871 resultados para Information security evaluation
Resumo:
The value of forensic results crucially depends on the propositions and the information under which they are evaluated. For example, if a full single DNA profile for a contemporary marker system matching the profile of Mr A is assessed, given the propositions that the DNA came from Mr A and given it came from an unknown person, the strength of evidence can be overwhelming (e.g., in the order of a billion). In contrast, if we assess the same result given that the DNA came from Mr A and given it came from his twin brother (i.e., a person with the same DNA profile), the strength of evidence will be 1, and therefore neutral, unhelpful and irrelevant 1 to the case at hand. While this understanding is probably uncontroversial and obvious to most, if not all practitioners dealing with DNA evidence, the practical precept of not specifying an alternative source with the same characteristics as the one considered under the first proposition may be much less clear in other circumstances. During discussions with colleagues and trainees, cases have come to our attention where forensic scientists have difficulty with the formulation of propositions. It is particularly common to observe that results (e.g., observations) are included in the propositions, whereas-as argued throughout this note-they should not be. A typical example could be a case where a shoe-mark with a logo and the general pattern characteristics of a Nike Air Jordan shoe is found at the scene of a crime. A Nike Air Jordan shoe is then seized at Mr A's house and control prints of this shoe compared to the mark. The results (e.g., a trace with this general pattern and acquired characteristics corresponding to the sole of Mr A's shoe) are then evaluated given the propositions 'The mark was left by Mr A's Nike Air Jordan shoe-sole' and 'The mark was left by an unknown Nike Air Jordan shoe'. As a consequence, the footwear examiner will not evaluate part of the observations (i.e., the mark presents the general pattern of a Nike Air Jordan) whereas they can be highly informative. Such examples can be found in all forensic disciplines. In this article, we present a few such examples and discuss aspects that will help forensic scientists with the formulation of propositions. In particular, we emphasise on the usefulness of notation to distinguish results that forensic scientists should evaluate from case information that the Court will evaluate.
Resumo:
This review presents the evolution of steroid analytical techniques, including gas chromatography coupled to mass spectrometry (GC-MS), immunoassay (IA) and targeted liquid chromatography coupled to mass spectrometry (LC-MS), and it evaluates the potential of extended steroid profiles by a metabolomics-based approach, namely steroidomics. Steroids regulate essential biological functions including growth and reproduction, and perturbations of the steroid homeostasis can generate serious physiological issues; therefore, specific and sensitive methods have been developed to measure steroid concentrations. GC-MS measuring several steroids simultaneously was considered the first historical standard method for analysis. Steroids were then quantified by immunoassay, allowing a higher throughput; however, major drawbacks included the measurement of a single compound instead of a panel and cross-reactivity reactions. Targeted LC-MS methods with selected reaction monitoring (SRM) were then introduced for quantifying a small steroid subset without the problems of cross-reactivity. The next step was the integration of metabolomic approaches in the context of steroid analyses. As metabolomics tends to identify and quantify all the metabolites (i.e., the metabolome) in a specific system, appropriate strategies were proposed for discovering new biomarkers. Steroidomics, defined as the untargeted analysis of the steroid content in a sample, was implemented in several fields, including doping analysis, clinical studies, in vivo or in vitro toxicology assays, and more. This review discusses the current analytical methods for assessing steroid changes and compares them to steroidomics. Steroids, their pathways, their implications in diseases and the biological matrices in which they are analysed will first be described. Then, the different analytical strategies will be presented with a focus on their ability to obtain relevant information on the steroid pattern. The future technical requirements for improving steroid analysis will also be presented.
Resumo:
OBJECTIVE: To develop disease-specific recommendations for the diagnosis and management of eosinophilic granulomatosis with polyangiitis (Churg-Strauss syndrome) (EGPA). METHODS: The EGPA Consensus Task Force experts comprised 8 pulmonologists, 6 internists, 4 rheumatologists, 3 nephrologists, 1 pathologist and 1 allergist from 5 European countries and the USA. Using a modified Delphi process, a list of 40 questions was elaborated by 2 members and sent to all participants prior to the meeting. Concurrently, an extensive literature search was undertaken with publications assigned with a level of evidence according to accepted criteria. Drafts of the recommendations were circulated for review to all members until final consensus was reached. RESULTS: Twenty-two recommendations concerning the diagnosis, initial evaluation, treatment and monitoring of EGPA patients were established. The relevant published information on EGPA, antineutrophil-cytoplasm antibody-associated vasculitides, hypereosinophilic syndromes and eosinophilic asthma supporting these recommendations was also reviewed. DISCUSSION: These recommendations aim to give physicians tools for effective and individual management of EGPA patients, and to provide guidance for further targeted research.
