• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1106
  • 379
  • 210
  • 133
  • 95
  • 75
  • 37
  • 19
  • 18
  • 18
  • 15
  • 15
  • 15
  • 15
  • 12
  • Tagged with
  • 2453
  • 610
  • 607
  • 376
  • 324
  • 321
  • 267
  • 257
  • 252
  • 234
  • 226
  • 216
  • 210
  • 204
  • 185
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Evaluation of a Postpartum Hemorrhage Protocol

Davies, Lori M 01 January 2019 (has links)
Postpartum hemorrhage is a leading cause of maternal death, yet many deaths related to hemorrhage might be prevented with early recognition and intervention. The birthing unit of a U.S. community hospital formed an interprofessional task force to plan and implement a postpartum hemorrhage protocol that would provide the obstetric team with the knowledge, skills, and tools needed for early identification and quick action when hemorrhage occurred. Lewin's model of change provided a framework for protocol implementation. The purpose of this doctoral project was to evaluate this quality improvement project. Secondary data internal to the organization were collected and analyzed to answer the practice-focused question, Is there a relationship between implementation of a postpartum hemorrhage protocol and the incidence of postpartum hemorrhage? To determine the incidence of postpartum hemorrhage, the number of hemorrhages with and without blood transfusion was divided by the number of deliveries and recorded monthly. The chi-square test was used to analyze the rates of hemorrhage pre- and post-implementation. A statistically significant decrease in hemorrhage was noted post-implementation, suggesting that there was a relationship between implementation of a protocol and the incidence of postpartum hemorrhage. This project supported the Walden University mission by working towards optimal health outcomes for women. Eliminating preventable harm related to hemorrhage benefits women, families, and communities. Lessons learned from the implementation and evaluation of this quality improvement project are expected to be utilized by nursing leaders to address other challenges identified in the obstetric setting.
182

The Design and Application of a Simplified Guaranteed Service for the Internet

Ossipov, Evgueni January 2003 (has links)
Much effort today in the Internet research community isaimed at providing network services for applications that werenot under consideration when the Internet was originallydesigned. Nowadays the network has to support real-timecommunication services that allow clients to transportinformation with expectations on network performance in termsof loss rate, maximum end-to-end delay, and maximum delayjitter. Today there exist two quality of service (QoS)architecture for the Internet: The integrated services, whichis usually referred to as intserv, and the differentiatedservices referred to as diffserv. Although the intserv clearlydefines the quality levels for each of its three serviceclasses, the limited scalability of this QoS architecture is acontinuous topic for discussion among the researchers. Theanalysis of the tradeoffs of the two QoS architecturesmotivated us to design a new QoS architecture which will takethe strength of the existing approaches and will combine themin a simpler, efficient and more scalable manner. In this LicentiateThesis we introduce a guaranteed servicefor the Internet, which definition is similar to the one inintserv: The guaranteed service (GS) is a network servicerecommended for applications with firm requirements on qualityof end-to-end communication. The service should provide zeropacket loss in routers and tightly bound the end-to-end delay.The capacity for a GS connection should be explicitly reservedin every router along a path of a connection. However, incontrary to intserv the necessary quality level will beprovided without per-flow scheduling in the core routers, whichis the major drawback of the intserv architecture. We use thediffserv principle of dealing with aggregates in the corenetwork since this approach is proven to be scalable andefficient. The thesis considers two major building blocks of the newarchitecture: The packet scheduling and the signaling protocol.We have developed a special scheduling algorithm. Our formaland experimental analysis of its delay properties shows thatthe maximum end-to-end delay is acceptable for real-timecommunication. Moreover, our scheme provides a fair service tothe traffic of other service classes. In order to achieve thedesired QoS level, a sufficient amount of capacity should bereserved for the GS connections in all intermediate routersend-to-end. We have developed a both simple and robustsignaling protocol. The realization of our protocol shows thatrouters are able to process up to 700,000 signaling messagesper second without overloading the processor. / NR 20140805
183

Obstetric Nurses’ Beliefs on the Implementation of Comprehensive Postpartum Hemorrhage Protocols

Ebin, Heidi Marie January 2021 (has links)
No description available.
184

A Comparison of Pull- and Push- based Network Monitoring Solutions : Examining Bandwidth and System Resource Usage

