857 resultados para minor ailment scheme
Resumo:
In the 1990s, the Higher Education Funding Councils of England and the equivalent body in Northern Ireland (DEL NI) took a positive step by supporting the development of initiatives that promoted and supported innovation and the recognition of excellence in learning and teaching in Higher Education. One of the earliest manifestations of this support was the National Teaching Fellowship Scheme which celebrates its tenth anniversary this year, making this a timely opportunity to consider the personal and professional impact this scheme has had on the quality of teaching throughout the Higher Education sector.
Resumo:
Vicky Davies and Sarah Maguire are Professional Development Managers at the University of Ulster. They have many years of experience in delivering and assessing Higher Education Academy claims for recognition via accredited provision for new teaching staff and post-graduate students. More recently they led the development of the University of Ulster’s Professional Development Scheme http://www.ulster.ac.uk/centrehep/pds/ . The core elements of the PD Scheme are the production of an e-portfolio and an assessed professional conversation. This workshop will explore the learning they have acquired through developing this process and piloting it with applicants. You will have the opportunity to discuss this and to identify any transferability to your own practice.
Resumo:
In 2009 a so-called morbidity orientated risk structure equalization scheme was installed for the German statutory health insurance in order to minimize structural differences between different providers with respect to revenue and expenditures. Even with this mechanism some risks to the individual health insurance providers remain. Reinsurance could be a way to mitigate these risks, but so far only very few contracts have been signed. Moreover the existing reinsurance contracts only focus on the periphery of the statutory health insurance system such as travel health insurance. In this article we therefore analyse existing risks for individual health insurance providers and evaluate their (re-)insurability. Hereafter the potential for reinsurance solutions in the German statutory health insurance itself as well as in newer forms of healthcare provision (e.g. integrated health care and managed care) is discussed. We find that reinsurance may be a reasonable solution for many of the risks in the statutory health insurance scheme. But as research in this area is very young further analysis of the nature of risks is necessary.
Resumo:
This paper examines the interplay of language-internal continuity and external influence in the cyclical development of the Asia Minor Greek adpositional system. The Modern Greek dialects of Asia Minor inherited an adpositional system of the Late Medieval Greek type whereby secondary adpositions regularly combined with primary adpositions to encode spatial region. Secondary adpositions could originally precede simple adpositions ([PREPOSITION + PREPOSITION + NPACC]) or follow the adpositional complement ([PREPOSITION + NPACC + POSTPOSITION]). Asia Minor Greek replicated the structure of Ottoman Turkish postpositional phrases to resolve this variability, fixing the position of secondary adpositions after the complement and thus developing circumpositions of the type [PREPOSITION + NPACC + POSTPOSITION]. Later, some varieties dropped the primary preposition SE from circumpositional phrases, leaving (secondary) postpositions as the only overt relator ([NPACC + POSTPOSITION]) in some environments. In addition, a number of Turkish postpositions were borrowed wholesale, thus enriching the Greek adpositional inventory.
Resumo:
We trace the diachronic development of the preposition se in inner Asia Minor Greek from its use to mark a range of spatial functions to its ultimate loss and replacement by zero. We propose that, before spreading to all syntactic and semantic contexts, zero marking was contextually-dependent on the presence/absence of a prenominal genitive modifying the head noun of Ground-encoding NPs and on the presence/absence of Region-encoding postpositions. We attribute these developments to an informational load relief strategy aimed at producing more economical utterances as well as to language contact with Turkish, which favoured structural convergence on the adpositional level between the two languages.
Resumo:
The RHPP policy provided subsidies for private householders, Registered social landlords and communities to install renewable heat measures in residential properties. Eligible measures included air and ground-source heat pumps, biomass boilers and solar thermal. Around 18,000 heat pumps were installed via this scheme. DECC funded a detailed monitoring campaign, which covered 700 heat pumps (around 4% of the total). The aim of this monitoring campaign was to assess the efficiencies of the heat pumps and to estimate the carbon and bill savings and amount of renewable heat generated. Data was collected from 31/10/2013 to 31/03/2015. This report represents the analysis of this data and represents the most complete and reliable data in-situ residential heat pump performance in the UK to date.
Resumo:
On this paper we present a modified regularization scheme for Mathematical Programs with Complementarity Constraints. In the regularized formulations the complementarity condition is replaced by a constraint involving a positive parameter that can be decreased to zero. In our approach both the complementarity condition and the nonnegativity constraints are relaxed. An iterative algorithm is implemented in MATLAB language and a set of AMPL problems from MacMPEC database were tested.
Resumo:
Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may contain several groups, and each one is maintained by a sensor node (the group controller) with constrained resources. Moreover, the previously proposed schemes require a multicast routing support to deliver the rekeying messages. Nevertheless, multicast routing can incur heavy storage and communication overheads in the case of a wireless sensor network. Due to these two major limitations, we have reckoned it necessary to propose a new secure group communication with a lightweight rekeying process. Our proposal overcomes the two limitations mentioned above, and can be applied to a homogeneous WSN with resource-constrained nodes with no need for a multicast routing support. Actually, the analysis and simulation results have clearly demonstrated that our scheme outperforms the previous well-known solutions.
Resumo:
The increasing and intensive integration of distributed energy resources into distribution systems requires adequate methodologies to ensure a secure operation according to the smart grid paradigm. In this context, SCADA (Supervisory Control and Data Acquisition) systems are an essential infrastructure. This paper presents a conceptual design of a communication and resources management scheme based on an intelligent SCADA with a decentralized, flexible, and intelligent approach, adaptive to the context (context awareness). The methodology is used to support the energy resource management considering all the involved costs, power flows, and electricity prices leading to the network reconfiguration. The methodology also addresses the definition of the information access permissions of each player to each resource. The paper includes a 33-bus network used in a case study that considers an intensive use of distributed energy resources in five distinct implemented operation contexts.
Resumo:
The European Union Emissions Trading Scheme (EU ETS) is a cornerstone of the European Union's policy to combat climate change and its key tool for reducing industrial greenhouse gas emissions cost-effectively. The purpose of the present work is to evaluate the influence of CO2 opportunity cost on the Spanish wholesale electricity price. Our sample includes all Phase II of the EU ETS and the first year of Phase III implementation, from January 2008 to December 2013. A vector error correction model (VECM) is applied to estimate not only long-run equilibrium relations, but also short-run interactions between the electricity price and the fuel (natural gas and coal) and carbon prices. The four commodities prices are modeled as joint endogenous variables with air temperature and renewable energy as exogenous variables. We found a long-run relationship (cointegration) between electricity price, carbon price, and fuel prices. By estimating the dynamic pass-through of carbon price into electricity price for different periods of our sample, it is possible to observe the weakening of the link between carbon and electricity prices as a result from the collapse on CO2 prices, therefore compromising the efficacy of the system to reach proposed environmental goals. This conclusion is in line with the need to shape new policies within the framework of the EU ETS that prevent excessive low prices for carbon over extended periods of time.
Resumo:
In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.
Resumo:
The shifted Legendre orthogonal polynomials are used for the numerical solution of a new formulation for the multi-dimensional fractional optimal control problem (M-DFOCP) with a quadratic performance index. The fractional derivatives are described in the Caputo sense. The Lagrange multiplier method for the constrained extremum and the operational matrix of fractional integrals are used together with the help of the properties of the shifted Legendre orthonormal polynomials. The method reduces the M-DFOCP to a simpler problem that consists of solving a system of algebraic equations. For confirming the efficiency and accuracy of the proposed scheme, some test problems are implemented with their approximate solutions.