909 resultados para Keys to Database Searching


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction: Enteral nutrition (EN) provides calories, macronutrients and micronutrients in adequate quantity and quality to meet the patient's needs. Some drugs when crushed and diluted may have their properties altered, including the reduction of bioavailability causing the reduction of the serum concentration of the drug; tube obstruction; drug-drug interaction or drug-nutrient interaction. Methods: The study was conducted through review of submitted articles in the databases of the Virtual Health Library (VHL): MEDLINE (National Library of Medicine, USA), Lilacs (Latin American and Caribbean Literature on Health Sciences) PUBMED - NCBI (National Center for Biotechnology Information) and COCHRANE. Results: For this survey, 42 articles were identified during database searching. After applying the inclusion and exclusion criteria, 08 articles were selected, obtained from the MEDLINE and Lilacs. Discussion: Some interactions were found such as the aluminium hydroxide and lactulose with the enteral nutrition, which may result in a precipitation and reduction of drug bioavailability. Mineral oil will alter the absorption of fat-soluble vitamins and reduces the tube light. Others results were found as phenytoin, warfarin, captopril and furosemide with enteral nutrition may reduce the maximum serum concentration. Conclusion: Drug interactions are more common in day-to-day activities than health professionals may suppose. Knowledge on the matter may also assist in reducing cases of obstruction of tubes, through which enteral nutrition and medications are administered. Thus, the multidisciplinary team, acting together, may have more beneficial effects to the patient.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the globalizing world, knowledge and information (and the social and technological settings for their production and communication) are now seen as keys to economic prosperity. The economy of a knowledge city creates value-added products using research, technology, and brainpower. The social benefit of knowledge-based urban development (KBUD); however, extends beyond aggregate economic growth.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The revolution in legal research provides exciting challenges for those exploring and writing about the legal landscape. Cumbersome paper sources have largely been replaced by electronic files and a new range of skills and sources are required to successfully conduct legal research.--------- Researching and Writing in Law, 3rd Edition is an updated research guide, mapping the developments that have taken place and providing the keys to the fundamental electronic sources of legal research, especially those now available on the web, as well as exploring traditional doctrinal methodologies. Included in this edition are extensive checklists for locating and validating the law in Australia, England, Canada, the United States, New Zealand, India and the European Union.-------- This third edition includes expanded discussion of the process of formulating a research proposal, writing project abstracts and undertaking a literature review (Chapter 7). Research methodologies are also extensively examined, focusing on the process of doctrinal methodology as well as discussing other useful methodologies, such as Comparative Research and Content Analysis (Chapter 5). Further highlighted are issues surrounding research ethics, including plagiarism and originality, the importance of developing skills in critique, and the influence of current university research environments on postgraduate legal research.-------- Law students and members of the practising profession aiming to update their research, knowledge and skills will find Researching and Writing in Law, 3rd Edition invaluable.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Signalling layout design is one of the keys to railway operations with fixed-block signalling system and it also carries direct effect on overall train efficiency and safety. Based on an analysis to system objectives, this paper presents an optimization model with two objectives in order to devise an efficient signalling layout scheme. Taking into account the present railway line design practices in China, the paper describes steps of the computer-based signalling layout optimisation with real-coded genetic algorithms. A computer-aided system, based on train movement simulator, has also been employed to assist the optimisation process. A case study on a practical railway line has been conducted to make comparisons between the proposed GA-based approach and the current practices. The results illustrate the improved performance of the proposed approach in reducing signal block joints and shortening minimum train service headway.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Urban infrastructure along the hard forms such as roads, electricity, water and sewers also includes the soft forms such as research, training, innovation and technology. Knowledge and creativity are keys to soft infrastructure and socioeconomic development. Many city administrations around the world adjust their endogenous development strategies increasingly by investing in soft infrastructure and aiming for a knowledge-based development. At this point, the mapping and management of knowledge asset of cities has become a critical issue for promoting creative urban regions. The chapter scrutinizes the relations between knowledge assets and urban infrastructures and examines the management model to improve soft infrastructure provision.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

