• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1604
  • 457
  • 422
  • 170
  • 114
  • 102
  • 60
  • 49
  • 40
  • 36
  • 29
  • 23
  • 21
  • 17
  • 16
  • Tagged with
  • 3639
  • 856
  • 804
  • 754
  • 606
  • 543
  • 420
  • 400
  • 392
  • 363
  • 310
  • 304
  • 295
  • 275
  • 262
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

The epidemiology and management of asthma and atopy in primary care

Simpson, Colin Richard January 2002 (has links)
Aim: To describe and analyse the epidemiology and management of asthma, atopy and related morbidity in a Scottish Primary Care population by exploiting the Continuous Morbidity Recording database. Methods: The patient information used in this thesis was extracted from the computerised data of general practices contributing to the Continuous Morbidity Recording project. Results: A significant increase in the prescribing of short-acting beta2 (p<0.005) and adjunct therapy prescribing (p<0.001) occurred over the four study years. There was a significant shift to treatment steps 3 and 4 of the British Asthma Guidelines (p<0.002) in asthma patients followed up over the four study years. Significant declines in the incidence of asthma were observed in children (p<0.001), with no apparent compensatory diagnostic shift. There was a significant increase in the risk of presenting with a Th1 mediated autoimmune condition in patients with a history of allergic disease. There was a particularly strong association between current psoriasis and current eczema. Conclusions: The concurrence of morbidity and prescribing epidemiology with external sources of data such as surveys suggest high quality of data stored by the Continuous Morbidity Recording database. General practitioners prescribed higher doses of inhaled corticosteroids and more new adjunct therapies during the study period, possibly due to the impact of new British Asthma Guidelines completed in 1995 and published in 1997. The decrease in asthma prevalence suggests that the burden of this disease on general practitioner workload is in decline. The decrease of the incidence of asthma gives the first indication of either a permanent or temporary decline of this disease in Scotland after reported increasing prevalences over several decades. The new finding that Th1 and Th2 mediated diseases are significantly associated in a large general practice population supports the proposal that these diseases share risk factors that increase the propensity of the immune system to generate both Th1 and Th2-mediated inappropriate responses to non-pathological antigens.
242

Autorskoprávní ochrana databází / Copyright protection of databases

Buzu, Daniel January 2016 (has links)
The topic of this thesis is copyright protection of databases. The aim of the thesis is to find out, via comparison of the different legal systems, if the European legislation of legal protection of databases is proper, adequate and if it reflects the current needs of the European society. The thesis contains a brief historical description leading to the current legislation. Next to descriptive and comparative method of research author uses also analytical method of research for analyzing the legislation and provides to readers his own opinion toward the chosen topic. The thesis deals with the European Union and USA legislation in the field of database legal protection. As for European legislation, the author puts emphasis on copyright law protection and on so-called sui generis right. The thesis consists of Introduction, Conclusion and another 9 chapters. The second chapter provides the basic terms and problems of the topic. The third chapter contains international treaties relating to databases. The following three chapters relate to the European Union legislation, where the author describes the historical process leading to adoption of directive on the legal protection of databases in 1996. This directive is analyzed and the author articulates his opinions toward the directive. Chapter number...
243

A Comparison of Two Methods of Medication Reconciliation

McCulloch, Matthew, Baumgart, Alysson January 2008 (has links)
Class of 2008 Abstract / Objectives: To compare the completeness of patient medication history collected upon admission at the University Medical Center (UMC) in Tucson, Arizona with that collected by RxAccordTM insurance claims database. Methods: An inferential retrospective chart review. A random list of 300 patients admitted to UMC from January 1, 2007 to June 30, 2007 who utilized specific insurance companies was obtained. Of those 300 patients, the first 100 patients found in the RxAccordTM database were included in this study. UMC recorded admission medication history was noted for each patient and compared against the RxAccordTM retail pharmacy adjudicated medication database. The main outcome measured was the number of medication discrepancies. The independent variable was the type of medication reconciliation conducted (RxAccordTM ) vs. physician compiled upon admission to UMC. Results: A total of ninety-five charts were used in this study. UMC admission medication reconciliation records had an average of 2.21 missing medications per patient whereas RxAccordTM had an average of 1.01 missing medications per patient. Of the medications missing on the RxAccordTM database, almost 50% (46/96) were OTC medications. On average, UMC had fifty-one medications that had discrepancies (i.e. route, strength or directions). On the other hand, RxAccordTM contained no discrepancies. A total of 17 out 95 records (18%) were missing medication reconciliation forms in their medical record. Conclusions: Information collected by RxAccordTM produced a more complete patient medication reconciliation history than that compiled upon admission at UMC. An insurance claims database may provide, a significantly more accurate method of medication reconciliation.
244

