Dissertations / Theses on the topic 'Identifiers'

To see the other types of publications on this topic, follow the link: Identifiers.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Identifiers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Blackwood, C. I. R. "Robust identifiers for a class of adaptive systems." Thesis, University of Hull, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.384657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Simó, Picó Marcos. "Use of Secure Device Identifiers inVirtualised Industrial Applications." Thesis, KTH, Kommunikationsnät, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191513.

Full text
Abstract:
Industrial Control Systems (ICS) running in a virtualised environment are be-coming a common practice, however, there is not any standard or specification detailing authentication methods for industrial environments.Considering the current standards and specifications designed to provide au-thentication, we present the design and implementation of several approaches that enable trusted computing in virtualised environments. Most of the ap-proaches are based on a hardware-based root of trust, assuring the user’s soft-ware is always running on the same workstation.After comparing the approaches, we test an efficient approach by using the SecDevID stored in the virtual TPM to establish TLS sessions. Given the TLS features, this approach provides both hardware and VM authentication as well as confidentiality. Finally, the performance of the tested approach is evaluated.
Industriella styrsystem (ICS) som körs i en virtualiserad miljöo blir allt vanligare, men det finns hittils ingen standard eller specifikatjon för autentiseringsmetoder i industriella miljöer. Baserad på de gällande normer och specifikationer för att genomföra autentisering, vi presenterar design och implementation av flera metoder som möjliggör trusted computing i virtualiserade miljöer. De flesta av de metoder är baserade på en hårdvarubaserad ankare av förtroende, som garanterar att användarens mjukvara alltid körs på samma hårdvara. Vi jämför olika metoder, och testar en effektiv metod som avnänder SecDevID lagrad i en virtuell TPM för att etablera TLS förbindelser. Tillsammans med TLS ger lösningen autentisering för både hårdvara och VM, samt konfidentiletät. Vi utvärderar prestandan av den sistnämda metoden genom ett expertiment.
APA, Harvard, Vancouver, ISO, and other styles
3

Young, David A. "Compression of Endpoint Identifiers in Delay Tolerant Networking." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1385559406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nadrowski, Karin, Daniel Seifarth, Sophia Ratcliffe, Christian Wirth, and Lutz Maicher. "Identifiers in e-Science platforms for the ecological sciences." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-101319.

Full text
Abstract:
In the emerging Web of Data, publishing stable and unique identifiers promises great potential in using the web as common platform to discover and enrich data in the ecologic sciences. With our collaborative e-Science platform “BEFdata”, we generated and published unique identifiers for the data repository of the Biodiversity – Ecosystem Functioning Research Unit of the German Research Foundation (BEF-China; DFG: FOR 891). We linked part of the identifiers to two external data providers, thus creating a virtual common platform including several ecological repositories. We used the Global Biodiversity Facility (GBIF) as well the International Plant Name Index (IPNI) to enrich the data from our own field observations. We conclude in discussing other potential providers for identifiers for the ecological research domain. We demonstrate the ease of making use of existing decentralized and unsupervised identifiers for a data repository, which opens new avenues to collaborative data discovery for learning, teaching, and research in ecology.
APA, Harvard, Vancouver, ISO, and other styles
5

Vivekraja, Vignesh. "Low-Power, Stable and Secure On-Chip Identifiers Design." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/34854.

Full text
Abstract:
Trustworthy authentication of an object is of extreme importance for secure protocols. Traditional methods of storing the identity of an object using non-volatile memory is insecure. Novel chip-identifiers called Silicon Physical Unclonable Functions (PUFs) extract the random process characteristics of an Integrated Circuit to establish the identity. Though such types of IC identifiers are difficult to clone and provide a secure, yet an area and power efficient authentication mechanism, they suffer from instability due to variations in environmental conditions and noise. The decreased stability imposes a penalty on the area of the PUF circuit and the corresponding error correcting hardware, when trying to generate error-free bits using a PUF. In this thesis, we propose techniques to improve the popular delay-based PUF architectures holistically, with a focus on its stability. In the first part, we investigate the effectiveness of circuit-level optimizations of the delay based PUF architectures. We show that PUFs which operate in the subthreshold region, where the transistor supply voltage is maintained below the threshold voltage of CMOS, are inherently more stable than PUFs operating at nominal voltage because of the increased difference in characteristics of transistors at this region. Also, we show that subthreshold PUF enjoys higher energy and area efficiency. In the second part of the thesis, we propose a feedback-based supply voltage control mechanism and a corresponding architecture to improve the stability of delay-based PUFs against variations in temperature.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
6

Mandadi, Harsha. "Remote Integrity Checking using Multiple PUF based Component Identifiers." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78200.

Full text
Abstract:
Modern Printed Circuit Boards (PCB) contain sophisticated and valuable electronic components, and this makes them a prime target for counterfeiting. In this thesis, we consider a method to test if a PCB is genuine. One high-level solution is to use a secret identifier of the board, together with a cryptographic authentication protocol. We describe a mechanism that authenticates all major components of PCB as part of attesting the PCB. Our authentication protocol constructs the fingerprint of PCB by extracting hardware fingerprint from the components on PCB and cryptographically combining the fingerprints. Fingerprints from each component on PCB are developed using Physical Unclonable Functions (PUF). In this thesis, we present a PUF based authentication protocol for remote integrity checking using multiple PUF component level identifiers. We address the design on 3 different abstraction levels. 1)Hardware Level, 2)Hardware Integration level, 3)Protocol level. On the hardware level, we propose an approach to develop PUF from flash memory component on the device. At the hardware Integration level, we discuss a hardware solution for implementing a trustworthy PUF based authentication. We present a prototype of the PUF based authentication protocol on an FPGA board via network sockets.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Orive, Múgica Iker. "Technical identifiers of fraudulent web pages, a systematic literature review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19048.

Full text
Abstract:
Fraudulent pages are a danger to which all web users are exposed. These pages have illegitimate purposes such as the theft of sensitive user information. There are a lot of tools available on the market today that are aimed at detecting malicious pages, however, these are not reliable enough and that is why there is still a lot of room for future improvement. Therefore, further analysis of the malicious pages and their characteristics is a key element in protecting users and in the future in eradicating this type of malicious page. A systematic review of the literature has been conducted to generate a list of features that can be used to detect malicious pages and that can ensure a high level of accuracy. During the development of the study, the different articles on the subject have been compared and analysed. For this process of analysis, thematic coding has been used, a qualitative method of analysis, which means that an in-depth understanding of ideas has been pursued. The document presents the already cited list of characteristics as well as offering suggestions and ideas that can be used in the development of future
APA, Harvard, Vancouver, ISO, and other styles
8

Lazewnik, Rochel. "Identifiers of Bilingual Spanish-English Speaking Children with Language Impairment." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1378114034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lakey, John Christopher. "HIERARCHICAL GEOGRAPHICAL IDENTIFIERS AS AN INDEXING TECHNIQUE FOR GEOGRAPHIC INFORMATION RETRIEVAL." MSSTATE, 2008. http://sun.library.msstate.edu/ETD-db/theses/available/etd-11062008-195327/.

Full text
Abstract:
Location plays an ever increasing role in modern web-based applications. Many of these applications leverage off-the-shelf search engine technology to provide interactive access to large collections of data. Unfortunately, these commodity search engines do not provide special support for location-based indexing and retrieval. Many applications overcome this constraint by applying geographic bounding boxes in conjunction with range queries. We propose an alternative technique based on geographic identifiers and suggest it will yield faster query evaluation and provide higher search precision. Our experiment compared the two approaches by executing thousands of unique queries on a dataset with 1.8 million records. Based on the quantitative results obtained, our technique yielded drastic performance improvements in both query execution time and precision.
APA, Harvard, Vancouver, ISO, and other styles
10

Günlü, Onur [Verfasser]. "Key Agreement with Physical Unclonable Functions and Biometric Identifiers / Onur Günlü." München : Verlag Dr. Hut, 2019. http://d-nb.info/1178898407/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Giroux, Amy. "Mea Familia: Ethnic Burial Identifiers in St. Michael's Cemetery, Pensacola, Florida." Master's thesis, University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2151.

