342 resultados para part time work
Resumo:
The construction industry should be a priority to all governments because it impacts economically and socially on all citizens. Sector turnover in industrialised economies typically averages 8-12% of GDP. Further, construction is critical to economic growth. Recent Australian studies estimate that a 10% gain in efficiency in construction translates to a 2.5% increase in GDP Inefficiencies in the Australian construction industry have been identified by a number of recent studies modelling the building process. They have identified potential savings in time of between 25% and 40% by reducing non-value added steps in the process. A culture of reform is now emerging in the industry – one in which alternate forms of project delivery are being trialed. Government and industry have identified Alliance Contracting as a means to increase efficiency in the construction industry as part of a new innovative procurement environment. Alliance contracting requires parties to form relationships and work cooperatively to provide a more complete service. This is a significant cultural change for the construction industry, with its well-known adversarial record in traditional contracting. Alliance contracts offer enormous potential benefits, but the Australian construction industry needs to develop new skills to effectively participate in the new relationship environment. This paper describes a collaborative project identifying skill needs for clients and construction professionals to more effectively participate in an increasingly sophisticated international procurement environment. The aim of identifying these skill needs is to assist industry, government, and skill developers to prepare the Australian construction workforce for the future. The collaborating Australian team has been fortunate to secure the Australian National Museum in Canberra as its live case study. The Acton Peninsula Development is the first major building development in the world awarded on the basis of a joint alliance contract.
Resumo:
As part of a large study investigating indoor air in residential houses in Brisbane, Australia, the purpose of this work was to quantify indoor exposure to submicrometer particles and PM2.5 for the inhabitants of 14 houses. Particle concentrations were measured simultaneously for more than 48 hours in the kitchens of all the houses by using a condensation particle counter (CPC) and a photometer (DustTrak). The occupants of the houses were asked to fill in a diary, noting the time and duration of any activity occurring throughout the house during measurement, as well as their presence or absence from home. From the time series concentration data and the information about indoor activities, exposure to the inhabitants of the houses was calculated for the entire time they spent at home as well as during indoor activities resulting in particle generation. The results show that the highest median concentration level occurred during cooking periods for both particle number concentration (47.5´103 particles cm-3) and PM2.5 concentration (13.4 mg m-3). The highest residential exposure period was the sleeping period for both particle number exposure (31%) and PM2.5 exposure (45.6%). The percentage of the average residential particle exposure level in total 24h particle exposure level was approximating 70% for both particle number and PM2.5 exposure.
Resumo:
Background: Noise is a significant barrier to sleep for acute care hospital patients, and sleep has been shown to be therapeutic for health, healing and recovery. Scheduled quiet time interventions to promote inpatient rest and sleep have been successfully trialled in critical care but not in acute care settings. Objectives: The study aim was to evaluate as cheduled quiet time intervention in an acute care setting. The study measured the effect of a scheduled quiet time on noise levels, inpatients’ rest and sleep behaviour, and wellbeing. The study also examined the impact of the intervention on patients’, visitors’ and health professionals’ satisfaction, and organisational functioning. Design: The study was a multi-centred non-randomised parallel group trial. Settings: The research was conducted in the acute orthopaedic wards of two major urban public hospitals in Brisbane, Australia. Participants: All patientsadmitted to the two wards in the5-month period of the study were invited to participate, withafinalsample of 299 participants recruited. This sample produced an effect size of 0.89 for an increase in the number of patients asleep during the quiet time. Methods: Demographic data were collected to enable comparison between groups. Data for noise level, sleep status, sleepiness and well being were collected using previously validated instruments: a Castle Model 824 digital sound level indicator; a three point sleep status scale; the Epworth Sleepiness Scale; and the SF12 V2 questionnaire. The staff, patient and visitor surveys on the experimental ward were adapted from published instruments. Results: Significant differences were found between the two groups in mean decibel level and numbers of patients awake and asleep. The difference in mean measured noise levels between the two environments corresponded to a ‘perceived’ difference of 2 to 1. There were significant correlations between average decibel level and number of patients awake and asleep in the experimental group, and between average decibel level and number of patients awake in the control group. Overall, patients, visitors and health professionals were satisfied with the quiet time intervention. Conclusions: The findings show that a quiet time intervention on an acute care hospital ward can affect noise level and patient sleep/wake patterns during the intervention period. The overall strongly positive response from surveys suggests that scheduled quiet time would be a positively perceived intervention with therapeutic benefit.