971 resultados para Principal-agent
Resumo:
Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas
Resumo:
Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas
Resumo:
As infeções do trato urinário (ITU) são das infeções mais frequentes na comunidade, sendo E. coli o principal agente etiológico. O conhecimento da realidade epidemiológica no que concerne aos padrões de suscetibilidade aos vários antibióticos utilizados no tratamento de ITU é de extrema importância, permitindo assim a escolha mais adequada em contexto de terapia empírica. No tratamento da ITU são utilizados antibióticos de eliminação urinária, nomeadamente
Resumo:
http://www.archive.org/details/wardshidoos00sethuoft
Resumo:
http://books.google.com/books?vid=OCLC05766993
Resumo:
On January 11, 2008, the National Institutes of Health ('NIH') adopted a revised Public Access Policy for peer-reviewed journal articles reporting research supported in whole or in part by NIH funds. Under the revised policy, the grantee shall ensure that a copy of the author's final manuscript, including any revisions made during the peer review process, be electronically submitted to the National Library of Medicine's PubMed Central ('PMC') archive and that the person submitting the manuscript will designate a time not later than 12 months after publication at which NIH may make the full text of the manuscript publicly accessible in PMC. NIH adopted this policy to implement a new statutory requirement under which: The Director of the National Institutes of Health shall require that all investigators funded by the NIH submit or have submitted for them to the National Library of Medicine's PubMed Central an electronic version of their final, peer-reviewed manuscripts upon acceptance for publication to be made publicly available no later than 12 months after the official date of publication: Provided, That the NIH shall implement the public access policy in a manner consistent with copyright law. This White Paper is written primarily for policymaking staff in universities and other institutional recipients of NIH support responsible for ensuring compliance with the Public Access Policy. The January 11, 2008, Public Access Policy imposes two new compliance mandates. First, the grantee must ensure proper manuscript submission. The version of the article to be submitted is the final version over which the author has control, which must include all revisions made after peer review. The statutory command directs that the manuscript be submitted to PMC 'upon acceptance for publication.' That is, the author's final manuscript should be submitted to PMC at the same time that it is sent to the publisher for final formatting and copy editing. Proper submission is a two-stage process. The electronic manuscript must first be submitted through a process that requires input of additional information concerning the article, the author(s), and the nature of NIH support for the research reported. NIH then formats the manuscript into a uniform, XML-based format used for PMC versions of articles. In the second stage of the submission process, NIH sends a notice to the Principal Investigator requesting that the PMC-formatted version be reviewed and approved. Only after such approval has grantee's manuscript submission obligation been satisfied. Second, the grantee also has a distinct obligation to grant NIH copyright permission to make the manuscript publicly accessible through PMC not later than 12 months after the date of publication. This obligation is connected to manuscript submission because the author, or the person submitting the manuscript on the author's behalf, must have the necessary rights under copyright at the time of submission to give NIH the copyright permission it requires. This White Paper explains and analyzes only the scope of the grantee's copyright-related obligations under the revised Public Access Policy and suggests six options for compliance with that aspect of the grantee's obligation. Time is of the essence for NIH grantees. As a practical matter, the grantee should have a compliance process in place no later than April 7, 2008. More specifically, the new Public Access Policy applies to any article accepted for publication on or after April 7, 2008 if the article arose under (1) an NIH Grant or Cooperative Agreement active in Fiscal Year 2008, (2) direct funding from an NIH Contract signed after April 7, 2008, (3) direct funding from the NIH Intramural Program, or (4) from an NIH employee. In addition, effective May 25, 2008, anyone submitting an application, proposal or progress report to the NIH must include the PMC reference number when citing articles arising from their NIH funded research. (This includes applications submitted to the NIH for the May 25, 2008 and subsequent due dates.) Conceptually, the compliance challenge that the Public Access Policy poses for grantees is easily described. The grantee must depend to some extent upon the author(s) to take the necessary actions to ensure that the grantee is in compliance with the Public Access Policy because the electronic manuscripts and the copyrights in