• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 52
  • 52
  • 25
  • 13
  • 12
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 187
  • 37
  • 22
  • 20
  • 20
  • 19
  • 18
  • 17
  • 17
  • 15
  • 14
  • 14
  • 13
  • 13
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Scalability of push and pull based event notification : A comparison between webhooks and polling / Skalbarhet hos push- och pullbaserad eventnotifikation : En jämförelse mellan webhooks och polling

Dunér, Daniel, Nilsson, Marcus January 2020 (has links)
Today’s web applications make extensive use of APIs between server and client, or server to server in order to provide new information in the form of events. The question was whether the different methods of procuring events are different in how they scale. This study aims to compare performance between webhooks and polling, the two most commonly used pull and push based methods for event notification when scaling up traffic. The purpose is to create a basis for developers when choosing the method for event notification. The comparison has been developed through measurements of typical indicators of good performance for web applications: CPU usage, memory usage and response time. The tests gave indications that webhooks perform better in most circumstances, but further testing is needed in a more well-defined environment to draw a confident conclusion. / Dagens webbapplikationer använder sig i stor utsträckning av API:er mellan server och klient, eller server till server för att inhämta ny information i form av events (händelser). Frågan är om de olika metoder som finns för att inhämta events skalar olika bra. Förevarande studie ämnar att jämföra prestanda mellan ”webhooks” och ”polling”, de två mest använda pull- och pushbaserade metoderna för eventnotifikation vid uppskalning av trafik. Syftet är att skapa ett underlag för utvecklare vid valet av metod för eventnotifikation. Jämförelsen har tagits fram genom mätningar av typiska indikatorer för god prestanda hos en webbapplikation: CPU-användning, minnesanvändning och svarstid. Testerna gav indikationer om att webhooks är bättre men det krävs vidare testning i en mer väldefinierad miljö för att dra en säkrare slutsats.
112

Svårigheter vid anmälan av barn som far illa - En studie utifrån skolkuratorers perspektiv

Johansson, Sara January 2013 (has links)
Varje år beräknas runt 100 000 barn fara illa i Sverige. Socialtjänsten har ett ansvar för att barn och unga ska växa upp under goda och trygga förhållanden. För att detta ska vara möjligt är anmälningsskyldigheten ett redskap som innebär att myndigheter som rör barn och unga har en skyldighet att till socialnämnden anmäla när de får misstanke eller kännedom om barn som far illa. Skolkuratorer träffar barn varje dag och har därför en gynnsam position när det gäller att uppmärksamma barn som far illa. Studiens syfte har därför varit att belysa vilka för- och nackdelar samt svårigheter anmälningsskyldigheten kan tänkas medföra gentemot barnet och skolkuratorn utifrån ett skolkuratorsperspektiv. De huvudsakliga frågeställningarna ifrågasätter vilka svårigheter det finns med anmälningsskyldigheten gällande barn som far illa samt hur barnet reagerar vid en anmälan. Studien har grundats på en kvalitativ forskningsansats där semistrukturerade intervjuer har utförts. Fyra skolkuratorer har intervjuats och det har ur empirin visat sig att skolkuratorerna främst ser anmälningsskyldigheten som något positivt. Det finns dock svårigheter och nackdelar som skolkuratorerna framfört. Ett ständigt uppkommande faktum har varit att barnet vid anmälan ofta backar och inte berättar sanningen för de inblandade myndigheterna vilket kan resultera i att utredningen läggs ner. Många forskningsavhandlingar belyser när professionella och yrkesverksamma med anmälningsskyldighet väljer att anmäla samt när det räknas som en misstanke. Denna studie kommer därför belysa vilka svårigheter det finns med anmälningsskyldigheten gällande barn som far illa. / Each year around 100 000 children are victims of child abuse in Sweden. In Sweden the social services (Child protection services) have a responsibility to work for children’s right to grow up in safe environment conditions. For this to be possible other authorities and agencies are obliged to report to the social services when they suspect or get award about child abuse. School counselors meet children every day at school and possess a position where they can discover child abuse. The purpose of the study has been to highlight which difficulties and disadvantages that mandatory reporting may arise from the perspective of school counselors. The main issues questioning what difficulties there are with the notification requirement regarding child abuse and how the child reacts to a notification/report. The study was based on a qualitative research approach where semi-structured interviews have been conducted. Four school counselors have been interviewed and the empirical data have found that school counselors primarily see notification/reporting as something positive. However, there are difficulties and disadvantages about reporting to the social services. An ever-emerging fact have been that the child at registration often runs and not telling the truth to the authorities involved, which may result in the investigation is closed.Many research theses highlights the fact that many professionals don’t child abuse and also what they count as a suspicion of child abuse. This study will therefore examine the difficulties, advantages and disadvantages that mandatory reporting may arise from the perspective of school counselors.
113