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Abstract Background Understanding spatio-temporal variation in malaria incidence provides a basis for effective disease control planning and monitoring. Methods Monthly surveillance data between 1991 and 2006 for Plasmodium vivax and Plasmodium falciparum malaria across 128 counties were assembled for Yunnan, a province of China with one of the highest burdens of malaria. County-level Bayesian Poisson regression models of incidence were constructed, with effects for rainfall, maximum temperature and temporal trend. The model also allowed for spatial variation in county-level incidence and temporal trend, and dependence between incidence in June–September and the preceding January–February. Results Models revealed strong associations between malaria incidence and both rainfall and maximum temperature. There was a significant association between incidence in June–September and the preceding January–February. Raw standardised morbidity ratios showed a high incidence in some counties bordering Myanmar, Laos and Vietnam, and counties in the Red River valley. Clusters of counties in south-western and northern Yunnan were identified that had high incidence not explained by climate. The overall trend in incidence decreased, but there was significant variation between counties. Conclusion Dependence between incidence in summer and the preceding January–February suggests a role of intrinsic host-pathogen dynamics. Incidence during the summer peak might be predictable based on incidence in January–February, facilitating malaria control planning, scaled months in advance to the magnitude of the summer malaria burden. Heterogeneities in county-level temporal trends suggest that reductions in the burden of malaria have been unevenly distributed throughout the province.
Resumo:
Research into cyberbullying in Australia has been slow. This is partly because rigorous research takes time, both to conduct, to analyse and to publish. In addition, Australian governments and other decision makers did not realise that cyberbullying was happening until there was greater media attention to the problem in the last few years. This meant that there was no serious research money allocated to cyberbullying research in Australia until about two years ago. In addition, initial research has mainly looked at how many students have been cyberbullied and what were the consequences. As far as I know there is only one large research project which is looking at what programs actually work to prevent and/or intervene in cyberbullying in Australia and that will take time to ascertain. However, our society wants quick fixes and they want a quick fix for cyberbullying.
Resumo:
Isolation of a faulted segment, from either side of a fault, in a radial feeder that has several converter interfaced DGs is a challenging task when current sensing protective devices are employed. The protective device, even if it senses a downstream fault, may not operate if fault current level is low due to the current limiting operation of converters. In this paper, a new inverse type relay is introduced based on line admittance measurement to protect a distribution network, which has several converter interfaced DGs. The basic operation of this relay, its grading and reach settings are explained. Moreover a method is proposed to compensate the fault resistance such that the relay operation under this condition is reliable. Then designed relay performances are evaluated in a radial distribution network. The results are validated through PSCAD/EMTDC simulation and MATLAB calculations.
Resumo:
The requirement to monitor the rapid pace of environmental change due to global warming and to human development is producing large volumes of data but placing much stress on the capacity of ecologists to store, analyse and visualise that data. To date, much of the data has been provided by low level sensors monitoring soil moisture, dissolved nutrients, light intensity, gas composition and the like. However, a significant part of an ecologist’s work is to obtain information about species diversity, distributions and relationships. This task typically requires the physical presence of an ecologist in the field, listening and watching for species of interest. It is an extremely difficult task to automate because of the higher order difficulties in bandwidth, data management and intelligent analysis if one wishes to emulate the highly trained eyes and ears of an ecologist. This paper is concerned with just one part of the bigger challenge of environmental monitoring – the acquisition and analysis of acoustic recordings of the environment. Our intention is to provide helpful tools to ecologists – tools that apply information technologies and computational technologies to all aspects of the acoustic environment. The on-line system which we are building in conjunction with ecologists offers an integrated approach to recording, data management and analysis. The ecologists we work with have different requirements and therefore we have adopted the toolbox approach, that is, we offer a number of different web services that can be concatenated according to need. In particular, one group of ecologists is concerned with identifying the presence or absence of species and their distributions in time and space. Another group, motivated by legislative requirements for measuring habitat condition, are interested in summary indices of environmental health. In both case, the key issues are scalability and automation.
