982 resultados para Boyd, Alan
Resumo:
The literature identifies several models that describe inter-phase mass transfer, key to the emission process. While the emission process is complex and these models may be more or less successful at predicting mass transfer rates, they identify three key variables for a system involving a liquid and an air phase in contact with it: • A concentration (or partial pressure) gradient driving force; • The fluid dynamic characteristics within the liquid and air phases, and • The chemical properties of the individual components within the system. In three applied research projects conducted prior to this study, samples collected with two well-known sampling devices resulted in very different odour emission rates. It was not possible to adequately explain the differences observed. It appeared likely, however, that the sample collection device might have artefact effects on the emission of odorants, i.e. the sampling device appeared to have altered the mass transfer process. This raised the obvious question: Where two different emission rates are reported for a single source (differing only in the selection of sampling device), and a credible explanation for the difference in emission rate cannot be provided, which emission rate is correct? This research project aimed to identify the factors that determine odour emission rates, the impact that the characteristics of a sampling device may exert on the key mass transfer variables, and ultimately, the impact of the sampling device on the emission rate itself. To meet these objectives, a series of targeted reviews, and laboratory and field investigations, were conducted. Two widely-used, representative devices were chosen to investigate the influence of various parameters on the emission process. These investigations provided insight into the odour emission process generally, and the influence of the sampling device specifically.
Resumo:
Aim: This paper is a report of a study conducted to describe emergency department nurses' understanding and experiences of implementing discharge planning. ---------- Background: Discharge planning in the emergency department is an important issue because of increased healthcare costs and greater emphasis on continuity of care. When executed as a collaborative process involving a multi-disciplinary team with the patient and family, discharge planning provides continuity of care for patients, less demand on hospitals, improvement in community services and in the services of other healthcare organizations. ---------- Method: The qualitative approach of phenomenography was used in this study. Thirty-two emergency department nurses were recruited between July and September 2005. Semi-structured interviews were conducted. ---------- Findings: From interviewees' descriptions of implementing discharge planning, six categories were established: implementing discharge planning as 'getting rid of my patients', completing routines, being involved in patient education, professionally accountable practice, autonomous practice and demonstrating professional emergency department nursing care. The referential meaning of implementing discharge planning 'in the outcome space' was the professional commitment to emergency department provision of effective discharge services. ---------- Conclusion: The results of this research contribute to knowledge of emergency department nurses' experience in the implementation of the discharge planning process. Key requirements for the provision of manageable discharge services both in Taiwan and worldwide highlighted by this study include adequate workloads, sufficient time, clear policies and standards of discharge planning and enhancement of professional commitment.
Resumo:
Discharge planning has become increasingly important, with current trends toward shorter hospital stays, increased health care costs, and more community-based health services. Effective discharge planning ensures the safety and ongoing care for patients,1 and it also benefits health care providers and organizations. It results in shorter hospital stays, fewer readmissions, higher access rates to post-hospitalization services, greater patient satisfaction with the discharge, and improved quality of life and continuity of care.[2] and [3] All acute care patients and their caregivers require some degree of preparation for discharge home—education about their health status, risks, and treatment; help setting health goals and maintaining a good level of self-care; information about community resources; and follow-up appointments and referrals to appropriate community health providers. Inadequate preparation exposes the patient to unnecessary risks of recurrence or complications of the acute complaint, neglect of nonacute comorbidities, mismanagement and side effects of medication, disruption of family and social life, emotional distress, and financial loss.[2], [3] and [4] The result may be re-presentation to the emergency department. It is noteworthy that up to 18% of ED presentations are revisits within 72 hours of the original visit5; many of these are considered preventable.6 It is a primary responsibility of nurses to ensure that patients return to the community adequately prepared and with appropriate support in place. Up to 65% of ED patients are discharged home from the emergency department,7 and the characteristics of the emergency department and its patient population make the provision of a high standard of discharge planning uniquely difficult. In addition, discharge planning is neglected in contemporary emergency nursing—there are no monographs devoted to the subject, and there is little published research. In this article 3 issues are explored: the importance of emergency nurses’ participation in the discharge-planning process, impediments to their participation; and strategies to improve discharge planning in the emergency department.
