817 resultados para person-centred systems
Resumo:
International Design Competition for Qatar Psychiatric Hospital. The scheme for the Al Wakra Respite and Recovery Centre delivers on an all-in attitude toward evidence-based design. It sets new benchmarks in so many ways: the way it allows excellent separation between patient cohorts without unnecessary or visible restrictions; the way it allows sharing of most of the clinical kit and spaces; the way services reticulation and facilities management takes place without compromising security and safety; the ways It abandons the institutional axioms that are still so ubiquitous elsewhere, so it can appear as the friendly, welcoming and wholesome; the way it allows incredible flexibility to allow changes or flexion on the fly; the way it has such ‘good bones’ for more structural changes as the future unfolds. But most importantly, the scheme will be exemplary in the way the building itself plays a role in promoting the recovery and mental well-being of its residents. Like no other, the Centre will rise to the challenges of supporting and inspiring an exemplary mental health service and promote the well-being of the patients. The 160 bed scheme allows for 43,000m2 of landscape, packed with wholesome things to do and experience. The Aspire zone even has stables and a falconry, both to celebrate the love that Qatari people have for horses and birds.
Resumo:
The foundation of mental health nursing has historically been grounded in an interpersonal, person-centred process of health care, yet recent evidence suggests that the interactional work of mental health nursing is being eroded. Literature emphasises the importance of person-centred care on consumer outcomes, a model reliant upon the intimate engagement of nurses and consumers. Yet, the arrival of medical interventions in psychiatry has diverted nursing work from the therapeutic nursing role to task-based roles delegated by medicine, distancing nurses from consumers. This study used work sampling methodology to observe the proportion of time nurses working in an inpatient mental health setting engage in specific activities. The observations of this study determined that nurses' time is accounted for 31.65% in direct care, 51.63% in indirect care and 16.71% in service related activities.
Resumo:
Background Children’s sleep problems and self-regulation problems have been independently associated with poorer adjustment to school, but there has been limited exploration of longitudinal early childhood profiles that include both indicators. Aims This study explores the normative developmental pathway for sleep problems and self-regulation across early childhood, and investigates whether departure from the normative pathway is associated with later social-emotional adjustment to school. Sample This study involved 2880 children participating in the Growing Up in Australia: The Longitudinal Study of Australian Children (LSAC) – Infant Cohort from Wave 1 (0-1 years) to Wave 4 (6-7 years). Method Mothers reported on children’s sleep problems, emotional, and attentional self-regulation at three time points from birth to 5 years. Teachers reported on children’s social-emotional adjustment to school at 6-7 years. Latent profile analysis was used to establish person-centred longitudinal profiles. Results Three profiles were found. The normative profile (69%) had consistently average or higher emotional and attentional regulation scores and sleep problems that steadily reduced from birth to 5. The remaining 31% of children were members of two non-normative self-regulation profiles, both characterised by escalating sleep problems across early childhood and below mean self-regulation. Non-normative group membership was associated with higher teacher-reported hyperactivity and emotional problems, and poorer classroom self-regulation and prosocial skills. Conclusion Early childhood profiles of self-regulation that include sleep problems offer a way to identify children at risk of poor school adjustment. Children with escalating early childhood sleep problems should be considered an important target group for school transition interventions.
Resumo:
INTRODUCTION AND BACKGROUND: This presentation draws on a body of work assessing cultural safety's potential to generate change in mental health nursing research (Cox and Simpson 2015), in education and in clinical practice (Cox and Taua 2013, 2016; Happell, Cowin, Roper, Lakeman & Cox 2013). It presents evidence to suggest that cultural safety could resolve the conceptual confusion surrounding culture and diversity in nursing curricular, in clinical and in research practice. The history and nature of mental health work recommend cultural safety to focus attention on diversity, power imbalance, racism, cultural dominance, and structural inequality, identified as barriers and tensions in clinical practice and in service user participation. Cultural safety gives mental health nursing a well theorized and articulated model, which is evolving to improve practice into the future. DESCRIPTION: This work involved an immersion in the literature on cultural safety and the Service User Research movement. It draws on 5 months' work with a service users' research group in the UK and reflections on 9 years of cultural safety teaching. POLICY/PRACTICE CHANGE: This work provokes a crucial change of emphasis from locating the source of issues in the diversity of people to locating it in how society responds to diversity: a change from individualistic to systemic concerns. IMPLICATIONS FOR MENTAL HEALTH NURSING: Cultural safety in clinical practice, education, and research is specifically concerned with awareness of the impact of systemic workplace cultures and with staff cultural self-awareness to bring about cultural change and person-centred care of individuals' unique needs and aspirations within their life context.
