Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 81
Filtrar
1.
Heliyon ; 10(5): e27237, 2024 Mar 15.
Artigo em Inglês | MEDLINE | ID: mdl-38455542

RESUMO

As a typical complex network system, the operating environment of rail transit network (RTN) is complex and demanding. This study aims to accurate assess the weaknesses and vulnerability of RTN, which is crucial for ensuring its smooth operation. Taking Chongqing Rail Transit (CRT) as an example, this study developed a network topology model using the spatial L method and analyzed the network structure characteristics, along with the importance of key nodes under different indicators, based on complex network theory. Additionally, this study analyzed the geographical spatial distribution characteristics of nodes based on the topography and urban spatial structure of Chongqing. Then, this study classified the nodes in the RTN according to basic topological indicators, namely degree, betweenness centrality, network efficiency, and passenger flow volume (PFV). The results indicated six cluster of nodes, reflecting the variability in node vulnerability concerning overall influence (providing alternative paths, reducing path length), regional aggregation capacity, and transportation capacity. Finally, this study proposed targeted management strategies for different clusters of nodes and their respective geographical locations, providing necessary references for rational planning, safety protection, and sustainable construction of RTN.

2.
J Biomol Struct Dyn ; : 1-12, 2024 Jan 17.
Artigo em Inglês | MEDLINE | ID: mdl-38234040

RESUMO

In biological network analysis, identifying key molecules plays a decisive role in the development of potential diagnostic and therapeutic candidates. Among various approaches of network analysis, network vulnerability analysis is quite important, as it assesses significant associations between topological properties and the functional essentiality of a network. Similarly, some node centralities are also used to screen out key molecules. Among these node centralities, escape velocity centrality (EVC), and its extended version (EVC+) outperform others, viz., Degree, Betweenness, and Clustering coefficient. Keeping this in mind, we aimed to develop a first-of-its-kind R package named NetVA, which analyzes networks to identify key molecular players (individual proteins and protein pairs/triplets) through network vulnerability and EVC+-based approaches. To demonstrate the application and relevance of our package in network analysis, previously published and publicly available protein-protein interactions (PPIs) data of human breast cancer were analyzed. This resulted in identifying some most important proteins. These included essential proteins, non-essential proteins, hubs, and bottlenecks, which play vital roles in breast cancer development. Thus, the NetVA package, available at https://github.com/kr-swapnil/NetVA with a detailed tutorial to download and use, assists in predicting potential candidates for therapeutic and diagnostic purposes by exploring various topological features of a disease-specific PPIs network.Communicated by Ramaswamy H. Sarma.

3.
Aging Brain ; 5: 100105, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38273866

RESUMO

We investigated age-related trends in the topology and hierarchical organization of brain structural and functional networks using diffusion-weighted imaging and resting-state fMRI data from a large cohort of healthy aging adults. At the cross-modal level, we explored age-related patterns in the RC involvement of different functional subsystems using a high-resolution functional parcellation. We further assessed age-related differences in the structure-function coupling as well as the network vulnerability to damage to rich club connectivity. Regardless of age, the structural and functional brain networks exhibited a rich club organization and small-world topology. In older individuals, we observed reduced integration and segregation within the frontal-occipital regions and the cerebellum along the brain's medial axis. Additionally, functional brain networks displayed decreased integration and increased segregation in the prefrontal, centrotemporal, and occipital regions, and the cerebellum. In older subjects, structural networks also exhibited decreased within-network and increased between-network RC connectivity. Furthermore, both within-network and between-network RC connectivity decreased in functional networks with age. An age-related decline in structure-function coupling was observed within sensory-motor, cognitive, and subcortical networks. The structural network exhibited greater vulnerability to damage to RC connectivity within the language-auditory, visual, and subcortical networks. Similarly, for functional networks, increased vulnerability was observed with damage to RC connectivity in the cerebellum, language-auditory, and sensory-motor networks. Overall, the network vulnerability decreased significantly in subjects older than 70 in both networks. Our findings underscore significant age-related differences in both brain functional and structural RC connectivity, with distinct patterns observed across the adult lifespan.