Full text
Abstract:
Grave markers from St. Michael'ss Cemetery in Pensacola, Florida, were studied for evidence of ethnicity and acculturation. The 1,447 grave markers dating from 1870 to 1939 were used to test two hypotheses: 1) the grave markers for ethnic groups represented in the cemetery during the project's time period have identifiable sets of burial attributes; and 2) changes in the visible ethnic attribute sets show evidence of the acculturation of ethnic groups over time. Physical attributes pertaining to grave markers, and personal characteristics (e.g. sex, age) for the individuals inscribed upon the markers were collected for analysis. Historical sources were used to assign ethnicity to each marker by determining the ancestry of the individuals memorialized. Grave marker attributes for ten ethnic groups were examined. The statistical results indicate a correlation of ethnicity with marker attributes. Central Europeans had the most identifiable preferences including large markers, vertical markers, floral design motifs, and headstone molding. Other observable ethnic patterns include the use of family markers, non-marble materials, horizontal markers, relationship wording, and religious symbolism. Spatial analysis illustrates that ethnic markers were dispersed across the cemetery; this lack of segregation in the graveyard may be due to acculturation. However, the diachronic changes in burial identifiers cannot be clearly ascribed to the acculturation of immigrants. Use of marble materials and the height of markers diminished for all ethnic groups. Changes in the memorialization industry were likely contributing factors to differences in attribute selection over time. Therefore, while ethnic burial identifiers are statistically visible in the cemetery landscape, attribute changes are not exclusively caused by acculturation.
M.A.
Department of Anthropology
Sciences
Anthropology MA
APA, Harvard, Vancouver, ISO, and other styles
12

Weigel, Tobias [Verfasser], and Thomas [Akademischer Betreuer] Ludwig. "Persistent Identifiers for Earth Science Data Management / Tobias Weigel. Betreuer: Thomas Ludwig." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2016. http://d-nb.info/1097561712/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Weigel, Tobias Verfasser], and Thomas [Akademischer Betreuer] [Ludwig. "Persistent Identifiers for Earth Science Data Management / Tobias Weigel. Betreuer: Thomas Ludwig." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2016. http://d-nb.info/1097561712/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Schröder, Michael, Rainer Winnenburg, and Conrad Plake. "Improved mutation tagging with gene identifiers applied to membrane protein stability prediction." BioMed Central, 2009. https://tud.qucosa.de/id/qucosa%3A28888.

Full text
Abstract:
Background The automated retrieval and integration of information about protein point mutations in combination with structure, domain and interaction data from literature and databases promises to be a valuable approach to study structure-function relationships in biomedical data sets. Results We developed a rule- and regular expression-based protein point mutation retrieval pipeline for PubMed abstracts, which shows an F-measure of 87% for the mutation retrieval task on a benchmark dataset. In order to link mutations to their proteins, we utilize a named entity recognition algorithm for the identification of gene names co-occurring in the abstract, and establish links based on sequence checks. Vice versa, we could show that gene recognition improved from 77% to 91% F-measure when considering mutation information given in the text. To demonstrate practical relevance, we utilize mutation information from text to evaluate a novel solvation energy based model for the prediction of stabilizing regions in membrane proteins. For five G protein-coupled receptors we identified 35 relevant single mutations and associated phenotypes, of which none had been annotated in the UniProt or PDB database. In 71% reported phenotypes were in compliance with the model predictions, supporting a relation between mutations and stability issues in membrane proteins. Conclusion We present a reliable approach for the retrieval of protein mutations from PubMed abstracts for any set of genes or proteins of interest. We further demonstrate how amino acid substitution information from text can be utilized for protein structure stability studies on the basis of a novel energy model.
APA, Harvard, Vancouver, ISO, and other styles
15

Schröder, Michael, Rainer Winnenburg, and Conrad Plake. "Improved mutation tagging with gene identifiers applied to membrane protein stability prediction." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-177379.

Full text
Abstract:
Background The automated retrieval and integration of information about protein point mutations in combination with structure, domain and interaction data from literature and databases promises to be a valuable approach to study structure-function relationships in biomedical data sets. Results We developed a rule- and regular expression-based protein point mutation retrieval pipeline for PubMed abstracts, which shows an F-measure of 87% for the mutation retrieval task on a benchmark dataset. In order to link mutations to their proteins, we utilize a named entity recognition algorithm for the identification of gene names co-occurring in the abstract, and establish links based on sequence checks. Vice versa, we could show that gene recognition improved from 77% to 91% F-measure when considering mutation information given in the text. To demonstrate practical relevance, we utilize mutation information from text to evaluate a novel solvation energy based model for the prediction of stabilizing regions in membrane proteins. For five G protein-coupled receptors we identified 35 relevant single mutations and associated phenotypes, of which none had been annotated in the UniProt or PDB database. In 71% reported phenotypes were in compliance with the model predictions, supporting a relation between mutations and stability issues in membrane proteins. Conclusion We present a reliable approach for the retrieval of protein mutations from PubMed abstracts for any set of genes or proteins of interest. We further demonstrate how amino acid substitution information from text can be utilized for protein structure stability studies on the basis of a novel energy model.
APA, Harvard, Vancouver, ISO, and other styles
16

Ganta, Dinesh. "An Effort toward Building more Secure and Efficient Physical Unclonable Functions." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/51217.

Full text
Abstract:
Over the last decade, there has been a tremendous growth in the number of electronic devices and applications. One of the very important aspects to deal with such proliferation of ICs is their security. Establishing the Identity (ID) of a device is the cornerstone of any secure application. Typically, the IDs of devices are stored in non-volatile memories (NVM) or through burning fuses on ICs. However, through such traditional techniques, IDs are vulnerable to attacks. Further, maintaining such secrets in NVMs is expensive. Physical Unclonable Functions (PUF) provide an alternative method for creating chip IDs. They exploit the uncontrollable variations that exist in IC manufacturing to generate identifiers. However, since PUFs exploit the small mismatch across identically designed circuits, the responses of PUFs are prone to error in the presence of unwanted variations in the operating temperature, supply voltage, and other noises. The overarching goal of this work is to develop silicon PUFs that are highly efficient and stable to such noises. In addition, to make PUFs more attractive for low cost and tiny embedded systems, our goal is to develop PUFs with minimal area and power consumption for a given ID length and security requirement. Techniques to develop such PUFs span different abstraction levels ranging from technology-independent application-level techniques to technology-dependent device-level ones. In this dissertation, we present different technology-independent and technology-dependent techniques and evaluate which techniques are good candidates for improving different qualities of PUFs. In technology-independent techniques, we propose two modifications to a conventional PUF architecture, which are detailed in this thesis. Both modifications result in a PUF that is more efficient in terms of area and power. Compared to the traditional architecture, for a given silicon real estate, the proposed architecture provides over two orders of magnitude larger $C/R$ space and it has higher resistance toward modeling attacks. Under technology-dependent methods, we investigate multiple techniques that improve stability and efficiency of PUF designs. In one approach, we propose a novel PUF design with a similar architecture to that of a traditional design, where we replace large and power hungry digital components with more efficient analog components. In another technique, we exploit the differences between pMOS and nMOS transistors in their variation of threshold voltage (Vth) and in the temperature coefficients of Vth to significantly improve the stability of bi-stable PUFs. We also use circuit-level simulations to evaluate the stability of silicon PUFs to aging degradation. We believe that our technology-independent techniques are good candidates for improving overall efficiency of PUFs in terms of both operation and implementation costs, suitable for PUFs with tight constraints on cost for design and test. However, with regards to improving the stability of PUFs, it is cost-effective to use our technology-dependent techniques as long as the extra effort for implementation and testing can be tolerated.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
17

Tucker, Kvon. "The effects of ethnic identity, ethnicity and ethnic identifiers on job suitability ratings." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1568913.

Full text
Abstract:

The present study examined the effects of ethnic identity and ethnicity on hiring discrimination (via perceived job suitability ratings) and rater prejudice against Middle-Eastern applicants. A sample of N = 69 employed college students of Caucasian and African-American descent role-played recruiters rating fictitious job resumes (varying on job applicants' ethnicity) on Perceived Job Suitability. It was hypothesized that job applicants' ethnic identification would predict ratings, and that participants' ethnicity and ethnic identity were examined as moderators of the target relationship. The findings did not support the predictions. Specifically, the current study found that participants rated the Middle Eastern resumes higher than the Caucasian resume, regardless of the rater's ethnicity. Furthermore, the partially identified Middle Eastern resume received higher than the fully identified Middle Eastern resume from both Caucasian and African American groups. Lastly, the ethnic identity level of a rater did not affect his or her job suitability ratings.

