892 resultados para Knowledge of caregivers
Resumo:
This paper presents an approach to developing indicators for expressing resilience of a generic water supply system. The system is contextualised as a meta-system consisting of three subsystems to represent the water catchment and reservoir, treatment plant and the distribution system supplying the end-users. The level of final service delivery to end-users is considered as a surrogate measure of systemic resilience. A set of modelled relationships are used to explore relationships between system components when placed under simulated stress. Conceptual system behaviour of specific types of simulated pressure is created for illustration of parameters for indicator development. The approach is based on the hypothesis that an in-depth knowledge of resilience would enable development of decision support system capability which in turn will contribute towards enhanced management of a water supply system. In contrast to conventional water supply system management approaches, a resilience approach facilitates improvement in system efficiency by emphasising awareness of points-of-intervention where system managers can adjust operational control measures across the meta-system (and within subsystems) rather than expansion of the system in entirety in the form of new infrastructure development.
Resumo:
As features of the landscape, waterfalls have been studied extensively by geographers, but the names given to these landforms have received relatively little scholarly attention. This paper examines the naming of waterfalls and addresses the question of classifying these hydronyms. The subject is considered in a global historical context, focusing on place names in the anglophone world. Until the 18th and 19th centuries, relatively few waterfalls were named.With the beginning of the Industrial Revolution, water power rose in economic importance, and at the same time, there was a growing scientific and aesthetic engagement with the landscape. These developments are suggested as reasons for the increased interest in waterfalls which were then being recorded in topographical literature and on maps, individual names being given to increasing numbers of falls. European exploration added to the knowledge of the world’s waterfalls, many of which were given names by their ‘discoverers’. This naming process accelerated with the growth of domestic and overseas tourism which exploited scenic resources such as waterfalls. Until now, research on the names of waterfalls has been fragmentary, and the classification of these hydronyms has been neglected. This paper demonstrates that waterfall names can be classified in accordance with a recognised toponymic typology. Using examples drawn from waterfall guidebooks, databases, maps, and other sources, the following discussion supports George Stewart’s claim that his toponymic classification is valid for place names of all kinds.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
This study investigated the specificity of the post-concussion syndrome (PCS) expectation-as-etiology hypothesis. Undergraduate students (n = 551) were randomly allocated to one of three vignette conditions. Vignettes depicted either a very mild (VMI), mild (MI), or moderate-to-severe (MSI) motor vehicle-related traumatic brain injury (TBI). Participants reported the PCS and PTSD symptoms that they imagined the depicted injury would produce. Secondary outcomes (knowledge of mild TBI, and the perceived undesirability of TBI) were also assessed. After data screening, the distribution of participants by condition was: VMI (n = 100), MI (n = 96), and MSI (n = 71). There was a significant effect of condition on PCS symptomatology, F(2, 264) = 16.55, p < .001. Significantly greater PCS symptomatology was expected in the MSI condition compared to the other conditions (MSI > VMI; medium effect, r = .33; MSI > MI; small-to-medium effect, r = .22). The same pattern of group differences was found for PTSD symptoms, F(2, 264) = 17.12, p < .001. Knowledge of mild TBI was not related to differences in expected PCS symptoms by condition; and the perceived undesirability of TBI was only associated with reported PCS symptomatology in the MSI condition. Systematic variation in the severity of a depicted TBI produces different PCS and PTSD symptom expectations. Even a very mild TBI vignette can elicit expectations of PCS symptoms.
Resumo:
Background Undernutrition, weight loss and dehydration are major clinical issues for people with dementia in residential care, with excessive weight loss contributing to increased risk of frailty, immobility, illness and premature morbidity. This paper discusses a nutritional knowledge and attitudes survey conducted as part of a larger project focused on improving nutritional intake of people with dementia within a residential care facility in Brisbane, Australia. Aims The specific aims of the survey were to identify (i) knowledge of the nutritional needs of aged care facility residents; (ii) mealtime practices; and (iii) attitudes towards mealtime practices and organisation. Methods A survey based on those used in other healthcare settings was completed by 76 staff members. The survey included questions about nutritional knowledge, opinions of the food service, frequency of feeding assistance provided and feeding assessment practices. Results Nutritional knowledge scores ranged from 1 to 9 of a possible 10, with a mean score of 4.67. While 76% of respondents correctly identified risk factors associated with malnutrition in nursing home residents, only 38% of participants correctly identified the need for increased protein and energy in residents with pressure ulcers, and just 15% exhibited correct knowledge of fluid requirements. Further, while nutritional assessment was considered an important part of practice by 83% of respondents, just 53% indicated that they actually carried out such assessments. Identified barriers to promoting optimal nutrition included insufficient time to observe residents (56%); being unaware of residents' feeding issues (46%); poor knowledge of nutritional assessments (44%); and unappetising appearance of food served (57%). Conclusion An important step towards improving health and quality of life for residents of aged care facilities would be to enhance staff nutritional awareness and assessment skills. This should be carried out through increased attention to both preservice curricula and on-the-job training. Implications for practice The residential facility staff surveyed demonstrated low levels of nutrition knowledge, which reflects findings from the international literature. This has implications for the provision of responsive care to residents of these facilities and should be explored further.
Resumo:
The determination of performance standards and assessment practices in regard to student work placements is an essential and important task. Inappropriate, inadequate, or excessively complex assessment tasks can influence levels of student engagement and the quality of learning outcomes. Critical to determining appropriate standards and assessment tasks is an understanding and knowledge of key elements of the learning environment and the extent to which opportunities are provided for students to engage in critical reflection and judgement of their own performance in the contexts of the work environment. This paper focuses on the development of essential skills and knowledge (capabilities) that provide evidence of learning in work placements by describing an approach taken in the science and technology disciplines. Assessment matrices are presented to illustrate a method of assessment for use within the context of the learning environment centred on work placements in science and technology. This study contributes to the debate on the meaning of professional capability, performance standards and assessment practices in work placement programs by providing evidence of an approach that can be adapted by other programs to achieve similar benefits. The approach may also be valuable to other learning contexts where capability and performance are being judged in situations that are outside a controlled teaching and learning environment i.e. in other life-wide learning contexts.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Living with substance users negatively impacts upon family members in many ways, and distress is common. Despite these deep and wide-ranging impacts, supportive interventions for family members in their own right are rarely available. Thailand has substantial and growing problems with substance use, and there is very little support or family members of drug users, especially in community setting. The Thai Family Support (TFS) program was designed for implementation in primary health care units (PCUs) in Thailand. TFS was based on two approaches with existing empirical support in Western contexts—the 5-step method and CRAFT—with adaptations to a Thai setting that included integration with Buddhist practices. Its aims were to increase well-being of family members, reduce mental distress, improve family relationships between family members, and engage substance users in behaviour change. A small-scale randomised controlled trial on TFS with a Delayed Treatment control was conducted, with assessments at 8 weeks (Post 1) and 20-24 weeks (Post 2). Structured interviews with participants and PCU staff and an examination of five case studies augmented the quantitative results. Mixed Model Analyses were applied to quantitative outcomes, and thematic analysis was used for qualitative data. Thirty-six participants (18 in each of Immediate and Delayed Conditions) were recruited. A significant difference at Baseline between the two conditions was observed on the Thai GHQ-28 and Gender, but it was not possible to statistically control for these effects. There was a significant Time by Condition interaction on the Thai GHQ-28, WHOQOL-BREF-THAI and FAS, reflecting greater improvements in the Immediate condition by Post 1, but with the Delayed condition meeting or exceeding that effect by Post 2. On FES Cohesion and Conflict, there were falls across conditions at Post 2, but only Cohesion also showed a Time by Condition interaction, and that effect was consistent with a delayed impact of treatment. Overall, TFS by PCU staff in the Delayed Condition gave similar results to TFS conducted by the researcher, supporting the viability of its dissemination to standard health services. Qualitative data also confirmed the quantitative results. Most participants reported physiological and psychological improvements even though their substance-using relative did not change their drug use behaviour. After completing TFS, participants reported increased knowledge, group support and sharing feeling, having positive patient-professional relationship, having greater knowledge of substance abuse and social support. In particular, they changed their behaviour towards the substance user, resulting in improvements to family relationships. PCU staff gave similar responses on the efficacy of TFS, and saw it as feasible for routine use, although some implementation challenges were identified. The cultural adaptation and in particular the religious activities, were recognised by participants and PCU staff as an important component of TFS to support psychological health and well-being. Findings from this study showed the impact of substance use on family members and difficulties that they experienced when living with the substance users, resulting distresses and burden that may develop severe mental health disease. Drug use policies should be modified to support family members and response to their needs effectively for early prevention. This study also gave preliminary support for application of the TFS program in rural primary care settings and identified some policies that will be required for it to be disseminated more broadly.
