• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 206
  • 85
  • 61
  • 46
  • 27
  • 18
  • 15
  • 15
  • 9
  • 6
  • 6
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 608
  • 179
  • 136
  • 105
  • 67
  • 56
  • 56
  • 54
  • 52
  • 49
  • 44
  • 44
  • 43
  • 42
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Incident Response Enhancements using Streamlined UAV Mission Planning, Imaging, and Object Detection

Link, Eric Matthew 29 June 2023 (has links)
Systems composed of simple, reliable tools are needed to facilitate adoption of Uncrewed Aerial Vehicles (UAVs) into incident response teams. Existing systems require operators to have highly skilled level of knowledge of UAV operations, including mission planning, low-level system operation, and data analysis. In this paper, a system is introduced to reduce required operator knowledge level via streamlined mission planning, in-flight object detection, and data presentation. For mission planning, two software programs are introduced that utilize geographic data to: (1) update existing missions to a constant above ground level altitude; and (2) auto-generate missions along waterways. To test system performance, a UAV platform based on the Tarot 960 was equipped with an Nvidia Jetson TX2 computing device and a FLIR GigE camera. For demonstration of on-board object detection, the You Only Look Once v8 model was trained on mock propane tanks. A Robot Operating System package was developed to manage communication between the flight controller, camera, and object detection model. Finally, software was developed to present collected data in easy to understand interactive maps containing both detected object locations and surveyed area imagery. Several flight demonstrations were conducted to validate both the performance and usability of the system. The mission planning programs accurately adjust altitude and generate missions along waterways. While in flight, the system demonstrated the capability to take images, perform object detection, and return estimated object locations with an average accuracy of 3.5 meters. The calculated object location data was successfully formatted into interactive maps, providing incident responders with a simple visualization of target locations and surrounding environment. Overall, the system presented meets the specified objectives by reducing the required operator skill level for successful deployment of UAVs into incident response scenarios. / Master of Science / Systems composed of simple, reliable tools are needed to facilitate adoption of Uncrewed Aerial Vehicles (UAVs) into incident response teams. Existing systems require operators to have a high level of knowledge of UAV operations. In this paper, a new system is introduced that reduces required operator knowledge via streamlined mission planning, in-flight object detection, and data presentation. Two mission planning computer programs are introduced that allow users to: (1) update existing missions to maintain constant above ground level altitude; and (2) to autonomously generate missions along waterways. For demonstration of in-flight object detection, a computer vision model was trained on mock propane tanks. Software for capturing images and running the computer vision model was written and deployed onto a UAV equipped with a computer and camera. For post-flight data analysis, software was written to create image mosaics of the surveyed area as well as to plot detected objects on maps. The mission planning software was shown to appropriately adjust altitude in existing missions and to generate new missions along waterways. Through several flight demonstrations, the system appropriately captured images and identified detected target locations with an average accuracy of 3.5 meters. Post-flight, the collected images were successfully combined into single-image mosaics with detected objects marked as points of interest. Overall, the system presented meets the specified objectives by reducing the required operator skill level for successful deployment of UAVs into incident response scenarios.
22

Remote Usability Evaluation Tool

Kodiyalam, Narayanan Gopalakrishnan 27 June 2003 (has links)
Interactive system developers spend most of their time and resources on user interface evaluation in traditional usability laboratories. Since the network itself and the remote work setting have become parts of usage patterns, evaluators do not have unlimited access to representative users for user interface evaluation. Reproducing the user's work context in a laboratory setting is also difficult. These problems have led to the concept of Remote usability evaluation that takes interface evaluation of any application beyond the laboratory setting. The main aim of this thesis work is to develop a tool that can record problems faced by remote users in the form of text and video. The text report and video, which is a sequence of the user's actions while encountering the problem, would help evaluators in preparing usability problem descriptions. This thesis reports the development of the remote usability evaluation method and the process of usability evaluation performed in enhancing features offered by the tool. / Master of Science
23