Pettersson, Erik January 2021 (has links)
Monitoring of computer networks is central to ensuring that they function as intended, with solutions based on SNMP being used since the inception of the protocol. SNMP is however increasingly being challenged by solutions that, instead of requiring a request-response message flow, simply send information to a central collector at predefined intervals. These solutions are often based on Protobuf and gRPC, which are supported and promoted by equipment manufacturers such as Cisco, Huawei, and Juniper. Two models exist for monitoring. The pull model used by SNMP where requests are sent out in order to retrieve data, has historically been widely used. The push model, where data is sent at predefined intervals without a preceding request, is used by the implementations using Protobuf and gRPC. There is a perceived need to understand which model more efficiently uses bandwidth and the monitored system’s memory and processing resources. The purpose of the thesis is to compare two monitoring solutions, one being SNMP, and one based on Protobuf and gRPC. This is done to determine if one solution makes more efficient use of bandwidth and the system resources available to the network equipment. This could aid those who operate networks or develop monitoring software in determining how to implement their solutions. The study is conducted as a case study, where two routers manufactured by Cisco and Huawei were used to gather data about the bandwidth, memory, and CPU utilisation of the two solutions. The results of the measurements show that when retrieving information about objects that have 1-byte values SNMP was the better performer. When objects with larger values were retrieved SNMP performed best until 26 objects were retrieved per message. Above this point the combination of Protobuf and gRPC performed better, resulting in fewer bytes being sent for a given number of objects. No impact on the memory and CPU utilisation in the routers was shown. / Övervakning av nätverk är av yttersta vikt för att säkerställa att de fungerar som tänkt. Lösningar baserade på SNMP har använts sen protokollet kom till. SNMP utmanas mer och mer av lösningar som, istället för att använda ett meddelandeflöde baserat på fråga-svar, helt enkelt sänder information till en insamlande enhet i fördefinierade intervall. Dessa lösningar baseras ofta på Protobuf och gRPC, vilka stöds och propageras för av bland andra utrustningstillverkarna Cisco, Huawei, och Juniper. Två modeller för övervakning finns. Pull-modellen där frågor skickas ut för att hämta data, används av SNMP och har historiskt sett använts i stor skala. Push- modellen, där data skickas i fördefinierade intervall utan föregående fråga, används av lösningar som använder Protobuf och gRPC. Det finns ett behov av att förstå vilken modell som på ett mer effektivt sätt använder bandbredd och de övervakade systemens minnes- och processorresurser. Syftet med denna rapport är att jämföra två övervakningslösningar. SNMP är den ena lösningen, och den andra lösningen är baserad på Protobuf och gRPC. Detta i syfte att utröna om endera lösning på ett mer effektivt sätt använder bandbredd och systemresurser i nätverksutrustning. Detta kan hjälpa nätverksoperatörer och utvecklare av mjukvara för övervakning att avgöra hur dessa bör implementeras. För att besvara detta används en fallstudie, där två routrar tillverkade av Cisco och Huawei används för att samla in data om de två lösningarnas användning av bandbredd, minne, och processorkraft. Mätningarnas resultat visade att när objekt vars värde var 1 byte hämtades så presterade SNMP bättre. När objekt vars värden var större hämtades presterade SNMP bäst tills 26 objekt hämtades per meddelande. Därefter presterade kombinationen Protobuf och gRPC bättre, och krävde färre bytes för att skicka information om ett givet antal objekt. Ingen påverkan på minnes- eller processoranvändningen i routrarna påvisades av mätresultaten.
185

Systèmes de communications multi-utilisateurs : de la gestion d'interférence au codage réseau / Multi-user communication systems : from interference management to network coding