APA, Harvard, Vancouver, ISO, and other styles
18

Perkins, Ria. "Linguistic identifiers of L1 Persian speakers writing in English : NLID for authorship analysis." Thesis, Aston University, 2014. http://publications.aston.ac.uk/21410/.

Full text
Abstract:
This research focuses on Native Language Identification (NLID), and in particular, on the linguistic identifiers of L1 Persian speakers writing in English. This project comprises three sub-studies; the first study devises a coding system to account for interlingual features present in a corpus of L1 Persian speakers blogging in English, and a corpus of L1 English blogs. Study One then demonstrates that it is possible to use interlingual identifiers to distinguish authorship by L1 Persian speakers. Study Two examines the coding system in relation to the L1 Persian corpus and a corpus of L1 Azeri and L1 Pashto speakers. The findings of this section indicate that the NLID method and features designed are able to discriminate between L1 influences from different languages. Study Three focuses on elicited data, in which participants were tasked with disguising their language to appear as L1 Persian speakers writing in English. This study indicated that there was a significant difference between the features in the L1 Persian corpus, and the corpus of disguise texts. The findings of this research indicate that NLID and the coding system devised have a very strong potential to aid forensic authorship analysis in investigative situations. Unlike existing research, this project focuses predominantly on blogs, as opposed to student data, making the findings more appropriate to forensic casework data.
APA, Harvard, Vancouver, ISO, and other styles
19

AlSuhaibani, Reem Saleh. "Part-of-Speech Tagging of Source Code Identifiers using Programming Language Context Versus Natural Language Context." Kent State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=kent1448502094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Colby, Jordan. "Cognitive assimilation-contrast effects among partisan identifiers, an analysis of the 1993 Canadian national election." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq21875.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lasher, Michael P., and Jill D. Stinson. "Use of Person-Identifiers in Sexual Abuse Research Across 35 Years: Preliminary Results of the Sexual Abuse Terminology Project." Digital Commons @ East Tennessee State University, 2020. https://dc.etsu.edu/etsu-works/7920.

Full text
Abstract:
In recent years, questions have risen regarding the language used to describe those who are supervised by the criminal justice system, participating in mental health services, and examined in research. This has resulted in recommendations to reduce labelling bias, as is evident from the recent editions of the APA Publication Manual (2009, 2019), editorials (Willis & Letourneau, 2018), and ethics discussions (Willis, 2018). In 2016, the United States Department of Justice adopted a policy of referring to their detainees and supervisees using person-first language, such as “individual who has offended,” rather than referring to individuals based on the nature of their offenses. With these developments, recent research has increased our focus on the way professionals identify those involved in the criminal justice system, how our labels impact these individuals, and the sociocultural implications of our language use (e.g., Denver, Pickett, & Bushway, 2017). The poster presents preliminary results of the sexual abuse terminology project, which examines professionals’ use of language to identify and describe individuals who have engaged in sexually abusive behaviors, the sexually abusive behaviors themselves, and sexual interests associated with abusive behavior, between 1981 and 2020. This poster will specifically highlight person identifiers across five-year intervals from 1981 through 2015 (as data collection from publications in 2020 will still be ongoing at the time of presentation), demonstrating trends is language use over time. For this analysis, 1,223 peer-reviewed studies were evaluated for language use. Eighty-three label categories (e.g., abusers, individuals, offenders, etc.) were identified, with 410 specific labels (e.g. intrafamilial child sexual abusers, men with sexual behavior problems, deviant patients, etc.) identified in total. While “offender” labels are the most consistently used terms across all years, trends in term use over time will be presented across five-year intervals. Trends in terminology usage will be graphically depicted, and hypotheses for changes in terminology used will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
22

Restrepo, Maria Adelaida. "Identifiers of Spanish-speaking children with language impairment who are learning English as a second language." Diss., The University of Arizona, 1995. http://hdl.handle.net/10150/187403.

Full text
Abstract:
This study identified a set of measures that accurately and efficiently discriminated between predominantly Spanish-speaking children with normal language and with language impairment. Twenty-one 5- to 7-year-old children with normal language and 21 with language impairment, matched for age, gender, and school were studied. Each child responded to a set of verbal and nonverbal measures. The verbal measures assessed vocabulary and bound-morpheme learning skills, spontaneous language form, and responses to a standardized language test. The nonverbal measures assessed nonverbal intelligence, spatial-rotation, and motor-sequential skills. In addition, the children's parents participated in an interview to describe the child's current speech, language, and learning skills; and to report family history of speech, language, and academic problems. The results of a stepwise discriminant analysis indicated that four measures accounted for 79% of the variance of the model (p < .0001). This four-measure discriminant model had a sensitivity of 91.3% and a specificity of 100%. The measures that contributed to the discriminant model were: parental report of the child's current speech, language, and learning problems; number of errors per terminable unit; family history of speech, language, or academic problems; and mean length of terminable unit. An additional discriminant analysis indicated that the same level of discriminant accuracy could be maintained with the two measures that accounted for the most variance in the four-measure model: parental report of speech and language problems, and number of errors per terminable unit. Confirmatory discriminant analyses of the two-measure and four-measure models indicated that the results were stable across an independent sample. This study underscores the need for data-based approaches to the identification of Spanish-speaking children with language impairment, and the contributions of standard evaluations procedures to the identification of these children: parent interview and language-form analysis. In addition, the findings of this study indicate that a language-form deficit characterized by morphosyntactic difficulties and a high prevalence of family history of speech and language problems characterize children with language impairment regardless of the languages they speak.
APA, Harvard, Vancouver, ISO, and other styles
23

Panda, Lalitendu 1963. "An exploratory study of segmentation models and identifiers of customer propensity for third party logistics services." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Chambers, Pleas R. III. "Belief based behavioral identifiers resulting from exposure to informational advertisements on the social network site Facebook." Thesis, Argosy University/Phoenix, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10115699.

Full text
Abstract:

Subjective norms (family members and close friends) between the ages of 18 and 34 who were part of the SurveyMonkey Audience were part of this quantitative study. The study examined those more likely to share/retransmit the belief-based informational advertisement related messages of Corporate Social Responsibility (CSR), consumer health, and politics with/to college students between the ages of 18 and 24. For organizations to more efficiently and productively target college students with their informational advertisement related messages, they must gain a better understanding of the types of messages more likely to be previewed and shared/retransmitted by subjective norms. This study examined (a) the frequency in which subjective norms utilized Facebook to communicate with college students, (b) willingness of subjective norms toward previewing certain types of informational advertisement messages on Facebook, and (c) willingness of subjective norms to share/retransmit certain types of informational advertisement messages on Facebook. An online survey was administered utilizing a SurveyMonkey audience platform. A total of 173 participants volunteered to complete the online survey. The results indicated that the strength of the relational tie of a subjective norm was not significantly correlated to their willingness to share/retransmit informational advertisement messages. Gender of the subjective norm was a better predictor of who is more willing to share/retransmit certain types of informational advertisement messages with/to college students on Facebook. This study concluded with implications for practice and future research recommendations.