Analýza bezpečnosti v provozu civilního letectví ČR v letech 2003-2010 / Analysis of traffic safety in civil aviation of the Czech Republic in the years 2003-2010

Gubani, Ondřej January 2012 (has links)
This diploma thesis deals with analysis of causes of events in civil aviation operation in the Czech Republic during the period 2003 - 2010. Based on the analysis of final reports about flight incidents, there were described causes of these events. In conclusion the obtained results are compared with historical development of civil aviation incidents in the Czech Republic
24

Challenges with Incident Management : In Information Technology / Utmaningar med Incident Hantering : Inom Informations Teknologi

Isaksson, Ulrika, Kvarnström, Karin, Nilsson, Malin January 2003 (has links)
IT-security is a global problem and over the world Computer Emergency Response Teams (CERT) are created in order to solve the problem. The common understanding is that IT-security is important but no straight guideline how to deal with it. The Swedish IT-incident centre (SITIC) started 2003. It is a Swedish solution on an international problem. There are challenges to be met when handling an IT-incident centre – organisation form, activity and result. We believe a general solution in IT-incident management that will suit all parties in the society, is a hard task for SITIC as things stand today. What we can deduce from our investigation is that there is no greater need of SITIC among the global companies. We believe one reason for this is that they are going to create within their companies some sort of CERT function by themselves in the future. This in its turn, depend on that the companies do not have any trust to SITIC, they do not see the benefit with an activity as SITIC because they only see the reporting, they do not believe they are going to get something in return. Conclusion: Incident management is not only about reporting incidents, but a continuous life cycle with phases: detect, report, measure and follow-up. / IT-säkerhet är ett globalt problem och över världen skapas Computer Emergency Respons Teams (CERT) för att försöka att lösa olika problem. Den vanliga uppfattningen är att IT-säkerhet är viktigt men att inga direkta guidelines finns för hur man skall hantera det. SITIC som är det svenska IT-incident centret, startade 1 januari, 2003. Det är en svensk lösning på ett internationellt problem. För ett IT-incident center finns det utmaningar att hantera såsom organisations form, verksamhet och resultat. Vi tror att en generell lösning av hanteringen IT-incidenter som skulle passa alla parter i samhället blir svårt för SITIC att klara av som det ser ut idag. Vad vi kan härleda från vår utredning är att det inte finns något större behov av SITIC för de globala företagen. Vi tror att en av anledningarna är att företagen själva i framtiden tänker starta egna CERT-funktioner. Detta i sin tur kan bero på att företagen inte har något större förtroende för SITIC, de kan inte se någon fördel men verksamheten, de ser endast rapporteringsdelen. Företagen tror inte att de kommer att få något tillbaka när dom rapporterar sina incidenter till SITIC. Slutsats: Incident hantering handlar inte bara om att rapportera incidenter, utan det är en kontinuerlig livscykel innehållande faserna: upptäcka, rapportera, åtgärda och följa upp.
25

Challenges with Incident Management : In Information Technology / Utmaningar med incident hantering : Inom informations teknologi