those manuscripts are initially under the control of the author(s). As a result, any compliance option will require an explicit understanding between the author(s) and the grantee about how the manuscript and the copyright in the manuscript are managed. It is useful to conceptually keep separate the grantee's manuscript submission obligation from its copyright permission obligation because the compliance personnel concerned with manuscript management may differ from those responsible for overseeing the author's copyright management. With respect to copyright management, the grantee has the following six options: (1) rely on authors to manage copyright but also to request or to require that these authors take responsibility for amending publication agreements that call for transfer of too many rights to enable the author to grant NIH permission to make the manuscript publicly accessible ('the Public Access License'); (2) take a more active role in assisting authors in negotiating the scope of any copyright transfer to a publisher by (a) providing advice to authors concerning their negotiations or (b) by acting as the author's agent in such negotiations; (3) enter into a side agreement with NIH-funded authors that grants a non-exclusive copyright license to the grantee sufficient to grant NIH the Public Access License; (4) enter into a side agreement with NIH-funded authors that grants a non-exclusive copyright license to the grantee sufficient to grant NIH the Public Access License and also grants a license to the grantee to make certain uses of the article, including posting a copy in the grantee's publicly accessible digital archive or repository and authorizing the article to be used in connection with teaching by university faculty; (5) negotiate a more systematic and comprehensive agreement with the biomedical publishers to ensure either that the publisher has a binding obligation to submit the manuscript and to grant NIH permission to make the manuscript publicly accessible or that the author retains sufficient rights to do so; or (6) instruct NIH-funded authors to submit manuscripts only to journals with binding deposit agreements with NIH or to journals whose copyright agreements permit authors to retain sufficient rights to authorize NIH to make manuscripts publicly accessible.
Resumo:
Paper presented at the Digital Humanities 2009 conference in College Park, Maryland.
Resumo:
The insider threat is a security problem that is well-known and has a long history, yet it still remains an invisible enemy. Insiders know the security processes and have accesses that allow them to easily cover their tracks. In recent years the idea of monitoring separately for these threats has come into its own. However, the tools currently in use have disadvantages and one of the most effective techniques of human review is costly. This paper explores the development of an intelligent agent that uses already in-place computing material for inference as an inexpensive monitoring tool for insider threats. Design Science Research (DSR) is a methodology used to explore and develop an IT artifact, such as for this intelligent agent research. This methodology allows for a structure that can guide a deep search method for problems that may not be possible to solve or could add to a phenomenological instantiation.
Resumo:
PURPOSE: To compare the efficacy of paclitaxel versus doxorubicin given as single agents in first-line therapy of advanced breast cancer (primary end point, progression-free survival ¿PFS) and to explore the degree of cross-resistance between the two agents. PATIENTS AND METHODS: Three hundred thirty-one patients were randomized to receive either paclitaxel 200 mg/m(2), 3-hour infusion every 3 weeks, or doxorubicin 75 mg/m(2), intravenous bolus every 3 weeks. Seven courses were planned unless progression or unacceptable toxicity occurred before the seven courses were finished. Patients who progressed within the seven courses underwent early cross-over to the alternative drug, while a delayed cross-over was optional for the remainder of patients at the time of disease progression. RESULTS: Objective response in first-line therapy was significantly better (P =.003) for doxorubicin (response rate ¿RR, 41%) than for paclitaxel (RR, 25%), with doxorubicin achieving a longer median PFS (7.5 months for doxorubicin v 3.9 months for paclitaxel, P <.001). In second-line therapy, cross-over to doxorubicin (91 patients) and to paclitaxel (77 patients) gave response rates of 30% and 16%, respectively. The median survival durations of 18.3 months for doxorubicin and 15.6 months for paclitaxel were not significantly different (P =.38). The doxorubicin arm had greater toxicity, but this was counterbalanced by better symptom control. CONCLUSION: At the dosages and schedules used in the present study, doxorubicin achieves better disease and symptom control than paclitaxel in first-line treatment. Doxorubicin and paclitaxel are not totally cross-resistant, which supports further investigation of these drugs in combination or in sequence, both in advanced disease and in the adjuvant setting.
