427 resultados para Checks.
Resumo:
Objectives: We aimed to identify current practice of sun protection and factors associated with effective use in four outdoor worker industries in Queensland, Australia. Methods: Workplaces in four industries with a high proportion of outdoor workers (building/construction, rural/farming, local government, and public sector industries) were identified using an online telephone directory, screened for eligibility, and invited to participant via mail (n=15, recruitment rate 37%). A convenience sample of workers were recruited within each workplace (n=162). Workplaces’ sun protective policies and procedures were identified using interviews and policy analysis with workplace representatives, and discussion groups and computer-assisted telephone interviews with workers. Personal characteristics and sun protection knowledge, attitudes and behaviors were collated and analysed. Results: Just over half the workplaces had an existing policy which referred to sun protection (58%), and most provided at least some personal protective equipment (PPE), but few scheduled work outside peak sun hours (43%) or provided skin checks (21%). Several worker and workplace characteristics were associated with greater sun protection behaviour among workers, including having received education on the use of PPE (p<0.001), being concerned about being in the sun (p=0.002); and working in a smaller workplace (p=0.035). Conclusions: Uptake of sun protection by outdoor workers is affected by a complex interplay of both workplace and personal factors, and there is a need for effective strategies targeting both the workplace environment and workers’ knowledge, attitudes and behaviors to decrease harmful sun exposure further.
Resumo:
Aim Explore practice nurses' (PNs) role in child health and development, and advising parents about child health issues. Background Introduction of the four-year-old child health check into general practice in 2008 placed additional responsibilities on PNs in child health and wellness. This study explores their readiness to expand their practice into this area. Design Integrated mixed method design, self-report survey. Method A purpose-developed questionnaire explored demographics, child health roles and responsibilities, difficulties encountered, professional development needs, barriers and facilitators, and professional development activities undertaken in the past year. Surveys were posted to 218 PNs in one rural Division of General Practice (DGP) in Queensland, Australia; 29 responded. Results PNs reported a significant role in well and sick child care (93.1%) though few had a paediatric/child health background (14.3%). Roles included immunisations (92.3%), child health checks (65.4%), general child health and development (26.9%), asthma (23.1%), feeding (15.4%), fever (11.5%), settling/sleeping (11.5%). PNs were interested in learning more about (81.5%) and incorporating more child health into their practice (81.5%). Professional development in childhood growth and development (80.0%), health and illness (60.0%) and advising new mothers (20.0%) was needed. Conclusions PNs play a substantial role in child health, are unprepared for the complexities of this role and have preferred methods for undertaking professional development to address knowledge deficits. Implications for practice PNs are unprepared for an advanced role in child health and wellness. Significant gaps in their knowledge to support this role were identified. This ever-expanding role requires close monitoring to ensure knowledge precedes expectations to practice.
Resumo:
Process models specify behavioral aspects by describing ordering constraints between tasks which must be accomplished to achieve envisioned goals. Tasks usually exchange information by means of data objects, i.e., by writing information to and reading information from data objects. A data object can be characterized by its states and allowed state transitions. In this paper, we propose a notion which checks conformance of a process model with respect to data objects that its tasks access. This new notion can be used to tell whether in every execution of a process model each time a task needs to access a data object in a particular state, it is ensured that the data object is in the expected state or can reach the expected state and, hence, the process model can achieve its goals.
Resumo:
Behavioral models capture operational principles of real-world or designed systems. Formally, each behavioral model defines the state space of a system, i.e., its states and the principles of state transitions. Such a model is the basis for analysis of the system’s properties. In practice, state spaces of systems are immense, which results in huge computational complexity for their analysis. Behavioral models are typically described as executable graphs, whose execution semantics encodes a state space. The structure theory of behavioral models studies the relations between the structure of a model and the properties of its state space. In this article, we use the connectivity property of graphs to achieve an efficient and extensive discovery of the compositional structure of behavioral models; behavioral models get stepwise decomposed into components with clear structural characteristics and inter-component relations. At each decomposition step, the discovered compositional structure of a model is used for reasoning on properties of the whole state space of the system. The approach is exemplified by means of a concrete behavioral model and verification criterion. That is, we analyze workflow nets, a well-established tool for modeling behavior of distributed systems, with respect to the soundness property, a basic correctness property of workflow nets. Stepwise verification allows the detection of violations of the soundness property by inspecting small portions of a model, thereby considerably reducing the amount of work to be done to perform soundness checks. Besides formal results, we also report on findings from applying our approach to an industry model collection.
Resumo:
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and/or integrity checks change and the target address is not computed correctly. Gupta and Pieprzyk's attack uses debugger capabilities such as register and address lookup and breakpoints to minimize the requirement to manually inspect the software. Using these resources, the FBF and calls to the same is identified, correct displacement values are generated and calls to FBF are replaced by the original UBS transferring control of the attack to the correct target instruction. In this paper, we propose a watermarking model that provides security against such debugging attacks. Two primary measures taken are shifting the stack pointer modification operation from the FBF to the individual UBSs, and coding the stack pointer modification in the same language as that of the rest of the code rather than assembly language to avoid conspicuous contents. The manual component complexity increases from O(1) in the previous scheme to O(n) in our proposed scheme.
