Добірка наукової літератури з теми "Surveillance operando"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Surveillance operando".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Surveillance operando":

1

Kowalska, Samanta. "Terrorist Modus Operandi and Protection of Human Rights." Societas et Iurisprudentia 9, no. 4 (2021): 32–51. http://dx.doi.org/10.31262/1339-5467/2021/9/4/32-51.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Nowadays, terrorist attacks increasingly often take on an amorphous form, which may cause the society to assume a state of inaction or to inspire a false sense of security. Escalation of terrorist attacks leads to the introduction of new counteractive measures and revision of the existing systems of security. The current reflections emphasise how the essence of human rights ought to serve as a point of reference for organs of the law enforcement and legislation alike, with the aim of preventing arbitrary surveillance of citizens. The paper demonstrates why it is important for counter-terrorism strategy to be continually revisiting this axiom, which leads to increased practicality of regulations concerning identification and effective combating of terrorism. The axiology of human rights navigates towards universal, timeless values which have the capability of uniting people for the benefit of effective preventive measures based on active involvement, reasonable and future-oriented legislation.
2

RĄB, ŁUKASZ, and KAROLINA KETTLER. "PERSPECTIVE OF SUSTAINABLE DEVELOPMENT IN POST-PANDEMIC WORLD: SURVEILLANCE CAPITALISM AND HOPES." Society Register 4, no. 2 (April 7, 2020): 159–66. http://dx.doi.org/10.14746/sr.2020.4.2.12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The current coronavirus pandemic is not only a health/healthcare crisis but to a vast extent it will also influence other spheres of life, including social relations, the shape of economy and working models, and natural environment. Sustainable development that relies on the previously mentioned pillars (economy, society, environment) is going to be strongly affected by the virus outbreak. There is a threat that the process of recovering from the corona crisis will accelerate and legitimize the dynamics of surveillance capitalism. A really interesting case is going to be the labor world, where thanks to modern technologies, suppression of personal freedoms and triumph of total surveillance might be particularly easy. However, good scenarios are also plausible. The first 21st century pandemic of that scale may force societies to redefine their current modus operandi and shift capitalism into a more sustainable, humanistic model.
3

Shehu, Anas, Hadiza Aliyu Kangiwa, and Abubakar Sani. "REMOTE SURVEILLANCE: A MEANS OF INTELLIGENCE GATHERING FOR MINIMIZING SECURITY CHALLENGES IN NIGERIA." Journal of Engineering Science 29, no. 4 (January 2023): 59–71. http://dx.doi.org/10.52326/jes.utm.2022.29(4).15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Nowadays, national security issues are increasing day by day in most countries. A multitude of measures to reduce the challenges have been presented and even implemented by many authors, but without exhaustive results. The use of computers and sophisticated IT tools by the terrorist group, increasing number of citizens, lack of social amenities and other factors have made some of them inadequate enough to control the problems in Nigeria. The purpose of this paper is to highlight national security challenges in Nigeria and how security oversight is operated. To achieve this, the authors analyze available secondary data, investigating national security modus operandi and presenting the general concept of surveillance. Related works were also investigated for discussion. Remote surveillance, wiretapping, geospatial intelligence and a consolidated national database are proposed to achieve digital intelligence collection for insecurity management.
4

Lemos, Francisco Ney, Adriano Veras Oliveira, and Maria Geciliane de Sousa. "Infecção de sítio cirúrgico: estudo prospectivo de 2.149 pacientes operados." Revista do Colégio Brasileiro de Cirurgiões 26, no. 2 (April 1999): 109–13. http://dx.doi.org/10.1590/s0100-69911999000200008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A atual caracterização de infecção do sítio cirúrgico em incisional superficial, incisional profunda e órgão cavidade, em substituição à tradicional definição de "infecção de ferida operatória", associada a estratificação dos pacientes em grupos de risco de infecção cirúrgica de acordo com a metodologia NNISS (National Nosocomial Infection Surveillance System), permitiram a obtenção de taxas de infecção mais fidedignas e estudos comparativos entre instituições diferentes. Baseado nessa metodologia, o presente trabalho analisa prospectivamente 2.149 pacientes operados no Serviço de Cirurgia do Hospital Geral César Cals (HGCC)-CE, estratificados pelo IRIC (Índice de Risco de Infecção Cirúrgica) e comprova diferenças estatisticamente significativas nas taxas de infecção de sítio cirúrgico para os grupos de IRIC 0, 1,2 e 3, respectivamente de 3,2%, 7,4%, 16,6% e 20,9%. As infecções de maior gravidade ocorrem em pacientes com IRIC 3 e a vigilância pós-alta é importante, na medida em que muitas infecções somente serão diagnosticadas após a alta hospitalar.
5

