Tesi sul tema "Safety protocol"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Safety protocol.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Safety protocol".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.

1

Bennett, Jill M. "Assessing school preparedness an evaluation of a safety assessment protocol /". Menomonie, WI : University of Wisconsin--Stout, 2007. http://www.uwstout.edu/lib/thesis/2007/2007bennettj.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Nelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol". Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Meireles, Tiago Hipkin. "Wireless protocols to support vehicular safety applications". Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/16287.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Doutoramento em Engenharia Electrotécnica
In the last decades the number of vehicles travelling in European road has raised significantly. Unfortunately, this brought a very high number of road accidents and consequently various injuries and fatalities. Even after the introduction of passive safety systems, such as seat belts, airbags, and some active safety systems, such as electronic brake system (ABS) and electronic stabilization (ESP), the number of accidents is still too high. Approximately eight per cent of the fatal accidents occur in motorways, in the Portuguese case, the number of fatalities has remained constant in the first decade of the 21st century. The evolution of wireless communications, along with the north-American and European policies that reserve spectrum near the 5,9GHz band for safety applications in the vehicular environment, has lead to the development of several standards. Many of these applications are based on the possibility of using a wireless communication system to warn drivers and passengers of events occurring on the road that can put at risk their own safety. Some examples of safety applications are the hard-brake warning, the wrong-way warning and the accident warning. This work aims to contribute in defining a communication protocol that guarantees the timely dissemination of safety critical events, occurring in scenarios with a high number of vehicles or in the neighbourhood of so called motorway “blackspots”, to all vehicles in the zone of interest. To ensure information integrity and user trust, the proposed system is based on the motorway infrastructure, which will validate all events reported by the vehicles with the usage of several means, such as video surveillance or other sensors. The usage of motorway infrastructure that has full motorway coverage using fixed stations also known as road side units, allows to have a global vision of the interest zone, avoiding the problems associated to networks that depend solely on vehicle to vehicle communication, generally total ad-hoc networks. By using the infrastructure, it is possible to control medium access, avoiding possible badly intended intrusions and also avoiding the phenomenon known as alarm showers or broadcast storm that occur when all vehicles want to simultaneously access the medium to warn others of a safety event. The thesis presented in this document is that it is possible to guarantee in time information about safety events, using an architecture where the road side units are coordinated among themselves, and communicate with on board units (in vehicles) that dynamically register and deregister from the system. An exhaustive and systematic state of the art of safety applications and related research projects is done, followed by a study on the available wireless communications standards that are able to support them. The set of standards IEEE802.11p and ETSI-G5 was created for this purpose and is found to be the more adequate, but care is taken to define a scenario where WAVE enabled and non-enabled vehicles can coexist. The WAVE medium access control protocol suffers from collision problems that do not guarantee a bounded delay, therefore a new protocol (V-FTT) is proposed, based on the adaptation of the Flexible Time Triggered protocol to the vehicular field. A theoretical analysis of the V-FTT applied to WAVE and ETSI-G5 is done, including quantifying a real scenario based on the A5 motorway from Lisbon to Cascais, one of the busiest Portuguese motorways. We conclude the V-FTT protocol is feasible and guarantees a bounded delay.
Nas últimas décadas tem-se assistido a um aumento do número de veículos a circular nas vias rodoviárias europeias, trazendo consigo um elevado número de acidentes e como consequência muitos feridos e vítimas mortais. Apesar da introdução de sistemas de segurança passivos, tais como cintos de segurança, airbags e de alguns sistemas de segurança activos, tais como o sistema electrónico de travagem (ABS) e o sistema electrónico de estabilidade (ESP), o número de acidentes continua a ser demasiado elevado. Aproximadamente oito por cento dos acidentes fatais na Europa ocorrem em auto-estradas, no caso Português, o número de vítimas mortais tem-se mantido constante ao longo da primeira década do século XXI. A evolução das comunicações sem fios, acompanhada de políticas europeias e norte-americanas no sentido de reservar frequências próximas dos 5,9GHz para aplicações de segurança no ambiente veicular, levou à especificação de várias normas. A maior parte destas aplicações baseiam-se na possibilidade de usar um sistema confiável de comunicação sem fios para alertar os condutores e passageiros de veículos para eventos ocorridos nas estradas que possam colocar em risco a sua segurança. Exemplos de aplicações de segurança crítica são o aviso de travagem brusca, o aviso de veículo em contra mão e o aviso de acidente na estrada. Este trabalho contribui para a definição de protocolos de comunicação capazes de garantir que a informação sobre eventos relacionados com situações de segurança crítica, que ocorram em cenários com um elevado número de veículos em zonas urbanas ou na vizinhança dos chamados “pontos negros” das auto-estradas, é disseminada com pontualidade por todos os veículos localizados na zona de interesse Por uma questão da integridade das comunicações e confiança dos condutores, o sistema proposto baseia-se na infra-estrutura do concessionário da auto-estrada, que validará os eventos reportados pelos veículos usando vários meios à sua disposição, como por exemplo sistemas de videovigilância e outros sensores. O uso de uma infra-estrutura de comunicações, que dispõe de cobertura integral a partir de estações fixas, permite uma visão global da zona coberta, evitando os problemas associados a redes baseadas apenas na comunicação entre veículos, que são em geral totalmente ad-hoc. O uso da infra-estrutura permite, entre outras vantagens, controlar o acesso ao meio, evitando simultaneamente intrusões de estranhos ao sistema e o fenómeno conhecido como “chuva de alarmes” desencadeado quando todos os veículos querem aceder simultaneamente ao meio para avisar os restantes da existência dum evento de segurança crítica. A tese apresentada neste documento defende que é possível garantir informação atempada sobre eventos que põem em risco a segurança dos veículos a partir de uma arquitectura de interligação entre as estações de comunicações fixas, coordenadas entre si, e unidades móveis (veículos) que se registam e se desligam dinamicamente do sistema. Nesta tese faz-se um levantamento exaustivo e sistemático das aplicações de segurança abordando projectos de investigação relacionados, estudam-se as tecnologias de comunicação sem fios disponíveis e a sua possibilidade de suportar aplicações de segurança rodoviária. Desta análise, conclui-se que a norma norte americana WAVE/IEEE802.11p e a europeia ETSI-G5, criadas especificamente para o efeito são as que mais se adequam à finalidade desejada. Considera-se que o cenário de utilização é evolutivo, podendo coexistirem veículos que não dispõem de sistemas de comunicação com outros que suportam a norma WAVE. Dado que o protocolo de acesso ao meio proposto pela norma WAVE não garante um acesso determinístico ao meio partilhado, propõe-se um novo protocolo, o Vehicular Flexible Time-Triggered protocol (VFTT). Faz-se a análise teórica da viabilidade do protocolo proposto para a norma WAVE e respectiva norma europeia (ETSI-G5). Quantifica-se o protocolo VFTT para um cenário real: a auto-estrada A5 Lisboa-Cascais, uma das autoestradas portuguesas mais movimentadas. Conclui-se que o protocolo é viável e garante um atraso restringido temporalmente.
4

Xie, Hong. "A Protocol Stack in TinyTimber for PIEs that Cooperate for Traffic Safety". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17541.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
There is an increasing demand for reliable wireless communication in embedded real time systems.  Various communication requirements make the development and deployment of applications that rely on the existence of a protocol stack a challenging research and industrial field of activity. Suitable protocol stacks need to be designed and implemented on new hardware platforms and software structures. Applications that exchange packets over a wireless medium have to deal with time constraints, error checks and have to be aware of energy consumption.   PIE (Platform for Intelligent Embedded Systems) is an experimental platform developed at Halmstad University for educational purposes.  It is a robotic vehicle with wireless communication capabilities that can be used to experiment with traffic scenarios where the vehicles communicate in order to cooperate, for example to avoid hazards or to build platoons.   This thesis addresses the design and implementation of a protocol stack suitable for the PIE platform in the area of vehicle alert systems. Requirements include low latencies along with low packet loss ratios.  The thesis addresses also experimenting with reactive objects for programming network software.
5

Foster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development". Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Lorenzen, Torsten [Verfasser]. "Design of an adaptive congestion control protocol for reliable vehicle safety communication / Torsten Lorenzen". Hannover : Technische Informationsbibliothek (TIB), 2018. http://d-nb.info/1166077322/34.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Alsubaihi, Badr. "Semantic and Self-Decision Geocast Protocol for Data Dissemination over Vehicle Ad Hoc Network". Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31783.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In this work, we provide a qualitative comparison between existing geocast protocols and then we present an efficient geocast routing protocol for VANET. This protocol is a semantic and self-decision geocast routing protocol for disseminating safety and non-safety information over VANET (SAS-GP). SAS-PG initially executes an algorithm to locally determine the semantic geocast area. Then, the protocol disseminates the information in three phases: Spread, Preserve, and Assurance, which utilize the traffic information system and the digital map. SAS-GP principally employs timer-based techniques in order to avoid overhead and broadcast storm problems; nonetheless, novel factors are enhanced to calculate the timer’s values in each phase. Simulation results demonstrate effective and reliable dissemination in terms of delivery ratio and number of false warnings compared to existing protocols when evaluated in high scale and realistic scenarios. Also, SAS-GP performs faster in notifying vehicles resulting in a higher geocast distance before approaching the location of the event.
8

Rasoamanana, Aina Toky. "Derivation and Analysis of Cryptographic Protocol Implementation". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
TLS et SSH sont deux protocoles de sécurité très répandu et étudiés par la communauté de la recherche. Dans cette thèse, nous nous concentrons sur une classe spécifique de vulnérabilités affectant les implémentations TLS et SSH, tels que les problèmes de machine à états. Ces vulnérabilités sont dues par des différences d'interprétation de la norme et correspondent à des écarts par rapport aux spécifications, par exemple l'acceptation de messages non valides ou l'acceptation de messages valides hors séquence.Nous développons une méthodologie généralisée et systématique pour déduire les machines d'état des protocoles tels que TLS et SSH à partir de stimuli et d'observations, et pour étudier leur évolution au fil des révisions. Nous utilisons l'algorithme L* pour calculer les machines d'état correspondant à différents scénarios d'exécution.Nous reproduisons plusieurs vulnérabilités connues (déni de service, contournement d'authentification) et en découvrons de nouvelles. Nous montrons également que l'inférence des machines à états est suffisamment efficace et pratique dans de nombreux cas pour être intégrée dans un pipeline d'intégration continue, afin d'aider à trouver de nouvelles vulnérabilités ou déviations introduites au cours du développement.Grâce à notre approche systématique en boîte noire, nous étudions plus de 600 versions différentes d'implémentations de serveurs et de clients dans divers scénarios (versions de protocoles, options). En utilisant les machines d'état résultantes, nous proposons un algorithme robuste pour identifier les piles TLS et SSH. Il s'agit de la première application de cette approche sur un périmètre aussi large, en termes de nombre de piles TLS et SSH, de révisions ou de scénarios étudiés
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus on a specific class of vulnerabilities affecting both protocols implementations, state machine errors. These vulnerabilities are caused by differences in interpreting the standard and correspond to deviations from the specifications, e.g. accepting invalid messages, or accepting valid messages out of sequence.We develop a generalized and systematic methodology to infer the protocol state machines such as the major TLS and SSH stacks from stimuli and observations, and to study their evolution across revisions. We use the L* algorithm to compute state machines corresponding to different execution scenarios.We reproduce several known vulnerabilities (denial of service, authentication bypasses), and uncover new ones. We also show that state machine inference is efficient and practical enough in many cases for integration within a continuous integration pipeline, to help find new vulnerabilities or deviations introduced during development.With our systematic black-box approach, we study over 600 different versions of server and client implementations in various scenarios (protocol versions, options). Using the resulting state machines, we propose a robust algorithm to fingerprint TLS and SSH stacks. To the best of our knowledge, this is the first application of this approach on such a broad perimeter, in terms of number of TLS and SSH stacks, revisions, or execution scenarios studied
9

Sjödin, Andreas, e Marcus Gruneau. "The ADS-B protocol and its'weaknesses : Exploring potential attack vectors". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
ADS-B är ett protokoll som används över hela världen för att piloter och flygledning ska få en bättre bild över trafiksituationen i luften.Tidigare studier har uppmärksammat att säkerheten kring protokollet är bristfällig eftersom det saknas kryptering. Det huvudsakliga sårbarheten som finns i protokollet beror på att autentisering saknas. Protokollet är alltså byggt på ett blint förtroende mellan sändare och mottagare.Vårt arbete är inspirerat av tidigare forskning som gjorts inom området som bland annat visar att det går att skapa s.k. “spökflygplan” genom att sända falsk data över protokollet. Syftet bakom denna rapport var att utföra ett penetrationstest på en populär ADS-B produkt riktad mot piloter. Våra tester bygger på OSSTMM3, en vetenskaplig metod för att testa säkerhet.Våra tester visar att mottagaren som testade, inte helt oväntat, följer protokollet utan att validera data. Vi lyckades precis som tidigare forskare injicera statiska spökflygplan men också manipulera rörelsen av ett spökflygplan på ett sätt som strider mot fysikens rörelselagar. Våra tester visar att tjänsten som levereras av mottagaren kan störas ut genom att utföra liknande attacker.
The ADS-B protocol is currently in use all around the world. The purpose behind the protocol is to give pilots and traffic control a better picture of the situation in the air. Previous research shows that there exists a vulnerability in the protocol since it lacks authentication. The protocol is solely built upon trust between sender and receiver.Our work is inspired by previous studies made in the area, where it has been demonstrated that one can inject fake aircraft by sending fake ADS-B data using the protocol. The purpose behind this report was to perform a penetration test according to the OSSTMM3, a manual on how to perform scientific penetration tests.We wanted to test a real product (ADS-B receiver) made for pilots and measure if we could manipulate the environment presented to the pilot.Our testing shows that the receiver blindly trusts the protocol without any data validation. We managed to inject fake static aircraft just like previous researchers have done, but also move them around in the environment in a way that breaks the laws of physics and flood the device with fake data, effectively denying the service provided.Since we managed to deny the service, which is to give the user a correct picture of the nearby air traffic, we feel like our tests were successful.
10

Umeno, Shinya. "Proving safety properties of an aircraft landing protocol using timed and untimed I/O automata : a case study". Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38920.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.
Page 222 blank.
Includes bibliographical references (p. 195-196).
This thesis presents an assertional-style verification of the aircraft landing protocol of NASA's SATS (Small Aircraft Transportation System) concept of operation using the timed and untimed I/O automata frameworks. We construct two mathematical models of the landing protocol using the above stated frameworks. First, we study a discrete model of the protocol, in which the airspace of the airport and every movement of the aircraft are all discretized. The model is constructed by reconstructing a mathematical model presented in using the untimed I/O automata framework. Using this model, we verify the safe separation of aircraft in terms of the bounds on the numbers of aircraft in specific discretized areas. In addition, we translate this I/O automaton model into a corresponding PVS specification, and conduct a machine verification of the proof using the PVS theorem prover. Second, we construct a continuous model of the protocol by extending the discrete model using the timed I/O automata framework. A refinement technique has been developed to reason about the external behavior between two systems. We present a new refinement proof technique, a weak refinement using a step invariant.
(cont.) Using this new refinement, we carry over the verification results for the discrete model to the new model, and thus guarantee that the safe separation of aircraft verified for the discrete model also holds for the new model. We also prove properties specific to the new model, such as a lower bound on the spacing of aircraft in a specific area of the airport, using an invariant-proof technique.
by Shinya Umeno.
S.M.
11

