首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到14条相似文献,搜索用时 46 毫秒
1.
巴桑  旺加 《西藏科技》2004,(8):42-44
本文通过回顾分析高原地区内镜技术的发展同时存在问题,正确对待现实问题,充分了解胃镜清洗消毒的各个环节,认识和分析各种内镜消毒方法的可靠性,结合西藏高原地区特殊的地理环境,对本地区今后胃镜清洗消毒方法走向规范化打下基础,胃镜消毒必须按消毒-清洗-消毒-清洗的原则,避免出现内镜技术开展过程中院内感染.  相似文献   

2.
目的了解西宁市某中学学生艾滋病知识、态度、行为现状,为更好地开展中学生艾滋病健康教育工作提供依据。方法采取多阶段随机整群抽样方法,对西宁市某中学275名初、高中学生开展艾滋病防治知识、态度、行为问卷调查。结果被调查学生艾滋病知识总知晓率仅为41.09%,不同年级和性别学生对艾滋病基本知识的认知不同,获取艾滋病防治知识的途经和渠道从高到低依次是电视/广播/网络、报刊/杂志、同学/朋友、家庭成员、老师、学校等;仅有37.50%的中学生不歧视艾滋病病毒感染者和病人,不同年级、不同性别学生对待艾滋病的态度和行为不同。结论西宁市某中学学生对艾滋病基本知识掌握不够全面,不能正确对待艾滋病病人或感染者,存在着明显的歧视倾向。  相似文献   

3.
冲水厕所是都市和城镇化的标志,也是近代人类文明的象征。由于冲水厕所建设需要投资庞大的建筑管道网络配套系统、管道维护及技术复杂昂贵的高耗能污水处理运营系统,冲水厕所的数量和位置受到限制,世界上只有在比较发达地区得到普及。2008年全世界有25.78亿人没有卫生厕所。在中国,25394.2万户农村人口中只有1578.6万(6.2%)的农户拥有完整下水道冲水厕所。一些农村城镇仍然使用旱厕,卫生条件差,夏天蚊蛆四窜、苍蝇乱飞、臭气熏天。即便如此,相当多的农村城镇学校仍然由于蹲  相似文献   

4.
通过对大学生蠕形螨的调查,了解大学生蠕形螨的感染率以及蠕形螨在人体的分布;通过情侣学生和非情侣学生的调查,证实直接的皮肤接触是蠕形螨传播的主要方式;通过对面巾、枕头和发廊的调查,证实间接接触也是蠕形螨传播的重要方式。  相似文献   

5.
汪诚  陈海琴  徐志南  殷秀飞  岑沛霖 《科技通报》2007,23(3):356-359,367
随着-omics(组学)时代的到来,无细胞蛋白质合成系统以具有快速、方便、易于高通量等优点,正在被广泛地研究和应用。本文选取HIV病毒感染因子Vif作为目标蛋白,构建了适宜体外表达的Vif表达载体pIVEX2.4c-Vif,并将其在大肠杆菌无细胞蛋白质合成系统中进行表达,为下一步进行高通量药物筛选奠定了一定的基础。  相似文献   

6.
In this paper, we investigate the interplay of clinical knowledge and technological capabilities in the recent development of HIV/AIDS treatments and offer qualitative and quantitative evidence from the empirical setting of Italian practice. The study contributes to the literature on the co-evolution of physical and social technologies in medical innovation by showing how professional guidelines, systematic evaluative research and local coordination mechanisms contribute actively to the resolution of the uncertainty that surrounds technological advances, while leaving room for largely discretional therapeutic choices. The resulting variety in implementation strategies improves health outcomes, but may reduce productive efficiency.  相似文献   

7.
本文以中科院生命科学和医学学部关于艾滋病防治的系列咨询研究为例,比较研究了学部咨询研究与国家有关决策内容的相关性,总结了学部咨询研究的前瞻性、战略性和科学性特色,分析了中科院学部咨询研究体现的科学思想库功能。  相似文献   

8.
Cytokines, viral load and opportunistic infections play an important role in HIV-disease progression. Hundred children vertically infected with HIV were enrolled to determine mRNA levels of TNF-α, IL-10, IL-4 and IFN-γ. These levels were estimated by amplifying cytokine mRNA from peripheral blood mononuclear cells. Severity of HIV was staged by the reduction in CD4 + T cells and the onset of opportunistic infections. IL-10 mRNA levels were observed to increase with the severity. Despite the rising IL-10 mRNA levels, TNF-α mRNA levels increased with severity of HIV and decrease in CD4 + T cell counts. IL-4 mRNA levels increased with the reduction in CD4 + T cell numbers. Depleting mRNA levels of IFN-γ contributed to the worsening of HIV disease. Increase in TNF-α and IL-4 levels appended to the disease severity by upregulation of the viral replication. Increased IL-10 levels and decreased IFN-γ levels predisposed the children to HIV associated opportunistic infections, which in return contributed to cytokine disarray.  相似文献   