Resumo:
Aim Estimate the prevalence of cannabis dependence and its contribution to the global burden of disease. Methods Systematic reviews of epidemiological data on cannabis dependence (1990-2008) were conducted in line with PRISMA and meta-analysis of Observational Studies in Epidemiology (MOOSE) guidelines. Culling and data extraction followed protocols, with cross-checking and consistency checks. DisMod-MR, the latest version of generic disease modelling system, redesigned as a Bayesian meta-regression tool, imputed prevalence by age, year and sex for 187 countries and 21 regions. The disability weight associated with cannabis dependence was estimated through population surveys and multiplied by prevalence data to calculate the years of life lived with disability (YLDs) and disability-adjusted life years (DALYs). YLDs and DALYs attributed to regular cannabis use as a risk factor for schizophrenia were also estimated. Results There were an estimated 13.1 million cannabis dependent people globally in 2010 (point prevalence0.19% (95% uncertainty: 0.17-0.21%)). Prevalence peaked between 20-24 yrs, was higher in males (0.23% (0.2-0.27%)) than females (0.14% (0.12-0.16%)) and in high income regions. Cannabis dependence accounted for 2 million DALYs globally (0.08%; 0.05-0.12%) in 2010; a 22% increase in crude DALYs since 1990 largely due to population growth. Countries with statistically higher age-standardised DALY rates included the United States, Canada, Australia, New Zealand and Western European countries such as the United Kingdom; those with lower DALY rates were from Sub-Saharan Africa-West and Latin America. Regular cannabis use as a risk factor for schizophrenia accounted for an estimated 7,000 DALYs globally. Conclusion Cannabis dependence is a disorder primarily experienced by young adults, especially in higher income countries. It has not been shown to increase mortality as opioid and other forms of illicit drug dependence do. Our estimates suggest that cannabis use as a risk factor for schizophrenia is not a major contributor to population-level disease burden.
Resumo:
Literacy and numeracy are critical for young people during and after their schooling. The subjects and courses that students undertake during their school years incorporate a range of academic literacy and numeracy practices which students must be able manage if they are to be successful. Pathways beyond schooling also require specific, and changing, understandings of, and proficiencies with, literacy and numeracy as new communication technologies increasingly impact on further study, work, and everyday life. Teaching and learning numeracy is a new emphasis in the SACE and as yet we have little understanding about the ways in which secondary schools handle this area. Students in Years 10 and 11 are at a crucial point in their educational and life pathways as they begin to refine their future aspirations. For those who have difficulty with academic literacies and numeracies – and often a long history of such problems – this period can be fraught unless teachers are able to provide specific support when it is needed, or students are able to access it from care-givers or community members. The School to Work Literacy and Numeracy Project involved teachers from nine schools across the three sectors and university researchers working together to design curriculum interventions for students with a history of low measurable achievement in literacy and/or numeracy. The project started from the premise that working with ‘rich tasks’, an approach to learning and assessment developed in the Productive Pedagogies work undertaken in Queensland (Hayes et al., 2006), would improve students’ motivation, engagement and learning and that this work could best be done by teachers working in school-based, cross-curriculum teams with a school leadership team member and a university researcher as mentor. A key idea in designing rich tasks is that students will have opportunities to demonstrate their learning in assessments which are aligned with the learning expectations (for example a film festival to publicly launch student-produced films, advertising to sell student-made cubby-houses, a household budget based on students’ likely incomes in future work). In other words the assessments should be designed to allow for authentic communication and displays of what the students have learned through serious engagement with the curriculum. The project was conducted from Term 1-4 2009, with follow-up checks with some project teachers in the early weeks of 2010.
Resumo:
Objectives To determine the frequency and types of stressful events experienced by urban Aboriginal and Torres Strait Islander children, and to explore the relationship between these experiences and the children’s physical health and parental concerns about their behaviour and learning ability. Design, setting and participants Cross-sectional study of Aboriginal and Torres Strait Islander children aged ≤ 14 years presenting to an urban Indigenous primary health care service in Brisbane for annual child health checks between March 2007 and March 2010. Main outcome measures Parental or carer report of stressful events ever occurring in the family that may have affected the child. Results Of 344 participating children, 175 (51%) had experienced at least one stressful event. Reported events included the death of a family member or close friend (40; 23%), parental divorce or separation (28; 16%), witness to violence or abuse (20; 11%), or incarceration of a family member (7; 4%). These children were more likely to have parents or carers concerned about their behaviour (P < 0.001) and to have a history of ear (P < 0.001) or skin (P = 0.003) infections. Conclusions Children who had experienced stressful events had poorer physical health and more parental concern about behavioural issues than those who had not. Parental disclosure in the primary health care setting of stressful events that have affected the child necessitates appropriate medical, psychological or social interventions to ameliorate both the immediate and potential lifelong negative impact. However, treating the impact of stressful events is insufficient without dealing with the broader political and societal issues that result in a clustering of stressful events in the Aboriginal and Torres Strait Islander population.
