des participants sur le don d'organes a un effet négatif sur la décision de devenir donneur. De plus, un mécanisme qui encourage les participants à prendre une décision sur le champ réduit la tendance à procrastiner, mais ne mène pas à un taux de donneurs plus élevé par rapport à un groupe de contrôle. Les résultats suggèrent que le mécanisme AD est bien plus limité que ce qui a été supposé jusqu'à maintenant. De plus, ils suscitent le doute quant à l'efficacité de stimuler la réflexion de potentiels donneurs sur le sujet du don d'organes. En plus de se soucier des autres, l'économie comportementale admet également que les individus n'évaluent pas les résultats de façon absolue, mais en comparant ceux-ci à des niveaux de références, souvent appelés points de référence. Au-dessus de ces points de référence, les résultats sont perçus en tant que gains, tandis qu'en-dessous ces mêmes résultats sont considérés comme des pertes. Les deux derniers chapitres analysent l'importance des points de référence dans diverses situations. A l'aide d'une expérience en laboratoire dans laquelle les participants participent à deux loteries consécutives, le chapitre 2 étudie la vitesse d'ajustement du point de référence. Le résultat montre que varier la probabilité de gagner la première loterie n'a aucun effet sur le comportement en matière de risques concernant la deuxième loterie. Cela indique un ajustement très rapide du point de référence. Le chapitre 3 vise à déterminer si les points de référence ont un rôle majeur concernant les préférences caritatives. Les données relatives aux décisions de don des participants d'une expérience en laboratoire montrent que les points de référence n'influencent pas significativement le don caritatif.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Abstract Objective: To perform a comparative dosimetric analysis, based on computer simulations, of temporary balloon implants with 99mTc and balloon brachytherapy with high-dose-rate (HDR) 192Ir, as boosts to radiotherapy. We hypothesized that the two techniques would produce equivalent doses under pre-established conditions of activity and exposure time. Materials and Methods: Simulations of implants with 99mTc-filled and HDR 192Ir-filled balloons were performed with the Siscodes/MCNP5, modeling in voxels a magnetic resonance imaging set related to a young female. Spatial dose rate distributions were determined. In the dosimetric analysis of the protocols, the exposure time and the level of activity required were specified. Results: The 99mTc balloon presented a weighted dose rate in the tumor bed of 0.428 cGy.h-1.mCi-1 and 0.190 cGyh-1.mCi-1 at the balloon surface and at 8-10 mm from the surface, respectively, compared with 0.499 and 0.150 cGyh-1.mCi-1, respectively, for the HDR 192Ir balloon. An exposure time of 24 hours was required for the 99mTc balloon to produce a boost of 10.14 Gy with 1.0 Ci, whereas only 24 minutes with 10.0 Ci segments were required for the HDR 192Ir balloon to produce a boost of 5.14 Gy at the same reference point, or 10.28 Gy in two 24-minutes fractions. Conclusion: Temporary 99mTc balloon implantation is an attractive option for adjuvant radiotherapy in breast cancer, because of its availability, economic viability, and similar dosimetry in comparison with the use of HDR 192Ir balloon implantation, which is the current standard in clinical practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This article aims to analyse the evolution of the corporate banking credit market in Brazil during the recent cycle (january 2003 to june 2009) from a Keynesian theoretical reference point. The article focuses on the dynamics of the six major segments of this market (industry, commerce, services, infrastructure, real estate and rural sector), highlighting their main similarities and differences concerning the cyclical dynamics, the participation in the total corporate banking credit, the origin of resources, the composition of capital ownership and the performance of public and private banks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this qualitative investigation, the researcher examined the experiences of 10 teachers as they implemented a classroom management model called the Respect Circle. Through interviews and journal entries, the writer sought to understand how the participating teachers developed their classroom management practice, using the Respect Circle as a reference point. Data collection occurred over a 10-week period from October to December. The findings of this study demonstrate the multifaceted and complex nature of classroom management. Participants identified relationships with their students as the premier factor in establishing classroom management. Additionally, pro action, professional reflection, adaptability, and consistency figured prominently in the classroom management approaches taken by the participating teachers. Utilizing the experiences and suggestions of the participants as a springboard, the Respect Circle model was revised. The findings underline areas of concern regarding classroom management and suggest that teachers want a respectful, structured yet flexible model upon which to base their classroom management. Suggestions for teachers, new and experienced; school administrators; and developers of classroom management courses are provided.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Assessment water’ quality nowa-days in global scenario implies the need for a reference point against which monitoring can be measured and weighed. Aquatic ecosystenis as part of the natural environment are balanced both witliin tlicinselves and with other environmental compartments and this equilibrium is subject to natural variations and evolutions as well as variations caused by human intervention. The present assessnient is to identify. and possibly quantify, anthropogenic influences over time against a “natural baseline situation. Water pollution problems have only recently been taken seriously in retrospect. Once damage occurred, it becomes immeasurable, and control action cannot be initiated