ISSUES IMPACTING CONTINUOUS PULSE OXIMETRY MONITORING AND WIRELESS CLINICIAN NOTIFICATION SYSTEM AFTER SURGERY / EVALUATION OF ISSUES IMPACTING WIRELESS CLINICIAN NOTIFICATION SYSTEM IN A RANDOMIZED CONTROL TRIAL INVOLVING POSTOPERATIVE VITAL SIGNS MONITORING AND CONTINUOUS PULSE OXIMETRY

Harsha, Prathiba January 2019 (has links)
Background: The VItal siGns monItoring with continuous puLse oximetry And wireless cliNiCian notification aftEr surgery (VIGILANCE) study was a randomized controlled trial designed to assess the impact of continuous vital sign monitoring with alerts to nursing staff on the incidence of postoperative complications in surgical ward patients. Multiple factors interfered with the eHealth intervention implementation and conduct of the VIGILANCE study. Through examination of these challenges, the overall aim of this thesis was to help foster an understanding of the difficulties related to eHealth intervention implementation. The specific objectives were to identify issues related to implementation of intervention system of the VIGILANCE study, and to evaluate the influence of these issues on intervention adoption. Methods: During the VIGILANCE study, issues affecting the implementation of the intervention were documented on case report forms, alarm event forms, and a nursing feedback questionnaire. In this thesis, the issues were identified and evaluated using the Clinical Adoption Framework. Results: The key issues identified include nursing workflow changes, patient withdrawal, wireless network connectivity, false alarms, monitor malfunction, probe issues, and wireless network standards. These issues affected the service, system and information quality. As a result, these issues impacted ‘access’ through decreased ability of nurses to make complete use of the monitors; ‘care quality’ of the trial intervention through decreased effectiveness; and ‘productivity’ through interference in the coordination of care, and thus decreased clinical adoption of the monitoring system. Conclusion: Patient monitoring with eHealth technology in surgical wards has the potential to improve patient outcomes. However, proper planning that includes engagement of front-line nurses, installation of appropriate wireless network infrastructure, and use of comfortable cableless devices are required to maximize the potential of continuous monitoring. / Thesis / Master of Science (MSc) / The VIGILANCE study was a randomized controlled trial assessing the impact of continuous vital signs monitoring with alerts to nurses on the incidence of postoperative complications in surgical ward patients. This thesis identified and evaluated issues with implementation of wireless monitoring systems in the hospital. During VIGILANCE study issues affecting the intervention implementation were documented on case report forms, alarm event forms, and nursing questionnaires. Data related to these issues were explored using the Clinical Adoption Framework. Identified issues included nursing workflow changes, patient withdrawal, wireless network connectivity, false alarms, monitor malfunction, probe issues, and wireless network standards. The issues affected ‘access’ through decreased ability of nurses to make complete use of the monitors; ‘care quality’ of the intervention through decreased effectiveness; and ‘productivity’ by interfering in the care coordination. Future studies should aim to include front-line nurses, appropriate wireless network, and comfortable cableless devices in their planning.
114

