474,373 research outputs found
User involvement in healthcare technology development and assessment: Structured literature review
Purpose – Medical device users are one of the principal stakeholders of medical device technologies. User involvement in medical device technology development and assessment is central to meet their needs.
Design/methodology/approach – A structured review of literature, published from 1980 to 2005 in peer-reviewed journals, was carried out from social science perspective to investigate the practice of user involvement in the development and assessment of medical device technologies. This was followed by qualitative thematic analysis.
Findings – It is found that users of medical devices include clinicians, patients, carers and others. Different kinds of medical devices are developed and assessed by user involvement. The user involvement occurs at different stages of the medical device technology lifecycle and the degree of user involvement is in the order of design stage > testing and trials stage > deployment stage > concept stage. Methods most commonly used for capturing users’ perspectives are usability tests, interviews and questionnaire surveys.
Research limitations/implications – We did not review the relevant literature published in engineering, medical and nursing fields, which might have been useful.
Practical implications – Consideration of the users’ characteristics and the context of medical device use is critical for developing and assessing medical device technologies from users’ perspectives.
Originality/value – This study shows that users of medical device technologies are not homogeneous but heterogeneous, in several aspects, and their needs, skills and working environments vary. This is important consideration for incorporating users’ perspectives in medical device technologies.
Paper type: Literature review
Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side. The proposed model is the core of the module of the developed decision support system in the problems of choosing rational investing variants for information protection and cybersecurity of various information objects. The model allows to find financial solutions using the tools of the theory of multistep games with several terminal surfaces. The authors proposed an approach that allows information security management to make a preliminary assessment of strategies for financing the effective cybersecurity systems. The model is distinguished by the assumption that the protection side does not have complete information, both about the financing strategies of the attacking side, and about its financial resources state aimed at overcoming cybersecurity lines of the information object. At the same time, the protection side has the opportunity to obtain additional information by the part of its financial resources. This makes it possible for the protection side to obtain a positive result for itself in the case when it can not be received without this procedure. The solution was found using a mathematical apparatus of a nonlinear multistep quality game with several terminal surfaces with alternate moves. In order to verify the adequacy of the model there was implemented a multivariate computational experiment. The results of this experiment are described in the article. © 2005 - ongoing JATIT & LL
Computability and analysis: the legacy of Alan Turing
We discuss the legacy of Alan Turing and his impact on computability and
analysis.Comment: 49 page
A guided tour of asynchronous cellular automata
Research on asynchronous cellular automata has received a great amount of
attention these last years and has turned to a thriving field. We survey the
recent research that has been carried out on this topic and present a wide
state of the art where computing and modelling issues are both represented.Comment: To appear in the Journal of Cellular Automat
A History of Cluster Analysis Using the Classification Society's Bibliography Over Four Decades
The Classification Literature Automated Search Service, an annual
bibliography based on citation of one or more of a set of around 80 book or
journal publications, ran from 1972 to 2012. We analyze here the years 1994 to
2011. The Classification Society's Service, as it was termed, has been produced
by the Classification Society. In earlier decades it was distributed as a
diskette or CD with the Journal of Classification. Among our findings are the
following: an enormous increase in scholarly production post approximately
2000; a very major increase in quantity, coupled with work in different
disciplines, from approximately 2004; and a major shift also from cluster
analysis in earlier times having mathematics and psychology as disciplines of
the journals published in, and affiliations of authors, contrasted with, in
more recent times, a "centre of gravity" in management and engineering.Comment: 23 pages, 9 figure
A Survey on Continuous Time Computations
We provide an overview of theories of continuous time computation. These
theories allow us to understand both the hardness of questions related to
continuous time dynamical systems and the computational power of continuous
time analog models. We survey the existing models, summarizing results, and
point to relevant references in the literature
- …