744 resultados para interview protocols


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La prime d'assurance maladie reste un instrument de régulation intéressant à l'heure où tous les pays tâtonnent pour trouver le meilleur arbitrage entre qualité des soins et montant des dépenses. [Auteur]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L'entrevue médicale est constituée de plusieurs étapes, chacune d'entre elles comprenant des tâches et des objectifs particuliers pour le médecin. La partie initiale de la consultation médicale, la phase sociale, constitue la première pierre dans la construction d'une relation médecin-patient de confiance et de qualité. Si, d'un point de vue structurel, la littérature a répondu de façon claire et concordante, des questions demeurent ouvertes d'un point de vue procédural. De quelle manière le médecin parvient-il à établir le premier contact ? Comment procède-t-il pour accueillir son patient ? Des pistes pour répondre à ces questions se repèrent dans le travail de révision des enregistrements vidéo des consultations de médecine générale qui sont régulièrement pratiqués à la Policlinique médicale universitaire (PMU) de Lausanne. [Auteurs] The medical interview consists of several steps, each consisting of specific tasks and objectives for the doctor. The initial step of the medical consultation, the social phase, is the cornerstone in the construction of a doctor-patient relationship of trust and quality. If, in a structural point of view, the literature has responded in a clear and consistent way, questions remain openned in a procedural point of view. How successful is the physician to establish the first contact? How does he proceed to welcome his patient? We looked out ways to address these issues by the work of revising the video recordings of general medical consultations, which are regularly practiced at the Medical outpatient clinic of the University of Lausanne.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: To describe changes in leisure time and occupational physical activity status in an urban Mediterranean population-based cohort, and to evaluate sociodemographic, health-related and lifestyle correlates of such changes. Methods: Data for this study come from the Cornellè Health Interview Survey Follow-Up Study, a prospective cohort study of a representative sample (n¿=¿2500) of the population. Participants in the analysis reported here include 1246 subjects (567 men and 679 women) who had complete data on physical activity at the 1994 baseline survey and at the 2002 follow-up. We fitted Breslow-Cox regression models to assess the association between correlates of interest and changes in physical activity. Results: Regarding leisure time physical activity, 61.6% of cohort members with ¿sedentary¿ habits in 1994 changed their status to ¿light/moderate¿ physical activity in 2002, and 70% who had ¿light/moderate¿ habits in 1994 did not change their activity level. Regarding occupational physical activity, 74.4% of cohort members who were ¿active¿ did not change their level of activity, and 64.3% of participants with ¿sedentary¿ habits in 1994 changed to ¿active¿ occupational physical activity. No clear correlates of change in physical activity were identified in multivariate analyses. Conclusion: While changes in physical activity are evident in this population-based cohort, no clear determinants of such changes were recognised. Further longitudinal studies including other potential individual and contextual determinants are needed to better understand determinants of changes in physical activity at the population level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Artikkelin tekijämerkintönä virheellisesti Johan Lindqvist

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sleep-wake disturbances are frequently observed in stroke patients and are associated with poorer functional outcome. Until now the effects of sleep on stroke evolution are unknown. The purpose of the present study was to evaluate the effects of three sleep deprivation (SD) protocols on brain damages after focal cerebral ischemia in a rat model. Permanent occlusion of distal branches of the middle cerebral artery was induced in adult rats. The animals were then subjected to 6h SD, 12h SD or sleep disturbances (SDis) in which 3 x 12h sleep deprivation were performed by gentle handling. Infarct size and brain swelling were assessed by Cresyl violet staining, and the number of damaged cells was measured by terminal deoxynucleotidyl transferase mediated dUTP nick end labeling (TUNEL) staining. Behavioral tests, namely tape removal and cylinder tests, were performed for assessing sensorimotor function. In the 6h SD protocol, no significant difference (P > 0.05) was found either in infarct size (42.5 ± 30.4 mm3 in sleep deprived animals vs. 44.5 ± 20.5 mm3 in controls, mean ± s.d.), in brain swelling (10.2 ± 3.8 % in sleep deprived animals vs. 11.3 ± 2.0 % in controls) or in number of TUNEL-positive cells (21.7 ± 2.0/mm2 in sleep deprived animals vs. 23.0 ± 1.1/mm2 in controls). In contrast, 12h sleep deprivation increased infarct size by 40 % (82.8 ± 10.9 mm3 in SD group vs. 59.2 ± 13.9 mm3 in control group, P = 0.008) and number of TUNEL-positive cells by 137 % (46.8 ± 15/mm in SD group vs. 19.7 ± 7.7/mm2 in control group, P = 0.003). There was no significant difference (P > 0.05) in brain swelling (12.9 ± 6.3 % in sleep deprived animals vs. 11.6 ± 6.0 % in controls). The SDis protocol also increased infarct size by 76 % (3 x 12h SD 58.8 ± 20.4 mm3 vs. no SD 33.8 ± 6.3 mm3, P = 0.017) and number of TUNEL-positive cells by 219 % (32.9 ± 13.2/mm2 vs. 10.3 ± 2.5/mm2, P = 0.008). Brain swelling did not show any difference between the two groups (24.5 ± 8.4 % in SD group vs. 16.7 ± 8.9 % in control group, p > 0.05). Both behavioral tests did not show any concluding results. In summary, we demonstrate that sleep deprivation aggravates brain damages in a rat model of stroke. Further experiments are needed to unveil the mechanisms underlying these effects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Defense Mechanisms Rating Scales (DMRS), one of the most widely used and validated instruments in the study of defense mechanisms, does not include psychotic defenses. The Psychotic-DMRS (P-DMRS) has been developed to include 6 psychotic defense mechanisms: psychotic denial, autistic withdrawal, distortion, delusional projection, fragmentation, and concretization. We discuss psychotic defenses, including the difference between psychotic defenses and psychotic symptoms. Six clinical illustrations demonstrate how the 6 P-DMRS defenses can be identified in patients' narratives selected from the transcripts of dynamic interviews. Implications with respect to patient evaluation and treatment are discussed.