Isaksson, Ulrika, Kvarnström, Karin, Nilsson, Malin January 2003 (has links)
IT-security is a global problem and over the world Computer Emergency Response Teams (CERT) are created in order to solve the problem. The common understanding is that IT-security is important but no straight guideline how to deal with it. The Swedish IT-incident centre (SITIC) started 2003. It is a Swedish solution on an international problem. There are challenges to be met when handling an IT-incident centre – organisation form, activity and result. We believe a general solution in IT-incident management that will suit all parties in the society, is a hard task for SITIC as things stand today. What we can deduce from our investigation is that there is no greater need of SITIC among the global companies. We believe one reason for this is that they are going to create within their companies some sort of CERT function by themselves in the future. This in its turn, depend on that the companies do not have any trust to SITIC, they do not see the benefit with an activity as SITIC because they only see the reporting, they do not believe they are going to get something in return. Conclusion: Incident management is not only about reporting incidents, but a continuous life cycle with phases: detect, report, measure and follow-up. / IT-säkerhet är ett globalt problem och över världen skapas Computer Emergency Respons Teams (CERT) för att försöka att lösa olika problem. Den vanliga uppfattningen är att IT-säkerhet är viktigt men att inga direkta guidelines finns för hur man skall hantera det. SITIC som är det svenska IT-incident centret, startade 1 januari, 2003. Det är en svensk lösning på ett internationellt problem. För ett IT-incident center finns det utmaningar att hantera såsom organisations form, verksamhet och resultat. Vi tror att en generell lösning av hanteringen IT-incidenter som skulle passa alla parter i samhället blir svårt för SITIC att klara av som det ser ut idag. Vad vi kan härleda från vår utredning är att det inte finns något större behov av SITIC för de globala företagen. Vi tror att en av anledningarna är att företagen själva i framtiden tänker starta egna CERT-funktioner. Detta kan bero på att företagen inte har något större förtroende för SITIC, de kan inte se någon fördel men verksamheten, de ser endast rapporteringsdelen. Företagen tror inte att de kommer att få något tillbaka när dom rapporterar sina incidenter till SITIC. Slutsats: Incident hantering handlar inte bara om att rapportera incidenter, utan det är en kontinuerlig livscykel innehållande faserna: upptäcka, rapportera, åtgärda och följa upp. / Ulrika Isaksson, 0708-353984 Karin Kvarnström 0708-140151 Malin Nilsson 0708-626844
26

M-Shell X-Ray Production of Gold, Lead, Bismuth, Uranium for Incident Hydrogen, Helium and Fluorine Ions

Mehta, Rahul 12 1900 (has links)
Incident ¹H⁺ and ⁴He⁺ ions at 0.3-2.6 MeV and ¹⁹F^q⁺ ions at 25, 27 and 35 MeV were used to study the M-shell x-ray production cross sections of Au, Pb, Bi and U. For the incident fluorine ions, projectile charge state dependence of the cross sections were extracted from measurements made with varying target thicknesses ( ~1 to ~300 μg/cm²). The efficiency of the Si(Li) detector was determined by measuring the K-shell x-ray production of various low Z elements and comparing these values to the prediction of the CPSS theory. The experimental results are compared to the prediction of first Born approximation for direct ionization to the continuum and to the OBK of Nikolaev for the electron capture to the K-, L-, M-...shells of the incident ion. Comparison is also made with the ECPSSR theory that accounts for the energy loss, Coulomb deflection, and relativistic effects in the perturbed stationary state theory.
27