Win, Htoo Aung. "BSM Message and Video Streaming Quality Comparative Analysis Using Wave Short Message Protocol (WSMP)". Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538706/.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Vehicular ad-hoc networks (VANETs) are used for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. The IEEE 802.11p/WAVE (Wireless Access in Vehicular Environment) and with WAVE Short Messaging Protocol (WSMP) has been proposed as the standard protocol for designing applications for VANETs. This communication protocol must be thoroughly tested before reliable and efficient applications can be built using its protocols. In this paper, we perform on-road experiments in a variety of scenarios to evaluate the performance of the standard. We use commercial VANET devices with 802.11p/WAVE compliant chipsets for both BSM (basic safety messages) as well as video streaming applications using WSMP as a communication protocol. We show that while the standard performs well for BSM application in lightly loaded conditions, the performance becomes inferior when traffic and other performance metric increases. Furthermore, we also show that the standard is not suitable for video streaming due to the bursty nature of traffic and the bandwidth throttling, which is a major shortcoming for V2X applications.
12

Ansari, Mohammed Toseef. "Possible fibrino(geno)lytic activity in an earthworm extract: development of a trial protocol to identifyinitial efficacy and safety, and further clinical development". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B3197000X.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Collinson, Wendy Jane. "A standardised protocol for roadkill detection and the determinants of roadkill in the greater Mapungubwe Transfrontier Conservation Area, Limpopo Province, South Africa". Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002056.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Despite evidence suggesting that road traffic is a major threat to biodiversity loss, very little is known about its actual impact on wildlife populations in South Africa. Globally, road density and traffic volumes are increasing, and although huge budgets are devoted to the construction and upgrading of roads, there is little or no allocation to mitigation measures for protecting fauna in most countries, particularly Africa. Further, no global standardised protocol exists for the rapid assessment of roadkill or the most economical and efficient approach for assessing roadkill rates. Using vehicle field trials, the reliability of detecting artificially deployed roadkill was assessed. Roadkill detection rates decreased significantly at speeds >50 km/h and were also significantly influenced by light conditions (i.e. detection success was greater when the sun was high) and the position of the roadkill on the road (i.e. smaller roadkill on verges were often missed). These results suggest that roadkill sampling was most effective between 1.5 hours after dawn and 1.5 hours before dusk and that driving at slower speeds (<50 km.h⁻ₑ) was required to detect roadkill. This protocol was implemented across three ecological seasons on a 100 km paved road and a 20 km unpaved road in the Greater Mapungubwe Transfrontier Conservation Area, Limpopo Province, South Africa. Driven daily over a 120-day period (three periods consisting each of 40 days), a total of 1,027 roadkill were recorded. These comprised 162 species from all terrestrial vertebrate groups with birds being the most commonly encountered roadkill (50% of all incidents). The high numbers of vertebrates identified as roadkill suggests that road traffic could have potentially unsustainable impacts on wildlife populations and hence the biodiversity of the area. Seventeen variables were identified as possible determinants of roadkill occurrence with season, rainfall, minimum and maximum temperature, habitat type, grass height, grass density, fence type and vehicle type significantly influencing roadkill numbers. Significantly more roadkill were detected on the paved road (9.91/100km) than on the unpaved road (1.8/100km) probably because of greater traffic volumes and the increased speed that vehicles travelled on the paved road. Warmer temperatures and increased rainfall in the preceding 24 hours also increased road mortality numbers as animals tended to become more active during these times. Interestingly, more roadkill was detected in open roadside habitats compared to dense roadside habitats on both the paved and unpaved roads and when grass on the roadside verge was of intermediate height. Open habitat possibly may provide a natural corridor for wildlife which ultimately end up on the road. Roadkill numbers increased when certain other physical barriers, such as cattle fences, were present, probably because these barriers were more penetrable than electric fencing. A series of mitigation measures are proposed to reduce the impacts of roads on wildlife in South Africa. These mitigation measures highlight the need to address the balance between the development of a country’s transport infrastructure and the conservation of its fauna. It is important that research on the impacts of roads becomes standardised to enable robust statistical comparisons which will provide a greater understanding of the potential threats to vertebrate biodiversity
14

Ansari, Mohammed Toseef. "Possible fibrino(geno)lytic activity in an earthworm extract development of a trial protocol to identify initial efficacy and safety, and further clinical development /". Click to view the E-thesis via HKUTO, 2001. http://sunzi.lib.hku.hk/hkuto/record/B3197000X.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Sebastian, Alvin. "Efficient safety message dissemination for cooperative collision warning via context modelling". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/50793/1/Alvin_Sebastian_Thesis.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
A Cooperative Collision Warning System (CCWS) is an active safety techno- logy for road vehicles that can potentially reduce traffic accidents. It provides a driver with situational awareness and early warnings of any possible colli- sions through an on-board unit. CCWS is still under active research, and one of the important technical problems is safety message dissemination. Safety messages are disseminated in a high-speed mobile environment using wireless communication technology such as Dedicated Short Range Communication (DSRC). The wireless communication in CCWS has a limited bandwidth and can become unreliable when used inefficiently, particularly given the dynamic nature of road traffic conditions. Unreliable communication may significantly reduce the performance of CCWS in preventing collisions. There are two types of safety messages: Routine Safety Messages (RSMs) and Event Safety Messages (ESMs). An RSM contains the up-to-date state of a vehicle, and it must be disseminated repeatedly to its neighbouring vehicles. An ESM is a warning message that must be sent to all the endangered vehi- cles. Existing RSM and ESM dissemination schemes are inefficient, unscalable, and unable to give priority to vehicles in the most danger. Thus, this study investigates more efficient and scalable RSM and ESM dissemination schemes that can make use of the context information generated from a particular traffic scenario. Therefore, this study tackles three technical research prob- lems, vehicular traffic scenario modelling and context information generation, context-aware RSM dissemination, and context-aware ESM dissemination. The most relevant context information in CCWS is the information about possible collisions among vehicles given a current vehicular traffic situation. To generate the context information, this study investigates techniques to model interactions among multiple vehicles based on their up-to-date motion state obtained via RSM. To date, there is no existing model that can represent interactions among multiple vehicles in a speciffic region and at a particular time. The major outcome from the first problem is a new interaction graph model that can be used to easily identify the endangered vehicles and their danger severity. By identifying the endangered vehicles, RSM and ESM dis- semination can be optimised while improving safety at the same time. The new model enables the development of context-aware RSM and ESM dissemination schemes. To disseminate RSM efficiently, this study investigates a context-aware dis- semination scheme that can optimise the RSM dissemination rate to improve safety in various vehicle densities. The major outcome from the second problem is a context-aware RSM dissemination protocol. The context-aware protocol can adaptively adjust the dissemination rate based on an estimated channel load and danger severity of vehicle interactions given by the interaction graph model. Unlike existing RSM dissemination schemes, the proposed adaptive scheme can reduce channel congestion and improve safety by prioritising ve- hicles that are most likely to crash with other vehicles. The proposed RSM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed RSM protocol outperforms existing pro- tocols in terms of efficiency, scalability and safety. To disseminate ESM efficiently, this study investigates a context-aware ESM dissemination scheme that can reduce unnecessary transmissions and deliver ESMs to endangered vehicles as fast as possible. The major outcome from the third problem is a context-aware ESM dissemination protocol that uses a multicast routing strategy. Existing ESM protocols use broadcast rout- ing, which is not efficient because ESMs may be sent to a large number of ve- hicles in the area. Using multicast routing improves efficiency because ESMs are sent only to the endangered vehicles. The endangered vehicles can be identified using the interaction graph model. The proposed ESM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed ESM protocol can prevent potential accidents from occurring better than existing ESM protocols. The context model and the RSM and ESM dissemination protocols can be implemented in any CCWS development to improve the communication and safety performance of CCWS. In effect, the outcomes contribute to the realisation of CCWS that will ultimately improve road safety and save lives.
16

Bridi, Marcelle Engler. "Protocolo de avaliação das práticas de gestão da segurança e saúde no trabalho no setor da construção civil". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/79847.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Nas últimas décadas, diversos estudos acadêmicos investigaram práticas de gestão da Segurança e Saúde no Trabalho (SST) de forma a identificar fatores que contribuem para o sucesso de programas de prevenção de acidentes no setor da construção civil. A maior parte desses estudos foi baseada na realização de surveys e objetivaram identificar correlações entre as taxas de acidentes de cada empresa e a existência ou não de práticas, permitindo apontar os conjuntos de práticas que têm maior impacto na SST. Em que pesem as contribuições destes estudos, principalmente no que diz respeito à identificação e disseminação de práticas associadas à prevenção de acidentes, quatro principais críticas podem ser feitas: (a) não há um conceito definido de o que são boas práticas e critérios para categorizá-las; (b) escopo limitado a grandes empresas de países desenvolvidos; (c) a falta de um referencial teórico adequado; e (d) a abordagem metodológica adotada, cujo enfoque é descritivo. O objetivo principal desta pesquisa é propor um protocolo para caracterização e avaliação do grau de implementação de práticas de gestão da SST, através da utilização de múltiplas fontes de evidência, visando a obter uma compreensão mais detalhada destas práticas, que levem em consideração o contexto de aplicação. Em relação ao método, foi adotada a abordagem da pesquisa construtiva, escolhida por se tratar do desenvolvimento de um protocolo para a solução de um problema com relevância prática e teórica. Inicialmente, foi realizada uma revisão da literatura acerca das práticas de gestão da SST e do referencial teórico da Engenharia de Resiliência (ER). O protocolo foi proposto com base na revisão da literatura e também em uma survey realizada com uma amostra de empresas de construção. A ferramenta foi desenvolvida, aprimorada e testada em 5 estudos de caso em canteiros de obras, realizados de forma sequencial. Além disso, a mesma foi aplicada em 3 obras na Espanha, com o objetivo de avaliar a sua aplicabilidade em outro contexto. Os resultados deste conjunto de obras foram processados e analisados, de forma a exemplificar os dados produzidos. Por fim, com base na avaliação do protocolo desenvolvido, foram propostas diretrizes para a sua implantação. As principais contribuições da pesquisa são referentes ao protocolo de avaliação desenvolvido, que possui um enfoque prescritivo. Por um lado, este possibilita a coleta sistemática de dados sobre práticas de SST que pode ser utilizado na avaliação do sistema de gestão da SST das empresas, possibilitando a realização de benchmarking externo e interno. Por outro lado, a ferramenta pode contribuir para o registro e a disseminação das práticas de gestão de SST no setor da construção.
Several academic studies have investigated Occupational Safety and Health (OSH) managerial practices in order to identify factors that contribute for the success of accident prevention programs in the construction industry. Most of those studies were based on surveys and aimed to identify correlations between accident rates and the existence or non-existence of such practices, establishing sets of practices that have the greatest impact on OSH. Despite the contributions of those studies, especially regarding the identification and dissemination of practices associated with accident prevention, four main drawbacks can be pointed out: (a) the lack of definition for best practices and of criteria for categorizing them, (b) scope limited to large companies from developed countries, (c) the lack of theoretical foundation, and (d) the descriptive focus of the methodological approach adopted. The main objective of this research work is to devise a protocol for characterizing and evaluating the degree of implementation of OSH managerial practices based on multiple sources of evidence, aiming to get a more detailed understanding of those practices, and take into account the context of application. Regarding the method, the constructive research approach was adopted, since this investigation proposes the development of a protocol for solving a problem with practical and theoretical relevance. Initially, a literature review on OSH managerial best practices and on the Resilience Engineering (RE) theoretical framework was undertaken. The protocol has been proposed based on both a literature review and also on a survey conducted with a sample of construction companies. The tool was developed and tested in five case studies in construction sites carried out sequentially. In addition, it was also applied in three construction sites in Spain in order to evaluate its applicability in another context. The results of those construction sites were processed and analyzed to illustrate the data produced. Finally, based on the evaluation of the protocol, some guidelines for implementing it were proposed. The main contributions of this research are related to the protocol, which has a prescriptive approach. From one hand, it enables the systematic collection of data on OSH practices that can be used for assessing the OSH management system of construction companies, making it possible to carry out internal and external benchmarking. From the other hand, with the tool may contribute for the documentation and dissemination of OSH best practices in the construction sector.
17

Rajendran, Rajapandiyan. "The Evaluation of GeoNetworking Forwarding in Vehicular Ad-Hoc Networks". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23982.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In Intelligent Transportation Systems (ITS), disseminating warning messages in a timely and efficient way through wireless short-range communications can save many lives and reduce traffic congestion. A geographical broadcast protocol provides data delivery to specified geographical areas, using multi-hop communications if needed. Among the main challenges for such protocols are forwarder selection and the reduction of the number of hops required to reach and cover the destination area.  In this thesis we propose an efficient geographical broadcast protocol called Preferred and Contention Based Forwarding (PCBF) and evaluate it through simulations. PCBF uses a combination of contention-based forwarding and selecting preferred forwarders also found in other protocols like Emergency Message Dissemination for Vehicular Environments (EMDV). Since the preferred forwarder is allowed to immediately forward the packet (evading contention among other potential forwarders), this approach reduces end-to-end delays. Notable extensions of PCBF compared to EMDV are the use of direct negative acknowledgements in case of unnecessary rebroadcasts and the use of forwarders outside the target region.  Our simulation results show that the PCBF protocol outperforms selected other protocols in terms of end-to-end delay, re-broadcast overhead and reliability in both sparse and dense networks.
18

Zamouril, Jakub. "Flight Software Development for Demise Observation Capsule". Thesis, Luleå tekniska universitet, Rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64420.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This work describes the process of the design of a flight software for a space-qualified device, outlines the development and testing of the SW, and provides a description of the final product. The flight software described in this work has been developed for the project Demise Observation Capsule (DOC). DOC is a device planned to be attached to an upper stage of a launch vehicle and observe its demise during atmospheric re-entry at the end of its mission. Due to constraint on communication time during the mission and the need to maximize the amount of transferred data, a custom communication protocol has been developed.
Demise Observation Capsule
19

