نتایج جستجو برای: alarm occurrence
تعداد نتایج: 163954 فیلتر نتایج به سال:
BACKGROUND The number of devices with alarms has multiplied in recent years, causing alarm fatigue in bedside clinicians. Alarm fatigue is now recognized as a critical safety issue. OBJECTIVE To determine if attitudes and practices related to clinical alarms have changed since 2005. METHODS The Healthcare Technology Foundation's Clinical Alarms Committee developed an online survey for hospi...
AIM (i) To determine the efficacy of bell and pad alarm therapy as an initial and relapse treatment for nocturnal enuresis; (ii) to explore risk factors for treatment failure; and (iii) to explore risk factors for relapse within 12 months of successful bell and pad alarm therapy. METHODS A 22-item questionnaire was sent to 240 children who received bell and pad alarm therapy in a 6-year perio...
This paper investigates association between portfolio returns and higher-order systematic co-moments at different timescales obtained through wavelet multiscalinga technique that decomposes a given return series into different timescales enabling investigation at different return intervals. For some portfolios, the relative risk positions indicated by systematic co-moments at higher timescales ...
This study aims to evaluate the clinical application values of Remote Monitoring (RM) in postpacemaker implantation follow-up. A total of 105 patients implanted with Dual-Chamber Pacemaker (DCPM) in our hospital were divided into the HM group (n=59, implanted the HM system, Biotronik, German) and the control group (group N, n=46). The Average Outpatient Follow-Up Times (AOFT), alarm events, all...
Over the past few years we can see there is an occurrence of floods at different parts world almost every year. The technical advancements in recent have made it easier to get a solution for these natural disasters. One such technologies which takes us much closer internet “Internet Things”. This paper consists flood detection and avoidance system using iot technology. sensors present this are ...
Most enterprises have controlled claim data related to marketing, production, trade and delivery. They can extract the engineering information needed to the reliability of unit from the claim data, and also detect critical and latent reliability problems. Existing method which could detect abnormal quality unit lists in early stage from claim database has three problems: the exclusion of fallac...
We discuss the phenomenon of system tailoring in the context of data from an observational study of anaesthesia. We found that anaesthetists tailor their monitoring equipment so that the auditory alarms are more informative. However, the occurrence of tailoring by anaesthetists in the operating theatre was infrequent, even though the flexibility to tailor exists on many of the patient monitorin...
Previous research has shown that prior knowledge structures or schemas affect recognition memory. However, since the acquisition of schemas occurs over prolonged periods of time, few paradigms allow the direct manipulation of schema acquisition to study their effect on memory performance. Recently, a number of parallelisms in recognition memory between studies involving schemas and studies invo...
Prey animals can reduce their risk of predation by detecting potential predators before encounters occur. Some animals gain information about nearby predators by eavesdropping on heterospecific alarm calls. Despite having well-developed ears, most lizards do not use vocal information for intraspecific communication, and few studies have shown practical use of the ears in wild lizards. Here, we ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید