900 resultados para Syringe sharing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION: The ability to reproducibly identify clinically equivalent patient populations is critical to the vision of learning health care systems that implement and evaluate evidence-based treatments. The use of common or semantically equivalent phenotype definitions across research and health care use cases will support this aim. Currently, there is no single consolidated repository for computable phenotype definitions, making it difficult to find all definitions that already exist, and also hindering the sharing of definitions between user groups. METHOD: Drawing from our experience in an academic medical center that supports a number of multisite research projects and quality improvement studies, we articulate a framework that will support the sharing of phenotype definitions across research and health care use cases, and highlight gaps and areas that need attention and collaborative solutions. FRAMEWORK: An infrastructure for re-using computable phenotype definitions and sharing experience across health care delivery and clinical research applications includes: access to a collection of existing phenotype definitions, information to evaluate their appropriateness for particular applications, a knowledge base of implementation guidance, supporting tools that are user-friendly and intuitive, and a willingness to use them. NEXT STEPS: We encourage prospective researchers and health administrators to re-use existing EHR-based condition definitions where appropriate and share their results with others to support a national culture of learning health care. There are a number of federally funded resources to support these activities, and research sponsors should encourage their use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What role does socialization play in the origins of prosocial behavior? We examined one potential socialization mechanism, parents' discourse about others' emotions with very young children in whom prosocial behavior is still nascent. Two studies are reported, one of sharing in 18- and 24-month-olds (n = 29), and one of instrumental and empathy-based helping in 18- and 30-month-olds (n = 62). In both studies, parents read age-appropriate picture books to their children and the content and structure of their emotion-related and internal state discourse were coded. Results showed that children who helped and shared more quickly and more often, especially in tasks that required more complex emotion understanding, had parents who more often asked them to label and explain the emotions depicted in the books. Moreover, it was parents' elicitation of children's talk about emotions rather than parents' own production of emotion labels and explanations that explained children's prosocial behavior, even after controlling for age. Thus, it is the quality, not the quantity, of parents' talk about emotions with their toddlers that matters for early prosocial behavior.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In global engineering enterprises, information and knowledge sharing are critical factors that can determine a project’s success. This statement is widely acknowledged in published literature. However, according to some academics, tacit knowledge is derived from a person’s lifetime of experience, practice, perception and learning, which makes it hard to capture and document in order to be shared. This project investigates if social media tools can be used to improve and enable tacit knowledge sharing within a global engineering enterprise. This paper first provides a brief background of the subject area, followed by an explanation of the industrial investigation, from which the proposed knowledge framework to improve tacit knowledge sharing is presented. This project’s main focus is on the improvement of collaboration and knowledge sharing amongst product development engineers in order to improve the whole product development cycle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As identified by Griffin (1997) and Kahn (2012), manufacturing organisations typically improve their market position by accelerating their product development (PD) cycles. One method for achieving this is to reduce the time taken to design, test and validate new products, so that they can reach the end customer before competition. This paper adds to existing research on PD testing procedures by reporting on an exploratory investigation carried out in a UK-based manufacturing plant. We explore the organisational and managerial factors that contribute to the time spent on testing of new products during development. The investigation consisted of three sections, viz. observations and process modelling, utilisation metrics and a questionnaire-based investigation, from which a proposed framework to improve and reduce the PD time cycle is presented. This research focuses specifically on the improvement of the utilisation of product testing facilities and the links to its main internal stakeholders - PD engineers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud storage has rapidly become a cornerstone of many businesses and has moved from an early adopters stage to an early majority, where we typically see explosive deployments. As companies rush to join the cloud revolution, it has become vital to create the necessary tools that will effectively protect users' data from unauthorized access. Nevertheless, sharing data between multiple users' under the same domain in a secure and efficient way is not trivial. In this paper, we propose Sharing in the Rain – a protocol that allows cloud users' to securely share their data based on predefined policies. The proposed protocol is based on Attribute-Based Encryption (ABE) and allows users' to encrypt data based on certain policies and attributes. Moreover, we use a Key-Policy Attribute-Based technique through which access revocation is optimized. More precisely, we show how to securely and efficiently remove access to a file, for a certain user that is misbehaving or is no longer part of a user group, without having to decrypt and re-encrypt the original data with a new key or a new policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article, as part of the Erasmus+ project “Divercity”, we focus on the collection and analysis of good practices in Spain and other countries in Europe. The project revolves around the development of methods that valorize cultural diversity and in this respect, identifying and sharing best practices on diversity and inclusion through artistic mediation inside museums, culture institutions, our urban walks, forms an mandatory stage of the research process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis explores how to design a peer support system to facilitate self-organized knowledge sharing in non-formal learning environments, in particular when learners work on complex tasks. The peer support system aims to replace two teacher-led didactic arrangements: selecting a tutor at the initial stage, and guidance during the interaction process (Dillenbourg, 1999; Topping, 1996). Such a system has previously been developed by Van Rosmalen (2008) and De Bakker (2010) and has been tentatively used to facilitate knowledge sharing on content-related questions. In this thesis, we would like to find out how to further improve the design of this peer support system, especially to facilitate knowledge sharing on complex tasks. Since little pedagogical theory is available to inform the design of our peer support system, this thesis attempts to apply cognitive load theory (Sweller, Van Merriënboer, & Paas, 1998; Van Merriënboer & Sweller, 2005) that informs instructional designs in classroom settings to the design of our peer support system in Learning Networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Eighty per cent of Malawi's 8 million children live in rural areas, and there is an extensive tiered health system infrastructure from village health clinics to district hospitals which refers patients to one of the four central hospitals. The clinics and district hospitals are staffed by nurses, non-physician clinicians and recently qualified doctors. There are 16 paediatric specialists working in two of the four central hospitals which serve the urban population as well as accepting referrals from district hospitals. In order to provide expert paediatric care as close to home as possible, we describe our plan to task share within a managed clinical network and our hypothesis that this will improve paediatric care and child health.

