13 resultados para YORKSHIRE FOG

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is currently no consensus as to how “acceptable risk” should be defined in emergency service response. Attempts to address this have relied upon the assumption that a probabilistic model of risk can be calculated and that acceptable levels of risk can be determined. Examples of this process can be seen in a number of emergency services, e.g. dynamic risk assessment utilised by a number of fire services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter considers the political, social and technological features contributing to the rise of distance education in 20th Century Australia and to its dissolution in the early 21st Century. The discussion considers both international trends and influences, and particularly the Australian experiences that created the foggy mélange: external studies, extension studies, off-campus studies, open campus, open learning, flexible learning, flexible delivery, distance learning, distance education, correspondence learning, online learning, e-learning etc. The fogginess of the terminology reflects the ‘buzz-word’ politics of the turn-of-the-century governments, their bureaucracies and bureaucratese, and of the commercial world, its marketers and advertising slogans.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud services to smart things face latency and intermittent connectivity issues. Fog devices are positioned between cloud and smart devices. Their high speed Internet connection to the cloud, and physical proximity to users, enable real time applications and location based services, and mobility support. Cisco promoted fog computing concept in the areas of smart grid, connected vehicles and wireless sensor and actuator networks. This survey article expands this concept to the decentralized smart building control, recognizes cloudlets as special case of fog computing, and relates it to the software defined networks (SDN) scenarios. Our literature review identifies a handful number of articles. Cooperative data scheduling and adaptive traffic light problems in SDN based vehicular networks, and demand response management in macro station and micro-grid based smart grids are discussed. Security, privacy and trust issues, control information overhead and network control policies do not seem to be studied so far within the fog computing concept.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Distinguished from other reviewing work of Fog computing, this paper further discloses the security and privacy issues according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of system security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device. In addition, we discuss the authentication and authorization techniques that can be used in Fog computing. An example of authentication techniques is introduced to address the security scenario where the connection between Fog and Cloud is fragile.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. In this article, we elaborate the motivation and advantages of Fog computing, and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state-of-the-art of Fog computing and similar work under the same umbrella. Security and privacy issues are further disclosed according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fog computing, characterized by extending cloud computing to the edge of the network, has recently received considerable attention. The fog is not a substitute but a powerful complement to the cloud. It is worthy of studying the interplay and cooperation between the edge (fog) and the core (cloud). To address this issue, we study the tradeoff between power consumption and delay in a cloud-fog computing system. Specifically, we first mathematically formulate the workload allocation problem. After that, we develop an approximate solution to decompose the primal problem into three subproblems of corresponding subsystems, which can be independently solved. Finally, based on extensive simulations and numerical results, we show that by sacrificing modest computation resources to save communication bandwidth and reduce transmission latency, fog computing can significantly improve the performance of cloud computing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is widely known that the so-called Cooks' Cottage in Fitzroy Gardens, relocated from Yorkshire to Melbourne in 1934, was never inhabited by Captain James Cook. Yet a subliminal nationalism, sustained by the ancient traditions of contagious magic, feeds the conviction that the dwelling must be directly connected to Australia's foundation hero — a relic that the great man touched — or else it is meaningless. This paper tracks a sequence of managerial–interpretive strategies derived from a chronology of knowledge systems to make meanings at the cottage. It introduces evidence of the original shape of the building in its Great Ayton location, and observes the consequences on management and interpretation of an older demolition and consequent rebuilding of only half the cottage in Melbourne. Much turns on changing ideas about authenticity, as management strategies fail to engage the popular taste for a hero via the magic of faith. The result is a set of opposing principles in presenting the cottage: the role of the historical record as it has enlarged, and the desires of visitors who expect a simple connection between myth and materiality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A sound effect of a foggy and stormy ambiance at sea with a distant fog horn.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peter Booth`s apocalyptic Burning City and Head stemmed from wartime experiences in Britain. Employing Friedrich`s Wanderer in the Sea of Fog as a portent of Germany`s imperialism, my painting collapses vision into nightmare, drawing in German artists Beuys and Rauch, caught up in a horrendous and inescapable legacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Organisations need to systematically identify contributory factors (or causes) which impact on patient safety in order to effectively learn from error. Investigations of error have tended to focus on taking a reactive approach to learning from error, mainly relying on incident-reporting systems. Existing frameworks which aim to identify latent causes of error rely almost exclusively on evidence from non-healthcare settings. In view of this, the Yorkshire Contributory Factors Framework (YCFF) was developed in the hospital setting. Eighty-five percent of healthcare contacts occur in primary care. As a result, this review will build on the work that produced the YCFF, by examining the empirical evidence that relates to the contributory factors of error within a primary care setting. METHODS/DESIGN: Four electronic bibliographic databases will be searched: MEDLINE, Embase, PsycInfo and CINAHL. The database search will be supplemented by additional search methodologies including citation searching and snowballing strategies which include reviewing reference lists and reviewing relevant journal table of contents, that is, BMJ Quality and Safety. Our search strategy will include search combinations of three key blocks of terms. Studies will not be excluded based on design. Included studies will be empirical studies conducted in a primary care setting. They will include some description of the factors that contribute to patient safety. One reviewer (SG) will screen all the titles and abstracts, whilst a second reviewer will screen 50% of the abstracts. Two reviewers (SG and AH) will perform study selection, quality assessment and data extraction using standard forms. Disagreements will be resolved through discussion or third party adjudication. Data to be collected include study characteristics (year, objective, research method, setting, country), participant characteristics (number, age, gender, diagnoses), patient safety incident type and characteristics, practice characteristics and study outcomes. DISCUSSION: The review will summarise the literature relating to contributory factors to patient safety incidents in primary care. The findings from this review will provide an evidence-based contributory factors framework for use in the primary care setting. It will increase understanding of factors that contribute to patient safety incidents and ultimately improve quality of health care.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Patients can have an important role in reducing harm in primary-care settings. Learning from patient experience and feedback could improve patient safety. Evidence that captures patients' views of the various contributory factors to creating safe primary care is largely absent. The aim of this study was to address this evidence gap. METHODS: Four focus groups and eight semistructured interviews were conducted with 34 patients and carers from south-east Australia. Participants were asked to describe their experiences of primary care. Audio recordings were transcribed verbatim and specific factors that contribute to safety incidents were identified in the analysis using the Yorkshire Contributory Factors Framework (YCFF). Other factors emerging from the data were also ascertained and added to the analytical framework. RESULTS: Thirteen factors that contribute to safety incidents in primary care were ascertained. Five unique factors for the primary-care setting were discovered in conjunction with eight factors present in the YCFF from hospital settings. The five unique primary care contributing factors to safety incidents represented a range of levels within the primary-care system from local working conditions to the upstream organisational level and the external policy context. The 13 factors included communication, access, patient factors, external policy context, dignity and respect, primary-secondary interface, continuity of care, task performance, task characteristics, time in the consultation, safety culture, team factors and the physical environment. DISCUSSION: Patient and carer feedback of this type could help primary-care professionals better understand and identify potential safety concerns and make appropriate service improvements. The comprehensive range of factors identified provides the groundwork for developing tools that systematically capture the multiple contributory factors to patient safety.