Mejri, Asma 13 December 2013 (has links)
Ce travail est dédié à l'analyse, la conception et l'évaluation des performances des schémas de codage de réseaux pour les systèmes des communications multi-terminaux. Nous étudions en premier lieu le protocole « compute-and-forward » dans le canal à accès multiples. Nous proposons un critère de construction de codes de réseaux efficaces pour cette stratégie basé sur la résolution d'un problème du vecteur le plus court d'un réseau de points. En addition, nous développons de nouveaux algorithmes de décodage prouvés numériquement plus performants que le décodeur existant du CF. La deuxième partie concerne l'implémentation du protocole CF dans le canal à relais bidirectionnel et le canal à sources et relais multiples. Nous développons des algorithmes de construction de schémas de codage pour le CF et évaluons théoriquement et par simulations numériques leurs performances. La dernière partie concerne le canal MIMO distribué et en particulier une nouvelle architecture de décodeurs « integer forcing » inspirés par le protocole CF. Nous proposons de nouveaux algorithmes de construction des paramètres optimaux de ces décodeurs et montrons par simulations qu'ils apportent un gain significatif par rapport aux récepteurs linéaires existants / This work is dedicated to the analysis, design and performance evaluation of physical layer network coding strategies in multiuser communication systems. The first part is devoted to study the compute-and-forward protocol in the basic multiple access channel. For this strategy, we propose an optimal solution to design efficient network codes based on solving a lattice shortest vector problem. Moreover, we derive novel bounds on the ergodic rate and the outage probability for the CF operating in fast and slow fading channels respectively. Besides, we develop novel decoding algorithms proved numerically to outperform the traditional decoding scheme for the CF. The second part is dedicated to the design and end-to-end performance evaluation of network codes for the CF and the analog network coding in the two-way relay channel and the multi-source multi-relay channel. For each network model we study the decoding at the relay nodes and the end destination, propose search algorithms for optimal network codes for the CF and evaluate, theoretically and numerically, the end-to-end error rate and achievable transmission rate. In the last part, we study new decoders for the distributed MIMO channel termed integer forcing (if). Inspired by the CF, if receivers take advantage of the interference provided by the wireless medium to decode integer linear combinations of the original codewords. We develop in our work efficient algorithms to select optimal if receivers parameters allowing to outperform existing suboptimal linear receivers
186

Development of an Online Resource Manual and Online Protocol to Facilitate Care Coordination

Bingham, Leonore 01 January 2019 (has links)
Persons with disabilities tend to be in poorer health compared to those without disabilities, and timely coordination of care is essential for maintaining optimal health and wellness. The problem addressed in the Care Coordination Referral Project was the lack of timely access to health care and preventive care services for clients with disabilities in the organization for which this project was developed. Using the appraisal of guidelines research and evaluation II model, the purpose of this DNP project was to analyze and synthesize the evidence-based literature to support the project and develop an online health care resource manual and protocol. The practice- focused question focused on evidence from literature that supported the development of a resource manual and protocol to provide care coordination to patients with disabilities. The literature indicated that timely access to care was essential to a patient's overall health and well-being. The manual and protocol were approved by an organizational team and included in the patient care plan. Results of a summative evaluation showed that team members agreed that the project objectives were met, the project was appropriate to the setting, and that strong leadership was demonstrated throughout the project. The findings of this project show that providing the resource manual for the nurses might improve the overall health and well- being of patients with disabilities through access to health care and preventive care services access.
187

Interoperability enhancement at remote locations using thread protocol with UAVs

Vangimalla, Sivateja Reddy 12 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / In 21st century, interoperability in remote locations has always been a matter of contention. Interoperability is very closely related to internet and an efficient process saves a lot of time and money. With the advent of Wireless Sensor Networks (WSN), Native Internet Protocol (NIP) is considered as one of the most pragmatic solutions in market to address interoperability challenges and is gaining more attention in research. However, challenges like reliability, security of data, power consumption, range and maintenance, and accessibility of such internet in remote locations still remain a matter of concern, creating further barriers for interoperability. This research aims at proposing a viable solution to interoperability issues at remote locations, irrespective of its network or payload size, by integrating more advanced Wireless Sensor Protocols like Thread Protocol with a proposed Over The Air (OTA) file transfer functionality, into UAVs. Furthermore, this study analyzes power consumption, reliability, latency and scope of the proposed system and their applications in health care and industries.
188

Vidi: a Lightweight Protocol Between Visualization Systems and Digital Libraries

Wang, Jun 15 July 2002 (has links)
Achieving interoperability between digital libraries and visualization tools is a difficult problem. To solve this problem, a version of the Open Archives Initiative (OAI) Protocol for Metadata Harvesting called VIDI is proposed. It is a lightweight protocol, which contains only 5 request verbs -- Identify, ListMetadataFormats, ListVisdataFormats, ListTransformers, and RequestResultSet. It is extended from the OAI protocol, which enables its simplicity and wider acceptability. It is flexible, which avoids a rigid architecture in implementation. It is general, so it can apply to all kinds of Visualization Systems and Digital Libraries. But most importantly, it reaches our goal of enabling operability between Visualization Systems and Digital Libraries. The protocol design and implementation details are given. Two prototype systems are implemented to demonstrate the above features. Implementation details are given about ENVISION-ODL and ENVISION-MARIAN. Analysis, evaluation, and conclusions reinforce the discussion of the benefits of VIDI. / Master of Science
189

