6,296 research outputs found

    Building a tiered rehabilitation system: the case of Yunnan Province

    Get PDF
    Research purposes: The hierarchical rehabilitation system model of Yunnan Province is built to provide a reference for the establishment of a standardized three-level rehabilitation system so as to meet the patient demands for different functional rehabilitation at different stages during the whole treatment. Research methods: 1. The General System Theory model is adopted as a guidance for the organizational structure construction of the hierarchical rehabilitation system model in rehabilitation centers, rehabilitation sub-centers, and rehabilitation stations in Yunnan Province. Standardized hierarchical rehabilitation hardware construction for these rehabilitation institutions of different levels helps form an exemplary structural model of a three-level standardized rehabilitation system. 2. The Learning Cycle Theory model is adopted as a guidance for the unified standardized training for patient rehabilitation management in the exemplary rehabilitation institutions of the three-level system. The researchers regularly guide, supervise, and summarize the standard implementation situations of patient rehabilitation management in these institutions and assess the operational quality and management efficiency of the hierarchical rehabilitation system model in Yunnan Province, finally forming the exemplary and standardized three-level rehabilitation system model. 3. The researchers analyze the operating parameters of the medical institutions at all levels in the three-level standardization rehabilitation system and evaluate the structural process and operational efficiency of the three-level standardized rehabilitation system model based on the analysis results.O modelo do sistema de reabilitação hierárquico da Província Yunnanfoi concebido comoumreferencial para a implementação de um sistema de reabilitação estruturado em três níveis, de modo a responder às necessidades dos doentes nas diferentes fases da sua reabilitação funcional. Como guias metodológicos foram adotadosa Teoria Geral dos Sistemas e o LearningCycleTheory, entre outros contributos teóricos considerados relevantes. Os investigadores participantes supervisionaram a operacionalização do sistema e avaliaram as instituições de cada um dos três níveis, quanto àestrutura, ao processo e à eficiência operacional. Quanto aos resultados houve uma clara perceção dos ganhos obtidos em várias dimensões. Pelo lado das instituições governamentais, pela redução dos recursos utilizados e pela maior mobilização e empenhamento dos profissionais e por parte dos doentes, pela maior rapidez de resposta às suas necessidades e a uma redução do tempo da sua reintegração no mercado de trabalho. A reputação deste sistema implicoutambém ganhos significativos nas receitas obtidas, que aumentaram em mais de 10% em dois anos, tendo mesmo algumas serviços atingido incrementos de 89,6%. A mudança de cultura organizacional das instituições envolvidas,no sentido da inovação e da proatividadeé também um facto a reter com particular relevância. Como conclusão, poderemos referir que este modelorespondeu as expectativas de todos os stakeholders, desde o governo, aos doentes e ao público em geral, bem assim como às das instituições de saúde implicadas e os seus profissionais. Deste modo, este modelo pode fornecer contributos sustentados de aprendizagem para a conceção e implementação de sistemas de reabilitação regional de um modo rápido e estruturado

    Modified evolution of stellar binaries from supermassive black hole binaries

    Full text link
    The evolution of main sequence binaries resided in the galactic centre is influenced a lot by the central super massive black hole (SMBH). Due to this perturbation, the stars in a dense environment are likely to experience mergers or collisions through secular or non-secular interactions. In this work, we study the dynamics of the stellar binaries at galactic center, perturbed by another distant SMBH. Geometrically, such a four-body system is supposed to be decomposed into the inner triple (SMBH-star-star) and the outer triple (SMBH-stellar binary-SMBH). We survey the parameter space and determine the criteria analytically for the stellar mergers and the tidal disruption events (TDEs). For a relative distant and equal masses SMBH binary, the stars have more opportunities to merge as a result from the Lidov-Kozai(LK) oscillations in the inner triple. With a sample of tight stellar binaries, our numerical experiments reveal that a significant fraction of the binaries, ~70 per cent, experience merger eventually. Whereas the majority of the stellar TDEs are likely to occur at a close periapses to the SMBH, induced by the outer Kozai effect. The tidal disruptions are found numerically as many as ~10 per cent for a close SMBH binary that is enhanced significantly than the one without the external SMBH. These effects require the outer perturber to have an inclined orbit (>=40 degree) relatively to the inner orbital plane and may lead to a burst of the extremely astronomical events associated with the detection of the SMBH binary.Comment: 12 pages, 9 figures, MNRAS in pres

    Multi-dimensional key generation of ICMetrics for cloud computing

    Get PDF
    Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service. This paper explores an approach to assure trust and provenance in cloud based services via the generation of digital signatures using properties or features derived from their own construction and software behaviour. The resulting system removes the need for a server to store a private key in a typical Public/Private-Key Infrastructure for data sources. Rather, keys are generated at run-time by features obtained as service execution proceeds. In this paper we investigate several potential software features for suitability during the employment of a cloud service identification system. The generation of stable and unique digital identity from features in Cloud computing is challenging because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Subsequently, a smooth entropy algorithm is developed to evaluate the entropy of key space

    Expander Chunked Codes

    Full text link
    Chunked codes are efficient random linear network coding (RLNC) schemes with low computational cost, where the input packets are encoded into small chunks (i.e., subsets of the coded packets). During the network transmission, RLNC is performed within each chunk. In this paper, we first introduce a simple transfer matrix model to characterize the transmission of chunks, and derive some basic properties of the model to facilitate the performance analysis. We then focus on the design of overlapped chunked codes, a class of chunked codes whose chunks are non-disjoint subsets of input packets, which are of special interest since they can be encoded with negligible computational cost and in a causal fashion. We propose expander chunked (EC) codes, the first class of overlapped chunked codes that have an analyzable performance,where the construction of the chunks makes use of regular graphs. Numerical and simulation results show that in some practical settings, EC codes can achieve rates within 91 to 97 percent of the optimum and outperform the state-of-the-art overlapped chunked codes significantly.Comment: 26 pages, 3 figures, submitted for journal publicatio
    • …
    corecore