919 resultados para Dangerous situations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Improving hand hygiene among health care workers (HCWs) is the single most effective intervention to reduce health care associated infections in hospitals. Understanding the cognitive determinants of hand hygiene decisions for HCWs with the greatest patient contact (nurses) is essential to improve compliance. The aim of this study was to explore hospital-based nurses’ beliefs associated with performing hand hygiene guided by the World Health Organization’s (WHO) 5 critical moments. Using the belief-base framework of the Theory of Planned Behaviour, we examined attitudinal, normative, and control beliefs underpinning nurses’ decisions to perform hand hygiene according to the recently implemented national guidelines. Methods Thematic content analysis of qualitative data from focus group discussions with hospital-based registered nurses from 5 wards across 3 hospitals in Queensland, Australia. Results Important advantages (protection of patient and self), disadvantages (time, hand damage), referents (supportive: patients, colleagues; unsupportive: some doctors), barriers (being too busy, emergency situations), and facilitators (accessibility of sinks/products, training, reminders) were identified. There was some equivocation regarding the relative importance of hand washing following contact with patient surroundings. Conclusions The belief base of the theory of planned behaviour provided a useful framework to explore systematically the underlying beliefs of nurses’ hand hygiene decisions according to the 5 critical moments, allowing comparisons with previous belief studies. A commitment to improve nurses’ hand hygiene practice across the 5 moments should focus on individual strategies to combat distraction from other duties, peer-based initiatives to foster a sense of shared responsibility, and management-driven solutions to tackle staffing and resource issues. Hand hygiene following touching a patient’s surroundings continues to be reported as the most neglected opportunity for compliance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Communication and information diffusion are typically difficult in situations where centralised structures may become unavailable. In this context, decentralised communication based on epidemic broadcast becomes essential. It can be seen as an opportunity-based flooding for message broadcasting within a swarm of autonomous agents, where each entity tries to share the information it possesses with its neighbours. As an example of applications for such a system, we present simulation results where agents have to coordinate to map an unknown area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Events that involve food and eating are important parts of the daily routine in which adults and children participate in child care settings. These events can be viewed as cultural practices because they involve certain everyday ways of acting, thinking or feeling (Grusec JE et al, Child Dev 71(1): 205–211, 2000). The cultural practices around food and eating symbolise and guide the social relations, emotions, social structures and behaviours of the participants. Identities and roles for the participants are created in these practices, marked by ambiguity, movement and fluidity through ongoing processes of negotiation (Punch S et al, Child Geogr 8(3): 227–232, 2010). The formal professional systems that guide these practices in early education and care programs often focus on the nutritional value of the food, while the children and teachers involved in these mealtime events account for the intersubjective experiences. Mealtimes provide opportunities for children and teachers to interact and co-construct meaning around the situations that arise. Of special interest in this research are teachers’ and children’s intentions for communication in the context of events involving food and eating and the kind of learning embedded in the communications that occur. Throughout this chapter, these events are referred to as mealtimes. This study is informed by phenomenological theory which aims to reach understandings about interactions and their meaning from the perspective of the participating individuals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Social support is an important moderator of poor well-being outcomes for nurses engaged in emotional labour with patients; however, the most effective support for renal nurses is not well understood compared with other specialties. Objectives: To identify patterns and themes in how renal nurses and two other specialties engage with patients’ emotional expressions, express their own emotion and access and provide support for emotional expenditure. Method: Renal, emergency and palliative care nurses from Perth, Western Australia, were interviewed. Results: Renal nurses engage in significant amounts of emotional labour with patients, and identify co-workers as the most important source of support due to their availability and a sense of shared experience. However, comparative analysis showed that renal nurses do not recognise their emotional expenditure as readily and have less certainty of co-worker support. Conclusions: Because their high levels of emotional engagement with patients are mostly positive, renal nurses are less prepared than other nurses to manage difficult emotional situations. As co-worker support is highly valued, organisations should train renal nurses specifically to support one another.