Resumo:
As part of the first-ever World Journalism Education Congress (WJEC), attracting 440 journalism and mass communication educators and professionals from 44 countries, and held in Singapore on June 26-28, 2007, panelists Alan Knight, Cherian George, and Alex Gerlis presented a lively debate on “Who Is a Journalist.” Knight argued that Journalism paradigms are in transition. Bloggers are providing competition through their often eye-witness reports. Quality blogs are influencing journalism practices. Knight argued that journalists must adapt to and embrace the Internet. Gerlis proposed that when we now ask “Who Is a Journalist”, the answer is no longer anyone who is employed as journalist. The answer is that potentially, anyone and everyone can be a journalist. George warns again uncritically invoking professional standards as the dividing line that separates journalists from non-journalists
Resumo:
Virtual 3D models of long bones are increasingly being used for implant design and research applications. The current gold standard for the acquisition of such data is Computed Tomography (CT) scanning. Due to radiation exposure, CT is generally limited to the imaging of clinical cases and cadaver specimens. Magnetic Resonance Imaging (MRI) does not involve ionising radiation and therefore can be used to image selected healthy human volunteers for research purposes. The feasibility of MRI as alternative to CT for the acquisition of morphological bone data of the lower extremity has been demonstrated in recent studies [1, 2]. Some of the current limitations of MRI are long scanning times and difficulties with image segmentation in certain anatomical regions due to poor contrast between bone and surrounding muscle tissues. Higher field strength scanners promise to offer faster imaging times or better image quality. In this study image quality at 1.5T is quantitatively compared to images acquired at 3T. --------- The femora of five human volunteers were scanned using 1.5T and 3T MRI scanners from the same manufacturer (Siemens) with similar imaging protocols. A 3D flash sequence was used with TE = 4.66 ms, flip angle = 15° and voxel size = 0.5 × 0.5 × 1 mm. PA-Matrix and body matrix coils were used to cover the lower limb and pelvis respectively. Signal to noise ratio (SNR) [3] and contrast to noise ratio (CNR) [3] of the axial images from the proximal, shaft and distal regions were used to assess the quality of images from the 1.5T and 3T scanners. The SNR was calculated for the muscle and bone-marrow in the axial images. The CNR was calculated for the muscle to cortex and cortex to bone marrow interfaces, respectively. --------- Preliminary results (one volunteer) show that the SNR of muscle for the shaft and distal regions was higher in 3T images (11.65 and 17.60) than 1.5T images (8.12 and 8.11). For the proximal region the SNR of muscles was higher in 1.5T images (7.52) than 3T images (6.78). The SNR of bone marrow was slightly higher in 1.5T images for both proximal and shaft regions, while it was lower in the distal region compared to 3T images. The CNR between muscle and bone of all three regions was higher in 3T images (4.14, 6.55 and 12.99) than in 1.5T images (2.49, 3.25 and 9.89). The CNR between bone-marrow and bone was slightly higher in 1.5T images (4.87, 12.89 and 10.07) compared to 3T images (3.74, 10.83 and 10.15). These results show that the 3T images generated higher contrast between bone and the muscle tissue than the 1.5T images. It is expected that this improvement of image contrast will significantly reduce the time required for the mainly manual segmentation of the MR images. Future work will focus on optimizing the 3T imaging protocol for reducing chemical shift and susceptibility artifacts.
Resumo:
Technology and Nursing Practice explains and critically engages with the practice implications of technology for nursing. It takes a broad view of technology, covering not only health informatics, but also 'tele-nursing' and the use of equipment in clinical practice.
Resumo:
Technology and Nursing Practice explains and critically engages with the practice implications of technology for nursing. It takes a broad view of technology, covering not only health informatics, but also 'tele-nursing' and the use of equipment in clinical practice.
Resumo:
The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of operations in Fpk dominates the complexity of the operations that occur in the lower degree subfields. Consequently, full extension field operations have the greatest effect on the runtime of Miller’s algorithm. Many recent optimizations in the literature have focussed on improving the overall operation count by presenting new explicit formulas that reduce the number of subfield operations encountered throughout an iteration of Miller’s algorithm. Unfortunately, almost all of these improvements tend to suffer for larger embedding degrees where the expensive extension field operations far outweigh the operations in the smaller subfields. In this paper, we propose a new way of carrying out Miller’s algorithm that involves new explicit formulas which reduce the number of full extension field operations that occur in an iteration of the Miller loop, resulting in significant speed ups in most practical situations of between 5 and 30 percent.
Resumo:
Miller’s algorithm for computing pairings involves perform- ing multiplications between elements that belong to different finite fields. Namely, elements in the full extension field Fpk are multiplied by elements contained in proper subfields F pk/d , and by elements in the base field Fp . We show that significant speedups in pairing computations can be achieved by delaying these “mismatched” multiplications for an optimal number of iterations. Importantly, we show that our technique can be easily integrated into traditional pairing algorithms; implementers can exploit the computational savings herein by applying only minor changes to existing pairing code.
Resumo:
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.