9.
桂林市中医药防治艾滋病试点项目(简称项目)于2012年成立。项目的实施,是在不断解决困难和问题的过程中进行的。文章通过总结近几年的实施情况,找出问题,制定改进措施,希望可以更进一步促进项目工作顺利开展。  相似文献   

10.
HIV/AIDS is a deadly disease which kills people everywhere in the world. The purpose of this paper is to show that libraries and information centres in Nigeria can be actively used in the campaign and war against the spread of HIV/AIDS. It shows how HIV/AIDS is reducing the population of Nigeria through deaths. It highlights factors responsible for the rapid spread of the disease and shows how provision of education and information supported by library and information services can help reduce the spread of the disease. Libraries and information centres should involve audio–visual materials, and information communication technologies in educating and dissimilating relevant information to the people against HIV/AIDS in the country. The paper has discussed problems hindering effective library services to Nigerians.  相似文献   

11.
Information and Communication Technology (ICT) has been applied increasingly in supporting human immunodeficiency virus (HIV) prevention and treatment. The technological advances have extended to the field of HIV self-management. The objectives of this paper are to examine the design and use of ICTs in HIV self-management programs, to identify the knowledge gaps in existing practice, and to provide recommendations for future research and program development. A systematic review was conducted to search all English literature published prior to August 2016 in six electronic databases. The inclusion criteria also included either quantitative or qualitative assessments of HIV self-management programs that utilized at least one ICT platform in the program protocol. The search identified six studies conducted in Australia and the United States. The studies were diverse in sample size and enrollment criteria of study population. The major functionalities of ICT platforms (mobile phones and websites) included delivering information modules, sending medication reminders, supporting self-monitoring for medical adherence and risk behavior reduction, enhancing communication among participants, and providing easy access to HIV self-management information. The major challenges faced by self-management programs utilizing ICTs were lack of interaction and concern of privacy. The HIV self-management programs that employed ICT platforms were limited in number and geographic coverage. Most of the programs were also tested at an initial stage with small size samples and minimum technical innovation. The lack of explicit guiding theories and models on information behavior or technology use was observed in all studies. Use of ICTs in HIV self-management interventions is an emerging field. Future research would benefit from paying more attention to technical innovation and interactive features in applying ICT platform in self-management programs. The ICTs platforms, with increasing innovation in connecting people and places, can serve as a powerful tool to reduce the disparities in health care and health promotion. Future research is also needed to explore the feasibility of applying ICT platforms in self-management programs that serving populations from diverse socioeconomic background and in resource-poor settings.  相似文献   

12.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but without compromising the value of one’s privacy in public. This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology, and Computer Ethics: Philosophical Enquiry.  相似文献   

13.
Contrary to the "retro" image often awarded them, and despite their continuing enthusiasm and responsibility for the organization of printed materials, librarians are upbeat about the prospects of an information society driven primarily by electronic technologies, but in which libraries can play an important part. Public librarians detect a natural correlation between the historic democratic mission of their institution and the increased accessibility made possible by digitalized sources. The library community's acceptance of the information society idea as a "given" social phenomenon supports discourses that play down historical continuities and herald the dawn of a new age. Such discourses ignore or reject historical evidence that points to the existence of past information societies, revolutions, and infrastructures defined, in part, by the operation of indirect surveillance, constituted by the bureaucratic information systems of modernity. Victorian Britain serves as a good example of an early information society, to which public libraries, themselves micro-information societies, contributed significantly. The role played by public librarians in the Victorian information society, illustrated in this article by evidence drawn from the contemporary library press, is seen in their preoccupation with the surveillance and ordering of knowledge; their adoption for library operations of the businesslike, bureaucratic procedures described recently by business historians; and their panoptic tracking of users and their activities.  相似文献   

14.
当前国内视频监控领域普遍呈现监控设备种类众多,但由于资产底数不清、弱口令问题严重、管理体系不健全、安全标准缺乏和系统防护不足等问题带来诸多安全隐患,面临着严峻的网络安全挑战.结合2019年全国视频监控网络安全现场检查工作,对某省两地市采用基于主动扫描的资产识别技术部署检查,通过对裸露在互联网的视频监控系统的安全性以及视...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号