• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 407
  • 170
  • 80
  • 71
  • 34
  • 30
  • 12
  • 10
  • 7
  • 7
  • 6
  • 6
  • 5
  • 3
  • 3
  • Tagged with
  • 960
  • 233
  • 223
  • 145
  • 134
  • 89
  • 86
  • 80
  • 79
  • 78
  • 78
  • 77
  • 77
  • 71
  • 69
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Multimedia communication in e-government interface : a usability and user trust investigation

Almutairi, Badr January 2014 (has links)
In the past few years, e-government has been a topic of much interest among those excited about the advent of Web technologies. Due to the growing demand for effective communication to facilitate real-time interaction between users and e-government applications, many governments are considering installing new tools by e-government portals to mitigate the problems associated with user – interface communication. Therefore, this study is to indicate the use of multimodal metaphors such as audio-visual avatars in e-government interfaces; to increase the user performance of communications and to reduce information overload and lack of trust that is common with many e-government interfaces. However, only a minority of empirical studies has been focused on assessing the role of audio-visual metaphors in e-government. Therefore, the subject of this thesis’ investigation was the use of novel combinations of multimodal metaphors in the presentation of messaging content to produce an evaluation of these combinations’ effects on the users’ communication performance as well as the usability of e-government interfaces and perception of trust. The thesis outlines research comprising three experimental phases. An initial experiment was to explore and compare the usability of text in the presentation of the messaging content versus recorded speech and text with graphic metaphors. The second experimental was to investigate two different styles of incorporating initial avatars versus the auditory channel. The third experiment examined a novel approach around the use of speaking avatars with human-like facial expressions, obverse speaking avatars full body gestures during the presentation of the messaging content to compare the usability and communication performance as well as the perception of trust. The achieved results demonstrated the usefulness of the tested metaphors to enhance e-government usability, improve the performance of communication and increase users’ trust. A set of empirically derived ground-breaking guidelines for the design and use of these metaphors to generate more usable e-government interfaces was the overall provision of the results.
272

Targeting Non-obvious Errors in Death Certificates

Johansson, Lars Age January 2008 (has links)
Mortality statistics are much used although their accuracy is often questioned. Producers of mortality statistics check for errors in death certification but current methods only capture obvious mistakes. This thesis investigates whether non-obvious errors can be found by linking death certificates to hospital discharge data. Data: 69,818 deaths in Sweden 1995. Paper I: Analysing differences between the underlying cause of death from the death certificate (UC) and the main discharge condition from the patient’s last hospitalization (MDC). Paper II: Testing whether differences can be explained by ICD definitions of UC and MDC. Paper III: Surveying methods in 44 current studies on the accuracy of death certificates. Paper IV: Checking death certificates against case summaries for: i) 573 deaths where UC and MDC were the same or the difference could be explained; ii) 562 deaths where the difference could not be explained. Results: In 54% of deaths the MDC differed from the UC. Almost two-thirds of the differences were medically compatible since the MDC might have developed as a complication of the UC. Of 44 recent evaluation studies, only 8 describe the methods in such detail that the study could be replicated. Incompatibility between MDC and UC indicates a four-fold risk that the death certificate is inaccurate. For some diagnostic groups, however, death certificates are often inaccurate even when the UC and MDC are compatible. Conclusion: Producers of official mortality statistics could reduce the number of non-obvious errors in the statistics by collecting additional information on incompatible deaths and on deaths in high-risk diagnostic groups. ICD conventions contribute to the quality problem since they presuppose that all deaths are due to a single underlying cause. However, in an ageing population an increasing number of deaths are due to an accumulation of etiologically unrelated conditions.
273

Kvalitetssäkring enligt Norsok M-650 vid Norrhults Stålgjuteri AB / Quality assurance according to Norsok M-650 at Norrhults Stålgjuteri AB

Ulmhed, David, Adén, Linus January 2016 (has links)
Syftet med denna studie är att undersöka hur Norsok M-650 kan appliceras i processen för att säkerställa kvaliteten på ett gjuteriföretag. Målet är att upptäcka eventuella avvikelser mellan företagets produktion och standarden samt att ta fram den dokumentation som krävs vid en framtida certifiering, en så kallad ”Qualification Test Record”. Studien har utförts genom dokumentering av Norrhults Stålgjuteri AB:s produktion och en analys av standarden.
274

Climate change enhances the mobilisation of naturally occurring metals in high altitude environments.

