928 resultados para Telephone survey
Resumo:
Objective To compare the level of agreement in results obtained from four physical activity (PA) measurement instruments that are in use in Australia and around the world. Methods 1,280 randomly selected participants answered two sets of PA questions by telephone. 428 answered the Active Australia (AA) and National Health Surveys, 427 answered the AA and CDC Behavioural Risk Factor Surveillance System surveys (BRFSS), and 425 answered the AA survey and the short International Physical Activity Questionnaire (IPAQ). Results Among the three pairs of survey items, the difference in mean total PA time was lowest when the AA and NHS items were asked (difference=24) (SE:17) minutes, compared with 144 (SE:21) mins for AA/BRFSS and 406 (SE:27) mins for AA/IPAQ). Correspondingly, prevalence estimates for 'sufficiently active' were similar for AA and NHS (56% and 55% respectively), but about 10% higher when BRFSS data were used, and about 26% higher when the IPAQ items were used, compared with estimates from the AA survey. Conclusions The findings clearly demonstrate that there are large differences in reported PA times and hence in prevalence estimates of 'sufficient activity' from these four measures. Implications It is important to consistently use the same survey for population monitoring purposes. As the AA survey has now been used three times in national surveys, its continued use for population surveys is recommended so that trend data ever a longer period of time can be established.
Resumo:
Background: Hospital disaster resilience can be defined as a hospital’s ability to resist, absorb, and respond to the shock of disasters while maintaining critical functions, and then to recover to its original state or adapt to a new one. This study aims to explore the status of resilience among tertiary hospitals in Shandong Province, China. Methods: A stratified random sample (n = 50) was derived from tertiary A, tertiary B, and tertiary C hospitals in Shandong Province, and was surveyed by questionnaire. Data on hospital characteristics and 8 key domains of hospital resilience were collected and analysed. Variables were binary, and analysed using descriptive statistics such as frequencies. Results: A response rate of 82% (n = 41) was attained. Factor analysis identified four key factors from eight domains which appear to reflect the overall level of disaster resilience. These were hospital safety, disaster management mechanisms, disaster resources and disaster medical care capability. The survey demonstrated that in regard to hospital safety, 93% had syndromic surveillance systems for infectious diseases and 68% had evaluated their safety standards. In regard to disaster management mechanisms, all had general plans, while only 20% had specific plans for individual hazards. 49% had a public communication protocol and 43.9% attended the local coordination meetings. In regard to disaster resources, 75.6% and 87.5% stockpiled emergency drugs and materials respectively, while less than a third (30%) had a signed Memorandum of Understanding with other hospitals to share these resources. Finally in regard to medical care, 66% could dispatch an on-site medical rescue team, but only 5% had a ‘portable hospital’ function and 36.6% and 12% of the hospitals could surge their beds and staff capacity respectively. The average beds surge capacity within 1 day was 13%. Conclusions: This study validated the broad utility of a framework for understanding and measuring the level of hospital resilience. The survey demonstrated considerable variability in disaster resilience arrangements of tertiary hospitals in Shandong province, and the difference between tertiary A hospitals and tertiary B hospitals was also identified in essential areas.
Resumo:
Following the derivation of amplitude equations through a new two-time-scale method [O'Malley, R. E., Jr. & Kirkinis, E (2010) A combined renormalization group-multiple scale method for singularly perturbed problems. Stud. Appl. Math. 124, 383-410], we show that a multi-scale method may often be preferable for solving singularly perturbed problems than the method of matched asymptotic expansions. We illustrate this approach with 10 singularly perturbed ordinary and partial differential equations. © 2011 Cambridge University Press.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.
Resumo:
In May/June 2014, the Program Committee Chairs of BPM’15 conducted a survey with present and past attendees and submitters to the BPM conference to gather feedback on the general perception of the conference. The survey is available at http://survey.qut.edu.au/f/180586/6bb1/. In particular, the survey included questions about the reputation of the conference, the reasons why survey participants submitted papers, whether they plan to submit to BPM’15, and soliciting input on a number of suggested changes and additions to the conduct of the conference series.