Dobler, Rodrigo Jaureguy. "FITT : fault injection test tool to validate safety communication protocols". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/143198.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Protocolos de comunicação seguros são essenciais em ambientes de automação industrial, onde falhas não detectadas na comunicação de dispositivos podem provocar danos irreparáveis à vida ou ao meio-ambiente. Esses protocolos seguros devem ser desenvolvidos de acordo com alguma norma de segurança, como a IEC 61508. Segundo ela, faz parte do processo de implementação destes protocolos, a escolha de técnicas adequadas de validação, entre elas a injeção de falhas, a qual deve considerar um modelo de falhas apropriado ao ambiente de operação do protocolo. Geralmente, esses ambientes são caracterizados pela existência de diversas formas de interferência elétrica e eletromagnética, as quais podem causar falhas nos sistemas eletrônicos existentes. Nos sistemas de comunicação de dados, isto pode levar a destruição do sinal de dados e causar estados de operação equivocados nos dispositivos. Assim, é preciso utilizar uma técnica de injeção de falhas que permita simular os tipos de erros de comunicação que podem ocorrer nos ambientes industriais. Dessa forma, será possível verificar o comportamento dos mecanismos de tolerância falhas na presença de falhas e assegurar o seu correto funcionamento. Para esta finalidade, este trabalho apresenta o desenvolvimento do injetor de falhas FITT para validação de protocolos de comunicação seguros. Esta ferramenta foi desenvolvida para ser utilizada com o sistema operacional Linux. O injetor faz uso do PF_RING, um módulo para o Kernel do Linux, que é responsável por realizar a comunicação direta entre as interfaces de rede e o injetor de falhas. Assim os pacotes não precisam passar pelas estruturas do Kernel do Linux, evitando que atrasos adicionais sejam inseridos no processo de recebimento e envio de mensagens. As funções de falhas desenvolvidas seguem o modelo de falhas de comunicação descrito na norma IEC 61508. Esse modelo é composto pelos erros de repetição, perda, inserção, sequência incorreta, endereçamento, corrupção de dados, atraso, mascaramento e falhas de memória em switches.
Safe communication protocols are essential in industrial automation environments, where undetected failures in the communication of devices can cause irreparable damage to life or to the environment. These safe protocols must be developed according to some safety standard, like IEC 61508. According to it, part of the process of implementing these protocols is to select appropriate techniques for validation, including the fault injection, which should consider an appropriate fault model for the operating environment of the protocol. Generally, these environments are characterized by the existence of various forms of electric and electromagnetic interference, which can cause failures in existing electronic systems. In data communication systems, this can lead to the destruction of the data signal and cause erroneous operation states in the devices. Thus, it is necessary to use a fault injection technique that allows simulating the types of communication errors that may occur in industrial environments. So, it will be possible to verify the behavior of the fault tolerance mechanisms in the presence of failures and ensure its correct functioning. For this purpose, this work presents the development of FITT fault injector for validation of safety communication protocols. This tool was developed to be used with Linux operating system. The fault injector makes use of PF_RING, a module for the Linux Kernel and that is responsible to perform the direct communication between the network interfaces and the fault injector. Thus the packages do not need to go through the Linux Kernel structures, avoiding additional delays to be inserted into the process of receiving and sending messages. The developed fault injection functions follow the communication fault model described in the IEC61508 standard, composed by the errors of repetition, loss, insertion, incorrect sequence, addressing, data corruption, delay, masking and memory failures within switches. The fault injection tests applied with this model allow to properly validate the fault tolerance mechanisms of safety protocols.
20

Erdene-Ochir, Ochirkhand. "Résilience et application aux protocoles de routage dans les réseaux de capteurs". Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00862710.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Les réseaux de capteurs sans fil sont constitués d'un grand nombre de nœuds, déployés pour collecter des données du monde physique (température, humidité, pollution etc.) et les transmettre, de manière autonome, vers un ou plusieurs points de collectes appelés "puits". Dans cette thèse, nous nous focalisons sur la sécurité des protocoles de routage multi-sauts, plus particulièrement, sur la notion de résilience aux attaques. Les domaines d'applications des réseaux de capteurs sont variés, allant du suivi médical à la surveillance environnementale en passant par le bâtiment intelligent ou le monitoring urbain (éclairage, pollution, relevé de compteurs d'eau/électricité/gaz etc.). Dans ces applications, les capteurs sont souvent déployés dans des environnements ouverts et accessibles permettant aux éventuels attaquants de les détruire ou de les capturer afin d'en extraire les données sensibles (clés de chiffrement, identité, adresse, etc.). La compromission des nœuds est un problème majeur pour la sécurité de réseaux de capteurs, puisqu'un adversaire peut s'introduire à l'intérieur du périmètre de sécurité. Les méthodes traditionnelles, basées sur la cryptographie, permettent d'obtenir une sécurité de base (authentification, confidentialité, intégrité, non répudiation etc.), mais ne permettent pas toujours de se prémunir contre les attaques dues à la compromission des nœuds (réplication des nœuds, Sybil, Selective forwarding, Blackhole, Sinkhole, Wormhole etc.). Dans le but d'apporter des solutions algorithmiques complémentaires aux solutions cryptographiques, nous étudions la résilience des protocoles de communication en présence d'adversaires internes visant à perturber le routage de l'information à travers le réseau. Dans un premier temps, nous introduisons le concept de résilience. Notre objectif est de proposer une définition explicitant le terme de résilience dans notre contexte et une métrique, permettant de comparer efficacement les protocoles de routage. L'originalité de cette métrique est d'utiliser à la fois une représentation graphique et une méthode de calcul quantitative liée à celle-ci. La représentation graphique à deux dimensions permet une vision synthétique de la résilience des protocoles selon plusieurs paramètres de performance. La méthode de calcul quantitative liée à cette représentation graphique agrège les valeurs des paramètres et permet de classifier les protocoles en termes de résilience. Grâce à cet outil, nous avons évalué la résilience de plusieurs protocoles de routage classiques de différentes catégories. Cette étude nous a permis d'identifier les mécanismes permettant d'améliorer la résilience des protocoles. Dans un second temps, nous proposons les mécanismes résilients de routage pour les réseaux de capteurs. Les mécanismes résilients que nous proposons consistent en trois éléments : (i) introduire un comportement aléatoire (ii) limiter la longueur des routes (iii) ajouter de la réplication de paquets. Les comportements aléatoires augmentent l'incertitude pour les adversaires, rendant les protocoles moins prévisibles, les réplications des données permettent de bénéficier la diversification des routes créées entre les sources et le puits, en améliorant ainsi le succès et l'équité de livraison et la limitation de la longueur des routes est nécessaire pour diminuer la probabilité qu'un paquet tombe sur un nœud attaquant en route. La connexité entre les capteurs et le puits est ainsi augmentée. Grâce à notre métrique de résilience, nous avons proposé une nouvelle taxonomie de résilience. Selon cette taxonomie, le routage par gradient et la marche aléatoire biaisée avec les mécanismes proposés sont les plus résilients. Nous avons donc évalué par la suite le routage par gradient en cas d'attaques combinées pour approfondir notre étude, mais aussi pour savoir si ces mécanismes proposés permettent d'augmenter la résilience même en cas d'attaques plus complexes, visant différents aspects du routage (construction des routes, paquets de contrôle, etc.). Nous avons introduit plusieurs valeurs de biais aux variantes aléatoires du routage par gradient pour étudier l'influence de l'entropie et nous les avons comparées à sa version classique. Nous avons également évalué leur résilience en introduisant deux types de réplications (uniformes et adaptatives). Sans attaques, ce sont les variantes les plus biaisées sans réplications qui sont les plus performantes. En cas d'attaques peu importantes, les réplications uniformes sont plus efficaces, tandis qu'en cas d'attaques plus intenses, ce sont les réplications adaptatives qui se montrent les plus efficaces. Les études menées jusqu'à ici étaient produites par des simulations et nous avions donc besoin d'une justification théorique. Nous avons donc proposé une étude théorique de la marche aléatoire biaisée en cas d'attaques de non-retransmission des paquets. Nous avons évalué l'influence du biais, mais aussi les deux réplications que nous avions évaluées précédemment par des simulations. En premier lieu, nous avons étudié le succès de livraison et la consommation d'énergie pour tous les scénarios. Ensuite, nous les avons évalués selon notre métrique de résilience. Cette étude a permit de confirmer les résultats d'étude par simulations et elle a montré que le biais est indispensable pour la résilience et le seuil d'entropie bénéfique à la résilience est e=0.7 quand la réplication de données est introduite. En dessous de cette valeur, la marche aléatoire est inefficace à cause de la longueur de chemins trop importante. L'ensemble des travaux réalisés dans cette thèse se concentre autour de la résilience. Ce concept reste assez nouveau, en particulier dans le domaine des réseaux et télécommunications. À travers cette thèse, nous avons voulu donner notre vision sur ce thème en nous concentrant sur les problématiques de sécurité des protocoles de routage dans le contexte des réseaux de capteurs.
21

Lakhani, Shahzia A. "Preventing neuromuscular deconditioning in critically ill patients". Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/456.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Critically ill patients can be prescribed bed rest as a therapeutic intervention. Immobility from bed rest can cause neuromuscular deconditioning and weakness. Preventing immobility by implementing mobilization activities may prevent these complications from occurring. Currently, mobility protocols are lacking. The purpose of this literature review is to analyze the evidence related to mobilizing patients in the Intensive Care Unit (ICU). In the future, a standard mobility protocol should be instituted for critically ill patients indicating when and how to begin mobilization. The efficacy of mobility protocols relies on an interdisciplinary team for positive outcomes to prevent complications of inactivity and promote patient safety. Future implementation of mobilization can decrease patients' lengths of stay and extensive rehabilitation from inactivity. Nursing education, practice and research should focus on interventions to prevent complications of immobility by identifying mobilization techniques, safety approaches and the use of protocols.
B.S.N.
Bachelors
Nursing
Nursing
22

Sabouni, Imad. "Génération de modules dédiés aux circuits de communication de contrôle-commande : une étude de conception appliquée dans le cadre de la voiture sûre PROMETHEUS". Grenoble INPG, 1992. http://www.theses.fr/1992INPG0143.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Les travaux présentés dans cette thèse concernent l'implantation des protocoles de communication de niveau bas sur silicium. Cette approche tient compte des exigences de vitesse, de débit, de coût et de «versatilité» d'interfaces hôte dont témoignent les nouveaux protocoles et réseaux. Nous nous intéressons ici à la conception de circuits de communication destinés aux réseaux de contrôle-commande. Dans cette classe, les spécifications du protocole MAC présentent des ressemblances significatives; une architecture cible générique (paramétrable) peut alors être définie et utilisée comme modèle d'implantation. L'idée de la généricité d'une architecture conduit à l'emploi des méthodes de conception automatique. L'architecture cible se basant sur un ensemble de modules asynchrones interconnectés, nous avons appliqué la technique de génération de modules qui permet de produire ces différentes composantes à partir des paramètres du protocole à implanter. Les travaux de cette thèse ont été supportés par le projet européen PROMETHEUS/PRO-CHIP. Dans le cadre de ce projet, nous nous sommes intéressés par l'analyse des différents protocoles intra-véhicule existants, par la génération de circuits de communication destinés à ces protocoles et par la réalisation d'un réseau embarqué sur automobile conçu pour faire communiquer les équipements d'un système distribué de détection d'obstacles
23

Ryan, Jason C. (Jason Christopher). "Evaluating safety protocols for manned-unmanned environments through agent-based simulation". Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/97255.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Thesis: Ph. D. in Human Systems Engineering, Massachusetts Institute of Technology, Engineering Systems Division, 2014.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 217-230).
Recent advances in autonomous system capabilities have improved their performance sufficiently to make the integration of unmanned and autonomous vehicles systems into human-centered civilian environments a realistic near-term goal. In these systems, such as the national highway system, mining operations, and manufacturing operations, unmanned and autonomous systems will be required to interact with large numbers of other unmanned vehicle systems as well as with manned vehicles and other human collaborators. While prior research provides information on the different methods of controlling unmanned vehicles and the effects of these methods on individual vehicle behavior, it has typically focused on only a small number of unmanned systems acting in isolation. The qualities that provide the desired behavior of an autonomous system behavior in isolation may not be the same as the characteristics that lead to desirable performance while interacting with multiple heterogeneous actors. Additionally, the integration of autonomous systems may include constraints on operations that limit interactions between manned and unmanned agents. It is not clear which constraints might be most effective in promoting safe operations and how these constraints may interact with unmanned system control architectures. Examining the effects of unmanned systems in these large, complex systems in reality would require significant capital investment and the physical construction and implementation of the un- manned vehicles of interest. Both of these aspects make empirical testing either difficult or impossible to perform and may also limit the ability of testing to fully examine all the parameters of interest in a safe and efficient manner. The objective of this thesis is the creation of a simulation environment that can replicate the behavior of the unmanned vehicle systems, manned vehicles, and human collaborators in the environment in order to enable an exploration of how parameters related to individual actor behavior and actor interactions affect performance. The aircraft carrier flight deck is chosen as an example domain, given that current operations require significant interactions between human collaborators and manned vehicles and current research addresses the development of unmanned vehicle systems for flight deck operations. Because the complexity of interactions be- tween actors makes the creation of closed-form solutions of system behavior difficult, an agent-based modeling approach is taken. First, a list of actors and their characteristic tasks, decision-making processes, states, and parameters for current aircraft carrier flight deck operations was generated. Next, these models were implemented in an object-oriented programming language, enabling the definition of independent tasks, actors, parameters, and states. These models were later extended to incorporate features of unmanned vehicle control architectures by making minor modifications to the state, logic functions, or parameters of current agents (or tasks). This same tactic can be applied by future researchers to further pursue examinations of other in influential aspects of system performance or to adapt the model to other domains. This model, the Multi-Agent Safety and Control Simulation (MASCS), was then compared to data for current flight deck operations to calibrate and partially validate simulation outputs, first addressing an individual vehicle task before proceeding to mission tasks utilizing many vehicles at once. The MASCS model was extended to incorporate models of different unmanned vehicle control architectures and different safety protocols that affect vehicle integration. These features were then tested at different densities of mission operations on the flight deck and compositions (unmanned vs. manned) of missions in order to fully explore the interactions between variables. These results suggest hat productivity on the flight deck is more heavily influenced by the safety protocols that in influence vehicle integration as opposed to the types of unmanned vehicle control architecture employed. Vehicle safety is improved by increasing the number of high-level constraints on operations (e.g. separating unmanned and manned aircraft spatially or temporally), but these high-level constraints may conflict with implicit constraints that are part of crew-vehicle interactions. Additional testing explored the use of MASCS in understanding the effects of changes to the operating environment, independent of changes to unmanned vehicle control architectures and safety protocols, as well as how the simulation can be used to explore the vehicle design space. These results indicate that, at faster operational tempos, latencies in vehicle operations drive significant differences in productivity that are exacerbated by the safety protocols applied to operations. In terms of safety, a tradeoff between slightly increased vehicle safety and significant increases in the risk rate of crew activity is created at faster tempos in this environment. Lastly, the limitations and generalizability of the MASCS model for use in other Heterogeneous Manned-Unmanned Environments (HMUEs) was discussed, along with potential future work to expand the models.
by Jason C. Ryan.
Ph. D. in Human Systems Engineering
24

Perera, Dhammika. "A Comparison of the Safety and Efficacy of Three Medical Abortion Protocols". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6649.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Unsafe abortions pose serious threats to women's health. Medical abortion provides safer abortion access to many. The lengthy interval between misoprostol and mifepristone creates multiple barriers for women and providers. A paucity of research exists about medical abortion protocols that allow single day procedures. The efficacy and the safety of 3 medical abortion protocols of varying lengths were explored in this study. A secondary data set of over 55,000 patients from the United Kingdom was retrospectively analyzed using binomial logistic regression. Efficacy results showed no significant difference between the conventional and the simultaneous protocols; when compared to those, the 6- to 8- hour protocol showed a 79% higher risk (OR = 0.210, 95% CI = 0.178 - 0.246) of failure. Safety of the simultaneous protocol was 48% lesser (OR = 0.524, 95% CI = 0.447 - 0.613) and the safety of the 6- to 8- hour protocol 61% lesser (OR = 0.386, 95% CI = 0.304- 0.489) compared to the conventional protocol. The absolute risk of complications or severe adverse events of all protocols (0.98%, 1.97%, and 2.67%) was very low. The results suggest the simultaneous protocol is a viable alternative to the conventional protocol up to 10 weeks' gestation. The results could promote the adoption of the simultaneous protocol by health systems, give millions more women access to safe and effective single day medical abortions, reduce the need for skilled clinicians, and reduce cost burdens for both women and for healthcare systems overall. Implementation of these social changes could make abortion safer globally.
25