Zaharescu, Dragos G, Hooda, Peter S, Burghelea, Carmen I, Polyakov, Viktor, Palanca-Soler, Antonio 01 August 2016 (has links)
Manmade climate change has expressed a plethora of complex effects on Earth's biogeochemical compartments. Climate change may also affect the mobilisation of natural metal sources, with potential ecological consequences beyond mountains' geographical limits; however, this question has remained largely unexplored. We investigated this by analysing a number of key climatic factors in relationship with trace metal accumulation in the sediment core of a Pyrenean lake. The sediment metal contents showed increasing accumulation trend over time, and their levels varied in step with recent climate change. The findings further revealed that a rise in the elevation of freezing level, a general increase in the frequency of drier periods, changes in the frequency of winter freezing days and a reducing snow cover since the early 1980s, together are responsible for the observed variability and augmented accumulation of trace metals. Our results provide clear evidence of increased mobilisation of natural metal sources - an overlooked effect of climate change on the environment. With further alterations in climate equilibrium predicted over the ensuing decades, it is likely that mountain catchments in metamorphic areas may become significant sources of trace metals, with potentially harmful consequences for the wider environment.
275

Convert your enemy into a friend : Innovation strategies for collaboration between record companies and BitTorrent networks

Andersen, Axel, Hristov, Emil January 2009 (has links)
<p>Problem: Record companies are facing a downturn in sales of music. This is seen as consequence of the growth of distribution of music through Internet by file sharing networks such as BitTorrent networks. On one side there are record companies who feel threatened of the illegal file sharing, and on the other side file sharing BitTorrent networks has increased dramatically in number of users since they first approached. Some record companies have responded by taking hostile actions towards the BitTorrent networks and their users with lawsuits and penalties for illegal file sharing. Other record companies and artists have joined forces with BitTorrent networks and see them as an advantage. Purpose: The purpose of this paper is to explore and analyze if, and how record companies can collaborate with the BitTorrent networks. Method: A hermeneutic inductive approach is used, in combination with qualitative interviews with both record companies and BitTorrent networks. Conclusions: It is argued that record companies can find a way in communicating and cooperating with BitTorrent networks. Instead of adopting hostile approaches and trying to restrict the technologies adopted by end users, companies should open themselves up and accept the current changes initiated and developed by BitTorrent networks. Thus, it was concluded that companies have to concentrate around collaborating with BitTorrent networks rather than fiercely protecting old business models. By opening up to the users, record companies will adopt open innovations approach that is characterized by combining external and internal ideas, as well internal and external paths to market, thus obtaining future technological developments. As for the BitTorrent networks, by going from outlaw to crowdsourcing mode, the networks’ creative solutions can be further harnessed by record companies. Finally, strengthening relationships between customers and music artists can be considered as beneficial for both record companies and BitTorrent networks. Thus, giving opportunities for customers to win special items, tickets for concerts, watch sound check, eat dinner backstage with the group, take pictures, get autographs, watch the show from the side of the stage, etc. can lead to valuable relationship in a long run.</p>
276

Individual identification, disease monitoring and home range of Leiopelma hamiltoni

Webster, Janelle T. January 2004 (has links)
Amphibian populations are declining on a global scale and although disease outbreaks are a commonly accepted hypothesis they are not the only one. My aims for my thesis were to study the home range of Leiopelma hamiltoni, to determine whether a photographic database could be used to individual identified them and monitor the health status of the population. Habitat loss is a possible cause. For this reason monitoring an animals' home range is a possible method to detect early impacts the population is facing. By tracking 12 L. hamiltoni within a 12 m x 6 m grid on Maud Island, it was shown that the home range size can vary from 0.5 m2 to 25 m2 based on the minimum convex polygon method. However, to track multiple individuals it is important to be able to distinguish among frogs. The commonly used methods of identification, such as toe clipping, pose potentially detrimental effects. Therefore, non-invasive methods based on natural markings need to be established. Through the use of the dark pigmented patterns found on the skin of L. hamiltoni individuals can be identified on recapture with a mean accuracy of 93%. By developing a database to maintain the photographs used for individual identification, the database can also be used to monitor the status of the population. During 2003 numerous L. hamiltoni were observed with denuded patches predominantly on the facial region. By monitoring five individuals within the captive facility at the University of Canterbury it was discovered that frogs appear to be able to cure themselves. Through researching the home range requirements and developing a photographic database to monitor the population status of L. hamiltoni, it will aid in the management of ensuring the long-term survival of this archaic species of frog.
277

