• Title/Summary/Keyword: Monitoring categories

Search Result 227, Processing Time 0.024 seconds

Development of an E-learning Education Program for Preventing Nursing Errors and Adverse Events of Operating Room Nurses (수술실의 간호오류 및 과오 예방을 위한 E-learning 실무교육 프로그램의 개발 및 평가)

  • Kim, Jung-Soon;Kim, Myung-Soo;Hwang, Sun-Kyung
    • Korean Journal of Adult Nursing
    • /
    • v.17 no.5
    • /
    • pp.697-708
    • /
    • 2005
  • Purpose: This study was to develop, implement, and evaluate an e-learning education program for improving practical knowledge and preventing nursing errors and adverse events of nurses working in the operating room (OR). Method: The e-learning program was developed and evaluated according to the following processes: 1) preparation phase 2) implementation phase 3) evaluation phase. In evaluation phase, the effectiveness was analyzed based on the Kirkpatrick's model. Results: The e-learning program consisted of OR basic nursing skills and techniques and nursing activities' manual based on the categories of nursing errors: surgical operation preparation, nursing skills and techniques, environment management, patient safety and comfort, and patient monitoring. The program was provided through on-line, http://cafe.daum.net/pnuhorn, for 4 weeks. The mean score(percent) of participants' satisfaction was $21.24{\pm}1.71$(68.2%). Their total knowledge level was significantly improved(Z=-3.00, p=.003) and specifically in the category of environment management(Z=-3.77, p<.001) and patient monitoring(Z=-2.46, p=.014). The occurrence of nursing errors or adverse events was a little decreased, but not statistically significant(Z=-3.10, p=.756). Conclusion: E-learning for nurses is one way of effective and efficient teaching-learning strategies. For better e-learning, it is important to develop the vital content of the education and objective measures for detecting nursing errors and adverse events.

  • PDF

Studies on the improvement of reproductive efficiency in Korean native cows -Plasma progesterone concentrations for monitoring ovarian activity in the postpartum period- (한우(韓牛)의 번식효율(繁殖效率) 증진(增進)에 관한 연구(硏究) -혈중(血中) progesterone농도(濃度) 측정(測定)에 의한 분만(分娩)후 난소기능(卵巢機能) 회복상태(回復狀態)의 검토(檢討)-)

  • Choi, Han-sun;Kang, Byong-kyu;Son, Chang-ho;Suh, Guk-hyun
    • Korean Journal of Veterinary Research
    • /
    • v.30 no.4
    • /
    • pp.515-523
    • /
    • 1990
  • Plasma progesterone concentrations in 44 suckling Korean native cows were determined to monitor ovarian activity postpartum by radioimmunoassay. Blood samples were collected in 3 day intervals from 15 to 80 days postpartum. The ovaries and uterus were examined in 6 day intervals by rectal palpation. Results are summaried as follows: 1. The cows were qualified into four categories; Type I(normal): cyclic changes in plasma progesterone concentrations appear within 45 days postpartum(35 cows, 79.5%), Type II(cycle delayed): delayed resumption of ovarian activity by 55 days postpartum(5 cows, 11. 4%), Type III(cycle ceased with low progesterone): plasma progesterone concentrations remained low(${\leq}1ng/ml$) until 80 days postpartum(3 cows, 6.8%), Type IV(cycle ceased with high progesterone): plasma progesterone concentrations after 30 days remained high(${\geq}4.0ng/ml$) until 80 days postpartum(1 cow, 2.3%). 2. Out of the cows classified Type II and III, 7 cows had inactive ovaries and a cow had follicular cyst by rectal palpation. The cow of Type IV was diagnosed as bearing persistent corpus luteum by rectal palpation. 3. About 82% of the cows showed significant rises in plasma progesterone concentrations prior to 50 days postpartum and the cows of Type II and III resumed cycles in 31. 6(range 17~55) days after calving. However, 43.2% resumed cycles in 50 days postpartum by estrus signs. These results indicated that plasma progesterone concentrations assessed by radioimmunoassay can be utilized for monitoring postpartum ovarian activity and would be helpful for the early detection of ovarian dysfunction in the Korean native cow.

  • PDF

Implementation of Educational Service for Environmental Saver using Smart Device (스마트 기기를 활용한 환경 지킴이 교육 서비스 구현)

  • Lee, Yong-Hwan;Cho, Han-Jin;Lee, June-Hwan
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.1-8
    • /
    • 2015
  • Various efforts are being made to live a Green life began to recognize an importance of eco-friendly living. In this paper, we have designed and implemented a mobile-based environmental keeping education service, which is offered well-defined category searching and environmental outreach related designed categories, for the purpose of supporting distribution of educational application. The implemented prototype system not only plays a function of environmental pollution report, related to simple environmental stewardship schemes, but also provides environmental monitoring service and integrated educational system supporting certified online volunteer activity. This study provides an one of famous methods to the youth for environmental monitoring education system based on mobile environments, and suggests an improvement to the environmental education for schools students.

Occupational Health Protection for Health Workers in China With Lessons Learned From the UK: Qualitative Interview and Policy Analysis

  • Xu, Huan;Zhang, Min;Hudson, Alan
    • Safety and Health at Work
    • /
    • v.12 no.3
    • /
    • pp.304-310
    • /
    • 2021
  • Background: Healthcare settings have been recognized among the most hazardous places to work. Based on the five categories of occupational hazards that were identified by the ILO and WHO, this study aimed to analyze policy framework relevant to occupational health protection of health workers (HWs) in public health service in China, then discussed how to share the experience of the National Health Service (NHS) England for improvement. Methods: Based on policy learning theories, policy analysis and qualitative interview were used in this study. Results: In the Chinese public health service, at least five laws related to the regulation of occupational health protection for HWs; however, enforcement of relevant laws was separated and multi-centered; the national monitoring system, which targeted to occupational hazards and health outcome for HWs in China, had yet to be developed; the top three priorities were workplace violence, bloodborne pathogens, and musculoskeletal disorders; national strategies included Security Hospital, and Healthy China 2030. In NHS England, three laws were fundamental; several monitoring systems had been set up, including NHS Staff Survey, Commissioning for Quality and Innovation incentive scheme; mental health, musculoskeletal problem, and nutrition disorder and overweight were raised great concern; Health and Safety, and NHS Healthy Workforce Program were critical nationwide strategies. Conclusion: There were several similarities as well as differences between the Chinese public health system and NHS England, which laid foundation of learning by China. Recommendations of improving occupational health policies in China were provided, based on the lessons learned from the NHS England.

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

An Analysis of Correlation Between Metacognition and Digital Library Searching Behavior

  • Heesop, Kim;Aluko Ademola, Mayokun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.75-82
    • /
    • 2023
  • The main purpose of this study is to analyze the metacognition of digital library search behavior of college students and to provide a fundamental data for the designing a user-centered online information retrieval system to find more optimal search results. In order to achieve the purpose of this study, metacognition was classified into the five main categories, including schema-training, planning, monitoring, evaluation, and transfer, and a total of twenty subcategories were included. A total of 112 students participated in the online questionnaire. The collected data were analyzed using SPSS version 26, and it was found that there was a significant correlation between metacognition of college students and their digital library searching behavior. In particular, the digital library search experience was found to be the strongest factor to be considered as the most important variable in digital library design based on the aspect of user metacognition.

A hierarchical semantic segmentation framework for computer vision-based bridge damage detection

  • Jingxiao Liu;Yujie Wei ;Bingqing Chen;Hae Young Noh
    • Smart Structures and Systems
    • /
    • v.31 no.4
    • /
    • pp.325-334
    • /
    • 2023
  • Computer vision-based damage detection enables non-contact, efficient and low-cost bridge health monitoring, which reduces the need for labor-intensive manual inspection or that for a large number of on-site sensing instruments. By leveraging recent semantic segmentation approaches, we can detect regions of critical structural components and identify damages at pixel level on images. However, existing methods perform poorly when detecting small and thin damages (e.g., cracks); the problem is exacerbated by imbalanced samples. To this end, we incorporate domain knowledge to introduce a hierarchical semantic segmentation framework that imposes a hierarchical semantic relationship between component categories and damage types. For instance, certain types of concrete cracks are only present on bridge columns, and therefore the noncolumn region may be masked out when detecting such damages. In this way, the damage detection model focuses on extracting features from relevant structural components and avoid those from irrelevant regions. We also utilize multi-scale augmentation to preserve contextual information of each image, without losing the ability to handle small and/or thin damages. In addition, our framework employs an importance sampling, where images with rare components are sampled more often, to address sample imbalance. We evaluated our framework on a public synthetic dataset that consists of 2,000 railway bridges. Our framework achieves a 0.836 mean intersection over union (IoU) for structural component segmentation and a 0.483 mean IoU for damage segmentation. Our results have in total 5% and 18% improvements for the structural component segmentation and damage segmentation tasks, respectively, compared to the best-performing baseline model.

Management of Adverse Reactions to Iodinated Contrast Media for Computed Tomography in Korean Referral Hospitals: A Survey Investigation

  • Seungchul Han;Soon Ho Yoon;Whal Lee;Young-Hun Choi;Dong Yoon Kang;Hye-Ryun Kang
    • Korean Journal of Radiology
    • /
    • v.20 no.1
    • /
    • pp.148-157
    • /
    • 2019
  • Objective: To evaluate the current status of managing adverse reactions to iodinated contrast media (ICM) for computed tomography in referral hospitals in South Korea compared with hospitals in other countries. Materials and Methods: This survey investigation involved 59 Korean and 15 overseas hospitals using guideline-based questionnaires consisting of 24 items in 7 main categories related to managing adverse reactions to ICM. Results: Informed written consent with risk factor evaluation was appropriately performed in most of the Korean hospitals. There was considerable variability in assessing renal function across the hospitals; serum creatinine level was used as a reference in 76.4% of Korean hospitals. The Korean hospitals preferred a more stringent approach to determining normal renal function (p = 0.01), withholding metformin (p = 0.01), and fasting before ICM exposure (p < 0.001) compared with overseas hospitals. All the Korean hospitals had an emergency protocol and in-hospital system for adverse reactions to ICM. The Korean (87.7%) and overseas hospitals (100%) were similarly equipped with epinephrine (p = 0.332), but only 38.6% of Korean hospitals were equipped with a bronchodilator (p = 0.004). For patients with a previous hypersensitivity reaction to ICM, 62.3% of Korean hospitals pre-medicated with anti-histamine and corticosteroid according to the severity of the previous reaction, and changed the culprit ICM in 52.8%, while skin test was performed in 17%. Conclusion: In general, Korean referral hospitals were well-prepared regarding informed consent, protocol, and an in-hospital system for managing adverse reactions to ICM. Nevertheless, there was considerable variability in details and management, thus requiring standardization by reflecting current guidelines.

An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks

  • Rooh Ullah;Beenish Ayesha Akram;Amna Zafar;Atif Saeed;Sultan H. Almotiri;Mohammed A. Al Ghamdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1390-1411
    • /
    • 2024
  • Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.

CONTROL OF SWINE DISEASE - Review-

  • Furuuchi, S.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.5 no.3
    • /
    • pp.411-418
    • /
    • 1992
  • Recently, onset of bacterial disease, especially infiltration of chronic respiratory diseases have been increasing at high rate. The main cause of these diseases are originated from inappropriate sanitary management and slow progress in introducing system and herd free system, which are the base of productivity improvement in bigger pig management, Methods for the prevention and removal of these diseases, are divided into four categories. The first category includes prevention and removal of infectious diseases by organizing strict animal quarantine, enforcing vaccination, and legal regulation and disposal at the time of outbreak. The second category includes improvement of production systems. This purpose can be achieved by discontinuing the open herd system, which brings on the invasion of foreign pathogens and replacing the system by the closed type of farm. To Continue eradication process step-wisely by performing the all-in all-out system at every pig pen or herd level is also effective for this purpose. The third category includes introduction of herd free system can be achieved by repopulating conventional pigs with SPF pigs. If these means are unrealizable from economic or technical viewpoint, medicated early weaning system is perfomed. This system consists of disinfection of pigsty at pre-postpartum stage, application of drugs to pregnant sows and newborn piglets in accordance with the medication program, and early weaning and rearing of newborn piglets in isolation. The fourth category is sanital leading by veterinarians, aimed to eliminating incentives for diseases through diagnoses. Their main activities include periodical monitoring and improvement leading on each responsible subject.