Prayuda, Rendi. "Kejahatan Transnasional Terorganisir di Wilayah Perbatasan: Studi Modus Operandi Penyelundupan Narkotika Riau dan Malaysia." Andalas Journal of International Studies (AJIS) 9, no. 1 (May 30, 2020): 34. http://dx.doi.org/10.25077/ajis.9.1.34-47.2020.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The transformation of issues in international politics has led to a shift from traditional security issues (war and military) to non-traditional security issues (human security). One form of non-traditional security threat is the transnational crime activity of narcotics smuggling in Southeast Asia. The Southeast Asian region has an area of around 4.4 million KM2 and is known as the "Golden Triangle" narcotics production area on the border of Thailand, Laos, and Myanmar. One of the destination countries for smuggling narcotics in the Southeast Asian region is Indonesia and Riau Province is one of the gateways for the illegal entry of narcotics from other countries, especially Malaysia. This paper aims to analyze the modus operandi of transnational crime in narcotics smuggling in the border regions of Riau and Malaysia. This paper uses a qualitative method using interviews with research informants. The results of this study indicate that the modus operandi of narcotics smuggling in the border regions of Indonesia and Malaysia is carried out by sea along the coastline of the border provinces of Riau and Malaysia. Narcotics are neatly wrapped and installed GPS devices then smuggled at night by using the services of fishermen as a courier. This seawater smuggling route was chosen due to several factors, namely: the proximity of the territorial waters, the number of unofficial or illegal ports, the lack of surveillance patrols along the water area and the professionalism of law enforcement officers in the border region. The transformation of issues in international politics has led to a shift from traditional security issues (war and military) to non-traditional security issues (human security). One form of non-traditional security threat is the transnational crime activity of narcotics smuggling in Southeast Asia. The Southeast Asian region has an area of around 4.4 million KM2 and is known as the "Golden Triangle" narcotics production area on the border of Thailand, Laos, and Myanmar. One of the destination countries for smuggling narcotics in the Southeast Asian region is Indonesia and Riau Province is one of the gateways for the illegal entry of narcotics from other countries, especially Malaysia. This paper aims to analyze the modus operandi of transnational crime in narcotics smuggling in the border regions of Riau and Malaysia. This paper uses a qualitative method using interviews with research informants. The results of this study indicate that the modus operandi of narcotics smuggling in the border regions of Indonesia and Malaysia is carried out by sea along the coastline of the border provinces of Riau and Malaysia. Narcotics are neatly wrapped and installed GPS devices then smuggled at night by using the services of fishermen as a courier. This seawater smuggling route was chosen due to several factors, namely: the proximity of the territorial waters, the number of unofficial or illegal ports, the lack of surveillance patrols along the water area and the professionalism of law enforcement officers in the border region.
6

Lokot, Tetyana. "Be Safe or Be Seen? How Russian Activists Negotiate Visibility and Security in Online Resistance Practices." Surveillance & Society 16, no. 3 (October 12, 2018): 332–46. http://dx.doi.org/10.24908/ss.v16i3.6967.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper examines how Russian opposition activists negotiate online visibility—their own and that of their messages and campaigns—and the security concerns brought on by the pervasive digital surveillance that the state resorts to in order to reinstate its control over the online discursive space. By examining the internet-based presence and activity of the members of Alexey Navalny’s FBK (Anti-Corruption Foundation) and other opposition activists, the paper traces connections between everyday security practices that these activists engage in online and the resistance tactics and repertoires they enact in an environment where the free and open exchange of information on the Russian internet is becoming increasingly difficult. The analysis finds that Russian opposition activists place a high value on digital, media, and security literacy and that navigating the internet using security tools and protocols such as VPN, two-phase authentication, and encrypted messaging is increasingly seen as the default modus operandi for those participating in organised dissent in Russia to mitigate growing state surveillance. Furthermore, the analysis reveals that Russian activists have to balance the need for security with growing visibility—a key factor for entering the mainstream political and social discourse. The tension between being secure and being visible emerges as a key aspect of resistance practices in an environment of near-constant state surveillance, as activists concurrently manage their safety and visibility online to minimise the risks posed by government spying and maximise the effect of their dissent.
7

