• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1435
  • 992
  • 863
  • 142
  • 126
  • 105
  • 77
  • 50
  • 36
  • 35
  • 27
  • 25
  • 24
  • 15
  • 9
  • Tagged with
  • 4526
  • 1264
  • 1103
  • 758
  • 674
  • 561
  • 498
  • 490
  • 481
  • 450
  • 384
  • 305
  • 286
  • 268
  • 266
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark January 2015 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
292

AD-HOC WIRELESS NETWORKS: A COMMERCIALISATION CASE STUDY

Rogers, Derek 10 1900 (has links)
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California / This paper presents a case study of the commercialisation of an ad-hoc wireless network technology from a subsidiary of a multinational company. The paper does not disclose any intellectual property specifics, the organisations or individuals involved. Instead the paper focuses on generic issues associated with technology transfer; exploration of market opportunities, market validation, the identification of a novel business model and economic validation. The paper wraps the case study within the academic context of commercialisation providing substantive literature sources, tools and techniques for readers faced with similar challenges; tools and techniques that can be applied irrespective of the underlying technology.
293

Clinical effectiveness of CBT-based guided self-help for anxiety and depression : does it work in practice and what helps people to benefit?

Coull, Greig Joseph January 2011 (has links)
Objectives. To examine the clinical effectiveness of guided self-help (GSH) for anxiety and depression in routine clinical practice, and the role of self-efficacy, therapeutic alliance and socio-economic status in influencing that effectiveness. Design. A within-subjects repeated measures design in which participants served as their own controls by completing questionnaires across a control period prior to GSH intervention, then again at post-intervention and 3- and 6-month follow-up. Methods. GSH participants completed outcome measures for mental health (HADS) and work/social functioning (WSAS). Factors explored by regression as possible predictors of effectiveness were self-efficacy, therapeutic alliance and socioeconomic status. Results. Sixty people completed GSH, with analyses indicating effectiveness of GSH in significantly improving mental health and social functioning at post-treatment and 3-month follow-up, but not at 6-month follow-up. Effectiveness was also indicated under intent-to-treat conditions (n = 97) with medium effect sizes (≈ 0.6) for each outcome measure at post-treatment. Improvement in mental health was predicted by lower self-efficacy and greater therapeutic alliance. Completers of the intervention had significantly higher socio-economic status than non-completers. Conclusions. The current study has suggested effectiveness of GSH in routine clinical practice across different primary care services at post-treatment, but with less evidence of this at follow-up. Effectiveness has been highlighted to be influenced by self-efficacy and therapeutic alliance, suggesting the importance of considering non-specific factors when patients access GSH in primary care. This study underlines the need for further research exploring longer-term clinical effectiveness and examining for whom GSH works in order to constructively inform future evidence-based practice.
294

Non-invasive brain stimulation as a novel approach to the treatment of chronic non-specific low back pain

O'Connell, Neil Edward January 2012 (has links)
Chronic non-specific low back pain (CNSLBP) is a widespread but poorly understood condition that places a substantial burden on the sufferer, health services and the wider economy. Existing approaches to management do not demonstrate impressive levels of effectiveness. There is growing evidence that CNSLBP is associated with significant alterations in central nervous system (CNS) structure and function, suggesting a possible role for the brain in the aetiology of the condition, and presenting a case for novel therapies which aim to treat CNSLBP by affecting brain function. One such potential therapeutic approach is non-invasive brain stimulation (NIBS). Following a literature review discussing the epidemiology and management of low back pain, the evidence for altered CNS function and the potential role of brain stimulation in CNSLBP and chronic pain generally this thesis includes 3 original scientific studies: (i) A Cochrane systematic review of the effectiveness of NIBS techniques for the treatment of chronic pain; (ii) A randomised double-blind exploratory study of transcranial direct current stimulation of the motor cortex in the treatment of CNSLBP; (iii) Is blinding to the stimulation condition maintained in trials comparing 2mA tDCS with sham stimulation? A randomised cross-over study. Results: There is limited existing evidence that some forms of NIBS may have a beneficial effect on chronic pain, though caution is warranted. Exploratory data from study 2 is not suggestive that tDCS to the motor cortex is effective for treating CNSLBP. Commonly used sham controls in trials of tDCS do not ensure adequate blinding, and so introduce a potential source of bias to the existing evidence base. Conclusion: Further research is required to establish the value of NIBS as a treatment for chronic pain and CNSLBP. Future research in tDCS will need to develop and employ fully validated sham controls to ensure adequate blinding. NIBS cannot currently be recommended for the treatment of CNSLBP.
295