Martínez, Domínguez Francisco José. "Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios". Doctoral thesis, Universitat Politècnica de València, 2011. http://hdl.handle.net/10251/9195.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
La convergencia de las telecomunicaciones, la informática, la tecnología inalámbrica y los sistemas de transporte, va a facilitar que nuestras carreteras y autopistas nos sirvan tanto como plataforma de transporte, como de comunicaciones. Estos cambios van a revolucionar completamente cómo y cuándo vamos a acceder a determinados servicios, comunicarnos, viajar, entretenernos, y navegar, en un futuro muy cercano. Las redes vehiculares ad hoc (vehicular ad hoc networks VANETs) son redes de comunicación inalámbricas que no requieren de ningún tipo de infraestructura, y que permiten la comunicación y conducción cooperativa entre los vehículos en la carretera. Los vehículos actúan como nodos de comunicación y transmisores, formando redes dinámicas junto a otros vehículos cercanos en entornos urbanos y autopistas. Las características especiales de las redes vehiculares favorecen el desarrollo de servicios y aplicaciones atractivas y desafiantes. En esta tesis nos centramos en las aplicaciones relacionadas con la seguridad. Específicamente, desarrollamos y evaluamos un novedoso protocol que mejora la seguridad en las carreteras. Nuestra propuesta combina el uso de información de la localización de los vehículos y las características del mapa del escenario, para mejorar la diseminación de los mensajes de alerta. En las aplicaciones de seguridad para redes vehiculares, nuestra propuesta permite reducir el problema de las tormentas de difusión, mientras que se mantiene una alta efectividad en la diseminación de los mensajes hacia los vehículos cercanos. Debido a que desplegar y evaluar redes VANET supone un gran coste y una tarea dura, la metodología basada en la simulación se muestra como una metodología alternativa a la implementación real. A diferencia de otros trabajos previos, con el fin de evaluar nuestra propuesta en un entorno realista, en nuestras simulaciones tenemos muy en cuenta tanto la movilidad de los vehículos, como la transmisión de radio en entornos urbanos, especialmente cuando los edificios interfieren en la propagación de la señal de radio. Con este propósito, desarrollamos herramientas para la simulación de VANETs más precisas y realistas, mejorando tanto la modelización de la propagación de radio, como la movilidad de los vehículos, obteniendo una solución que permite integrar mapas reales en el entorno de simulación. Finalmente, evaluamos las prestaciones de nuestro protocolo propuesto haciendo uso de nuestra plataforma de simulación mejorada, evidenciando la importancia del uso de un entorno de simulación adecuado para conseguir resultados más realistas y poder obtener conclusiones más significativas.
Martínez Domínguez, FJ. (2010). Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/9195
Palancia
26

Soua, Ahmed. "Vehicular ad hoc networks : dissemination, data collection and routing : models and algorithms". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00919774.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Each day, Humanity loses thousands of persons on roads when they were traveling to work, to study or even to distract. The financial cost of these injuries is also terrifying: Some statistics evaluate the financial cost of vehicle accidents at 160 billion Euro in Europe each year. These alarming figures have driven researchers, automotive companies and public governments to improve the safety of our transportation systems and communication technologies aiming at offering safer roads and smooth driving to human beings. In this context, Vehicular Adhoc Networks, where vehicles are able to communicate with each others and with existent road side units, emerge as a promising wireless technology able to enhance the vision of drivers and offer larger telematic horizon. VANETs promising applications are not only restricted to road safety but span from vehicle trafficoptimization like flow congestion control to commercial applications like file sharing and internet access. Safety applications require that their alert information is propagated to the concerned vehicles (located in the hazardous zone) with little delay and high reliability. For these reasons, this category of applications is considered as delay sensitive and broadcast-oriented nature. While classical blind flooding is rapid, its major drawback is its huge bandwidth utilization. In this thesis, we are interested on enhancing vehicular communications under different scenarios and optimizations: First, We focus on deriving a new solution (EBDR) to disseminate alert messages among moving vehicles while maintaining it efficient and rapid. Our proposal is based on directional antennas to broadcast messages and a route guidance algorithm to choose the best path for the packets. Findings confirmed the efficiency of our approach in terms of probability of success and end-to-end delays. Moreover, in spite of the broadcast nature of the proposed technique, all transmissions stop very soon after the arrival of a packet to its destination representing a strong feature in the conception of EBDR. Second, we propose a novel mathematical framework to evaluate the performance of EBDR analytically. Although most of the proposed techniques present in literature use experimental or simulation tools to defend their performance, we rely here on mathematical models to confirm our achieved results. Our proposed framework allows to derive meaningful performance metrics including the probability of transmission success and the required number of hops to reach thefinal destination. Third, we refine our proposed broadcast-based routing EBDR to provide more efficient broadcasting by adjusting the transmission range of each vehicle based on its distance to the destination and the local node density. This mechanism allows better minimization of interferences and bandwidth's saving. Furthermore, an analytical model is derived to calculate thetransmission area in the case of a simplified node distribution. Finally, we are interested on data collection mechanisms as they make inter-vehicle communications more efficient and reliable and minimize the bandwidth utilization. Our technique uses Q-learning to collect data among moving vehicles in VANETs. The aim behind using the learning technique is to make the collecting operation more reactive to nodes mobility and topology changes. For the simulation part, we compare it to a non-learning version to study the effect of the learning technique. Findings show that our technique far outperforms other propositions and achieves a good trade off between delay and collection ratio. In conclusion, we believe that the different contributions presented in this Thesis will improve the efficiency of inter-vehicle communications in both dissemination and data collection directions. In addition, our mathematical contributions will enrich the literature in terms of constructing suitable models to evaluate broadcasting techniques in urban zones
27

Leite, Giulena Rosa. "Protocolo de cirurgias seguras numa região neotropical no Brasil Central: processo de implantação, avaliação e revisão da literatura". Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/7076.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Submitted by Luciana Ferreira (lucgeral@gmail.com) on 2017-04-05T11:53:33Z No. of bitstreams: 2 Tese - Giulena Rosa Leite - 2017.pdf: 2944113 bytes, checksum: 9194b3c298e35ecddd0323e013b325c0 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-04-05T11:53:47Z (GMT) No. of bitstreams: 2 Tese - Giulena Rosa Leite - 2017.pdf: 2944113 bytes, checksum: 9194b3c298e35ecddd0323e013b325c0 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2017-04-05T11:53:47Z (GMT). No. of bitstreams: 2 Tese - Giulena Rosa Leite - 2017.pdf: 2944113 bytes, checksum: 9194b3c298e35ecddd0323e013b325c0 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-03-31
Aiming at evaluating the implementation of a safe surgery protocol, developed by the Brazilian National Health Surveillance Agency (ANVISA), an integrative literature review followed by an uncontrolled, quasi-experimental before-and-after intervention study was conducted in public health institutions that possess a surgical center, which are from 5 cities that make up the Southwest Health Region II of the State of Goiás. The review consisted of 19 scientific articles searched by the association of the keywords surgical and checklist and world health organization and implantation. The population was composed of 84 workers from the multiprofessional team before the intervention, 77 workers after the intervention and 680 patients in postoperative period. The data organization process was conducted with Microsoft ® Excel 2010 program and the data analysis was made with the Statistical Package for the Social Sciences (SPSS) program. In order to present the situational diagnosis state of the stages "before training" and "after training" of the professionals, descriptive statistics were used. Then, the comparison of after-training and before-training collected data was performed using the chi-square test to test the significance between proportions. P values <0.05 were considered statistically significant. The female proportion of Healthcare Professionals (PAS) (79.9%) was statistically higher than that of males (20.1%), (p <0.020). The average age was 39.2 (± 9), the predominant age group was 41 years and over (43.9%) and the educational level was less than or equal to twelve years of study (56.1%). Regarding their training, more than a half of them was composed of nursing technicians (77.7%) and worked in a medium-sized hospital (56.8%). Healthcare professionals with a higher academic training level were nurses (8.6%) and medical surgeons or anesthesiologists (13.7%). There was a higher proportion of health professionals who responded positively to the procedures confirmation in step II (98.7%) compared to stage I (67.7%). Likewise, all the items related to visual confirmation and demarcation of the surgical site (1.6% stage I to 97.4% stage II), pulse oximeter presence (82.3% stage I to 98.7% stage II) and verbal review with the anesthesiologists (69.4% stage I to 98.7% in stage II) presented p <0.005. Regarding stage II, “before leaving the surgery room”, the items "compress/instruments count", "surgical specimen identification", "equipment functionality revision" were already performed with great consistency, even before the protocol implementation. Regarding the stage III of the checklist "before leaving the operating room", when we compared the health professionals’ perceptions, before and after the implementation of the checklist, it was observed that the variables "occurrence of wrong procedures notifications”, “the occurrence of surgeries in the wrong patients”, “the occurrence of surgeries in wrong places”, “inadequate antibiotic prophylaxis” and “revision of the postoperative and anesthesia care plan” (p <0.005) were statistically significant (p = 0.000). Conclusion: the level of evidence VI was the one of greater predominance among the articles produced in the period investigated. We interviewed 84 health professionals who work in public surgical centers of RSS II, 90.5% of the female gender; (40.5%), with professional training of Nursing Technicians (82.1%) and schooling less than 12 years of schooling (54.8%). Moments 1 "before the anesthesia" and 2 "before the surgical incision" of the checklist, had a higher rate of adhesion by professionals.
Com o objetivo de avaliar o processo de implantação do protocolo de cirurgias seguras, da Agência Nacional de Vigilância Sanitária – Brasil, realizou-se uma revisão integrativa de literatura seguida por uma pesquisa de intervenção, quase experimental do tipo antes e depois, não controlada, em instituições públicas de saúde que possuem centro cirúrgico, de 5 municípios que compõem a Região de Saúde Sudoeste II do Estado de Goiás. A revisão constou de 19 artigos científicos buscados pela associação das palavras chave surgical and checklist and world health organization and implantation. A população foi constituída por 84 trabalhadores da equipe multiprofissional antes da intervenção, 77 trabalhadores após a intervenção, e 680 pacientes em pós-operatório. Os dados foram organizados no programa Microsoft ® Excel 2010 e analisados com auxílio do programa Statistical Package for the Social Sciences (SPSS). Para apresentar as etapas do diagnóstico situacional “antes da capacitação” dos profissionais e “após a capacitação” dos mesmos, foi utilizada a estatística descritiva. Em seguida, foi realizada a comparação dos dados coletados antes e após a capacitação, utilizando o teste de qui-quadrado para testar a significância entre as proporções. Valores de p<0,05 foram considerados estatisticamente significantes. A proporção dos PAS (Profissionais da Área da Saúde) do sexo feminino (79,9%) foi estatisticamente superior em relação ao sexo masculino (20,1%), (p < 0,020). A idade média foi de 39,2 (± 9), enquanto a faixa etária predominante foi acima de 41 anos (43,9%) e escolaridade menor ou igual a doze anos de estudo (56,1%). Quanto à formação, mais da metade eram técnicos em enfermagem (77,7%) e trabalhavam em hospital de médio porte (56,8%). A participação de PAS com formação superior foi de enfermeiros (8,6%) e de médicos cirurgiões ou anestesistas (13,7%). Verificou-se uma proporção maior de PAS que responderam positivamente à confirmação dos procedimentos na etapa II (98,7%) em relação a etapa I (67,7%). Da mesma forma os itens relativos a confirmação visual e demarcação do sítio cirúrgico (1,6% etapa I para 97,4% etapa II), presença do oxímetro de pulso (82,3% etapa I para 98,7% na etapa II) e revisão verbal com o anestesista (69,4% etapa I para 98,7% na etapa II) apresentaram valor de p < 0,005. Em relação ao momento II, antes de sair da sala de cirurgias, os itens “contagem de compressa/instrumental”, “Identificação de qualquer amostra cirúrgica”, “Revisão da funcionalidade equipamentos” já eram realizados com grande consistência, mesmo antes da implantação do protocolo. Em relação ao terceiro momento do checklist “antes de sair da sala cirúrgica”, quando comparamos a percepção dos profissionais de saúde, antes e após a implantação do checklist, observa-se que as variáveis “notificações de ocorrência de procedimentos errados”, “ocorrência de cirurgia em pacientes errados”, “ocorrência de cirurgias em locais errados”, “notificação de antibioticoprofilaxia inadequada” e “revisão do plano de cuidado pós-operatório e anestésico” (p<0,005) foram estatisticamente significativas (p=0,000). Conclusão: o nível de evidência VI foi o de maior predominância entre os artigos produzidos no período investigado. Foram entrevistados 84 profissionais de saúde que atuam em centros cirúrgicos públicos da RSS II, 90,5% do gênero feminino; a maioria com idade maior que 41 anos (40,5%), com formação profissional de Técnicos de Enfermagem (82,1%) e escolaridade menor que 12 anos de estudo (54,8%). Os momentos 1 “antes da anestesia” e 2 “antes da incisão cirúrgica” do checklist, tiveram maior taxa de adesão por profissionais.
28

Allal, Salim. "Optimisation des échanges dans le routage géocast pour les réseaux de Véhicules Ad Hoc VANETs". Thesis, Paris 13, 2014. http://www.theses.fr/2014PA132056/document.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Les travaux réalisés dans cette thèse traitent de l'optimisation des échanges dans les réseaux véhiculaires sans fil en mode sans infrastructure Ad Hoc (VANETs). Les VANETs sont une partie des systèmes de transports intelligents (STIs).Ces derniers essaient de répondre à la question de comment équiper les véhicules de systèmes de communications sans fil pour éviter les accidents, mieux gérer les embouteillages et avoir des.impacts économiques, énergétiques et environnementaux positifs. Les VANETs utilisent les équipements mis en place dans les véhicules par les STI pour assurer des communications sans fil autonomes (IEEE 802.11p, 3G, LTE, etc) entre les véhicules ou entre les véhicules et les infrastructures fixes. Avec de tels mécanismes de communication, un véhicule peut échanger des informations avec ses voisins proches à un saut ou loin à deux sauts et plus grâce à la technique de relayage des messages de la source à la destination à travers les véhicules intermédiaires. Afin d'assurer un cheminement optimal de ces messages, des protocoles de routage existent. Dans ce travail, nous proposons un nouveau concept de routage de type géocast pour lequel la littérature ne répond pas. Le routage géocast dans la littérature permettant d'acheminer un message d'un véhicule source unique vers tous les véhicules situés dans une zone de destination géographique bien définie, nous avons proposée de scinder cette zone de destination en plusieurs sous-zones géographiques. La solution que nous avons proposé est le protocole GeoSUZ qui permet d'optimiser les échanges dans le contexte de routage géocast multi-zones de destination
Vehicular ad hoc networks (VANETs) are a part of intelligent transportation systems (ITS). These letter attempt to answer the question of how to equip vehicles with wireless communication means to avoid accidents, better manage congestion and have positive impact on economics, energy and environment. Indeed, with wireless communication mechanisms such as IEEE 802.11p, a vehicle may exchange information with its near neighbors at one hop or at two furthur hops trhough relaying messages technique across intermediate vehicles. Some of these messages may cover vehicles wich are in a defined geographical area and spread throughout the network will consume bandwidth and penalize other vehicles. This is the case for information on the road trafic, for example. In the latter case, routing protocols said Geocast are used for the dissemination of these messages. The protocols are used to route a message from a unique source to multiple destination vehicles locked in the same geographic area. In this thesis, we considered the case where we have several geographic areas of interest and have proposed a new Geocast routing mechanism, called GeoSUZ, for conveying a message optimally between a source and multiple destination areas. An optimized broadcasting mechanism within an area is also combined with GeoSUZ algorithm to ensure end-to-end routing with minimal overhead
29