Resumo:
Collaborative networks have come to form a large part of the public sector’s strategy to address ongoing and often complex social problems. The relational power of networks, with its emphasis on trust, reciprocity and mutuality provides the mechanism to integrate previously dispersed and even competitive entities into a collective venture(Agranoff 2003; Agranoff and McGuire 2003; Mandell 1994; Mandell and Harrington 1999). It is argued that the refocusing of a single body of effort to a collective contributes to reducing duplication and overlap of services, maximizes increasingly scarce resources and contributes to solving intractable or 'wicked’problems (Clarke and Stewart 1997). Given the current proliferation of collaborative networks and the fact that they are likely to continue for some time, concerns with the management and leadership of such arrangements for optimal outcomes are increasingly relevant. This is especially important for public sector managers who are used to working in a top-down, hierarchical manner. While the management of networks (Agranoff and McGuire 2001, 2003), including collaborative or complex networks (Kickert et al. 1997; Koppenjan and Klijn 2004), has been the subject of considerable attention, there has been much less explicit discussion on leadership approaches in this context. It is argued in this chapter that the traditional use of the terms ‘leader’ or ‘leadership’ does not apply to collaborative networks. There are no ‘followers’ in collaborative networks or supervisor-subordinate relations. Instead there are equal, horizontal relationships that are focused on delivering systems change. In this way the emergent organizational forms such as collaborative networks challenge older models of leadership. However despite the questionable relevance of old leadership styles to the contemporary work environment, no clear alternative has come along to take its place.
Resumo:
Electronic Health Record (EHR) systems are being introduced to overcome the limitations associated with paper-based and isolated Electronic Medical Record (EMR) systems. This is accomplished by aggregating medical data and consolidating them in one digital repository. Though an EHR system provides obvious functional benefits, there is a growing concern about the privacy and reliability (trustworthiness) of Electronic Health Records. Security requirements such as confidentiality, integrity, and availability can be satisfied by traditional hard security mechanisms. However, measuring data trustworthiness from the perspective of data entry is an issue that cannot be solved with traditional mechanisms, especially since degrees of trust change over time. In this paper, we introduce a Time-variant Medical Data Trustworthiness (TMDT) assessment model to evaluate the trustworthiness of medical data by evaluating the trustworthiness of its sources, namely the healthcare organisation where the data was created and the medical practitioner who diagnosed the patient and authorised entry of this data into the patient’s medical record, with respect to a certain period of time. The result can then be used by the EHR system to manipulate health record metadata to alert medical practitioners relying on the information to possible reliability problems.
Resumo:
Introduction: Work engagement is a recent application of positive psychology and refers to a positive, fulfilling, work-related state of mind characterized by vigor, dedication and absorption. Despite theoretical assumptions, there is little published research on work engagement, due primarily to its recent emergence as a psychological construct. Furthermore, examining work engagement among high-stress occupations, such as police, is useful because police officers are generally characterized as having a high level of work engagement. Previous research has identified job resources (e.g. social support) as antecedents of work engagement. However detailed evaluation of job demands as an antecedent of work engagement within high-stress occupations has been scarce. Thus our second aim was to test job demands (i.e. monitoring demands and problem-solving demands) and job resources (i.e. time control, method control, supervisory support, colleague support, and friend and family support) as antecedents of work engagement among police officers. Method: Data were collected via a self-report online survey from one Australian state police service (n = 1,419). Due to the high number of hypothesized antecedent variables, hierarchical multiple regression analysis was employed rather than structural equation modelling. Results: Work engagement reported by police officers was high. Female officers had significantly higher levels of work engagement than male officers, while officers at mid-level ranks (sergeant) reported the lowest levels of work engagement. Job resources (method control, supervisor support and colleague support) were significant antecedents of three dimensions of work engagement. Only monitoring demands were significant antecedent of the absorption. Conclusion: Having healthy and engaged police officers is important for community security and economic growth. This study identified some common factors which influence work engagement experienced by police officers. However, we also note that excessive work engagement can yield negative outcomes such as psychological distress.