PRESENTATION OF THE HYPOTHESIS: Managed clinical networks have been found to improve equity of care in rural districts and to ensure that the correct care is provided as close to home as possible. A network for paediatric care in Malawi with mentoring of non-physician clinicians based in a district hospital by paediatricians based at the central hospitals will establish and sustain clinical referral pathways in both directions. Ultimately, the plan envisages four managed paediatric clinical networks, each radiating from one of Malawi's four central hospitals and covering the entire country. This model of task sharing within four hub-and-spoke networks may facilitate wider dissemination of scarce expertise and improve child healthcare in Malawi close to the child's home.

TESTING THE HYPOTHESIS: Funding has been secured to train sufficient personnel to staff all central and district hospitals in Malawi with teams of paediatric specialists in the central hospitals and specialist non-physician clinicians in each government district hospital. The hypothesis will be tested using a natural experiment model. Data routinely collected by the Ministry of Health will be corroborated at the district. This will include case fatality rates for common childhood illness, perinatal mortality and process indicators. Data from different districts will be compared at baseline and annually until 2020 as the specialists of both cadres take up posts.

IMPLICATIONS OF THE HYPOTHESIS: If a managed clinical network improves child healthcare in Malawi, it may be a potential model for the other countries in sub-Saharan Africa with similar cadres in their healthcare system and face similar challenges in terms of scarcity of specialists.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose cyclic prefix single carrier full-duplex transmission in amplify-and-forward cooperative spectrum sharing networks to achieve multipath diversity and full-duplex spectral efficiency. Integrating full-duplex transmission into cooperative spectrum sharing systems results in two intrinsic problems: 1) the residual loop interference occurs between the transmit and the receive antennas at the secondary relays and 2) the primary users simultaneously suffer interference from the secondary source (SS) and the secondary relays (SRs). Thus, examining the effects of residual loop interference under peak interference power constraint at the primary users and maximum transmit power constraints at the SS and the SRs is a particularly challenging problem in frequency selective fading channels. To do so, we derive and quantitatively compare the lower bounds on the outage probability and the corresponding asymptotic outage probability for max–min relay selection, partial relay selection, and maximum interference relay selection policies in frequency selective fading channels. To facilitate comparison, we provide the corresponding analysis for half-duplex. Our results show two complementary regions, named as the signal-to-noise ratio (SNR) dominant region and the residual loop interference dominant region, where the multipath diversity and spatial diversity can be achievable only in the SNR dominant region, however the diversity gain collapses to zero in the residual loop interference dominant region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the network’s channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network. 

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels. In particular, the outdated channel state information is considered at the process of antenna selection due to feedback delay. Considering a practical passive eavesdropper scenario, we derive the exact and asymptotic closed-form expressions of secrecy outage probability, which enable us to evaluate the secrecy performance with high efficiency and present a new design insight into the impact of key parameters on the secrecy performance. In addition, the analytical results demonstrate that the achievable secrecy diversity order is only determined by the parameters of the secondary network, while other parameters related to primary or eavesdropper’s channels have a significantly impact on the secrecy coding gain.