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite moral prohibitions on hurting other humans, some social contexts allow for harmful actions such as the killing of others. One example is warfare, where killing enemy soldiers is seen as morally justified. Yet, the neural underpinnings distinguishing between justified and unjustified killing are largely unknown. To improve understanding of the neural processes involved in justified and unjustified killing, participants had to imagine being the perpetrator whilst watching “first-person perspective” animated videos where they shot enemy soldiers (‘justified violence’) and innocent civilians (‘unjustified violence’). When participants imagined themselves shooting civilians compared to soldiers, greater activation was found in the lateral orbitofrontal cortex (OFC). Regression analysis revealed that the more guilt participants felt about shooting civilians, the greater the response in the lateral OFC. Effective connectivity analyses further revealed an increased coupling between lateral OFC and the tempoparietal junction (TPJ) when shooting civilians. The results show that the neural mechanisms typically implicated with harming others, such as the OFC, become less active when the violence against a particular group is seen as justified. This study therefore provides unique insight into how normal individuals can become aggressors in specific situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The understanding of the load applied on the residuum through the prosthesis of individuals with transfemoral amputation (TFA) is essential to address a number of concerns that could strongly reduce their quality of life (e.g., residuum skin lesion, prosthesis fitting, alignment). This inner prosthesis loading could be estimated using a typical gait laboratory relying on inverse dynamics equations. Alternative, technological advances proposed over the last decade enabled direct measurement of this kinetic information in a broad variety of situations that could potentially be more relevant in clinical settings. The purposes of this presentation are (A) to review the literature about recent developments in measure and analyses of inner prosthesis loading of TFA, and (B) to extract information that could potentially contribute to a better evidence-based practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Experts are increasingly being called upon to quantify their knowledge, particularly in situations where data is not yet available or of limited relevance. In many cases this involves asking experts to estimate probabilities. For example experts, in ecology or related fields, might be called upon to estimate probabilities of incidence or abundance of species, and how they relate to environmental factors. Although many ecologists undergo some training in statistics at undergraduate and postgraduate levels, this does not necessarily focus on interpretations of probabilities. More accurate elicitation can be obtained by training experts prior to elicitation, and if necessary tailoring elicitation to address the expert’s strengths and weaknesses. Here we address the first step of diagnosing conceptual understanding of probabilities. We refer to the psychological literature which identifies several common biases or fallacies that arise during elicitation. These form the basis for developing a diagnostic questionnaire, as a tool for supporting accurate elicitation, particularly when several experts or elicitors are involved. We report on a qualitative assessment of results from a pilot of this questionnaire. These results raise several implications for training experts, not only prior to elicitation, but more strategically by targeting them whilst still undergraduate or postgraduate students.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mining industry is highly suitable for the application of robotics and automation technology since the work is both arduous and dangerous. However, while the industry makes extensive use of mechanisation it has shown a slow uptake of automation. A major cause of this is the complexity of the task, and the limitations of existing automation technology which is predicated on a structured and time invariant working environment. Here we discuss the topic of mining automation from a robotics and computer vision perspective — as a problem in sensor based robot control, an issue which the robotics community has been studying for nearly two decades. We then describe two of our current mining automation projects to demonstrate what is possible for both open-pit and underground mining operations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mining industry is highly suitable for the application of robotics and automation technology since the work is arduous, dangerous and often repetitive. This paper discusses a robust sensing system developed to find and trade the position of the hoist ropes of a dragline. Draglines are large `walking cranes' used in open-pit coal mining to remove the material covering the coal seam. The rope sensing system developed uses two time-of-flight laser scanners. The finding algorithm uses a novel data association and tracking strategy based on pairing rope data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mining industry is highly suitable for the application of robotics and automation technology since the work is arduous, dangerous and often repetitive. This paper describes the development of an automation system for a physically large and complex field robotic system - a 3,500 tonne mining machine (a dragline). The major components of the system are discussed with a particular emphasis on the machine/operator interface. A very important aspect of this system is that it must work cooperatively with a human operator, seamlessly passing the control back and forth in order to achieve the main aim - increased productivity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mining industry is highly suitable for the application of robotics and automation technology since the work is both arduous and dangerous. Visual servoing is a means of integrating noncontact visual sensing with machine control to augment or replace operator based control. This article describes two of our current mining automation projects in order to demonstrate some, perhaps unusual, applications of visual servoing, and also to illustrate some very real problems with robust computer vision

