• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3412
  • 1449
  • 984
  • 813
  • 414
  • 356
  • 91
  • 66
  • 57
  • 57
  • 57
  • 57
  • 57
  • 56
  • 55
  • Tagged with
  • 9764
  • 1673
  • 1254
  • 1203
  • 1017
  • 942
  • 830
  • 782
  • 767
  • 743
  • 711
  • 667
  • 653
  • 642
  • 632
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
511

The management of blood and body fluids in a Kenyan university hospital : a nursing perspective /

Ngesa, Anna Adhiambo. January 2008 (has links)
Assignment (MCur)--University of Stellenbosch, 2008. / Bibliography. Also available via the Internet.
512

Environmental surveillance monitoring XYZ-La Crosse

Gono, Charles Saye. January 2001 (has links) (PDF)
Thesis--PlanB (M.S.)--University of Wisconsin--Stout, 2001. / Includes bibliographical references.
513

The effects of behavior-based safety techniques on behavior variation, targeted and non-targeted safe behaviors, and productivity and quality in manufacturing facilities

Godbey, Jessie Franklin, Thomas, Robert Evans. January 2006 (has links)
Dissertation (Ph.D.)--Auburn University,2006. / Abstract. Vita. Includes bibliographic references (p.114-117).
514

Determining the safety of urban arterial roads

Campbell, Meredith L. January 2004 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: urban safety; arterial roads. Includes bibliographical references (p. 287-291).
515

Cost avoidance analysis, Safe Schools Environment Program City of Salinas, California /

Zerbo, Michael J. Gustin, Scott A. Brinkerhoff, Eri W. Govea, Ernest. January 2003 (has links) (PDF)
Thesis (M.B.A.)--Naval Postgraduate School, December 2003. / "MBA professional report"--Cover. Joint authors: Scott A. Gustin, Eri W. Brinkerhoff, Jr., Ernest Govea. Thesis advisor(s): Kenneth J. Euske, Mary A. Malina. Includes bibliographical references (p. 37-38). Also available online.
516

Comparison of concentrations in the breathing zone

Kulkarni, Santosh. January 2003 (has links)
Thesis (M.S.)--West Virginia University, 2003. / Title from document title page. Document formatted into pages; contains ix, 94 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 35-36).
517

Requirements, specifications and deployment models for autonomous jobsite safety proximity monitoring

Luo, Xiaowei 24 July 2013 (has links)
Construction has a higher injury and fatality rate than most of the other industries. Given this situation, existing research has studied various issues and factors affecting construction safety management and has attempted to use all available methods to improve the construction safety performance. However, the construction accident rate remains among the highest in the United States and the world. The primary objective of this research is to advance autonomous proximity monitoring and hence provide a safer environment for construction workers. In particular, I seek to advance current evaluations of proximity warning technologies to a more robust engineering approach to the design and deployment of autonomous safety monitoring systems. The contributions of the research are demonstrated through specifications, deployments, and testing of proximity monitoring systems for crane loads and falling from height. My research advances current knowledge in three areas. First, I develop specifications for proximity safety monitoring in a sensed environment, built from existing guidelines and expert interviews. Second, I translate the specifications to computer interpretable rules and deploy them in a distributed computing environment. This demonstrates the feasibility of a systems approach and reusability of components to speed deployment. Third, I evaluate the accuracy of the specifications and systems under imperfect data. I further evaluate some approaches to dealing with imperfect data. Collectively, these advances move existing proximity warning research from evaluation of specific systems to an engineering approach to development and deployment of distributed systems with reusable components that explicitly treats imperfect data. / text
518

Residual risks estimating models of transmission of HBV, HIV and HCV with different assays : lesson for screening strategies for Chinese blood banks

Chen, Jinyan, 陈锦艳 January 2013 (has links)
Blood safety is an issue of public health concern. Sensitive screening assays for excluding infectious donations have been widely adopted to reduce the risk of transfusion-transmitted infections, especially for hepatitis B virus (HBV), hepatitis C virus (HCV) and (human immunodeficiency virus) HIV infections. Even with sensitive screening assays, residual risk of undetectable infectious donations remains because donations may be made in the “window period” when the infection is present but difficult to detect with serological tests. Currently, serological screening tests are mainly used in China, rather than the more expensive and sensitive DNA based tests. From a public health perspective, choice of the screening test depends on overall cost-effectiveness, including assessment of the residual risk. To facilitate a full cost-effectiveness analysis, this review identifies the best residual risk estimating model in a Chinese setting. The search was conducted using databases including PubMed and ISI Web of Knowledge filtered by publication date, English language and accessibility of full text. Both exclusion and inclusion criteria were used for articles identification. Five papers on residual model estimation were retrieved. The blood donor profile in China was used to understand how these models differ and how these differences would affect their use and interpretation. This study identified the Michael P. Busch model as the optimal residual risk estimating model for Chinese blood banks’ to facilitate the cost-effectiveness assessment of a screening strategy in terms of achieving a balance of blood safety and cost. / published_or_final_version / Public Health / Master / Master of Public Health
519

Specialization in the identity ecosystem

Zhu, Liang, active 21st century 09 March 2015 (has links)
Cyberspace has dramatically improved our daily lives in the past several decades. Meanwhile, people’s personal identifiable information (PII) is exposed online and is at risk of identity theft and cybercrimes. The Identity Ecosystem developed by the Center for Identity in the University of Texas at Austin addresses this problem and provides a statistical framework for understanding the value, risk and mutual relationships of PII. The Identity Ecosystem currently uses a general Bayesian Network Model to simulate the relationships among PII, which may be quite inaccurate for specific groups of people. This thesis proposes a solution that specializes the Bayesian Network used for particular groups of people. Both one-dimension specialization and multi-dimension specialization are investigated. Research problems like how to choose specialization criterion, how to set specialization boundaries, and how to overcome the difficult of insufficient data, are carefully studied. Specialization functionality is demonstrated based on empirical data. Finally, experiments of specialization are conducted on data obtained from online stories. This work is important in the sense that it provides a guide-line of designing more accurate models of PII within the Identity Ecosystem. / text
520

Mobile Interaction with Safety Critical Systems : A feasibility study

Jonsson, Erik January 2015 (has links)
Embedded systems exists everywhere around us and the number of applications seems to be ever growing. They are found in electrical devices from coee machines to aircrafts. The common denominator is that they are designed for the specic purpose of the application. Some of them are used in safety critical systems where it is crucial that they operate correct and as intended in order to avoid accidents that can harm humans or properties. Meanwhile, general purpose Commercial O The Shelf (COTS) devices that can be found in the retail store, such as smartphones and tablets, has become a natural part of everyday life in the society. New applications are developed every day that improves everyday living, but numerous are also coupled to specic devices in order to control its functionality. Interaction between embedded systems and the exible devices do however not come without issues. Security, safety and ethical aspects are some of the issues that should be considered. In this thesis, a case study was performed to investigate the feasibility of using mobile COTS products in interaction with safety critical systems with respect to functional safety. Six user scenarios were identied for investigation, which could be of interest for industrial applications; The operator presented live machine data, The operator controlling the machine remotely, The service technician using mobile device in maintenance, service technician reading machine logs from the oce, the production manager analyzing machine productivity logs from the oce and the software manager uploading software. Restrictions in the functional safety standard, IEC 61508, and the characteristics of COTS devices, leads to the conclusion that real time interaction with safety systems is not allowed if the certication is to be preserved. Extracting information used to analyze the system where data is only sent from the machine would be allowed. All scenarios where the machine sends data to the user, and the data is only used as information, are hence allowed if isolation properties are guaranteed. A prototype system was designed and parts of it were implemented to show how sending and logging information can be performed using the company developed communication platform Data Engine.

Page generated in 0.0553 seconds