Facilitated case discussion as a method of multiprofessional, clinical audit

Robinson, Louise Ann January 1998 (has links)
No description available.
28

Incident prioritisation for intrusion response systems

Jumaat, Nor Badrul Anuar January 2012 (has links)
The landscape of security threats continues to evolve, with attacks becoming more serious and the number of vulnerabilities rising. To manage these threats, many security studies have been undertaken in recent years, mainly focusing on improving detection, prevention and response efficiency. Although there are security tools such as antivirus software and firewalls available to counter them, Intrusion Detection Systems and similar tools such as Intrusion Prevention Systems are still one of the most popular approaches. There are hundreds of published works related to intrusion detection that aim to increase the efficiency and reliability of detection, prevention and response systems. Whilst intrusion detection system technologies have advanced, there are still areas available to explore, particularly with respect to the process of selecting appropriate responses. Supporting a variety of response options, such as proactive, reactive and passive responses, enables security analysts to select the most appropriate response in different contexts. In view of that, a methodical approach that identifies important incidents as opposed to trivial ones is first needed. However, with thousands of incidents identified every day, relying upon manual processes to identify their importance and urgency is complicated, difficult, error-prone and time-consuming, and so prioritising them automatically would help security analysts to focus only on the most critical ones. The existing approaches to incident prioritisation provide various ways to prioritise incidents, but less attention has been given to adopting them into an automated response system. Although some studies have realised the advantages of prioritisation, they released no further studies showing they had continued to investigate the effectiveness of the process. This study concerns enhancing the incident prioritisation scheme to identify critical incidents based upon their criticality and urgency, in order to facilitate an autonomous mode for the response selection process in Intrusion Response Systems. To achieve this aim, this study proposed a novel framework which combines models and strategies identified from the comprehensive literature review. A model to estimate the level of risks of incidents is established, named the Risk Index Model (RIM). With different levels of risk, the Response Strategy Model (RSM) dynamically maps incidents into different types of response, with serious incidents being mapped to active responses in order to minimise their impact, while incidents with less impact have passive responses. The combination of these models provides a seamless way to map incidents automatically; however, it needs to be evaluated in terms of its effectiveness and performances. To demonstrate the results, an evaluation study with four stages was undertaken; these stages were a feasibility study of the RIM, comparison studies with industrial standards such as Common Vulnerabilities Scoring System (CVSS) and Snort, an examination of the effect of different strategies in the rating and ranking process, and a test of the effectiveness and performance of the Response Strategy Model (RSM). With promising results being gathered, a proof-of-concept study was conducted to demonstrate the framework using a live traffic network simulation with online assessment mode via the Security Incident Prioritisation Module (SIPM); this study was used to investigate its effectiveness and practicality. Through the results gathered, this study has demonstrated that the prioritisation process can feasibly be used to facilitate the response selection process in Intrusion Response Systems. The main contribution of this study is to have proposed, designed, evaluated and simulated a framework to support the incident prioritisation process for Intrusion Response Systems.
29

Utilizing Traditional Environmental Knowledge in Industrialized Nations to Assist in Disaster Evacuations

Lea, Brandi M. 05 1900 (has links)
Using traditional ecological knowledge (TEK), which is typically reserved for understanding how indigenous societies function successfully, and applying this to developed countries' ideas of disaster planning and response, emergency planners, public officials, and lay-persons can gain an understanding of their environment. Stories, history, education, and The waterborne evacuation of Lower Manhattan on September 11, 2001 provides a backdrop with which to test the tenets of TEK in a developed nation setting. This dissertation has found that TEK was effective when used by a developed nation and should be integrated into the current disaster system in the US.
30

The Measurement of Threats to Patient Safety in Australian General Practice

Makeham, Meredith Anne Blatt January 2008 (has links)
Doctor of Philosophy(PhD) / The importance of better understanding error and safety in the community setting is widely accepted, with recent calls to promote efforts and improve resources in this area of research (Jacobson, Elwyn et al. 2003). The measurement of patient safety events in primary care is a relatively under-researched area and it is well recognized that there are large gaps in the research describing patient safety in ambulatory settings (Hammons, Piland et al. 2003). Attitudes towards embracing safety event measurement have improved in recent years, however there remains a substantial amount of work to be done before common standards can be recommended, despite recent calls in the scientific literature for national and international systems (Runciman, Williamson et al. 2006). This thesis describes the Threats to Australian Patient Safety (TAPS) study, which aimed to create a secure anonymous web-based error reporting system suited to the Australian general practice setting, and then describe and quantify the errors reported by a representative random sample of Australian general practitioners. The study was made possible with the support of funding from a National Health and Medical Research Council project grant, and also gained support from NSW Health and the Commonwealth Department of Health and Aging in the form of granting qualified privilege and providing essential Medicare data under legal instrument. The study methodology involved the development of a database management system which created an electronic method for managing and analysing a wide variety of vii features related to large numbers of anonymously reported errors from Australian general practice. A representative random sample of 84 general practitioners (GPs) from New South Wales (NSW) participated in the study, with over 400 errors reported in a 12 month period. The key messages arising from the TAPS study were: • GPs embraced anonymous patient safety event reporting using a secure website, with the majority of study participants making reports • New findings from this study on the incidence of reported error in general practice were published in the scientific literature, which will help guide the design of future error reporting systems • A new taxonomy to describe reported error from GPs was developed as part of this study and published in the scientific literature, with the view of allowing future self-coding of reported patient safety events by GPs The TAPS study presented the first calculations known worldwide of the incidence of reported error in a general practice setting using a representative random sample of general practitioners. It was found that if an anonymous, secure, web-based reporting system was provided, approximately 2 errors were reported by general practitioners per 1000 patients seen per year (Makeham, Kidd et al. 2006). In addition, the study created a simple descriptive general practice based error taxonomy, entitled the TAPS taxonomy (see Appendix 10) (Makeham, Stromer et al. 2007), and was the first study to test the reproducibility of the application of such a viii tool using a group of general practitioners. The TAPS taxonomy developed as part of this study was found to have a good level of inter-coder agreement. With respect to the underlying causes of errors, the TAPS study found that the majority of reported patient safety events were errors related to the processes of health care (70%), rather than errors related to the knowledge and skills of health professionals (30%). Most errors reported in the TAPS study had the direct involvement of a patient (93% of error reports). Overall the reporting general practitioners were very familiar with these patients, who were on average 52 years old, and more often female (56%). Around one quarter of the errors reported was associated with patients being harmed. Reports containing events related to processes of health care were associated less with harm than those containing events related to the knowledge and skills of health professionals. The patients in errors associated with patient harm reported in the TAPS study were on average older than patients in reports where no harm was known to have occurred (58 years versus 50 years respectively). There was no statistically significant difference found between these groups with respect to gender or ethnicity, including people from Non-English speaking backgrounds or Aboriginal and Torres Strait Islander (ATSI) peoples, although the association with the latter group approached statistical significance. ix Cases of patient death were reported in 8 of 415 errors reported in the TAPS study (2%), and more often involved events relating to the knowledge and skills of health professionals than events relating to the processes of health care compared to reports not involving a known patient death. In support of suggestions in the scientific literature about the importance of anonymity as a feature of an error reporting system, a feedback interview found that an anonymous reporting system was a factor which made participants more likely to report error events, with two thirds of participants agreeing that anonymity made them more likely to participate in reporting. The majority of participants found the reporting process easy to undertake, and took approximately 6 minutes to send a report. The study provided a self directed learning educational activity for participating general practitioners that was approved for 30 group 1 Quality Assurance and Continuing Education points by the Royal Australian College of General Practitioners (RACGP). An important practical outcome of the TAPS study was that it highlighted a systematic error relating to immunisation failures with meningococcal vaccines which was reported to relevant organisations including NSW Health, the RACGP and the manufacturer involved, which was addressed with educational materials for GPs being distributed and communication in Australian Family Physician. x There are further analyses that could be undertaken using the TAPS data to improve our understanding of the errors reported, such as further statistical analyses using techniques such as building a model with multiple regression to determine significant factors that contribute to different error types. This work was beyond the scope of the TAPS study aims, but is part of further research recommendations. In addition, future studies should address aspects of patient safety and reported error that it would not be possible to capture from the perspective of the reporting GP. Rather than one taxonomy which describes the reported errors from the GP’s perspective in the way that the TAPS taxonomy does, it may be useful to develop a series of interlinked taxonomies that are directed to the needs of differing constituencies, such as the organisation providing health funds or the health insurer, the health regulators and legislators, and the patients or their significant others. The assessment of potential and actual harms sustained by patients involved in reported errors is a further area of patient safety research that is difficult to comprehensively assess, and existing reporting systems in the literature, whilst addressing this from the reporter’s perspective, require further work to improve the accuracy by which harm is measured and correlated with other data sets such as those managed by health insurers, and the experiences of people who are the subject of the reports. The TAPS study presents a number of new findings about the nature of error and threats to patient safety that arise in the Australian health care environment, reported by a representative sample of general practitioners, and it is hoped that these will be xi useful to all stakeholders in the health care setting, from clinicians, through to policy makers, and most importantly the patients who are the subject of the potentially preventable harms and near misses that are highlighted in this thesis

Page generated in 0.0421 seconds