Graduate database system

Gaddam, Srikanth January 1900 (has links)
Master of Science / Department of Computing and Information Sciences / Gurdip Singh / Education plays a very important role in molding a person into a good individual by imparting knowledge in all aspects. Globalization has helped the students to go to different countries, attain knowledge and exposure on the culture of that country. Universities receive several hundreds of applications from all over the world to get admission for higher studies. By following the conventional method the faculty of the university and also the applicant will face lot of difficulties in communicating. In conventional method the acceptance or rejection would be generally intimated through post. The applicant will be in complete ignorance during the processing of application. They will be several scenarios where interaction between them is necessary to further process the application. This project is intended to overcome such problems and make the interaction between the staff and applicant smoother. The main objective of the project is to develop a website for Computing and Information Sciences department which manages the data regarding the prospective students as well as students currently enrolled. It can be accessed by prospective students (who wish to join the university), faculty and administrators. Applicant will be notified constantly through email and they can always check their application status online. The role of the administrators is to accept applications sent by prospective students and upload their details such as their GRE, TOEFL scores and their academic records into the database. Once these details are stored in the database, the students will be able to access their application status. Students are also given information about missing documents in the database. There will be a committee to decide the application status whether it will be rejected or accepted. Once the applicant is accepted, the applicant would be added to the current students list. All this process is made easy through this website.
245

An Adaptive Database Intrusion Detection System

Barrios, Rita M. 01 January 2011 (has links)
Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent findings suggest that many have attempted to address this concern with the utilization of various detection methodologies in the areas of database authorization, security policy management and behavior analysis but have not been able to find an adequate solution to achieve the level of detection that is required. While each of these methodologies has been addressed on an individual basis, there has been very limited work to address the methodologies as a single entity in an attempt to function within the detection environment in a harmonious fashion. Authorization is at the heart of most database implementations however, is not enough to prevent a rogue, authorized entity from instantiating a malicious action. Similarly, eliminating the current security policies only exacerbates the problem due to a lack of knowledge in a fashion when the policies have been modified. The behavior of the authorized entity is the most significant concern in terms of intrusion detection. However, behavior identification methodologies alone will not produce a complete solution. The detection of the insider threat during database access by merging the individual intrusion detection methodologies as noted will be investigated. To achieve the goal, this research is proposing the creation of a procedural framework to be implemented as a precursor to the effecting of the data retrieval statement. The intrusion model and probability thresholds will be built utilizing the intrusion detection standards as put forth in research and industry. Once an intrusion has been indicated, the appropriate notifications will be distributed for further action by the security administrator while the transaction will continue to completion. This research is proposing the development of a Database Intrusion Detection framework with the introduction of a process as defined in this research, to be implemented prior to data retrieval. This addition will enable an effective and robust methodology to determine the probability of an intrusion by the authorized entity, which will ultimately address the insider threat phenomena.
246

An information and meaning oriented approach to the construction of a conceptual data schema

Feng, Junkang January 1999 (has links)
No description available.
247

Discovering biological connections between experimental conditions based on common patterns of differential gene expression

Gower, Adam C. January 2012 (has links)
Thesis (Ph.D.)--Boston University / PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you. / Similarities between patterns of differential gene expression can be used to establish connections between the experimental and biological conditions that give rise to them. The growing volume of gene expression data in repositories such as NCBI's Gene Expression Omnibus (GEO) presents an opportunity to identify such similarities on a large scale across a diverse collection of datasets. In this work, I have developed a pattern-based approach, named openSESAME, to identify datasets enriched in samples displaying coordinate differential expression of a query signature. Importantly, openSESAME performs this search without knowledge of the experimental groups in the datasets being searched, which allows it to identify perturbations of gene expression due to attributes that may not have been recorded. First, I demonstrated the utility of openSESAME using two gene expression signatures to query a set of more than 75,000 human expression profiles obtained from GEO. A query using a signature of estradiol treatment identified experiments in which estrogen signaling was perturbed and also discriminated between estrogen receptor-positive and -negative breast cancers. A second query using a signature of silencing of the transcription factor p63 (a key regulator of epidermal differentiation) identified datasets related to stratified squamous epithelia or epidermal diseases such as melanoma. Next, to improve the utility of openSESAME, I expanded the collection of profiles to include samples from mouse and rat, and automatically translated expression signatures for cross-species queries. Furthermore, I processed the sample annotation associated with these samples in GEO, extracting informative words and phrases and continuous (e.g., age) and categorical (e.g., disease state) variables. I have also recorded sample-specific dates and quality metrics to assess whether batch effects or outliers are affecting individual query results. Finally, I used openSESAME to query this repository with over 800 gene expression signatures from the Broad Institute's Molecular Signatures Database (MSigDB). I then used the scores of the association of each signature with each sample in the repository to build a network of the relatedness of these signatures to each other. This "constellation" of signatures can be used to determine the relationship of a query signature to other biological and experimental perturbations. / 2031-01-02
248

Biological database indexing and its applications.