APA, Harvard, Vancouver, ISO, and other styles
25

Nakrin, Andrew S. (Andrew Steven) 1952. "TagMeds : a tool for populating eXtensible Markup Language documents with UMLS concept unique identifiers of current medications." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/28234.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 113-117).
TagMeds is a system that recognizes and marks textual descriptions of a patient's current medications in the unstructured textual content of consultations letters. Medications are found based on their names and on linguistic patterns describing their dose, form of administration, etc. The UMLS is used as the underlying database of terms, and detected medications are encoded into XML tags consistent with and making use of the Health Level 7 (HL7) Clinical Document Architecture. The specific aims of this research are: (1) to review the literature in order to determine the state of the art in tagging free text for search and utilization, (2) to construct a tool that will reliably generate UMLS Concept Unique Identifier tags of current medications within free text. The methods involved are: (1) creating Perl procedures to recognize patterns in free text to retrieve the UMLS Concept Unique Identifiers and to insert these unique identifiers into XML tagging of the text and (2) statistical analysis of the use of TagMeds on a data base of consultation letters from the Endocrinology Clinic of the Children's Hospital of Boston as compared to manual markup by a group of physicians. The performance of an NLP system is found to be at least as sensitive as the performance of physicians in the extraction of current medications and their attributes. The tagged current medication information has the potential to support a personal electronic medical record system, such as PING. Additional development of TagMeds is likely to bring significant improvements, with modest expenditure of time and effort. TagMeds demonstrates that great utility can be achieved with a medical natural language processing system using simple and unsophisticated techniques.
by Andrew S. Nakrin.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
26

Falahrastegar, Marjan. "The complex third-party tracking ecosystem : a multi-dimensional perspective." Thesis, Queen Mary, University of London, 2017. http://qmro.qmul.ac.uk/xmlui/handle/123456789/25818.

Full text
Abstract:
The third-party tracking ecosystem continuously evolves in scope, therefore, understanding of it is at best elusive. In this thesis, we investigate this complex ecosystem from three dimen-sions. Firstly, we examine third-party trackers from a geographical perspective. We observe a non-uniform presence of local third-party trackers between regions and countries within re-gions, with some trackers focusing on specific regions and countries. Secondly, we focus on how trackers share user-specific identifiers (IDs). We identify user-specific IDs that we suspect are used to track users. We find a significant amount of ID-sharing practices across different organ-isations providing various service categories. Our observations reveal that ID-sharing happens at a large scale regardless of the user profile size and profile condition such as logged-in and logged-out. Finally, we quantify the effect of tracker-blockers, a popular option for the users to protect their privacy, on the page-load performance. The effect of such tools on the over-all user browsing experience is questionable as the blockage of trackers can disrupt the general website loading process. The tracker-blockers we studied have a considerable negative effect on page-load performance. Unexpectedly, we find that even highly popular websites are negatively affected. This thesis points to significant gaps in our knowledge about the inner workings of this complex ecosystem. Moreover, it highlights some of the challenges that we face when attempting to preserve user's privacy by using tracker-blockers.
APA, Harvard, Vancouver, ISO, and other styles
27

Ingallina, Alessandro. "Adaptive High-Gain Observers via Discete time Identifier." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
The system's state observation is one of the most important problem in control theory, and it becomes extremely challenging when the system model is not entirely known. For linear systems the problem is solved by using Luenberger observer in a deterministic framework and by Kalman filter in a stochastic framework, while for nonlinear systems, the observation problem is still a research topic. The aim of this thesis is to give a framework, in which the adaptation problem, relative to the model unknowns, can be performed by system identification techniques. In particular, in this thesis we develop and implement adaptive observers design, that uses "universal approximator" to perform the adaptation problem. Moreover, we present simulations on the performance of the proposed observer.
APA, Harvard, Vancouver, ISO, and other styles
28

Wannenwetsch, Oliver [Verfasser], Ramin [Akademischer Betreuer] [Gutachter] Yahyapour, and Jens [Gutachter] Grabowski. "Long-Term Location-Independent Research Data Dissemination Using Persistent Identifiers / Oliver Wannenwetsch ; Gutachter: Ramin Yahyapour, Jens Grabowski ; Betreuer: Ramin Yahyapour." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2017. http://d-nb.info/1128902540/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Clarke, Roger Anthony, and Roger Clarke@xamax com au. "Data Surveillance: Theory, Practice & Policy." The Australian National University. Faculty of Engineering and Information Technology, 1997. http://thesis.anu.edu.au./public/adt-ANU20031112.124602.

Full text
Abstract:
Data surveillance is the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons. This collection of papers was the basis for a supplication under Rule 28 of the ANU's Degree of Doctor of Philosophy Rules. The papers develop a body of theory that explains the nature, applications and impacts of the data processing technologies that support the investigation or monitoring of individuals and populations. Literature review and analysis is supplemented by reports of field work undertaken in both the United States and Australia, which tested the body of theory, and enabled it to be articulated. The research programme established a firm theoretical foundation for further work. It provided insights into appropriate research methods, and delivered not only empirically-based descriptive and explanatory data, but also evaluative information relevant to policy-decisions. The body of work as a whole provides a basis on which more mature research work is able to build.
APA, Harvard, Vancouver, ISO, and other styles
30

Sadia, Ahmad, and Osama Zarraa. "Are APIs with Poor Design Subject to Poor Lexicon? : A Google Perspective." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96846.

Full text
Abstract:
REST (Representational state transfer) is an architectural style for distributed hypermedia systems. The simplicity of REST allows straightforward communication between HTTP clients and servers using URIs (Uniform Resource Identifiers) and HTTP methods, e.g., GET, POST, PUT, and DELETE. To do the communication effectively between clients and servers, there is a set of best design practices (design and linguistic patterns) shall be followed, and a set of poor design practices (design and linguistic antipatterns) shall be avoided. This study aims to determine whether there is a relationship between design and linguistic quality in Google RESTful APIs. To find this relation, a tool is developed to detect patterns and antipatterns in REST APIs both in terms of design and linguistic quality. The input of this tool is qualitative data (Google APIs) and its output is quantitative data. Using this quantitative data, a statistical study is then performed to detect the relation. The tests that are conducted to obtain the final results are Chi-squared and Phi Coefficient tests. The result of Chi-squared that considered all the groups of patterns and antipatterns shows that there is a statistically significant relation between design and linguistic quality. However, when we assess the individual pair of patterns and antipatterns, our Phi Coefficient tests show that for most of the cases, there is no or negligible relationship between linguistic and design patterns and antipatterns.
APA, Harvard, Vancouver, ISO, and other styles
31

Larsson, Edvin, and Jesper Hägglund. "Studying the Relation between Linguistic and Design Quality in RESTful APIs." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97696.

Full text
Abstract:
REST (REpresentational State Transfer) is commonly used for designing APIs. Two main categories of REST API quality have been identified in previous research: linguistic and design quality. Linguistic quality revolves around the design of the URIs. Design quality revolves around the metadata and body in HTTP requests and responses. For enabling and simplifying communications with REST, both linguistic and design quality are important, however, previous research has shown that even major APIs using REST are not always following best practices for linguistic and design quality. This study investigates if there is a statistical relation between linguistic and design quality. We selected 326 API endpoints from ten public APIs for this study. This study has reused and improved a Java-based tool in previous research for detecting aspects of linguistic quality in the APIs endpoints. For this study, we also developed a tool based on Node.js for detecting aspects of design quality in the API endpoints. These two tools are applied on the same API endpoints to be able to study the statistical relation. A Chi-Square test, implemented with R, showed that there is a significant statistical relation in our findings between linguistic and design quality. Pairwise phi-coefficient comparisons, implemented with Python, between each combination of the linguistic and design aspects used in this study identified eight weak and two moderate relations among the linguistic and design quality aspects. However, sample tests showed that the Java-based tool for detecting linguistic quality were not accurate, which made us fail to answer our problem formulation.
APA, Harvard, Vancouver, ISO, and other styles
32

Fleming, Theodor. "Decentralized Identity Management for a Maritime Digital Infrastructure : With focus on usability and data integrity." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-155115.

Full text
Abstract:
When the Internet was created it did not include any protocol for identifying the person behind the computer. Instead, the act of identification has primarily been established by trusting a third party. But, the rise of Distributed Ledger Technology has made it possible to authenticate a digital identity and build trust without the need of a third party. The Swedish Maritime Administration are currently validating a new maritime digital infrastructure for the maritime transportation industry. The goal is to reduce the number of accidents, fuel consumption and voyage costs. Involved actors has their identity stored in a central registry that relies on the trust of a third party. This thesis investigates how a conversion from the centralized identity registry to a decentralized identity registry affects the usability and the risk for compromised data integrity. This is done by implementing a Proof of Concept of a decentralized identity registry that replaces the current centralized registry, and comparing them. The decentralized Proof of Concept’s risk for compromised data integrity is 95.1% less compared with the centralized registry, but this comes with a loss of 53% in efficiency.
APA, Harvard, Vancouver, ISO, and other styles
33

Egan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.

