• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The development of a protocol for the management child abuse and neglect

Barnes-Septermber, Roseline, L January 1998 (has links)
Philosophiae Doctor - PhD / The primary intent of this study was to seek solutions to the practical problems experienced by practitioners in their management of child abuse cases. A fundamental problem regarding the current management of child abuse is that there is no guarantee that a child entering the child protective system will be dealt with in terms of a set procedure and/or protected against further abuse. To address this problem in the Western Cape, the Intervention Research (IR) methodology (Rothman & Thomas, 1994) was used to develop a Protocol for the Multi- Disciplinary Management of Child Abuse and Neglect. IV The protocol was designed for agencies that intervene in instances of child abuse. It establishes criteria and procedures for interdisciplinary co-ordination and effective case management, delineates the professional roles and responsibilities and provides step-by-step intervention procedures. The Intervention Research Design and Development methodology provided a useful framework to apply social science research methods to child protective practice and policy reform. IR focuses on the design of practice guidelines for intervention and policy reform. It can be conducted in a diversity of practice settings and therefore enhances collaborative efforts and inter-agency exchange among practitioners and among practitioners and universities. The study evolved through six phases involving inter-as well as intra-disciplinary activities. These activities were guided by systematic and deliberate research procedures, techniques and instruments. The research phases included: problem analysis; information gathering and synthesis; the development and design of the protocol; testing the protocol through a process of workshops and finally, the launch and dissemination of the protocol. http://etd.uwc.ac.za A core element of the study was the active participation and collaboration of a broad range of key stakeholders, including: victims of child abuse, their families, service providers, and policy makers. The methods and instruments used were therefore designed to enhance participation and included interviews, workshops and observation of court processes. The bottom-up approach and collaborative design enhanced the level of contextual relevance, ownership and the commitment of stakeholders. As a demonstration of this commitment, the protocol has been endorsed by the Ministry of Justice and the Ministry of Health and Social Services of the Western Cape. The Department of Social Services has committed financial support to the project and is pilot testing it in three districts. The study cautions that protocols alone cannot eradicate and solve all the problems in the child protective field and asserts that there is an urgent and critical need to develop and to implement a National Strategy on Child Abuse. Such a National strategy should include legislation that supports and enforces all aspects of a national policy on child abuse. At minimum, national policy should ensure consistent political will and leadership. This means that broad statements about the obligations of politicians and state officials is not enough. These should be followed by specific accountability and measuring mechanisms for enforcement. State policy should also provide guidelines for standardized and appropriate working conditions, recruitment and training of staff. Furthermore, it should provide for a broad array of effective and accessible services to all children and families and the co-ordination of such services. Finally, legislation should include specific obligations regarding the appropriation of adequate and flexible funding to see that commitments made to children are realized
2

Empirical Data Based Predictive Warning System on an Automated Guided Vehicle / Empiriskt databaserat predikterande varningsystem för självkörande truckar

Blåberg, Anton, Lindahl, Gustav January 2022 (has links)
An Automated Guided Vehicle (AGV) must follow protective regulations to avoidcrashing into people when autonomously driving in industries. These safety norms require AGVs to enable protective fields, which perform hard braking when objects enter aspecific area in front of the vehicle. Warning fields, or warning systems, are similar fieldsthat decrease the speed of the AGV before objects enter the protective fields to enable asteadier driving. Today at Toyota Material Handling Manufacturing Sweden (TMHMS),warning systems have been implemented but the systems are too sensitive to objects outside of the AGVs path.The purpose of this thesis is to develop a predictive warning system based on empiricaldata from previous driving scenarios. By storing previous positions, the warning systemcould estimate a trajectory based on simple statistics and deploy speed limiting decisionsif objects appear in the upcoming predicted path.The predictive warning system was compared to the current warning system and adeactivated warning system setup in driving performance and driving dynamics. Performance was measured by measuring time to finish an industry-like test track and dynamicswas subjectively rated from a group of experienced AGV developers from TMHMS. Results showed that a predictive warning system drove the test track faster and with betterdynamics than the current warning system and the no warning system setup.Key findings are that a predictive warning system based on empirical data performedbetter in most cases but has some extra requirements to function. Firstly, the method require the AGV to mostly drive on previously driven paths to produce good results. Secondly the warning system requires a somewhat powerful on board computer to handlethe computations. Finally, the warning system requires spatial awareness of pose for thevehicle, as well as structure and shape for deployed protective fields.

Page generated in 0.0527 seconds