Resumo:
Introduction: The Violence Medical Unit (VMU), a specialised forensic medical consultation, was created at the Lausanne university Hospital in 2006. All patients consulting at the ED for interpersonal violencerelated injury are referred to the VMU, which provides forensic documentation of the injury and referral to the relevant community based victim-support organisations within 48 hours of the ED visit. This frees the ED medical staff from forensic injury documentation and legal/social referral, tasks for which they lack both time and training. Among community violence, assaults by nightclub security agents against patrons have increased from 6% to 10% between 2007 and 2009. We set out to characterise the demographics, assault mechanisms, subsequent injuries, prior alcohol intake and ED & VMU costs incurred by this group of patients. Methods: We retrospectively included all patients consulting at the VMU due to assault by nightclub security agents from January 2007 to December 2009. Data was obtained from ED & VMU medical, nursing and administrative records. Results: Our sample included 70 patients, of which 64 were referred by the CHUV ED. The victims were typically young (median age 29) males (93%). 77% of assaults occurred on the weekend between 12 PM and 4 AM, and 73% of the victims were under the influence of alcohol. 83% of the patients were punched, kicked and/or head-butted; 9% had been struck with a blunt instrument. 80% of the injuries were in the head and neck area and 19% of the victims sustained fractures. 21% of the victims were prescribed medical leave. Total ED & VMU costs averaged 1048 SFr. Conclusion: Medical staff treating this population of assault victims must be aware of the assault mechanisms and injury patterns, in particular the high probability of fractures, in order to provide adequate diagnosis and care. Associated inebriation mandates liberal use of radiology, as delayed or missed diagnosis may have medical, medicolegal and legal implications. Emergency medical services play an important role in detecting and reporting of such incidents. Centralised management of the forensic documentation facilitates referral to victim support organisations and epidemiological data collection. Magnitudes and trends of the different types of violence can be determined, and this information can be then impact public safety management policies.
Resumo:
The present study was performed in an attempt to develop an in vitro integrated testing strategy (ITS) to evaluate drug-induced neurotoxicity. A number of endpoints were analyzed using two complementary brain cell culture models and an in vitro blood-brain barrier (BBB) model after single and repeated exposure treatments with selected drugs that covered the major biological, pharmacological and neuro-toxicological responses. Furthermore, four drugs (diazepam, cyclosporine A, chlorpromazine and amiodarone) were tested more in depth as representatives of different classes of neurotoxicants, inducing toxicity through different pathways of toxicity. The developed in vitro BBB model allowed detection of toxic effects at the level of BBB and evaluation of drug transport through the barrier for predicting free brain concentrations of the studied drugs. The measurement of neuronal electrical activity was found to be a sensitive tool to predict the neuroactivity and neurotoxicity of drugs after acute exposure. The histotypic 3D re-aggregating brain cell cultures, containing all brain cell types, were found to be well suited for OMICs analyses after both acute and long term treatment. The obtained data suggest that an in vitro ITS based on the information obtained from BBB studies and combined with metabolomics, proteomics and neuronal electrical activity measurements performed in stable in vitro neuronal cell culture systems, has high potential to improve current in vitro drug-induced neurotoxicity evaluation.
Resumo:
Objective To evaluate the association of conventional angiography (AG) with computed tomography angiography (CTA) as compared with CTA only, preoperatively, in the treatment of aortic diseases. Materials and Methods Retrospective study involving patients submitted to endovascular treatment of aortic diseases, in the period from January 2009 to July 2010, with use of preoperative CTA + conventional AG or CTA only. The patients were divided into two groups, namely: G1 – thoracic aortic diseases; and G2 – abdominal aortic diseases. G1 was subdivided into 1A (preoperative AG + CTA) and 1B (preoperative CTA). G2 was subdivided into 2C (CTA + AG) and 2D (CTA only). Results The authors evaluated 156 patients. In subgroups 1A and 1B, the rate of technical success was, respectively, 100% and 94.7% (p = 1.0); and the rate of therapeutic success was, respectively, 81% and 58% (p = 0.13). A higher number of complications were observed in subgroup 1B (p = 0.057). The accuracy in the calculation of the prosthesis was higher in subgroup 1A (p = 0.065). In their turn, the rate of technical success in subgroups 2C and 2D was, respectively, 92.3% and 98.6% (p = 0.17). The rate of therapeutic success was 73% and 98.6% (p = 0.79). Conclusion Preoperative conventional AG should be reserved for cases where CTA cannot provide all the information in the planning of a therapeutic intervention.