4.
Lancet Reg Health West Pac ; 40: 100965, 2023 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-38116500

RESUMO

China's health gains over the past decades face potential reversals if climate change adaptation is not prioritized. China's temperature rise surpasses the global average due to urban heat islands and ecological changes, and demands urgent actions to safeguard public health. Effective adaptation need to consider China's urbanization trends, underlying non-communicable diseases, an aging population, and future pandemic threats. Climate change adaptation initiatives and strategies include urban green space, healthy indoor environments, spatial planning for cities, advance location-specific early warning systems for extreme weather events, and a holistic approach for linking carbon neutrality to health co-benefits. Innovation and technology uptake is a crucial opportunity. China's successful climate adaptation can foster international collaboration regionally and beyond.

5.
Am J Health Syst Pharm ; 80(24): 1840-1846, 2023 Dec 05.
Artigo em Inglês | MEDLINE | ID: mdl-37698265

RESUMO

PURPOSE: The purpose of this article is to describe the planning, implementation, and findings of a "person with a weapon" exercise for an inpatient pharmacy department. SUMMARY: There has been an increased focus on workplace violence in healthcare within the last few years. The health-system pharmacy workforce should take an active role in planning for workplace violence events by completing a risk assessment analysis and performing tabletop and functional exercises. This study provides an example of how health-system pharmacists collaborated with an emergency management team, security, and communications to carry out a person with a weapon exercise in an inpatient hospital pharmacy. Areas for improvement were identified for pharmacy, communications, and security during education sessions and the tabletop and functional exercises, demonstrating the importance of a multidisciplinary approach when planning for a person with a weapon event. As a result of this exercise, there was increased awareness of the "run, hide, fight" tactic, an increase in workplace violence education and staff awareness, and an enhancement of security measures, including technology improvements. CONCLUSION: This workplace violence exercise provides an example of how the pharmacy workforce can engage in emergency preparedness planning and risk mitigation for a workplace violence event. Other health systems can use the action plan, findings, and improvements to raise awareness and train about workplace violence events and support the safety of the pharmacy workforce.


Assuntos
Defesa Civil , Farmácia , Violência no Trabalho , Humanos , Violência no Trabalho/prevenção & controle , Farmacêuticos , Recursos Humanos , Serviço Hospitalar de Emergência
6.
Hum Rights Rev ; : 1-26, 2023 Jun 14.
Artigo em Inglês | MEDLINE | ID: mdl-37362820

RESUMO

We reinvigorate vulnerability theory as a radically ethical device - ethical vulnerability analysis. We bring together fuller vulnerability analysis as theorized by Fineman and Grear in conversation with Levinas and Derrida's radical vulnerability and the ethics of hospitality to construct a theoretical framework that is firmly anchored in the realities of the everyday that are vulnerability and migration. This novel framework offers a thinking space to subvert approaches to migrants and migration as it compels us to come face-to face with the "other", which in turn renders the political accountable by her. We deploy ethical vulnerability analysis to deconstruct the EU's "migration crisis" and investigate whether the activation of temporary protection for displaced persons from Ukraine signifies a humanizing turn in the EU's asylum and migration policies. In this regard, we submit that this hospitable moment constitutes an "exception to the rule" rather than a paradigm shift.