User-Web interactions have emerged as an important research in the field of information science. In this study, we examine extensively the Web searching performed by general users. Our goal is to investigate the effects of users’ cognitive styles on their Web search behavior in relation to two broad components: Information Searching and Information Processing Approaches. We use questionnaires, a measure of cognitive style, Web session logs and think-aloud as the data collection instruments. Our study findings show wholistic Web users tend to adopt a top-down approach to Web searching, where the users searched for a generic topic, and then reformulate their queries to search for specific information. They tend to prefer reading to process information. Analytic users tend to prefer a bottom-up approach to information searching and they process information by scanning search result pages.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many cities worldwide face the prospect of major transformation as the world moves towards a global information order. In this new era, urban economies are being radically altered by dynamic processes of economic and spatial restructuring. The result is the creation of ‘informational cities’ or its new and more popular name, ‘knowledge cities’. For the last two centuries, social production had been primarily understood and shaped by neo-classical economic thought that recognized only three factors of production: land, labor and capital. Knowledge, education, and intellectual capacity were secondary, if not incidental, factors. Human capital was assumed to be either embedded in labor or just one of numerous categories of capital. In the last decades, it has become apparent that knowledge is sufficiently important to deserve recognition as a fourth factor of production. Knowledge and information and the social and technological settings for their production and communication are now seen as keys to development and economic prosperity. The rise of knowledge-based opportunity has, in many cases, been accompanied by a concomitant decline in traditional industrial activity. The replacement of physical commodity production by more abstract forms of production (e.g. information, ideas, and knowledge) has, however paradoxically, reinforced the importance of central places and led to the formation of knowledge cities. Knowledge is produced, marketed and exchanged mainly in cities. Therefore, knowledge cities aim to assist decision-makers in making their cities compatible with the knowledge economy and thus able to compete with other cities. Knowledge cities enable their citizens to foster knowledge creation, knowledge exchange and innovation. They also encourage the continuous creation, sharing, evaluation, renewal and update of knowledge. To compete nationally and internationally, cities need knowledge infrastructures (e.g. universities, research and development institutes); a concentration of well-educated people; technological, mainly electronic, infrastructure; and connections to the global economy (e.g. international companies and finance institutions for trade and investment). Moreover, they must possess the people and things necessary for the production of knowledge and, as importantly, function as breeding grounds for talent and innovation. The economy of a knowledge city creates high value-added products using research, technology, and brainpower. Private and the public sectors value knowledge, spend money on its discovery and dissemination and, ultimately, harness it to create goods and services. Although many cities call themselves knowledge cities, currently, only a few cities around the world (e.g., Barcelona, Delft, Dublin, Montreal, Munich, and Stockholm) have earned that label. Many other cities aspire to the status of knowledge city through urban development programs that target knowledge-based urban development. Examples include Copenhagen, Dubai, Manchester, Melbourne, Monterrey, Singapore, and Shanghai. Knowledge-Based Urban Development To date, the development of most knowledge cities has proceeded organically as a dependent and derivative effect of global market forces. Urban and regional planning has responded slowly, and sometimes not at all, to the challenges and the opportunities of the knowledge city. That is changing, however. Knowledge-based urban development potentially brings both economic prosperity and a sustainable socio-spatial order. Its goal is to produce and circulate abstract work. The globalization of the world in the last decades of the twentieth century was a dialectical process. On one hand, as the tyranny of distance was eroded, economic networks of production and consumption were constituted at a global scale. At the same time, spatial proximity remained as important as ever, if not more so, for knowledge-based urban development. Mediated by information and communication technology, personal contact, and the medium of tacit knowledge, organizational and institutional interactions are still closely associated with spatial proximity. The clustering of knowledge production is essential for fostering innovation and wealth creation. The social benefits of knowledge-based urban development extend beyond aggregate economic growth. On the one hand is the possibility of a particularly resilient form of urban development secured in a network of connections anchored at local, national, and global coordinates. On the other hand, quality of place and life, defined by the level of public service (e.g. health and education) and by the conservation and development of the cultural, aesthetic and ecological values give cities their character and attract or repel the creative class of knowledge workers, is a prerequisite for successful knowledge-based urban development. The goal is a secure economy in a human setting: in short, smart growth or sustainable urban development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Preparing social work students to be effective practitioners is a complex and challenging task undertaken in a dynamic environment both in terms of the field of social work and the higher education sector. There have been recommendations that self knowledge, empirical knowledge, theoretical knowledge and procedural knowledge are the keys to high standards of social work practice. This paper suggests that the concept of practice wisdom is a useful focus for integrating these different aspects of informed practice and for focusing educational programmes for social work. As practice wisdom is more about process than possessed characteristics then there are important motivational and value-based considerations in developing wise practitioners. This discussion considers motivational and personal narrative aspects of practice wisdom so that it can be integrated into social work teaching.