Resumo:
The standard method for deciding bit-vector constraints is via eager reduction to propositional logic. This is usually done after first applying powerful rewrite techniques. While often efficient in practice, this method does not scale on problems for which top-level rewrites cannot reduce the problem size sufficiently. A lazy solver can target such problems by doing many satisfiability checks, each of which only reasons about a small subset of the problem. In addition, the lazy approach enables a wide range of optimization techniques that are not available to the eager approach. In this paper we describe the architecture and features of our lazy solver (LBV). We provide a comparative analysis of the eager and lazy approaches, and show how they are complementary in terms of the types of problems they can efficiently solve. For this reason, we propose a portfolio approach that runs a lazy and eager solver in parallel. Our empirical evaluation shows that the lazy solver can solve problems none of the eager solvers can and that the portfolio solver outperforms other solvers both in terms of total number of problems solved and the time taken to solve them.
Resumo:
Assessments of students in primary and secondary education are debated among practitioners, policy-makers, and parents. In some countries, assessment scores serve a criterion for passage between levels of education, for example, from secondary school to post-secondary education. Those practices are often traditions and while they come under criticism, they are a long-accepted part of the educational practices within a country. In those countries, the students’ assessment and examination scores are posted in public places or published in local news media. In other countries, assessments are used for the periodic checks on individual student progress. The results of assessments may be used for rating schools, and in some cases, they are used for evaluating the performance of teachers. Assessments are used less often to analyze student performance and make judgments regarding the performance of the curriculum. Even less often, assessments serve to critically establish strategies for the improvement of student learning and educational practices. The ends on the continuum of the assessment debate often focus on the opportunities that assessments present to improve education on one end. The other end is that assessments serve as a major distraction from the important work of teachers by removing classroom room time from instruction. The debate on those issues continues.
Resumo:
The output of a differential scanning fluorimetry (DSF) assay is a series of melt curves, which need to be interpreted to get value from the assay. An application that translates raw thermal melt curve data into more easily assimilated knowledge is described. This program, called “Meltdown,” conducts four main activities—control checks, curve normalization, outlier rejection, and melt temperature (Tm) estimation—and performs optimally in the presence of triplicate (or higher) sample data. The final output is a report that summarizes the results of a DSF experiment. The goal of Meltdown is not to replace human analysis of the raw fluorescence data but to provide a meaningful and comprehensive interpretation of the data to make this useful experimental technique accessible to inexperienced users, as well as providing a starting point for detailed analyses by more experienced users.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.
Resumo:
Aims. To examine roles and responsibilities of Practice Nurses in the area of child health and development and in advising parents about child health issues. Background. As the focus of Australia’s health care system shifts further towards the primary health care sector, governmental initiatives require that Practice Nurses are knowledgeable, confident and competent in providing care in the area of child health and development. Little is known about roles and responsibilities of Practice Nurses in this area. Design. Cross-sectional survey design. Methods. Practice Nurses completed a national online survey examining the roles and responsibilities in child health and development, professional development needs and role satisfaction. Data were collected from June 2010–April 2011. Results. Respondents (N = 159) reported having a significant role in well and sick child care and were interested in extending their role. Frequent activities included immunization, phone triage/advice, child health/development advice, wound care and Healthy Kids Checks. However, few had paediatric/child nursing backgrounds or postgraduate qualifications in paediatric nursing and they reported limited preparation for the role. Practice Nurses reported difficulties with keeping up-to-date with child health information and advising parents confidently. Satisfaction was relatively low regarding opportunities and encouragement to undertake professional development and expand scope of practice. Conclusion. Practice Nurses are largely unprepared to meet the demands of their child health role and need support to develop and maintain the skills and knowledge base necessary for high-quality, evidence-based practice. Both financial and time support is needed to enable Practice Nurses to access child health professional development.
Resumo:
The rise and popularity of dystopian fiction in recent years is quite marked and critics often attribute such high sales of books and box office as being linked to the impact September 11 has had on the world, especially in the United States. While the events of September 11, 2001 saw a heightened anxiety by nations and their citizens about the fear and threat of terrorism – an anxiety which is paradoxically lowered and raised by increased surveillance practices, security checks and warnings – other changes since the last stages of the twentieth century have also raised concerns and anxieties. In this paper I use examples of Young Adult (YA) dystopian fiction to illustrate the potential these texts have for providing their readers with alternative ways of thinking about the challenges that others face and their capacity for resilience.