7.
Proteins ; 91(8): 1173-1187, 2023 08.
Artigo em Inglês | MEDLINE | ID: mdl-37119038

RESUMO

Cervical cancer is the primary cause of mortality among women in developing countries. Preventing cervical cancer is partially possible through early vaccination against the human papillomavirus, the most common cause of the disease. Nevertheless, it is imperative to understand the genetics of the disease progression to develop new therapeutic strategies. The present study aims to identify potential genes and associated pathways associated with cervical squamous cell carcinoma progression. We used an integrative approach by combining differential expression analysis, network biology, and functional enrichment analysis with survival analysis. In the present study, differential expression analysis of the microarray-based gene expression profiles of cervical cancer resulted in identifying a total of 544 significantly differentially expressed genes (DEGs). Further, centrality and network vulnerability analysis of the protein-protein interaction network (PPIN) and not well documented in cervical cancer, resulted in seven proteins (FN1, MCM5, TRIP13, KIF11, TTK, CDC45, and BUB1B), in which four proteins were vulnerable. These genes are mostly enriched in biological processes of cell division, mitotic nuclear division, cell cycle checkpoint, and cell proliferation in gene ontology analysis. The KEGG pathway enrichment analysis of the proteins lists them as mainly associated with the cell cycle. In the survival analysis, it was found that the genes MCM5, FN1, KIF11, and CDC45 were statistically significant prognostic factors for cervical cancer. The outcome of the current study identifies and explores the key role of the candidate genes involved in the progression of cervical cancer.


Assuntos
Carcinoma de Células Escamosas , Neoplasias do Colo do Útero , Humanos , Feminino , Perfilação da Expressão Gênica/métodos , Neoplasias do Colo do Útero/genética , Biologia Computacional/métodos , Transcriptoma , Carcinoma de Células Escamosas/genética , ATPases Associadas a Diversas Atividades Celulares/genética , Proteínas de Ciclo Celular
8.
Sensors (Basel) ; 23(7)2023 Mar 27.
Artigo em Inglês | MEDLINE | ID: mdl-37050562

RESUMO

Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable. Many security companies have therefore researched protection methods regarding keyboard-entered data for the introduction of defense techniques. Recently, keyboard security issues have arisen due to the production of new malicious codes by attackers who have combined the existing attack techniques with new attack techniques; however, a keyboard security assessment is insufficient here. The research motivation is to serve more secure user authentication methods by evaluating the security of information input from the keyboard device for the user authentication, including Internet banking service. If the authentication information input from the keyboard device is exposed during user authentication, attackers can attempt to illegal login or, worst, steal the victim's money. Accordingly, in this paper, the existing and the new keyboard-attack techniques that are known are surveyed, and the results are used as the basis for the implementation of sample malicious codes to verify both a security analysis and an assessment of secure keyboard software. As a result of the experiment, if the resend command utilization attack technique is used, 7 out of 10 companies' products expose keyboard information, and only 1 company's products detect it. The fundamental reason for these vulnerabilities is that the hardware chip related to the PS/2 interface keyboard does not provide security facilities. Therefore, since keyboard data exposure does not be prevented only by software, it is required to develop a hardware chip that provides security facilities.

9.
Sensors (Basel) ; 22(24)2022 Dec 12.
Artigo em Inglês | MEDLINE | ID: mdl-36560097

RESUMO

Tunnels play an essential role in the transportation network. Tunnel entrances are usually buried at a shallow depth. In the event of an internal explosion, the blast pressure will cause severe damage or even collapse of the tunnel entrance, paralyzing the traffic system. Therefore, an accurate assessment of the damage level of tunnel entrances under internal blast loading can provide effective assistance for the anti-blast design of tunnels, post-disaster emergency response, and economic damage assessment. In this paper, four tunnel entrance specimens were designed and fabricated with a scale ratio of 1/5.5, and a series of field blast tests were carried out to examine the damage pattern of the tunnel entrances under internal explosion. Subsequently, static loading tests were conducted to obtain the maximum bearing capacity of the intact specimen and residual bearing capacities of the post-blast specimens. After that, an explicit non-linear analysis was carried out and a numerical finite element (FE) model of the tunnel entrance under internal blast loading was established by adopting the arbitrary Lagrangian-Eulerian (ALE) method and validated based on the data obtained from the field blast and static loading tests. A probabilistic vulnerability analysis of a typical tunnel entrance subjected to stochastic internal explosions (assuming various charge weights and detonation points) was then carried out with the validated FE model. For the purpose of damage assessment, the residual bearing capacity of the tunnel entrance was taken as the damage criterion. The vulnerability curves corresponding to various damage levels were further developed based on the stochastic data from the probabilistic vulnerability analysis. When the charge weight was 200 kg, the tunnel entrance exhibited slight or moderate damage, while the tunnel entrance suffered severe or even complete damage as the charge weight increased to 1000 kg. However, the tunnel entrance's probability of complete damage was less than 10% when the TNT charge weight did not exceed 1000 kg.