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recreating an environment that supports and promotes fundamental homeostatic mechanisms is a significant challenge in tissue engineering. Optimizing cell survival, proliferation, differentiation, apoptosis and angiogenesis, and providing suitable stromal support and signalling cues are keys to successfully generating clinically useful tissues. Interestingly, those components are often subverted in the cancer setting, where aberrant angiogenesis, cellular proliferation, cell signalling and resistance to apoptosis drive malignant growth. In contrast to tissue engineering, identifying and inhibiting those pathways is a major challenge in cancer research. The recent discovery of adult tissue-specific stem cells has had a major impact on both tissue engineering and cancer research. The unique properties of these cells and their role in tissue and organ repair and regeneration hold great potential for engineering tissue-specific constructs. The emerging body of evidence implicating stem cells and progenitor cells as the source of oncogenic transformation prompts caution when using these cells for tissue-engineering purposes. While tissue engineering and cancer research may be considered as opposed fields of research with regard to their proclaimed goals, the compelling overlap in fundamental pathways underlying these processes suggests that cross-disciplinary research will benefit both fields. In this review article, tissue engineering and cancer research are brought together and explored with regard to discoveries that may be of mutual benefit.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Two Archaean komatiitic flows, Fred’s Flow in Canada and the Murphy Well Flow in Australia, have similar thicknesses (120 and 160 m) but very different compositions and internal structures. Their contrasting differentiation profiles are keys to determine the cooling and crystallization mechanisms that operated during the eruption of Archaean ultramafic lavas. Fred’s Flow is the type example of a thick komatiitic basalt flow. It is strongly differentiated and consists of a succession of layers with contrasting textures and compositions. The layering is readily explained by the accumulation of olivine and pyroxene in a lower cumulate layer and by evolution of the liquid composition during downward growth of spinifex-textured rocks within the upper crust. The magmas that erupted to form Fred’s Flow had variable compositions, ranging from 12 to 20 wt% MgO, and phenocryst contents from 0 to 20 vol%. The flow was emplaced by two pulses. A first ~20-m-thick pulse was followed by another more voluminous but less magnesian pulse that inflated the flow to its present 120 m thickness. Following the second pulse, the flow crystallized in a closed system and differentiated into cumulates containing 30–38 wt% MgO and a residual gabbroic layer with only 6 wt% MgO. The Murphy Well Flow, in contrast, has a remarkably uniform composition throughout. It comprises a 20-m-thick upper layer of fine-grained dendritic olivine and 2–5 vol% amygdales, a 110–120 m intermediate layer of olivine porphyry and a 20–30 m basal layer of olivine orthocumulate. Throughout the flow, MgO contents vary little, from only 30 to 33 wt%, except for the slightly more magnesian basal layer (38–40 wt%). The uniform composition of the flow and dendritic olivine habits in the upper 20 m point to rapid cooling of a highly magnesian liquid with a composition like that of the bulk of the flow. Under equilibrium conditions, this liquid should have crystallized olivine with the composition Fo94.9, but the most magnesian composition measured by electron microprobe in samples from the flow is Fo92.9. To explain these features, we propose that the parental liquid contained around 32 wt% MgO and 3 wt% H2O. This liquid degassed during the eruption, creating a supercooled liquid that solidified quickly and crystallized olivine with non-equilibrium textures and compositions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is well established that the traditional taxonomy and nomenclature of Chironomidae relies on adult males whose usually characteristic genitalia provide evidence of species distinction. In the early days some names were based on female adults of variable distinctiveness – but females are difficult to identify (Ekrem et al. 2010) and many of these names remain dubious. In Russia especially, a system based on larval morphology grew in parallel to the conventional adult-based system. The systems became reconciled with the studies that underlay the production of the Holarctic generic keys to Chironomidae, commencing notably with the larval volume (Wiederholm, 1983). Ever since Thienemann’s pioneering studies, it has been evident that the pupa, notably the cast skins (exuviae) provide a wealth of features that can aid in identification (e.g. Wiederholm, 1986). Furthermore, the pupae can be readily associated with name-bearing adults when a pharate (‘cloaked’) adult stage is visible within the pupa. Association of larvae with the name-bearing later stages has been much more difficult, time-consuming and fraught with risk of failure. Yet it is identification of the larval stage that is needed by most applied researchers due to the value of the immature stages of the family in aquatic monitoring for water quality, although the pupal stage also has advocates (reviewed by Sinclair & Gresens, 2008). Few use the adult stage for such purposes as their provenance and association with the water body can be verified only by emergence trapping, and sampling of adults lies outside regular aquatic monitoring protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: To provide an overview of the incidence and mortality of female breast cancer for countries in the Asia-Pacific region. Methods: Statistical information about breast cancer was obtained from publicly available cancer registry and mortality databases (such as GLOBOCAN), and supplemented with data requested from individual cancer registries. Rates were directly age-standardised to the Segi World Standard population and trends were analysed using joinpoint models. Results: Breast cancer was the most common type of cancer among females in the region, accounting for 18% of all cases in 2012, and was the fourth most common cause of cancer-related deaths (9%). Although incidence rates remain much higher in New Zealand and Australia, rapid rises in recent years were observed in several Asian countries. Large increases in breast cancer mortality rates also occurred in many areas, particularly Malaysia and Thailand, in contrast to stabilising trends in Hong Kong and Singapore, while decreases have been recorded in Australia and New Zealand. Mortality trends tended to be more favourable for women aged under 50 compared to those who were 50 years or older. Conclusion: It is anticipated that incidence rates of breast cancer in developing countries throughout the Asia-Pacific region will continue to increase. Early detection and access to optimal treatment are the keys to reducing breast cancer-related mortality, but cultural and economic obstacles persist. Consequently, the challenge is to customise breast cancer control initiatives to the particular needs of each country to ensure the best possible outcomes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.