582 research outputs found

    Protection of the water environment using balancing facilities.

    Get PDF
    A monitoring programme of water quality was carried out during wet and dry weather conditions in two balancing ponds adjacent to the A34 Newbury By-pass. The ponds were constructed to treat and store stormwater runoff. Pond B was a vegetated pond planted with Phragmites australis and Pond F/G was a constructed wetland with a sub-surface flow system and P. australis at the inlet and, initially, Typha latifolia at the outlet although this was later replaced by Phragmites. There was little difference between the pollutant removal performances of both ponds although Pond F/G was sometimes more efficient in removing nickel and nitrate and zinc during the summer. Recommendations are made for the design, construction, operation and maintenance and future monitoring of wetlands for highway runoff treatment

    The accessibility of research-based knowledge for nurses in United Kingdom acute care settings

    Get PDF
    Background. The successful dissemination of the results of the National Health Service (NHS) research and development strategy and the development of evidence based approaches to health care rely on clinicians having access to the best available evidence; evidence fit for the purpose of reducing the uncertainties associated with clinical decisions. Aim. To reveal the accessibility of those sources of information actually used by nurses, as well as those which they say they use. Design. Mixed method case site, using interview, observational, Q sort and documentary audit data in medical, surgical and coronary care units (CCUs) in three acute hospitals. Results. Three perspectives on accessibility were identified: (a) the humanist-in which human sources of information were the most accessible; (b) local information for local needs-in which locally produced resources were seen as the most accessible and (c) moving towards technology-in which information technology begins to be seen as accessible. Nurses' experience in a clinical specialty is positively associated with a perception that human sources such clinical nurse specialists, link nurses, doctors and experienced clinical colleagues are more accessible than text based sources. Clinical specialization is associated with different approaches to accessing research knowledge. Coronary care unit nurses were more likely perceive local guidelines, protocols and on-line databases as more accessible than their counterparts in general medical and surgical wards. Only a third of text-based resources available to nurses oil the wards had any explicit research base. These, and the remainder were Out of date (mean age of textbooks 11 years), and authorship hard to ascertain. Conclusion. A strategy to increase the use of research evidence by nurses should harness the influence of clinical nurse specialists, link nurses and those engaged in practice development. These roles Could act as 'conduits' through which research-based messages for practice, and information for clinical decision making, could flow. This role should be explored and enhanced

    FBI fingerprint identification automation study: AIDS 3 evaluation report. Volume 8: Measures of effectiveness

    Get PDF
    The development of both quantitative criteria that were used to evaluate conceptional systems for automating the functions for the FBI Identification Division is described. Specific alternative systems for automation were compared by using these developed criteria, defined as Measures of Effectiveness (MOE), to gauge system's performance in attempting to achieve certain goals. The MOE, essentially measurement tools that were developed through the combination of suitable parameters, pertain to each conceivable area of system operation. The methods and approaches used, both in selecting the parameters and in using the resulting MOE, are described

    FBI fingerprint identification automation study: AIDS 3 evaluation report. Volume 7: Top down functional analysis

    Get PDF
    The functions are identified and described in chart form as a tree in which the basic functions, to 'Provide National Identification Service,' are shown at the top. The lower levels of the tree branch out to indicate functions and sub-functions. Symbols are used to indicate whether or not a function was automated in the AIDS 1 or 2 system or is planned to be automated in the AIDS 3 system. The tree chart is shown in detail

    FBI fingerprint identification automation study: AIDS 3 evaluation report. Volume 6: Environmental analysis

    Get PDF
    The results of the analysis of the external environment of the FBI Fingerprint Identification Division are presented. Possible trends in the future environment of the Division that may have an effect on the work load were projected to determine if future work load will lie within the capability range of the proposed new system, AIDS 3. Two working models of the environment were developed, the internal and external model, and from these scenarios the projection of possible future work load volume and mixture was developed. Possible drivers of work load change were identified and assessed for upper and lower bounds of effects. Data used for the study were derived from historical information, analysis of the current situation and from interviews with various agencies who are users of or stakeholders in the present system

    FBI fingerprint identification automation study. AIDS 3 evaluation report. Volume 3: Operational feasibility

    Get PDF
    An evaluation is presented which is defined as the adequacy of system design with known functional and performance requirements. The proposed Rockwell International AIDS 3 card, document and data flow are presented to summarize the concepts involved and the relationships between functions. The analysis and evaluation includes a study of system capability, processing rates, search requirements and response accuracy as well as a consideration of operational components and hardware integration. Results indicate that the AIDS 3 System concept is operationally feasible if production capacity is slightly enhanced but that operational complexity, hardware integration and a lack of conceptual data pertinent to some of the functions are areas of concern

    FBI fingerprint identification automation study: AIDS 3 evaluation report. Volume 5: Current system evaluation

    Get PDF
    The performance, costs, organization and other characteristics of both the manual system and AIDS 2 were used to establish a baseline case. The results of the evaluation are to be used to determine the feasibility of the AIDS 3 System, as well as provide a basis for ranking alternative systems during the second phase of the JPL study. The results of the study were tabulated by subject, scope and methods, providing a descriptive, quantitative and qualitative analysis of the current operating systems employed by the FBI Identification Division

    Angular momentum I ground state probabilities of boson systems interacting by random interactions

    Full text link
    In this paper we report our systematic calculations of angular momentum II ground state probabilities (P(I)P(I)) of boson systems with spin ll in the presence of random two-body interactions. It is found that the P(0) dominance is usually not true for a system with an odd number of bosons, while it is valid for an even number of bosons, which indicates that the P(0) dominance is partly connected to the even number of identical particles. It is also noticed that the P(Imax)P(I_{max})'s of bosons with spin ll do not follow the 1/N (N=l+1N=l+1, referring to the number of independent two-body matrix elements) relation. The properties of the P(I)P(I)'s obtained in boson systems with spin ll are discussed.Comment: 8 pages and 3 figure

    FBI fingerprint identification automation study. AIDS 3 evaluation report. Volume 2: Technical feasibility

    Get PDF
    The results of this effort are presented in a manner for use by both the AIDS 3 Operational and Economic Feasibility subtasks as well as the Development of Alternative subtask. The approach taken was to identify the major functions that appear in AIDS 3 and then to determine which technologies would be needed for support. The technologies were then examined from the point of view of reliability, throughput, security, availability, cost and possible future trends. Whenever possible graphs are given to indicate projected costs of rapidly changing technologies
    corecore