10.
Adv Bridge Eng ; 3(1): 14, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36254340

RESUMO

A novel shape memory alloy wires-based smart roller bearing (SMA-RBs) has been developed and its cyclic behavior under reverse cyclic loadings has been experimentally investigated. However, its efficacy and performance in enhancing the seismic performance of bridge structures have not been well understood and proven. A new self-centering hysteresis model for SMA-RBs has been proposed to properly simulate their hysteretic behavior, which has been experimentally validated through a pseudo-static test. A methodology is proposed to determine the four damage states of SMA-RB (i.e. slight, moderate, extensive, and collapse) considering the contribution of SMA wires. The smart SMA-RBs are utilized for a cable-stayed bridge in China. The vulnerability of two reference bridges, i.e. the floating system (FS) and rigid system (RS), and one isolated bridge equipped with SMA-RBs (SMA-RBS) are compared at component and system levels. The applicability of three commonly used intensity measures (IMs), i.e. PGA, PGV, and Sa(T1), are evaluated and PGV turns out to be the optimal IM for long-span cable-stayed bridge systems. Results show that incorporating SMA wires in roller bearings can decrease the failure probabilities of the bearing. The piers and towers with SMA-RBs lead to lower seismic fragility over the towers and piers in the reference bridges. The RS is the most vulnerable bridge whereas the SMA-RBS is the least vulnerable bridge among the four bridges. The SMA-RBS experience a much lower collapse damage probability compared to RS ad FS.

11.
Sensors (Basel) ; 22(17)2022 Aug 31.
Artigo em Inglês | MEDLINE | ID: mdl-36081035

RESUMO

Recently, as new threats from attackers are discovered, the damage and scale of these threats are increasing. Vulnerabilities should be identified early, and countermeasures should be implemented to solve this problem. However, there are limitations to applying the vulnerability discovery framework used in practice. Existing frameworks have limitations in terms of the analysis target. If the analysis target is abstract, it cannot be easily applied to the framework. Therefore, this study proposes a framework for vulnerability discovery and countermeasures that can be applied to any analysis target. The proposed framework includes a structural analysis to discover vulnerabilities from a scenario composition, including analysis targets. In addition, a proof of concept is conducted to derive and verify threats that can actually occur through threat modeling. In this study, the open platform communication integrated architecture used in the industrial control system and industrial Internet of Things environment was selected as an analysis target. We find 30 major threats and four vulnerabilities based on the proposed framework. As a result, the validity of malicious client attacks using certificates and DoS attack scenarios using flooding were validated, and we create countermeasures for these vulnerabilities.


Assuntos
Redes de Comunicação de Computadores , Internet das Coisas , Humanos
12.
Rev Panam Salud Publica ; 46: e120, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36042704

RESUMO

Objective: To assess the ability of low-income families to obtain a standard basket of healthy foods before and during the COVID-19 pandemic. Methods: The costs of 191 food items were averaged from supermarkets, municipal markets, wholesalers, and community food outlets in high- and low-income areas in three Caribbean countries. The analysis compared foods not only by selecting high- and low-ranked commodities but by the proportions of those foods, by food group, that will be required to meet a low-cost, nutritionally balanced diet of 2 400 kcal. Results: The main finding was that low-income households will need between 22% and 47% of their earnings to obtain a healthy diet. Despite higher food prices in Saint Kitts and Nevis, low-income households there will need a smaller proportion of their income to obtain a similar basket of foods than in Jamaica or Saint Vincent and the Grenadines. Conclusions: While the COVID-19 pandemic has added economic stressors to low-income households the basic vulnerability of the poor to obtain a healthy diet remains. Despite country variations, the findings point to the need for an increase in the minimum wage, particularly in Jamaica. It is essential to embed policies that ensure reduced economic and social vulnerability at the household level.