Resumo:
This paper reviews electricity consumption feedback literature to explore the potential of electricity feedback to affect residential consumers’ electricity usage patterns. The review highlights a substantial amount of literature covering the debate over the effectiveness of different feedback criteria to residential customer acceptance and overall conservation and peak demand reduction. Researchers studying the effects of feedback on everyday energy use have observed substantial variation in effect size, both within and between studies. Although researchers still continue to question the types of feedback that are most effective in encouraging conservation and peak load reduction, some trends have emerged. These include that feedback be received as quickly as possible to the time of consumption; be related to a standard; be clear and meaningful and where possible both direct and indirect feedback be customised to the customer. In general, the literature finds that feedback can reduce electricity consumption in homes by 5 to 20 per cent, but that significant gaps remain in our knowledge of the effectiveness and cost benefit of feedback.
Resumo:
Selected chrysocolla mineral samples from different origins have been studied by using PXRD, SEM, EDX and XPS. The XRD patterns show that the chrysocolla mineral samples are non-diffracting and no other phases are present in the minerals, thus showing the chrysocolla samples are pure. SEM analyses show the chrysocolla surfaces are featureless. EDX analyses enable the formulae of the chrysocolla samples to be calculated. The thermal decomposition of the mineral chrysocolla has been studied using a combination of thermogravimetric analysis and derivative thermogravimetric analysis. Five thermal decomposition mass loss steps are observed for the chrysocolla from Arizona (a) at 125 ◦C with the loss of water, (b) at 340 ◦C with the loss of hydroxyl units, (c) at 468.5 ◦C with a further loss of hydroxyls, (d) at 821 ◦C with oxygen loss and (e) at 895 ◦C with a further loss of oxygen. The thermal analysis of the chrysocolla from Congo shows mass losses at 125, 275.3, 805.6 and 877.4 ◦C and for the Nevada chrysocolla, mass loss steps at 268, 333, 463, 786.0 and 817.7 ◦C are observed. The thermal analysis of spertiniite is very different from that of chrysocolla and thermally decomposes at around 160 ◦C. XPS shows that there are two different copper species present, one which is bonded to oxygen and one to a hydroxyl unit. The O 1s is broad and very symmetrical suggesting two O species of equal number. The bond energy of 102.9 eV for the Si 2p suggests that it is in the form of a silicate. The bond energy is much higher for silicas around ∼103.5 eV. The reported value for silica gel has Si 2p at 103.4 eV. The combination of TG, PXRD, EDX and XPS adds to our fundamental knowledge of the structure of chrysocolla.
Resumo:
Because professions seek graduates who can 'collaborate, share skills and knowledge, and communicate' (Kruck and Reif, 2001, p 37), it is important that university graduates are not equipped solely with the content knowledge of their discipline, but also with prospective employment skills. Furthermore, when students 'interact more in positive ways with their teachers and peers, they gain more in terms of essential skills and competencies, such as critical thinking, problem~solving [and] effective communication' (NSSE, 2000, p 2)./n this way, peer assisted fellowing has the potential to enhance students' professional development, and provide the social inclusion and engagement necessary for effective learning. This session describes two peer assisted learning models embedded within first year QUT Faculty of Law units. Through a partnership between teaching staff, student mentors and mentees, the models aim to facilitate student socialisation whilst supplementing understanding of substantive law with the development of academic and work·related skills. Mentor and mentee perceptions, and program implications, are considered.
Resumo:
Knowledge of the elements present in house dusts is important in understanding potential health effects on humans. In this study, dust samples collected from 10 houses in south-east Queensland have been analysed by scanning electron microscopy and X-ray microanalysis to measure the inorganic element compositions and to investigate the form of heavy metals in the dusts. The overall analytical results were then used to discriminate between different localities using chemometric techniques. The relative amounts of elements, particularly of Si, Ca, and Fe, varied between size fractions and between different locations for the same size fraction. By analysing individual small particles, many other constituents were identified including Ti, Cr, Mn, Ni, Cu, Zn, Ba, Ag, W, Au, Hg, Pb, Bi, La and Ce. The heavy metals were mostly concentrated in small particles in the smaller size fractions, which allowed detection by particle analysis, though their average concentrations were very low.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Although Australian universities have allocated significant resources toward the development of student support services, administrators have little systematic information about the problems undergraduate university students experience or students' knowledge about available support services. The author surveyed 441 students in an urban, nonresidential university to examine the prevalence of difficulties associated with learning, sexual harassment, discrimination, emotional distress, health problems, course and career concerns, financial difficulties, and difficulties with lecturers; he also assessed students' knowledge of support services in each of these areas. Course concerns were the most common problem, followed by emotional distress, worry about career choices, financial difficulties, and problems with lecturers. More than half of the students were unaware of the support services available to them to address a range of concerns from sexual harassment and discrimination to emotional distress. Approximately 20% of the students reported having used university counseling or career services. Implications for targeting specific areas for outreach programs are discussed.