Boateng, Nana. "Ghana’s Oil find and the Threat of Maritime Piracy in the Shipping Corridor of the Gulf of Guinea." Archives of Business Research 10, no. 03 (March 28, 2022): 106–21. http://dx.doi.org/10.14738/abr.1003.11962.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Gulf of Guinea (GoG) has now carved a name for itself as a piracy hotspot now surpassing the Gulf of Aden in pirate attacks. This sea corridor remains a life line to many of the littoral and land locked states in that region. Oil is an important commodity and the sea lines of communications cannot be overemphasized. Ghana joined the main players of oil production when oil was discovered its Jubilee Oil Field. Being an offshore venture, the oil is stored in the floating production storage and offloading (FPSO) vessel and later offloaded on sea tanker vessels for export. The FPSO is visible as a stationary vessel a couple of nautical miles from the shore and therefore makes it vulnerable to piracy attacks. This paper highlights the modus operandi of these pirate groups notable among them are the Movement for the Emancipation of the Niger Delta (MEND) and also in 2016 the emergence of the Niger Delta Avengers. A PESTLE and SWOT analysis of the situation is looked at while some of the drivers mitigating the ascendency of piracy in this region is mentioned. There is the need for the regional and international security agencies to coordinate their efforts and intensify their efforts in policing the GoG. As a means of Best Management Practice (BMP), vessels are advised to ensure adherence to these practices and fortify themselves with modern communication devices and surveillance equipment to help make early detection of pirate boats as well as having a well-equipped citadel with dedicated communication devices should the need arise to use them.
8

Cecchetto, Fátima Regina, Jacqueline De Oliveira Muniz, and Rodrigo De Araujo Monteiro. "“BASTA TÁ DO LADO” – a construção social do envolvido com o crime." Caderno CRH 31, no. 82 (September 3, 2018): 99–116. http://dx.doi.org/10.9771/ccrh.v31i82.24450.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Partindo do trabalho etnográfico e entrevistas grupais com jovens de duas favelas cariocas, o artigo problematiza a categoria envolvido-com (retirada da linguagem cotidiana) o crime e suas serventias, como um dispositivo de controle social itinerante que fabrica fronteiras móveis que desigualam os desiguais. Isso evidencia como essa noção tem sido mobilizada na distribuição seletiva de vigilância e de punição das juventudes da periferia. Discutem-se suas funcionalidades na regulação das trajetórias e percursos identitários, evidenciando a trama de rotulações que põe em operação deslizamentos de sentido entre as noções de “bandido” e “vulnerável”. Analisa-se o acionamento de moralidades que justificam a gerência de si dos favelados. Revela uma ambição de tutela policial maximizada pelo apetite de criminalização não só dos indivíduos, mas também de seus vínculos sociais.“BASTA TÁ DO LADO”. THE SOCIAL CONSTRUCTION OF THOSE INVOLVED IN CRIMEBased on the ethnographic work and group interviews with young people from two Rio de Janeiro favelas, this article problematizes the category ‘involved-with (taken from the everyday language) crime and its services’, as a fluid social control device that creates moving borders which serve to “unequalize” the unequal. This shows how this notion has been mobilized in the selective distribution of surveillance and punishment of youths in the suburbs. Its functionalities are discussed in the regulation of trajectories and identity paths, highlighting a profiling web that ends up blurring the meaning between the notions of “criminal” and “vulnerable.” The activation of moralities that justify the self-management of the favela inhabitants is analyzed. It reveals an ambition of police custody maximized by the appetite for criminalization not only of individuals, but also of their social relations.Keywords: Involvement. Youths. Social control. Surveillance. Social vulnerability.“IL SUFFIT D’ETRE A COTE.” LA CONSTRUCTION SOCIALE DE CELUI MELE AU CRIMEEn se basant sur les travaux ethnographiques et les interviews de groupe avec des jeunes de deux favelas de Rio de Janeiro, l’article pose le problème de la catégorie mêlé au (extrait du langage courant) crime et à ses services , en tant que dispositif de contrôle social itinérant qui édifie des frontières mobiles qui inégalent les inégaux. Cela montre bien comment cette notion a été mobilisée dans la distribution sélective de la vigilance et de la punition des jeunes de la périphérie. L’article présente ses fonctionnalités dans la régulation des trajectoires et des parcours identitaires en mettant en évidence toute une série d’étiquetages qui entrainent des glissements de sens entre les notions de “bandit” et de “vulnérable”. Il analyse la mise en place de moralités qui justifient la gestion des habitants des favelas par eux-mêmes. Il révèle une ambition de tutelle policière maximisée par l’appétit de criminalisation, non seulement des individus mais aussi de leurs liens sociaux.Mots-clés: Implication. Jeunesses. Contrôle social. Surveillance. Vulnérabilité sociale.
9