13.
Preprint em Português | SciELO Preprints | ID: pps-4590

RESUMO

Objective: Analyze the temporal trend of the incidence/mortality by COVID-19 and its relationship with socioeconomic indicators. Methods: Ecological time series study on COVID-19 cases/deaths in municipalities in Piauí, Brazil, between March/2020 and May/2021. Prais-Winsten linear regression model and the Spearman correlation test were used. Results: There were 271.228 cases and 5.888 deaths in the period. There was an increasing trend in the incidence and stability in mortality from COVID-19. The spatiotemporal analyzes showed higher incidence/mortality in the second and fifth quarters of the period. There was no statistically significant correlation between COVID-19 and IVS. Significant correlations between MHDI and incidence (p<0.001) and mortality (p<0.001) by COVID-19 were observed. Conclusion: There was an increasing trend in the incidence of COVID-19 and stability in mortality from disease. There was a moderate and weak correlation of these indicators with MHDI, demanding decisions aimed at improving the population's quality of life in the management spheres.


Objetivo: Analizar la tendencia temporal de la incidencia/mortalidad por COVID-19 y su relación con indicadores socioeconómicos. Métodos: Estudio de serie temporal ecológica de casos/muertes por COVID-19 en municipios de Piauí, Brasil, entre marzo/2020 y mayo/2021. Se utilizó el modelo de regresión lineal de Prais-Winsten y la prueba de correlación de Spearman. Resultados: Hubo 271.228 casos y 5.888 defunciones en período. Hubo una tendencia creciente en incidencia y estabilidad en mortalidad por COVID-19. Los análisis espacio-temporales mostraron mayor incidencia/mortalidad en segundo/quinto trimestre del período. No hubo una correlación estadísticamente significativa entre COVID-19 y IVS. Se observaron correlaciones significativas entre IDHM y incidencia (p<0,001) y mortalidad (p<0,001) por COVID19. Conclusión: Hubo una tendencia creciente en la incidencia de COVID-19 y estabilidad en mortalidad por la enfermedad. Hubo correlación moderada y débil de estos indicadores con IDHM, exigiendo decisiones encaminadas a mejorar la calidad de vida de la población en los ámbitos de gestión.


Objetivo: Analisar a tendência temporal das taxas de incidência e de mortalidade por COVID-19 e sua relação com indicadores socioeconômicos. Métodos: Estudo ecológico de série temporal sobre casos/óbitos por COVID-19 em municípios do Piauí, Brasil, março/2020-maio/2021. Utilizou-se o modelo de regressão linear de Prais-Winsten e o teste de correlação de Spearman. Resultados: Houve 271.228 casos e 5.888 óbitos, com tendência crescente na incidência e na estabilidade da mortalidade por COVID-19. Análises espaço-temporais demonstraram maior incidência/mortalidade no segundo e no quinto trimestres do período. Não houve correlação estatisticamente significativa entre COVID-19 e índice de vulnerabilidade social (IVS). Foram observadas correlações significativas do IDHM com taxas de incidência (p<0,001) e de mortalidade (p<0,001) pela doença. Conclusão: Houve tendência crescente na taxa de incidência e estabilidade na mortalidade por COVID-19, e respectivamente correlação moderada e fraca desses indicadores com o IDHM, demandando decisões de gestão voltadas a melhor qualidade de vida da população.