Privacy-Preserving Data Integration in Public Health Surveillance

Hu, Jun 16 May 2011 (has links)
With widespread use of the Internet, data is often shared between organizations in B2B health care networks. Integrating data across all sources in a health care network would be useful to public health surveillance and provide a complete view of how the overall network is performing. Because of the lack of standardization for a common data model across organizations, matching identities between different locations in order to link and aggregate records is difficult. Moreover, privacy legislation controls the use of personal information, and health care data is very sensitive in nature so the protection of data privacy and prevention of personal health information leaks is more important than ever. Throughout the process of integrating data sets from different organizations, consent (explicitly or implicitly) and/or permission to use must be in place, data sets must be de-identified, and identity must be protected. Furthermore, one must ensure that combining data sets from different data sources into a single consolidated data set does not create data that may be potentially re-identified even when only summary data records are created. In this thesis, we propose new privacy preserving data integration protocols for public health surveillance, identify a set of privacy preserving data integration patterns, and propose a supporting framework that combines a methodology and architecture with which to implement these protocols in practice. Our work is validated with two real world case studies that were developed in partnership with two different public health surveillance organizations.
278

Quality of Diabetes Care Among the Canadian Regular Forces: A Retrospective Cohort Study

Khadilkar, Amole 28 November 2012 (has links)
The objective of the thesis was to evaluate the quality of diabetes care in the Canadian Forces by determining the extent to which physicians adhere to recommendations outlined in the 2008 Canadian Diabetes Association (CDA) clinical practice guidelines. In addition, the effect of patient age, sex, rank and size of base on quality of care was assessed and the accuracy of a diagnosis of diabetes in an extract of the electronic medical record (EMR) was evaluated. Fourteen bases within the Canadian Forces were selected for investigation, representing roughly half of the Canadian Forces population. Cases of diabetes were ascertained based on laboratory criteria following a chart review. Twenty-one CDA guideline recommendations were considered. The Canadian Forces demonstrated greater than 75% adherence with each of 9 recommendations, 50-75% adherence with each of 7 recommendations and less than 50% adherence with each of 5 recommendations. The overall adherence with all applicable recommendations per patient was 60.3% (SE 0.66). Age, sex, rank and size of base were not important factors influencing guideline adherence. The sensitivity of a diabetes diagnosis in an extract of the EMR was 84.5%, the specificity was 99.8%, the positive predictive value was 85.1% and the negative predictive value was 99.8%. This is similar to the performance of provincial and national diabetes registries. The quality of diabetes care in the Canadian Forces compared favourably with that of the civilian population within Canada and internationally. The creation of a diabetes registry is expected to lead to further improvements in diabetes care.
279

A study of the systematics and implications of the presence of the testa nematode, Aphelenchoides arachidis Bos, 1977 in South Africa / Madimane Moses Lesufi