January 2002 (has links)
Cheung Ching Fung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 71-73). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Biological Sequences --- p.2 / Chapter 1.2 --- User Queries on Biological Sequences --- p.4 / Chapter 1.3 --- Research Contributions --- p.6 / Chapter 1.4 --- Organization of Thesis --- p.6 / Chapter 2 --- Background --- p.7 / Chapter 2.1 --- What is a Suffix-Tree? --- p.7 / Chapter 2.2 --- Disk-Based Suffix-Trees --- p.9 / Chapter 3 --- Disk-Based Suffix Tree Constructions --- p.11 / Chapter 3.1 --- An Existing Algorithm: PrePar-Suff ix --- p.11 / Chapter 3.1.1 --- "Three Issues: Edge Splitting, Random Access and Data Skew" --- p.13 / Chapter 3.2 --- DynaCluster-Suffix: A New Novel Disk-Based Suffix-Tree Construction Algorithm --- p.18 / Chapter 4 --- Suffix Links Rebuilt --- p.29 / Chapter 4.1 --- Suffix-links and Least Common Ancestors --- p.29 / Chapter 5 --- q-Length Exact Sequence Matching --- p.35 / Chapter 5.1 --- q-Length Exact Sequence Matching by Suffix-Tree --- p.35 / Chapter 6 --- Implementation --- p.38 / Chapter 6.1 --- System Overview --- p.38 / Chapter 6.1.1 --- Index Builder --- p.39 / Chapter 6.1.2 --- Exact Query Processor --- p.39 / Chapter 6.1.3 --- Suffix Links Regenerator --- p.40 / Chapter 6.1.4 --- Tandem Repeats Finder --- p.40 / Chapter 6.2 --- Data Structures --- p.40 / Chapter 6.2.1 --- Representation of a Node --- p.40 / Chapter 6.2.2 --- An Alternative Node Representation --- p.42 / Chapter 6.2.3 --- Representation of a Leaf --- p.43 / Chapter 6.3 --- Buffering --- p.44 / Chapter 6.3.1 --- Page Format --- p.44 / Chapter 6.3.2 --- Address Translation --- p.45 / Chapter 6.3.3 --- Page Replacement Strategies --- p.45 / Chapter 7 --- A Performance Studies --- p.48 / Chapter 7.1 --- When Everything Can be Held In Memory --- p.52 / Chapter 7.2 --- When Main Memory Is Limited --- p.54 / Chapter 7.3 --- The Effectiveness of DNA Lengths with Fixed Memory Sizes . --- p.56 / Chapter 7.4 --- The Effectiveness of Memory Sizes --- p.57 / Chapter 7.5 --- Answering q-Length Exact Sequence Matching Queries --- p.60 / Chapter 7.6 --- Suffix Link Rebuilt --- p.61 / Chapter 8 --- Conclusions and Future Works --- p.69 / Chapter 8.1 --- Conclusions --- p.69 / Chapter 8.2 --- Future Works --- p.70 / Bibliography --- p.71
249

Role databází v procesu přijímání zaměstnance ve vztahu k GDPR / The role databases in the recruitment process in relation to GDPR

Vais, Vojtěch January 2019 (has links)
The role of databases in the recruitment process in relation to GDPR Abstract With the development of databases and computers, the possibility of automated data processing has emerged as we know it in the form of advanced databases today. Within half a century, the company switched from a paper file to a fully automatic way of manipulating data. This of course directly affects the processing of personal data. The law on the protection of personal data, which was initially part of the right to privacy, had to respond to the rapid development in the world of information technology. Working with the development of the right to protection of personal data is not addressed in isolation, but in the context of the development of information technology, and thus states the whole legal framework in the context, thus offering readers a wider understanding. The aim of the work is to respond to the stormy reactions that accompany the adoption of the general regulation with the support of the media world. In particular, to provide the reader with a real guide in applying the general regulation to the recruitment process in a situation where a large number of materials have been created in the public space, but they are kept at a very general level and do not provide real help to their users when dealing with specific...
250

The interactive generation of functional dependencies

Hunt, William Olen January 2010 (has links)
Typescript, etc. / Digitized by Kansas Correctional Industries

Page generated in 0.6323 seconds