1,028 research outputs found

    Managing IT Projects in Public Companies: A Case Study

    Get PDF
    As part of its public sector modernization effort, a North African government has put a lot of effort and allocated significant budgets since 1997 to modernize one of its main public sector companies. Consequently, this company, that mainly offers postal services, initiated many IT-based projects to computerize all paper-based ongoing services offered through its branches and to present new products to customers. This company was aiming to improve service quality and to diversify the range of its services. However, some of these IT-based projects inevitably faced problems. Some projects were either not completed successfully, cancelled, over-budget or taking more time than scheduled. As a result, many employees and customers of this company were dissatisfied and complained about bad planning, slowness and significant disruptions in these projects, an event that affected adversely the quality of service. This study aims at determining the causes of these project disruptions, failures or delays. To achieve this aim, 30 experienced project developers and engineers working in that company’s IT department volunteered to respond to a detailed questionnaire specifically developed for this purpose. The questionnaire included questions about project vision clarity, time/cost management, project quality assurance, risk management and human resources management. Results show that the main reasons for disruptions, failure or delays in IT projects are lack of business plan and poor documentation during and after finishing projects, lack of clear quality assurance criteria, standards and reviews, and poor project risk management practices. Ramifications of such results in terms of improving IT project management practices in the public service sector are finally presented

    Can Patient Safety Incident Reports Be Used to Compare Hospital Safety? Results from a Quantitative Analysis of the English National Reporting and Learning System Data.

    Get PDF
    BACKGROUND: The National Reporting and Learning System (NRLS) collects reports about patient safety incidents in England. Government regulators use NRLS data to assess the safety of hospitals. This study aims to examine whether annual hospital incident reporting rates can be used as a surrogate indicator of individual hospital safety. Secondly assesses which hospital characteristics are correlated with high incident reporting rates and whether a high reporting hospital is safer than those lower reporting hospitals. Finally, it assesses which health-care professionals report more incidents of patient harm, which report more near miss incidents and what hospital factors encourage reporting. These findings may suggest methods for increasing the utility of reporting systems. METHODS: This study used a mix methods approach for assessing NRLS data. The data were investigated using Pareto analysis and regression models to establish which patients are most vulnerable to reported harm. Hospital factors were correlated with institutional reporting rates over one year to examine what factors influenced reporting. Staff survey findings regarding hospital safety culture were correlated with reported rates of incidents causing harm; no harm and death to understand what barriers influence error disclosure. FINDINGS: 5,879,954 incident reports were collected from acute hospitals over the decade. 70.3% of incidents produced no harm to the patient and 0.9% were judged by the reporter to have caused severe harm or death. Obstetrics and Gynaecology reported the most no harm events [OR 1.61(95%CI: 1.12 to 2.27), p<0.01] and pharmacy was the hospital location where most near-misses were captured [OR 3.03(95%CI: 2.04 to 4.55), p<0.01]. Clinicians were significantly more likely to report death than other staff [OR 3.04(95%CI: 2.43 to 3.80) p<0.01]. A higher ratio of clinicians to beds correlated with reduced rate of harm reported [RR = -1.78(95%Cl: -3.33 to -0.23), p = 0.03]. Litigation claims per bed were significantly negatively associated with incident reports. Patient satisfaction and mortality outcomes were not significantly associated with reporting rates. Staff survey responses revealed that keeping reports confidential, keeping staff informed about incidents and giving feedback on safety initiatives increased reporting rates [r = 0.26 (p<0.01), r = 0.17 (p = 0.04), r = 0.23 (p = 0.01), r = 0.20 (p = 0.02)]. CONCLUSION: The NRLS is the largest patient safety reporting system in the world. This study did not demonstrate many hospital characteristics to significantly influence overall reporting rate. There were no association between size of hospital, number of staff, mortality outcomes or patient satisfaction outcomes and incident reporting rate. The study did show that hospitals where staff reported more incidents had reduced litigation claims and when clinician staffing is increased fewer incidents reporting patient harm are reported, whilst near misses remain the same. Certain specialties report more near misses than others, and doctors report more harm incidents than near misses. Staff survey results showed that open environments and reduced fear of punitive response increases incident reporting. We suggest that reporting rates should not be used to assess hospital safety. Different healthcare professionals focus on different types of safety incidents and focusing on these areas whilst creating a responsive, confidential learning environment will increase staff engagement with error disclosure

    Selection of local extremophile lactic acid bacteria with high capacity to degrade lactose: Potential use to reduce intolerance to lactose in vitro