A Comparison of a Youth and a General Ice Hockey Helmet Test Protocol

Cutler, Jarett 05 December 2022 (has links)
Ice hockey helmet standards are employed to test ice hockey helmets to ensure that they mitigate the risk of traumatic brain injuries. These standards primarily reflect adult ice hockey players' anthropometrics and play styles; however, they may not address youth ice hockey players anthropometrics and play styles. This study created a youth helmet test protocol using head impact characteristics specific to the Learn to Play (5-8 years old) youth ice hockey age group environment. The youth helmet test protocol was compared to a general helmet test protocol with the head mass, shoulder mass, and impacting velocities modified to reflect real-world conditions. The dependent variables used in the study included peak resultant linear acceleration, peak resultant rotational velocity, peak resultant rotational acceleration, and maximal principal strain (MPS). Two-way ANOVA identified significant interactions between the test protocols and two helmets tested in this study. This was followed by ANOVA to test for significance across the levels of the independent variables followed by paired t-tests to identify significant differences between the test protocols for each dependent variable for the head to boards and shoulder to head condition (p<0.05). The only significant difference identified between the test protocols for the head to ice condition was linear acceleration. The paired t-tests identified significant differences between the two helmets for all dependent variables for the head to ice and head to boards conditions (p<0.05). The results from this study revealed that youth are being exposed to similar amounts of brain trauma when compared to adults for the head to ice event. The head to ice condition is one of the most common types of impact events in the Learn to Play age group supporting the need to consider a youth specific ice hockey helmet standard test. This study demonstrated that the CCM FL 500 provided better protection for youth ice hockey players, and helmet companies could employ similar technologies to better protect youth from the risk of brain injuries.
190

Untersuchung der Anwendbarkeit des Greenhouse Gas Protocol auf Hochschulen am Beispiel der Fakultät Wirtschaftswissenschaft und Wirtschaftsingenieurwesen der HTWK Leipzig

Motika, Richard 17 January 2024 (has links)
Die Arbeit handelt vom Greenhouse Gas Protocol und der Anwendung auf Hochschulen. Die Untersuchung zeigt, dass das Greenhouse Gas Protocol sehr universell verfasst wurde und sich somit auch auf Hochschulen anwenden lässt. Speziell für den Hochschulkontext werden keine Leitfäden gegeben. Des Weiteren hat sich herausgestellt, dass Energieverbrauch und Pendelverkehr der Studierenden den Großteil der Emissionen ausmachen. Im Fallbeispiel der HTWK Leipzig konnten Emissionen von rund 263 tCO2e im Jahr 2022 identifiziert werden. Die untersuchten Jahre 2020 bis 2022 unterlagen allerdings der Pandemie, weshalb die reellen Emissionen deutlich höher sein könnten.:Abbildungsverzeichnis Tabellenverzeichnis Formelverzeichnis Abkürzungsverzeichnis 1 Einleitung 2 Theoretische Grundlagen der Treibhausgasbilanzierung 2.1 Carbon Footprint 2.2.1 Product Carbon Footprint 2.2.2 Corporate Carbon Footprint 2.2 Nutzen und Relevanz 3 Greenhouse Gas Protocol 3.1 Grundsätze 3.2 Grenzen der Bilanzierung 3.3 Die drei Scopes 3.4 Berechnung der Treibhausgasemissionen 3.4.1 Treibhauspotential und Emissionsfaktor 3.4.2 Formeln zur Berechnung 4. Die Anwendbarkeit des GHG Protocol auf Hochschulen 4.1 Nachhaltigkeit an Hochschulen 4.2 Praktikabilität 4.3 Anwendungsfälle 5. CO₂-Bilanz der Fakultät Wirtschaftswissenschaft & Wirtschaftsingenieurwesen 5.1 Die Fakultät Wirtschaftswissenschaft & Wirtschaftsingenieurwesen. 5.2 Methoden 5.2.1Systemgrenzen 5.2.2 Organisationsbedingte Grenzen 5.2.3 Geschäftsbedingte Grenzen 5.2.4 Datenerhebung und Berechnung 5.3 Identifizierung der Treibhausgasemissionsquellen 5.3.1 Gebäude 5.3.2 Mobilität 5.3.3 Papier 5.4 CO₂-Bilanz 5.5 Schlussfolgerungen 6 Zusammenfassung Anhang Literaturverzeichnis Eidesstattliche Erklärung

Page generated in 0.2567 seconds