882 resultados para temporart protection visa
Resumo:
This article provides an overview of the concept of vulnerability through the lens of the U.S. federal regulations for the protection of human subjects of research. General issues that emerge for nurse researchers working with regulated vulnerable populations are identified. Points of current controversy in the application of the regulations and current discourse about vulnerable groups are highlighted. Suggestions for negotiating the tension between federally regulated human subject requirements and the realities of research with vulnerable subjects are given. The limitations of the designation of vulnerable as a protection for human subjects will also be discussed.
Resumo:
Global climate change may induce accelerated soil organic matter (SOM) decomposition through increased soil temperature, and thus impact the C balance in soils. We hypothesized that compartmentalization of substrates and decomposers in the soil matrix would decrease SOM sensitivity to temperature. We tested our hypothesis with three short-term laboratory incubations with differing physical protection treatments conducted at different temperatures. Overall, CO2 efflux increased with temperature, but responses among physical protection treatments were not consistently different. Similar respiration quotient (Q(10)) values across physical protection treatments did not support our original hypothesis that the largest Q(10) values would be observed in the treatment with the least physical protection. Compartmentalization of substrates and decomposers is known to reduce the decomposability of otherwise labile material, but the hypothesized attenuation of temperature sensitivity was not detected, and thus the sensitivity is probably driven by the thermodynamics of biochemical reactions as expressed by Arrhenius-type equations.
Resumo:
The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.
Resumo:
Background: Sun exposure is the main source of vitamin D. Increasing scientific and media attention to the potential health benefits of sun exposure may lead to changes in sun exposure behaviors. Methods: To provide data that might help frame public health messages, we conducted an online survey among office workers in Brisbane, Australia, to determine knowledge and attitudes about vitamin D and associations of these with sun protection practices. Of the 4,709 people invited to participate, 2,867 (61%) completed the questionnaire. This analysis included 1,971 (69%) participants who indicated that they had heard about vitamin D. Results: Lack of knowledge about vitamin D was apparent. Eighteen percent of people were unaware of the bone benefits of vitamin D but 40% listed currently unconfirmed benefits. Over half of the participants indicated that more than 10 minutes in the sun was needed to attain enough vitamin D in summer, and 28% indicated more than 20 minutes in winter. This was significantly associated with increased time outdoors and decreased sunscreen use. People believing sun protection might cause vitamin D deficiency (11%) were less likely to be frequent sunscreen users (summer odds ratio, 0.63; 95% confidence interval, 0.52-0.75). Conclusions: Our findings suggest that there is some confusion about sun exposure and vitamin D, and that this may result in reduced sun-protective behavior. Impact: More information is needed about vitamin D production in the skin. In the interim, education campaigns need to specifically address the vitamin D issue to ensure that skin cancer incidence does not increase.
Resumo:
BACKGROUND: Indigenous patients with acute coronary syndromes represent a high-risk group. There are however few contemporary datasets addressing differences in the presentation and management of Indigenous and non-Indigenous patients with chest pain. METHODS: The Heart Protection Project, is a multicentre retrospective audit of consecutive medical records from patients presenting with chest pain. Patients were identified as Indigenous or non-Indigenous, and time to presentation and cardiac investigations as well as rates of cardiac investigations and procedures were compared between the two groups. RESULTS: Of the 2380 patients included, 199 (8.4%) identified as Indigenous, and 2174 (91.6%) as non-Indigenous. Indigenous patients were younger, had higher rates hyperlipidaemia, diabetes, smoking, known coronary artery disease and a lower rate of prior PCI; and were significantly less likely to have private health insurance, be admitted to an interventional facility or to have a cardiologist as primary physician. Following adjustment for difference in baseline characteristics, Indigenous patients had comparable rates of cardiac investigations and delay times to presentation and investigations. CONCLUSIONS: Although the Indigenous population was identified as a high-risk group, in this analysis of selected Australian hospitals there were no significant differences in treatment or management of Indigenous patients in comparison to non-Indigenous.