An Optimized Alert System Based on Geospatial Location Data

Zeitz, Kimberly Ann 01 July 2014 (has links)
Crises are spontaneous and highly variable events that lead to life threatening and urgent situations. As such, crisis and emergency notification systems need to be both flexible and highly optimized to quickly communicate to users. Implementing the fastest methods, however, is only half of the battle. The use of geospatial location is missing from alert systems utilized at university campuses across the United States. Our research included the design and implementation of a mobile application addition to our campus notification system. This addition is complete with optimizations including an increase in the speed of delivery, message differentiation to enhance message relevance to the user, and usability studies to enhance user trust and understanding. Another advantage is that our application performs all location data computations on the user device with no external storage to protect user location privacy. However, ensuring the adoption of a mobile application that requests location data permissions and relating privacy measures to users is not a trivial matter. We conducted a campus-wide survey and interviews to understand mobile device usage patterns and obtain opinions of a representative portion of the campus population. These findings guided the development of this mobile application and can provide valuable insights which may be helpful for future application releases. Our addition of a mobile application with geospatial location awareness will send users relevant alerts at speeds faster than those of the current campus notification system while still guarding user location privacy, increasing message relevance, and enhancing the probability of adoption and use. / Master of Science
115

DESIGN OF EFFICIENT PACKET MARKING-BASED CONGESTION MANAGEMENT TECHNIQUES FOR CLUSTER INTERCONNECTS

Ferrer Pérez, Joan Lluís 19 December 2012 (has links)
El crecimiento de los computadores paralelos basados en redes de altas prestaciones ha aumentado el interés y esfuerzo de la comunidad investigadora en desarrollar nuevas técnicas que permitan obtener el mejor rendimiento de estas redes. En particular, el desarrollo de nuevas técnicas que permitan un encaminamiento eficiente y que reduzcan la latencia de los paquetes, aumentando así la productividad de la red. Sin embargo, una alta tasa de utilización de la red podría conllevar el que se conoce como "congestión de red", el cual puede causar una degradación del rendimiento. El control de la congestión en redes multietapa es un problema importante que no está completamente resuelto. Con el fin de evitar la degradación del rendimiento de la red cuando aparece congestión, se han propuesto diferentes mecanismos para el control de la congestión. Muchos de estos mecanismos están basados en notificación explícita de la congestión. Para este propósito, los switches detectan congestión y dependiendo de la estrategia aplicada, los paquetes son marcados con la finalidad de advertir a los nodos origenes. Como respuesta, los nodos origenes aplican acciones correctivas para ajustar su tasa de inyección de paquetes. El propósito de esta tesis es analizar las diferentes estratégias de detección y corrección de la congestión en redes multietapa, y proponer nuevos mecanismos de control de la congestión encaminados a este tipo de redes sin descarte de paquetes. Las nuevas propuestas están basadas en una estrategia más refinada de marcaje de paquetes en combinación con un conjunto de acciones correctivas justas que harán al mecanismo capaz de controlar la congestión de manera efectiva con independencia del grado de congestión y de las condiciones de tráfico. / Ferrer Pérez, JL. (2012). DESIGN OF EFFICIENT PACKET MARKING-BASED CONGESTION MANAGEMENT TECHNIQUES FOR CLUSTER INTERCONNECTS [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/18197
116

An Analysis of the Impact of Information Security Policies on Computer Security Breach Incidents in Law Firms

Heikkila, Faith M. 01 January 2009 (has links)
Law firms maintain and store voluminous amounts of highly confidential and proprietary data, such as attorney-client privileged information, intellectual properties, financials, trade secrets, personal, and other sensitive information. There is an ethical obligation to protect law firm client data from unauthorized access. Security breaches jeopardize the reputation of the law firm and could have a substantial financial impact if these confidential data are compromised. Information security policies describe the security goals of a law firm and the acceptable actions and uses of law firm information resources. In this dissertation investigation, the author examined the problem of whether information security policies assist with preventing unauthorized parties from accessing law firm confidential and sensitive information. In 2005, Doherty and Fulford performed an exploratory analysis of security policies and security breach incidents that highlighted the need for research with different target populations. This investigation advanced Doherty and Fulford's research by targeting information security policies and security breach incidents in law firms. The purpose of this dissertation investigation was to determine whether there is a correlation between the timing of security policy development (proactive versus reactive policy development) and the frequency and severity of security breach incidents in law firms of varying sizes. Outcomes of this investigation correlated with Doherty and Fulford's general findings of no evidence of statistically significant relationships between the existence of a written information security policy and the frequency and severity of security breach incidents within law firms. There was also a weak relationship between infrequency of information security policy updates and increase of theft resources. Results demonstrated that, generally, written information security policies in law firms were not created in response to a security breach incident. These findings suggest that information security policies generally are proactively developed by law firms. Important contributions to the body of knowledge from this analysis included the effectiveness of information security policies in reducing the number of computer security breach incidents of law firms, an under represented population, in the information assurance field. Also, the analysis showed the necessity for law firms to become more immersed in state security breach notification law requirements.
117

