993 resultados para 7137-141
Resumo:
Many things can hamper an investigation. For example, the crime may be a truly random occurrence without links between the victim and the offender, evidence may not be acknowledged or properly collected, and the crime type itself may influence solvability. In other cases still, offenders actively seek to hamper the police investigation in an effort to avoid being caught and going to prison. In fact, the literature on homicide notes that it is not uncommon in many cases of this type for the offender to engage in precautionary acts (Turvey, 2007)...
Resumo:
Objective: To estimate the relative inpatient costs of hospital-acquired conditions. Methods: Patient level costs were estimated using computerized costing systems that log individual utilization of inpatient services and apply sophisticated cost estimates from the hospital's general ledger. Occurrence of hospital-acquired conditions was identified using an Australian ‘condition-onset' flag for diagnoses not present on admission. These were grouped to yield a comprehensive set of 144 categories of hospital-acquired conditions to summarize data coded with ICD-10. Standard linear regression techniques were used to identify the independent contribution of hospital-acquired conditions to costs, taking into account the case-mix of a sample of acute inpatients (n = 1,699,997) treated in Australian public hospitals in Victoria (2005/06) and Queensland (2006/07). Results: The most costly types of complications were post-procedure endocrine/metabolic disorders, adding AU$21,827 to the cost of an episode, followed by MRSA (AU$19,881) and enterocolitis due to Clostridium difficile (AU$19,743). Aggregate costs to the system, however, were highest for septicaemia (AU$41.4 million), complications of cardiac and vascular implants other than septicaemia (AU$28.7 million), acute lower respiratory infections, including influenza and pneumonia (AU$27.8 million) and UTI (AU$24.7 million). Hospital-acquired complications are estimated to add 17.3% to treatment costs in this sample. Conclusions: Patient safety efforts frequently focus on dramatic but rare complications with very serious patient harm. Previous studies of the costs of adverse events have provided information on ‘indicators’ of safety problems rather than the full range of hospital-acquired conditions. Adding a cost dimension to priority-setting could result in changes to the focus of patient safety programmes and research. Financial information should be combined with information on patient outcomes to allow for cost-utility evaluation of future interventions.
Resumo:
So far, low probability differentials for the key schedule of block ciphers have been used as a straightforward proof of security against related-key differential analysis. To achieve resistance, it is believed that for cipher with k-bit key it suffices the upper bound on the probability to be 2− k . Surprisingly, we show that this reasonable assumption is incorrect, and the probability should be (much) lower than 2− k . Our counter example is a related-key differential analysis of the well established block cipher CLEFIA-128. We show that although the key schedule of CLEFIA-128 prevents differentials with a probability higher than 2− 128, the linear part of the key schedule that produces the round keys, and the Feistel structure of the cipher, allow to exploit particularly chosen differentials with a probability as low as 2− 128. CLEFIA-128 has 214 such differentials, which translate to 214 pairs of weak keys. The probability of each differential is too low, but the weak keys have a special structure which allows with a divide-and-conquer approach to gain an advantage of 27 over generic analysis. We exploit the advantage and give a membership test for the weak-key class and provide analysis of the hashing modes. The proposed analysis has been tested with computer experiments on small-scale variants of CLEFIA-128. Our results do not threaten the practical use of CLEFIA.
Resumo:
This study sought to examine how measures of player experience used in videogame research relate to Metacritic Professional and User scores. In total, 573 participants completed an online survey, where they responded the Player Experience of Need Satisfaction (PENS) and the Game Experience Questionnaire (GEQ) in relation to their current favourite videogame. Correlations among the data indicate an overlap between the player experience constructs and the factors informing Metacritic scores. Additionally, differences emerged in the ways professionals and users appear to allocate game ratings. However, the data also provide clear evidence that Metacritic scores do not reflect the full complexity of player experience and may be misleading in some cases.
