• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1797
  • 639
  • 355
  • 325
  • 198
  • 131
  • 49
  • 44
  • 40
  • 38
  • 26
  • 22
  • 22
  • 22
  • 22
  • Tagged with
  • 4419
  • 832
  • 768
  • 574
  • 520
  • 414
  • 399
  • 328
  • 323
  • 319
  • 310
  • 309
  • 308
  • 307
  • 302
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Protecting the physical layer: threats and countermeasures to communication system and smart power grid. / CUHK electronic theses & dissertations collection

January 2013 (has links)
Bi, Suzhi. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 113-119). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
82

Authenticated 2D barcode: design, implementation and applications. / CUHK electronic theses & dissertations collection

January 2013 (has links)
Li, Chak Man. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 150-159). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese.
83

Electrical safety in the hospital environment

Johnson, John Christopher January 2010 (has links)
Digitized by Kansas Correctional Industries
84

Patient Engagement to Improve Medication Safety in the Hospital

Prey, Jennifer Elizabeth January 2016 (has links)
Purpose: There is a pressing need to enhance patient safety in the hospital environment. While there are many initiatives that focus on improving patient safety, few have studied engaging patients themselves to participate in patient safety efforts. This work was motived by the belief that patients can contribute valuable information to their care and when equipped with the right tools, can play a role in improving medication safety in the hospital. Methods: This research had three aims and used a mixed-methods approach to better understand the concept of engaging patients to improve medication safety. In order to gain insight into whether patients could beneficially contribute to the safety of their hospital care, my first aim was to understand current perspectives on the sharing of clinical information with patients while they were in the hospital. To accomplish this aim, I conducted surveys with clinicians and enrolled patients in a short field study in which they received full access to their clinical chart. In Aim 2, I conducted a study to establish that the Patient Activation Measure (PAM), a common measure of patient engagement in the outpatient setting, showed reliability and validity in the inpatient setting. Building on the knowledge from Aim 1 and using the PAM instrument from Aim 2, my third aim evaluated the impact of providing patients with access to a medication review tool while they were preparing to be admitted to the hospital. Aim 3 was achieved through a randomized controlled trial (RCT) involving 65 patients I recruited from the emergency department at Columbia University Medical Center. I also conducted a survey of admitting clinicians who had patients participate in the trial to identify the impact on clinician practices and to elicit feedback on their perceptions of the intervention. Results: My research findings suggest that increased patient information sharing in the inpatient setting is beneficial and desirable to patients, and generally acceptable to clinicians. The clinician survey from Aim 1 showed that most respondents were comfortable with the idea of providing patients with their clinical information. Some expressed reservations that patients might misunderstand information and become unnecessarily alarmed or offended. In the patient field study from Aim 1, patients reported perceiving the information they received as highly useful, even if they did not fully understand complex medical terms. My primary contribution in Aim 2 was to provide sound evidence that the Patient Activation Measure is a valid and reliable tool for use in the inpatient setting. Establishing the validity and reliability of the PAM instrument in inpatient setting was essential for conducting the RCT in Aim 3, and it will provide a foundation for future clinicians and research investigators to measure and understand hospital patients’ levels of engagement. The results from the RCT in Aim 3 did not support my primary hypothesis that clinicians who had patients participate in their medication review process using an informatics tool would make more changes to the home medication list than clinicians who had patients in the control group. However, the results did suggest that most hospital patients are knowledgeable, willing, and able to contribute useful and important information to the medication reconciliation process. Interestingly, the clinicians I surveyed seemed far less convinced that their patients would be able to beneficially participate in the medication reconciliation process due to low health literacy and other barriers. Nevertheless, the clinicians did seem to believe that in theory, at least, patient involvement in the medication reconciliation process could have positive impacts on their workflow and potentially save them time. Conclusion: The overall theme resulting from my research is that patients can be a valuable resource to improve patient safety in the hospital. Patients are generally knowledgeable and willing to more actively participate in their hospital care. By developing the structures and processes to facilitate greater patient engagement, hospitals can provide an extra layer of safety and error prevention, particularly with respect to the medications patients take at home. As with any medical treatment, active participation in patient safety efforts may not be possible for all patients. However, I believe that if the culture of a hospital encourages openness and transparency, and if patients are given the proper tools and information, the quality and safety of hospital care will improve.
85