Torrent-Moreno, Marc. "Inter-vehicle communications : achieving safety in a distributed wireless environment : challenges, systems and protocols /". Karlsruhe : Univ.-Verl. Karlsruhe, 2007. http://www.uvka.de/univerlag/volltexte/2007/263/.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Ruppert, Guilherme Cesar Soares. "NFS Guard : uma solução de segurança para o protocolo NFS". [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276483.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Orientador: Paulo Licio de Geus
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-06T04:50:10Z (GMT). No. of bitstreams: 1 Ruppert_GuilhermeCesarSoares_M.pdf: 908627 bytes, checksum: 2eb5cfc8a9692f72179b7c1cd2596b39 (MD5) Previous issue date: 2006
Resumo: Os sistemas de arquivos distribuídos são um componente importante em praticamente todas as redes coorporativas, acadêmicas e até mesmo domésticas. Neste cenário, o NFS (Network File System) é um dos sistemas de maior importância, não só pela importância histórica em ter sido um dos pioneiros, mas por ser largamente utilizado em todo o mundo. Porém, o NFS foi projetado com recursos insuficientes de segurança. A versão 3 do NFS, que é a versão utilizada atualmente em ambientes de produção, apresenta um nível de segurança praticamente nulo. Mais recentemente, foi elaborada a especificação da versão 4 do protocolo que corrige adequadamente os problemas de segurança. Contudo, o protocolo apresenta um grau de complexidade extremamente elevado e, devido a isso, poucos estão dispostos a enfrentar sua implementação. Atualmente, existem apenas algumas implementações preliminares deste protocolo e as mesmas não se encontram completas e estáveis. Logo, a migração para o NFSv4 a curto prazo é inviável. Neste trabalho foi realizado um amplo estudo dos diversos aspectos envolvidos com a segurança de sistemas de arquivos distribuídos, em especial o NFS. Foram levantadas as deficiências do NFS e foram analisados diversos trabalhos envolvendo segurança no compartilhamento de arquivos. Este trabalho resultou no projeto e implementação do NFS Guard, uma ferramenta para agregar segurança ao NFS versão 3 de forma simples e totalmente compatível com as redes NFS já instaladas. O NFS Guard utiliza clientes e servidores NFS padrão e não requer recompilação de nenhum software já instalado, podendo ser utilizado inclusive em sistemas de código fechado. Para isso foi desenvolvida uma técnica de Kerberização utilizando interceptação de pacotes, que também pode ser utilizada para agregar segurança a outros serviços além do NFS
Abstract: Distributed File Systems are an important component in practicalIy every corporate, academic or even home network. In this scenario, NFS (Network File System) is one of the most important of these systems, not only due to its historical importance for being one of the pioneers, but also for being largely used alI over the world. However, NFS was designed with insufficient security features. NFS version 3, which is the version currently being used in production environments, presents an almost nulI security leveI. More recently, the version 4 of the protocol was designed,among other thigs, to tackle the security issues. Nevertheless, this protocol presents an extremely high leveI of complexity, and consequently, a few want to face its implementation. At the moment, a few preliminary implementations are available, but usualIy incomplete and unstable. Hence, the migration to NFSv4 in a short term is not feasible. In this work we accomplished a wide study of many aspects involved with distributed file system security, specialIy with regards to NFS. NFS's shortcoming were identified e many works involving security in file sharing were analyzed. This work resulted in the design and implementation of NFS Guard, a tool to add security do NFS version 3 in a simple way and totalIy compatible with instalIed NFS networks. NFS Guard uses standard NFS client and server and does not require recompilation of any installed software, so it can be used with closed source systems. To accomplish that, a Kerberization technique was developed using packet interception, which can also be used to add security to other services besides NFS
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
31

Panno, Simone Franciscatto. "ADESÃO AO PROTOCOLO DE IDENTIFICAÇÃO DO PACIENTE EM UNIDADES PEDIÁTRICAS: ESTRATÉGIA PARA O CUIDADO SEGURO". Centro Universitário Franciscano, 2017. http://www.tede.universidadefranciscana.edu.br:8080/handle/UFN-BDTD/639.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Submitted by MARCIA ROVADOSCHI (marciar@unifra.br) on 2018-08-22T14:20:42Z No. of bitstreams: 2 Dissertacao_SimoneFranciscattoPanno.pdf: 24728642 bytes, checksum: 70b8361698b1e4342af3bd188424423e (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-08-22T14:20:42Z (GMT). No. of bitstreams: 2 Dissertacao_SimoneFranciscattoPanno.pdf: 24728642 bytes, checksum: 70b8361698b1e4342af3bd188424423e (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-11-30
The correct identification of the patient is fundamental in the provision of safe care, being the first international safety goal of the World Health Organization. Protocols for patient identification in health services standardize actions and reduce the occurrence of errors. The general objective of this study was to evaluate the adherence of the professionals to the institutional protocol of identification of the patient, in the pediatric units of a teaching hospital. As specific objectives were considered: verify if the health care professionals identify the patients with bracelets; identification of the patient prior to care / procedures / transfers / discharge and educating / advising patients / caregivers on the correct identification, according to the protocol; verify the presence and general compliance of identification wristbands; and, produce a video emphasizing the importance of identification actions. A cross-sectional study was carried out, with a descriptive design and a quantitative approach. The population was composed by the health / support professionals, who worked in the care of patients of the Pediatric Emergency Room, the Pediatric Intensive Care Unit and the Pediatric Clinical and Surgical Unit of a teaching hospital in Rio Grande do Sul. The sample consisted of 385 opportunities of actions. At each opportunity, we sought: to verify if the patients were identified with bracelets - action 1; to observe if the professionals confer the identification of the patients - action 2; and, if the patients / companions were educated about the correct identification - action 3. Also, in the opportunities in which the bracelet was present, the conformity of the bracelet with the protocol was verified. Data collection took place from April to June 2017, through the completion of a research instrument. Data was entered into Excel 2007 spreadsheets and analyzed by descriptive statistics. The adhesion of professionals to action 1 was 74.28%, action 2 had no adhesion, and action 3 had adhesion of 2.08%. The bracelet was present at 82.85% of the opportunities and overall compliance was 12.22%. Regarding the location / fixation of the bracelet, compliance was 89.56%; in the presence of the three correct identifiers, 25.07% and, in the specifications, 69.29%. The findings contributed to establish the situational diagnosis of the professionals' adherence to the institutional protocol. In addition, it will enable the implementation of measures for compliance with the proposed actions and strengthening of the safety culture. The resulting product was a video aimed at informing and sensitizing health professionals / support, patients and caregivers as to the importance of the first goal.
A identificação correta do paciente é fundamental na prestação do cuidado seguro, sendo a primeira meta internacional de segurança da Organização Mundial da Saúde. Os protocolos para identificação do paciente nos serviços de saúde padronizam as ações e reduzem a ocorrência de erros. O objetivo geral deste estudo foi avaliar a adesão dos profissionais ao protocolo institucional de identificação do paciente, nas unidades pediátricas de um hospital de ensino. Como objetivos específicos foram considerados: verificar se os profissionais de saúde/apoio identificam os pacientes com pulseiras; se conferem a identificação do mesmo antes dos cuidados/procedimentos/transferências/alta e se educam/orientam os pacientes/ acompanhantes sobre a correta identificação, conforme o protocolo; verificar a presença e a conformidade geral das pulseiras de identificação; e, produzir um vídeo enfatizando a importância das ações de identificação. Realizou-se um estudo transversal, com delineamento descritivo e abordagem quantitativa. A população foi composta pelos profissionais de saúde/apoio, atuantes na assistência aos pacientes do Pronto Socorro Pediátrico, Unidade de Tratamento Intensivo Pediátrico e Unidade Pediátrica Clínica e Cirúrgica de um hospital de ensino do Rio Grande do Sul. A amostra foi constituída por 385 oportunidades de observação das ações. Em cada oportunidade buscou-se: verificar se os pacientes estavam identificados com pulseiras – ação 1; observar se os profissionais conferiam a identificação dos pacientes – ação 2; e, se realizavam a educação dos pacientes/acompanhantes sobre a identificação correta – ação 3. Também, nas oportunidades em que a pulseira estava presente foi verificada a conformidade da mesma com o protocolo. A coleta dos dados ocorreu de abril a junho de 2017, mediante o preenchimento de um instrumento de pesquisa. Os dados foram digitados em planilhas do Excel 2007 e analisados por estatística descritiva. A adesão dos profissionais à ação 1 foi de 74,28%, a ação 2 não teve adesão, já a ação 3 teve adesão de 2,08%. A pulseira estava presente em 82,85% das oportunidades e a conformidade geral foi de 12,22%. Em relação à localização/fixação da pulseira, a conformidade foi de 89,56%; na presença dos três identificadores corretos, 25,07% e, nas especificações, 69,29%. Os achados contribuíram para estabelecer o diagnóstico situacional da adesão dos profissionais ao protocolo institucional. Além disso, possibilitará a implementação de medidas em prol do cumprimento das ações propostas e fortalecimento da cultura de segurança. O produto resultante foi um vídeo com a finalidade de informar e sensibilizar os profissionais de saúde/apoio, paciente e acompanhantes, quanto à importância da primeira meta.
32

Segata, Michele. "Safe and Efficient Communication Protocols for Platooning Control". Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368014.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Modern vehicles are becoming smarter and smarter thanks to the continuous development of new Advanced Driving Assistance Systems (ADAS). For example, some new commercial vehicles can detect pedestrians on the road and automatically come to a stop avoiding a collision. Some others can obtain information about traffic congestion through the cellular network and suggest the driver another route to save time. Nevertheless, drivers (and our society as well) are always striving for a safer, cleaner, and more efficient way of traveling and standard, non-cooperative ADAS might not be sufficient. For this reason the research community started to design a vehicular application called “platooning†. Platooning simultaneously tackles safety and traffic congestion problems by cooperatively coordinating vehicles in an autonomous way. Traffic flow is optimized by using an advanced Adaptive Cruise Control (ACC), called Cooperative Adaptive Cruise Control (CACC), which drastically reduces inter-vehicle gaps. By being autonomously coordinated, platooning vehicles implicitly implement automated emergency braking, a fundamental application for freeway safety. The idea is to form optimized road trains of vehicles where the first drives the train, while the others autonomously follow at a close distance, without requiring the driver to steer, accelerate, or brake. Platooning can have an enormous impact on future transportation systems by increasing traffic flow (and thus reducing congestion), increasing safety, reducing CO2 emissions, and reducing the stress of driving. This application is extremely challenging due to its inter-disciplinary nature. Indeed, it involves control theory, vehicle dynamics, communication, and traffic engineering. In this thesis we are mostly concerned with the communication aspects of this application, which is fundamental for making the vehicles cooperate, improving the efficiency of the application with respect to a pure sensor-based solution. Application requirements are very tight and, given that the envisioned communication technology will be IEEE 802.11-based, there are concerns on whether these requirements can really be met. The focus of the thesis is in this direction. The first contribution is the design of PLEXE, an extension for the widely used vehicular simulation framework Veins that enables research studies on various platooning aspects, including design and evaluation of control algorithms, communication protocols, and applications. The tool is open source and free to download and use, and it realistically simulates both communication and vehicle dynamics. This makes PLEXE a valid testing platform before real world deployment. The second contribution is a set of undirected information broadcasting (beaconing) protocols that specifically take into account the requirements of the application. We initially develop four static (i.e., periodic) approaches and compare them against two state of the art dynamic protocols, showing that our approaches are capable of supporting the application even in heavily dense scenarios. Then, we propose a dynamic protocol that further improves the application (increasing safety) and the network layer (reducing resource usage) performance. The final contribution is a platooning control algorithm that, compared to state of the art approaches, is re-configurable at run-time and that can be adapted to network conditions. We thoroughly test the algorithm in highly challenging scenarios. These scenarios include a realistic network setup where the road is shared by human- and automated-driven vehicles. Human-driven vehicles interfere with automated-driven ones by sending data packets on the same channel. Moreover, we also consider a scenario with realistic vehicle dynamics, which takes into account vehicles’ engine and braking characteristics. The algorithm is shown to be robust to network and external disturbances, to have a fast convergence, and to be very stable. The results in this work thus represent a big step towards the real world implementation of platooning systems.
33

Segata, Michele. "Safe and Efficient Communication Protocols for Platooning Control". Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1644/1/phd-thesis-segata.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Modern vehicles are becoming smarter and smarter thanks to the continuous development of new Advanced Driving Assistance Systems (ADAS). For example, some new commercial vehicles can detect pedestrians on the road and automatically come to a stop avoiding a collision. Some others can obtain information about traffic congestion through the cellular network and suggest the driver another route to save time. Nevertheless, drivers (and our society as well) are always striving for a safer, cleaner, and more efficient way of traveling and standard, non-cooperative ADAS might not be sufficient. For this reason the research community started to design a vehicular application called “platooning”. Platooning simultaneously tackles safety and traffic congestion problems by cooperatively coordinating vehicles in an autonomous way. Traffic flow is optimized by using an advanced Adaptive Cruise Control (ACC), called Cooperative Adaptive Cruise Control (CACC), which drastically reduces inter-vehicle gaps. By being autonomously coordinated, platooning vehicles implicitly implement automated emergency braking, a fundamental application for freeway safety. The idea is to form optimized road trains of vehicles where the first drives the train, while the others autonomously follow at a close distance, without requiring the driver to steer, accelerate, or brake. Platooning can have an enormous impact on future transportation systems by increasing traffic flow (and thus reducing congestion), increasing safety, reducing CO2 emissions, and reducing the stress of driving. This application is extremely challenging due to its inter-disciplinary nature. Indeed, it involves control theory, vehicle dynamics, communication, and traffic engineering. In this thesis we are mostly concerned with the communication aspects of this application, which is fundamental for making the vehicles cooperate, improving the efficiency of the application with respect to a pure sensor-based solution. Application requirements are very tight and, given that the envisioned communication technology will be IEEE 802.11-based, there are concerns on whether these requirements can really be met. The focus of the thesis is in this direction. The first contribution is the design of PLEXE, an extension for the widely used vehicular simulation framework Veins that enables research studies on various platooning aspects, including design and evaluation of control algorithms, communication protocols, and applications. The tool is open source and free to download and use, and it realistically simulates both communication and vehicle dynamics. This makes PLEXE a valid testing platform before real world deployment. The second contribution is a set of undirected information broadcasting (beaconing) protocols that specifically take into account the requirements of the application. We initially develop four static (i.e., periodic) approaches and compare them against two state of the art dynamic protocols, showing that our approaches are capable of supporting the application even in heavily dense scenarios. Then, we propose a dynamic protocol that further improves the application (increasing safety) and the network layer (reducing resource usage) performance. The final contribution is a platooning control algorithm that, compared to state of the art approaches, is re-configurable at run-time and that can be adapted to network conditions. We thoroughly test the algorithm in highly challenging scenarios. These scenarios include a realistic network setup where the road is shared by human- and automated-driven vehicles. Human-driven vehicles interfere with automated-driven ones by sending data packets on the same channel. Moreover, we also consider a scenario with realistic vehicle dynamics, which takes into account vehicles’ engine and braking characteristics. The algorithm is shown to be robust to network and external disturbances, to have a fast convergence, and to be very stable. The results in this work thus represent a big step towards the real world implementation of platooning systems.
34

