922 resultados para requirement for consent discontinuance


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research Quality This is a dialogue between two Australian literacy scholars about two persuasive writing techniques that posed difficulty for the students in our research. This dialogue flows from the analysis of Year 6 writing samples from an ARC Linkage Project, URLearning (2009-2013) - the focus of the symposium. We use vivid examples of writing from students’ handwritten persuasive texts on topics that were chosen by teachers. The persuasive structure in the texts followed the Toulmin (2003) model: a thesis statement, three arguments with evidence, and a conclusion. The findings show that to realise the effective power of rhetorical persuasion, students need an expanded lexicon that does not rely on intensifiers, and which employs a greater range of advanced hedging techniques to use to their advantage. National & International Importance The study is potentially of national and international relevance, given that argumentation or persuasion is a key life skill in many professional, personal, and discourses. It is also a requirement in the International English Language Testing Systems (IELTS) tests, which are a critical gateway for tertiary studies in many English-speaking countries (Coffin, 2004). Timeliness The research is timely given the Australian Curriculum English, in which persuasive texts figure prominently from Preparatory to Year 10 (ACARA, 2014). The recommendations are also timely in the context of educational policies in other parts of the world. For example, in the United States, the Common Core Standards: English Language Arts, mandates the teaching of persuasive texts (Council of Chief State School Officers & National Governors Association, 2013) Implications for practice/policy The findings of the study have specific practical implications for teachers, who can address the persuasive writing techniques of hedging and intensification with which children need targeted support and explicit instruction. The presentation is positioned at the nexus of teacher practice to better address the national priorities of the Australian Curriculum: English (ACARA, 2014), while having implications for applied linguistics research by identifying common problems in students' persuasive writing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: In 2011, the Australian Commission on Safety and Quality in Health Care (ACSQHC) recommended that all hospitals in Australia must have an Antimicrobial Stewardship (AMS) program by 2013. Nevertheless, little is known about current AMS activities. This study aimed to determine the AMS activities currently undertaken, and to identify gaps, barriers to implementation and opportunities for improvement in Queensland hospitals. Methods: The AMS activities of 26 facilities from 15 hospital and health services in Queensland were surveyed during June 2012 to address strategies for effective AMS: implementing clinical guidelines, formulary restriction, reviewing antimicrobial prescribing, auditing antimicrobial use and selective reporting of susceptibility results. Results: The response rate was 62%. Nineteen percent had an AMS team (a dedicated multidisciplinary team consisting of a medically trained staff member and a pharmacist). All facilities had access to an electronic version of Therapeutic Guidelines: Antibiotic, with a further 50% developing local guidelines for antimicrobials. One-third of facilities had additional restrictions. Eighty-eight percent had advice for restricted antimicrobials from in-house infectious disease physicians or clinical microbiologists. Antimicrobials were monitored with feedback given to prescribers at point of care by 76% of facilities. Deficiencies reported as barriers to establishing AMS programs included: pharmacy resources, financial support by hospital management, and training and education in antimicrobial use. Conclusions: Several areas for improvement were identified: reviewing antimicrobial prescribing with feedback to the prescriber, auditing, and training and education in antimicrobial use. There also appears to be a lack of resources to support AMS programs in some facilities. What is known about the topic? The ACSQHC has recommended that all hospitals implement an AMS program by 2013 as a requirement of Standard 3 (Preventing and Controlling Healthcare-Associated Infections) of the National Safety and Quality Health Service Standards. The intent of AMS is to ensure appropriate prescribing of antimicrobials as part of the broader systems within a health service organisation to prevent and manage healthcare-associated infections, and improve patient safety and quality of care. This criterion also aligns closely with Standard 4: Medication Safety. Despite this recommendation, little is known about what AMS activities are undertaken in these facilities and what additional resources would be required in order to meet these national standards. What does the paper add? This is the first survey that has been conducted of public hospital and health services in Queensland, a large decentralised state in Australia. This paper describes what AMS activities are currently being undertaken, identifies practice gaps, barriers to implementation and opportunities for improvement in Queensland hospitals. What are the implications for practitioners? Several areas for improvement such as reviewing antimicrobial prescribing