Sûretés conventionnelles sur créances en droit français, anglais et vietnamien / Consensual security over receivables in french, english and vietnamese law

Bui, Duc Giang 02 June 2014 (has links)
Les créances monétaires constituent une excellente source de crédit et les sûretés sur créances existent en droit français, droit anglais et droit vietnamien. Cependant, si elles sont reconnues de longue date en droit anglais, l’évolution de leur régime juridique est récente en droits français et vietnamien. Par ailleurs, si ces trois droits connaissent tous les sûretés traditionnelles sans transfert de propriété (nantissement de créances, charges sur les créances et hypothèque de créances), l’admission en droit français des seules fiducie sur créances et cession de créances professionnelles à titre de garantie par bordereau Dailly ainsi que le rejet par les juges vietnamiens des cessions innommées à titre de garantie démontrent que l’exploitation de la fonction de garantie de la propriété d’une créance n’est pas encore généralisée en France et au Vietnam à la différence de ce que l’on peut observer en droit anglais à travers la "mortgage"par voie d’"assignment" ou de novation. Enfin, l’hypothèque de créance de droit vietnamien et la "fixed charge" sur les "bookdebts" de droit anglais démontrent qu’une sûreté non basée sur le transfert de propriété peut être tout à fait efficace que ce soit dans un contexte de solvabilité ou de procédure collective du titulaire de la créance.Ces approches révèlent tout l’intérêt d’une entreprise doctorale mise en perspective des nombreux investissements économiques et montages financiers impliquant, de façon croissante, des acteurs économiques et partenaires bancaires internationaux dont les intérêts, les enjeux et les stratégies relèvent par construction, ou nécessité,des ordres juridiques précités. / Receivables constitute an excellent source of credit and security over receivables is available under French, English and Vietnamese law. However, if they have been recognised in English law for a long period of time, their development is quite recent in French and Vietnamese law. Moreover, although these three legal systems recognise all traditional security interests which are not based on the transfer of ownership over secur ed receivables (nantissement de créances in French law, floating and fixed charge over book debts in English law and hypothecation over debt claims in Vietnamese law), the fact that French law only recognises fiducia over receivables and assignment of trade receivables by way of security and Vietnamese judges have rejected the transfer ofownership by means of security, demonstrates that the use of functionality of ownership over receivables has not become widespread in France and in Vietnam. In contrast, in England, mortgages over receivables allow for the transfer of ownership as security, whether by way of an assignment or a novation. Finally, the hypothecation over debt claims of Vietnamese law and the fixed charge over book debts of English law show that security that does not entail the transfer of ownership can be perfectly efficient inside and outside insolvency proceedings.These approaches reveal the interests of a doctoral enterprise put in perspective from numerous economic investments and financing structures involving, in a rising fashion, economic stakeholders and international bank partners whose interests,stakes and strategies fall under (by construction, or necessity) the aforementioned jurisdictions
118

Desenvolvimento e uso de aplicativo móvel para monitoramento da ocorrência de mordeduras por morcegos hematófagos e suspeitas de raiva em herbívoros no Estado de São Paulo / Development and use of a mobile application to monitor the occurrence of bites by hematophagous bats and suspected rabies in herbivores in the state of São Paulo