Resumo:
The exhibiton brought together a diverse group of works using an array of presentational strategies, which critically facilitate a dialogue across the material and conceptual aspects of my practice over 25 years. It focussed on my ongoing explorations into art as a model for research, as a site for intermediary exchange between different discursive forms and as a space to engage the politics of the everyday.
Resumo:
The work presented in this report is aimed to implement a cost-effective offline mission path planner for aerial inspection tasks of large linear infrastructures. Like most real-world optimisation problems, mission path planning involves a number of objectives which ideally should be minimised simultaneously. Understandably, the objectives of a practical optimisation problem are conflicting each other and the minimisation of one of them necessarily implies the impossibility to minimise the other ones. This leads to the need to find a set of optimal solutions for the problem; once such a set of available options is produced, the mission planning problem is reduced to a decision making problem for the mission specialists, who will choose the solution which best fit the requirements of the mission. The goal of this work is then to develop a Multi-Objective optimisation tool able to provide the mission specialists a set of optimal solutions for the inspection task amongst which the final trajectory will be chosen, given the environment data, the mission requirements and the definition of the objectives to minimise. All the possible optimal solutions of a Multi-Objective optimisation problem are said to form the Pareto-optimal front of the problem. For any of the Pareto-optimal solutions, it is impossible to improve one objective without worsening at least another one. Amongst a set of Pareto-optimal solutions, no solution is absolutely better than another and the final choice must be a trade-off of the objectives of the problem. Multi-Objective Evolutionary Algorithms (MOEAs) are recognised to be a convenient method for exploring the Pareto-optimal front of Multi-Objective optimization problems. Their efficiency is due to their parallelism architecture which allows to find several optimal solutions at each time
Resumo:
In this paper we propose a novel scheme for carrying out speaker diarization in an iterative manner. We aim to show that the information obtained through the first pass of speaker diarization can be reused to refine and improve the original diarization results. We call this technique speaker rediarization and demonstrate the practical application of our rediarization algorithm using a large archive of two-speaker telephone conversation recordings. We use the NIST 2008 SRE summed telephone corpora for evaluating our speaker rediarization system. This corpus contains recurring speaker identities across independent recording sessions that need to be linked across the entire corpus. We show that our speaker rediarization scheme can take advantage of inter-session speaker information, linked in the initial diarization pass, to achieve a 30% relative improvement over the original diarization error rate (DER) after only two iterations of rediarization.
Resumo:
Introduction and aims: Despite evidence that many Australian adolescents have considerable experience with various drug types, little is known about the extent to which adolescents use multiple substances. The aim of this study was to examine the degree of clustering of drug types within individuals, and the extent to which demographic and psychosocial predictors are related to cluster membership. Design and method: A sample of 1402 adolescents aged 12-17. years were extracted from the Australian 2007 National Drug Strategy Household Survey. Extracted data included lifetime use of 10 substances, gender, psychological distress, physical health, perceived peer substance use, socioeconomic disadvantage, and regionality. Latent class analysis was used to determine clusters, and multinomial logistic regression employed to examine predictors of cluster membership. Result: There were 3 latent classes. The great majority (79.6%) of adolescents used alcohol only, 18.3% were limited range multidrug users (encompassing alcohol, tobacco, and marijuana), and 2% were extended range multidrug users. Perceived peer drug use and psychological distress predicted limited and extended multiple drug use. Psychological distress was a more significant predictor of extended multidrug use compared to limited multidrug use. Discussion and conclusion: In the Australian school-based prevention setting, a very strong focus on alcohol use and the linkages between alcohol, tobacco and marijuana are warranted. Psychological distress may be an important target for screening and early intervention for adolescents who use multiple drugs.