420 research outputs found

    Electronic Waste Recycling and Disposal: An Overview

    Get PDF
    Electronic waste, or e-waste, is said to be the fastest growing stream of hazardous waste in the world. E-waste is comprised of a variety of inputs including hazardous materials, potentially valuable and recyclable materials, and other inputs. E-waste follows a range of pathways after disposal, including formal and informal recycling, storage, and dumping, in both developed and less-developed country contexts. Globally, the handling and regulation of e-waste as both a hazardous waste stream and as a source of secondary raw materials has undergone significant changes in the past decade. A growing number of countries have adopted extended producer responsibility laws, which mandate electronics manufacturers to pay for proper recycling and disposal of electronics. The e-waste recycling industry is becoming more formalized as the potential to recover valuable materials has increased, but a range of recent studies have shown that e-waste recycling continues to carry a range of occupational health and environmental risks

    Buying Data over Time: Approximately Optimal Strategies for Dynamic Data-Driven Decisions

    Get PDF
    We consider a model where an agent has a repeated decision to make and wishes to maximize their total payoff. Payoffs are influenced by an action taken by the agent, but also an unknown state of the world that evolves over time. Before choosing an action each round, the agent can purchase noisy samples about the state of the world. The agent has a budget to spend on these samples, and has flexibility in deciding how to spread that budget across rounds. We investigate the problem of choosing a sampling algorithm that optimizes total expected payoff. For example: is it better to buy samples steadily over time, or to buy samples in batches? We solve for the optimal policy, and show that it is a natural instantiation of the latter. Under a more general model that includes per-round fixed costs, we prove that a variation on this batching policy is a 2-approximation

    Identity tags: A vector for cross-infection?

    Get PDF
    Background. Nosocomial infections represent one of the challenging problems of modern medicine. Healthcare providers play an important role in the transmission of these infections on their hands, clothing and equipment. Modern security systems require personnel to wear clearly displayed identity (ID) tags, and to have an easily accessible access disc. These access and ID tags are often worn around the neck on a lanyard, and could possibly harbour bacteria and be a vector for cross-infection.Method. Saline-moistened swabs of the front and back of ID tags of 50 healthcare workers were taken for bacterial culture. Swabs were inoculated onto standard microbiological media. Potential pathogens were subjected to sensitivity testing while organisms resembling normal skin commensals were reported as such.Results. Twenty-eight of the 50 (56%) ID swabs cultured exhibited no bacterial growth. Eighteen (36%) swabs grew primarily skin flora. Neutrophils were observed under microscopy on two (4%) swabs. Seven (14%) swabs grew potentially pathogenic bacteria. Doctors were found to have almost three times the risk of carrying pathogenic bacteria on their ID tags compared with nurses. Recent patient contact also showed a higher incidence of colonisation. There were no statistically significant differences between variables such as ward or area of work, nature of patient contact, time since qualification, level of qualification or length of employment at Red Cross War Memorial Children’s Hospital, Cape Town, South Africa.Conclusions. Prevention of hospital-acquired infections is important in any setting. The ID tag has been identified as a possible source of infection spread in this and previous studies. The ID tag has to date been neglected as a potential source of pathogen spread, and efforts to make staff aware of this potential danger should be considered in every institution

    Eliminating Fruit and Vegetable Planting Restrictions: How Would Markets Be Affected?

    Get PDF
    Eighty-nine percent of American households were food secure throughout the entire year in 2005, meaning that they had access, at all times, to enough food for an active, healthy life for all household members. The remaining households were food insecure at least some time during that year. The prevalence of food insecurity declined from 11.9 percent of households in 2004 to 11.0 percent in 2005, while the prevalence of very low food security remained unchanged at 3.9 percent. This report, based on data from the December 2005 food security survey, provides the most recent statistics on the food security of U.S. households, as well as on how much they spent for food and the extent to which food-insecure households participated in Federal and community food assistance programs. Survey responses indicate that the typical food-secure household in the U.S. spent 34 percent more on food than the typical food-insecure household of the same size and household composition. Just over one-half of all food-insecure households participated in one or more of the three largest Federal food assistance programs during the month prior to the survey. About 22 percent of food-insecure households—3.5 percent of all U.S. households—obtained emergency food from a food pantry at some time during the year.Food security, food insecurity, food spending, food pantry, hunger, soup kitchen, emergency kitchen, material well-being, Food Stamp Program, National School, Crop Production/Industries,
    • …
    corecore