911 resultados para Web-Centric Expert System


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Internet of Things (IoT) is a concept that can foster the emergence of innovative applications. In order to minimize parents’s concerns about their children’s safety, this paper presents the design of a smart Internet of Things system for identifying dangerous situations. The system will be based on real time collection and analysis of physiological signals monitored by non-invasive and non-intrusive sensors, Frequency IDentification (RFID) tags and a Global Positioning System (GPS) to determine when a child is in danger. The assumption of a state of danger is made taking into account the validation of a certain number of biometric reactions to some specific situations and according to a self-learning algorithm developed for this architecture. The results of the analysis of data collected and the location of the child will be able in real time to child’s care holders in a web application.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertação de mestrado integrado em Engenharia Eletrónica Industrial e Computadores

Relevância:

30.00% 30.00%

Publicador:

Resumo:

INTRODUCTION: Neuroimaging studies suggest that obese people might show hyperactivity of brain areas regarding reward processing, and hypoactivity of brain areas concerning cognitive control, when exposed to food cues. Although the effects of bariatric surgery on the central nervous system and eating behavior are well known, few studies have used neuroimage techniques with the aim of investigating the central effects of bariatric surgery in humans. OBJECTIVES: This paper systematically and critically reviews studies using functional neuroimaging to investigate changes on the patterns of activation of central areas related to the regulation of eating behavior after bariatric surgery. METHOD: A search on the databases Medline, Web of Science, Lilacs and Science Direct on Line, was conducted in February 2013, using the keywords "Neuroimaging", "Positron-Emission Tomography", "Magnetic Resonance Imaging", "Gastric Bypass", "Gastroplasty", "Jejunoileal Bypass", "Bariatric Surgery". RESULTS: Seven manuscripts were included; the great majority studied the central effects of Roux en Y gastric bypass, using positron emission tomography or functional magnetic resonance. CONCLUSIONS: Bariatric surgery might normalize the activity of central areas concerned with reward and incentive salience processing, as the nucleus accumbens and mesencephalic tegmental ventral area, as well as circuitries processing behavioral inhibition, as the dorsolateral prefrontal cortex.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertação de mestrado integrado em Engenharia Biomédica (área de especialização em Informática Médica)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OBJECTIVE: To determine the following parameters in the Brazilian State of São Paulo: 1) the percentage of deaths due to acute myocardial infarction (AMI) occurring in hospitals; 2) the percentage of deaths due to AMI occurring in public health system hospitals as compared with all in-hospital deaths due to AMI between 1979 and 1996; 3) the fatality due to AMI in public health system hospitals from 1984 to 1998. METHODS: Data were available on the Datasus Web site (the health information agency of the Brazilian Department of Health) that provided the following: a) number of deaths resulting from AMI in hospitals; b) number of deaths resulting from AMI in public health system hospitals; c) number of hospital admissions due to AMI in public health system hospitals. RESULTS: The percentage of in-hospital deaths due to AMI increased from 54.9 in 1979 to 68.6 in 1996. The percentage contribution of the public health system to total number of deaths due to AMI occurring in hospitals decreased from 22.9 in 1984 to 13.7 in 1996; fatality due to AMI occurring in public health system hospitals had an irregular evolution from 1984 to 1992 and showed a slight trend for increased frequency from 1993 to 1998. CONCLUSION: The percentage of in-hospital deaths due to AMI has been increasing. Deaths resulting from AMI in public health system hospitals have decreased when compared with the total number of deaths due to AMI in all hospitals. Fatality due to AMI in public health system hospitals did not decrease from 1992 to 1998.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although the ASP model has been around for over a decade, it has not achieved the expected high level of market uptake. This research project examines the past and present state of ASP adoption and identifies security as a primary factor influencing the uptake of the model. The early chapters of this document examine the ASP model and ASP security in particular. Specifically, the literature and technology review chapter analyses ASP literature, security technologies and best practices with respect to system security in general. Based on this investigation, a prototype to illustrate the range and types of technologies that encompass a security framework was developed and is described in detail. The latter chapters of this document evaluate the practical implementation of system security in an ASP environment. Finally, this document outlines the research outputs, including the conclusions drawn and recommendations with respect to system security in an ASP environment. The primary research output is the recommendation that by following best practices with respect to security, an ASP application can provide the same level of security one would expect from any other n-tier client-server application. In addition, a security evaluation matrix, which could be used to evaluate not only the security of ASP applications but the security of any n-tier application, was developed by the author. This thesis shows that perceptions with regard to fears of inadequate security of ASP solutions and solution data are misguided. Finally, based on the research conducted, the author recommends that ASP solutions should be developed and deployed on tried, tested and trusted infrastructure. Existing Application Programming Interfaces (APIs) should be used where possible and security best practices should be adhered to where feasible.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Diss., 2010