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years disaster risk reduction efforts have focused on disturbances ranging from climate variability, seismic hazards, geo-political instability and public and animal health crises. These factors combined with uncertainty derived from inter-dependencies within and across systems of critical infrastructure create significant problems of governance for the private and public sector alike. The potential for rapid spread of impacts, geographically and virtually, can render a comprehensive understanding of disaster response and recovery needs and risk mitigation issues beyond the grasp of competent authority. Because of such cascading effects communities and governments at local and state-levels are unlikely to face single incidents but rather series of systemic impacts: often appearing concurrently. A further point to note is that both natural and technological hazards can act directly on socio-technical systems as well as being propagated by them: as network events. Such events have been categorised as ‘outside of the box,’ ‘too fast,’ and ‘too strange’ (Lagadec, 2004). Emergent complexities in linked systems can make disaster effects difficult to anticipate and recovery efforts difficult to plan for. Beyond the uncertainties of real world disasters, that might be called familiar or even regular, can we safely assume that the generic capability we use now will suit future disaster contexts? This paper presents initial scoping of research funded by the Bushfire and Natural Hazards Cooperative Research Centre seeking to define future capability needs of disaster management organisations. It explores challenges to anticipating the needs of representative agencies and groups active in before, during and after phases of emergency and disaster situations using capability deficit assessments and scenario assessment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

3D printing (3Dp) has long been used in the manufacturing sector as a way to automate, accelerate production and reduce waste materials. It is able to build a wide variety of objects if the necessary specifications are provided to the printer and no problems are presented by the limited range of materials available. With 3Dp becoming cheaper, more reliable and, as a result, more prevalent in the world at large, it may soon make inroads into the construction industry. Little is known however, of 3Dp in current use the construction industry and its potential for the future and this paper seeks to rectify this situation by providing a review of the relevant literature. In doing this, the three main 3Dp methods of contour crafting, concrete printing and D-shape 3Dp are described which, as opposed to the traditional construction method of cutting materials down to size, deliver only what is needed for completion, vastly reducing waste. Also identified is 3Dp’s potential to enable buildings to be constructed many times faster and with significantly reduced labour costs. In addition, it is clear that construction 3Dp can allow the further inclusion of Building Information Modelling into the construction process - streamlining and improving the scheduling requirements of a project. However, current 3Dp processes are known to be costly, unsuited to large-scale products and conventional design approaches, and have a very limited range of materials that can be used. Moreover, the only successful examples of construction in action to date have occurred in controlled laboratory environments and, as real world trials have yet to be completed, it is yet to be seen whether it can be it equally proficient in practical situations. Key Words: 3D Printing; Contour Crafting; Concrete Printing; D-shape; Building Automation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the internet age, copyright owners are increasingly looking to online intermediaries to take steps to prevent copyright infringement. Sometimes these intermediaries are closely tied to the acts of infringement; sometimes – as in the case of ISPs – they are not. In 2012, the Australian High Court decided the Roadshow Films v iiNet case, in which it held that an Australian ISP was not liable under copyright’s authorization doctrine, which asks whether the intermediary has sanctioned, approved or countenanced the infringement. The Australian Copyright Act 1968 directs a court to consider, in these situations, whether the intermediary had the power to prevent the infringement and whether it took any reasonable steps to prevent or avoid the infringement. It is generally not difficult for a court to find the power to prevent infringement – power to prevent can include an unrefined technical ability to disconnect users from the copyright source, such as an ISP terminating users’ internet accounts. In the iiNet case, the High Court eschewed this broad approach in favor of focusing on a notion of control that was influenced by principles of tort law. In tort, when a plaintiff asserts that a defendant should be liable for failing to act to prevent harm caused to the plaintiff by a third party, there is a heavy burden on the plaintiff to show that the defendant had a duty to act. The duty must be clear and specific, and will often hinge on the degree of control that the defendant was able to exercise over the third party. Control in these circumstances relates directly to control over the third party’s actions in inflicting the harm. Thus, in iiNet’s case, the control would need to be directed to the third party’s infringing use of BitTorrent; control over a person’s ability to access the internet is too imprecise. Further, when considering omissions to act, tort law differentiates between the ability to control and the ability to hinder. The ability to control may establish a duty to act, and the court will then look to small measures taken to prevent the harm to determine whether these satisfy the duty. But the ability to hinder will not suffice to establish liability in the absence of control. This article argues that an inquiry grounded in control as defined in tort law would provide a more principled framework for assessing the liability of passive intermediaries in copyright. In particular, it would set a higher, more stable benchmark for determining the copyright liability of passive intermediaries, based on the degree of actual, direct control that the intermediary can exercise over the infringing actions of its users. This approach would provide greater clarity and consistency than has existed to date in this area of copyright law in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a current lack of understanding regarding the use of unregistered vehicles on public roads and road-related areas, and the links between the driving of unregistered vehicles and a range of dangerous driving behaviours. This report documents the findings of data analysis conducted to investigate the links between unlicensed driving and the driving of unregistered vehicles, and is an important initial undertaking into understanding these behaviours. This report examines de-identified data from two sources: crash data; and offence data. The data was extracted from the Queensland Department of Transport and Main Roads (TMR) databases and covered the period from 2003 to 2008.