Resumo:
Corruption has been identified as the greatest obstacle to economic and social development. Public construction projects, in particular, face high corruption risk as public construction sector has been consecutively deemed as the most corrupt one. Despite considerable efforts have been undertaken to measure corruption at a nation level, few focus on the measurement of corruption in construction projects. This paper develops a fuzzy measurement model for the potential corruption in public construction projects in China. Through semi-structured interviews with 14 experts, followed by a questionnaire survey with 188 respondents, 24 measurement items of corruption were identified and further categorized into five constructs. The fuzzy set theory was then adopted to quantify each measurement item, construct and the overall corruption level. This model can facilitate in evaluating, revealing and monitoring corruption in public construction projects. Although this study focuses on measuring corruption in public construction projects in China, similar research methods can be applied in other countries around the world and thus contribute to the global body of knowledge of corruption.
Resumo:
Deoxyribonucleic acid molecules are heralding a new generation of reverse - engineered biopharmaceuticals. In terms of potential application in gene medicine, plasmid DNA (pDNA) vectors have exceptional therapeutic and immunological profiles as they are free from safety concerns associated with viral vectors, display non-toxicity and are simpler to develop. This presentation will discuss the potential applications of pDNA molecules in vaccine development and gene therapy, pilot-scale production of pDNA-based biopharmaceuticals and the controlled delivery of therapeutic sequences in biodegradable polymers to different target cells via the nasal route.
Practice-based learning in community contexts: A collaborative exploration of pedagogical principles
Resumo:
The primary focus of this chapter is an exploration of four pedagogical principles emerging from a practice-based learning lab. Following an overview of community engaged learning and the Lab approach, the chapter is structured around a discussion of pedagogical principles related to (1) collaboration, (2) interdisciplinarity, (3) complexity and uncertainty and (4) reflection. Through a participatory action research (PAR) framework, students, academics and community partners have worked to identify and refine what it takes to support students negotiate complexity and uncertainty inherent in problems facing communities. It also examines the pedagogical strategies employed to facilitate collaboration across disciplines and professional contexts in ways that leverage difference and challenge values and practices.
Hermione Ganger goes to war: A feminist reflection on the situation of girls in real world conflicts
Resumo:
If you want to understand something about a society, and the social contracts that underpin it, then understanding the way it positions women, children, those with corporeal or cognitive differences and other not-quitecitizens is a good place to start. As most now understand, this positioning is not natural; it is part of the high-stakes social, institutional and above all ideological labour of defining the human body, directing human behaviour and determining who will hold agency, authority and power...
Resumo:
This study aimed to investigate the spatial clustering and dynamic dispersion of dengue incidence in Queensland, Australia. We used Moran's I statistic to assess the spatial autocorrelation of reported dengue cases. Spatial empirical Bayes smoothing estimates were used to display the spatial distribution of dengue in postal areas throughout Queensland. Local indicators of spatial association (LISA) maps and logistic regression models were used to identify spatial clusters and examine the spatio-temporal patterns of the spread of dengue. The results indicate that the spatial distribution of dengue was clustered during each of the three periods of 1993–1996, 1997–2000 and 2001–2004. The high-incidence clusters of dengue were primarily concentrated in the north of Queensland and low-incidence clusters occurred in the south-east of Queensland. The study concludes that the geographical range of notified dengue cases has significantly expanded in Queensland over recent years.
Resumo:
In recent years, many studies have provided evidence that exosomes secreted by cells contain various components, including microRNAs [1]. It is thought that exosomes have important roles in many biological processes. However, the role of exosomes and their components, especially miRNAs, in wound healing is poorly understood. In order to understand whether or not primary human epidermal keratinocytes and dermal fibroblasts, two important cell types contributing to wound healing process, release exosomes and what species of wound healing-associated miRNAs accumulate in these vesicles, this project will use a combination of methods to isolate and characterize exosomes, to profile exosomal cargo’s, especially miRNAs in exosomes. The results showed that keratinocytes and fibroblasts released exosomes into conditioned media and these exosomes contain some target miRNAs.
Resumo:
In early stages of design and modeling, computers and computer applications are often considered an obstacle, rather than a facilitator of the process. Most notably, brainstorms, process modeling with business experts, or development planning, are often performed by a team in front of a whiteboard. While "whiteboarding" is recognized as an effective tool, low-tech solutions that allow remote participants to contribute are still not generally available. This is a striking observation, considering that vast majority of teams in large organizations are distributed teams. And this has also been one of the key triggers behind the project described in this article, where a team of corporate researchers decided to identify state of the art technologies that could facilitate the scenario mentioned above. This paper is an account of a research project in the area of enterprise collaboration, with a strong focus on the aspects of human computer interaction in mixed mode environments, especially in areas of collaboration where computers still play a secondary role. It is describing a currently running corporate research project. © 2012 Springer-Verlag.