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Diss., 2012

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The modern computer systems that are in use nowadays are mostly processor-dominant, which means that their memory is treated as a slave element that has one major task – to serve execution units data requirements. This organization is based on the classical Von Neumann's computer model, proposed seven decades ago in the 1950ties. This model suffers from a substantial processor-memory bottleneck, because of the huge disparity between the processor and memory working speeds. In order to solve this problem, in this paper we propose a novel architecture and organization of processors and computers that attempts to provide stronger match between the processing and memory elements in the system. The proposed model utilizes a memory-centric architecture, wherein the execution hardware is added to the memory code blocks, allowing them to perform instructions scheduling and execution, management of data requests and responses, and direct communication with the data memory blocks without using registers. This organization allows concurrent execution of all threads, processes or program segments that fit in the memory at a given time. Therefore, in this paper we describe several possibilities for organizing the proposed memory-centric system with multiple data and logicmemory merged blocks, by utilizing a high-speed interconnection switching network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Virtual Trainer Web Edition proporciona un sistema de gestión, planificación y control de un centro deportivo, ofreciendo interactividad entre técnicos, socios y personal de gerencia y facilitando todo el trabajo de un mantenimiento de información tradicional. A través de cualquier PC con conexión a Internet y sin instalación de software adicional, se accede a una completa aplicación con contenidos multimedia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Estudi elaborat a partir d’una estada al Politecnico de Milano, Itàlia, entre gener i juny del 2006. Un dels principals objectius de l’Enginyeria del Programari és automatitzar el màxim possible el procés de desenvolupament del programari, reduint costos mitjançant la generació automàtica del programari a partir de la seva especificació. Per assolir-ho, entre altres, cal resoldre el problema de la comprovació eficient de restriccions, que són una part fonamental de l’especificació del programari. Aquest és precisament l’àmbit en què s’està desenvolupant una tesi que presentarà un mètode que poden integrar totes les eines generadores de codi per tal d’assolir una implementació eficient de les restriccions d’integritat. En l’actual fase del projecte s’ha treballat per validar el mètode de la tesi, optimitzant-lo pel cas específic de les aplicacions web i estendre’l per poder tractar també aplicacions basades en workflows. Pel que fa a l’optimització del mètode per aplicacions web, s’han definit una sèrie de paràmetres que permeten configurar la implementació del mètode tenint en compte les necessitats específiques de rendiment de cada aplicació web en particular. Respecte als workflows (cada cop més populars i que s’usen com a definició d’alt nivell per a les aplicacions a desenvolupar) s’ha estudiat quins són els tipus de restriccions que impliquen i com després es pot aplicar el mètode de la tesi sobre aquestes restriccions per tal de generar de forma eficient també les aplicacions basades en workflows.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Este documento explica la metodología de trabajo utilizada durante el desarrollo de este proyecto. El resultado obtenido ha sido un producto que forma parte del portal web Luxury Porperties. Luxury Properties es una marca comercial, creada por la compañía Luxury Dreams, para identificar un portal web especializado en las propiedades de lujo. Para desarrollar este concepto, la empresa compró el dominio luxuryproperties.es con el objetivo de crear un sistema que implemente toda la lógica de negocio necesaria para la publicidad y mercadeo de sus productos. Al final del documento se encuentran las recomendaciones y las futuras valoraciones a tener en cuenta por el cliente en futuras ampliaciones del portal.