Newbold, Haylie G., and Carolyn M. King. "Can a predator see 'invisible' light? Infrared vision in ferrets (Mustelo furo)." Wildlife Research 36, no. 4 (2009): 309. http://dx.doi.org/10.1071/wr08083.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Infrared (wavelengths >750 nm) light-emitting equipment is commonly used worldwide to monitor nocturnal predator and prey behaviour. However, it is possible that the infrared (IR)-light wavelengths emitted from the equipment are so close to the spectral threshold of some key species that the light may be detected. An operant procedure was used to test whether five male ferrets (Mustela furo) could see an IR light with peak wavelengths of 870 and 920 nm. First, the ferrets were taught to press a lever under a lit white light for food reinforcement (overall mean response accuracy was 89%). Changing the properties (wavelength and intensity) of the light did not disrupt the ferrets’ abilities to perform the learned task. When the light was changed to IR (870 nm), four of five ferrets responded to the light at levels significantly higher than chance (mean = 68%, n = 4188, P < 0.01). When glare from a red trial-starting light was removed, two of the five ferrets (S3 and S4) showed strong evidence (response accuracies of 84% and 78%, respectively, P < 0.01) that they could see IR at 870 nm; however, S3 definitely could not see IR at 920 nm (n = 124, mean = 47%, P = 0.53). We conclude that at least some ferrets can see the light emitted from standard monitoring equipment that uses IR wavelengths of ~870 nm. To ensure nocturnal predator and prey behaviours are not altered by IR surveillance, field programs should use only high-wavelength IR diodes (at least 920 nm).
10

Pilia, Michele. "L’adeguatezza dei modelli 231 in relazione alla <i>safety</i> nelle società del settore <i>aviation</i> alla luce della recente interpretazione dell’art. 2638 c.c." Fascicolo 1 | luglio-dicembre 2022, no. 1 (December 8, 2022): 1–21. http://dx.doi.org/10.35948/rdpi/2022.11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
L’attenzione alla sicurezza, connessa anche ai recenti sinistri relativi agli eventi del caso “Boeing 737 max”, il recente protocollo d’intesa raggiunto tra l’ENAC e la Scuola Superiore della Magistratura, finalizzato ad una maggiore consapevolezza reciproca per portare l’amministrazione della giustizia più vicina possibile alla realtà aviation in cui la stessa si troverà ad operare, e infine il crack Alitalia, hanno imposto un’ulteriore riflessione sulla natura dei problemi afferenti la safety degli aeromobili sia sotto il profilo tecnico (di progettazione, realizzazione o impiego), sia sotto il profilo normativo-giuridico. Questo ha condotto le società operanti nel settore a domandarsi se i loro modelli di raccolta delle segnalazioni e di comunicazione con l’ENAC dovessero essere ripensati, specie in considerazione dell’astratta configurabilità dell’art. 2638 c.c. e del conseguente illecito connesso con l’art. 25ter D.lgs. n. 231/2001. &nbsp; Parole chiave: comunicazioni obbligatorie, enti di vigilanza, ENAC, art. 2638 c.c., safety, modello 231 &nbsp; The recent attention about the safety related to the aviation incident, expecially the "Boeing 737 max" case, the new memorandum of understanding reached between Ente Nazionale Aviazione Civile (“ENAC”) and the Italian Scuola Superiore della Magistratura aimed at greater mutual awareness to bring the justice’s administration as close as possible to the aviation reality, and eventually the Alitalia’s crack, require further reflection on the aircraft safety from a technical standpoint (design, construction or use) and legal point of view. This has led the aviation’s companies to a rethinking of their reporting policy and their interactions with ENAC, especially in view of the potential configurability of art. 2638 civil code and the consequent offense connected with art. 25ter D.lgs. n. 231/2001. &nbsp; Keywords: mandatory communication, surveillance Authority, ENAC, art. 2638 c.c., safety, modello 231