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The use of perturbation and power transformation operations permits the investigation of linear processes in the simplex as in a vectorial space. When the investigated geochemical processes can be constrained by the use of well-known starting point, the eigenvectors of the covariance matrix of a non-centred principal component analysis allow to model compositional changes compared with a reference point. The results obtained for the chemistry of water collected in River Arno (central-northern Italy) have open new perspectives for considering relative changes of the analysed variables and to hypothesise the relative effect of different acting physical-chemical processes, thus posing the basis for a quantitative modelling

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A través del tiempo las técnicas anestésicas basadas en opioides y especialmente en fentanyl han sido las más frecuentemente utilizadas en cirugía cardiaca pediátrica con circulación extracorpórea (CEC). La población pediátrica y en especial los niños menores de 10 kilos de peso tienen mayor susceptibilidad a las complicaciones postoperatorias, una de las razones para esta especial susceptibilidad es la respuesta al estrés y la reacción inflamatoria sistémica que desencadena la CEC en estos pacientes. La utilización de nuevos opioides (Remifentanil) más potentes, puede tener un impacto importante en la disminución del estrés metabólico desencadenado por la cirugía cardiaca. Mediante un estudio de cohortes realizado con los pacientes menores de 10 kilogramos de peso llevados a cirugía cardiaca con CEC se expusieron a dos diferentes técnicas anestésicas: la técnica “tradicional” basada en Fentanyl y otra basada en Remifentanil, se midieron las covariables que pudieran provocar altos niveles de estrés metabólico y se tomaron niveles basales y postoperatorios de tres metabolitos relacionados con el estrés (Lactato, Glucosa y Cortisol). Los resultados del estudio muestran grupos comparables en las mediciones basales de metabolitos de estrés y características clínicas, además de una relación, estadísticamente significativa, entre una menor producción de glucosa durante la CEC en los pacientes que son anestesiados con infusiones de remifentanil, los demás metabolitos no tuvieron relación con la técnica anestésica. Estos resultados abren caminos para la realización de estudios clínicos con el objetivo de establecer terapéuticas que permitan la disminución de la morbi-mortalidad asociada a cirugía cardiaca.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Según Philip Kotler, considerado el padre del mercadeo, (en su libro Principles Of Marketing) la mercadotecnia es «el proceso social y administrativo por el cual los grupos e individuos satisfacen sus necesidades al crear e intercambiar bienes y servicios». La presente investigación tomará como punto de referencia para conceptualizar el marco teórico, la historia y evolución del mercadeo y sus actuales tendencias y rumbos; así como la incidencia que tiene en la planificación del área de mercadeo para las empresas que siguen este tipo de corrientes contemporáneas. Durante el desarrollo de la presente investigación se analizaran las nuevas tendencias de mercadeo basándose en la evolución y su referencia histórica. Ahora, se verá cómo el e-marketing compone una nueva estrategia para el desarrollo de ventaja competitiva entendiéndose ésta como un conjunto de atributos de una empresa que la distinguen de sus competidores. Este nuevo marketing que se quiere presentar, Total e-marketing, se compone del posicionamiento de la organización en la realidad virtual. Se utilizarán como factores claves de éxito en el posicionamiento de la organización en buscadores de internet como redes, wikipedia, google, facebook, etc.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The UK Professional Standards Framework (UK PSF) for teaching and supporting learning, launched in February 2006, is a flexible framework which uses a descriptor-based approach to professional standards. There are three standard descriptors each of which is applicable to a number of staff roles and to different career stages of those engaged in teaching and supporting learning. The standard descriptors are underpinned by areas of professional activity, core knowledge and professional values. The framework provides a reference point for institutions and individuals as well as supporting ongoing development within any one standard descriptor.