نتایج جستجو برای: safe room

تعداد نتایج: 221888  

Journal: :Physical review. D, Particles and fields 1996
Collar

It is shown that, under realistic background considerations, an improvement in cold dark matter sensitivity of several orders of magnitude is expected from a detector based on superheated liquid droplets. Such devices are totally insensitive to minimum ionizing radiation while responsive to nuclear recoils of energies ; few keV. They operate on the same principle as the bubble chamber, but offe...

Journal: :مدیریت اطلاعات سلامت 0
محبوبه جانقربانی کارشناس ارشد، پرستاری و مامایی، مرکز آموزشی درمانی شهید بهشتی، اصفهان، ایران احمدرضا رئیسی استادیار، مدیریت اطلاعات سلامت، مرکز تحقیقات مدیریت و اقتصاد سلامت، دانشکده ی مدیریت و اطلاع رسانی پزشکی، دانشگاه علوم پزشکی اصفهان، اصفهان، ایران ساناز دهقانی کارشناس، مدیریت خدمات بهداشتی درمانی، مرکز آموزشی درمانی شهید بهشتی، اصفهان، ایران عارفه موسوی دانشجوی کارشناسی ارشد، مدیریت خدمات بهداشتی درمانی، دانشکده ی بهداشت و پیراپزشکی، دانشگاه علوم پزشکی قزوین، قزوین، ایران

introduction: global patient safety is the concern of all areas of the health care. in addition to the human suffering in those inflicted unsafe care and services, it has a heavy economic cost. due to the sensitive patient safety in the operation rooms, the present study aimed to assess patient safety in the operating rooms. methods: this was a descriptive cross-sectional study that was conduct...

Journal: :Patient safety 2022

“Can I use a teaspoon to measure my cough syrup?” “Is it ok crush pills?” “Are generic and brand name drugs really the same?” Institute of Safe Medication Practices (ISMP) fellow emergency room nurse, Michelle Bell, medication safety officer for Children’s Hospital Philadelphia, Sharon Camperchioli, answer patient questions about medication.

2004

In this study, one group of respondents is offered to purchase a safety device to be installed in their cars, while another group is offered a public safety, program (improved road quality) which results in the same size risk reduction. In terms of the value of a statistical life, our results are very, reasonable. However, the WTP for the private safety device is higher than the WTP for the pub...

2012
Shigeo Hirano James M. Snyder

One key role of elections is to allow voters to remove politicians who perform poorly in office. We analyze the extent to which incumbents who are involved in relatively serious political scandals lose elections. More importantly, we assess the relative importance of primary and general elections in removing such incumbents. How often do incumbents involved in relatively serious scandals lose i...

Journal: :IEEE Trans. Computers 1974
William W. Patterson Gernot Metze

This paper examines the dynamic fault behavior of asynchronous sequential machines, specifically identifying the faults which cause critical races and hazards, and presents a state assignment technique leading to a machine that enters one of a small set of error states whenever a fault occurs. Entry into an error state can be checked by very simple check circuits; a self-testing check circuit a...

2010
V. Bobin

This paper reports a design technique to make Complex CMOS Gates fail-safe for a class of faults. Two classes of faults are denned. The failsafe design presented has limited fault-tolerance capability. Multiple faults are also covered.

2002
L. Cui X. Zhao J. Li

In this paper two system safety models are built based on some practical situations. The system state can be distinguished into three states: working, fail-safe and fail-dangerous.The probabilities that the system are in working state, fail-safe state and fail-dangerous state, respectively, are derived. Also the mean times for the system working, fail-safe and fail-dangerous, are given. Finally...

2008
Alex Voorhoeve

WHAT role do a person’s opportunities to choose play in the justification of social arrangements? We need to answer this question in order to arrive at a theory of substantive responsibility, which tells us the way in which a person’s claims on others, others’ claims on her, and the quality of her situation should depend on the opportunities she has and the choices she makes. To get a handle on...

2003
Takahiro Shinagawa Kenji Kono Takashi Masuda

Executable content poses a threat of unauthorized access because it contains program code running on the user’s machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید