Academic literature on the topic 'Strategies to prevent strikes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strategies to prevent strikes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Strategies to prevent strikes"

1

Ezinne, Uzendu, Chibuzo Makata, Kenechukwu Okeke, et al. "Effect of Incessant Strike Actions on the Academic Performance of University of Ibadan Medical Students." Pan-African Journal of Education and Social Sciences 5, no. 2 (2024): 167–84. https://doi.org/10.56893/pajes2024v05i02.12.

Full text
Abstract:
A strike is an organized work stoppage by employees. It has become an adopted lingua franca for the Academic Staff Union of Universities (ASUU) to effectively communicate their demands in Nigeria. Using a cross-sectional study design, we investigated the impact of strike actions on the academic performance of fifth- and sixth-year medical students at the University of Ibadan, Nigeria. A total of 242 medical students participated, and 119 (49.2%) had experienced strike actions at least five times during their studies. Most students, 196 (81.0%), believed that strikes affected their motivation to study, while 38 (15.7%) had a re-sit in their examination. The strikes significantly affected students’ motivation (OR=3.10; 95% CI=1.113-8.620), long-term retention of medical knowledge (OR=0.46; 95% CI=0.257-0.815) and having a re-sit among those above 25 years old (OR=1.17; 95% CI=1.025-1.327) and male students (OR=4.91; 95% CI=1.618-14.894). Incessant strikes decrease medical students’ long-term memory of medical knowledge and motivation for studying and increases the tendency to have a re-sit. We therefore suggest that ASUU consider alternative grievance strategies to prevent these negative consequences on future physicians’ education and professional competence.
APA, Harvard, Vancouver, ISO, and other styles
2

Baumgartner, Hannah M., Rebecca DiDomenica, Peter T. Hu, and Suzanne Thomas. "Pilot Perceptions of Wire Strikes in Agricultural Aviation Operations." Aerospace Medicine and Human Performance 95, no. 6 (2024): 305–12. http://dx.doi.org/10.3357/amhp.6425.2024.

Full text
Abstract:
INTRODUCTION: Agricultural aircraft operations are associated with unique challenges. In particular, these include maintaining awareness of obstacles associated with flight at very low altitudes. Wire strikes are a common cause of accidents in these operations.METHODS: Focus groups were completed during the 2022 Ag Aviation Expo hosted by the National Agricultural Aviation Association with pilots who had experienced wire-strike events (N = 22). The researchers coded the transcripts using a human factors framework.RESULTS: Notably, unplanned “trim passes” were a key stage of flight during wire-strike events. Cognitive risk factors that may have affected their performance included situation awareness, decision-making choices, and pressure to perform. Over half of subjects reported being aware of the wire before collision. Possible prevention strategies include not spraying the field due to safety risks, paying better attention to where they were in the field, and avoiding deviation from the planned route.DISCUSSION: Wire-strike events often occur due to momentary lapses in attention, even when the pilot is already aware of the wire. This study shows that targeted approaches to prevent wire strikes in agricultural aviation operations require addressing a number of cognitive risks and human factors, rather than implementing increased preflight surveillance. These results have implications for preventing future wire-strike accidents based directly on pilot perceptions, both within agricultural operations and general aviation more broadly.Baumgartner HM, DiDomenica R, Hu PT, Thomas S. Pilot perceptions of wire strikes in agricultural aviation operations. Aerosp Med Hum Perform. 2024; 95(6):305–312.
APA, Harvard, Vancouver, ISO, and other styles
3

Omar, Ahmed I., M. A. Abd-Allah, Ahmed Shokry, and Abdelrahman Said. "Lightning Risk Assessment, Control and Protection Scheme Design for a Rooftop Photovoltaic System in the New Capital of Egypt." International Journal of Robotics and Control Systems 4, no. 4 (2024): 1903–33. https://doi.org/10.31763/ijrcs.v4i4.1525.

Full text
Abstract:
The absence of an effective lightning protection system for photovoltaic (PV) systems can hinder their integration into networks. Outdoor PV installations are vulnerable to direct or indirect lightning strikes, resulting in damaging overvoltages that harm the PV structure. These systems, often situated on rooftops or open fields, face increased lightning strike risks due to their exposure compared to more sheltered setups. Lightning-induced surges can harm sensitive electrical components like panels, inverters, and wiring, leading to potential damage and downtime. The complexity of PV systems, with interconnected components, makes designing protection strategies challenging. Compliance with lightning protection standards is crucial to prevent damage, downtime, and financial losses. Implementing effective protection measures involves grounding, surge protection, and adherence to regulations. Lightning protection systems intercept strikes and safely direct electrical energy to the ground, safeguarding sensitive components and ensuring continuous power generation. The IEC 62305-2 standard guides lightning risk assessment and mitigation, aiding in evaluating risks, calculating damage likelihood, and designing protective measures. A case study focusing on the Arab African International Bank's rooftop PV system in Egypt illustrates the importance of lightning risk management in financial, operational, and regulatory contexts for solar projects. Risk assessment aims to identify vulnerabilities, implement mitigation strategies, and ensure safe, reliable system operation. By addressing lightning risks effectively, stakeholders can enhance system safety, reliability, and longevity while minimizing downtime and revenue loss associated with lightning strikes.
APA, Harvard, Vancouver, ISO, and other styles
4

Giraud, Baptiste. "The changing face of union action put to the test by neo-liberal reforms in France." Tempo Social 32, no. 1 (2020): 137–56. http://dx.doi.org/10.11606/0103-2070.ts.2020.164063.

Full text
Abstract:
This article reviews how French trade union are coping with the neo-liberal policies since the early 1980s. It shows their divergent reactions, and how these liberal reforms are implemented in a context of transformation of trade union action: the use of strikes is more difficult at the same time as the relationship between trade unions and collective bargaining is transformed in a logic of depoliticizing their strategies of action. These developments did not prevent a resurgence of strikes in the 2000s. It reveals the limits of the trade unions’ power of political influence, that implies the use of collective action. However, strikes have declined further in recent years, revealing the weakening of trade union mobilisation power.
APA, Harvard, Vancouver, ISO, and other styles
5

Toshev, Oleksandr, Oleksii Maksymov, Maksym Kiriakidi, and Maksym Maksymov. "Missile Strike Simulation in a Video Game Engine." Energy engineering and control systems 10, no. 1 (2024): 43–55. http://dx.doi.org/10.23939/jeecs2024.01.043.

Full text
Abstract:
In the field of modern computer gaming (especially within the genre of war-game strategies, realistic first-person shooters and other warfare games) the complexity of virtual naval warfare mechanics and strategies significantly increases. There is a growing demand for advanced simulation tools to provide more immersive experience and more complex gameplay for all players. The goal of this research is to create a model and tool that can accurately predict the impact of anti-ship missiles on ships engaged in different game scenarios, considering a wide range of battle conditions. By encompassing a broad array of missile types, landing strategies, ship classes, aircraft types, reconnaissance options, electronic warfare technologies and various anti-air and missile defense systems, the simulation includes both offensive and defensive maneuvers to make sure that anti-ship missiles are important within the game scenarios. Firstly, the research focuses on enhancing prediction models for calculating the damage inflicted by missile strikes on opposing naval forces. Secondly, it seeks to refine algorithms for determining the required number of missiles to prevent rival player advances, thereby maximizing operational efficiency and effectiveness in defensive missions.
APA, Harvard, Vancouver, ISO, and other styles
6

STARK, ALEXANDER, KHAIRUL HISYAM BAHARUDDIN, NAZATUL SYIMA MOHD NASIR, and ARIEZAL AFZAN HASSAN. "STRATEGIES FOR ADDRESSING MISINFORMATION: HAMKA’S APPROACH." Quantum Journal of Social Sciences and Humanities 6, no. 2 (2025): 202–12. https://doi.org/10.55197/qjssh.v6i2.644.

Full text
Abstract:
Over the past few years, an overwhelming amount of erroneous information has appeared on social media platforms and other publications. Managing these types of publications poses a difficulty. Frequently, people have feelings of insecurity and are uncertain about how to respond and react to unfounded assertions. This paper examines the approach taken by Hamka (Haji Abdul Malik Karim Amrullah) in addressing these so-called facts. The analysis focused on two primary works, specifically Teguran Suci & Jujur Terhadap Mufti Johor and Antara Fakta dan Khayal Tuanku Rao. The first book responds to assertions that the kaum muda movement led to an increase in issues, such as the growing influence of communism. The second book is a response to a historical publication about Tuanku Rao, a figure of the Padri movement in the 19th century in West Sumatra. False facts prompted Hamka to react and contrast his perspective. In a qualitative approach, the researchers used a structuralist method in order to identify the dichotomies between the authors who made the false claims and Hamka’s rebuttal. In both publications, Hamka had to react to assertions that were not true. His knowledge of historical and statistical facts supported his firm stand. Nonetheless, Hamka strikes a conciliatory tone to prevent a greater conflict. The impact of this research is that in discussions about so-called false facts, it is necessary to rely on sources that are transparent and easy to verify, like historical or statistical facts that are based on reliable sources. A person can implement Hamka's method of discourse by setting aside emotions and focusing on factual information.
APA, Harvard, Vancouver, ISO, and other styles
7

Muralidhar, Amrutha, and Muralidhar Lakkanna. "Regulating Cryptocurrency and Decentralized Finance for an Inclusive Economy." Journal of Investment, Banking and Finance 2, no. 1 (2024): 01–04. https://doi.org/10.33140/jibf.02.01.25.

Full text
Abstract:
The evolution of cryptocurrency and decentralized finance (DeFi) marks a significant shift in the financial landscape, making it more accessible, inclusive, and participative for various societal groups. However, this transition from traditional financial institutions to DeFi demands a meticulous policy framework that strikes a balance between innovation and safeguarding consumer interests, security, and regulatory compliance. In this script we explore the imperative need for regulatory frameworks overseeing cryptocurrencies and Decentralized Finance (DeFi), aiming to leverage their potential for inclusive economic advancement. It underscores the prevalent challenges within conventional financial systems, juxtaposing them with the transformative potential offered by these emergent financial paradigms. By highlighting the pivotal role of robust regulations, we examine their capacity to ensure user security, fortify market resilience, and spur innovative strides. We aim to proffer viable strategies for formulating regulatory structures that harmonize the twin objectives of fostering innovation and upholding fairness within financial ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
8

Shima, Amy L., David S. Gillieson, Gabriel M. Crowley, Ross G. Dwyer, and Lee Berger. "Factors affecting the mortality of Lumholtz's tree-kangaroo (Dendrolagus lumholtzi) by vehicle strike." Wildlife Research 45, no. 6 (2018): 559. http://dx.doi.org/10.1071/wr17143.

Full text
Abstract:
Context Vehicle strike is a major issue where wildlife habitat is intersected by busy roads. Near Threatened Lumholtz’s tree-kangaroo (Dendrolagus lumholtzi) is a large (5–10 kg) semi-arboreal mammal found in populated rural and forested areas of north-eastern Australia. Warning signs, rope bridges and underpasses have not prevented ~20 animals being killed on the road each year. Aims To identify factors influencing Lumholtz’s tree-kangaroo vehicle strike to help inform mitigation options. Methods Citizen sightings (1998–2000) and 90 road-kills collected over 4.5 years on the Atherton Tablelands, Australia, were examined to determine the causes of vehicle strike in Lumholtz’s tree-kangaroo. The spatial distributions of sightings and road-kills were characterised using nearest-neighbour analysis, and the relationship between them was determined using a Bayesian approach that accounted for spatial autocorrelation. Gender, age, weight, season, rainfall, road and verge characteristics, traffic volumes, speed limits and mitigation measures were recorded to assess their influence on road-kill risk. Adequacy of speed limits to prevent collisions along road sections with more than four road-kills per 8 km (hazard zones) was assessed from visibility and stopping distances. Key results Vehicle strikes mainly affected male tree-kangaroos (2–5 years, 5.5–8 kg), occurred where live animals were most frequently sighted and were most likely on roads with narrow verges, low visibility and medium traffic volumes. Speed limits at hazard zones were inadequate to prevent collisions. Few warning signs corresponded with these zones, and road mortalities persisted where they did. Conclusions Unpredictable dispersal of young males and vehicle speeds unsuited to road conditions drive road mortalities in Lumholtz’s tree-kangaroo. Because tree-kangaroos do not appear to respond to existing mitigation measures, reducing traffic speeds, and increasing visibility, appear to be the most effective mitigation strategies for reducing tree-kangaroo road mortality. Implications Our findings suggest that tree-kangaroo road-kill can be reduced by reducing speed limits in line with government recommendations and increasing visibility by clearing road verges along sections of road with the highest tree-kangaroo mortality. Warning signage should be re-evaluated to determine whether its effectiveness can be improved.
APA, Harvard, Vancouver, ISO, and other styles
9

Semenenko, Oleh, Volodymyr Remez, Anatolii Nazarenko, Valerii Malikov, and Vitalii Stasiuk. "Legal instruments for deterring nuclear conflict in the current military and political geo-environment." Social Legal Studios 7, no. 1 (2024): 87–96. http://dx.doi.org/10.32518/sals1.2024.87.

Full text
Abstract:
The relevance of this study lies in the need to consider the legal instruments for deterring a nuclear conflict in connection with the crisis of nuclear safety and instability in the current military-political geo-environment. The purpose of this study was to examine international experience in the field of legal consolidation of prohibitive norms of deterrence necessary to prevent nuclear threats. The following general scientific and special methods were employed in the study: analysis, synthesis, deduction, induction, generalisation, as well as formal legal, legal hermeneutics, logical- legal, comparative legal, and historical-legal methods. The study examined the specialised international legal framework of regulatory documents in the field of nuclear safety, safe operation of nuclear facilities and nuclear deterrence, as well as nuclear deterrence strategies and their development depending on the geopolitical situation. Based on the results of the study, it is determined that the legal regulation of nuclear conflict containment is in the form of prohibitory orders consolidated in the relevant international treaties in the field of nuclear and radiation safety. The study highlighted the main international treaties positioned as legal means of nuclear deterrence. The interaction of “soft” and “hard” law in nuclear and radiation safety agreements was considered, as well as the specific features of consolidating such norms in municipal law. The study provided generalising conclusions in terms of nuclear deterrence strategies, specifically, a vision of a new concept in this area, based on technological superiority in non-nuclear means of repelling nuclear strikes and massive precision non-nuclear retaliatory strikes. It was also concluded that attention should be paid to the development of a new international treaty that would combine all the rules prohibiting the use of nuclear energy for military purposes, as well as the rules governing nuclear and radiation safety as integral components of global nuclear security. The practical significance of this study is that its materials can be used for further development of the concepts of non-nuclear or legal nuclear deterrence
APA, Harvard, Vancouver, ISO, and other styles
10

Aber, Lawrence, Joshua L. Brown, Stephanie M. Jones, Juliette Berg, and Catalina Torrente. "School-based strategies to prevent violence, trauma, and psychopathology: The challenges of going to scale." Development and Psychopathology 23, no. 2 (2011): 411–21. http://dx.doi.org/10.1017/s0954579411000149.

Full text
Abstract:
AbstractChildren's trauma-related mental health problems are widespread, largely untreated and constitute significant barriers to academic achievement and attainment. Translational research has begun to identify school-based interventions to prevent violence, trauma and psychopathology. We describe in detail the findings to date on research evaluating one such intervention, the Reading, Writing, Respect, and Resolution (4Rs) Program. The 4Rs Program has led to modest positive impacts on both classrooms and children after 1 year that appear to cascade to more impacts in other domains of children's development after 2 years. This research strives not only to translate research into practice but also translate practice into research. However, considerable challenges must be met for such research to inform prevention strategies at population scale.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Strategies to prevent strikes"

1

Maahs, Doreen Lynn. "Managerial Strategies Small Businesses Use to Prevent Cybercrime." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5749.

Full text
Abstract:
Estimated worldwide losses due to cybercrime are approximately $375-575 billion annually, affecting governments, business organizations, economies, and society. With globalization on the rise, even small businesses conduct transactions worldwide through the use of information technology (IT), leaving these small businesses vulnerable to the intrusion of their networks. The purpose of this multiple case study was to explore the managerial strategies of small manufacturing business owners to protect their financial assets, data, and intellectual property from cybercrime. The conceptual framework was systems thinking and action theory. Participants included 4 small manufacturing business owners in the midwestern region of the United States. Data were collected via face-to-face interviews with owners, company documentation, and observations. Member checking was used to help ensure data reliability and validity. Four themes emerged from the data analysis: organizational policies, IT structure, managerial strategies, and assessment and action. Through effective IT security and protocols, proactive managerial strategies, and continuous evaluation of the organization's system, the small business owner can sustain the business and protect it against potential cyberattacks on the organization's network. The findings of the study have implications for positive social change by informing managers regarding (a) the elimination or reduction of cybercrimes, (b) the protection of customers' information, and (c) the prevention of future breaches by implementing effective managerial strategies to protect individuals in society.
APA, Harvard, Vancouver, ISO, and other styles
2

Dubay, Anthony R. "Improving strategies to prevent and prepare for radiological attack." Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDubay.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Combating-Terrorism: Policy & Strategy))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Moltz, James Clay. Second Reader: Dahll, Erik J. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Radiological Terrorislm, RDD, Dirty Bomb, Public Preparedness, WMD. Includes bibliographical references (p. 87-98). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Graña, Montes Ricardo. "Analysis of different evolutionary strategies to prevent protein aggregation." Doctoral thesis, Universitat Autònoma de Barcelona, 2014. http://hdl.handle.net/10803/285556.

Full text
Abstract:
En els darrers 15 anys, l'estudi de l'agregació de proteïnes ha evolucionat de ser una part de la química de proteïnes que tradicionalment generava poc interès, a convertir-se en una àrea d'investigació dinàmica que ha ampliat el seu abast a diferents camps de recerca incloenthi la bioquímica, la biotecnologia, la nanotecnologia y la biomedicina. Dins d'aquests camps, l'anàlisi de l'agregació de proteïnes un interès particularment rellevant en les àrees biomèdica i biotecnològica. Això es degut, per una banda, a que la aparició de depòsits proteics insolubles está relacionada amb un nombre creixent de malalties humanes, moltes d'elles amb conseqüències fatals per als malalts. Per l'altre costat, l'agregació proteica es una complicació habitual en la expresió recombinant de proteïnes a nivell industrial, com ara a la producció d'agents terapèutics de naturalessa proteica, com els anticossos. Conseqüentment, l'exploració de mecanismes que permetin prevenir l'agregació proteica es subjecte actualment d'una intensa tasca d'investigació adreçada a desenvolupar métodes per a la prevenció i l'intervenció terapèutiques d'aquestes malalties greus; i també amb l'objectiu d'incrementar els rendiments en la producció biotechnològica de proteïnes. La gran capacitat de les eines computacionals desenvolupades per tal de predir l'agregació proteica ha donat un gran impuls als esforços destinats a identificar els determinants de l'agregació de polipèptids, i també ha permès investigar com la pressió selectiva contra l'agregació ha moldeat els proteomes cel·lulars al llarg de l'evolució. A partir d’aquests anàlisis, s’han pogut identificar diferents mecanismes evolucionats per prevenir l’agregació proteica que van des de estratègies de disseny negatiu que s’han detectat en seqüències i estructures de proteïnes, fins a la caracterització dels factors que governen la maquinària cel•lular encarregada del control de qualitat proteic. En aquesta tesi es proporciona un anàlisis des de diferents perspectives per assolir una caracterització detallada de diversos d’aquests mecanismes que han sorgit al llarg de l’evolució per fer front al risc d’agregació. Amb aquest objectiu, s’han fet servir tant models proteics d’agregació específics com diferents conjunts de proteïnes amb propietats relacionades, que han permès analitzar en profunditat estratègies contra l’agregació. Al mateix temps, l’aproximació basada en l’estudi de conjunts de proteïnes íntimament relacionats també ha permès identificar limitacions funcionals que limiten la selecció a nivell evolutiu contra l’agregació. De manera més específica, el treball que es presenta aquí aborda l’efecte de la restricció de la llibertat conformacional de la cadena polipeptídica, causada per l’establiment d’un pont disulfur, sobre el procés d’agregació; també s’ha analitzat l’impacte de regions intrínsicament desestructurades en aquest mateix fenomen d’agregació. A més també s’ha investigat la regulació de l’abundància proteica dins la cèl·lula en funció de la tendència a agregar específica de les proteïnes. Per altra banda, l’anàlisi centrat en l’estudi de proteïnes relacionades ha revelat com els requeriments per assolir un plegament eficient i per mantenir l’activitat catalítica limiten la disminució de la càrrega d’agregació de les proteïnes. Aquests anàlisis posen especialment en relleu el balanç entre plegament funcional i agregació, de manera que la caracterització de les propietats aggregatives de determinats polipèptids permet predir el seus mecanismes de plegament.<br>In the last 15 years, the study of protein aggregation has evolved from a mostly neglected topic of protein chemistry to a highly dynamic research area which has expanded its implications through different fields including biochemistry, biotechnology, nanotechnology and biomedicine. The analysis of protein aggregation has attracted a particular interest in the biomedical and biotechnological areas. Because, on one side, the formation of insoluble protein deposits is associated to an increasing number of human disorders, many of which present fatal pathological consequences. And on the other hand, aggregation is a frequent shortcoming in the recombinant expression of proteins at the industrial level, such as in the production of proteinaceous therapeutic agents like antibodies. Consequently, the survey of mechanisms to prevent protein aggregation is currently the focus of deep investigation with the aim to develop preventive or therapeutic methods for the intervention of these depositional disorders and to enhance the yield in the biotechnological production of proteins. The power of the computational tools developed to predict protein aggregation has fostered the identification of the determinants influencing the aggregation of polypeptides and has allowed to investigate how the selective pressure to avoid aggregation has shaped the cellular proteomes along evolution. From these analyses, different mechanisms to prevent protein aggregation have emerged ranging from negative design strategies found in polypeptide sequences and structures, to the characterization of the factors governing the cellular machinery in charge of the protein quality control. The present thesis provides a multiperspective analysis for the detailed characterization of several of these mechanisms evolved to confront the risk of protein aggregation. In this sense, the use of a variety of specific proteic models of aggregation or different sets of proteins with related properties has allowed to analyze particular strategies to avoid aggregation in depth. At the same time, the approach based on the study of closely related ensembles of proteins has allowed to identify functional constraints that limit the evolutionary selection against aggregation. More specifically, the work presented here addresses the effect of restricting the configurational freedom of the polypeptide chain by disulfide cross-linking on the aggregation process, as well as the impact over this phenomenon exerted by the presence of intrinsically disordered protein regions. Additionally, the regulation of cellular protein abundance as a function of protein aggregation propensity has also been surveyed. On the other hand the analysis centered on the study of closely related proteins has revealed how the requirements to fold efficiently and to maintain the catalytic activity constrain the minimization of the aggregation propensity of proteins. These analyses highlight particularly the interplay between folding and aggregation, in such a way that the analysis of the aggregational properties of polypeptides allows to forecast the mechanism of folding of certain kind of proteins.
APA, Harvard, Vancouver, ISO, and other styles
4

Ross, Kirsty Samantha. "Novel strategies to prevent and treat experimental pneumococcal disease." Thesis, University of Glasgow, 2010. http://theses.gla.ac.uk/1671/.

Full text
Abstract:
With over 90 different serotypes of Streptococcus pneumoniae unevenly distributed around the world, current vaccine formulations vary significantly in their ability to protect against invasive pneumococcal disease (IPD). The adult pneumococcal vaccine is composed of capsular polysaccharide from 23 of the most prevalent disease causing serotypes. Purely polysaccharide vaccines are unable to protect those most at risk; infants under the age of two. This has led to the development of a paediatric conjugate vaccine, composed of capsular polysaccharide from seven of the most common disease causing serotypes, each chemically conjugated to a carrier protein. Although efficacious at protecting the target age group from disease caused by homologous serotypes, it fails to protect against the non-vaccine serotypes. Serotype specific vaccination is a short-term solution to pneumococcal disease. As the most common serotypes are eradicated by vaccination, previously less common serotypes fill the vacant niche and cause serotype replacement disease. A solution to this problem would be the development of pneumococcal vaccines containing antigens that elicit non-serotype specific protection. Pneumolysin, the pore-forming toxin produced by S. pneumoniae, may play a role in future pneumococcal vaccine. It is a major virulence factor produced by all invasive isolates and has previously been demonstrated to confer non- serotype specific protection. In this thesis, pneumolysin retained the ability to bind to cell membranes and form pores even when other antigens were fused genetically to the N terminus. Pneumolysin performed as a highly immunogenic mucosal adjuvant, with substantial mucosal and systemic immune responses to the fused antigen, when nanograms quantities when applied to the mucosal surface of the nasopharynx. A fusion between pneumococcal surface adhesin A (PsaA) and pneumolysin (PLY) was created to investigate potential protection conferred by the antigen specific response. Vaccination of Balb/c and MF1 mice with PsaAPLY conferred no protection against challenge with virulent S. pneumoniae TIGR4. The toxicity of pneumolysin is problematic and existing pneumolysin mutants possess residual cytotoxicity. By ablating the toxicity of pneumolysin with formalin it permits its use in parental vaccines. The pneumococcal histidinetriad proteins (Pht) are a recently identified family of surface exposed proteins that have homologues in other Streptococcus species and are therefore novel potential vaccine candidates. In vivo models of disease require the sacrifice of a large number of animals at time points to investigate the impact of vaccine or pharmaceuticals on disease progression. Real-time photonic imaging of bioluminescent bacteria offers significant advantages over conventional methods for monitoring and combating bacterial disease in animals. Not only does this approach reduce the time and costs associated with such experiments, but also it considerably reduces the number of animals used. Furthermore, because bioluminescent imaging allows the same group of animals to be monitored over time, animal-to-animal variations are overcome by including the zero time point as an internal control. Models of pneumococcal pneumonia were established in MF1 mice. Newly established bioluminescent models were then used to investigate the impact of vaccination with the paediatric pneumococcal conjugate vaccine as proof of principle.
APA, Harvard, Vancouver, ISO, and other styles
5

Griffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.

Full text
Abstract:
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government contractor located in the southeastern region of the United States. Ludwig von Bertalanffy's general systems theory was used as the conceptual framework of this study. The data collection process included interviews with organization security managers (n = 5) and company documents and procedures (n = 13) from the target organization related to mobile device security. Data from the interviews and organizational documents were coded using thematic analysis. Methodological triangulation of the data uncovered 4 major themes: information security policies and procedures, security awareness, technology management tools, and defense-in-depth. The implications for positive social change from this study include the potential to enhance the organizations' security policies, cultivate a better security awareness training program, and improve the organizations data protection strategies. In addition, this study outlines some strategies for preventing data breaches caused by mobile devices while still providing maximum benefit to its external and internal customers.
APA, Harvard, Vancouver, ISO, and other styles
6

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Full text
Abstract:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middlesex County, Massachusetts. The data collection process involved open-ended online questionnaires, semistructured face-to-face interviews, and review of company documents. Based on methodological triangulation of the data sources and inductive analysis, 3 emergent themes identified are policy, training, and technology. Key findings include having a specific goal and tactical approach when creating small business cybersecurity strategies and arming employees with cybersecurity training to increase their awareness of security compliance. Recommendations include small business use of cloud computing to remove the burden of protecting data on their own, thus making it unnecessary to house corporate servers. The study has implications for positive social change because small business leaders may apply the findings to decrease personal information leakage, resulting from data breaches, which affects the livelihood of individuals or companies if disclosure of their data occurs.
APA, Harvard, Vancouver, ISO, and other styles
7

Potgieter, Natasha. "Water storage in rural households : intervention strategies prevent waterborne diseases." Thesis, University of Pretoria, 2007. http://hdl.handle.net/2263/30323.

Full text
Abstract:
Poor sanitation, unhygienic practices and close living associations between people and animals in rural communities increase the risk of zoonoses and add to faecal contamination of stored drinking water. Point-of-use interventions can improve the microbiological quality of household drinking water and a combination of microbial and chemical indicator tests could identify the origin of faecal pollution. The improvement of the microbiological quality of drinking water in rural households by the implementation of intervention strategies which included the use of traditional storage containers as well as an improved safe storage container (CDC, USA), with or without the addition of a sodium hypochlorite solution were determined. The origin of faecal contamination in the water sources and household stored water were determined using male specific F-RNA subgroup genotyping. This study attempted to assess the survival of indicator microorganisms and selected bacterial pathogens and viruses in the improved safe storage container in borehole and river water samples. An intervention study was conducted in two rural villages utilising different source water. Results indicated that the improved safe storage container without the addition of a stabilized sodium hypochlorite solution did not improve the microbiological quality of the stored drinking water and had counts of indicator microorganisms similar to that found in the traditional storage containers. However, the households using the 1% and the 3.5% sodium hypochlorite solutions have shown an effective reduction in the counts of indicator microorganisms in both the traditional and the improved safe storage containers. The compliance with the use of the sodium hypochlorite interventions ranged between 60% and 100%, which was in agreement with similar studies carried out in other developing countries. One village complied with the intervention while the other village did not. Reasons for this included financial factors, an unsupportive infrastructures and lack of education and knowledge on health risks by the households. Male specific F-RNA bacteriophage genotyping showed that faecal contamination in the water source samples and both the traditional and improved safe storage containers at the point-of-use were primarily of animal origin (Subgroup I). Households using river water had subgroup II F-RNA bacteriophages present in the stored household water, which was associated with human faecal pollution. However, subgroup II F-RNA bacteriophages has been isolated from faeces of cattle and poultry, which indicated that F-RNA subgroup typing might not be a specific tool to determine the origin of faecal pollution in water sources. Laboratory seeding experiments indicated that 1% sodium hypochlorite solution were less effective in reducing heterotrophic bacteria, Escherichia coli, Salmonella typhimurium, Clostridium perfringens, F-RNA bacteriophages and coxsackie B1 virus counts in the improved safe storage containers filled with river water with a high turbidity. However, the 1% sodium hypochlorite solution did reduce the indicator and seeded microorganisms within 60 min in containers filled with borehole water with a low turbidity. The 3.5% sodium hypochlorite solution effectively decreased the numbers of microorganisms to undetectable limits within 60 min in both the borehole and river filled storage containers irrespective of the turbidity values. This study has showed that a combination of intervention strategies can provide rural communities with microbiologically safe drinking water.<br>Thesis (PhD (Medical Virology))--University of Pretoria, 2008.<br>Medical Virology<br>PhD<br>unrestricted
APA, Harvard, Vancouver, ISO, and other styles
8

Akuh, Comfort G. "Small Retail Business Strategies to Detect and Prevent Employee Fraud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4266.

Full text
Abstract:
Small businesses have an important role to play in the U.S. economy. However, employee fraud can jeopardize the sustainability of small businesses. Grounded on Cressey's fraud triangle theory, the purpose of this multiple case study was to explore strategies used by selected managers and owners of small retail businesses to detect and prevent employee fraud. Ten participants from 5 small retail businesses participated in the study. Nine participated in a face-to-face semistructured interview, and 1 participated in a telephone interview. These participants included 5 owners and 5 managers of small retail businesses in the state of Michigan in the United States who have implemented strategies to detect and prevent employee fraud. Through a process of methodological triangulation, casual observations and documentary evidence supplemented data collected through semistructured interviews. Using thematic analysis by coding narrative segments, the research findings included themes of controls and communication, cash register accountability, segregation of duties, monitoring, and action against perpetrators. Managers and owners of small businesses may benefit from the findings of this study by gaining awareness of the need to detect and prevent employee fraud. The implications for positive social change may include the potential to increase appropriate controls over employee fraud, thus enabling owners of small retail business an opportunity to operate effectively and efficiently, which could increase employment opportunities. Increased employment opportunities could create a positive effect on other small retail businesses and allow local communities to prosper.
APA, Harvard, Vancouver, ISO, and other styles
9

Clemens, Amy. "Effectiveness of Physiological Alarm Management Strategies to Prevent Alarm Fatigue." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6984.

Full text
Abstract:
There is limited clinical research on the effectiveness of alarm management strategies and nursing behaviors related to alarms in clinical settings. As many as 76% of physiological monitor alarms are overlooked as clinically insignificant by nursing staff. Excessive alarms may impact patient outcomes and cause cognitive overload for nurses that can result in medical errors and missed patient resuscitations. The purpose of this systematic review was to rate alarm management studies on level of evidence for interventions, nursing responses to alarms, and impact on alarm fatigue behavior. The nursing role effectiveness model guided this project. Twenty-seven studies were reviewed to analyze outcome effectiveness by addressing structure, process, and outcomes related to how the roles of the nurse affect nurse-sensitive patient outcomes. The Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) and the Cochrane guidelines guided study selection and analysis. A second reviewer collaborated on the search strategy and provided an independent review of the identified literature. The effectiveness of alarm management was difficult to determine because most studies were descriptive, cohort, or nonrandomized trials. Review findings did not support a relationship between the amount of alarms and increased alarm fatigue behaviors. Findings indicated that nurses' attitudes and alarm fatigue behaviors are present globally and have not significantly altered since reduction strategies were implemented. The findings may impact social change by decreasing nurses' stress levels related to cognitive workloads, improving patient outcomes, and supporting increased levels of nurses' workforce satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
10

Tynes, Vernon Walter. "Mentoring Strategies to Prevent Leadership Shortfalls Among C-Suite Executives." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5143.

Full text
Abstract:
Corporate organizations are facing a shortage of future senior management leaders. The purpose of this single case study was to explore leadership mentoring strategies used to develop future C-suite executives in the waste industry. Companies may improve business practices by mentoring future generations to understand corporate responsibilities and expectations. The target population came from a regional waste company located in central Florida. The study participants consisted of 3 C-suite executives of the company responsible for the management and mentoring of future C-suite executive mentees. The conceptual framework for this study was rooted in transformational leadership theory. Data were collected using semistructured face-to-face interviews, along with supporting documentation provided by the C-suite executives, including the company succession plan. Through methodological triangulation, coding, and thematic analysis, 4 themes emerged that could help C-suite executives in the successful mentoring of future C-suite executives. The 4 themes that emerged from the study, were (1) C-suite executives use various strategies to identify talent, (2) C-suite executives use various mentoring and coaching strategies to develop future C-suite executives, (3) C-suite executives use formal and informal leadership strategies to mentor, and (4) succession planning is in place or planned. The implication for social change was improved mentoring strategies for future C-suite candidates. These strategies may transfer to industries that face generational mentoring issues and challenges, improving structural and managerial growth and stability, which will aid in providing community employment opportunities.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Strategies to prevent strikes"

1

National Crime Prevention Council (U.S.), ed. 50 strategies to prevent violent domestic crimes. National Crime Prevention Council, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Environmental Protection Agency. Region V., ed. Purchasing strategies to prevent waste and save money. Source Reduction Forum of the National Recycling Coalition, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Environmental Protection Agency. Region V. and United States. Environmental Protection Agency., eds. Purchasing strategies to prevent waste and save money. Source Reduction Forum of the National Recycling Coalition, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Environmental Protection Agency. Region V and United States. Environmental Protection Agency, eds. Purchasing strategies to prevent waste and save money. Source Reduction Forum of the National Recycling Coalition, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cherry, Ceridwen. Strategies to prevent and overturn voter photo ID laws. John F. Kennedy School of Government, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zweig, Janine M. Strategies to prevent prison rape by changing the correctional culture. U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Franzosi, Roberto. The puzzle of strikes: Class and state strategies in postwar Italy. Cambridge University Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Garrick, James G. Peak condition: Winning strategies to prevent, treat, and rehabilitate sports injuries. Crown, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garrick, James G. Peak condition: Winning strategies to prevent, treat, and rehabilitate sports injuries. Perennial Library, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

M, Dahlquist Carol, ed. Functional assessment: Strategies to prevent and remediate challenging behavior in school settings. 2nd ed. Merrill Prentice Hall, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Strategies to prevent strikes"

1

Lowe, David. "Prevent strategies." In Terrorism, Law and Policy, 2nd ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003195627-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Struys, Michel, Eric Mortier, and Linda Versichelen. "Strategies to Prevent Awareness." In On the Study and Practice of Intravenous Anaesthesia. Springer Netherlands, 2000. http://dx.doi.org/10.1007/978-94-015-9604-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morone, Giovanni, Alessia Federici, Marco Tramontano, Roberta Annicchiarico, and Antonino Salvia. "Strategies to Prevent Falls." In Advanced Technologies for the Rehabilitation of Gait and Balance Disorders. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72736-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Haunstetter, A., and S. Izumo. "Strategies to prevent apoptosis." In Molecular Approaches to Heart Failure Therapy. Steinkopff, 2000. http://dx.doi.org/10.1007/978-3-642-57710-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Agazzi, Heather, Emily J. Shaffer-Hudkins, Kathleen Hague Armstrong, and Holland Hayford. "Strategies to Prevent Problem Behavior." In Promoting Positive Behavioral Outcomes for Infants and Toddlers. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51614-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

van Huis, A. "Can we prevent desert locust plagues?" In New Strategies in Locust Control. Birkhäuser Basel, 1997. http://dx.doi.org/10.1007/978-3-0348-9202-5_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vertullo, Christopher. "Intraoperative Prevention Strategies to Prevent Infection." In Infection in Knee Replacement. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81553-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ozdal, Emine. "Advanced Cardiac Life Support in Electrical and Lightning Injuries." In Special Circumstances in Resuscitation. Nobel Tip Kitabevleri, 2024. http://dx.doi.org/10.69860/nobel.9786053358923.5.

Full text
Abstract:
Abstract: Electric and lightning strikes are significant health concerns requiring prompt intervention in emergency medicine situations. Advanced cardiac life support (ACLS) is crucial in such scenarios. In electrical injuries, serious conditions like cardiac rhythm disturbances and respiratory arrest may occur due to the effect of electric current on the body. Similarly, lightning strikes can induce sudden and severe cardiac arrhythmias. ACLS should be applied rapidly and effectively following electric and lightning strikes. Key objectives include maintaining respiration and circulation, ensuring oxygenation, and correcting cardiac rhythm. However, specific considerations must be taken into account in these types of injuries. For instance, high levels of tissue damage and burns may result from electrical shocks, making airway management and respiratory support challenging. Electric and lightning strikes require prompt treatment and monitoring. In addition to ACLS, the patient’s overall condition and potential complications should be considered. Depending on the severity of the injury, fluid therapy and other supportive measures should be implemented. In conclusion, ACLS in electric and lightning strikes is a vital emergency medicine procedure. Swift and effective intervention can improve the patient’s chances of survival and help prevent long-term complications. Therefore, continuous education and updating of knowledge on electric and lightning strikes are essential for emergency medicine teams.
APA, Harvard, Vancouver, ISO, and other styles
9

Baer, Tobias. "Managerial Strategies for Correcting Algorithmic Bias." In Understand, Manage, and Prevent Algorithmic Bias. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4885-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bajpai, Indu, and Bikramjit Basu. "Strategies to Prevent Bacterial Adhesion on Biomaterials." In Biomimetics. John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118810408.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Strategies to prevent strikes"

1

Fitzgerald, Brian J., Peter Lazar, Robert M. Kay, and Stefan Winnik. "Strategies to Prevent Corrosion under Insulation in Petrochemical Industry Piping." In CORROSION 2003. NACE International, 2003. https://doi.org/10.5006/c2003-03029.

Full text
Abstract:
Abstract Corrosion Under Insulation (CUI) in piping systems consumes a significant percent of the maintenance budget in the petrochemical industry. A large portion of this money is spent on expense items such as external piping inspection, insulation removal and re-installation, painting and pipe replacements. CUI Prevention Strategies provide long term and reliable prevention of CUI that move towards "inspection-free; maintenance-free" piping systems and significant maintenance cost reductions. Prevention of CUI by the use of (1) thermal spray aluminum, (2) stainless steel pipe, (3) expanded metal cages for personnel protection instead of insulation and (4) aluminum foil wrapping are discussed in terms of long term protection potential, initial installed cost and Life cycle cost.
APA, Harvard, Vancouver, ISO, and other styles
2

Chanakya, Gubbala, Nnarri Bhargavee, V. Naveen Kumar, V. Namitha, P. Naresh, and Sk Khaleelullah. "Machine Learning for Web Security: Strategies to Detect and Prevent Malicious Activities." In 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI). IEEE, 2024. http://dx.doi.org/10.1109/icoici62503.2024.10696229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cojocaru, Stefan. "NATIONAL STRATEGIES FOR BULLYING PREVENTION IN SCHOOLS: PARTNERSHIP BETWEEN SCHOOL, PARENTS AND CHILDREN TO PREVENT BULLYING." In 17th annual International Conference of Education, Research and Innovation. IATED, 2024. https://doi.org/10.21125/iceri.2024.1177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Safiulina, Elena, Oksana Labanova, Filomena Soares, and Ana Paula Lopes. "DESIGNING EXERCISES TO PREVENT AI-ASSISTED CHEATING: STRATEGIES FOR EFFECTIVE LEARNING IN THE ERA OF CHATGPT." In 19th International Technology, Education and Development Conference. IATED, 2025. https://doi.org/10.21125/inted.2025.1597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Geissler, Brett, Renato De Paula, Carrie Keller-Schultz, Jennifer Lilley, and Vic Keasler. "Data Mining to Prevent Microbiologically Influenced Corrosion?" In CORROSION 2014. NACE International, 2014. https://doi.org/10.5006/c2014-4080.

Full text
Abstract:
Abstract Oilfield microorganisms are directly responsible for many problems in the oil and gas industry, including microbiologically influenced corrosion, biofouling, reservoir souring, as well as employee injury. Recent efforts in both industrial and academic microbiology labs have been focused on identifying the particular types of bacteria and archaea responsible for causing these issues. This knowledge will assist in the design of better prevention, treatment, and control strategies for microbial activity. A series of in-depth analyses were carried out on a database of field samples submitted for microbial speciation in order to assist in making microbiology-related recommendations for the initial design phase of assets. This database contains over 500 different bacterial and archaeal species identified from &amp;gt;4000 samples submitted since 2009 from locations around the globe. These analyses showed an array of correlations between the types of microbes present in the submitted samples and the locations and processes in which they originated. The key learnings from these analyses have increased our overall understanding of the oilfield microbial population as well as better prepared us to intervene in their corrosive and undesirable activities.
APA, Harvard, Vancouver, ISO, and other styles
6

Byl, M. F., M. B. Frish, R. T. Wainner, et al. "Pipeline Evaluation Network for Protection from Third-Party Intrusion." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11307.

Full text
Abstract:
Abstract Third-party intrusion, i.e. unauthorized excavation that accidentally strikes and damages or ruptures a pipeline, is a primary cause of loss to gas pipeline integrity. The NYSEARCH/Northeast Gas Association, American Innovations and Physical Sciences Inc. are jointly developing an autonomous distributed sensor alarm and notification system that provides pipeline operators with a real-time warning of unauthorized right-of-way encroachment and excavation activity near a pipeline. Early warning provides pipeline owners the ability to respond to an intrusion in time to prevent pipeline damage, and preclude incurring the additional cost and risk of repairs. This intruder warning system consists of a network of discrete and unattended, geographically-distributed underground seismic sensor packages deployed along a pipeline right of way. Each sensor package continually processes seismic signals to distinguish threats or abnormal events from benign sounds. When activity is detected, several sensors acting collectively classify the activity as "safe" or a "pipeline threat". "Threat" events activate immediate notifications to pipeline operators via a wireless remote monitoring system. Notifications are communicated via text, email, and/or voice notification. This paper will present an overview of the intrusion warning system, including descriptions of the system hardware, performance specifications, operations, field test results and current development status.
APA, Harvard, Vancouver, ISO, and other styles
7

Pope, Daniel H., Timothy P. Zintel, Bruce A. Cookingham, et al. "Mitigation Strategies for Microbiologically Influenced Corrosion in Gas Industry Facilities." In CORROSION 1989. NACE International, 1989. https://doi.org/10.5006/c1989-89192.

Full text
Abstract:
Abstract A study of microbiologically influenced corrosion (MIC) and its mitigation in gas industry facilities, sponsored by the Gas Research Institute, was conducted during 1986-88. The results show that MIC commonly occurs on both external and internal surfaces of pipes, in down hole tubulars and in process equipment such as separators. Mitigation strategies were tested in side-stream devices at several sites. The results demonstrate that many biocides and corrosion inhibitors are relatively ineffective in controlling the surface microbial populations, at least under the conditions of the tests. Detailed studies with glutaraldehyde demonstrated that reestablishment of surface MIC communites after removal of this biocide was very rapid. Continuous treatment with glutaraldehyde led to the development of surface microbial communities "resistant" to the effects of the biocide. Intermittent treatment with glutaraldehyde, when applied frequently enough, effectively controlled the surface MIC populations. Heat treatment was very effective and might be used in some facilities (e.g., separators) to prevent inputs of large amounts of MIC bacteria into pipelines. The results of field investigations of external MIC of buried gas pipelines are summarized and possible mitigation measures discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Haiping, Wei Wei, Wei Wang, Chao Yan, Roy Young, and David Nix. "Case Histories of Permian Area Scale Treatment Challenges and Chemical Program Optimization Strategies." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20857.

Full text
Abstract:
Abstract During production in the Permian Area, one of the most impactful operational issues is scale formation and deposition, which can be related to CaCO3, CaSO4, BaSO4, FeS, etc. Scale can occur anywhere from downhole reservoirs and wellbores to topside facilities. Based on different scale formation species, operation conditions, and system requirements, scale treatment strategies will vary and can include the following aspects: For downhole conditions, either continuous injection or squeeze application can be applied. Squeeze treatments can effectively prevent carbonate and sulfate scales for typically at least 6 to 12 months and help to reduce the amount of solid deposition downhole and in surface facilities.For surface facilities, continuous injection is usually applied. Scale inhibitors should be compatible with high TDS &amp; high calcium waters to avoid pseudo scale formation, causing increased usage of inhibitors and even blockage of the system.Iron sulfide (FeS) scale can be controlled by chelators, i.e., Tetrakis(hydroxymethyl)phosphonium sulfate (THPS), though typically should be combined with corrosion control and even H2S scavenging treatment to reduce FeS solid deposition. This paper presents case histories from the Permian Area, including general scale issues, FeS deposition cases, and guidance for selecting suitable treatment programs to provide insights on future scale treatments in similar operations.
APA, Harvard, Vancouver, ISO, and other styles
9

Canto, Jorge, Hernan Rivera, Lorenzo M. Martinez-dela-Escalera, et al. "Development of Devices to Prevent Vandalism over Cathodic Protection Components in Social Conflicted Regions." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11305.

Full text
Abstract:
Abstract Vandalized rectifiers, anode beds, wirings, and power transformers are common causes of cathodic protection (CP) failure and corrosion problems for Mexican pipelines. The cost of replacing vandalized rectifiers, ground beds, cables and transformers, and the resulting corrosion damage to pipelines has a serious economic impact. In recent years, vandalism has increased being hammer and chisel the main tools employed by vandals. In order to deter this kind of actions, a novel approach is needed for the protection against vandalism for CP systems. Concealing, dissuading, alerting, and strengthening are the key conceptual basis of a set of devices and strategies that were developed to protect CP components in socially hostile environments. We present the design of a double layer reinforced concrete bunker for the protection of deep anode bed top sections providing multiple vents for anodic reaction products, alarm wiring, and a cavity for manual measuring of the anode current. For rectifier protection, a system was developed in order to conceal and protect a rectifier under the floor level, where it can only be drawn out employing a magnetic handle. Finally, the use of plastic instead of concrete for pipeline CP system test stations was proposed along with high impact signs that better communicate the dangers of excavating on pipeline right of ways.
APA, Harvard, Vancouver, ISO, and other styles
10

Fernandez, Monica, Chris Jeske, and Carlos Adolfo Maldonado Salazar. "An In-depth Look into Internal Corrosion at Well Site Separation Skid Water Outlet Piping and How to Prevent It." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00385.

Full text
Abstract:
Abstract This paper examines the internal corrosion mechanisms observed during both the initial and steady-state production phases of a well separation skid water outlet piping system. The corrosion processes were influenced by a range of factors including acid gases, solid particles such as sand, flow variations, water chemistry, bacterial activity and the operational configuration of the piping. Extensive testing was carried out, including chemical analysis, hardness testing, microscopy, X-ray diffraction and scanning electron microscopy coupled with energy dispersive spectroscopy. Additional analyses of water and solids, bacterial counts by serial dilution and qPCR were carried out. The primary corrosion mechanism was identified as CO2 corrosion, with potential exacerbation by MIC and UDC. The paper outlines mitigation and control strategies, including chemical treatments with corrosion inhibitors and biocides, physical cleaning by flushing, installation of secondary sand separators, and redesign of the piping layout. In addition, corrosion monitoring and non-destructive techniques to assess metal loss and anomaly growth are used to verify the effectiveness of control and mitigation barriers, such as the use of coupons, X-rays and monitoring of iron, manganese and bacterial counts. Implementation of these strategies will effectively mitigate internal corrosion and prevent LOPC, thereby ensuring the integrity of the asset.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Strategies to prevent strikes"

1

Cavallo, Eduardo A., and Eduardo Fernández-Arias. External Crisis Vulnerability in Latin America and the Caribbean. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005010.

Full text
Abstract:
This paper assesses the vulnerability of Latin American and Caribbean (LAC) economies to external crises. It shows that while the average LAC economy has made significant strides to reduce vulnerability to crises to its historical minimum, there is still considerable room for improvement, compared to both advanced and non-advanced economies. When compared to other non-advanced economies, the average LAC economy displays a higher level of vulnerability, mainly due to slower improvements in portfolio composition and less accumulation of international reserves since 2000. Advanced economies have lower exposure to external risk factors and a structural resilience advantage to prevent exposure from leading to crises. This analysis highlights the need for LAC economies to focus more on enhancing their risk-mitigating strategies concerning the composition of their external portfolios and reserves accumulation, which will provide a stronger buffer against external shocks and promote overall economic resilience.
APA, Harvard, Vancouver, ISO, and other styles
2

Onarinde, Bukola A., Louise Manning, Joshua Skoczylis, et al. What works to prevent food fraud. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.lzy803.

Full text
Abstract:
This study was undertaken to guide the FSA and the National Food Crime Unit (NFCU) on the development of future strategies and operational activities to improve food fraud prevention. Its aims were to: (1) Investigate successful initiatives and strategies for fraud prevention and especially food fraud prevention; (2) understand what has worked well in preventing commodity-based fraud (including food fraud) and the lessons learned from these initiatives and strategies; (3) provide recommendations which could be adopted by the NFCU and incorporated into the unit’s key strategies; and (4) provide recommendations for any future research required within this area. The key research questions which underpinned these objectives were: (1) What food fraud prevention strategies and initiatives have been implemented in the UK and other countries? (2) What strategies and initiatives have been implemented to prevent and tackle commodity-based fraud in other industries? (3) What conditions need to be in place to enable fraud prevention strategies to be successful?
APA, Harvard, Vancouver, ISO, and other styles
3

Fehily, Caitlin, Julia Dray, Olivia Wynne, et al. Interventions to reduce or prevent lifestyle risks for people with disability. The Sax Institute, 2021. http://dx.doi.org/10.57022/jmuj9605.

Full text
Abstract:
This Evidence Snapshot, commissioned by the Australian Commission on Safety and Quality in Health Care, identifies evaluated interventions targeting lifestyle risks and behaviours that reduce the risk of chronic disease for adults with disability. A range of intervention strategies were found, focusing on different risks. Of these, the reviewers found good evidence to support the following strategies: consumer education and resources, individualised goals and activities, practical support, involving family/unpaid carers, and staff training. The Snapshot is one of three rapid reviews funded by the NDIS Quality and Safeguards Commission examining effective strategies to improve the health of people with disabilities.
APA, Harvard, Vancouver, ISO, and other styles
4

Leach, Roland M., Carol V. Gay, Mark Pines, and Shmuel Hurwitz. Developing Nutritional-Management Protocols which Prevent Tibial Dyschondroplasia. United States Department of Agriculture, 1996. http://dx.doi.org/10.32747/1996.7573994.bard.

Full text
Abstract:
The objectives of this proposal were (1) to develop early age short-term restrict feeding protocols which eliminate the incidence of TD without compromising market weight performance and (2) monitor the components of the PTH/PTHrP cascade in conjunction with the development of the protocols in Objective 1. In this investigation it was established that changes in gene expression associated with TD occur as early as 13 days of age. This means that management strategies for the control of this disease must be established during the initial two weeks of rearing. In order to determine a focus for these management strategies, attempts were made to identify the metabolic defect responsible for tibial dyschondroplasia. Therefore, the parathyroid hormone/parathyrod related peptide (PTH/PTHrP) cascade of events was investigated. This emphasis was based on the fact that many nutritional factors that influence TD could be operating through this system. Secondly, the receptor for these peptides acts as the gatekeeper of chondrocyte differentiation. Examination of many aspects of this cascade led to the conclusion that TD is not the direct result of perturbation of this PTH/PTHrP receptor but is likely to develop from an interruption of a pathway downstream from this receptor.
APA, Harvard, Vancouver, ISO, and other styles
5

Opiyo, Newton. What are the effects of strategies to increase possession and use of insecticide-treated bednets to prevent malaria? SUPPORT, 2017. http://dx.doi.org/10.30846/170215.

Full text
Abstract:
Malaria is a life-threatening parasitic disease that affects approximately 40% of the world’s population (mostly in the poorest countries). Insecticide-treated bednets effectively prevent malaria. However, cost and other barriers can hinder possession and use of insecticide-treated bednets. Strategies to increase possession and use include providing bednets for free or reducing the cost, education about appropriate use of bednets, and providing incentives to encourage use of bednets. Malaria is a life-threatening parasitic disease that affects approximately 40% of the world’s population (mostly in the poorest countries). Insecticide-treated bednets effectively prevent malaria. However, cost and other barriers can hinder possession and use of insecticide-treated bednets. Strategies to increase possession and use include providing bednets for free or reducing the cost, education about appropriate use of bednets, and providing incentives to encourage use of bednets.
APA, Harvard, Vancouver, ISO, and other styles
6

Wyness, Gill, Ingrid Schoon, Andy Ross, Kathryn Duckworth, and David J. Smith. Prevention and Reduction: A review of strategies for intervening early to prevent or reduce youth crime and anti-social behaviour. The IFS, 2011. http://dx.doi.org/10.1920/re.ifs.2024.0717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kirk, Karen, Sanyukta Mathur, and Julie Pulerwitz. Best Practices to Prevent and Respond to Sexual Violence: Evidence review and programme considerations. Population Council, 2023. http://dx.doi.org/10.31899/sbsr2023.1055.

Full text
Abstract:
Presentation for AGYW &amp; South-to-South Learning Network Champions to fill a knowledge gap about what strategies have been tested and found effective in low- and middle-income countries (LMICs) to prevent and respond to sexual violence experienced by adolescent girls and young women (AGYW). This topic was identified by East and Southern African Champions as a key impediment to their HIV prevention programming efforts. This review focused on evidence from all 15 South-to-South Learning Network (SSLN) countries to gather and synthesise contextually relevant information.
APA, Harvard, Vancouver, ISO, and other styles
8

Lal, Shankar, and Ehtesham Khan. Perioperative Management of Diabetic Patients: Optimising Care with Insulin Pumps and CGM Devices. World Federation of Societies of Anaesthesiologists, 2024. http://dx.doi.org/10.28923/atotw.524.

Full text
Abstract:
This tutorial examines the perioperative management of diabetic patients using insulin pumps and CGM devices. It focuses on optimizing care through patient-centred strategies, preoperative evaluation, and education on glucose management to prevent complications and ensure stable blood glucose levels.
APA, Harvard, Vancouver, ISO, and other styles
9

Fang, Margaret, Alan Go, Kristi Reynolds, et al. Comparing Treatment Strategies to Prevent Future Blood Clots among Patients Who Received at Least Three Months of Blood Thinners -- The ALTERNATIVE Study. Patient-Centered Outcomes Research Institute® (PCORI), 2022. http://dx.doi.org/10.25302/10.2022.noacs.151032651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mountcastle, Sophie, and Lorna Christie. Food fraud. Parliamentary Office of Science and Technology, 2020. http://dx.doi.org/10.58248/pn624.

Full text
Abstract:
Evidence suggests that food fraud continues to be an issue in the global food supply chain. This POSTnote provides an overview of food fraud, including its drivers and impacts. It discusses methods for food authenticity testing, broader strategies to prevent food fraud and impacts of EU exit.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!