Full text
Abstract:
Phishing attacks employ social engineering to target end-users, with the goal of stealing identifying or sensitive information. This information is used in activities such as identity theft or financial fraud. During a phishing campaign, attackers distribute URLs which; along with false information, point to fraudulent resources in an attempt to deceive users into requesting the resource. These URLs are made obscure through the use of several techniques which make automated detection difficult. Current methods used to detect malicious URLs face multiple problems which attackers use to their advantage. These problems include: the time required to react to new attacks; shifts in trends in URL obfuscation and usability problems caused by the latency incurred by the lookups required by these approaches. A new method of identifying malicious URLs using Artificial Neural Networks (ANNs) has been shown to be effective by several authors. The simple method of classification performed by ANNs result in very high classification speeds with little impact on usability. Samples used for the training, validation and testing of these ANNs are gathered from Phishtank and Open Directory. Words selected from the different sections of the samples are used to create a `Bag-of-Words (BOW)' which is used as a binary input vector indicating the presence of a word for a given sample. Twenty additional features which measure lexical attributes of the sample are used to increase classification accuracy. A framework that is capable of generating these classifiers in an automated fashion is implemented. These classifiers are automatically stored on a remote update distribution service which has been built to supply updates to classifier implementations. An example browser plugin is created and uses ANNs provided by this service. It is both capable of classifying URLs requested by a user in real time and is able to block these requests. The framework is tested in terms of training time and classification accuracy. Classification speed and the effectiveness of compression algorithms on the data required to distribute updates is tested. It is concluded that it is possible to generate these ANNs in a frequent fashion, and in a method that is small enough to distribute easily. It is also shown that classifications are made at high-speed with high-accuracy, resulting in little impact on usability.
APA, Harvard, Vancouver, ISO, and other styles
34

Nordlindh, Mattias, and Mikael Berg. "Implementing Internet of Things in the Swedish Railroad Sector : Evaluating Design Principles and Guidelines for E-Infrastructures." Thesis, Uppsala universitet, Informationssystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-181536.

Full text
Abstract:
The Swedish Transportation Administration started an initiative to create a new e-infrastructure for the railroad sector in Sweden. The purpose is to follow the movement of railroad vehicles on the railway tracks and enhance logistics aspects of the transportation of goods by train. The Swedish initiative works as a pilot project for the railroad sector in the EU and if successful the e-infrastructure could be rolled out in the entire EU. It is a rare opportunity to be a part from the beginning of the creation of such a potential large scale e-infrastructure. The aim of this thesis is to provide advice early in the development process to aid in the success of the design and creation on the e-infrastructure. In the doing of this we will need to evaluate the areas: (1) the current state of the e-infrastructure, (2) the usefulness of the EPCGlobal standard for this e-infrastructure and (3) the usefulness on established e-infrastructures design principles. As a result of the thesis we have provided advice to enhance the design and implementation of the e-infrastructure, also advice is given on how to make the EPCGlobal standard’s more compatibility with the transportation sector. We have found the design principles by Hanseth & Lyytinen (2004) and Eriksson & Ågerfalk (2010) useful for the evaluation of the e-infrastructure. We also advocate that new design principles should be created to encompass the new concept of Internet of Things in e-infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
35

Smith, Jason. "Denial of service : prevention, modelling and detection." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16392/.

Full text
Abstract:
This research investigates the denial of service problem, in the context of services provided over a network, and contributes to improved techniques for modelling, detecting, and preventing denial of service attacks against these services. While the majority of currently employed denial of service attacks aim to pre-emptively consume the network bandwidth of victims, a significant amount of research effort is already being directed at this problem. This research is instead concerned with addressing the inevitable migration of denial of service attacks up the protocol stack to the application layer. Of particular interest is the denial of service resistance of key establishment protocols (security protocols that enable an initiator and responder to mutually authenticate and establish cryptographic keys for establishing a secure communications channel), which owing to the computationally intensive activities they perform, are particularly vulnerable to attack. Given the preponderance of wireless networking technologies this research hasalso investigated denial of service and its detection in IEEE 802.11 standards based networks. Specific outcomes of this research include: - investigation of the modelling and application of techniques to improve the denial of service resistance of key establishment protocols; - a proposal for enhancements to an existing modelling framework to accommodate coordinated attackers; - design of a new denial of service resistant key establishment protocol for securing signalling messages in next generation, mobile IPv6 networks; - a comprehensive survey of denial of service attacks in IEEE 802.11 wireless networks; discovery of a significant denial of service vulnerability in the clear channel assessment procedure implemented by the medium access control layer of IEEE 802.11 compliant devices; and - design of a novel, specification-based intrusion detection system for detecting denial of service attacks in IEEE 802.11 wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
36

Nylin, Nilsson Jakob. "Att identifiera uttryck." Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18529.

Full text
Abstract:
The aim of this thesis is to analyse the possibility to identify the FRBR entity expression from existing catalogue records performed within the context of Swedish cataloguing rules. The empirical study uses a sample of records from the catalogue within the library at the University College of Borås. To begin with, the thesis reports some of the earlier discussion about the FRBR model. That gives an understanding of which problems the model has and justifies the study’s delimitation towards expression. The research questions in the study ask to what extent it is possible to distinguish expression, what fields that identify the entity and if descriptions of particular types of media and publication are different in respect of expression. For an understanding of the empirical material the study uses categories fetched from the article FRBRization: A method for turning online public finding lists into online public catalogs written by Martha M. Yee. The result shows that expression can be identified in a large part of the material. At the same time, the result shows a clear difference between descriptions of monographs and serials, respectively. They are different both in respect of to what extent expression can be distinguished and which fields that identify the entity. One possible interpretation of the result is to understand the concepts in FRBR as roles rather than things. That seems to be able to solve some of the problems that are connected with the model.
Uppsatsnivå: D
APA, Harvard, Vancouver, ISO, and other styles
37

Butler, Simon. "Analysing Java identifier names." Thesis, Open University, 2016. http://oro.open.ac.uk/46653/.

Full text
Abstract:
Identifier names are the principal means of recording and communicating ideas in source code and are a significant source of information for software developers and maintainers, and the tools that support their work. This research aims to increase understanding of identifier name content types - words, abbreviations, etc. - and phrasal structures - noun phrases, verb phrases, etc. - by improving techniques for the analysis of identifier names. The techniques and knowledge acquired can be applied to improve program comprehension tools that support internal code quality, concept location, traceability and model extraction. Previous detailed investigations of identifier names have focused on method names, and the content and structure of Java class and reference (field, parameter, and variable) names are less well understood. I developed improved algorithms to tokenise names, and trained part-of-speech tagger models on identifier names to support the analysis of class and reference names in a corpus of 60 open source Java projects. I confirm that developers structure the majority of names according to identifier naming conventions, and use phrasal structures reported in the literature. I also show that developers use a wider variety of content types and phrasal structures than previously understood. Unusually structured class names are largely project-specific naming conventions, but could indicate design issues. Analysis of phrasal reference names showed that developers most often use the phrasal structures described in the literature and used to support the extraction of information from names, but also choose unexpected phrasal structures, and complex, multi-phrasal, names. Using Nominal - software I created to evaluate adherence to naming conventions - I found developers tend to follow naming conventions, but that adherence to published conventions varies between projects because developers also establish new conventions for the use of typography, content types and phrasal structure to support their work: particularly to distinguish the roles of Java field names.
APA, Harvard, Vancouver, ISO, and other styles
38

Linda, Palmelius, and Widén Maria. "Är det något som inte stämmer? : BVC-sjuksköterskors erfarenheter av att identifiera mammor med tecken på depression." Thesis, Mälardalens högskola, Hälsa och välfärd, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-26725.