Resumo:
Purpose Following the perspective of frustration theory customer frustration incidents lead to frustration behavior such as protest (negative word‐of‐mouth). On the internet customers can express their emotions verbally and non‐verbally in numerous web‐based review platforms. The purpose of this study is to investigate online dysfunctional customer behavior, in particular negative “word‐of‐web” (WOW) in online feedback forums, among customers who participate in frequent‐flier programs in the airline industry. Design/methodology/approach The study employs a variation of the critical incident technique (CIT) referred to as the critical internet feedback technique (CIFT). Qualitative data of customer reviews of 13 different frequent‐flier programs posted on the internet were collected and analyzed with regard to frustration incidents, verbal and non‐verbal emotional effects and types of dysfunctional word‐of‐web customer behavior. The sample includes 141 negative customer reviews based on non‐recommendations and low program ratings. Findings Problems with loyalty programs evoke negative emotions that are expressed in a spectrum of verbal and non‐verbal negative electronic word‐of‐mouth. Online dysfunctional behavior can vary widely from low ratings and non‐recommendations to voicing switching intentions to even stronger forms such as manipulation of others and revenge intentions. Research limitations/implications Results have to be viewed carefully due to methodological challenges with regard to the measurement of emotions, in particular the accuracy of self‐report techniques and the quality of online data. Generalization of the results is limited because the study utilizes data from only one industry. Further research is needed with regard to the exact differentiation of frustration from related constructs. In addition, large‐scale quantitative studies are necessary to specify and test the relationships between frustration incidents and subsequent dysfunctional customer behavior expressed in negative word‐of‐web. Practical implications The study yields important implications for the monitoring of the perceived quality of loyalty programs. Management can obtain valuable information about program‐related and/or relationship‐related frustration incidents that lead to online dysfunctional customer behavior. A proactive response strategy should be developed to deal with severe cases, such as sabotage plans. Originality/value This study contributes to knowledge regarding the limited research of online dysfunctional customer behavior as well as frustration incidents of loyalty programs. Also, the article presents a theoretical “customer frustration‐defection” framework that describes different levels of online dysfunctional behavior in relation to the level of frustration sensation that customers have experienced. The framework extends the existing perspective of the “customer satisfaction‐loyalty” framework developed by Heskett et al.
Resumo:
Monitoring pedestrian and cyclists movement is an important area of research in transport, crowd safety, urban design and human behaviour assessment areas. Media Access Control (MAC) address data has been recently used as potential information for extracting features from people’s movement. MAC addresses are unique identifiers of WiFi and Bluetooth wireless technologies in smart electronics devices such as mobile phones, laptops and tablets. The unique number of each WiFi and Bluetooth MAC address can be captured and stored by MAC address scanners. MAC addresses data in fact allows for unannounced, non-participatory, and tracking of people. The use of MAC data for tracking people has been focused recently for applying in mass events, shopping centres, airports, train stations etc. In terms of travel time estimation, setting up a scanner with a big value of antenna’s gain is usually recommended for highways and main roads to track vehicle’s movements, whereas big gains can have some drawbacks in case of pedestrian and cyclists. Pedestrian and cyclists mainly move in built distinctions and city pathways where there is significant noises from other fixed WiFi and Bluetooth. Big antenna’s gains will cover wide areas that results in scanning more samples from pedestrians and cyclists’ MAC device. However, anomalies (such fixed devices) may be captured that increase the complexity and processing time of data analysis. On the other hand, small gain antennas will have lesser anomalies in the data but at the cost of lower overall sample size of pedestrian and cyclist’s data. This paper studies the effect of antenna characteristics on MAC address data in terms of travel-time estimation for pedestrians and cyclists. The results of the empirical case study compare the effects of small and big antenna gains in order to suggest optimal set up for increasing the accuracy of pedestrians and cyclists’ travel-time estimation.