Agile supply partnerships : the paradox of high-involvement and short-term supply relationships in the Macerata-Fermo footwear district

Cerruti, Corrado January 2013 (has links)
Despite a general consensus concerning the relevance of supply partnerships to agility, the literature reveals disagreements and contradictions regarding their characteristics and, in particular, their duration. This is, whether partnerships in an agile strategy should be long-term (strategic partnerships) or short-term (agile partnerships). The research joins this debate by investigating the types and characteristics of supply partnerships to achieve agility. The underlying premise of the work is that the type of supply partnership is contingent on the degree of turbulence an agile strategy is designed to face. The research was carried out in the fashion industry, given the relevance of agility in this industry. Specifically, the research focused the supply partnerships developed by the footwear companies in the Macerata-Fermo district, the largest footwear district in Italy. The focus on district companies allow the comparison of several companies sharing a very similar business context, allowing a better control of external variables and increasing the internal validity of the study. The field research consisted of a preliminary survey on agility drivers and agile capabilities in the Macerata-Fermo footwear district, followed by an in-depth investigation on supply partnerships using multiple embedded cases studies. Overall six medium-large footwear companies have been analysed in their supply relationships with respect to five key supply categories. For each supply category, the buyer view of the focal firms has been complemented with a view from the supplier side. In total the fieldwork is built upon 30 interviews with 22 informants from 18 companies for a total of more than 23 hours of interviews. In all cases, except two, the key informant was owner, CEO or general manager of the company, eventually supported by another company manager. In two cases, the interviews data have been strengthened by a longitudinal analysis of purchase orders over eight years. The fieldwork highlights that agility drivers and agile capabilities impact on the footwear companies’ decision of developing agile supply partnerships. Specifically footwear companies that are under the pressure of high-turbulence agility drivers (here represented by a high collection renewal rate) and that have developed strong agile capabilities (here represented by a local supply network and a purchase orders postponement) choose agile supply partnerships with respect to supply categories that are sensitive to the fashion trends and therefore difficult to be sourced in a stable way – season after season – from the same suppliers. The main contribution to theory is related to the characteristics of supply partnerships in an agile strategy and specifically to the apparent paradox of “high-involvement & short- term” relationships (i.e. agile supply partnerships). In spite of the presence of time compression diseconomies in building up partnership and of the loss of relational (non- redeployable) benefits in closing down partnerships, scenarios of high-turbulence can give companies an incentive to look for short-term partnerships. Such finding can support a wider claim that different levels of turbulence call for different agility strategies requiring different capabilities and practices. The main contribution to practice is related to the way agile partnerships are selected, started and ended. Given that many industries are facing an increase in market turbulence, it appears that many companies – even outside the fashion industry – might have to learn how to balance high-involvement supply relationships with respect to a shorter time horizon.
296

Assessment of Intra- and Inter-individual Variability of Outcome Measures in Ankylosing Spondylitis and the Efficacy and Adverse Effects of Anti-TNF Therapy

Maxwell, Lara J 05 July 2011 (has links)
Ankylosing spondylitis (AS) is a chronic, inflammatory rheumatic disease that has a highly variable disease course. Three biologic agents, adalimumab, etanercept, and infliximab, have been developed for the treatment of AS. We conducted three studies: 1) an exploratory analysis of a year-long longitudinal dataset to gain insight into the variability of disease activity, physical function, and well-being and to explore the relationship between these outcome measures; 2) a systematic review of the available evidence for the efficacy of biologic treatment; 3) a systematic review of potential adverse effects of this treatment. We found that repeated measures of disease activity, function and well-being fluctuate considerably between patients, with complex patterns occurring over time within patients. There was mostly high quality evidence that these biologics are efficacious against placebo. We did not find evidence of an increase in serious adverse events or serious infections from short-term randomized controlled trials.
297

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
298

Alexsandr Juferov, Nikolaj Rerich Al'bom reprodukcij [Bilderalbum], Auflage der Hauptverwaltung von Gosnak, Moskau 1970 [Rezension]

Petrowa, Oksema 14 March 2017 (has links) (PDF)
Die Einleitung der Veröffentlichung behandelt das Schaffen von Nikolai Rerich, einem der markantesten und urwüchsigsten Maler der russischen Schule.
299

Stigmatisering - Personers upplevelser av att leva med HIV/AIDS / Stigmatization - People´s experiences of living with HIV/AIDS

Sjöfors, Linnea, Lindström, Mikaela, MacCormack, Emma January 2016 (has links)
Bakgrund: HIV är en infektionssjukdom som kan överföras vid bland annat oskyddade samlag, via blod och transplanterad vävnad. Då det idag finns antivirala läkemedel ses HIV inte längre som en dödlig utan en kronisk sjukdom. Personer med HIV/AIDS upplever att sjukdomen påverkar den fysiska och psykiska hälsan negativt. Sjuksköterskor har bristande kunskaper om sjukdomen samt är ovilliga att ge omvårdnad till dessa personer. Syfte: Syftet med litteraturöversikten var att beskriva personers upplevelser av att leva med HIV/AIDS. Metod: Litteraturöversikten baserades på 13 artiklar med kvalitativ design som analyserades enligt Fribergs femstegsmodell. En induktiv ansats användes. Resultat: Huvudtemat stigmatisering identifierades tillsammans med temat transition med tillhörande fem underteman samt temat rädsla med tillhörande tre underteman. Slutsats: Personerna med HIV/AIDS upplevde sig stigmatiserade av närstående, i samhället och i kontakt med hälso- och sjukvården. För att stigmatiseringen ska upphöra behöver sjuksköterskor mer kunskap om HIV/AIDS. För att nå ett personcentrerat förhållningssätt behöver sjuksköterskor se personerna bakom sjukdomen samt medvetandegöra sina attityder och förutfattade meningar mot personerna som lever med HIV/AIDS. / Background: HIV is an infectious disease which can be transmitted through for example unprotected sexual intercourse, through blood and transplanted tissues. Because of today’s antiviral drugs HIV is seen as a chronic disease instead of a mortal. People with HIV/AIDS experience that the disease affects the physical and mental health negatively. Nurses have poor knowledge about the disease and are reluctant to give care to these people. Aim: The aim of the literature review was to describe people's experiences of living with HIV/AIDS. Method: The literature review was based on 13 articles with qualitative design which were analyzed according to Friberg’s five-step model. An inductive approach was used. Results:  The main theme stigma was identified along with the theme transition with five sub- themes and the theme fear with three sub- themes. Conclusion: People with HIV/AIDS felt stigmatized by family, society and in contact with health services. To reduce stigma nurses need more knowledge about HIV/AIDS. To reach a person-centered approach nurses need to see the people behind the disease and raise awareness of their attitudes and prejudices against people living with HIV/AIDS.
300

Systematic Review and Meta‐Analysis of Clinical Outcomes of Fractures Fixed with the Surgical Implant Generation Network (SIGN) Intramedullary Nail

Sonenthal, Nechama 18 May 2017 (has links)
A Thesis submitted to The University of Arizona College of Medicine - Phoenix in partial fulfillment of the requirements for the Degree of Doctor of Medicine. / The (Surgical Implant Generation Network) SIGN Intramedullary (IM) nail is designed to fix long bone fractures without using a costly C‐arm imaging device. It is distributed for free to countries in need, allowing for elevation of care from the standard, lengthy traction treatment in those countries to clinically superior IM nailing. This paper compares the clinical outcomes of the SIGN IM nail to those of the IM nails used in developed countries with use of a C‐arm. The terms “Surgical Implant Generation Network” and “union” were searched in four databases. Primary studies of SIGN IM nails were included and their outcomes, including union rate, time to union, and complications, were recorded and compared to historical data of IM nails used in developed countries. Overall, there is a similar union rate in bones fixed with SIGN IM nails (94.6%) versus bones fixed with IM nails in developed countries (92.3%) (p = 0.009, OR = 1.67), while some bone types (tibia and femur) demonstrated a lower union rate when individually stratified (p = 0.008, OR = 0.26 and p = 0.002 and OR = 0.15, respectively). Mean time to union for all bone types combined showed no significant difference between SIGN IM nails and IM nails used in developed countries (p = 0.26). Complications rates were similar between SIGN IM nails and IM nails used in developed countries. It is possible for the SIGN IM nail to be used to fix long bone fractures in developing countries with outcomes comparable to the IM nail used in developed countries.

Page generated in 0.3346 seconds