4,120 research outputs found

    Do health systems delay the treatment of poor children? A qualitative study of child deaths in rural Tanzania.

    Get PDF
    Child mortality remains one of the major public-health problems in Tanzania. Delays in receiving and accessing adequate care contribute to these high rates. The literature on public health often focuses on the role of mothers in delaying treatment, suggesting that they contact the health system too late and that they prefer to treat their children at home, a perspective often echoed by health workers. Using the three-delay methodology, this study focus on the third phase of the model, exploring the delays experienced in receiving adequate care when mothers with a sick child contact a health-care facility. The overall objective is to analyse specific structural factors embedded in everyday practices at health facilities in a district in Tanzania which cause delays in the treatment of poor children and to discuss possible changes to institutions and social technologies. The study is based on qualitative fieldwork, including in-depth interviews with sixteen mothers who have lost a child, case studies in which patients were followed through the health system, and observations of more than a hundred consultations at all three levels of the health-care system. Data analysis took the form of thematic analysis. Focusing on the third phase of the three-delay model, four main obstacles have been identified: confusions over payment, inadequate referral systems, the inefficient organization of health services and the culture of communication. These impediments strike the poorest segment of the mothers particularly hard. It is argued that these delaying factors function as 'technologies of social exclusion', as they are embedded in the everyday practices of the health facilities in systematic ways. The interviews, case studies and observations show that it is especially families with low social and cultural capital that experience delays after having contacted the health-care system. Reductions of the various types of uncertainty concerning payment, improved referral practices and improved communication between health staff and patients would reduce some of the delays within health facilities, which might feedback positively into the other two phases of delay

    National Package of Essential Health Interventions in Tanzania

    Get PDF

    IIMA in HealthCare Management: Abstract of Publications (2000-2010)

    Get PDF
    The Indian Institute of Management, Ahmedabad (IIMA), was established in 1961 as an autonomous institution by the Government of India in collaboration with the Government of Gujarat and Indian industry. IIMA’s involvement in the health sector started with the establishment of the Public Systems Group in 1975. In the initial period, our research focused on the management of primary healthcare services and family planning. We expanded our research activities to include the management of secondary healthcare services in the 80s and to tertiary healthcare services in the 90s. Currently our research interests focus on the governance and management issues in the areas on Rural Health, Urban Health, Public Health and Hospital Management. In June 2004, IIMA Board approved the setting up of a Centre for Management Health Services (CMHS) in recognition of IIMA’s contributions to the health sector in the past and the felt need to strengthen the management of health sector in the context of socio-economic developments of our country. The overall objectives of CMHS are to address the managerial challenges in the delivery of health services to respond to the needs of different segments of our population efficiently and effectively, build institutions of excellence in the health sector, and influence health policies and wider environments. All our research projects are externally funded and we have developed research collaborations with 15-20 international universities in USA, UK, Europe, and Asia. CMHS has also established strong linkages with the Ministry of Health and Family Welfare at the national and state government levels, particularly in the states of Gujarat, Maharashtra, Rajasthan, Madhya Pradesh, Chattisgarh, Orissa, and Bihar. This working paper is a compilation of the abstracts of all our publications in the last 10 years, which include 40 referred journal articles, 54 Working Papers, 19 Chapters in Books and 18 Case Studies.

    Heterologous prime-boost-boost immunisation of Chinese cynomolgus macaques using DNA and recombinant poxvirus vectors expressing HIV-1 virus-like particles

    Get PDF
    Background: There is renewed interest in the development of poxvirus vector-based HIV vaccines due to the protective effect observed with repeated recombinant canarypox priming with gp120 boosting in the recent Thai placebo-controlled trial. This study sought to investigate whether a heterologous prime-boost-boost vaccine regimen in Chinese cynomolgus macaques with a DNA vaccine and recombinant poxviral vectors expressing HIV virus-like particles bearing envelopes derived from the most prevalent clades circulating in sub-Saharan Africa, focused the antibody response to shared neutralising epitopes. Methods: Three Chinese cynomolgus macaques were immunised via intramuscular injections using a regimen composed of a prime with two DNA vaccines expressing clade A Env/clade B Gag followed by boosting with recombinant fowlpox virus expressing HIV-1 clade D Gag, Env and cholera toxin B subunit followed by the final boost with recombinant modified vaccinia virus Ankara expressing HIV-1 clade C Env, Gag and human complement protein C3d. We measured the macaque serum antibody responses by ELISA, enumerated T cell responses by IFN-gamma ELISpot and assessed seroneutralisation of HIV-1 using the TZM-bl beta-galactosidase assay with primary isolates of HIV-1. Results: This study shows that large and complex synthetic DNA sequences can be successfully cloned in a single step into two poxvirus vectors: MVA and FPV and the recombinant poxviruses could be grown to high titres. The vaccine candidates showed appropriate expression of recombinant proteins with the formation of authentic HIV virus-like particles seen on transmission electron microscopy. In addition the b12 epitope was shown to be held in common by the vaccine candidates using confocal immunofluorescent microscopy. The vaccine candidates were safely administered to Chinese cynomolgus macaques which elicited modest T cell responses at the end of the study but only one out of the three macaques elicited an HIV-specific antibody response. However, the antibodies did not neutralise primary isolates of HIV-1 or the V3-sensitive isolate SF162 using the TZM-bl b-galactosidase assay. Conclusions: MVA and FP9 are ideal replication-deficient viral vectors for HIV-1 vaccines due to their excellent safety profile for use in humans. This study shows this novel prime-boost-boost regimen was poorly immunogenic in Chinese cynomolgus macaques