Rabaquim, Vanessa Cristinne Victor 13 November 2017 (has links)
O monitoramento da população animal é um instrumento imprescindível para o controle de zoonoses e outras doenças. Com o avanço tecnológico, em termos de comunicação, houve o aumento no desenvolvimento de aplicativos móveis. Este trabalho tem com o objetivo desenvolver um aplicativo móvel para o sistema operacional Android® com o propósito de otimizar o sistema de notificação de animais espoliados por morcegos e casos de suspeitas de raiva. Sendo utilizado para o desenvolvimento do aplicativo o Software LiveCode®. O Aplicativo é capaz de se conectar ao banco de dados em um servidor através da Internet móvel ou wi fi, e permite ao proprietário notificar a incidência de mordedura por morcego ou suspeita de raiva no rebanho, e ao médico veterinário visualizar e modificar os dados enviados pelo proprietário da sua região. Diante dos dados obtidos neste trabalho, conclui-se que o aplicativo atende aos objetivos propostos de coletar dados de notificação e otimizar o sistema de notificação. A baixa adesão ao aplicativo, devido a ausência de acesso a Internet pelos proprietários, sugere a necessidade de modificar o sistema de comunicação do aplicativo com o banco de dados. / Monitoring of the animal population is an essential tool for the control of zoonoses and other diseases. With the technological advancement, in terms of communication, there has been an increase in the development of mobile applications. This work aims to develop a mobile application for the Android® operating system for the purpose of optimizing the notification system of bat-bitten animals and suspected rabies cases. LiveCode® Software is used for the development of the application. The application is able to connect to the database on a mobile Internet or wi fi, and allows the owner to report the incidence of bat bitten or suspected rabies in the herd, and to the veterinarian viewing and modifying the data sent by the owner of your region. Based on the data obtained in this work, it is concluded that the application meets the proposed objectives of collecting notification and optimizing the notification system. The low adherence to the application, due to the absence of Internet access by the owners, suggests the need to modify the communication system of the application with the database.
119

Pushnotisernas journalistiska påverkan / The results of push notifications : The news media’s approach and the journalistic change

Lindholm Fjeld, Emilia January 2019 (has links)
This study examines whether the breakthrough of push notifications has affected journalism, and what characterizes the editorial content of push notifications. The study focuses specifically on the two Swedish newspapers Aftonbladet and Dagens Nyheter. Qualitative interviews have been conducted where two people from each newspaper, who in various ways encounter push notifications in their daily work, had the opportunity to share their experiences in the area. These interviews have then been supplemented with a quantitative content analysis, where the two newspapers push notifications are categorized based on specific variables and variable values. The study's theoretical framework is based on theories of news evaluation, news selection and editorial routines. Combined with previous research on what makes news, differences between morning and evening press as well as the consequences of the push notifications, the results of the study is discussed. The conclusions are that the work with push notifications is demanding, competitive and keeps a high tempo. The goal of being first with the push notification can lead to the verification process being down prioritized. There is also a connection that shows that too many push notifications increase the number of news application-uninstallations. In addition, it is concluded that the newsworthiness behind Aftonbladet and Dagens Nyheters push notifications to some extent follows the same pattern as when it comes to news in general. Based on theory and previous research, push notifications seem to be an extension of what characterizes morning and evening press. Both Aftonbladet and Dagens Nyheter focuses on the news that is typical for respective newspapers. However, the push notifications place higher demands when it comes to befit the whole audience. / Denna studie undersöker huruvida pushnotisernas genombrott påverkat journalistiken, samt vad som karaktäriserar det redaktionella innehåll som sänds ut via pushnotiser. Studien fokuserar specifikt på de två svenska dagstidningarna Aftonbladet och Dagens Nyheter. Kvalitativa intervjuer har genomförts där två personer från respektive tidning, som på olika sätt kommer i kontakt med pushnotiser i sitt dagliga arbete, haft möjlighet att berätta om sina erfarenheter i området. Dessa intervjuer har sedan kompletterats med en kvantitativ innehållsanalys, där dagstidningarnas pushnotiser kategoriserats utifrån bestämda variabler och variabelvärden. Studiens teoretiska ramverk har utgångspunkt i teorier om nyhetsvärdering, nyhetsurval och redaktionella rutiner. Utifrån dessa teorier, samt tidigare forskning om vad som blir nyheter, skillnader mellan morgonpress och kvällspress samt notisernas konsekvenser, diskuteras studiens resultat. Slutsatsen som dras är att arbetet med pushnotiser är krävande, tävlingsinriktat och håller ett högt tempo. Målet att vara först ut med pushnotisen kan leda till att verifikationsprocessen nedprioriteras. Det finns även ett samband som visar på att för många pushnotiser ökar antalet avinstallationer av nyhetsapplikationen. Utöver detta dras slutsatsen att nyhetsvärderingen bakom Aftonbladets och Dagens Nyheters pushnotiser till viss del följer samma mönster som när det kommer till nyheter generellt. Utifrån teori och tidigare forskning har pushnotiserna visat sig vara en förlängning av vad som karaktäriserar morgonpress respektive kvällspress, där Aftonbladet respektive Dagens Nyheter fokuserar på de nyheter som följer deras profilering. Pushnotiserna ställer emellertid högrekrav på att lämpa sig för hela läsarkretsen.
120

