1,779 research outputs found
Recommended from our members
Joint sibling placement at San Bernardino County Department of Children\u27s Services
The purpose of this study is to explore and understand the reasons why some siblings are placed together and why other siblings are separated within the foster care system
Meckel's Diverticulum with Small Bowel Obstruction Presenting as Appendicitis in a Pediatric Patient
The authors suggest that the small bowel be assessed in all appendectomy cases for a pathological Meckel's diverticulum
Like Mother, Like Daughter: Intergenerational Programs for Hispanic Girls
Hispanic mothers\u27 involvement with and expectations of their children coupled with their position as role-models, have a lasting impact on their children\u27s academic achievement
Teacher education in practice: Reconciling contexts, practices, and theories
This is the author's accepted manuscript. The original publication is available at http://dx.doi.org/10.1080/08856257.2013.778114.This paper reports findings from an 18-month qualitative study that followed the experiences of nine teacher residents, their site professors, site coordinators, clinical teachers and principals in three professional learning schools. The study examined the tensions that emerged as teacher preparation theory intersected with the context-bound realities of daily life in schools and the political constraints that diminish possibilities for inclusive education. The paper addresses implications for teacher preparation programmes by reporting how teacher residents negotiated their understanding of and commitment for inclusive education through three themes: (a) critical reflection as an emergent practice, (b) whose learning, and (c) the trouble with behaviour. Interpreting these themes has implications for programmatic designs in teacher preparation
Policies and gender in Argentina: contributions from anthropology and feminism
Las políticas públicas, herramienta de poder indispensable para el ejercicio de gobierno de la población, definen “problemas” y “poblaciones” como objetos de intervención. Tales políticas se presentan como producto de un conocimiento experto y técnico que, por lo mismo, se coloca por encima y por fuera de la sociedad, que lo asume neutral, objetivo. Desde allí, el colectivo “mujeres” aparece en la agenda de políticas públicas, al tiempo que la academia se hace eco de ella. Centrándose en los estudios etnográficos volcados a las políticas y la vida cotidiana, los estudios culturales, los estudios post-coloniales y el feminismo crítico, este artículo analiza los aportes de la antropología para abordar las diversas formas y sentidos de las actuales políticas públicas, con la intención de (re)conocer los modos en que ellas organizan, producen y reproducen lo que se entiende por femenino y masculino. Simultáneamente, interesa desnaturalizar la construcción de subjetividades homogéneas –generizadas y sexuadas– atendiendo a las diversas modalidades de acción, demandas y resistencias a través de las cuales los sujetos se definen y redefinen a sí mismos, y que los revela transformadores de las políticas.Public policies are an indispensable tool for the exercise of power through government of population. These policies define both "problems" and "populations" as objects of intervention. They are stated as a product of a technical expertise, placed above and outside society, and, therefore, assumed as neutral and objective. This same logic enables the group "women" on the public policies agenda, generating various responses from the academic realm. Taking into account ethnographic studies focused on policies and everyday life, cultural studies, post-colonial studies and critical feminism, this article analyzes the contributions of anthropology to address the various forms and meanings of existing policies. By this it is intended to (re)cognize the ways in which these policies organize, produce and reproduce what is meant by female and male. As well as de-naturalizing the construction of homogeneous subjectivities - gendered and sexed- by focusing on the various modes of action, demands and resistance through which individuals define and redefine themselves, and which reveal them as transforming these same policies.Fil: del Rio Fortuna, Cynthia Anahi. Universidad de Buenos Aires; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Gonzalez Martin, Miranda. Universidad de Buenos Aires; ArgentinaFil: Pais Andrade, Marcela Alejandra. Universidad de Buenos Aires; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentin
Seeing the random forest through the decision trees. Supporting learning health systems from histopathology with machine learning models: Challenges and opportunities
This paper discusses some overlooked challenges faced when working with
machine learning models for histopathology and presents a novel opportunity to
support "Learning Health Systems" with them. Initially, the authors elaborate
on these challenges after separating them according to their mitigation
strategies: those that need innovative approaches, time, or future
technological capabilities and those that require a conceptual reappraisal from
a critical perspective. Then, a novel opportunity to support "Learning Health
