935 resultados para injury data surveillance


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This qualitative study examines five young Afro-Franco Caribbean males in the Diaspora and their experiences with systems of technology as a tool of oppression and liberation. The study utilized interpretive biography and participatory video research to examine the issues of identity, power/control, surveillance technology, love and freedom. The study made use of a number of data collection methods including interviews, round table discussions, and personal narratives. A hermeneutic theoretical framework is employed to develop an objective view of the problems facing Afro-Franco Caribbean males in the schools and community. The purpose of the study is to provide an environment and new media technology that Afro-Franco Caribbean males can use to engage and discuss their views on issues mentioned above and to ultimately develop a video project to share with the community. Moreover, the study sought to examine an epistemological approach (Creolization) that young black males, particularly Afro-Franco-Caribbean males, might use to communicate, document, and share their everyday experiences in the Diaspora. The findings in the study reveal that the participants are experiencing: (a) a lack of community involvement in the urban space they currently reside, (b) frustration with the perspective of their home country, Haiti, that is commonly shown in mainstream media, and (c) ridicule, shame, and violence in the spaces (school and community) that should be safe. The study provides the community (both local and scholarly) with an opportunity to hear the voices and concerns of youth in the urban space. In addition the study suggests a need for schools to create a critical pedagogical curriculum in which power can be democratically shared.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Research on the criminological side of system trespassing (i.e. unlawfully gaining access to a computer system) is relatively rare and has yet to examine the effect of the presence of other users on the system during the trespassing event (i.e. the time of communication between a trespasser’s system and the infiltrated system). This thesis seeks to analyze this relationship drawing on principles of Situational Crime Prevention, Routine Activities Theory, and restrictive deterrence. Data were collected from a randomized control trial of target computers deployed on the Internet network of a large U.S. university. This study examined whether the number (one or multiple) and type (administrative or non-administrative) of computer users present on a system reduced the seriousness and frequency of trespassing. Results indicated that the type of user (administrative) produced a restrictive deterrent effect and significantly reduced the frequency and duration of trespassing events.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background and aims: Head injury (HI) is a cause of cognitive impairment within the homeless population (Hwang et al, 2008). One study reported that over a 30-year period, the prevalence of hospitalised HI was 5.4 times higher in the homeless than in the general population (McMillan et al, 2015). This study explores the perceptions of homeless adults who have sustained a HI and their views regarding the relevance of HI to their homeless status. Methods: Participants were seven homeless adults with a moderate or severe HI. They were asked to talk about their journey to homelessness and in particular, to reflect on any perceived links between HI and their homeless status. The data were analysed using Interpretative Phenomenological Analysis (IPA). Results and conclusions: Emerging themes included: impairment following HI; substance misuse, feeling let down by services and difficult relationships with family. Evidence for the role of HI in precipitating and maintaining homelessness was found. Despite this, co-morbid difficulties complicate the picture. Four out of seven participants viewed substance misuse as their primary difficulty. This illustrates the need for in-depth assessment within this population in order to ensure that difficulties are fully understood and that the correct supports/ interventions are offered.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

International audience

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nowadays, new computers generation provides a high performance that enables to build computationally expensive computer vision applications applied to mobile robotics. Building a map of the environment is a common task of a robot and is an essential part to allow the robots to move through these environments. Traditionally, mobile robots used a combination of several sensors from different technologies. Lasers, sonars and contact sensors have been typically used in any mobile robotic architecture, however color cameras are an important sensor due to we want the robots to use the same information that humans to sense and move through the different environments. Color cameras are cheap and flexible but a lot of work need to be done to give robots enough visual understanding of the scenes. Computer vision algorithms are computational complex problems but nowadays robots have access to different and powerful architectures that can be used for mobile robotics purposes. The advent of low-cost RGB-D sensors like Microsoft Kinect which provide 3D colored point clouds at high frame rates made the computer vision even more relevant in the mobile robotics field. The combination of visual and 3D data allows the systems to use both computer vision and 3D processing and therefore to be aware of more details of the surrounding environment. The research described in this thesis was motivated by the need of scene mapping. Being aware of the surrounding environment is a key feature in many mobile robotics applications from simple robotic navigation to complex surveillance applications. In addition, the acquisition of a 3D model of the scenes is useful in many areas as video games scene modeling where well-known places are reconstructed and added to game systems or advertising where once you get the 3D model of one room the system can add furniture pieces using augmented reality techniques. In this thesis we perform an experimental study of the state-of-the-art registration methods to find which one fits better to our scene mapping purposes. Different methods are tested and analyzed on different scene distributions of visual and geometry appearance. In addition, this thesis proposes two methods for 3d data compression and representation of 3D maps. Our 3D representation proposal is based on the use of Growing Neural Gas (GNG) method. This Self-Organizing Maps (SOMs) has been successfully used for clustering, pattern recognition and topology representation of various kind of data. Until now, Self-Organizing Maps have been primarily computed offline and their application in 3D data has mainly focused on free noise models without considering time constraints. Self-organising neural models have the ability to provide a good representation of the input space. In particular, the Growing Neural Gas (GNG) is a suitable model because of its flexibility, rapid adaptation and excellent quality of representation. However, this type of learning is time consuming, specially for high-dimensional input data. Since real applications often work under time constraints, it is necessary to adapt the learning process in order to complete it in a predefined time. This thesis proposes a hardware implementation leveraging the computing power of modern GPUs which takes advantage of a new paradigm coined as General-Purpose Computing on Graphics Processing Units (GPGPU). Our proposed geometrical 3D compression method seeks to reduce the 3D information using plane detection as basic structure to compress the data. This is due to our target environments are man-made and therefore there are a lot of points that belong to a plane surface. Our proposed method is able to get good compression results in those man-made scenarios. The detected and compressed planes can be also used in other applications as surface reconstruction or plane-based registration algorithms. Finally, we have also demonstrated the goodness of the GPU technologies getting a high performance implementation of a CAD/CAM common technique called Virtual Digitizing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim has been to review the literature about the risk factors of hamstring injury in soccer from a biomechanical point of view. METHODOLOGY. Data bases of bibliography references were Medline, Scopus and SportDiscuss. RESULTS AND DISCUSSION. Many prospective studies have shown that the previous injury is the greatest risk factor of sustaining the injury. However the primary causes of the injury are unclear in soccer. A lack of hamstring flexibility has been one of the main injury risk factors with controversies on the results. Imbalance of isokinetic force is a risk factor but electrical coactivation of all muscles participating during knee flexion and extension are unknown in football. While the importance of lumbopelvic-hamstrings muscles synchronization during running seems to be crucial for understanding the risk of injury, no research has been developed in this topic in football. CONCLUSIONS. More research using new data recording procedures as Dynamic Scanners, Surface EMG, Inverse Dynamic Analysis are needed. The analysis of more specific movements as running, kicking or jumping is clearly required. Managers, coaches, physical trainers, physiotherapists, sport physicians and researchers should work together in order to improve the injury prevention and rehabilitation programs of football players. Key Words: sports biomechanics, soccer, hamstring injury, risk factors