Resumo:
Future air traffic management concepts often involve the proposal of automated separation management algorithms that replaces human air traffic controllers. This paper proposes a new type of automated separation management algorithm (based on the satisficing approach) that utilizes inter-aircraft communication and a track file manager (or bank of Kalman filters) that is capable of resolving conflicts during periods of communication failure. The proposed separation management algorithm is tested in a range of flight scenarios involving during periods of communication failure, in both simulation and flight test (flight tests were conducted as part of the Smart Skies project). The intention of the conducted flight tests was to investigate the benefits of using inter-aircraft communication to provide an extra layer of safety protection in support air traffic management during periods of failure of the communication network. These benefits were confirmed.
Resumo:
Aim: Maternal substance use has been associated with a range of child risk factors. The study investigated the relationship between engagement with child health services and child protection outcomes for children of substance using mothers. ----- ----- Methods: A sample of 119 children of mothers who disclosed opiate, amphetamine or methadone use during a maternity admission between 2000 and 2003, as included in a previous matched co-hort study1, were included in the current study. Statutory child protection agency and child health engagement information for the first two years of life, was obtained. The relationship between type of maternal substance use, child health engagement and child protection outcomes was examined. ----- ----- Results: Seventy two percent of study group infants were engaged with child health services during the first two years of life. Chi square analysis showed no significant relationship between child health engagement and child protection reports. Child health engagement was associated with decreased substantiated child protection notifications for children of methadone using mothers, but not for children of illicit substance users. ----- ----- Conclusions: Almost a quarter of identified children of substance using mothers are not accessing standard child health services in their first two years of life. This study provides support for increased attention to the provision of child health services for children of methadone using mothers. Further research into effective intervention strategies for children of illicit substance using mothers is indicated.
Resumo:
Proposed transmission smart grids will use a digital platform for the automation of substations operating at voltage levels of 110 kV and above. The IEC 61850 series of standards, released in parts over the last ten years, provide a specification for substation communications networks and systems. These standards, along with IEEE Std 1588-2008 Precision Time Protocol version 2 (PTPv2) for precision timing, are recommended by the both IEC Smart Grid Strategy Group and the NIST Framework and Roadmap for Smart Grid Interoperability Standards for substation automation. IEC 61850-8-1 and IEC 61850-9-2 provide an inter-operable solution to support multi-vendor digital process bus solutions, allowing for the removal of potentially lethal voltages and damaging currents from substation control rooms, a reduction in the amount of cabling required in substations, and facilitates the adoption of non-conventional instrument transformers (NCITs). IEC 61850, PTPv2 and Ethernet are three complementary protocol families that together define the future of sampled value digital process connections for smart substation automation. This paper describes a specific test and evaluation system that uses real time simulation, protection relays, PTPv2 time clocks and artificial network impairment that is being used to investigate technical impediments to the adoption of SV process bus systems by transmission utilities. Knowing the limits of a digital process bus, especially when sampled values and NCITs are included, will enable utilities to make informed decisions regarding the adoption of this technology.
Resumo:
This paper discusses the control and protection of a microgrid that is connected to utility through back-to-back converters. The back-to-back converter connection facilitates bidirectional power flow between the utility and the microgrid. These converters can operate in two different modes–one in which a fixed amount of power is drawn from the utility and the other in which the microgrid power shortfall is supplied by the utility. In the case of a fault in the utility or microgrid side, the protection system should act not only to clear the fault but also to block the back-to-back converters such that its dc bus voltage does not fall during fault. Furthermore, a converter internal mechanism prevents it from supplying high current during a fault and this complicates the operation of a protection system. To overcome this, an admittance based relay scheme is proposed, which has an inverse time characteristic based on measured admittance of the line. The proposed protection and control schemes are able to ensure reliable operation of the microgrid.
Resumo:
A recent report delivered by the Australian Centre for Child Protection has highlighted the need for empirical evidence of effective pedagogies for supporting teaching and learning of child protection content in Australian teacher education programs (Arnold & Maio-Taddeo, 2007). This paper advances this call by presenting case study accounts of different approaches to teaching child protection content in University-based teacher education programs across three Australian States. These different cases provide a basis for understanding existing strategies as an important precursor to improving practice. Although preschool, primary and secondary schools have been involved in efforts to protect children from abuse and neglect since the 1970s, teacher education programs, including preservice and inservice programs, have been slow to align their work with child protection agendas. This paper opens a long-overdue discussion about the extent and nature of child protection content in teacher education and proposes strategies for translating research into practice.