Full text
Abstract:
Bakgrund: I Sverige drabbas 10-15 % av nyblivna mammor av depression efter förlossningen. Det är viktigt att identifiera mammorna. En postpartumdepression kan störa samspelet och anknytningen mellan mamma och barn. I Barnavårdscentralens (BVC) basprogram finns ett riktat besök med fokus på mammornas psykiska hälsa när barnen är 6- 8 veckor där mammorna erbjuds fylla i ett screening-formulär.  Syfte: Syftet med studien var att beskriva BVC-sjuksköterskors erfarenheter av att identifiera mammor med tecken på depression.  Metod: En kvalitativ induktiv design valdes. Elva BVC-sjuksköterskor intervjuades utifrån en semistrukturerad intervjuguide. Materialet analyserades sedan med hjälp av en kvalitativ innehållsanalys.  Resultat: BVC-sjuksköterskornas erfarenheter av att identifiera mammor med tecken på depression beskrevs genom fem kategorier. Erfarenheten var att de behövde vara engagerade och kompetenta, vara strukturerade, ha ett lyhört förhållningssätt, med observans på samspel och förståelse för sociokulturella omständigheter.  Slutsats: BVC-sjuksköterskorna var mycket angelägna om att identifiera och nå mammorna. De försökte på flera olika sätt få dem att berätta vad som var problematiskt. De anpassade arbetssättet efter mammorna och var genuint intresserade av dem. Genom erfarenhet utvecklade BVC-sjuksköterskorna sin intuition och de var observanta på minsta tecken. BVC- sjuksköterskorna bedömde att screening-formuläret var ett bra verktyg, likaså var det en bra grund att samtala utifrån. BVC-sjuksköterskorna erfor att det är problematiskt att identifiera mammor med utländsk härkomst på grund av språksvårigheter.
APA, Harvard, Vancouver, ISO, and other styles
39

Fossum, Emma, and Anna-Bettina Holm. "Internkommunikation : Identifiera brus i informationsflödet." Thesis, Linnéuniversitetet, Institutionen för organisation och entreprenörskap (OE), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-74874.

Full text
Abstract:
Forskningsfråga: Hur kan informationsbrus identifieras i organisationer? Syfte: Avsikten med uppsatsen är att identifiera och få kunskap om varför brus uppstår i den interna formella informationskommunikationen. Syftet är även att identifiera vilka faktorer som kan störa informationsflödet och påverkar mottagarnas/medarbetarnas tolkning av information ifrån sändaren/ledningen. Metod: En kvalitativ fallstudie med en deduktiv forskningsansats. Slutsatser: För att identifiera brus krävs medvetenhet om vad som orsakar brus och att budskap kan tolkas olika. Undersökt organisation arbetar idag strategiskt med internkommunikation och nyligen implementerat internkommunikationsstrategier, vilket har gjort att vi har haft svårigheter med att identifiera brus i organisationen. Brus på Stena Recycling identifierades kunna uppstå i situationer där det blir överflöd av information, där medarbetare blir stressade och riskerar att missa relevant information. Vidare kan brus förekomma i organisationen genom missförstånd, viss ryktesspridning och att morgonmötenas korta tidsram vilket inte ger utrymme för djupa diskussioner. Missförstånd kan dessutom förekomma som brus i form av att inte uppfatta informationen som tydlig.
APA, Harvard, Vancouver, ISO, and other styles
40

Borgström, Josephine, and Emma Hult. "Jag har sepsis, identifiera den!" Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25263.

Full text
Abstract:
Sepsis är ett livshotande tillstånd som kan drabba patienter inom hela sjukvården där sjuksköterskans arbete är av stor betydelse. Dödligheten vid sepsis är oroväckande hög och är därmed ett viktigt område att uppmärksamma. Syftet med litteraturöversikten var att belysa hur sjuksköterskan med hjälp av omvårdnadsinsatser kan identifiera patienter med sepsis på en somatisk vårdavdelning. Metod: en litteraturöversikt med systematisk ansats har genomförts i databaserna PubMed och Cinahl. Resultatet baseras på tio kvantitativa artiklar där fyra teman uppkommit som innefattade sjuksköterskans kompetens, utbildning, samverkan och fysiologiska parametrar och instrument. Den slutsats som framkom var att det krävs hög kompetens hos sjuksköterskan, god samverkan och tillgängliga instrument för att tidig identifiering av patienter med sepsis ska kunna vara möjligt.
Sepsis is one of the most life-threatening conditions that can affect patients in the whole healthcare sector. Therefore it is important to early identify the symptoms, where the nurse's work is of great importance. The mortality rate for sepsis is alarmingly high and is an important area to touch. The aim of this literature review was to highlight how nurses with nursing care can identify patients with sepsis in a somatic ward. Method: a literature review with a systematic approach has been implemented in the databases PubMed and Cinahl. The results are based on ten quantitative articles that four themes emerged as including nursing skills, education, collaboration and physiological parameters and tools. The conclusion that emerged was that it required great competence of the nurse; good interaction and available instruments for early identification of patients with sepsis should be possible.
APA, Harvard, Vancouver, ISO, and other styles
41

Meo, Rajput Masood Salman. "Ensamhet hos äldre - hur identifieras och tillgodoses de sociala behoven? : En översikt hur biståndshandläggare i Västerbottens sju största kommuner identifierar och tillgodoser ensamma äldre personers behov av insatser." Thesis, Umeå universitet, Institutionen för socialt arbete, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-178160.

Full text
Abstract:
Huvudsyftet med studien är att undersöka hur biståndshandläggare i sju största kommuner i Västerbotten jobbar med att identifiera sociala behov till konsekvens av ensamhet hos äldre personer samt utforska på vilka sociala insatser de utvalda kommuner erbjuds för dessa individer och på vilka skäl. Studien har genomförts utifrån en kvantitativ ansats, där enkäten utformade på det sättet för att svara på syftet med studien. Lipskys teori om gräsrotsbyråkrater har använt i tolkningsramen för att analysen av empiriska material. Utifrån studiens resultat har det identifierats att det finns utvecklingsbehov inom sociala insatser för äldre personer i dessa kommuner för att de tillgängliga insatserna inte tillgodoses äldres behov på ett bra sätt. Studien visar även att det behövs även en arbetsrutin i biståndshandläggarnas arbetssätt för att utreda ensamhet hos äldre personer samt påpekar studien även att biståndshandläggare begränsas av organisatoriska riktlinjer eftersom kommunen standardutbud avgör vilka social insatser erbjuds till äldre personer. Som sagt att det finns begränsat med forskning kring detta ämne konstateras det nödvändighet av mer forskning på nationella nivå kring biståndshandläggarnas arbetssätt om hur de utreder ensamhet hos äldre personer.
APA, Harvard, Vancouver, ISO, and other styles
42

Franzén, Ann-Sofie. "Unga i risk att hamna i utanförskap : vikten av att bryta kedjan." Thesis, Linnéuniversitetet, Institutionen för utbildningsvetenskap (UV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-26359.

Full text
Abstract:
Skolan är en plats där barn och unga från samhällets alla hörn samlas, pedagogerna i skolan har i uppdrag att fostra dessa till demokratiska medborgare, och förmedla värdegrundens innehåll. Barn och unga som startar på ”minus”, på ett eller annat sätt, kan behöva vissa kompensationer för att skolan skall bli likvärdig. Skolans personal skall verka för att alla på skolan inkluderas och undervisningen skall anpassas till varje elevs förutsättningar och behov.Syftet med arbetet var att undersöka hur skolorna organiserar sig för att alla elever skall inkluderas i skolan och vilka metoder de använder för att identifiera barn och unga i riskzoner för utanförskap. Vidare vill jag veta vilka insatser som skolan sätter in när de upptäcker att barn eller unga, socialt eller kunskapsrelaterat, är i behov av dem.Arbetet har utförts med en kvalitativ metod, genom att skapa samtal under intervjutillfällena. Intervjuer har gjorts på tre skolor och med nio personer i skolans värld. I arbetet behandlas olika faktorer och perspektiv som kan ligga till grund för att ett utanförskap.Resultatet visar att det finns skillnader i hur begreppet inkludering uppfattas, dels mellan skolorna, och dels även inom skolorna. Det visar sig att ett visst samarbete existerar mellan aktörerna i förskoleklassen till trean, i en utav F-6 skolorna, men det förebyggande arbetet avstannar efter årskurs tre. Vidare tolkar inte skolan styrdokumenten gemensamt för att skapa ett enhetligt förhållningssätt, och göra värdegrundsuppdraget synligt i praktiken. Anledningen till detta är att skolledningen inte prioriterar sitt uppdrag som pedagogisk ledare, framför andra ansvarsområden som ledningen har.
APA, Harvard, Vancouver, ISO, and other styles
43

Hansson, Niklas, and Stefan Norrthon. "Att identifiera och förstå estetiska kunskapskvaliteter." Thesis, Stockholm University, Department of Education in Arts and Professions, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-8675.

Full text
Abstract:

Vår uppsats handlar om estetiska kunskapskvaliteter inom det estetiska programmet på gymnasiet. Syftet med undersökningen är att försöka definiera vilka estetiska kunskapskvaliteter betygs-kriterierna kännetecknar.

Vi redogör för delar av befintliga teorier om, diskurser kring och perspektiv på estetisk verksamhet i skolan. Där finner vi begreppen produktion och reception, vilka vi sedan använder i en närläsning av de estetiska ämnenas nationellt formulerade betygskriterier. I undersökningen kompletterar vi begreppen produktion och reception med att och hur, som motsvarar två tydliga kategorier inom de kriterier vi studerat. Vi har dels funnit att hur-kvaliteterna nästan uteslutande beskriver produktionskvaliteter, dels att kunskapskvaliteternas progression från G till MVG går från att eleven gör någonting, till hur eleven gör det. Vår slutsats är att ovanstående begrepp fungerade som ”objektiva” och ”utomkonstnärliga” kategorier att inordna de estetiska kunskapskvaliteter under. Men när det gäller att förstå innebörden av de högre/avancerade ’hurkvaliteterna’,som undervisningen strävar mot, så går det inte att förstå dem utifrån andra perspektiv än dem som konstvärlden erbjuder.

APA, Harvard, Vancouver, ISO, and other styles
44

Gyllensvärd, Erik. "Identifiera och reducera slöserimed lean thinking." Thesis, Blekinge Tekniska Högskola, Institutionen för maskinteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21684.

Full text
Abstract:
AGES är ett företag som pressgjuter produkter i aluminium med olika legeringar. De producerar främst till fordons- och verkstadsindustrin. De har i dagsläget låg total utrustningseffektivitet på två av sina maskiner och vill få reda på varför. De största tidsförlusterna är ställtiderna samt att operatörerna inte märker att maskinstopp har skett.    Målet med examensarbetet var att identifiera och reducera slöseri i produktionsprocessen hos AGES och skapa en grund för framtida arbete med SMED och Lean Production.     Genom olika mätningar kunde olika analyser utföras såsom värdeflödesanalys och OEE-analys. Analyserna resulterade i ett antal förbättringsförslag där vissa av dem planeras att implementeras. Vissa hamnade under utvärdering och vissa hamnade som framtida förbättringar. Studien har också bidragit till en ökad förståelse för varför maskinstopp sker och vilka åtgärder som bör vidtas. Ledningen på AGES är positiva till resultatet av studien och förbättringsförslagen. Inom SMED har det resulterat i en plan till hur verktygsbytet kan gå till för att minska ställtiderna samt hur mycket tid som kan besparas vid implementering.
AGES is a company that die-cast aluminum products with various alloys. They mainly produce for the automotive and engineering industries. Currently they have a low total equipment efficiency on two of their machines and they want to find out why. The biggest time losses are the set-up times and that the operators are not noticing when a machine stop has occurred.   The aim of the project was to identify and reduce waste in the production process at AGES and create a basis for future work with SMED and Lean Production.    Through different measurements, different analyzes could be performed such as value flow analysis and OEE-analysis. The analyzes resulted in several improvement proposals, some of which are planned to be implemented. Some will be evaluated and will be implemented as future improvements. The study has also led to an understanding of why machine stops occur and what measures should be taken.    The management at AGES is positive to the results of the study and the improvement proposals. Within SMED, it resulted in a plan for how the tool change can be done to reduce set-up times and how much time can be saved when implemented.
APA, Harvard, Vancouver, ISO, and other styles
45

Dervos, Dimitris A., Nikolaos Samaras, Georgios Evangelidis, Jaakko Hyvärinen, and Ypatios Asmanidis. "The Universal Author Identifier System (UAI_Sys)." TEI of Pireaeus, Greece, and the University of Paisley, UK, 2006. http://hdl.handle.net/10150/105755.

Full text
Abstract:
One common problem in the scientific research literature is that each one author cannot easily be identified uniquely. The problem arises when there are authors with identical names, authors who have changed their name(s) in the course of time, and authors whose names appear in alternative versions (for example: Jaakko Hyvärinen, and J. P. Hyvärinen) across the publications they have (co-) authored. The issue becomes more of a problem when data analysis utilizing author names is to be conducted, for example: in citation analysis. In this paper we introduce the Universal Author Identifier system, codenamed UAI_Sys. The system is web based and publicly available, enabling each one author to register/update his/her own metadata, plus acquire a unique identifier (UAI code), ensuring name disambiguation. As soon as UAI_Sys becomes accepted and enjoys worldwide use, selected author metadata will become globally available to all interested parties. Care is taken so that UAI_Sys comprises more than just a database for storing and handling author identifiers. Provision is taken for the system to incorporate web services facilitating communication with third party applications, thus expanding the possibilities for web based co-functionality. Last but not least, the system supports role-based access and management (i.e. different user roles for authors, librarians, publishers, and administrators) for efficient and effective information dissemination and management, promoting research and collaboration. UAI_Sys is being designed/developed along the lines of the Cascading Citations Analysis Project (C-CAP) which is co-funded by the Alexander Technology Educational Institute (ATEI), and the University of Macedonia (UoM).
APA, Harvard, Vancouver, ISO, and other styles
46

Wismén, Snezhana. "Ambulanspersonalens förmåga att identifiera patienter med bacteriaemi eller sepsis med fokus på överlevnad de första 30 dagarna : En kvantitativ studie." Thesis, Högskolan i Borås, Akademin för vård, arbetsliv och välfärd, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-14714.

Full text
Abstract:
Bakgrund: Bacteriaemi eller sepsis är ett vanligt förekommande tillstånd som kännetecknas av ett snabbt och diffust insjuknande inom akuta verksamheter. Tillståndet kräver en snabb handläggning, vilket innebär tidig identifiering med en snabb insättning av behandling för att undvika det livshotande tillståndet som kan leda till en dödlig utgång. Detta kräver att vårdpersonalen tidigt ska kunna kartlägga och behandla patienter där det föreligger allvarliga infektioner som sepsis. Syftet: med studien är att belysa den kliniska presentationen hos patienter med svåra infektioner som här definieras som att patienten antingen fick slutdiagnosen sepsis eller uppvisade en positiv blododling i prehospital miljö i relation till utfall. Dessutom belyses ambulanspersonalens förmåga att upptäcka tillståndet redan prehospitalt i relation till utfall. Metod: En retroperspektiv registergranskning med en kvantitativ ansats. Utfall definieras som död inom de första 30 dagarna. Resultat: Totalt deltog 854 patienter i studien. Bland dem dog 20% under de första 30 dagarna. Insjuknandet föreföll ofta att vara ospecifikt. Av de patienter som dog inom 30 dagar var luftvägarna den vanligaste organpåverkan och bland dem som överlevde 30 dagar var infektion i urinvägar den vanligaste orsaken. Det förelåg ingen könsskillnad med avseende på prognos. Tid från larm till start av antibiotikabehandling var kortare bland dem som dog   De som dog var i genomsnitt äldre.  De patienter som dog hade också en lägre grad av vakenhet, ett lägre blodtryck, en lägre syresättning, och en lägre kroppstemperatur samt högre andningsfrekvens jämfört med de som överlevde.  Bara i ca 15% av fallen noterade ambulanspersonalen en misstanke om sepsis och en sådan misstanke var lika ovanligt i båda grupperna. Diskussion: Bland patienter med slutdiagnosen sepsis eller bakterieami så är risken att dö under de första 30 dagarna hög. Det föreligger redan i den prehospitala miljön påtagliga skillnader mellan de patienter som kommer att överleva och de som kommer att dö med avseende på patientkaraktäristik, etiologi och vitalparametrar. Denna kunskap kanske i framtiden skulle kunna utnyttjas på ett mera systematiskt sätt eventuellt med hjälp av ett datorstöd. Men andelen fall där ambulanspersonalen misstänker sepsis är alltjämt för låg. En ökad utbildning och förbättrade beslutsstöd kan möjligen förbättra denna siffra.
APA, Harvard, Vancouver, ISO, and other styles
47

Karlsson, Birgitta, and Svantesson Marie Ågestedt. "Skolsköterskans möjlighet att identifiera barnmisshandel : en litteraturgranskning." Thesis, Högskolan i Skövde, Institutionen för vård och natur, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4421.