Resumo:
Objective: To define characteristics of vehicle crashes occurring on rural private property in north Queensland with an exploration of associated risk factors. Design: Descriptive analysis of private property crash data collected by the Rural and Remote Road Safety Study. Setting: Rural and remote north Queensland. Participants: A total of 305 vehicle controllers aged 16 years or over hospitalised at Atherton, Cairns, Mount Isa or Townsville for at least 24 hours as a result of a vehicle crash. Main outcome measure: A structured questionnaire completed by participants covering crash details, lifestyle and demographic characteristics, driving history, medical history, alcohol and drug use and attitudes to road use. Results: Overall, 27.9% of interviewees crashed on private property, with the highest proportion of private road crashes occurring in the North West Statistical Division (45%). Risk factors shown to be associated with private property crashes included male sex, riding off-road motorcycle or all-terrain vehicle, first-time driving at that site, lack of licence for vehicle type, recreational use and not wearing a helmet or seatbelt. Conclusions: Considerable trauma results from vehicle crashes on rural private property. These crashes are not included in most crash data sets, which are limited to public road crashes. Legislation and regulations applicable to private property vehicle use are largely focused on workplace health and safety, yet work-related crashes represent a minority of private property crashes in north Queensland.
Resumo:
The climatic conditions of tropical and subtropical regions within Australia present, at times, extreme risk of physical activity induced heat illness. Many administrators and teachers in school settings are aware of the general risks of heat related illness. In the absence of reliable information applied at the local level, there is a risk that inappropriate decisions may be made concerning school events that incorporate opportunities to be physically active. Such events may be prematurely cancelled resulting in the loss of necessary time for physical activity. Under high or extremely high risk conditions however, the absence of appropriate modifications or continuation could place the health of students, staff and other parties at risk. School staff and other key stakeholders should understand the mechanisms of escalating risk and be supported to undertake action to reduce the level of risk through appropriate policies, procedures, resources and action plans.
Resumo:
The full economic, cultural and environmental value of information produced or funded by the public sector can be realised through enabling greater access to and reuse of the information. To do this effectively it is necessary to describe and implement a policy framework that supports greater access and reuse among a distributed, online network of information suppliers and users. The objective of this study was to identify materials dealing with policies, principles and practices relating to information access and reuse in Australia and in other key jurisdictions internationally. Open Access Policies, Practices and Licensing: A review of the literature in Australia and selected jurisdictions sets out the findings of an extensive review of published materials dealing with policies, practices and legal issues relating to information access and reuse, with a particular focus on materials generated, held or funded by public sector bodies. The report was produced as part of the work program of the project “Enabling Real-Time Information Access in Both Urban and Regional Areas”, established within the Cooperative Research Centre for Spatial Information (CRCSI).
Resumo:
President’s Report Hello fellow AITPM members, First I would like on behalf of all AITPM members to send our condolences to all who have been affected by February’s tragic bushfires in regional Victoria, and deliver our best wishes to all of those involved in the rebuilding efforts. Over time I expect that the Victorian Government’s Royal Commission will analyse the circumstances and put forward a range of measures which will improve fire safety in vulnerable areas. As transport professionals it will be important for us to consider the findings and look to undertaking any recommendations that relate to the work we do. Not only in Victoria, but nationwide. In particular, the importance of logistics was highlighted following the fire events. Donors across Australia were this time requested to donate money rather than goods, presumably due in part to problems associated with the transport system coping with additional uncoordinated freight load, whilst being needed to support emergency management vehicle and managed freight movements. Notwithstanding, it was wonderful to see otherwise difficult to obtain goods, such as animal feed, being donated from far afield and transported in kind by trucking operators. As stated in last month’s Newsletter, AITPM made a direct cash donation to the Red Cross Bushfire Appeal immediately following the events, and a further donation to the Queensland Premier’s Disaster Relief Fund to support recovery after the North Queensland floods, which claimed seven lives. Again, we will need to monitor how the rebuilding effort unfolds particularly in regional Victoria and centres including Ingham in North Queensland, but I would urge all AITPM members who are in a position to support the restoration of the affected communities to play a part, particularly over time once the initial shock subsides and the steady job of rebuilding is underway. Onto lighter matters, AITPM’s flagship event, the 2009 AITPM National Conference, Traffic Beyond Tomorrow, being held in Adelaide from 5 to 7 August, is fast approaching. www.aitpm.com has all of the details about how to register, sponsor a booth, and so forth. We are looking forward to catching up with our conference “regulars” and meeting with new folks to AITPM, and Australian traffic and transport planning and management. Adelaide is one of my favourite places to visit and I’m looking forward to riding the light rail line extension through town and checking out progress on the road system development. Best regards all, Jon Bunker