    Get PDF
    This study is related to the isolation and identification of strains of local thermophilic lactic acid bacteria belonging to the species, Streptococcus thermophilus and Lactobacillus bulgaricus. These bacteria can exist under extreme conditions of the digestive tract (acidity and high concentration of bile salts) and have a high capacity to degrade lactose. The aim is to produce yoguort with the bacteria that remain viable and active in the digestive tract, so as to enhance lactase activity at the intolerant lactose. The results also show considerable variations between genera, species and strains of the same species in the decomposition of lactose in pure and mixed cultures (Sc.t5 and Sc.t3, respectively, with 48 and 42%) (YSLB2, YSLB4 and YSLB1, respectively, with 90.44, 87.22 and 84.28%) of initial lactose after 6 h of incubation at 37&#176;C while keeping a level of viability higher than 107 cells/ ml. In the presence of pH (2.5, 4.5 and 6.5), put with or without 0.3% of bile salts, the results are also unmatched. The best cultures will be used to manufacture fermented milks (yoghurts) in order to correct intolerance with lactose in man after having to test them, in a second part, in vivo

    Viscous Effects on Elliptic Flow and Shock Waves

    Full text link
    Fast thermalization and a strong buildup of elliptic flow of QCD matter as found at RHIC are understood as the consequence of perturbative QCD (pQCD) interactions within the 3+1 dimensional parton cascade BAMPS. The main contributions stem from pQCD bremsstrahlung 2↔32 \leftrightarrow 3 processes. By comparing to Au+Au data of the flow parameter v2v_2 as a function of participation number the shear viscosity to entropy ratio is dynamically extracted, which lies in the range of 0.08 and 0.2, depending on the chosen coupling constant and freeze out condition. Furthermore, first simulations on the temporal propagation of dissipative shock waves are given. The cascade can either simulate true ideal shocks as well as initially diluted, truely viscous shocks, depending on the employed cross sections or mean free path, respectively.Comment: 7 pages, 8 figures, to appear in the proceedings of the 2008 Erice School on Nuclear Physics, Sicil

    Information extraction of cybersecurity concepts: An LSTM approach

    Get PDF
    Extracting cybersecurity entities and the relationships between them from online textual resources such as articles, bulletins, and blogs and converting these resources into more structured and formal representations has important applications in cybersecurity research and is valuable for professional practitioners. Previous works to accomplish this task were mainly based on utilizing feature-based models. Feature-based models are time-consuming and need labor-intensive feature engineering to describe the properties of entities, domain knowledge, entity context, and linguistic characteristics. Therefore, to alleviate the need for feature engineering, we propose the usage of neural network models, specifically the long short-term memory (LSTM) models to accomplish the tasks of Named Entity Recognition (NER) and Relation Extraction (RE).We evaluated the proposed models on two tasks. The first task is performing NER and evaluating the results against the state-of-the-art Conditional Random Fields (CRFs) method. The second task is performing RE using three LSTM models and comparing their results to assess which model is more suitable for the domain of cybersecurity. The proposed models achieved competitive performance with less feature-engineering work. We demonstrate that exploiting neural network models in cybersecurity text mining is effective and practical. - 2019 by the authors.This publication was made possible by the support of Qatar University and DISP laboratory (Lumi?re University Lyon 2, France).Scopu

    Collective Flow and Energy Loss with parton transport

    Get PDF
    Quenching of gluonic jets and heavy quark production in Au+Au collisions at RHIC can be understood within the pQCD based 3+1 dimensional parton transport model BAMPS including pQCD bremsstrahlung 2↔32 \leftrightarrow 3 processes. Furthermore, the development of conical structures induced by gluonic jets is investigated in a static box for the regimes of small and large dissipation.Comment: typos corrected, figure labels enlarged; Talk given by C. Greiner; to appear in the proceedings of WISH201

    Collective Flow and Mach Cones with Parton Transport

    Get PDF
    Fast thermalization and a strong build up of elliptic flow of QCD matter were investigated within the pQCD based 3+1 dimensional parton transport model BAMPS including bremsstrahlung 2↔32 \leftrightarrow 3 processes. Within the same framework quenching of gluonic jets in Au+Au collisions at RHIC can be understood. The development of conical structure by gluonic jets is investigated in a static box for the regimes of small and large dissipation. Furthermore we demonstrate two different approaches to extract the shear viscosity coefficient η\eta from a microscopical picture.Comment: 7 pages, 8 figures, 1 table; to appear in the proceedings of Hot and Cold Baryonic Matter -- HCBM 201

    Susceptibility of twelve soft wheat varieties (Triticum aestivum) to Sitophilus granarius (L.) (Coleoptera: Curculionidae)

    Get PDF
    International audienceThe aim of study is the effect of trophic medium of twelve soft wheat varieties on the biotic potential of S.granarius L. After 3 months of storage under laboratory conditions at 27 ± 2 ° C and 70 ± 5% rh, have reveals that the preferred varieties for development of this species are Hidhab, Mahon Demias, Arfort and Siete Ceros. This latest was found to be the most susceptible. Growth index and loss were highest with 2.08 and 3.27% respectively. Laboratory analysis of the main grain components of the different varieties suggested that the susceptibility of these varieties to S. granarius infestation may be attributed to the high content of protein and low content of carbohydrate compared to resistance varieties
    • …
    corecore