with feedback to the prescriber, auditing, and training and education in antimicrobial use have been identified. In addition, there appears to be a lack of resources to support AMS programs in some facilities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the variety of PV inverter types and the number of transformerless PV inverters on the Australian market increasing, we revisit some of the issues associated with these topologies. A recent electric shock incident in Queensland (luckily without serious outcome) associated with a transformerless PV system, highlights the need for earthing PV array structures and PV module frames to prevent capacitive leakage currents causing electric shock. The presented test results of the relevant voltages associated with leakage currents of five transformerless PV inverters stress this requirement, which is currently being addressed by both the Clean Energy Council and Standards Australia. DC current injection tests were performed on the same five inverters and were used to develop preliminary recommendations for a more meaningful DC current test procedure for AS4777 Part 2. The test circuit, methodology and results are presented and discussed. A notable temperature dependency of DC current injections with three of the five inverters suggests that DC current injection should be tested at high and low internal inverter temperatures whereas the power dependency noted only for one inverter does not seem to justify recommendations for a (rather involved) standard test procedure at different power levels.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increased focus on energy cost savings and carbon footprint reduction efforts improved the visibility of building energy simulation, which became a mandatory requirement of several building rating systems. Despite developments in building energy simulation algorithms and user interfaces, there are some major challenges associated with building energy simulation; an important one is the computational demands and processing time. In this paper, we analyze the opportunities and challenges associated with this topic while executing a set of 275 parametric energy models simultaneously in EnergyPlus using a High Performance Computing (HPC) cluster. Successful parallel computing implementation of building energy simulations will not only improve the time necessary to get the results and enable scenario development for different design considerations, but also might enable Dynamic-Building Information Modeling (BIM) integration and near real-time decision-making. This paper concludes with the discussions on future directions and opportunities associated with building energy modeling simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Targeted monitoring of threatened species within plantations is becoming more important due to forest certification programmes’ requirement to consider protection of threatened species, and to increase knowledge of the distribution of species. To determine patterns of long-tailed bat (Chalinolobus tuberculatus) activity in different habitat structures, with the aim of improving the likelihood of detection by targeting monitoring, we monitored one stand of 26 year-old Pinus radiata over seven months between December 2007 and June 2008 in Kinleith Forest, an exotic plantation forest centred around Tokoroa, South Waikato, New Zealand. Activity was determined by acoustic recording equipment, which is able to detect and record bats’ echolocation calls. We monitored activity from sunset to sunrise along a road through the stand, along stand edges, and in the interior of the stand. Bats were recorded on 80% of the 35 nights monitored. All activity throughout the monitoring period was detected on the edge of the stand or along the road. No bats were detected within the interior of the stand. Bat activity was highest along the road through the stand (40.4% of all passes), followed by an edge with stream running alongside (35.2%), along the road within a skidsite (19.8%), and along an edge without a stream (4.6%). There was a significant positive relationship between bat pass rate (bat passes h-1) and the feeding buzz rate (feeding buzzes h-1) indicating that bat activity was associated with feeding and not just commuting. Bat feeding activity was also highest along the road through the stand (59.2% of feeding buzzes), followed by the road within the skidsite (30.6%), and along the stream-side edge (10.2%). No feeding buzzes were recorded in either the interior or along the edge without the stream. Differences in overall feeding activity were significant only between the road and edge and between edges with and without a stream. Bat activity was detected each month and always by the second night of monitoring, and in this stand was highest during April. We recommend targeted monitoring for long-tailed bats be focused on road-side and stand edge habitat, and along streams, and that monitoring take place for at least three nights to maximise probability of detection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Circular shortest paths represent a powerful methodology for image segmentation. The circularity condition ensures that the contour found by the algorithm is closed, a natural requirement for regular objects. Several implementations have been proposed in the past that either promise closure with high probability or ensure closure strictly, but with a mild computational efficiency