Silvius, Mark D. "Building a Dynamic Spectrum Access Smart Radio With Application to Public Safety Disaster Communications". Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/28812.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Recent disasters, including the 9/11 terrorist attacks, Hurricane Katrina, the London subway bombings, and the California wildfires, have all highlighted the limitations of current mobile communication systems for public safety first responders. First, in a point-to-point configuration, legacy radio systems used by first responders from differing agencies are often made by competing manufacturers and may use incompatible waveforms or channels. In addition, first responder radio systems, which may be licensed and programmed to operate in frequency bands allocated within their home jurisdiction, may be neither licensed nor available in forward-deployed disaster response locations, resulting in an operational scarcity of usable frequencies. To address these problems, first responders need smart radio solutions which can bridge these disparate legacy radio systems together, can incorporate new smart radio solutions, or can replace these existing aging radios. These smart radios need to quickly find each other and adhere to spectrum usage and access policies. Second, in an infrastructure configuration, legacy radio systems may not operate at all if the existing communications backbone has been destroyed by the disaster event. A communication system which can provide a new, temporary infrastructure or can extend an existing infrastructure into a shaded region is needed. Smart radio nodes that make up the public safety infrastructure again must be able to find each other, adhere to spectrum usage policies, and provide access to other smart radios and legacy public safety radios within their coverage area. This work addresses these communications problems in the following ways. First, it applies cognitive radio technology to develop a smart radio system capable of rapidly adapting itself so it can communicate with existing legacy radio systems or other smart radios using a variety of standard and customized waveforms. These smart radios can also assemble themselves into an ad-hoc network capable of providing a temporary communications backbone within the disaster area, or a network extension to a shaded communications area. Second, this work analyzes and characterizes a series of rendezvous protocols which enable the smart radios to rapidly find each other within a particular coverage area. Third, this work develops a spectrum sharing protocol that enables the smart radios to adhere to spectral policies by sharing spectrum with other primary users of the band. Fourth, the performance of the smart radio architecture, as well as the performance of the rendezvous and spectrum sharing protocols, is evaluated on a smart radio network testbed, which has been assembled in a laboratory setting. Results are compared, when applicable, to existing radio systems and protocols. Finally, this work concludes by briefly discussing how the smart radio technologies developed in this dissertation could be combined to form a public safety communications architecture, applicable to the FCCâ s stated intent for the 700 MHz Band. In the future, this work will be extended to applications outside of the public safety community, specifically, to communications problems faced by warfighters in the military.
Ph. D.
35

Qureshi, Umer. "AESTHETIC IMPACTS OF WIND FARM OBSTRUCTION LIGHTING : A STUDY ABOUT AVIATION SAFETY PROTOCOLS, LIGHTING TECHNOLOGY, AND PUBLIC ATTITUDES". Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323602.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The overall purpose of the study was to examine the aesthetic impacts of wind farm obstruction lighting. The research problems investigated in this study were; aviation safety regulations for wind farm obstruction lighting in different countries, obstruction lighting technology, and the public attitudes towards wind farming. The research was designed taking into account the research problems, questions, and the researcher experience. Hence, mixed method approach was employed to collect as much, and as diverse data as possible. The sample was drawn focusing wind energy project developers, operators, and the owners. Seeking to build a detailed narrative, a web-based survey was conducted to gather the thoughts, and opinions of the sample population, in addition, to a thorough literature review conducted earlier. The key findings of this study are that the lighting system should be efficient to operate in terms of technology with least aesthetic impacts. Out-dated wind farm obstruction lighting systems are annoying, and contributes to overall aesthetic impacts that triggers nagetive attitudes towards wind farming. In addition, for wind farms near any aerodrome, infrared integrated into light emitting diodes obstruction lighting have minimal aesthetic impacts. Whereas, the radar-activated obstruction lighting is a better choice for wind farms further away from aerodromes. The study argued that understanding the affecting components of attitudes would give various stakeholders a realistic understanding about attitudes towards wind farming. This study concludes that the optimization of lighting angle, intensity, color, and luminance will help reducing the aesthetic impacts under the prevailing regulations, and mapping affective components of attitudes will help in better understanding the public support towards wind farming.
36

Lemos, Cassiane de Santana. "Assistência de enfermagem no procedimento anestésico: protocolo para segurança do paciente". Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/7/7139/tde-13102015-161656/.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Introdução: O procedimento anestésico é essencial para a realização da cirurgia, exigindo o planejamento de cuidados pela equipe cirúrgica para a segurança e a redução de danos ao paciente. No Brasil, o procedimento anestésico é privativo do anestesiologista e a equipe de enfermagem do centro cirúrgico auxilia o médico durante suas atividades, mas não há uma diretriz para execução de cuidados. Objetivos: Construir um protocolo de ações que direcione o enfermeiro durante a anestesia; avaliar, junto a anestesiologistas e enfermeiros especialistas em enfermagem perioperatória, a validade de conteúdo, a clareza dos itens, a pertinência do conteúdo e a abrangência do protocolo construído. Método: Busca na literatura de artigos publicados entre os anos de 1978 a 2014, indexados nas bases de dados Medline/Pubmed, Cinahl, Lilacs, Cochrane; Portal BVS, sobre a assistência de enfermagem em sala cirúrgica durante anestesias gerais de pacientes adultos. Elaboração de um protocolo com 40 itens, pautado na revisão elaborada, divididos em três períodos: antes da indução anestésica, indução e reversão da anestesia. O protocolo foi avaliado por 5 juízes quanto a 4 itens: validade do conteúdo, clareza, pertinência e abrangência. Cada item foi pontuado de 1 a 5, de acordo com a escala de Likert, sendo: (1) discordo totalmente, (2) discordo, (3) nem concordo/discordo, (4) concordo, (5) concordo totalmente. Os resultados foram analisados pelo índice de validade de conteúdo (IVC). Resultados: O protocolo foi analisado por 5 juízes: 3 anestesiologistas e 2 enfermeiras de centro cirúrgico. Antes da indução anestésica, o IVC variou de 60 a 100% em validade, 40 a 100% em clareza, 80 a 100% em pertinência e 60 a 80% em abrangência. Os juízes sugeriram alterações nos itens em teste e uma avaliação da disponibilidade de materiais. Na indução anestésica, o IVC variou de 40 a 100% nos itens validade, clareza e abrangência de conteúdo, de 20 a 100% em pertinência. A indução foi o período de maior divergência entre os juízes, que consideraram alguns procedimentos privativos do anestesiologista (avaliação da ventilação, punção venosa, registro de sinais vitais). No período de reversão da anestesia, os itens validade e abrangência tiveram IVC de 80 a 100%, de 60 a 100% em clareza e pertinência. Na reversão, os juízes sugeriram o monitorização do paciente para o transporte, registro dos dispositivos e condições do paciente antes da saída de sala cirúrgica. Conclusão: Em alguns países, o enfermeiro possui uma atuação consolidada em anestesia, com diretrizes de trabalho e certificação. No Brasil, o enfermeiro de centro cirúrgico auxilia o anestesiologista durante o procedimento anestésico, necessitando de um protocolo assistencial que direcione o trabalho e favoreça a assistência com qualidade, conhecimento e segurança.
Introduction: The anesthetic procedure is critical for the execution of a surgery, and therefore requires the surgical team to prepare the planning of cares in order to ensure the safety and reduce the damages to the patient. In Brazil, the anesthetic procedure is exclusive to the anesthesiologist, while the surgical center nursing team assists the doctor with his/her activities. However, there is no directive on the provision of such cares. Objectives: To create a protocol of actions to orient the nurse during the anesthesia; to assess the validity and pertinence of the contents, the clarity of the items, and the coverage of the created protocol along with anesthesiologists and nurses specialized in perioperative nursing. Method: Survey the literature for articles published between 1978 and 2014, as indexed in the Medline/Pubmed, Cinahl, Lilacs, Cochrane, and Portal BVS databases on the nursing assistance in the surgical room during general anesthesias of adult patients. Elaboration of a protocol with 40 items based on the elaborated revision, and divided into three periods: before the anesthetic induction, induction, and reversal of anesthesia. The protocol was evaluated by 5 judges according to 4 items: validity of the contents, clarity, pertinence, and coverage. Each item was given scores from 1 to 5, according to the Likert scale. Namely: (1) strongly disagree, (2) disagree, (3) undecided, (4) agree, (5) strongly agree. The results were analyzed according to the content validity index (CVI). Results: The protocol was analyzed by 5 judges: 3 anesthesiologists, and 2 surgical center nurses. Before the anesthetic induction, the CVI varied from 60% to 100% in validity, 40% to 100% in clarity, 80% to 100% in pertinence, and 60% to 80% in coverage. The judges suggested changes to the items being tested and also an evaluation of the availability of materials. In the anesthetic induction, the CVI varied from 40% to 100% in validity, clarity, and content coverage, and from 20% to 100% in pertinence. The induction was the period with the most divergences between the judges, as they considered some procedures as exclusive to the anesthesiologist (ventilation assessment, venipuncture, record of vital signs). In the period of reversal of anesthesia, the validity and coverage had a CVI of 80% to 100%, with 6% to 100% for clarity and pertinence. In the reversal period, the judges suggested the monitoring of the patient for transportation, record of devices, and conditions of the patient before leaving the surgical room. Conclusion: In some countries, the nurse has a consolidated role in the anesthetic process, which includes work directives and certification. In Brazil, surgical center nurses assist the anesthesiologist during the anesthetic procedure, but they need an assistance protocol to direct the work and favor the quality, knowledge, and safety of such assistance.
37

CARADONNA, TIZIANA. "Emerging protozoan parasites and food safety: investigation in 'ready to eat' packaged salads by microscopy and molecular tools". Doctoral thesis, Università di Foggia, 2017. http://hdl.handle.net/11369/363293.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Per esaminare la prevalenza della contaminazione da Giardia duodenalis, Cryptosporidium spp., Toxoplasma gondii e Cyclospora cayetanensis in insalate pronte da mangiare (RTE) in vendita in Italia, sono stati acquistati 648 pacchetti prodotti da aziende industriali e locali. Ogni mesi, nove pacchetti (100 g ciascuno) sono stati raccolti per ogni marchio e 72 pools sono stati creati e sottoposti a microscopia e analisi molecolari. 864 slide sono state esaminate microscopicamente e Cryptosporidium spp. e anche Blastocystis hominis e Dientamoeba fragilis sono stati rilevati. Attraverso gli strumenti molecolari sono stati identificati G. duodenalis assemblaggio A, Cryptosporidium parvum e Cryptosporidium ubiquitum, T. gondii Tipo I e C. cayetanensis. B. hominis e D. fragilis sono stati anche confermati in modo molecolare. La prevalenza complessiva di ciascuna specie di protozoo è stata del 0,6% (95% CI 0,2-1,6%) per G. duodenalis, 0,8 (95% CI 0,3-1,8%) per T. gondii, 0,9% (95% CI 0,4-2,1) per Cryptosporidium spp. e 1,3% (95% CI 0,6-2,5%) per C. cayetanensis mentre la prevalenza per B. hominis è stata del 0,5% (95% CI 0,1-1,4%) e 0,2% (95% CI 0,0-0,9%) per D. fragilis. In totale, utilizzando sia microscopia che strumenti molecolari, il 4,2% (95% CI 2,6-6,2%) dei campioni era contaminato da almeno 1 specie di protozoo e 0,6% (95% CI 0,2-1,6%) di questi era contaminato da almeno due specie. Il numero di oocisti per T. gondii e C. cayetanensis nei campioni test-positivi qPCR è stato stimato da 62 a 554 e da 46 a 1.580 per g di prodotto vegetale rispettivamente. Il presente lavoro di dottorato rappresenta il primo studio su larga scala sulla presenza di protozoi in insalate confezionate in Europa. I risultati mostrano che la prevalenza delle specie di protozoi nelle insalate RTE è una causa di preoccupazione per la salute umana in Europa e in particolare in Italia. In attesa dell'inclusione di questi protozoi nella legislazione europea e nazionale per ridurre i rischi di contaminazione nelle insalate RTE e ridurre al minimo la loro trasmissione alimentare, i nostri risultati indicano la necessità di ulteriori studi di sorveglianza sulle possibili fonti di contaminazione alimentare. I metodi di campionamento progettati in questa ricerca e i risultati ottenuti possono fornire la direzione per altri studi sorveglianza e il monitoraggio di prodotti freschi in altre aree. Inoltre, essi possono fornire la base per le linee guida sulla sicurezza alimentare, basate anche sul sistema HACCP, al fine di ridurre il rischio di contaminazione nelle insalate RTE e ridurre al minimo la trasmissione di malattie alimentari.
To investigate the prevalence of protozoan contamination by Giardia duodenalis, Cryptosporidium spp., Toxoplasma gondii and Cyclospora cayetanensis, in ‘ready to eat’ (RTE) salads on sale in Italy, 648 packages from industrial and local brands were purchased. Nine individual packages from each brand were collected per month, pooled and subjected to microscopy and molecular analyses. 864 slides were microscopically examined and Cryptosporidium spp. and also Blastocystis hominis and Dientamoeba fragilis were detected. By molecular tools G. duodenalis assemblage A, Cryptosporidium parvum and Cryptosporidium ubiquitum, T. gondii Type I and C. cayetanensis were identified. B. hominis and D. fragilis were also molecularly confirmed. The overall prevalence of each protozoan species was 0.6% for G. duodenalis, 0.8% for T. gondii, 0.9% for Cryptosporidium spp., and 1.3% for C. cayetanensis, whereas the prevalence of B. hominis and D. fragilis were 0.5% and 0.2%, respectively. By microscopy and/or molecular tools, 4.2% of the samples were contaminated by at least one protozoan species, and 0.6% of them showed contamination of two protozoan species with a range number of oocysts from 62 to 554 per g of vegetable for T. gondii, and 46 to 1.580 for C. cayetanensis. This is the Europe’s first large-scale study on the presence of protozoans in packaged salads. The results show that the prevalence of protozoan species in RTE salads is a cause for concern about human health in Europe, and in particular in Italy. Pending the inclusion of protozoan parasites in EU and Italian legislation to reduce the risks of RTE contamination and minimize their foodborne transmission, our results indicate the need for additional surveillance studies of possible sources of food contamination. The sampling methods designed in this research and the results obtained can provide the direction for monitoring fresh produce in other areas, and for surveillance studies on products. In addition, they can provide the basis for food safety guidelines, based also on the HACCP system, in order to reduce the risk of RTE contamination and to minimize foodborne disease transmission
38

Feliciano, Lizanel. "The efficacy of ware-washing protocols for removal of foodborne viruses from utensils in restaurants and food service establishments". The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345432152.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Torrent-Moreno, Marc [Verfasser]. "Inter-vehicle communications : achieving safety in a distributed wireless environment ; challenges, systems and protocols / Universität Karlsruhe (TH), Institut für Telematik. Marc Torrent Moreno". Karlsruhe : Univ.-Verl. Karlsruhe, 2007. http://d-nb.info/985817410/34.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Böhm, Annette, Magnus Jonsson e Elisabeth Uhlemann. "Adaptive Cooperative Awareness Messaging for Enhanced Overtaking Assistance on Rural Roads". Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16467.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Cooperative traffic safety applications such as lane change or overtaking assistance have the potential to reduce the number of road fatalities. Many emerging traffic safety applications are based on IEEE 802.11p and periodic position messages, so-called cooperative awareness messages (CAM) being broadcasted by all vehicles. In Europe, ETSI defines a periodic report rate of 2 Hz for CAMs. Although a high report rate is the key to early hazard detection, the 2 Hz rate has been chosen to avoid congestion in settings where the vehicle density is high, e.g., on major highways and in urban scenarios. However, on rural roads with a limited number of communicating vehicles, a report rate of 2 Hz leads to unnecessary delay in cooperative awareness. By adapting the CAM report rate depending on the specific application and road traffic density, and by making use of the priority levels provided by the 802.11p quality of service mechanism, we show that hazards can be detected earlier and the available bandwidth is used more efficiently, while not overexploiting the network resources.

