970 resultados para Critical problems
Resumo:
The welfare sector has seen considerable changes in its operational context. Welfare services respond to an increasing number of challenges as citizens are confronted with life’s uncertainties and a variety of complex situations. At the same time the service-delivery system is facing problems of co-operation and the development of staff competence, as well as demands to improve service effectiveness and outcomes. In order to ensure optimal user outcomes in this complex, evolving environment it is necessary to enhance professional knowledge and skills, and to increase efforts to develop the services. Changes are also evident in the new emergent knowledge-production models. There has been a shift from knowledge acquisition and transmission to its construction and production. New actors have stepped in and the roles of researchers are subject to critical discussion. Research outcomes, in other words the usefulness of research with respect to practice development, is a topical agenda item. Research is needed, but if it is to be useful it needs to be not only credible but also useful in action. What do we know about different research processes in practice? What conceptions, approaches, methods and actor roles are embedded? What is the effect on practice? How does ‘here and now’ practice challenge research methods? This article is based on the research processes conducted in the institutes of practice research in social work in Finland. It analyses the different approaches applied by elucidating the theoretical standpoints and the critical elements embedded in them, and reflects on the outcomes in and for practice. It highlights the level of change and progression in practice research, arguing for diverse practice research models with a solid theoretical grounding, rigorous research processes, and a supportive infrastructure.
Resumo:
BACKGROUND Critical incidents in clinical medicine can have far-reaching consequences on patient health. In cases of severe medical errors they can seriously harm the patient or even lead to death. The involvement in such an event can result in a stress reaction, a so-called acute posttraumatic stress disorder in the healthcare provider, the so-called second victim of an adverse event. Psychological distress may not only have a long lasting impact on quality of life of the physician or caregiver involved but it may also affect the ability to provide safe patient care in the aftermath of adverse events. METHODS A literature review was performed to obtain information on care giver responses to medical errors and to determine possible supportive strategies to mitigate negative consequences of an adverse event on the second victim. An internet search and a search in Medline/Pubmed for scientific studies were conducted using the key words "second victim, "medical error", "critical incident stress management" (CISM) and "critical incident stress reporting system" (CIRS). Sources from academic medical societies and public institutions which offer crisis management programs where analyzed. The data were sorted by main categories and relevance for hospitals. Analysis was carried out using descriptive measures. RESULTS In disaster medicine and aviation navigation services the implementation of a CISM program is an efficient intervention to help staff to recover after a traumatic event and to return to normal functioning and behavior. Several other concepts for a clinical crisis management plan were identified. CONCLUSIONS The integration of CISM and CISM-related programs in a clinical setting may provide efficient support in an acute crisis and may help the caregiver to deal effectively with future error events and employee safety.
Resumo:
The two major subtypes of diffuse large B-cell lymphoma (DLBCL) (germinal centre B-cell - like (GCB-DLBCL) and activated B-cell - like (ABC-DLBCL)) are defined by means of gene expression profiling (GEP). Patients with GCB-DLBCL survive longer with the current standard regimen R-CHOP than patients with ABC-DLBCL. As GEP is not part of the current routine diagnostic work-up, efforts have been made to find a substitute than involves immunohistochemistry (IHC). Various algorithms achieved this with 80-90% accuracy. However, conflicting results on the appropriateness of IHC have been reported. Because it is likely that the molecular subtypes will play a role in future clinical practice, we assessed the determination of the molecular DLBCL subtypes by means of IHC at our University Hospital, and some aspects of this determination elsewhere in Switzerland. The most frequently used Hans algorithm includes three antibodies (against CD10, bcl-6 and MUM1). From records of the routine diagnostic work-up, we identified 51 of 172 (29.7%) newly diagnosed and treated DLBCL cases from 2005 until 2010 with an assigned DLBCL subtype. DLBCL subtype information was expanded by means of tissue microarray analysis. The outcome for patients with the GCB subtype was significantly better compared with those with the non-GC subtype, independent of the age-adjusted International Prognostic Index. We found a lack of standardisation in the subtype determination by means of IHC in Switzerland and significant problems of reproducibility. We conclude that the Hans algorithm performs well in our hands and that awareness of this important matter is increasing. However, outside clinical trials, vigorous efforts to standardise IHC determination are needed as DLBCL subtype-specific therapies emerge.
Resumo:
PURPOSE: Many rectal cancer patients undergo abdominoperineal excision worldwide every year. Various procedures to restore perineal (pseudo-) continence, referred to as total anorectal reconstruction, have been proposed. The best technique, however, has not yet been defined. In this study, the different reconstruction techniques with regard to morbidity, functional outcome and quality of life were analysed. Technical and timing issues (i.e. whether the definitive procedure should be performed synchronously or be delayed), oncological safety, economical aspects as well as possible future improvements are further discussed. METHODS: A MEDLINE and EMBASE search was conducted to identify the pertinent multilingual literature between 1989 and 2013. All publications meeting the defined inclusion/exclusion criteria were eligible for analysis. RESULTS: Dynamic graciloplasty, artificial bowel sphincter, circular smooth muscle cuff or gluteoplasty result in median resting and squeezing neo-anal pressures that equate to the measurements found in incontinent patients. However, quality of life was generally stated to be good by patients who had undergone the procedures, despite imperfect continence, faecal evacuation problems and a considerable associated morbidity. Many patients developed an alternative perception for the urge to defecate that decisively improved functional outcome. Theoretical calculations suggested cost-effectiveness of total anorectal reconstruction compared well to life with a permanent colostomy. CONCLUSIONS: Many patients would be highly motivated to have their abdominal replaced by a functional perineal colostomy. Given the considerable morbidity and questionable functional outcome of current reconstruction technique improvements are required. Tissue engineering might be an option to design an anatomically and physiologically matured, and customised continence organ.
Resumo:
Cloudification of the Centralized-Radio Access Network (C-RAN) in which signal processing runs on general purpose processors inside virtual machines has lately received significant attention. Due to short deadlines in the LTE Frequency Division Duplex access method, processing time fluctuations introduced by the virtualization process have a deep impact on C-RAN performance. This paper evaluates bottlenecks of the OpenAirInterface (OAI is an open-source software-based implementation of LTE) cloud performance, provides feasibility studies on C-RAN execution, and introduces a cloud architecture that significantly reduces the encountered execution problems. In typical cloud environments, the OAI processing time deadlines cannot be guaranteed. Our proposed cloud architecture shows good characteristics for the OAI cloud execution. As an example, in our setup more than 99.5% processed LTE subframes reach reasonable processing deadlines close to performance of a dedicated machine.
Resumo:
This study examines incidents involving a tense atmosphere combined with higher risk of football fan violence. A systematic description of such critical incidents (CIs) identifying their risk factors and warning signs is yet lacking. This study looks beyond fans’ violent acts per se and focuses on CIs involving ultra fans with a potentially – but not necessarily – violent outcome. A preliminary study involving a focus group was conducted followed by a main study including eight case studies. The focus group comprised five professionals working with football fans who discussed CIs’ observable characteristics. Risk factors and warning signs were coded using content analysis, such as, ‘arrest of a fan’. In the main study, people involved in actual CIs were interviewed to explore these phenomena in more depth. An integrated model of CIs’ dynamics, risk factors and warning signs was compiled using data gathered in both studies.