Design for patient safety : a systems-based risk identification framework

Simsekler, Mecit Can Emre January 2015 (has links)
No description available.
86

Design for patient safety : a prospective hazard analysis framework for healthcare systems

Long, Jieling January 2015 (has links)
No description available.
87

IP traceback marking scheme based DDoS defense.

January 2005 (has links)
Ping Yan. / Thesis submitted in: December 2004. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2005. / Includes bibliographical references (leaves 93-100). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iii / Chapter 1 --- INTRODUCTION --- p.1 / Chapter 1.1 --- The Problem --- p.1 / Chapter 1.2 --- Research Motivations and Objectives --- p.3 / Chapter 1.3 --- The Rationale --- p.8 / Chapter 1.4 --- Thesis Organization --- p.9 / Chapter 2 --- BACKGROUND STUDY --- p.10 / Chapter 2.1 --- Distributed Denial of Service Attacks --- p.10 / Chapter 2.1.1 --- Taxonomy of DoS and DDoS Attacks --- p.13 / Chapter 2.2 --- IP Traceback --- p.17 / Chapter 2.2.1 --- Assumptions --- p.18 / Chapter 2.2.2 --- Problem Model and Performance Metrics --- p.20 / Chapter 2.3 --- IP Traceback Proposals --- p.24 / Chapter 2.3.1 --- Probabilistic Packet Marking (PPM) --- p.24 / Chapter 2.3.2 --- ICMP Traceback Messaging --- p.26 / Chapter 2.3.3 --- Logging --- p.27 / Chapter 2.3.4 --- Tracing Hop-by-hop --- p.29 / Chapter 2.3.5 --- Controlled Flooding --- p.30 / Chapter 2.4 --- DDoS Attack Countermeasures --- p.30 / Chapter 2.4.1 --- Ingress/Egress Filtering --- p.33 / Chapter 2.4.2 --- Route-based Distributed Packet Filtering (DPF) --- p.34 / Chapter 2.4.3 --- IP Traceback Based Intelligent Packet Filtering --- p.35 / Chapter 2.4.4 --- Source-end DDoS Attack Recognition and Defense --- p.36 / Chapter 2.4.5 --- Classification of DDoS Defense Methods --- p.38 / Chapter 3 --- ADAPTIVE PACKET MARKING SCHEME --- p.41 / Chapter 3.1 --- Scheme Overview --- p.41 / Chapter 3.2 --- Adaptive Packet Marking Scheme --- p.44 / Chapter 3.2.1 --- Design Motivation --- p.44 / Chapter 3.2.2 --- Marking Algorithm Basics --- p.46 / Chapter 3.2.3 --- Domain id Marking --- p.49 / Chapter 3.2.4 --- Router id Marking --- p.51 / Chapter 3.2.5 --- Attack Graph Reconstruction --- p.53 / Chapter 3.2.6 --- IP Header Overloading --- p.56 / Chapter 3.3 --- Experiments on the Packet Marking Scheme --- p.59 / Chapter 3.3.1 --- Simulation Set-up --- p.59 / Chapter 3.3.2 --- Experimental Results and Analysis --- p.61 / Chapter 4 --- DDoS DEFENSE SCHEMES --- p.67 / Chapter 4.1 --- Scheme I: Packet Filtering at Victim-end --- p.68 / Chapter 4.1.1 --- Packet Marking Scheme Modification --- p.68 / Chapter 4.1.2 --- Packet Filtering Algorithm --- p.69 / Chapter 4.1.3 --- Determining the Filtering Probabilities --- p.70 / Chapter 4.1.4 --- Suppressing Packets Filtering with did Markings from Nearby Routers --- p.73 / Chapter 4.2 --- Scheme II: Rate Limiting at the Sources --- p.73 / Chapter 4.2.1 --- Algorithm of the Rate-limiting Scheme --- p.74 / Chapter 4.3 --- Performance Measurements for Scheme I & Scheme II . --- p.77 / Chapter 5 --- CONCLUSION --- p.87 / Chapter 5.1 --- Contributions --- p.87 / Chapter 5.2 --- Discussion and Future Work --- p.91 / Bibliography --- p.100
88