©2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Category number CFP11VTF-ART; Code 87844

41

Dal, Pozzo Monique Junges. "Educação permanente em saúde: Estratégia para implantar protocolos de segurança do paciente em um hospital público". Universidade do Vale do Rio dos Sinos, 2014. http://www.repositorio.jesuita.org.br/handle/UNISINOS/3911.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Submitted by William Justo Figueiro (williamjf) on 2015-06-16T22:55:36Z No. of bitstreams: 1 25.pdf: 1986648 bytes, checksum: 2a0ccf033f8c13466acd5aaba5b4995c (MD5)
Made available in DSpace on 2015-06-16T22:55:36Z (GMT). No. of bitstreams: 1 25.pdf: 1986648 bytes, checksum: 2a0ccf033f8c13466acd5aaba5b4995c (MD5) Previous issue date: 2014
Nenhuma
A aplicação de Protocolos Assistenciais de Cuidado em Enfermagem (PACE) busca qualificar as práticas de cuidado, e para isso, a Educação Permanente em Saúde (EPS) é utilizada como uma ferramenta educativa, no sentido de promover o conhecimento sobre segurança do paciente. Objetivos: Implantar no Hospital Universitário de Canoas - RS (HU), os PACE adotados na Rede Mãe de Deus, com vistas ao processo de certificação; verificar como os técnicos vivenciam a aplicação dos PACE identificar contribuições que os PACE podem trazer para o HU; propor um plano de EPS com vistas à aplicação dos PACE. Método: Estudo desenvolvido com dez técnicos de enfermagem, do tipo exploratório-descritivo, enfoque qualitativo. Resultados: Dos Grupos Focais emergiram categorias: interferência da infraestrutura do hospital na assistência de enfermagem; interferência do trabalho desenvolvido pela equipe de enfermagem na assistência ao paciente; EPS como transformadora no cotidiano de trabalho da equipe de enfermagem; elaboração de uma ferramenta que favorece a aplicação das Metas Internacionais de Segurança, e um plano de sugestão de EPS com vistas à aplicação dos PACE. Conclusão: o Estudo servirá de guia para implantar melhorias na prática assistencial. Existem dificuldades, mas os processos de trabalho que dependem das pessoas estão ocorrendo.
The Application of Nursing Care Protocols (NCP) seeks to qualify the care practices, and for this, the Permanent Health Education (PHE) is used as a working tool, to promote knowledge about patient safety. Objectives: Implement in Hospital Universitário de Canoas - RS (HU), NCPs adopted in Network Mãe de Deus, with view to certification process; verify how technical team identifies the application od NCPs; identify contributions that NCPs may bring to HU; propose a PHE plan towards the implementation of NCP. Method: Study conducted with ten practical nurses, exploratory-descriptive, qualitative approach. Results: From the focus groups, categories were emerged: interference of the hospital infrastructure in nursing care; interference of nursing staff work in patient care; PHE as a modifier in the daily work of the nursing staff; development of a tool that promotes the implementation of the International Safety Goals and a PHE cue plan towards the implementation of NCPs. Conclusion: This study will serve as a guide to implement improvements in care practice. There are difficulties, but the work processes that depend on people are happening.
42

Vieira, Débora Feijó Villas Boas. "Implantação de protocolo de prevenção da pneumonia associada à ventilação mecânica : impacto do cuidado não farmacológico". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2009. http://hdl.handle.net/10183/18777.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Contextualização: Na última década, houve um grande crescimento de ações de melhoria da qualidade assistencial e de promoção da segurança do paciente, com objetivo de diminuir a ocorrência de desfechos preveníveis, como a pneumonia associada à ventilação mecânica (PAVM). Embora existam várias diretrizes clínicas, ainda não há evidências suficientes para um consenso quanto aos cuidados não farmacológicos de prevenção (CNFP) a serem implantados e sua contribuição na redução da PAVM. Objetivos: Avaliar o impacto da implantação de CNFP na ocorrência da PAVM. Métodos: O estudo foi realizado com pacientes adultos, submetidos à ventilação mecânica (VM) por mais de 48 horas, internados em centro de tratamento intensivo clínico e cirúrgico, de 34 leitos. No primeiro artigo, é descrito um quase experimento com controles históricos, realizado no período de setembro de 2004 (pré-intervenção -20 meses) a dezembro 2007 (pós-intervenção – 20 meses). Constou do experimento a implantação do protocolo de prevenção da PAVM, com cuidados não farmacológicos. No segundo artigo, é descrito um estudo de coorte prospectiva de pacientes submetidos à VM no período de junho de 2006 a julho de 2007. Entre as onze medidas preventivas que fazem parte da rotina de cuidados, foram escolhidas seis para serem examinadas na rotina assistencial de pacientes submetidos à VM: manutenção da cabeceira elevada (HOB) de 30º a 45º; manutenção do circuito de VM (CVM) sem condensação e sujidade; manutenção de trocadores de umidade e calor (HME); monitorização da pressão do balonete (PB) do tubo endotraqueal entre 18 mmHg a 25 mmHg; realização da higiene oral (HO) e realização fisioterapia respiratória (FR). Estabeleceu-se um ponto de corte de 80% para adesão aos cuidados de prevenção. Considerou-se o CNFP como adequado quando, durante a internação, o paciente foi observado em frequência, igual ou maior de 80%. Resultados: No primeiro estudo, foram diagnosticados 367 episódios de PAVM durante os 40 meses, em um total de 20285 dias de ventilação mecânica. A taxa de PAVM baixou em 28,7%, ou seja, de 20,6 casos por 1.000 dias de ventilação no período pré-intervenção para 16 casos por 1.000 dias de ventilação nos 20 meses seguintes à intervenção (P<0,001). Na análise de regressão segmentada verificou-se uma redução abruta de nível significativa do desfecho (t = -2,506; p= 0,017), mas não foi observado uma redução de tendência significativa do desfecho (t= -1,670; p= 0,104). No segundo estudo, a adesão aos seis CNFP foi aferida em 5.781 observações, em 541 internações de pacientes submetidos à ventilação mecânica, com 111 casos de PAVM. Nas internações em que os pacientes receberam cuidados adequados de prevenção, houve redução na ocorrência de PAVM de 61% para a FR (OR=0,39; IC95%= 0,18 a 0,84); 43% para a HOB (OR=0,57; IC95%= 0,31 a 0,99). Houve interação entre HO e PB, com uma redução da razão de chances de 56% para HO (OR=0,44; IC95%= 0,24 a 0,82) e 58% para PB (OR=0,42; IC95%= 0,21 a 0,85). Na ausência de um desses dois cuidados, o outro presente passa a ser fator de risco. Estimouse a fração de risco atribuível para não realização de FR, HO, monitorização PB e manutenção da HOB em frequência adequada, implicando a ocorrência de, respectivamente, 49% (IC95%= 13% a 65%), 29% (IC95%= 9% a 39%), 32% (IC95%= 8% a 44%) e 9% (IC95%= 0% a 13%) das PAVM. Conclusão: Os cuidados de prevenção da PAVM implantados mostraram-se medidas tecnologicamente simples, exequíveis em qualquer realidade e de baixo custo, possibilitando redução no desenvolvimento de PAVM e aumento na segurança do paciente.
Context: In the past decade there has been a large increase in the number of measures aimed at improving service quality and promoting patient safety. Most of these measures have been aimed at reducing the incidence of preventable iatrogenic morbidities such as ventilator-associated pneumonia (VAP). While related clinical guidelines do exist, there is still little evidence to indicate which of the many non-pharmacological preventive care (NPPC) measures provide the best protection against VAP. Objectives: To evaluate the impact of NPPC interventions on the incidence of VAP. Methods: The population represented in this study are adult, intensive care patients, admitted without pneumonia, which required mechanical ventilation (MV) for at least 48 hours. The 34 bed intensive care center clinic and surgical is part of a public, university hospital in Porto Alegre, Brazil. The first article describes a quasi-experimental study done during the 40 months between September, 2004 and December, 2007. Halfway through this period a non-pharmacological, VAP prevention protocol was introduced to the routine care intubated patients. As such the control group are those patient treated prior to introduction of the protocol and the experimental group, those patients treated after its introduction. The second article describes a prospective study of cohort of patients requiring mechanical ventilation between June, 2006 and July 2007. Of the 11 NPPC interventions that make up the protocol, 6 were selected for this study: maintaining the head-of-bed elevation between 30º and 45º (HOB), maintaining the mechanical ventilation circuit (MVC) clean and dry, maintaining the heat moisture exchange (HME) equipment; maintaining endotracheal tube cuff pressure (CP) between 18 and 25 mmHg, realizing oral hygiene (OH) and doing respiratory physiotherapy (RP). These interventions were audited, for each patient during their entire length of stay, to measure compliance with the protocol. For each non-pharmacological preventive intervention, any patient receiving ≥8O% of the recommended frequency of care was considered to have received that intervention. Results: During a total of 20285 days of MV, 367 cases of VAP were diagnosed. The incidence of VAP fell 28.7% (p<0.001), between the 20 month pre-intervention period (20.6 cases/1.000 MV days) and the 20 month post-intervention periods (16 cases/1.000 MV days). In the analysis of segmented regression there was a significant abrupt reduction in the level of outcome (t = - 2.506; p=0.017), but reduction of tendency of the outcome was not significant (t= - 1.670; p= 0.104). In the second study compliance with the 6 non-pharmacological preventive interventions was measure by means of 5.781 observations in 541 patients of whom 111 developed VAP. Patients that received ≥8O% of the recommended frequency of a specific intervention exhibited a reduction in the risk of developing VAP: 61% for RP (OR= 0.39; CI95%= 0.18 to 0.84); 43% for HOB (OR= 0.57; CI95%= 0.31 to 0.99); 56% for OH (OR= 0.44; CI95%= 0.24 to 0.82) and 58% for CP (OR= 0.42; CI95%= 0.21 to 0.85). OH and CP maintenance are interdependent. In the absence of the other intervention each goes from being protective to being a risk factor. The VAP risk attributable to non-compliance in each of RP, OH, CP and HOB is estimated to be: 49% (CI95%= 13% to 65%), 29% (CI95%= 9% to 39%), 32% (CI95%= 8% to 44%) and 9% (CI95%= 0% to 13%) respectively. Conclusion: NPPC interventions are technologically simple, low cost that, in combination, provide a patient security and substantial level of protection against VAP.
43

Stinson, Jill D., Lee Ann McVay e Judith V. Becker. "Post-hospitalization Outcomes for Psychiatric Sex Offenders: Comparing Two Treatment Protocols". Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/7875.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This study evaluates the effectiveness of safe offender strategies (SOS) in comparison with relapse prevention (RP) in a sample of 91 inpatient males in a secure psychiatric setting. All men evidenced a history of violent sexual offending and were diagnosed with serious psychiatric disorders and/or intellectual disabilities. Participants who received SOS (n = 58) and RP (n = 33) were followed from 6 to 36 months post release. SOS clients were significantly less likely to be arrested (0%) or rehospitalized (5.2%) than RP clients (9% arrested; 54.5% rehospitalized). In addition, SOS clients were more likely to transition continuously to less restrictive alternatives, with no returns to high security, in comparison with RP clients. The authors discuss implications for use of SOS, a treatment that facilitates skills development and affects global self-regulatory functioning, particularly in sex offenders with serious mental illness or intellectual impairment, in promoting community reintegration and limiting returns to psychiatric settings.
44

Camargo, André Bueno de. "Protocolos de segurança do paciente: proposta de um recurso educacional informatizado". Universidade Federal de São Carlos, 2013. https://repositorio.ufscar.br/handle/ufscar/3268.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Made available in DSpace on 2016-06-02T19:48:24Z (GMT). No. of bitstreams: 1 5953.pdf: 12194817 bytes, checksum: 9d4c0fe48cb9edd4e8d90f03a3293eea (MD5) Previous issue date: 2013-12-20
This study aimed to develop a computerized educational resource on Patient Safety, and propose a Choosing Priorities in Education Service Tool, which give rise to a questionnaire rank the educational actions which should be priority. The creation of this resource was marked in Planning Learning Activities Supported by Computers, which is a methodology for developing educational content supported by computer. Evaluated the technical quality and usability of the resource based on the scale SUS (System Usability Scale), which quickly evaluates the usability of systems. The feature that prioritizes the educational measures was evaluated positively, can turn into a powerful educational tool in nursing education.
Este estudo objetivou desenvolver um recurso educacional informatizado sobre Segurança do Paciente, além de propor uma Ferramenta de Escolha de Prioridades de Educação em Serviço (FEPES), que originará um questionário para elencar as ações educativas que deverão ser prioritárias. A criação deste recurso foi pautada no Planejamento de Atividades de Aprendizado Apoiadas por Computador, sendo esta uma metodologia para o desenvolvimento de conteúdos educacionais apoiados por computador. Avaliou-se a qualidade técnica e a usabilidade do recurso baseouse na escala SUS (System Usability Scale), que avalia de forma rápida a usabilidade de sistemas. O recurso que prioriza as ações educativas foi avaliado positivamente, podendo transformar-se em uma ferramenta educacional potente no ensino de enfermagem.
45

Pereira, Filho José Ilo. "Protocolo para integração de requisitos de saúde e segurança do trabalho ao processo de desenvolvimento do produto da construção civil (PISP)". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2011. http://hdl.handle.net/10183/31394.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Desde a década de 90 o conceito de design for safety (DFS) vem sendo difundido como meio de reduzir os acidentes do trabalho com causas oriundas nas características do projeto do produto. A utilização do DFS na indústria da construção civil desperta o interesse de vários pesquisadores, mas ainda é pequena e conta com uma lacuna entre o conceito e a aplicação do mesmo. Assim, o objetivo deste trabalho consiste em propor um protocolo para integração de requisitos de segurança no trabalho ao processo de desenvolvimento do produto – PISP, com vistas a auxiliar engenheiros e arquitetos a desenvolver projetos seguros para os usuários temporários das edificações (trabalhadores de construção e manutenção). O método de pesquisa envolveu a realização de três estudos de caso: um empreendimento residencial, um industrial e um hospitalar, executados nas cidades da região central do estado RS, respectivamente, formaram o objeto de análise. A integração de requisitos de saúde e segurança do trabalho (SST) ao processo de desenvolvimento do produto (PDP), foi a unidade de análise deste trabalho. O protocolo inclui quatro etapas: identificação de perigos, avaliação de riscos, identificação de requisitos e avaliação e registro do aprendizado. Sua aplicação no desenvolvimento de projetos favorece o trabalho colaborativo entre os envolvidos no PDP, sendo recomendado sua incorporação ao processo de engenharia simultânea ou ao desenvolvimento integrado de produtos, no entanto, é adaptável a qualquer método de PDP adotado pela empresa construtora ou projetista. O estudo constatou que a integração de requisitos de SST desde as fases iniciais do PDP é viável e mais consistente do que quando realizada na fase de projeto ou reprojeto, como sugere o conceito tradicional de DFS.
Since 1990s, the concept design for safety (DFS) has been diffused as way of to reduce the accidents in construction site with causes derived of the characteristics of design. The utilization of DFS in the construction industry awakes the interest of several researches, but yet is low and has a gap between the concept and the application. So, the target this work is to propose a protocol for integration of health and safety work requirements at product development process (PISP), as way of to help engineers and architects to develop safe designs for temporary users of building (workers of construction and maintenance). The research method involved the realization of three cases: a residential undertaking, an industrial and a clinical, was the analysis object. The integration of health and safety work requirements at product development process was analysis unit this work. The protocol has four stages: identification of hazards, assessment of risks, identification of requirements and assessment and register of learning. The application in the development of designs allow the collaborative work between the participants of product development process (PDP), been recommended for incorporation at concurrent engineering process or at integrated development product, however, is adaptive at some method of development of product adopted by designer . The study verified that the integration of health and safety requirements since the early stages of PDP is viable and more solid that when made in design or redesign stages, as suggest the traditional concept of DFS.
46