Resumo:
Introduction: Fan violence is a frequent occurrence in Swiss football (Bundesamt für Polizei, 2015) leading to high costs for prevention and control (Mensch & Maurer, 2014). Various theories put forward an explanation of fan violence, such as the Elaborated Social Identity Model (Drury & Reicher, 2000)and the Aggravation Mitigation Model (Hylander & Guvå, 2010). Important observations from these theories are the multi-dimensional understanding of fan violence and the Dynamics occurring in the fan group. Nevertheless, none of them deal with critical incidents (CIs) which involve a tense atmosphere combined with a higher risk of fan violence. Schumacher Dimech, Brechbühl and Seiler (2015) tackled this gap in research and explored CIs where 43 defining criteria were identified and compiled in an integrated model of CIs. The defining criteria were categorised in four higher-order themes “antecedents” (e.g. a documented history of fan rivalry), “triggers” (e.g. the arrest of a fan), “reactions” (e.g. fans masking themselves) and “consequences” (e.g. fans avoiding communication with fan social workers). Methods: An inventory based on this model is being developed including these 43 criteria. In an exploratory phase, this inventory was presented as an online questionnaire and was completed by 143 individuals. Three main questions are examined: Firstly, the individual items are tested using descriptive analyses. An item analysis is conducted to test reliability, item difficulty and discriminatory power. Secondly, the model’s four higher-order themes are tested using exploratory factor analysis (EFA). Thirdly, differences between sub -groups are explored, such as gender and age-related differences. Results: Respondents rated the items’ importance as high and the quota of incomplete responses was not systematic. Two items were removed from the inventory because of low mean or a high rate of “don’t know”-responses. EFA produced a six-factor solution grouping items into match-related factors, repressive measures, fans’ delinquent behaviour, intra-group behaviour, communication and control and inter-group factors. The item “fans consume alcohol” could not be ordered into any category but was retained since literature accentuates this factor’s influence on fan violence. Analyses examining possible differences between groups are underway. Discussion: Results exploring the adequacy of this inventory assessing defining criteria of CIs in football are promising and thus further evaluative investigation is recommended. This inventory can be used in two ways: as a standardised instrument of assessment for experts evaluating specific CIs and as an instrument for exploring differences in perception and assessment of a CI e.g. gender and age differences, differences between interest groups and stakeholders.
Resumo:
Introduction. Selectively manned units have a long, international history, both military and civilian. Some examples include SWAT teams, firefighters, the FBI, the DEA, the CIA, and military Special Operations. These special duty operators are individuals who perform a highly skilled and dangerous job in a unique environment. A significant amount of money is spent by the Department of Defense (DoD) and other federal agencies to recruit, select, train, equip and support these operators. When a critical incident or significant life event occurs, that jeopardizes an operator's performance; there can be heavy losses in terms of training, time, money, and potentially, lives. In order to limit the number of critical incidents, selection processes have been developed over time to “select out” those individuals most likely to perform below desired performance standards under pressure or stress and to "select in" those with the "right stuff". This study is part of a larger program evaluation to assess markers that identify whether a person will fail under the stresses in a selectively manned unit. The primary question of the study is whether there are indicators in the selection process that signify potential negative performance at a later date. ^ Methods. The population being studied included applicants to a selectively manned DoD organization between 1993 and 2001 as part of a unit assessment and selection process (A&S). Approximately 1900 A&S records were included in the analysis. Over this nine year period, seventy-two individuals were determined to have had a critical incident. A critical incident can come in the form of problems with the law, personal, behavioral or family problems, integrity issues, and skills deficit. Of the seventy-two individuals, fifty-four of these had full assessment data and subsequent supervisor performance ratings which assessed how an individual performed while on the job. This group was compared across a variety of variables including demographics and psychometric testing with a group of 178 individuals who did not have a critical incident and had been determined to be good performers with positive ratings by their supervisors.^ Results. In approximately 2004, an online pre-screen survey was developed in the hopes of preselecting out those individuals with items that would potentially make them ineligible for selection to this organization. This survey has aided the organization to increase its selection rates and save resources in the process. (Patterson, Howard Smith, & Fisher, Unit Assessment and Selection Project, 2008) When the same prescreen was used on the critical incident individuals, it was found that over 60% of the individuals would have been flagged as unacceptable. This would have saved the organization valuable resources and heartache.^ There were some subtle demographic differences between the two groups (i.e. those with critical incidents were almost twice as likely to be divorced compared with the positive performers). Upon comparison of Psychometric testing several items were noted to be different. The two groups were similar when their IQ levels were compared using the Multidimensional Aptitude Battery (MAB). When looking at the Minnesota Multiphasic Personality Inventory (MMPI), there appeared to be a difference on the MMPI Social Introversion; the Critical Incidence group scored somewhat higher. When analysis was done, the number of MMPI Critical Items between the two groups was similar as well. When scores on the NEO Personality Inventory (NEO) were compared, the critical incident individuals tended to score higher on Openness and on its subscales (Ideas, Actions, and Feelings). There was a positive correlation between Total Neuroticism T Score and number of MMPI critical items.^ Conclusions. This study shows that the current pre-screening process is working and would have saved the organization significant resources. ^ If one was to develop a profile of a candidate who potentially could suffer a critical incident and subsequently jeopardize the unit, mission and the safety of the public they would look like the following: either divorced or never married, score high on the MMPI in Social Introversion, score low on MMPI with an "excessive" amount of MMPI critical items; and finally scores high on the NEO Openness and subscales Ideas, Feelings, and Actions.^ Based on the results gleaned from the analysis in this study there seems to be several factors, within psychometric testing, that when taken together, will aid the evaluators in selecting only the highest quality operators in order to save resources and to help protect the public from unfortunate critical incidents which may adversely affect our health and safety.^
Resumo:
A review of existing literature revealed at least two distinct theoretical perspectives or schools of thought which are troubled by problems of the lack of participation in the workplace: Jurgen Habermas' ideal of communicative rationality (1984; 1987); and the field of workplace democracy. Whereas Habermas' ideal of communicative rationality establishes communication as necessary to attain a democratic workplace, the ideal of workplace democracy focuses on a participatory ideal in which conditions of open participation must be fulfilled in order to attain a democratic workplace. This study compared the strengths and weaknesses of the conditions proposed by Habermas with the strengths and weaknesses of the conditions selected to represent the workplace democracy ideal. Two incidents were selected for analysis which occurred within a period of one year within one large healthcare organization. The author was present as a participant-observer to assess these incidents. Each of the conditions for the ideal of communicative rationality and for the workplace democracy ideal was systematically applied to both incidents selected for analysis. The results of the analysis suggested that application of Habermas' theory provided more insight into potential distortions in communication than did the conditions selected to represent workplace democracy. Although the conditions of both models were frequently complementary and even overlapping at times, application of each theory to the same incident produced distinctly different results. ^
Resumo:
Growing scarcity, increasing demand and bad management of water resources are causing weighty competition for water and consequently managers are facing more and more pressure in an attempt to satisfy users? requirement. In many regions agriculture is one of the most important users at river basin scale since it concentrates high volumes of water consumption during relatively short periods (irrigation season), with a significant economic, social and environmental impact. The interdisciplinary characteristics of related water resources problems require, as established in the Water Framework Directive 2000/60/EC, an integrated and participative approach to water management and assigns an essential role to economic analysis as a decision support tool. For this reason, a methodology is developed to analyse the economic and environmental implications of water resource management under different scenarios, with a focus on the agricultural sector. This research integrates both economic and hydrologic components in modelling, defining scenarios of water resource management with the goal of preventing critical situations, such as droughts. The model follows the Positive Mathematical Programming (PMP) approach, an innovative methodology successfully used for agricultural policy analysis in the last decade and also applied in several analyses regarding water use in agriculture. This approach has, among others, the very important capability of perfectly calibrating the baseline scenario using a very limited database. However one important disadvantage is its limited capacity to simulate activities non-observed during the reference period but which could be adopted if the scenario changed. To overcome this problem the classical methodology is extended in order to simulate a more realistic farmers? response to new agricultural policies or modified water availability. In this way an economic model has been developed to reproduce the farmers? behaviour within two irrigation districts in the Tiber High Valley. This economic model is then integrated with SIMBAT, an hydrologic model developed for the Tiber basin which allows to simulate the balance between the water volumes available at the Montedoglio dam and the water volumes required by the various irrigation users.
Resumo:
Despite that Critical Infrastructures (CIs) security and surveillance are a growing concern for many countries and companies, Multi Robot Systems (MRSs) have not been yet broadly used in this type of facilities. This dissertation presents a novel study of the challenges arisen by the implementation of this type of systems and proposes solutions to specific problems. First, a comprehensive analysis of different types of CIs has been carried out, emphasizing the influence of the different characteristics of the facilities in the design of a security and surveillance MRS. One of the most important needs for the surveillance of a CI is the detection of intruders. From a technical point of view this problem can be abstracted as equivalent to the Detection and Tracking of Mobile Objects (DATMO). This dissertation proposes algorithms to solve this specific problem in a CI environment. Using 3D range images of the environment as input data, two detection algorithms for ground robots have been developed. These detection algorithms provide a list of moving objects in the robot detection area. Direct image differentiation and computer vision techniques are used when the robot is static. Alternatively, multi-layer ground reconstructions are compared to detect the dynamic objects when the robot is moving. Since CIs usually spread over large areas, it is very useful to incorporate aerial vehicles in the surveillance MRS. Therefore, a moving object detection algorithm for aerial vehicles has been also developed. This algorithm compares the real optical flow obtained from a down-face oriented camera with an artificial optical flow computed using a RANSAC based homography matrix. Two tracking algorithms have been developed to follow the moving objects trajectories. These algorithms can efficiently handle occlusions and crossings, as well as exchange information among robots. The multirobot tracking can be applied to any type of communication structure: centralized, decentralized or a combination of both. Even more, the developed tracking algorithms are independent of the detection algorithms and could be potentially used with other detection procedures or even with static sensors, such as cameras. In addition, using the 3D point clouds available to the robots, a relative localization algorithm has been developed to improve the position estimation of a given robot with observations from other robots. All the developed algorithms have been extensively tested in different simulated CIs using the Webots robotics simulator. Furthermore, the algorithms have also been validated with real robots operating in real scenarios. In conclusion, this dissertation presents a multirobot approach to Critical Infrastructure Surveillance, mainly focusing on Detecting and Tracking Dynamic Objects.
Resumo:
Pervasive computing offers new scenarios where users are surrounded by invisible and proactive technology making smart spaces. Although the utility and power of solutions developed using this computer paradigm are proved, there are unresolved problems that hinder their acceptance and inclusion in our private life. Users have problems understanding the operations of a pervasive computing solution, and therefore they should trust that the solution works properly and according to their expectations. Nevertheless, the concept of trust is already framed in a specific use within the ecosystem of applications that can populate a smart space. To take this concept of trust to the whole space, we propose to study and define the concept of confidence. In contrast to the concept of trust, confidence has deeper psychological implications.
Resumo:
Passengers comfort in terms of acoustic noise levels is a key train design parameter, especially relevant in high speed trains, where the aerodynamic noise is dominant. The aim of the work, described in this paper, is to make progress in the understanding of the flow field around high speed trains in an open field, which is a subject of interest for many researchers with direct industrial applications, but also the critical configuration of the train inside a tunnel is studied in order to evaluate the external loads arising from noise sources of the train. The airborne noise coming from the wheels (wheelrail interaction), which is the dominant source at a certain range of frequencies, is also investigated from the numerical and experimental points of view. The numerical prediction of the noise in the interior of the train is a very complex problem, involving many different parameters: complex geometries and materials, different noise sources, complex interactions among those sources, broad range of frequencies where the phenomenon is important, etc. During recent years a research plan is being developed at IDR/UPM (Instituto de Microgravedad Ignacio Da Riva, Universidad Politécnica de Madrid) involving both numerical simulations, wind tunnel and full-scale tests to address this problem. Comparison of numerical simulations with experimental data is a key factor in this process.