Resumo:
JXTA is a peer-to-peer (P2P) middleware whichhas undergone successive iterations through its 10 years of history, slowly incorporating a security baseline that may cater to different applications and services. However, in order to appeal to a broader set of secure scenarios, it would be interesting to take into consideration more advanced capabilities, such as anonymity.There are several proposals on anonymous protocols that can be applied in the context of a P2P network, but it is necessary to be able to choose the right one given each application¿s needs. In this paper, we provide an experimental evaluation of two relevant protocols, each one belonging to a different category of approaches to anonymity: unimessage and split message. Webase our analysis on two scenarios, with stable and non-stable peers, and three metrics: round trip-time (RTT), node processing time and reliability.
Resumo:
AbstractThe effective evaluation for the treatment of patients with Ewing tumors depends on the accuracy in the determination of the primary tumor extent and the presence of metastatic disease. Currently, no universally accepted staging system is available to assess Ewing tumors. The present study aimed at discussing the use of PET/CT as a tool for staging, restaging and assessment of therapeutic response in patients with Ewing tumors. In spite of some limitations of PET/CT as compared with anatomical imaging methods, its relevance in the assessment of these patients is related to the capacity of the method to provide further physiological information, which often generates important clinical implications. Currently, the assessment of patients with Ewing tumor should comprise a study with PET/CT combined with other anatomical imaging modalities, such as radiography, computed tomography and magnetic resonance imaging.
Resumo:
Peer-reviewed
Resumo:
In Tanzania computer knowledge is vital to supplement the pace fast growing economic and development activities, which demands high and reliable level of expertise in com- puting field. In 2006, a research carried out at Tumaini University with purpose to design and implement a contextualized curriculum that can supplement for such needs hence facilitate development in Tanzanian context. A contextualized curriculum took advantage of six principles namely curriculum contex- tualization, projects, practical, interdisciplinary orientation, international recognition and continuous research for the program’s formative and development. Implementation of the curriculum followed the CATI (Contextualize, Apply, Transfer, and Import) model with emphasis on students to identify societal expectations at the early stage in learning process, in which case the graduates will potentially cater for societal expertise needs on ICT. This study adopts an emergent exploratory cross-section research design, while employ- ing a qualitative approach. This study was conducted at Tumaini University in Iringa where by purposeful sampling was used to obtain participants such as students, teach- ers, administrators and employers who participated in several focus group discussions, in-depth interviews and participant observation. The study reveals that six principles are satisfactorily met,despite of bottlenecks such as incompatibility in pedagogical thinking and technology availability for e-learning, learning attitudes, insufficient experts with actual skills and experience,in academic field among the others. The study recommends that iterative longitudinal study should be car- ried out to design for proper intervention in response to these problems which will help in improving and stabilize the curriculum.
Resumo:
The goal of the thesis is to make a supplier evaluation using analytical hierarchy process. Before the supplier evaluation is performed there will be introduced the principles of purchasing which gives a viewpoint to the supplier evaluation and management. The thesis will also give an overview on quality, performance and forecasts which are very important to the supplier evaluation and future improvements. The chapter which describes analytical hierarchy process will show the reader what exactly is analytical hierarchy process and how can it be utilized in supplier evaluation. In the later stages, thesis will provide information about the case company EADS Secure Networks Oy, the processes applied there towards purchasing and how the analytical hierarchy process is applied in practise. In the end of the thesis there will be an overview about each supplier’s strong and weak points as well as some comments and ideas about developing also EADS Secure Networks procedures to a direction which would benefit the whole customer–supplier–chain.