Full text
Abstract:
Barnmisshandel kan förekomma i alla samhällsklasser, trots att det enligt lag är förbjudet att slå sitt barn. Barnmisshandel brukar delas in i fysisk-, psykisk- och sexuell misshandel. För att kunna identifiera barnmisshandel måste skolsköterskan ha kunskap inom området, vilket saknas idag. Syftet med studien är att beskriva skolsköterskors kunskap och roll i att identifiera barnmisshandel. Studien utfördes som en litteraturgranskning och belyser flera tecken som skolsköterskan bör observera vid misstänkt barnmisshandel. Att det råder kunskapsbrist inom området, både då det gäller att upptäcka, identifiera och rapportera barnmisshandel framkom tydligt i studien. Skolsköterskan är i en bra position för att upptäcka barnmisshandel och hjälpa utsatta barn. Genom hälsosamtalet kan skolsköterskan uppmärksamma barn som kan vara utsatta för våld; begreppet KASAM är angeläget att ha med sig i det hälsofrämjande arbetet. I samtalet med barnet är det viktigt med en bra samtalsmetod. För att i ett tidigt skede uppmärksamma barn som utsätts för misshandel behövs tydliga riktlinjer och rutiner, kontinuerlig och fortlöpande utbildning inom området för att överbrygga den kunskapsbrist som finns.
Child abuse can occur in all social classes, even if it´s forbidden to hit the child according to the law. Child abuse usually divides in physical-, psychic- and sexual abuse. To identify maltreatment the school nurse needs knowledge about this field, which is missing today. The aim of the study is to describe school nurses knowledge and function to identify child abuse. The study is a literature review and it illuminates several signs that a school nurse should observe at suspected child abuse. It counsels lack of knowledge about maltreatment, both to describe, identify and report child abuse. The school nurse is in a good position to recognize child abuse and to help exposed children. Through the health conversation the school nurse can observe children that can be exposed to violence; the concept SOC is important in the health promotion. In the conversation with the child it´s important to have good method of conversation. To early observe children that have been exposed for maltreatment it´s a need of clear guidelines and routines, continuous education inside the subject child abuse in able to over bridge the lack of knowledge.
APA, Harvard, Vancouver, ISO, and other styles
48

Callenberg, Robin. "Joharifönster och spel : att identifiera en målgrupp." Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1904.

Full text
Abstract:
This is the report on a study made to find a correlation between the Johari window and the games that the possessor of given Johari window enjoys to play. A Johari window is a graph that shows an individual’s ability to receive and give feedback. One obvious correlation was found between individuals enjoying role playing games and their possessing Johari windows showing a good ability to give feedback. The reasoning behind this is that the ability to give feedback is based on the capability to express oneself to the external environment, and that one would need to be comfortable with expressing oneself to an external environment in order to enjoy interacting with the narrative that takes place within the role playing genre.
APA, Harvard, Vancouver, ISO, and other styles
49

Ahmed, Tekosher. "Att identifiera signaler för obestånd i tid." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-5477.

Full text
Abstract:

To be able to protect themselves from credit risk, the banks must constantly check the performance of  the companies they have lent money to. There are many mathematical models for predicting financial distress. These models use accounting-based ratios, which often are historical and not representative for the present situation. This study describes how the banks do in practice to find signals of insolvency in time and the variables they are observing for doing that.

In addition to financial reports which the company sends in to the bank at least once a year, also the relationship between them and information from different information  agencies are of great importance to track  signals of insolvency. Poor profitability is the primary cause of insolvency. It is caused mainly because of bad business and leadership.  Eventually will  poor profitability lead  to consuming of equity capital and place the company in an illiquid situation. Then it may be difficult for the company to pay their bills and signals of insolvency become obvious and  the  banks start then to sharpen  their attention on the companies and intensify the follow-up works.

Another find-out  of the  study  is  that local factors which  are  contributing to failure are  the  large companies that are active  in the area. When they are in a bad situation, it affects the suppliers. The big difference between service and manufacturing companies  regarding insolvency  is  that service companies are more flexible regarding cutting down costs when bad times come.


För att undvika stora kreditförluster måste bankerna ständigt bevaka de företag som de har lånat pengar till och försöka förutse signaler om obestånd för dem. Det finns många matematiska modeller för  att förutse  konkursrisken. Problemet är dock att dessa modeller använder redovisningsbaserade data vilka oftast utgör  en historisk ögonblicksbild av den finansiella ställningen då de skrivs ner  och inte är representativa for den nuvarande situationen. Denna studie redogör för hur bankerna i praktiken gör för att identifiera  signaler om obestånd i tid och vilka variabler de tittar på för att göra det.

Förutom finansiella rapporter som företaget sänder in till banken minst en gång om året, har även relationen  parterna  emellan  och  information  från  olika upplysningsbyråer stor betydelse för att spåra signaler  om obestånd  i förväg. Dålig lönsamhet är den främsta orsaken till obestånd. Den  orsakas  främst av dåligt företagande och dålig ledarskap. Så småningom kommer dålig lönsamhet att  leda  till  att det egna kapitalet förbrukas och företaget hamnar i en illikvid situation. Då  kommer  företaget  få det  svårt att  betala  sina räkningar  och signalerna  för obestånd  börjar  dyka upp. Banken börjar då  skärpa uppmärksamheten och intensifiera uppföljningsarbetet.

Det kom också fram i undersökningen  att lokala faktorer som bidrar till obestånd är stora företag som är verksamma i området. När det börjar gå dåligt för dem påverkar det underleverantörer och inhyrda konsulter.  Den stora skillnaden mellan tjänste-  och tillverkningsföretag, vad gäller obeståndsrisken, ligger i att tjänsteföretag är mer flexibla angående nedskärning av kostnaderna när dåliga tider kommer.

APA, Harvard, Vancouver, ISO, and other styles
50

Paananen, Jonna. "Hästens smärtansikte : Identifiera smärta i hästens ansiktsuttryck." Thesis, Linnéuniversitetet, Institutionen för biologi och miljö (BOM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96810.

Full text
Abstract:
Att kunna upptäcka smärta hos hästen är viktigt ur välfärdssynpunkt. Hästen är ett bytesdjur som döljer sin smärta från predatorer för att öka chanserna för överlevnad. Hästen kan dölja sin smärta länge utan att det upptäcks och kan då leda till onödigt lidande för hästen. Smärtbedömning kan vara svårt, smärta är komplext och påverkas av flera olika faktorer. Sedan länge finns det metoder för att mäta smärta hos häst genom bland annat palpation och beteende observationer, dessa metoder kräver dock tid, träning och erfarenhet. Ett relativt nytt forskningsområde är att bedöma smärta i hästens ansiktsuttryck. Detta har gjorts med framgång med en del olika metoder bland annat Horse Grimace Scale (HGS) samt An Equine Pain Face. Metoden HGS innebär betygsättning av fördefinierade områden i hästens ansiktsuttryck. Denna metod kan indikera smärta samt smärtans intensitet. HGS har applicerats på olika smärtsamma situationer. Studier inom HGS indikerar att HGS är en användbar, pålitlig och enkel metod att utvärdera smärta som endast kräver minimal träning för att lära sig. An Equine Pain Face har studerat hästens smärtansikte i detalj, beskrivningen av smärtansiktet kan vara ett användbart verktyg för att förbättra verktyg för smärtigenkänning hos hästar med mild till måttlig smärta. Syftet med studien var att undersöka hur hästens smärtansikte ser ut, hur används metoderna för utvärdering av smärta i ansiktsuttrycket och hur pålitliga är metoderna?
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography