1,726 research outputs found

    Interactional accomplishments between nurses and doctors in a medical context

    Get PDF
    Includes bibliographical referencesThe use of language is significant in co-constructing reality. This highlights the way that speakers relate to each other through talk with the available discursive positionings in a specific context. An institutional context with particular asymmetrical relations introduces how the construction of reality is an area accessible to explore the use of language in maintaining and creating power relations. This research study explores institutional talk through conversation analysis. The focus is on asymmetrical working relations in medical settings. This considers the implications on individuals with a differentiating status with how power is managed in conversations. Nurses and doctors represent asymmetrical relations and their conversations illustrate differences in the way that language creates reality in a medical context, in this case a public teaching hospital in South Africa. Nurses and doctors were recorded during ward rounds, which spanned 22 hours of audio recordings. Approximately 40 ward rounds were followed where both a doctor and nurse were present. Ward rounds provided an opportunity to capture nurse-doctor conversations. The recordings were supplemented by ethnographic data that focused on the management of power. This focus is both at an individual interactional level and at a broader institutional level. Thus, showing how language coincides with the predominant subject positions available in a medical institution. The findings show how doctors do power overtly through various ways of speaking which show leadership in interactions. The findings also show how a doctor's subjectivity relates to qualities that continually build superiority in interactions. Nurses, on the other hand, manage power indirectly, by negotiating agency while enacting a passive actor role in conversations. Both doctors and nurses manage power and assertiveness, but continually show the sensitivity embedded in orienting themselves to one another. This aids in showing speaker support and is especially important for nurses, who are in a lower status, for managing their position in relation to doctors

    Cyber defensive capacity and capability::A perspective from the financial sector of a small state

    Get PDF
    This thesis explores ways in which the financial sectors of small states are able todefend themselves against ever-growing cyber threats, as well as ways these states can improve their cyber defense capability in order to withstand current andfuture attacks. To date, the context of small states in general is understudied. This study presents the challenges faced by financial sectors in small states with regard to withstanding cyberattacks. This study applies a mixed method approach through the use of various surveys, brainstorming sessions with financial sector focus groups, interviews with critical infrastructure stakeholders, a literature review, a comparative analysis of secondary data and a theoretical narrative review. The findings suggest that, for the Aruban financial sector, compliance is important, as with minimal drivers, precautionary behavior is significant. Countermeasures of formal, informal, and technical controls need to be in place. This study indicates the view that defending a small state such as Aruba is challenging, yet enough economic indicators indicate it not being outside the realm of possibility. On a theoretical level, this thesis proposes a conceptual “whole-of-cyber” model inspired by military science and the VSM (Viable Systems Model). The concept of fighting power components and governance S4 function form cyber defensive capacity’s shield and capability. The “whole-of-cyber” approach may be a good way to compensate for the lack of resources of small states. Collaboration may be an only out, as the fastest-growing need will be for advanced IT skillsets

    Corrections to Finite Size Scaling in Percolation

    Full text link
    A 1/L-expansion for percolation problems is proposed, where L is the lattice finite length. The square lattice with 27 different sizes L = 18, 22 ... 1594 is considered. Certain spanning probabilities were determined by Monte Carlo simulations, as continuous functions of the site occupation probability p. We estimate the critical threshold pc by applying the quoted expansion to these data. Also, the universal spanning probability at pc for an annulus with aspect ratio r=1/2 is estimated as C = 0.876657(45)

    A Transformative Process Control Solution

    Get PDF
    Knowing that a technology invented almost hundred years ago (PID controller) is still dominating industrial process control, a historical review was done to understand how the control field evolved. Model dependency and high level of mathematics appear as the main reasons that prevent other technologies from penetrating the engineering practice. A relatively novel methodology introduced by J. Han in 1998 called Active Disturbance Rejection Control (ADRC) came with characteristics that matches process control needs and restrictions on model dependency. This study will present a transformative solution for process control based on that. The control algorithm is designed and discretized for digital implementation in PLC or DSC. The tuning process is explained in a logical and intuitive way based on time and frequency domain characteristics. The idea was to use the language familiar to industry practitioners. To show its applicability, a case study was done for server’s temperature control; and the results show energy savings of 30% when compared to PID controllers. This solution is not yet optimal, since it is generally applicable for a wide range of processes, but it aims to be a step further in process control

    A Transformative Process Control Solution

    Get PDF
    Knowing that a technology invented almost hundred years ago (PID controller) is still dominating industrial process control, a historical review was done to understand how the control field evolved. Model dependency and high level of mathematics appear as the main reasons that prevent other technologies from penetrating the engineering practice. A relatively novel methodology introduced by J. Han in 1998 called Active Disturbance Rejection Control (ADRC) came with characteristics that matches process control needs and restrictions on model dependency. This study will present a transformative solution for process control based on that. The control algorithm is designed and discretized for digital implementation in PLC or DSC. The tuning process is explained in a logical and intuitive way based on time and frequency domain characteristics. The idea was to use the language familiar to industry practitioners. To show its applicability, a case study was done for server’s temperature control; and the results show energy savings of 30% when compared to PID controllers. This solution is not yet optimal, since it is generally applicable for a wide range of processes, but it aims to be a step further in process control

    The AI Family: The Information Security Managers Best Frenemy?

    Get PDF
    In this exploratory study, we deliberately pull apart the Artificial from the Intelligence, the material from the human. We first assessed the existing technological controls available to Information Security Managers (ISMs) to ensure their in-depth defense strategies. Based on the AI watch taxonomy, we then discuss each of the 15 technologies and their potential impact on the transformation of jobs in the field of security (i.e., AI trainers, AI explainers and AI sustainers). Additionally, in a pilot study we collect the evaluation and the narratives of the employees (n=6) of a small financial institution in a focus group session. We particularly focus on their perception of the role of AI systems in the future of cyber security

    BRS Gabriela.

    Get PDF
    bitstream/item/61844/1/Folder-BRS-Gabriela.pd

    A fault location method using Lamb waves and discrete wavelet transform

    Get PDF
    Non-destructive evaluation methods and signal process techniques are important steps in structural health monitoring systems to assess the structure integrity. This paper presents a method for fault location in aluminum beams based on time of flight of Lamb waves. The dynamic response signal captured from the structure was processed using the discrete wavelet transform. The information accuracy obtained from the processed signal depends on the correct choice of the mother wavelet. The best mother wavelet was selected using the Shannon's entropy criterion. Numerical results for a damage localized in different positions are presented using the spectral finite element method, and an experimental setup was used to assess the accuracy of the method. The results showed that the combination of the non-destructive evaluation technique based on Lamb waves with the discrete wavelet transform is effective in detecting and locating faults in aluminum beams whose results had errors less than 1%.51552
    corecore