Resumo:
The study focuses on the front end of innovation process. Due to changes in innovation policies and paradigms customers, users and shopfloor employees are becoming increasingly important sources of knowledge. New methods are needed for processing information and ideas coming from multiple sources more effectively. The aim of this study is to develop an idea evaluation tool suitable for the front end of innovation process and capable of utilizing collective intelligence. The study is carried out as a case study research using constructive research approach. The chosen approach suits well for the purposes of the study. The constructive approach focuses on designing new constructs and testing them in real life applications. In this study a tool for evaluating ideas emerging from the course of everyday work is developed and tested in a case organization. Development of the tool is based on current scientific literature on knowledge creation, innovation management and collective intelligence and it is tested in LUT Lahti School of Innovation. Results are encouraging. The idea evaluation tool manages to improve performance at the front end of innovation process and it is accepted in use in the case organization. This study provides insights on what kind of a tool is required for facilitating collective intelligence at the front end of innovation process.
Resumo:
Education in Finland plays a significant role. International students are becoming an essential part of Finnish Educational system. The study was meant to examine their expectations and experiences in a Finnish University. As a case, Lappeenranta University of Technology (LUT) was chosen and, in particular, Information Technology (IT) Department. The main objectives of the study were to examine students’ satisfaction of their study experiences, their evaluation of the teaching quality of courses and last but not least the cultural impact on those. Data for the study were mainly collected with the help of three Internet surveys from a sample of 50 students – currently studying at LUT or already graduated. Response rate from questionnaire to questionnaire varied, however, still close to average and was considered as good and relevant enough. The study was initially meant as qualitative, however, a number of quantitative data analysis methods were used as well. Most of students’ expectations appear to become true, majority of students are satisfied with their experiences. Results show that teaching quality in LUT is evaluated as ‘good’. Nevertheless, students prefer particular courses to the other ones. In conclusion, it can be said that culture does affect students’ expectations, experiences, perception of the world, however, cultural differences do not cause any serious problems.
Resumo:
Fluent health information flow is critical for clinical decision-making. However, a considerable part of this information is free-form text and inabilities to utilize it create risks to patient safety and cost-effective hospital administration. Methods for automated processing of clinical text are emerging. The aim in this doctoral dissertation is to study machine learning and clinical text in order to support health information flow.First, by analyzing the content of authentic patient records, the aim is to specify clinical needs in order to guide the development of machine learning applications.The contributions are a model of the ideal information flow,a model of the problems and challenges in reality, and a road map for the technology development. Second, by developing applications for practical cases,the aim is to concretize ways to support health information flow. Altogether five machine learning applications for three practical cases are described: The first two applications are binary classification and regression related to the practical case of topic labeling and relevance ranking.The third and fourth application are supervised and unsupervised multi-class classification for the practical case of topic segmentation and labeling.These four applications are tested with Finnish intensive care patient records.The fifth application is multi-label classification for the practical task of diagnosis coding. It is tested with English radiology reports.The performance of all these applications is promising. Third, the aim is to study how the quality of machine learning applications can be reliably evaluated.The associations between performance evaluation measures and methods are addressed,and a new hold-out method is introduced.This method contributes not only to processing time but also to the evaluation diversity and quality. The main conclusion is that developing machine learning applications for text requires interdisciplinary, international collaboration. Practical cases are very different, and hence the development must begin from genuine user needs and domain expertise. The technological expertise must cover linguistics,machine learning, and information systems. Finally, the methods must be evaluated both statistically and through authentic user-feedback.
Resumo:
Tourism is one of the biggest industry branches with billions of tourists traveling every year around the world. Therefore, solutions providing tourist information have to be up to date with both changes in the industry and the world’s technological progress. The aim of this thesis is to present a design and a prototype of a tourist mobile service which is individual-oriented, cost-free for the end user, and secure. On the information providers’ side, the solution is implemented as a Webbased database. The end users access the information through a Bluetooth application on their mobile devices. The Bluetooth-based solution allows to avoid any costs for the end users, that is tourists. The study shows that, even with small data transfers, the tourists could save significantly when compared to possible roaming charges for data transfer. Also, the proposed mobile service is not intrusive, as it is provided through an application installed by tourists voluntarily on their mobile devices. Through design and implementation this work shows that it is possible to build a system which can be used to provide information services to tourists through mobile phones. The work achieved a successful ongoing synchronization between the client and the server databases. Implementation and usage were limited to smart phones only, as they provide better technological support for the solution having features like maps, GPS, Wi-Fi, Bluetooth and Databases. Moreover, the design of this system shows how Bluetooth technology can be used effectively as a means of communication while minimizing its shortcomings and risks, such as security, by bypassing Bluetooth server service discovery protocol (SDP) and connecting directly to the device. Apart from showing the design and implementation of the end-user costfree mobile information service, the results of this work also highlight the possible business opportunities to the provider of the service.