A simplified invariant line analysis for face-centred cubic/body-centred cubic precipitation systems
Resumo:
This research work analyses techniques for implementing a cell-centred finite-volume time-domain (ccFV-TD) computational methodology for the purpose of studying microwave heating. Various state-of-the-art spatial and temporal discretisation methods employed to solve Maxwell's equations on multidimensional structured grid networks are investigated, and the dispersive and dissipative errors inherent in those techniques examined. Both staggered and unstaggered grid approaches are considered. Upwind schemes using a Riemann solver and intensity vector splitting are studied and evaluated. Staggered and unstaggered Leapfrog and Runge-Kutta time integration methods are analysed in terms of phase and amplitude error to identify which method is the most accurate and efficient for simulating microwave heating processes. The implementation and migration of typical electromagnetic boundary conditions. from staggered in space to cell-centred approaches also is deliberated. In particular, an existing perfectly matched layer absorbing boundary methodology is adapted to formulate a new cell-centred boundary implementation for the ccFV-TD solvers. Finally for microwave heating purposes, a comparison of analytical and numerical results for standard case studies in rectangular waveguides allows the accuracy of the developed methods to be assessed.
Resumo:
An airport is one of the largest and most complex systems in modern society. Observational field studies have been conducted to investigate passenger experiences in, and interactions within, an international airport. Based on these studies, this paper discusses how activities mediate people’s experiences in the airport. For example, moving through the security screening process is discussed from both passenger and staff perspectives. The applied coding scheme ensured research rigor. The findings illustrate that passenger activities are complex and shared, and only partially supported by current terminal design. Thus, this research has the potential to impact on airport design to facilitate passenger flow through airport precincts.
Resumo:
Surveillance systems such as object tracking and abandoned object detection systems typically rely on a single modality of colour video for their input. These systems work well in controlled conditions but often fail when low lighting, shadowing, smoke, dust or unstable backgrounds are present, or when the objects of interest are a similar colour to the background. Thermal images are not affected by lighting changes or shadowing, and are not overtly affected by smoke, dust or unstable backgrounds. However, thermal images lack colour information which makes distinguishing between different people or objects of interest within the same scene difficult. ----- By using modalities from both the visible and thermal infrared spectra, we are able to obtain more information from a scene and overcome the problems associated with using either modality individually. We evaluate four approaches for fusing visual and thermal images for use in a person tracking system (two early fusion methods, one mid fusion and one late fusion method), in order to determine the most appropriate method for fusing multiple modalities. We also evaluate two of these approaches for use in abandoned object detection, and propose an abandoned object detection routine that utilises multiple modalities. To aid in the tracking and fusion of the modalities we propose a modified condensation filter that can dynamically change the particle count and features used according to the needs of the system. ----- We compare tracking and abandoned object detection performance for the proposed fusion schemes and the visual and thermal domains on their own. Testing is conducted using the OTCBVS database to evaluate object tracking, and data captured in-house to evaluate the abandoned object detection. Our results show that significant improvement can be achieved, and that a middle fusion scheme is most effective.
Resumo:
This paper demonstrates the application of the reliability-centred maintenance (RCM) process to analyse and develop preventive maintenance tasks for electric multiple units (EMU) in the East Rail of the Kowloon-Canton Railway Corporation (KCRC). Two systems, the 25 kV electrical power supply and the air-conditioning system of the EMU, have been chosen for the study. RCM approach on the two systems is delineated step by step in the paper. This study confirms the feasibility and effectiveness of RCM applications on the maintenance of electric trains.
Resumo:
In automatic facial expression detection, very accurate registration is desired which can be achieved via a deformable model approach where a dense mesh of 60-70 points on the face is used, such as an active appearance model (AAM). However, for applications where manually labeling frames is prohibitive, AAMs do not work well as they do not generalize well to unseen subjects. As such, a more coarse approach is taken for person-independent facial expression detection, where just a couple of key features (such as face and eyes) are tracked using a Viola-Jones type approach. The tracked image is normally post-processed to encode for shift and illumination invariance using a linear bank of filters. Recently, it was shown that this preprocessing step is of no benefit when close to ideal registration has been obtained. In this paper, we present a system based on the Constrained Local Model (CLM) which is a generic or person-independent face alignment algorithm which gains high accuracy. We show these results against the LBP feature extraction on the CK+ and GEMEP datasets.