Systems" by integrating hidden information extracted by ML models from
digitalized histopathology slides with other healthcare big data is presented
Performance of externally validated machine learning models based on histopathology images for the diagnosis, classification, prognosis, or treatment outcome prediction in female breast cancer: A systematic review
Numerous machine learning (ML) models have been developed for breast cancer
using various types of data. Successful external validation (EV) of ML models
is important evidence of their generalizability. The aim of this systematic
review was to assess the performance of externally validated ML models based on
histopathology images for diagnosis, classification, prognosis, or treatment
outcome prediction in female breast cancer. A systematic search of MEDLINE,
EMBASE, CINAHL, IEEE, MICCAI, and SPIE conferences was performed for studies
published between January 2010 and February 2022. The Prediction Model Risk of
Bias Assessment Tool (PROBAST) was employed, and the results were narratively
described. Of the 2011 non-duplicated citations, 8 journal articles and 2
conference proceedings met inclusion criteria. Three studies externally
validated ML models for diagnosis, 4 for classification, 2 for prognosis, and 1
for both classification and prognosis. Most studies used Convolutional Neural
Networks and one used logistic regression algorithms. For
diagnostic/classification models, the most common performance metrics reported
in the EV were accuracy and area under the curve, which were greater than 87%
and 90%, respectively, using pathologists' annotations as ground truth. The
hazard ratios in the EV of prognostic ML models were between 1.7 (95% CI,
1.2-2.6) and 1.8 (95% CI, 1.3-2.7) to predict distant disease-free survival;
1.91 (95% CI, 1.11-3.29) for recurrence, and between 0.09 (95% CI, 0.01-0.70)
and 0.65 (95% CI, 0.43-0.98) for overall survival, using clinical data as
ground truth. Despite EV being an important step before the clinical
application of a ML model, it hasn't been performed routinely. The large
variability in the training/validation datasets, methods, performance metrics,
and reported information limited the comparison of the models and the analysis
of their results (...
Estado del arte utilizando mapeo sistemático de seguridad de redes domésticas WIFI en familias ecuatorianas
El presente artículo tiene como objetivo construir un es tado de arte utilizando mapeo sistemático sobre la se guridad de redes domesticas Wi-Fi. El documento prop uesto presenta los tipos de ataques, protocolos, estándares,
vulnerabilidades, recomendaciones y herramientas encon tradas en esta área de investigación. Para el desarrollo
de este trabajo se utilizaron dos metodologías que son:
Mapeo sistemático que permitieron conocer las frecuen cias de estudios, revistas, conferencias, autores e idiomas
entre los años 2017 a 2021 y por otra parte la revisión
de la literatura permitió interpretar y consolidar los estu dios relevantes recolectadas en el mapeo sistemático. Se
identificaron un total de 95 estudios de mayor relevancia
distribuidos de las siguientes manera IEEE Xplore 37, Pro Quest 11, ScienceDirect 14, Scopus 20 y Web of Science
13, todas en idioma inglés. Además de encontrar los estu dios en los repositorios oficiales estos fueron presentados
y publicados en 37 revistas y 41 conferencias. Por otra
parte, se identificaron vulnerabilidades de: Factor Humano
19, Hardware 5 y Software 28. Se encontraron 45 proto colos y 21 estándares, también se hallaron 72 ataques de
entre activos y pasivos. Además de 33 herramientas para
ejecutar ataques y 45 para contrarrestarlas. Finalmente, de
los estudios recolectados se encontró un enfoque mayori tario hacia las empresas que a los hogares con un 95% y
5% respectivamente en el tema de estudio.he present article aims to build a state of the art us ing a systematic mapping on the security of home Wi-Fi
networks. The proposed document presents the types of
attacks, protocols, standards, vulnerabilities, recommen dations and tools found in this research area. For the devel opment of this work, two methodologies were used, which
are: Systematic mapping that allowed to know the fre quencies of studies, journals, conferences, authors and lan guages between the years 2017 to 2021 and, on the other
hand, the review of the literature allowed interpret and
consolidate the relevant studies collected in the systematic
mapping. A total of 95 more relevant studies were identi fied, distributed as follows: IEEE Xplore 37, ProQuest 11,
ScienceDirect 14, Scopus 20 and Web of Science 13, all
in English. In addition to finding the studies in the official
repositories, they were presented and published in 37 jour nals and 41 conferences. On the other hand, vulnerabilities
of: Human Factor 19, Hardware 5 and Software 28 were
identified. 45 protocols and 21 standards were found, 72
attacks were also found between active and passive. In
addition to 33 tools to execute attacks and 45 to counter
them. Finally, of the collected studies, a majority approach
was found towards companies than towards households
with 95% and 5% respectively on the subject of study
- …