961 resultados para Ward Round


Relevância:

100.00% 100.00%

Publicador:

Resumo:

© 2016 John Wiley & Sons Ltd.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

It is widely recognized that every workplace potentially provides a rich source of learning. Studies focusing on health care contexts have shown that social interaction within and between professions is crucial in enabling professionals to learn through work, address problems and cope with challenges of clinical practice. While hospital environments are beginning to be understood in spatial terms, the links between space and interprofessional learning at work have not been explored. This paper draws on Lefebvre’s tri-partite theoretical framework of perceived, conceived and lived space to enrich understandings of interprofessional learning on an acute care ward in an Australian teaching hospital. Qualitative analysis was undertaken using data from observations of Registered Nurses at work and semi-structured interviews linked to observed events. The paper focuses on a ward round, the medical workroom and the Registrar’s room, comparing and contrasting the intended (conceived), practiced (perceived) and pedagogically experienced (lived) spatial dimensions. The paper concludes that spatial theory has much to offer understandings of interprofessional learning in work, and the features of work environments and daily practices that produce spaces that enable or constrain learning.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Aim and objectives. The aim was to examine how graduate nurses communicated with other health professionals about their medication management activities in the acute care context. The objectives were to determine the types of information communicated about patients' medications and the communication processes used during interactions with other nurses, doctors and pharmacists.

Background. Graduate nurses are challenged with enormous responsibilities and their competence is constantly tested in an ever-changing arena. One of their responsibilities involves communicating with other health professionals about patients' medications.

Design. A qualitative exploratory research design was used for this study.

Methods. Participant observation and semi-structured interviews were conducted to elicit information from 12 graduate nurses with university degrees employed in a metropolitan public hospital, in Melbourne, Australia. Graduate nurses were observed once for two hours and interviewed on the same day of the observation at a mutually convenient time. The purpose of these interviews was to clarify activities observed and to obtain further information.

Results. The results highlighted how work dynamics of the clinical setting had an impact on the ability of graduate nurses to communicate effectively with other nurses, doctors and pharmacists. These work dynamics included the availability of doctors and the structure of ward rounds. The results also demonstrated the value graduate nurses placed on communicating particular information such as evaluating the effect of medication changes and organizing discharge medication.

Conclusions. Graduate nurses were effective in communicating about medication management activities when they initiated or were prepared for such interactions. When graduate nurses were not prepared, such as during impromptu ward rounds, they did not participate effectively and important information was not communicated.

Relevance to clinical practice. It is important to understand how collegial communication facilitates accurate exchange of information and effective decision-making to achieve optimal health care outcomes for patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Providing support for reversible transformations as a basis for round-trip engineering is a significant challenge in model transformation research. While there are a number of current approaches, they require the underlying transformation to exhibit an injective behaviour when reversing changes. This however, does not serve all practical transformations well. In this paper, we present a novel approach to round-trip engineering that does not place restrictions on the nature of the underlying transformation. Based on abductive logic programming, it allows us to compute a set of legitimate source changes that equate to a given change to the target model. Encouraging results are derived from an initial prototype that supports most concepts of the Tefkat transformation language

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Manchester, Manchester University Press, 2002, xvi + 256 pp., £14.99 (pbk), ISBN 0719058880

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the quest for shorter time-to-market, higher quality and reduced cost, model-driven software development has emerged as a promising approach to software engineering. The central idea is to promote models to first-class citizens in the development process. Starting from a set of very abstract models in the early stage of the development, they are refined into more concrete models and finally, as a last step, into code. As early phases of development focus on different concepts compared to later stages, various modelling languages are employed to most accurately capture the concepts and relations under discussion. In light of this refinement process, translating between modelling languages becomes a time-consuming and error-prone necessity. This is remedied by model transformations providing support for reusing and automating recurring translation efforts. These transformations typically can only be used to translate a source model into a target model, but not vice versa. This poses a problem if the target model is subject to change. In this case the models get out of sync and therefore do not constitute a coherent description of the software system anymore, leading to erroneous results in later stages. This is a serious threat to the promised benefits of quality, cost-saving, and time-to-market. Therefore, providing a means to restore synchronisation after changes to models is crucial if the model-driven vision is to be realised. This process of reflecting changes made to a target model back to the source model is commonly known as Round-Trip Engineering (RTE). While there are a number of approaches to this problem, they impose restrictions on the nature of the model transformation. Typically, in order for a transformation to be reversed, for every change to the target model there must be exactly one change to the source model. While this makes synchronisation relatively “easy”, it is ill-suited for many practically relevant transformations as they do not have this one-to-one character. To overcome these issues and to provide a more general approach to RTE, this thesis puts forward an approach in two stages. First, a formal understanding of model synchronisation on the basis of non-injective transformations (where a number of different source models can correspond to the same target model) is established. Second, detailed techniques are devised that allow the implementation of this understanding of synchronisation. A formal underpinning for these techniques is drawn from abductive logic reasoning, which allows the inference of explanations from an observation in the context of a background theory. As non-injective transformations are the subject of this research, there might be a number of changes to the source model that all equally reflect a certain target model change. To help guide the procedure in finding “good” source changes, model metrics and heuristics are investigated. Combining abductive reasoning with best-first search and a “suitable” heuristic enables efficient computation of a number of “good” source changes. With this procedure Round-Trip Engineering of non-injective transformations can be supported.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.