Resumo:
In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.
Resumo:
In this paper we highlight how current approaches to design for disability have failed to consider the emotional needs not only of those with disabilities but their families and other carers as well. In conjunction with this, we demonstrate through a review of literature the significance of the house, the home and home in the support and growth of the person as a whole in association with their loved ones, and the potential inequity that arises when the emotional and holistic dimensions of 'being' are neglected. With a growing trend nationally and internationally away from group and shared housing, a greater focus on the family and their home is required. However, as research has shown, home for families where a family member has a disability is not necessarily a positive experience; it can be a source of stress, work, conflict and burden, arousing emotions ranging from loss of control through guilt. As proposed in the paper, consideration of the negative as well as positive emotions demands exploration of the 'middle ground' between institutions and home-based care models. This paper outlines the beginning of one such exploration.
Resumo:
This thesis conceptualises Use for IS (Information Systems) success. While Use in this study describes the extent to which an IS is incorporated into the user’s processes or tasks, success of an IS is the measure of the degree to which the person using the system is better off. For IS success, the conceptualisation of Use offers new perspectives on describing and measuring Use. We test the philosophies of the conceptualisation using empirical evidence in an Enterprise Systems (ES) context. Results from the empirical analysis contribute insights to the existing body of knowledge on the role of Use and demonstrate Use as an important factor and measure of IS success. System Use is a central theme in IS research. For instance, Use is regarded as an important dimension of IS success. Despite its recognition, the Use dimension of IS success reportedly suffers from an all too simplistic definition, misconception, poor specification of its complex nature, and an inadequacy of measurement approaches (Bokhari 2005; DeLone and McLean 2003; Zigurs 1993). Given the above, Burton-Jones and Straub (2006) urge scholars to revisit the concept of system Use, consider a stronger theoretical treatment, and submit the construct to further validation in its intended nomological net. On those considerations, this study re-conceptualises Use for IS success. The new conceptualisation adopts a work-process system-centric lens and draws upon the characteristics of modern system types, key user groups and their information needs, and the incorporation of IS in work processes. With these characteristics, the definition of Use and how it may be measured is systematically established. Use is conceptualised as a second-order measurement construct determined by three sub-dimensions: attitude of its users, depth, and amount of Use. The construct is positioned in a modified IS success research model, in an attempt to demonstrate its central role in determining IS success in an ES setting. A two-stage mixed-methods research design—incorporating a sequential explanatory strategy—was adopted to collect empirical data and to test the research model. The first empirical investigation involved an experiment and a survey of ES end users at a leading tertiary education institute in Australia. The second, a qualitative investigation, involved a series of interviews with real-world operational managers in large Indian private-sector companies to canvass their day-to-day experiences with ES. The research strategy adopted has a stronger quantitative leaning. The survey analysis results demonstrate the aptness of Use as an antecedent and a consequence of IS success, and furthermore, as a mediator between the quality of IS and the impacts of IS on individuals. Qualitative data analysis on the other hand, is used to derive a framework for classifying the diversity of ES Use behaviour. The qualitative results establish that workers Use IS in their context to orientate, negotiate, or innovate. The implications are twofold. For research, this study contributes to cumulative IS success knowledge an approach for defining, contextualising, measuring, and validating Use. For practice, research findings not only provide insights for educators when incorporating ES for higher education, but also demonstrate how operational managers incorporate ES into their work practices. Research findings leave the way open for future, larger-scale research into how industry practitioners interact with an ES to complete their work in varied organisational environments.
Resumo:
CCTV and surveillance networks are increasingly being used for operational as well as security tasks. One emerging area of technology that lends itself to operational analytics is soft biometrics. Soft biometrics can be used to describe a person and detect them throughout a sparse multi-camera network. This enables them to be used to perform tasks such as determining the time taken to get from point to point, and the paths taken through an environment by detecting and matching people across disjoint views. However, in a busy environment where there are 100's if not 1000's of people such as an airport, attempting to monitor everyone is highly unrealistic. In this paper we propose an average soft biometric, that can be used to identity people who look distinct, and are thus suitable for monitoring through a large, sparse camera network. We demonstrate how an average soft biometric can be used to identify unique people to calculate operational measures such as the time taken to travel from point to point.