Desenvolvimento e avaliação de modelo computacional para geração de alertas a partir de notificações de casos de meningite meningocócica / Development and evaluation of a computing model of alerts from meningococcal meningitis notification cases

Zaparoli, Wagner 24 November 2008 (has links)
INTRODUÇÃO: este trabalho apresenta a arquitetura de um sistema de emissão de alertas para surtos e epidemias em tempo real, baseado em notificações eletrônicas da meningite, e discute os resultados dos testes e simulações realizados. MÉTODOS: esse sistema foi desenvolvido em quatro etapas: Concepção, Análise, Construção e Teste/Simulações. A Concepção contemplou a elicitação de requisitos, a qual definiu o que o sistema deve fazer. A Análise se preocupou com a modelagem e especificação das regras que definem como o sistema deve trabalhar. A Construção abrangeu a transformação das regras definidas e modeladas em linguagem de programação. A última etapa, Teste/Simulação, foi responsável por garantir que o sistema construído estava em conformidade com os requisitos elicitados na etapa de Concepção. RESULTADOS: vários artefatos foram criados e algumas constatações foram verificadas nesta etapa. Sobre os artefatos podemos citar os requisitos, casos de uso, diagrama de classes, modelo físico de dados, casos de teste e programas. Sobre as constatações podemos citar o disparo de alertas nas simulações realizadas pelo sistema dois dias antes que o alerta feito pelas autoridades de saúde do Estado de São Paulo usando os procedimentos habituais. DISCUSSÃO e CONCLUSÃO: O sistema desenvolvido pode ser classificado como um Early Warning System. Nas simulações, observamos que em duas oportunidades ele conseguiu evidenciar ocorrência de surto antecipadamente ao método tradicional utilizado pelo Centro de Vigilância Epidemiológico de São Paulo. Comparando-o com sistemas semelhantes em produção, verificamos que esse sistema se diferencia ao emitir ativamente alertas de surtos em tempo real. / INTRODUCTION: this essay presents the architecture of an alert system for epidemics based on real-time electronic notification of meningococcal meningitis, and discusses the results of tests and simulations made. METHODS: this system was developed in four stages: Conception, Analysis, Construction and Test/Simulation. The Conception covered the requirements elicitation, which defined what the system should do. The Analysis involved the modeling and specification rules that defined how the system should work. The Construction covered the transformation of defined and modeled rules in programming language. The last stage, Test/Simulation, checked the system under known scenarios, comparing the timing of outputs with the Brazilian notification surveillance framework. RESULTS: many artifacts were made and some evidences were verified. About the artifacts we can mention the requirements, use cases, class diagram, physical data model, test cases, and algorithms. About the evidences we can mention the fast alert production in simulations of this system as compared with the current procedure in use by health authorities. DISCUSSION AND CONCLUSION: this system can be classified as an Early Warning System. In simulations we observed that in two opportunities, it managed to put in evidence outbreak occurrence in advance to the traditional used method by Epidemiological Surveillance Center of São Paulo. In comparison with the similar systems under operation, we note this system is distinguished from them in issuing real-time outbreak alerts.

Page generated in 0.1009 seconds