    Deepr: A Convolutional Net for Medical Records

    Full text link
    Feature engineering remains a major bottleneck when creating predictive systems from electronic medical records. At present, an important missing element is detecting predictive regular clinical motifs from irregular episodic records. We present Deepr (short for Deep record), a new end-to-end deep learning system that learns to extract features from medical records and predicts future risk automatically. Deepr transforms a record into a sequence of discrete elements separated by coded time gaps and hospital transfers. On top of the sequence is a convolutional neural net that detects and combines predictive local clinical motifs to stratify the risk. Deepr permits transparent inspection and visualization of its inner working. We validate Deepr on hospital data to predict unplanned readmission after discharge. Deepr achieves superior accuracy compared to traditional techniques, detects meaningful clinical motifs, and uncovers the underlying structure of the disease and intervention space

    Blood donors' motivation and attitude to non-remunerated blood donation in Lithuania

    Get PDF
    BACKGROUND: In the Soviet period, the blood donation system operated in Lithuania exclusively on a remunerative basis. After joining the EU, Lithuania committed itself to meeting the EU requirements to provide all consumers within its boundaries with safe blood products made from voluntary unpaid blood donations. However, the introduction of a non-remunerated donation system may considerably affect donors' motivation and retention. Thus the aim of the current research was to determine blood donation motives among the present donors and investigate their attitude towards non-remunerated donation. METHODS: A questionnaire survey of 400 blood donors. Survey data processed using SPSS statistical analysis package. Statistical data reliability checked using Fisher's exact test (p < 0.05). RESULTS: Paid donors comprised 89.9%, while non-paid ones made 10.1% of the respondents. Research findings show that 93 per cent of the paid donors give blood on a regular basis; while among the non-remunerated donors the same figure amounted merely to 20.6 per cent. The idea of the remuneration necessity is supported by 78.3 per cent of the paid donors, while 64.7 per cent of the non-remunerated respondents believe that remuneration is not necessary. The absolute majority of the paid donors (92%) think they should be offered a monetary compensation for blood donation, while more than half of the non-remunerated donors (55.9) claim they would be content with a mere appreciation of the act. Provided no remuneration were offered, 28.44 per cent of the respondents would carry on doing it, 29.6 per cent would do it only in emergency, 29.6 per cent would donate blood merely for their family or friends, and 12.3 per cent would quit it completely. CONCLUSION: Most respondents admitted having donated blood for the following reasons: willingness to help the ill or monetary compensation. Majority would consent to free blood donation only in case of emergency or as a family replacement, which leads to a conclusion that provided monetary remuneration is completely terminated part of the currently active paid donors would withdraw from this activity, which might seriously affect the national supply of blood and its products

    An Introduction to Destructive Coordination

    Get PDF
    Polanyi (1944, [1957] 1968) has distinguished three 'patterns of social integration,' namely 'reciprocity', 'redistribution' and 'exchange.' This triad has provided the starting point for most subsequent discussion. Our purpose is to introduce a further type of coordination, the 'destructive mode of coordination'. This mode achieves coordination by intimidation, threat, and the use of non-institutionalized coercive means. Resources and human efforts are allocated in order to appropriate what other people produce. Two simple examples provide an introductory illustration, traffic circles (roundabouts) and prisons. Appropriation through pirating provides a further example of destructive coordination. More specifically, biopiracy (blood patenting) is discussed in order to clarify the relationship between destructive coordination and the institutionalization of property rights. Finally, we focus on the role of destructive coordination as a transitional mechanism that is supported by the institutional vacuum ultimately yielding to other modes of coordination.mode of coordination, destructive coordination, institutional vacuum, biopiracy, indeterminate property rights

    Flexible processing architecture for maintaining QoS in embedded systems applications

    Get PDF
    ComunicaciĂłn presentada en las V Jornadas de ComputaciĂłn Empotrada, Valladolid, 17-19 Septiembre 2014The growing available capacity on a single chip is leading to increasingly sophisticated applications in the field of embedded systems. In addition, the cloud computing paradigm, allows the extension of the capabilities of these systems using remote resources. Among the wide range of applications that can arise in this context, are those in which it is critical to meet certain quality of service (QoS) requirements, such as limited latency. In these cases, real-time operating systems (RTOS) provide a valid solution to guarantee predictability and response time using the resources of the embedded system. However, in applications where the elements to process can grow and decrease in a variable way, the load can exceed the capabilities of the embedded system, which is an important limitation. In this paper, a new architecture is proposed, aiming to take the most of remotely available resources only when the load temporarily exceeds the capabilities of the embedded system. The access to the remote resources is done by using cloud platforms maintaining an acceptable level of QoS for the application
    • 

    corecore