474,373 research outputs found

    User involvement in healthcare technology development and assessment: Structured literature review

    Get PDF
    Purpose – Medical device users are one of the principal stakeholders of medical device technologies. User involvement in medical device technology development and assessment is central to meet their needs. Design/methodology/approach – A structured review of literature, published from 1980 to 2005 in peer-reviewed journals, was carried out from social science perspective to investigate the practice of user involvement in the development and assessment of medical device technologies. This was followed by qualitative thematic analysis. Findings – It is found that users of medical devices include clinicians, patients, carers and others. Different kinds of medical devices are developed and assessed by user involvement. The user involvement occurs at different stages of the medical device technology lifecycle and the degree of user involvement is in the order of design stage > testing and trials stage > deployment stage > concept stage. Methods most commonly used for capturing users’ perspectives are usability tests, interviews and questionnaire surveys. Research limitations/implications – We did not review the relevant literature published in engineering, medical and nursing fields, which might have been useful. Practical implications – Consideration of the users’ characteristics and the context of medical device use is critical for developing and assessing medical device technologies from users’ perspectives. Originality/value – This study shows that users of medical device technologies are not homogeneous but heterogeneous, in several aspects, and their needs, skills and working environments vary. This is important consideration for incorporating users’ perspectives in medical device technologies. Paper type: Literature review

    Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side

    Get PDF
    The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side. The proposed model is the core of the module of the developed decision support system in the problems of choosing rational investing variants for information protection and cybersecurity of various information objects. The model allows to find financial solutions using the tools of the theory of multistep games with several terminal surfaces. The authors proposed an approach that allows information security management to make a preliminary assessment of strategies for financing the effective cybersecurity systems. The model is distinguished by the assumption that the protection side does not have complete information, both about the financing strategies of the attacking side, and about its financial resources state aimed at overcoming cybersecurity lines of the information object. At the same time, the protection side has the opportunity to obtain additional information by the part of its financial resources. This makes it possible for the protection side to obtain a positive result for itself in the case when it can not be received without this procedure. The solution was found using a mathematical apparatus of a nonlinear multistep quality game with several terminal surfaces with alternate moves. In order to verify the adequacy of the model there was implemented a multivariate computational experiment. The results of this experiment are described in the article. © 2005 - ongoing JATIT & LL

    Computability and analysis: the legacy of Alan Turing

    Full text link
    We discuss the legacy of Alan Turing and his impact on computability and analysis.Comment: 49 page

    A History of Cluster Analysis Using the Classification Society's Bibliography Over Four Decades

    Get PDF
    The Classification Literature Automated Search Service, an annual bibliography based on citation of one or more of a set of around 80 book or journal publications, ran from 1972 to 2012. We analyze here the years 1994 to 2011. The Classification Society's Service, as it was termed, has been produced by the Classification Society. In earlier decades it was distributed as a diskette or CD with the Journal of Classification. Among our findings are the following: an enormous increase in scholarly production post approximately 2000; a very major increase in quantity, coupled with work in different disciplines, from approximately 2004; and a major shift also from cluster analysis in earlier times having mathematics and psychology as disciplines of the journals published in, and affiliations of authors, contrasted with, in more recent times, a "centre of gravity" in management and engineering.Comment: 23 pages, 9 figure

    A Survey on Continuous Time Computations

    Full text link
    We provide an overview of theories of continuous time computation. These theories allow us to understand both the hardness of questions related to continuous time dynamical systems and the computational power of continuous time analog models. We survey the existing models, summarizing results, and point to relevant references in the literature
    corecore