337 resultados para Resource sharing
Resumo:
Introduction Multidisciplinary models of organising and providing care have been proposed to decrease the health services gap between urban and rural populations but health workforce shortages exist across most professions and are further exacerbated by maldistribution. Flexibility and expansion of the range of tasks that a health professional can undertake were proposed. Dispensing doctors (DDs) are such an example. As part of DDs’ routine medical practice, DDs are able to both prescribe and dispense medicines to their patients. The granting of a dispensing licence to a doctor is intended to improve rural community access to medicines where there is no pharmacy within a reasonable distance. Method An iterative, qualitative descriptive methodology was used to identify factors which influenced DDs’ practice. Qualitative data were collected by in-depth face-to-face and telephone interviews with DDs. A combination of processes: qualitative content analysis and constant comparison were used to analyse the interview transcripts thematically. Member checking and separate coding were utilised to ensure rigour. Result Thirty-one interviews were conducted. The respondents universally acknowledged that the main reason for dispensing were for the convenience and benefits of their patients and to ensure continuity of care. DDs’ communities were generally more isolated and smaller when compared to their non-dispensing counterparts. DD-respondents viewed their dispensary as a service to the community. Peer pressure on prescribing was a key factors in self-regulating prescribing and dispensing. Conclusion DDs fulfill an important area of unmet needs by providing continuity of pharmaceutical care but the practice is hindered by significant barriers
Resumo:
Business processes depend on human resources and managers must regularly evaluate the performance of their employees based on a number of measures, some of which are subjective in nature. As modern organisations use information systems to automate their business processes and record information about processes’ executions in event logs, it now becomes possible to get objective information about resource behaviours by analysing data recorded in event logs. We present an extensible framework for extracting knowledge from event logs about the behaviour of a human resource and for analysing the dynamics of this behaviour over time. The framework is fully automated and implements a predefined set of behavioural indicators for human resources. It also provides a means for organisations to define their own behavioural indicators, using the conventional Structured Query Language, and a means to analyse the dynamics of these indicators. The framework's applicability is demonstrated using an event log from a German bank.
Resumo:
Despite a wide acceptance that primary producers in Australia subscribe to a stewardship ethic, land and water degradation remains an ongoing problem. Recent calculations suggest that the economic cost of Australia's environmental degradation is amounting to more than $A3.5 billion a year with an estimated cost of managing (not overcoming) problems of salinity, acidification, soil erosion totalling $A60 billion over the next decade. This paper argues that stewardship itself is an unsatisfactory concept when looking to landholders to respond to environmental problems, for rarely does the attitude of stewardship translate into behaviours of improving natural resource management practices on private land. Whilst there is some acceptance of the environmental problem among primary producers, a number of external constraints may also impede the uptake of conservation-orientated practices. In light of the prevailing accounts of poor adoption of sustainable practices a number of policy options are reviewed in this paper, including formal regional partnerships, regulatory frameworks and market-based measures. It is concluded that the contentious nature of some of these new opportunities for change will mean that any moves aimed at reversing environmental degradation in Australia will be slow.
Resumo:
Remote dryland regions are characterised by sparse populations and socially marginalised voices which pose particular challenges to natural resource management. This paper considers the issue of how to achieve community engagement in regions with these characteristics. In doing so, the paper contributes to an expanding international research agenda focusing on the distinct characteristics of arid and semi-arid regions under the heading of 'dryland syndrome'. The paper draws on government liaison officer and local community perspectives of successful engagement in the case-study region of Lake Eyre Basin, Australia. The results demonstrate that widely recognised characteristics of successful engagement are required but insufficient for genuine engagement in remote dryland regions. In addition to building trust through community ownership, being inclusive, effective communication, and adequate resources, genuine community engagement in drylands also requires respecting the extreme conditions and extraordinary variability of these areas. Residents of dryland regions seek genuine engagement yet engage opportunistically when seasons are conducive and when tangible outcomes are visible. © 2011 The Authors. Geographical Research © 2011 Institute of Australian Geographers.