handicap. Circularity can be viewed as a priori information that helps recover the correct object contour. Our "observation" is that circularity is only one among many possible constraints that can be imposed on shortest paths to guide them to a desirable solution. In this contribution, we illustrate this opportunity under a volume constraint but the concept is generally applicable. We also describe several adornments to the circular shortest path algorithm that proved useful in applications. © 2011 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The goal of this study was to describe researchers' experiences in submitting ethical proposals focused on older adult populations, including studies with persons with dementia, to ethical review boards. Ethical approval was granted for an online survey. Researchers were recruited via listservs and snowballing techniques. Participants included 157 persons (73% female) from Australia and the United States, with a mean age of 46 (±13). Six main issues were encountered by researchers who participated in this survey. In descending order, these included questions regarding: informed consent and information requirements (61.1%), participants' vulnerability, particularly for those with cognitive impairments (58.6%), participant burden (44.6%), data access (29.3%), adverse effects of data collection/intervention (26.8%), and study methodology (25.5%). An inductive content analysis of responses revealed a range of encounters with ethical review panels spanning positive, negative, and neutral experiences. Concerns voiced about ethical review boards included committees being overly focused on legal risk, as well as not always hearing the voice of older research participants, both potential and actual. Respondents noted inability to move forward on studies, as well as loss of researchers and participant groups from gerontological and clinical research as a result of negative interactions with ethics committees. Positive interactions with the committees reinforced researchers' need to carefully construct their research approaches with persons with dementia in particular. Suggested guidelines for committees when dealing with ethics applications involving older adults include self-reflecting on potential biases and stereotypes, and seeking further clarification and information from gerontological researchers before arriving at decisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to the availability of huge number of web services, finding an appropriate Web service according to the requirements of a service consumer is still a challenge. Moreover, sometimes a single web service is unable to fully satisfy the requirements of the service consumer. In such cases, combinations of multiple inter-related web services can be utilised. This paper proposes a method that first utilises a semantic kernel model to find related services and then models these related Web services as nodes of a graph. An all-pair shortest-path algorithm is applied to find the best compositions of Web services that are semantically related to the service consumer requirement. The recommendation of individual and composite Web services composition for a service request is finally made. Empirical evaluation confirms that the proposed method significantly improves the accuracy of service discovery in comparison to traditional keyword-based discovery methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a rigorous validation of the analyticalAmadei solution for the stress concentration around arbitrarily orientated borehole in general anisotropic elastic media. First, we revisit the theoretical framework of the Amadei solution and present analytical insights that show that the solution does indeed contain all special cases of symmetry, contrary to previous understanding, provided that the reduced strain coefficients β11 and β55 are not equal. It is shown from theoretical considerations and published experimental data that the β11 and β55 are not equal for realistic rocks. Second, we develop a 3D finite-element elastic model within a hybrid analyticalnumerical workflow that circumvents the need to rebuild and remesh the model for every borehole and material orientation. Third, we show that the borehole stresses computed from the numerical model and the analytical solution match almost perfectly for different borehole orientations (vertical, deviated and horizontal) and for several cases involving isotropic and transverse isotropic symmetries. It is concluded that the analytical Amadei solution is valid with no restrictions on the borehole orientation or elastic anisotropy symmetry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