14.
Comput Biol Med ; 148: 105692, 2022 09.
Artigo em Inglês | MEDLINE | ID: mdl-35715258

RESUMO

Developing novel methods for the analysis of intracellular signaling networks is essential for understanding interconnected biological processes that underlie complex human disorders. A fundamental goal of this research is to quantify the vulnerability of a signaling network to the dysfunction of one or multiple molecules, when the dysfunction is defined as an incorrect response to the input signals. In this study, we propose an efficient algorithm to identify the extreme signaling failures that can induce the most detrimental impact on the physiological function of a molecular network. The algorithm finds the molecules, or groups of molecules, with the maximum vulnerability, i.e., the highest probability of causing the network failure, when they are dysfunctional. We propose another algorithm that efficiently accounts for signaling feedbacks. The algorithms are tested on experimentally verified ERBB and T-cell signaling networks. Surprisingly, results reveal that as the number of concurrently dysfunctional molecules increases, the maximum vulnerability values quickly reach to a plateau following an initial increase. This suggests the specificity of vulnerable molecule(s) involved, as a specific number of faulty molecules cause the most detrimental damage to the function of the network. Increasing the number of simultaneously faulty molecules does not further deteriorate the network function. Such a group of specific molecules whose dysfunction causes the extreme signaling failures can better elucidate the molecular mechanisms underlying the pathogenesis of complex trait disorders, and can offer new insights for the development of novel therapeutics.


Assuntos
Fenômenos Biológicos , Transdução de Sinais , Algoritmos , Redes Reguladoras de Genes , Humanos
15.
Sensors (Basel) ; 22(10)2022 May 15.
Artigo em Inglês | MEDLINE | ID: mdl-35632175

RESUMO

Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to users and reduces traffic loads. However, ensuring security with a grid computing system is difficult because the system exchanges general user traffic in a peer-to-peer (P2P) manner instead of receiving data from an authenticated server. Therefore, in this study, to explore the vulnerabilities of a grid computing system, we investigated a vulnerability discovery framework that involves a three-step analysis process and eight detailed activities. Four types of zero-day vulnerabilities, namely video stealing, information disclosure, denial of service, and remote code execution, were derived by analyzing a live-streaming platform in Korea, as a representative service, using grid computing.


Assuntos
Sistemas Computacionais , Computadores , República da Coreia
16.
Disaster Med Public Health Prep ; 17: e199, 2022 05 30.
Artigo em Inglês | MEDLINE | ID: mdl-35635217

RESUMO

Though children comprise a large percentage of the population and are uniquely vulnerable to disasters, pediatric considerations are often omitted from regional and hospital-based emergency preparedness. Children's absence is particularly notable in hazard vulnerability analyses (HVAs), a commonly used tool that allows emergency managers to identify a hazard's impact, probability of occurrence, and previous mitigation efforts. This paper introduces a new pediatric-specific HVA that provides emergency managers with a quantifiable means to determine how a hazard might affect children within a given region, taking into account existing preparedness most relevant to children's safety. Impact and preparedness categories within the pediatric-specific HVA incorporate age-based equipment and care needs, long-term developmental and mental health consequences, and the hospital and community functions most necessary for supporting children during disasters. The HVA allows emergency managers to create a more comprehensive assessment of their pediatric populations and preparatory requirements.


Assuntos
Defesa Civil , Planejamento em Desastres , Desastres , Humanos , Criança , Hospitais
17.
Sci Total Environ ; 838(Pt 2): 156157, 2022 Sep 10.
Artigo em Inglês | MEDLINE | ID: mdl-35618127