Lesufi, Madimane Moses January 2007 (has links)
An introduction to nematode systematics is provided which deals broadly with the history of the classification of nematodes, the controversial usage of the Phylum names Nemata Cobb, 1919 and Nematoda (Rudolphi, 1808) Lankester, 1877 and the reason why the name Nematoda was used in the present study. The classification, diagnosis and bionomics of the genus Aphelenchoides Fischer, 1894, the genus to which A. arachidis Bos, 1977 belongs is discussed. The section on bionomics is included to capture the astounding ability of this group of organisms to adapt to different trophic levels, a concept that is used to attempt an explanation for the ability of a supposedly African nematode, A. arachidis, to infest an alien crop species (groundnut). The ability of Aphelenchoides spp. to adapt to different host plant species is discussed, as well as the ability of the groundnut plant to mature its pods underground, a characteristic that predisposes these plants to a host of pathogens. The damage caused by two of the most important endoparasitic nematode species on groundnut, A. arachidis and Ditylenchus africanus Wendt, Swart, Vrain & Webster, 1995 were compared with each other. The South African population of A. arachidis was found predominantly in the shells of groundnut, whereas they were found in the shells, roots, hypocotyls and testas of the groundnut plants in Nigeria. The present study showed that A. arachidis and D. africanus occur together in groundnut in South Africa with D. africanus usually being the dominant species. In only one instance, at Bullhill (Vaalharts Irrigation Scheme, Northern Cape), the groundnut shells and testas were infested by A. arachidis alone. The importance of plant quarantine in South Africa is dealt with and the aims and principles of quarantine, as well as the different guidelines that have to be adhered to when deciding on the quarantine status of an organism are explained. Descriptions are provided of the methods used to prepare specimens for viewing with the light microscope (LM) and the scanning electron microscope (SEM), as well as the procedures of the molecular study. A morphological and morphometrical description of A. arachidis specimens from South Africa, as well as a comparison with specimens from Nigeria was done. Differences between the South African and Nigerian populations included, respectively, a lower b-value (7 - 11 vs 10 - 18), more lateral lines (2 - 4 vs 2), a slightly shorter stylet (8-10 m vs 10 - 12 m) and a longer length of the post-uterine sac as a percentage of the distance from vulva to anus (41 - 96 % vs ± 50 %). Scanning electron micrographs of this species are presented for the first time and shows the morphology of the lip region and lateral lines. Since both A. arachidis and A. blastophthorus were detected in the pods, a study was done to evaluate a PCR-based diagnostic method for the identification of these species and to compare the results with those reported in literature. Restriction fragment length polymorphisms (RFLPs) in the rDNA fragment were used to compare and differentiate between nematode species. The differences encountered within the South African population (morphological, morphometrical and molecular) warrant a study of more specimens from more localities. Through this it could be ascertained whether the South African population is a subspecies of A. arachidis or if this species just differs widely between localities. Future research should focus on a survey of the groundnut producing areas in South Africa to determine the distribution and economic impact of A. arachidis. The incidence of A. arachidis on other agricultural crops, especially those used in rotation with groundnut, also needs to be determined. The next issue to address is what enables a supposedly endemic species to Africa, A. arachidis, to parasitize an alien plant species (groundnut) from South America. Screening of the endemic bean family (Fabaceae) in Africa for the presence of A. arachidis, could hold the answer to this question. / Thesis (M. Environmental Science)--North-West University, Potchefstroom Campus, 2008.
280

Information security strategy in telemedicine and e-health systems : a case study of England’s shared electronic health record system

Mohammad, Yara Mahmoud January 2010 (has links)
Shared electronic health record (EHR) systems constitute an important Telemedicine and e-Health application. Successful implementation of shared health records calls for a satisfactory level of security. This is invariably achieved through applying and enforcing strict, and often quite complicated, rules and procedures in the access process. For this reason, information security strategy for EHR systems is needed to be in place. This research reviewed the definition of different terms that related to electronically stored and shared health records and delineated related information security terms leading to a definition of an information security strategy. This research also made a contribution to understanding information security strategy as a significant need in EHR systems. A major case study of the National Programme for IT (NPfIT) in England is used to be the container of other two sub-case studies in two different Acute Trusts. Different research methods used: participant observation and networking, semi-structured interviews, and documentary analysis. This research aimed to provide a comprehensive understanding to the information security strategy of England’s EHR system by presenting its different information security issues such as consent mechanisms, access control, sharing level, and related legal and regulatory documents. Six factors that influence the building of an information security strategy in EHR systems, were identified in this research, political, social, financial, technical, clinical and legal. Those factors are considered to be driving the strategy directly or indirectly. EHR systems are technical-clinical systems, but having other factors (than technical and clinical) that drive this technical-clinical system is a big concern. This research makes a significant contribution by identifying these factors, and in addition, this research shows not only how these factors can influence building the information security strategy, but also how they can influence each other. The study of the mutual influence among the six factors led to the argument that the most powerful factor is the political factor, as it directly or indirectly influences the remaining five factors. Finally, this research proposes guidelines for building an information security strategy in EHR systems. These guidelines are presented and discussed in the form of a framework. This framework was designed after literature analysis and after completing the whole research journey. It provides a tool to help putting the strategy in line by minimising the influence of various factors that may steer the strategy to undesirable directions.

Page generated in 0.0454 seconds