Resumo:
The foraging activity of many organisms reveal strategic movement patterns, showing efficient use of spatially distributed resources. The underlying mechanisms behind these movement patterns, such as the use of spatial memory, are topics of considerable debate. To augment existing evidence of spatial memory use in primates, we generated movement patterns from simulated primate agents with simple sensory and behavioral capabilities. We developed agents representing various hypotheses of memory use, and compared the movement patterns of simulated groups to those of an observed group of red colobus monkeys (Procolobus rufomitratus), testing for: the effects of memory type (Euclidian or landmark based), amount of memory retention, and the effects of social rules in making foraging choices at the scale of the group (independent or leader led). Our results indicate that red colobus movement patterns fit best with simulated groups that have landmark based memory and a follow the leader foraging strategy. Comparisons between simulated agents revealed that social rules had the greatest impact on a group's step length, whereas the type of memory had the highest impact on a group's path tortuosity and cohesion. Using simulation studies as experimental trials to test theories of spatial memory use allows the development of insight into the behavioral mechanisms behind animal movement, developing case-specific results, as well as general results informing how changes to perception and behavior influence movement patterns.
Resumo:
This paper presents an investigation into applying Case-Based Reasoning to Multiple Heterogeneous Case Bases using agents. The adaptive CBR process and the architecture of the system are presented. A case study is presented to illustrate and evaluate the approach. The process of creating and maintaining the dynamic data structures is discussed. The similarity metrics employed by the system are used to support the process of optimisation of the collaboration between the agents which is based on the use of a blackboard architecture. The blackboard architecture is shown to support the efficient collaboration between the agents to achieve an efficient overall CBR solution, while using case-based reasoning methods to allow the overall system to adapt and “learn” new collaborative strategies for achieving the aims of the overall CBR problem solving process.
Resumo:
This short position paper considers issues in developing Data Architecture for the Internet of Things (IoT) through the medium of an exemplar project, Domain Expertise Capture in Authoring and Development Environments (DECADE). A brief discussion sets the background for IoT, and the development of the distinction between things and computers. The paper makes a strong argument to avoid reinvention of the wheel, and to reuse approaches to distributed heterogeneous data architectures and the lessons learned from that work, and apply them to this situation. DECADE requires an autonomous recording system, local data storage, semi-autonomous verification model, sign-off mechanism, qualitative and quantitative analysis carried out when and where required through web-service architecture, based on ontology and analytic agents, with a self-maintaining ontology model. To develop this, we describe a web-service architecture, combining a distributed data warehouse, web services for analysis agents, ontology agents and a verification engine, with a centrally verified outcome database maintained by certifying body for qualification/professional status.
Resumo:
This paper presents primary data based on research carried out as part of a large World Bank project. Results from our survey show that water pollution in Dhaka watershed has reached alarming levels and is posing significant threats to health and economic activity, particularly among the poor and vulnerable. Rice productivity in the watershed area, for example, has declined by 40% in recent years and vegetable cultivation in the riverbeds has been severely damaged. We also found significant correlation between water pollution and diseases such as jaundice, diarrhoea and skin problems. It was reported that the cost of treatment of skin diseases for one episode could be as high as 29% of the weekly earnings of poor households. Given the magnitude of the contamination problem, a multi-agent stakeholder approach was necessary to analyse the institutional and economic constraints that would need to be addressed in order to improve environmental management. This approach, in turn, enabled core strategies to be developed. The strategies were better understood around three types of actors in industrial pollution, i.e. (1) principal actors, who contribute directly to industrial pollution; (2) stakeholders, who exacerbate the situation by inaction; and (3) the potential actors in mitigation of water contamination. Within a carrot-and-stick framework, nine strategies leading to the strengthening of environmental management were explored. They aim at improving governance and transparency within public agencies and private industry through the setting up of incentive structures to advance compliance and enforcement of environmental standards. Civil society and the population at large are, on the other hand, encouraged to contribute actively to the mitigation of water pollution by improving the management of environmental information and by raising public awareness.