- Gender dysphoria is a condition in which a child's subjectively felt identity and gender are not congruent with her or his biological sex. Because of this, the child suffers clinically significant distress or impairment in social functioning. - The Family Court of Australia has recently received an increasing number of applications seeking authorisation for the provision of hormones to treat gender dysphoria in children. - Some medical procedures and interventions performed on children are of such a grave nature that court authorisation must be obtained to render them lawful. These procedures are referred to as special medical procedures. - Hormonal therapy for the treatment of gender dysphoria in children is provided in two stages occurring years apart. Until recently, both stages of treatment were regarded by courts as special medical treatments, meaning court authorisation had to be provided for both stages. - In a significant recent development, courts have drawn a distinction between the two stages of treatment, permitting parents to consent to the first stage. In addition, it has been held that a child who is determined by a court to be Gillick competent can consent to stage 2 treatment. - The new legal developments concerning treatment for gender dysphoria are of ethical, clinical and practical importance to children and their families, and to medical practitioners treating children with gender dysphoria. Medical practitioners should benefit from an understanding of the recent developments in legal principles. This will ensure that they have up-to-date information about the circumstances under which treatment may be conducted with parental consent, and those in which they must seek court authorisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Post traumatic stress disorder (PTSD) is a serious medical condition effecting both military and civilian populations. While its etiology remains poorly understood it is characterized by high and prolonged levels of fear responding. One biological unknown is whether individuals expressing high or low conditioned fear memory encode the memory differently and if that difference underlies fear response. In this study we examined cellular mechanisms that underlie high and low conditioned fear behavior by using an advanced intercrossed mouse line (B6D2F1) selected for high and low Pavlovian fear response. A known requirement for consolidation of fear memory, phosphorylated mitogen activated protein kinase (p44/42 (ERK) MAPK (pMAPK)) in the lateral amygdala (LA) is a reliable marker of fear learning-related plasticity. In this study, we asked whether high and low conditioned fear behavior is associated with differential pMAPK expression in the LA and if so, is it due to an increase in neurons expressing pMAPK or increased pMAPK per neuron. To examine this, we quantified pMAPK-expressing neurons in the LA at baseline and following Pavlovian fear conditioning. Results indicate that high fear phenotype mice have more pMAPK-expressing neurons in the LA. This finding suggests that increased endogenous plasticity in the LA may be a component of higher conditioned fear responses and begins to explain at the cellular level how different fear responders encode fear memories. Understanding how high and low fear responders encode fear memory will help identify novel ways in which fear-related illness risk can be better predicted and treated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Blood metaphors abound in everyday social discourse among both Aboriginal and non-Aboriginal people. However, ‘Aboriginal blood talk’, more specifically, is located within a contradictory and contested space in terms of the meanings and values that can be attributed to it by Aboriginal and non-Aboriginal people. In the colonial context, blood talk operated as a tool of oppression for Aboriginal people via blood quantum discourses, yet today, Aboriginal people draw upon notions of blood, namely bloodlines, in articulating their identities. This paper juxtaposes contemporary Aboriginal blood talk as expressed by Aboriginal people against colonial blood talk and critically examines the ongoing political and intellectual governance regarding the validity of this talk in articulating Aboriginalities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Andreasen (2003) argues that there is a ‘starting change’ bias in the social marketing field as much research is centred on inducing initial behavioural change. However, repeat or maintenance behaviour is often critical to achieving social goals across many domains. For instance, the repeat use of professional therapeutic services is vital for improved mental health, although premature discontinuance of service use is common (Wang, 2007). This study contributes to addressing this gap in the social marketing literature by exploring key drivers of maintenance behaviour, in the form of repeat service use, in mental health. This is in line with Andreasen’s (1994) argument that social marketing is an appropriate approach to addressing mental health challenges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The requirement of isolated relays is one of the prime obstacles in utilizing sequential slotted cooperative protocols for Vehicular Ad-hoc Networks (VANET). Significant research advancement has taken place to improve the diversity multiplexing trade-off (DMT) of cooperative protocols in conventional mobile networks without much attention on vehicular ad-hoc networks. We have extended the concept of sequential slotted amplify and forward (SAF) protocols in the context of urban vehicular ad-hoc networks. Multiple Input Multiple Output (MIMO) reception is used at relaying vehicular nodes to isolate the relays effectively. The proposed approach adds a pragmatic value to the sequential slotted cooperative protocols while achieving attractive performance gains in urban VANETs. We have analysed the DMT bounds and the outage probabilities of the proposed scheme. The results suggest that the proposed scheme can achieve an optimal DMT similar to the DMT upper bound of the sequential SAF. Furthermore, the outage performance of the proposed scheme outperforms the SAF protocol by 2.5 dB at a target outage probability of 10-4.