Resumo:
A microgrid may contain a large number of distributed generators (DGs). These DGs can be either inertial or non-inertial, either dispatchable or non-dispatchable. Moreover, the DGs may operate in plug and play fashion. The combination of these various types of operation makes the microgrid control a challenging task, especially when the microgrid operates in an autonomous mode. In this paper, a new control algorithm for converter interfaced (dispatchable) DG is proposed which facilitates smooth operation in a hybrid microgrid containing inertial and non-inertial DGs. The control algorithm works satisfactorily even when some of the DGs operate in plug and play mode. The proposed strategy is validated through PSCAD simulation studies.
Resumo:
Public engagement is a defining feature of collaborative approaches to environmental management (Petts 2006, Whelan and Oliver 2005). Public engagement in this context is focused on incorporating residents and communities of interest in activities like ecological restoration, catchment management, and environmental conservation in a wide range of situations (Nelson and Pettit 2004, Petts 2007). Some authors consider public engagement to be a sign of healthy democratic functioning in society (Skocpol and Fiorina 1999). Others draw attention to overcoming widely noted practical limitations of top-down mechanisms, emphasising that public engagement results in programs being implemented more effectively (Broderick 2005, Leach et al. 1999).
Resumo:
Introduction In a connected world youth are participating in digital content creating communities. This paper introduces a description of teens' information practices in digital content creating and sharing communities. Method The research design was a constructivist grounded theory methodology. Seventeen interviews with eleven teens were collected and observation of their digital communities occurred over a two-year period. Analysis The data were analysed iteratively to describe teens' interactions with information through open and then focused coding. Emergent categories were shared with participants to confirm conceptual categories. Focused coding provided connections between conceptual categories resulting in the theory, which was also shared with participants for feedback. Results The paper posits a substantive theory of teens' information practices as they create and share content. It highlights that teens engage in the information actions of accessing, evaluating, and using information. They experienced information in five ways: participation, information, collaboration, process, and artefact. The intersection of enacting information actions and experiences of information resulted in five information practices: learning community, negotiating aesthetic, negotiating control, negotiating capacity, and representing knowledge. Conclusion This study contributes to our understanding of youth information actions, experiences, and practices. Further research into these communities might indicate what information practices are foundational to digital communities.
Resumo:
This paper demonstrates power management and control of DERs in an autonomous MG. The paper focuses on the control and performance of converter-interfaced DERs in voltage controlled mode. Several case studies are considered for a MG based on the different types of loads supplied by the MG (i.e. balanced three-phase, unbalanced, single-phase and harmonic loads). DERs are controlled by adjusting the voltage magnitude and angle in their converter output through droop control, in a decentralized concept. Based on this control method, DERs can successfully share the total demand of the MG in the presence of any type of loads. This includes proper total power sharing, unbalanced power sharing as well as harmonic power sharing, depending on the load types. The efficacy of the proposed power control, sharing and management among DERs in a microgrid is validated through extensive simulation studies using PSCAD/EMTDC.
Resumo:
Tacit knowledge sharing amongst physicians is known to have a significant impact on the quality of medical decisions. This thesis posits that social media can provide new opportunities for tacit knowledge sharing amongst physicians, and demonstrates this by presenting findings from a review of relevant literature and a qualitative survey conducted with physicians. Using thematic analysis, the study revealed five major themes and over twenty sub-themes as potential contributions of social media to tacit knowledge flow amongst physicians.
Resumo:
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
User evaluations using paper prototypes commonly lack social context. The Group simulation technique described in this paper offers a solution to this problem. The study introduces an early-phase participatory design technique targeted for small groups. The proposed technique is used for evaluating an interface, which enables group work in photo collection creation. Three groups of four users, 12 in total, took part in a simulation session where they tested a low-fidelity design concept that included their own personal photo content from an event that their group attended together. The users’ own content was used to evoke natural experiences. Our results indicate that the technique helped users to naturally engage with the prototype in the session. The technique is suggested to be suitable for evaluating other early-phase concepts and to guide design solutions, especially with the concepts that include users’ personal content and enable content sharing.