Дисертації з теми "Surveillance operando":

1

Albero, Blanquer Laura. "Operando optical sensing for battery diagnosis." Thesis, Sorbonne université, 2022. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2022SORUS134.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Les batteries, qui constituent l'une des technologies de stockage d'énergie les plus polyvalentes, sont essentielles dans un large spectre d'applications telles que les réseaux électriques, l'aérospatiale, la robotique, et les véhicules électriques. Cette dépendance rend la qualité, la fiabilité, la durée de vie et la sécurité des batteries immensément plus importantes que jamais. Cela confirme la nécessité de surveiller avec précision l'état fonctionnel des batteries et appelle donc au développement de techniques de détection intelligente dans ces dispositifs. Cette thèse vise à explorer ce sujet en utilisant des capteurs à fibre optique à réseau de Bragg (FBG). Pour commencer, nous donnons un aperçu historique de l'évolution de la surveillance des batteries, avant de nous concentrer sur la détection optique. Ensuite, nous démontrons la faisabilité de l'incorporation de capteurs FBG à l'intérieur de cellules cylindriques et de poches commerciales pour effectuer une calorimétrie optique. Ensuite, en utilisant le même capteur optique, on étudie la contrainte chimico-mécanique qui se produit au niveau de l'électrode dans des cellules contenant un électrolyte liquide ou solide. Pour la validation du concept, des électrodes en alliage de Li qui présentent d'importants changements de volume lors de l'insertion ou du retrait de Li sont sélectionnées. Au cours de cette thèse, le signal optique surveillé pendant le cyclage de la batterie est traduit soit en température, pression ou stress et corrélé avec le profil de voltage. Enfin, ce travail propose une technique operando avec une utilisation potentiellement efficace pour le diagnostic des cellules et le design des batteries
Rechargeable batteries, as one of the most versatile energy storage technologies, are essential in a broad range of applications such as power grids, aerospace, robotics, consumer electronics, and electric vehicles. Such dependence makes battery quality, reliability, lifetime, and safety (QRLS) immensely more important than ever before. This underlines the need to accurately monitor the batteries’ functional status and therefore calls for the development of non-invasive operando techniques that could inject smart sensing functionalities into these dynamic electrochemical devices directly from inside. This is exactly what this thesis aims to explore by using optical fiber Bragg grating (FBG) sensors. To begin with, we first provide an historical overview of the evolution of battery monitoring, before focusing on optical sensing. Then, we demonstrate the feasibility of incorporating FBG sensors inside commercial pouch and cylindrical cells to perform optical calorimetry, hence assessing chemical events such as solid electrolyte interphase formation or thermodynamic parameters. Next, by using the same optical sensor, the chemo-mechanical stress occurring at the electrode level in cells containing either liquid or solid-state electrolyte is investigated. For proof-of-concept, Li-alloying electrodes that undergo large volume changes upon Li uptake or removal are selected. More specifically, throughout this thesis the optical signal monitored during battery cycling is translated into either temperature, pressure or stress and correlated with the voltage profile. To sum up, this work proposes an operando technique with potential use in cell diagnosis and battery designs
2

Lima, Keler Wertz Schender de. "Análise das condições de operação do Sistema de Informação de Agravos de Notificação (SINAN) nos municípios paulistas." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/6/6132/tde-04052018-114645/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Introdução: O Sistema de Informação de Agravos de Notificação (SINAN) é uma importante ferramenta no apoio às ações da vigilância epidemiológica, sendo capaz de fornecer informações necessárias para o planejamento e intervenções em saúde. Com a descentralização da gestão dos serviços de saúde, as ações de vigilância epidemiológica foram colocadas sob responsabilidade dos municípios, que contam com distintos graus de capacidade administrativa. Objetivo: Analisar as condições de operação do SINAN nos municípios paulistas, segundo o porte populacional, em relação à infraestrutura, processo e apoio institucional. Métodos: Foi aplicado questionário eletrônico para 644 responsáveis pela vigilância epidemiológica, em 2017. Os dados foram analisados segundo porte populacional dos municípios: pequenos (<30.000 habitantes), médios (30.001-200.000) e grandes (>200.000) e por meio de estatística descritiva, com medidas de distribuição e de tendência central; teste de qui-quadrado e ANOVA foram utilizados na comparação entre os grupos. Resultados: Obteve-se 63,2% de retorno. Nos municípios pequenos, os responsáveis são mulheres (88,5%), jovens com <40 anos (60,2%); formação superior (88,3%), experiência com o SINAN <=9 anos (70,3%); com vínculo efetivo (56,4%); as equipes contam com <=2 profissionais (49,6%) receberam capacitação (75,9%) e apoio técnico do GVE (98,1%) para trabalhar com o SINAN; apresentam maior proporção de alta dificuldade em capacitação (16,9%) junto com os municípios médios (16,8%), e avaliam o preenchimento das fichas como bom (59,8%). Os municípios médios apresentam o perfil profissional e tempo de experiência com SINAN semelhante aos pequenos; com mais pós-graduados (47,7%); equipe com 3-6 membros; receberam mais capacitação (79,6%) em relação aos demais grupos. Receberam apoio técnico do GVE (91,2%); apresentam maior proporção de alta dificuldade no item fluxo de retorno (22,1%), como os grandes municípios (21,4%); avaliam o preenchimento das fichas como razoável (48,7%). Nos grandes municípios, predominou o responsável técnico com idade >=50 anos (60,7%) e mais pós-graduados (75,0%); maior número de efetivos (64,3%); profissionais com mais experiência no SINAN; 80,0% possuem >=11 funcionários; receberam capacitação (71,4%) e apoio do GVE (64,3%) para trabalhar com o SINAN em menor proporção que os demais; apresentam maior proporção de alta dificuldade com recursos humanos e avaliam o preenchimento das fichas como razoável (48,7%). Conclusões: O SINAN está implantado nos municípios paulistas, bem consolidado nos municípios grandes, porém os pequenos precisam de medidas de apoio que diminuam a disparidade entre os municípios: políticas e estratégias que estimulem a estabilidade profissional, bem como investimentos na capacitação profissional, aprimoramento dos recursos tecnológicos, avaliações periódicas do SINAN, além de incentivos financeiros voltados para gestão do SINAN.
Introduction: Notifiable Diseases Information System is an important tool in supporting actions of epidemiological surveillance, being able to provide information necessary for health planning and interventions. Regards to decentralization of health services management, actions of epidemiological surveillance were placed under the responsibility of municipalities, which have different degrees of administrative capacity. Objective: To analyze SINAN\'s operational conditions in the municipalities of São Paulo State, according to population size, in relation to infrastructure, process and institutional support. Methods: An electronic questionnaire was applied to 644 epidemiological surveillance managers in 2017. Data were analyzed according to the population size of the municipalities: small-sized (<30,000 inhabitants), medium-sized (30,001-200,000) and large-sized (> 200,000). We conducted a descriptive statistic analyse, distribution and central tendency measures were calculated. Chi-square test and ANOVA were used in the comparison between the groups. Results: 63.2% of questionnaires were answered. In small-sized municipalities, managers are female (88.5%), younger (<40 years old) (60.2%), with higher education degree (88.3%); mainly nurses; with experience with SINAN <=9 years (70.3%); with career civil servant (56.4%); teams have <=2 professionals (49.6%), that received training (75.9%) and technical support from the GVE (98.1%) to work with SINAN. Small-sized municipalities present a higher proportion of high difficulty in the training item (16.9%) as well as the medium-sized municipalities (16.8%), and evaluated the completion of records as good (59.8%). Medium-sized municipalities is similar to smaller ones in relation to time of experience with SINAN and professional profile. Team have more postgraduate persons (47.7%), being composed of 3-6 members. staff received more training (79.6%) in relation to the other groups. Team received technical support from the GVE (91.2%). Staff reported a higher difficulty for flow of return item (22.1%), as well as the large-sized municipalities (21.4%). Team evaluated completeness of the records as reasonable (48.7%). In the large-sized municipalities SINAN\'s managers are >=50 years old (60.7%). This group have a higher percentage of postgraduate professionals (75.0%); higher number of career civil servant (64.3%), 80.0% of teams have >=11members, that received training (71.4%) and GVE support (64.3%) to work with SINAN; professionals have more experience with SINAN. Units have higher number of computers. Managers reported higher difficulty for human resources item, and evaluated completeness of records as reasonable (48.7%). Conclusions: SINAN was implemented in the municipalities of São Paulo State, being consolidated in large-sized municipalities, but small ones need government support measures that reduce disparities between municipalities: policies and strategies that stimulate professional stability, as well as investments in professional training, improvement of technological resources, periodic evaluations of SINAN and financial incentives for the management of SINAN.
3

Baião, Pedro Nuno Morgado. "Operação de AUV a partir dos submarinos da classe Tridente: Em missões ISR e Mine Countermeasures." Master's thesis, 2018. http://hdl.handle.net/10400.26/25100.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Através da eclusa, os submarinos da classe Tridente têm a capacidade de planear, lançar, operar e recolher Autonomous Underwater Vehicles (AUV) do seu interior. Teses anteriores, estudaram e melhoram esta vantagem, dando espaço para pensar nas utilidades destes veículos uma vez no exterior do submarino. Pretende-se projetar um possível método de utilização para dois tipos de operações, Mine Countermeasures (MCM) e Intelligence, Surveillance and Reconnaissance (ISR), que permitam ao AUV ser uma extensão do submarino, sendo mais um instrumento na recolha de informação. A capacidade de operar longe e autonomamente traz a vantagem de se conseguir esclarecer o panorama com risco reduzido para o submarino. A Marinha Portuguesa usa, na atualidade, dois AUV destintos: o SeaCon 2 projetado pela Faculdade de Engenharia da Universidade do Porto (FEUP) e o Gavia 19. Sendo o primeiro um projeto ainda em evolução, procura-se sugerir o próximo estádio do veículo tendo em conta as características operacionais que este devia ter. Assim como propor, tendo em conta as características anteriormente mencionadas, quais os veículos mais adequados, dentro do mercado, para desempenhar os dois tipos de operações. A abordagem ao primeiro tema teve o uso de um exercício de resposta aberta, criado para recolher as ideias de oficiais submarinistas da Marinha Portuguesa sobre como devem operar o submarino para utilizar os AUV. Relativamente ao segundo aspeto, colocou-se questionários com respostas fechadas aos operadores para averiguar quais as características operacionais “ideais” que um AUV deve ter para melhor desempenhar a sua missão.
Through the lock, the Tridente class submarines have the capacity of planning, launching, operating and recovering Autonomous Underwater Vehicles from within. Previous thesis, studied and improved this advantage, giving space to think in the utilities of these vehicles once outside the submarine. It is intended to project a possible method of using the AUV for two kind of operations, Mine Countermeasures and Intelligence, Surveillance and Reconnaissance, that allow the vehicles to be an extension of the submarine, being one more instrument to gather information. The ability to operate far and autonomously enables the advantage of being able to get an overview of the surroundings with minimal risk for the submarine. The portuguese navy, at the present, operates two distinct AUV: SeaCon 2 projected by the Faculdade de Engenharia da Universidade do Porto and Gavia 19. The first, still being an evolving project, it’s suggested a possible next stage of the vehicle in accordance with the operational characteristics it should has. As well as recommend, attending the previously mentioned characteristics, which are the most fitted vehicles, at the market, to perform the two kind of operations. The approach at the first topic had the introduction of an exercise with open answers, created to gather the ideas of portuguese navy’s officers that navigated on submarines about how the submarine should be operated to use AUV. To desenvolve the second aspect, several operators were inquired to discover which were the “ideal” operational characteristics that an AUV should has to better perform its missions.

До бібліографії