RESUMO

In a world where climate change, population growth, and global diseases threaten economic access to food, policies and contingency plans can strongly benefit from reliable forecasts of agricultural vegetation health. To inform decisions, it is also crucial to quantify the forecasting uncertainty and prove its relevance for food security. Yet, in previous studies both these aspects have been largely overlooked. This paper develops a methodology to anticipate the agricultural Vegetation Health Index (VHI) while making the underlying prediction uncertainty explicit. To achieve this aim, a probabilistic machine learning framework modelling weather and climate determinants is introduced and implemented through Quantile Random Forests. In a second step, a statistical link between VHI forecasts and monthly food price variations is established. As a pilot implementation, the framework is applied to nine countries of South-East Asia (SEA) with consideration of national monthly rice prices. Model benchmarks show satisfactory accuracy metrics, suggesting that the probabilistic VHI predictions can provide decision-makers with reliable information about future cropland health and its impact on food price variation weeks or even months ahead, albeit with increasing uncertainty as the forecasting horizon grows. These results - ultimately allowing to anticipate the impact of weather shocks on household food expenditure - contribute to advancing the multidisciplinary literature linking vegetation health, probabilistic forecasting models, and food security policy.


Assuntos
Agricultura , Mudança Climática , Produtos Agrícolas , Segurança Alimentar , Previsões
18.
Sensors (Basel) ; 22(9)2022 May 05.
Artigo em Inglês | MEDLINE | ID: mdl-35591211

RESUMO

The invention of smart low-power devices and ubiquitous Internet connectivity have facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of skilled workforce and the growing food demand have led the agriculture sector to adapt to the digital transformation. Smart sensors and systems are used to monitor crops, plants, the environment, water, soil moisture, and diseases. The transformation to digital agriculture would improve the quality and quantity of food for the ever-increasing human population. This paper discusses the security threats and vulnerabilities to digital agriculture, which are overlooked in other published articles. It also provides a comprehensive review of the side-channel attacks (SCA) specific to digital agriculture, which have not been explored previously. The paper also discusses the open research challenges and future directions.


Assuntos
Agricultura , Segurança Computacional , Previsões , Humanos
19.
Disaster Med Public Health Prep ; : 1-3, 2022 Apr 13.
Artigo em Inglês | MEDLINE | ID: mdl-35414371

RESUMO

During the 2016 Kumamoto earthquake, 10 hospitals took responsibility for complete evacuation, in what has become regarded as one of the largest evacuations of patients in 1 seismic disaster. We aimed to examine the reasons for evacuation and to assess hospital vulnerability as well as preparedness for the earthquake. A multidisciplinary team conducted semi-structured interviews with the hospitals 6 months after the earthquake. The primary reasons for the decision to evacuate hospitals were categorized into 3: 1) Concern for structural safety (4 facilities), 2) Damage to the facility water system (7 facilities), and 3) Cessation of regional water supply (5 facilities).All hospitals decided on immediate evacuation within 30 hours and could not wait for structural engineers to inspect the affected buildings. Damage to sprinklers or water facilities caused severe water shortages and flood, thus requiring weeks to resume inpatient care. The earthquake revealed the vulnerability of rapid building-inspection systems, aging buildings, and water infrastructure.

20.
REME rev. min. enferm ; 26: e1463, abr.2022. tab, graf
Artigo em Inglês, Português | LILACS, BDENF - Enfermagem | ID: biblio-1422477

RESUMO

RESUMO Objetivo: analisar, conceitualmente, a vulnerabilidade programática com identificação de seus antecedentes, atributos e consequentes. Método: modelo de análise conceitual segundo metodologia de Walker e Avant. Foram etapas, I. seleção do conceito: vulnerabilidade programática; II. determinação dos objetivos: análise do uso do conceito; III. identificação de usos do conceito: estudo de revisão integrativa (buscou-se a expressão não controlada "programmatic vulnerabilty" nas bases de dados embase, web of science e Medline via pubmed e nos repositórios de artigos Biblioteca Virtual em Saúde e Scielo); IV. determinação dos atributos: análise dos registros da etapa III; V. identificação do caso modelo e casos adicionais: construção com base nos atributos e um caso contrário; VI. identificação de antecedentes e consequentes: painel de dados para elaboração de fenômenos antes e depois da vulnerabilidade programática; VII. referência empíricas: definições operacionais extraídas dos registros. Resultados: 20 registros foram incluídos na análise do conceito. Identificaram-se as variações do termo e os significados mais presentes e caracterizadores da vulnerabilidade programática, sendo a dimensão programática e acesso à saúde as mais frequentes. Foi construído o caso modelo. Os antecedentes, atributos e consequentes foram agrupados em quadro por similitude, no qual referências empíricas do conceito foram indicadas. Conclusão: a vulnerabilidade programática tem elementos discursivos importantes, sendo sua principal característica a falta de consultas disponibilizadas (antecedente), insuficiência/dificuldade no acesso à saúde (atributo) e evolução da doença (consequente).


RESUMEN Objetivo: analizar conceptualmente la vulnerabilidad programática con la identificación de sus antecedentes, atributos y consecuencias. Método: modelo de análisis conceptual según la metodología de Walker y Avant. Los pasos fueron: I. selección del concepto: vulnerabilidad programática; II. determinación de los objetivos: analizar el uso del concepto; III. identificación de los usos del concepto: se utilizó un estudio de revisión integrador (se buscó la expresión no controlada " programmatic vulnerabilty " en las bases de datos embase, Web of Science y Medline a través de pubmed y en los repositorios de artículos Virtual Health Library y Scielo); IV. determinación de los atributos: análisis de los registros del paso III; V. identificación del caso modelo y de los casos adicionales: se construyó a partir de los atributos y de un caso contrario; VI. identificación de los antecedentes y las consecuencias: panel de datos para la elaboración de los fenómenos antes y después de la vulnerabilidad programática; VII. referencia empírica: definiciones operativas extraídas de los registros. Resultados: se incluyeron veinte registros en el análisis conceptual. Se identificaron las variaciones del término y los significados más presentes y característicos de la vulnerabilidad programática, siendo la dimensión programática y el acceso a la salud los más frecuentes. Se construyó el caso modelo. Los antecedentes, atributos y consecuencias se agruparon en una tabla por similitud, en la que se indicaron las referencias empíricas del concepto. Conclusión: la vulnerabilidad programática tiene importantes elementos discursivos, siendo su principal característica la falta de consultas disponibles (antecedente), la insuficiencia/dificultad en el acceso a la salud (atributo) y la evolución de la enfermedad (consecuente).


ABSTRACT Objective: to conceptually analyze programmatic vulnerability with the identification of its antecedents, attributes, and consequences. Method: conceptual analysis model according to the Walker and Avant methodology. There were steps, I. selection of the concept: programmatic vulnerability; II. determination of objectives: analysis of the use of the concept; III. identification of uses of the concept: integrative review study (the uncontrolled expression "programmatic vulnerabilty" was searched in the Embase, Web of Science and Medline databases via Pubmed and in the article repositories Biblioteca Virtual em Saúde and Scielo); IV. determination of attributes: analysis of records from stage III; V. identification of the model case and additional cases: construction based on attributes and an otherwise; VI. identification of antecedents and consequences: panel of data for elaboration of phenomena before and after programmatic vulnerability; VII. empirical reference: operational definitions extracted from the records. Results: 20 records were included in the concept analysis. Variations of the term and the most common meanings that characterize programmatic vulnerability were identified, with the programmatic dimension and access to health being the most frequent. The model case was built. The antecedents, attributes and consequences were grouped in a table by similarity, in which empirical references of the concept were indicated. Conclusion: programmatic vulnerability has important discursive elements, its main characteristic being the lack of available consultations (antecedent), insufficiency/difficulty in accessing health (attribute) and disease evolution (consequent).


Assuntos
Humanos , Vulnerabilidade a Desastres , Estudo sobre Vulnerabilidade , Vulnerabilidade em Saúde , Saúde , Doença , Formação de Conceito
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...