Practical data integrity protection in network-coded cloud storage.

January 2012 (has links)
近年雲存儲發展迅速,它具彈性的收費模式還有使用上的便利性吸引了不少用家把它當作一個備份的平台,如何保障雲端上資料的完整性也就成了一項重要的課題。我們試著探討如何能有效地在客戶端檢查雲端上資料的完整性,並且在探測到雲存儲節點故障以後如何有效地進行修復。抹除碼(Erasure codes)透過產生冗餘,令編碼過後的資料能允許一定程度的缺片。雲端使用者可以利用抹除碼把檔案分散到不同的雲節點,即使其中一些節點壞了用戶還是能透過解碼餘下的資料來得出原檔。我們的研究是基於一種叫再造編碼(Regenerating code)的新興抹除碼。再造編碼借用了網絡編碼(Network coding)的概念,使得在修復錯誤節點的時候並不需要把完整的原檔先重構一遍,相比起一些傳統的抹除碼(如里德所羅門碼Reed-Solomoncode)能減少修復節點時需要下載的資料量。其中我們在FMSR這門再造編碼上實現了一個能有效檢測錯誤的系統FMSR-DIP。FMSR-DIP的好處是在檢測的時候只需要下載一小部份的資料,而且不要求節點有任何的編碼能力,可以直接對應現今的雲存儲。為了驗證我們系統的實用性,我們在雲存儲的測試平台上運行了一系列的測試。 / To protect outsourced data in cloud storage against corruptions, enabling integrity protection, fault tolerance, and efficient recovery for cloud storage becomes critical. To enable fault tolerance from a client-side perspective, users can encode their data with an erasure code and stripe the encoded data across different cloud storage nodes. We base our work on regenerating codes, a recently proposed type of erasure code that borrows the concept of network coding and requires less repair traffic than traditional erasure codes during failure recovery. We study the problem of remotely checking the integrity of regenerating-coded data against corruptions under a real-life cloud storage setting. Specifically, we design a practical data integrity protection (DIP) scheme for a specific regenerating code, while preserving the intrinsic properties of fault tolerance and repair traffic saving. Our DIP scheme is designed under the Byzantine adversarial model, and enables a client to feasibly verify the integrity of random subsets of outsourced data against general or malicious corruptions. It works under the simple assumption of thin-cloud storage and allows different parameters to be fine-tuned for the performance-security trade-off. We implement and evaluate the overhead of our DIP scheme in a cloud storage testbed under different parameter choices. We demonstrate that remote integrity checking can be feasibly integrated into regenerating codes in practical deployment. / Detailed summary in vernacular field only. / Chen, Chuk Hin Henry. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 38-41). / Abstracts also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Preliminaries --- p.4 / Chapter 2.1 --- FMSR Implementation --- p.4 / Chapter 2.2 --- Threat Model --- p.6 / Chapter 2.3 --- Cryptographic Primitives --- p.7 / Chapter 3 --- Design --- p.8 / Chapter 3.1 --- Design Goals --- p.8 / Chapter 3.2 --- Notation --- p.9 / Chapter 3.3 --- Overview of FMSR-DIP --- p.11 / Chapter 3.4 --- Basic Operations --- p.11 / Chapter 3.4.1 --- Upload operation --- p.11 / Chapter 3.4.2 --- Check operation --- p.13 / Chapter 3.4.3 --- Download operation --- p.15 / Chapter 3.4.4 --- Repair operation --- p.16 / Chapter 4 --- Implementation --- p.17 / Chapter 4.1 --- Integration of DIP into NCCloud --- p.17 / Chapter 4.2 --- Instantiating Cryptographic Primitives --- p.18 / Chapter 4.3 --- Trade-off Parameters --- p.19 / Chapter 5 --- Security Analysis --- p.22 / Chapter 5.1 --- Uses of Security Primitives --- p.22 / Chapter 5.2 --- Security Guarantees --- p.23 / Chapter 5.2.1 --- Corrupting an AECC Stripe --- p.23 / Chapter 5.2.2 --- Picking Corrupted Bytes for Checking --- p.25 / Chapter 5.2.3 --- Putting It All Together --- p.26 / Chapter 6 --- Evaluations --- p.27 / Chapter 6.1 --- Running Time Analysis --- p.27 / Chapter 6.2 --- Monetary Cost Analysis --- p.30 / Chapter 6.3 --- Summary --- p.33 / Chapter 7 --- Related Work --- p.34 / Chapter 8 --- Conclusions --- p.37 / Bibliography --- p.38
89

Secure computer entertainments. / CUHK electronic theses & dissertations collection

January 2009 (has links)
Computer entertainment is a big business today. Due to the availability of broadband network connections, the Internet is already a platform for many high quality multimedia applications. For example, online theaters and multi-player online games (MOG) are two of the most popular multimedia applications on the Internet. Although the Internet provides us a very convenient channel for data dissemination, its open architecture leads to many security issues. The security problems are especially complicated for computer entertainment applications since we must address both efficiency and security at the same time. In this thesis, we tackle four security issues in different aspects of computer entertainment applications. Specifically, the issues are (1) "to provide secure multimedia streaming while allowing proxy caching by untrusted third parties", (2) "to detect cheating in MOGs other than using conventional labor-intensive methods", (3) "to synchronize game clients in highly-interactive MOGs while resisting cheating in both the application and protocol level", and (4) "to exchange messages in peer-to-peer (P2P) MOGs so that distributed simulation is allowed but information exposure is mitigated". For each of the above issues, we present an effective solution that preserves the architecture of that particular multimedia application and also is feasible and efficient to deploy on the Internet. / Yeung, Siu Fung. / Adviser: John C. S. Lui. / Source: Dissertation Abstracts International, Volume: 70-09, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2009. / Includes bibliographical references (leaves 137-142). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
90

Situating Male Fertility: A Demographic Analysis of Male and Female Fertility in the United States

Cherry, Robert Christopher 2010 December 1900 (has links)
In this dissertation I investigate whether or not a series of social, demographic, and cultural factors affect fertility differently, in either direction or magnitude, for men and women. This work situates the study of male fertility within the existing demographic literature, models and compares male and female fertility through the use of a variety of dependent and independent variables, discovers which of those variables reveal a difference between the determinants of male and female fertility, and extends understanding of how male fertility should be studied in addition to and alongside female fertility. Although there is a significant literature on the biological and anatomic components of male fertility, there is little work published on the social and cultural factors that affect male fertility. Comparisons of male and female fertility are also lacking within the discipline of demography. The National Survey of Family Growth (Cycle 7) provides survey data on both men and women on a number of social, cultural, and demographic variables used either on their own, or as components in the construction of indicator variables. I present the results of models utilizing both direct and indirect measures of fertility. Three models are direct measures of fertility, and three other indirect models examine behaviors as a measure of exposure to the risk of fertility. Only four of these models were significant under the initial analysis. Within each of the models, the respondent’s age, poverty level, age at first intercourse, and whether the respondent ever married or cohabited presented the most frequent differences, in either direction, magnitude, or both, between males and females. I discuss the implications of the findings presented in the dissertation, as well as the potential for future research using other data or methods.

Page generated in 0.0529 seconds