Bodri, Daniel. "GNRH antagonists in oocyte donor cycles: the key to safe, simple and efficient stimulation protocols". Doctoral thesis, Universitat Autònoma de Barcelona, 2011. http://hdl.handle.net/10803/32068.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Introducción: Desde su primera descripción en 1984 las indicaciones de donación de óvulos han ido aumentando, lo que ha provocado un incremento progresivo en el número de ciclos realizados a nivel mundial. Aunque esta técnica de reproducción garantiza una elevada tasa de embarazo en la receptora, los profesionales también se esfuerzan en convertir el tratamiento para la donante en un proceso sencillo y seguro. Durante los últimos diez años los antagonistas de la GnRH, por sus características farmacodinámicas, ha sido el fármaco utilizado para desarrollar protocolos de estimulaciones ováricas sencillos y seguros para las donantes de óvulos. Materiales: La presente tesis doctoral resume las conclusiones de dos artículos publicados recientemente (2010) sobre la utilización de antagonistas de GnRH en la estimulación ovárica de donantes de óvulos. Además se discuten las conclusiones de otros cuatro artículos (publicados en revistas científicas de impacto durante los años 2006 y 2009) estrechamente relacionados a los aquí publicados. Los objetivos de esta tesis son: 1. comparar la eficacia de protocolos de estimulación basados en antagonistas de GnRH en comparación con protocolos basados en agonistas de GnRH a través de una revisión sistemática de la literatura y meta-análisis. 2. ilustrar que los protocolos de estimulación basados en antagonistas de GnRH aumentan la seguridad de la estimulación ovárica para la donante a través de una eliminación completa del riesgo del síndrome de hiperestimulación ovárica (SHO). Resultados: 1. El meta-análisis de de ocho ensayos clínicos llevados al cabo en donantes de óvulos estimuladas con antagonistas de GnRH no han demostrado diferencia significativa en el número de ovocitos obtenidos y las tasas de embarazo evolutivos en las receptoras correspondientes en comparación con agonistas de GnRH. 2. El estudio observacional, prospectivo realizado en donantes de óvulos de alto riesgo ha demostrado la eliminación completa de SHO moderado/severo tras la descarga con bolo de agonista de GnRH. Además se discuten las conclusiones de cuatro otros estudios apoyando las conclusiones mencionados arriba. Conclusiones: En el contexto de la donación de óvulos los protocolos de estimulación ovárica basados en antagonistas de la GnRH son igual de eficaces que los protocolos con agonistas de la GnRH. La inducción final de la maduración ovocitaria se puede llevar a cabo satisfactoriamente con un bolo de agonista de GnRH en vez de hCG, lo que prácticamente elimina el riesgo de SHO moderado/severo. La utilización preferencial de este protocolo de estimulación ovárica es muy aconsejable porque permite un tratamiento más sencillo y aumenta considerablemente la seguridad de la estimulación ovárica en donantes de óvulos.
Background: Since its first description in 1984 the indications of oocyte donation (OD) has widened considerably which has led to a continuous increase in the number of OD treatment cycles performed worldwide. Although this treatment option secured the highest pregnancy rates for the recipients of donor oocytes increased efforts were also made to achieve safer and simpler treament protocols for the oocyte donor. During the last decade with the advent and increased use of the GnRH antagonists this new pharmacological agent was also explored in ovarian stimulation protocols specifically tailored for oocyte donors. Materials: The present doctoral thesis summarizes the findings of two recently published articles (2010) on the application of GnRH antagonists in the ovarian stimulation of oocyte donors. Furthermore the findings of another four strictly related articles (published in high-impact international journals between 2006 and 2009) are also discussed. The primary objectives were: 1. to compare efficiency of GnRH antagonist protocols in comparison with GnRH agonist-based protocols in the context of oocyte donation by means of a systematic review and meta-analysis and 2. to illustrate that GnRH antagonist protocols substantially increase the safety of ovarian stimulation for oocyte donors by reducing or even eliminating the incidence of moderate/severe ovarian hyperstimulation syndrome (OHSS). Results: 1. A meta-analysis of eight randomized clinical trials (RCTs) performed in oocyte donors undergoing stimulation with GnRH antagonists showed no significant difference in the number of retrieved oocytes or recipient ongoing pregnancy rate when compared with GnRH agonists. 2. A prospective, follow-up study of a group of high risk oocyte donors showed that early onset moderate/severe OHSS was completely eliminated after triggering with a GnRH agonist. Furthermore the findings of four studies supporting the above conclusions are also presented. Conclusions: In the context of oocyte donation the GnRH antagonist based ovarian stimulation protocols are equally efficient compared to down regulation by GnRH agonists. The induction of final oocyte maturation can be successfully achieved by a GnRH agonist instead of hCG which practically eliminates early-onset moderate/severe OHSS. The proposed ovarian stimulation protocol should be preferentially used because it permits the simplification and considerably increases the safety of ovarian stimulation for oocyte donors.
47

Hadded, Mohamed. "Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs)". Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0023/document.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Les accidents routiers et leurs dommages représentent un problème croissant dans le monde entier. Dans ce contexte, les réseaux véhiculaires (VANETs) peuvent être déployés pour réduire les risques et pour améliorer le confort. Ils permettent aux véhicules d'échanger différents types de données qui vont des applications de sécurité et de gestion du trafic aux applications de confort. De nos jours, les applications de sécurité sont l’objet de beaucoup d'attention des chercheurs ainsi que des fabricants d'automobiles. Dans cette thèse, nous étudierons les applications critiques pour la sécurité routière visant à fournir une assistance dans des situations dangereuses ou difficiles. Notre objectif principal sera de proposer de nouveaux protocoles de contrôle d'accès au support de transmission (MAC) et de routage, qui peuvent s’adapter dynamiquement aux changements fréquents de topologies des VANETs. Après un aperçu des protocoles d’accès sans contention dans les VANETs, nous proposons des solutions basées sur la technique de division du temps: Time Division Multiple Access (TDMA). D’abord, nous nous concentrons sur le développement d’un nouveau protocole distribué (DTMAC), qui ne repose pas sur l’utilisation d’infrastructure. DTMAC utilise les informations de localisation et un mécanisme de réutilisation des slots pour assurer que les véhicules accèdent au canal efficacement et sans collision. Les résultats obtenus ont confirmé l’efficacité de notre protocole, DTMAC se comporte très significativement mieux que VeMAC (protocole MAC basé sur TDMA.) Ensuite nous proposons TRPM, un protocole de routage basé sur une approche cross-layer. Dans TRPM, l’ordonnancement des slots TDMA construit par DTMAC et la position de la destination sont utilisés pour choisir le meilleur relais. Les résultats montrent que TRPM offre de meilleures performances, du nombre moyen de relais et de la fiabilité de livraison des messages comparé à d’autres protocoles. Dans la deuxième partie de cette thèse, nous nous focaliserons sur les mécanismes centralisés d’allocation de slots qui utilisent des coordinateurs. D’abord, nous proposons CTMAC, un protocole basé sur TDMA centralisé utilisant les RSUs (RoadSide Units) pour créer et maintenir les ordonnancements. CTMAC met en œuvre un mécanisme qui permet d’empêcher les “Access Collisions” de se produire plus que deux fois entre les véhicules qui tentent d’acquérir un même slot disponible. Les résultats ont montré que CTMAC permet de mieux minimiser les collisions, ainsi que le surcoût généré pour créer et maintenir les ordonnancements par rapport aux protocoles MAC, basés sur TDMA distribué. Cependant, dans CTMAC, les véhicules roulant vite devront acquérir des nouveaux slots après une courte période de temps à chaque fois qu’ils quittent les zones de leurs RSUs courants. Cette situation rend les protocoles centralisés inefficaces et couteux dans les réseaux à grande vitesse. Afin de pallier à ce problème inhérent à l’utilisation des RSUs, nous adaptons un algorithme d’ordonnancement basé sur le clustering dans lequel certains véhicules sont élus pour gérer l'accès au canal. Ceci permet aux véhicules de rester attachés à leurs clusters plus longtemps. Pour ce faire, nous proposons 1- un protocole de clustering nommé AWCP afin de former des clusters stables avec une longue durée de vie. AWCP est basé sur l’algorithme de clustering pour les réseaux mobiles WCA dans lequel les têtes des clusters sont élues en se basant sur une fonction de poids. 2- Nous formulons le réglage des paramètres de protocole AWCP comme un problème d’optimisation multi-objective et nous proposons un outil d’optimisation qui combine la version multi-objective de l’algorithme génétique appelé NSGA-II avec le simulateur de réseau ns-2 pour trouver les meilleurs paramètres du protocole AWCP. 3- Nous proposons ASAS, une stratégie adaptative pour l’attribution des slots temporels basée sur une approche cross-layer entre TDMA et AWCP
Road crashes and their damages represent a serious issue and are one of the main causes of people death. In this context, Vehicular Ad hoc NETworks (VANETs) are deployed to reduce the risk of road accident as well as to improve passengers’ comfort by allowing vehicles to exchange different kinds of data which ranges widely from road safety and traffic management to infotainment. Nowadays, safety applications are receiving a great deal of attention from researchers as well as from automobile manufacturers. In this thesis, we particularly focus on safety-critical applications, designed to provide drivers assistance in dangerous situations and to avoid accidents in highway environments. Such applications must guarantee to the vehicles access to the medium and have strict requirements regarding end-to-end delay and packet loss ratio. Therefore, our main goal is to propose new medium access control and routing protocols, which can efficiently adapt to frequent changing VANET network topologies. After a comprehensive overview of free-contention MAC protocols, we propose several solutions, based on Time Division Multiple Access Technique (TDMA). We have designed DTMAC, a fully distributed TDMA-based MAC protocol, which does not rely on an expensive infrastructure. DTMAC uses vehicles’ locations and a slot reuse concept to ensure that vehicles in adjacent areas have collision-free schedule. Using simulations, we prove that DTMAC provides a lower rate of access and merging collisions than VeMAC, a well-known TDMA based MAC protocol in VANET. Then, in order to ensure that event-driven safety messages can be sent over a long distance, we propose TRPM, a TDMA aware Routing Protocol for Multi-hop communication. Our routing scheme is based on a cross layer approach between the MAC and the routing layers, in which the intermediate vehicles are selected using TDMA scheduling information. Simulation results show that TRPM provides better performances in terms of average end-to-end delay, average number of hops and average delivery ratio. In the second part, we focus on coordinator-based TDMA scheduling mechanisms. First, we propose the Centralized TDMA based MAC protocol (CTMAC) which uses Road Side Units (RSUs) as a central coordinator to create and maintain the TDMA schedules. CTMAC implements an Access Collision Avoidance mechanism that can prevent the access collision problem occurring more than twice between the same vehicles that are trying to access the channel at the same time. Using simulation we show an improvement in terms of access and merging collisions as well as the overhead required to create and maintain the TDMA schedules compared to distributed scheduling mechanisms. However, in the CTMAC protocol, fast moving vehicles will need to compete for new slots after a short period of time when they leave their current RSU area, which makes a centralized scheduling approach very expensive. In order to further improve the performance of coordinator-based TDMA scheduling mechanisms, we focus on cluster-based TDMA MAC protocols in which some vehicles in the network are elected to coordinate the channel access, allowing the vehicles to remain connected with their channel coordinator for a longer period of time. To this end, first we propose an adaptive weighted clustering protocol, named AWCP, which is road map dependent and uses road IDs and vehicle directions to make the clusters’ structure as stable as possible. Then, we formulate the AWCP parameter tuning as a multi-objective problem and we propose an optimization tool to find the optimal parameters of AWCP to ensure its QoS. Next, we propose ASAS, an adaptive slot assignment strategy for a cluster-based TDMA MAC protocol. This strategy is based on a cross layer approach involving TDMA and AWCP. The objective is to overcome the inter-cluster interference issue in overlapping areas by taking into account vehicles’ locations and directions when the cluster head assign slots
48

Oliveira, Edinaldo Silva de. "Avaliação estatística e protocolo para uso de cateter central de inserção periférica na oncohematologia". Universidade Tecnológica Federal do Paraná, 2017. http://repositorio.utfpr.edu.br/jspui/handle/1/2582.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
O Cateter Central de Inserção Periférica (PICC) constitui-se de dispositivo intravenoso, instalado através de uma veia periférica, que avança até a veia cava adquirindo características de cateter central. Neste sentido, o presente estudo teve como objetivo geral: identificar as condições de viabilidade para a definição de padrões e protocolos que possibilitem a utilização do PICC em pacientes adultos e pediátricos. E como objetivos específicos: analisar o desempenho da primeira e terceira geração de PICC em pacientes da oncohematologia comparando com a literatura internacional; detectar pontos sensíveis no contexto do uso do PICC para a proposição de protocolo; propor instrumento para a coleta e investigação de relevância de dados e variáveis; e propor protocolo de utilização do PICC para pacientes pediátricos e adultos. Trata-se de estudo descritivo exploratório observacional prospectivo longitudinal com abordagem quantitativa. A pesquisa foi desenvolvida na Unidade de Hemoterapia, Hematologia e Oncologia (UHHO) nos setores: Serviço de Transplante de Medula Óssea (STMO), Quimioterapia de Alto Risco (QTAR) e seus ambulatórios, Unidade de Terapia Intensiva (UTI) cardíaca, clínica médica e pediátrica, num hospital de ensino da região do sul do país. A amostra foi não-probabilística, por conveniência constituída de dois grupos, (Grupo 1) pacientes que utilizaram a primeira geração do PICC e (Grupo 2) pacientes que utilizaram a terceira geração do dispositivo. Os dados foram coletados no período de janeiro de 2015 a agosto de 2016 através de instrumento elaborado para este estudo, contendo 22 variáveis sócio-demográficas e 35 variáveis clínicas. 40 PICCs primeira geração foram inseridos em 36 pacientes por técnicas “às cegas”, totalizando 830 dias de cateter, média de 20,71 dias, tendo alcance mínimo de dois e máximo de 141 dias. Quanto à terceira geração do cateter, dez PICCs foram inseridos em dez pacientes por Técnica de Seldinger Modificada (TSM) guiados pelo Ultrassom (US), totalizando 397 dias de cateter, média de 39,7 dias com alcance mínimo de dez e máximo de 86 dias. Realizou-se análise descritiva por meio da distribuição de frequência absoluta, média e desvio padrão. Posteriormente, todas as variáveis foram analisadas pelo ‘Software R’, identificou-se 11 componentes principais que fortemente se relacionaram e constituíram a base do Modelo de Equações Estruturais (MEE). Estas variáveis expressam-se de maneira relevante para o desenvolvimento de investigações futuras. Em suma, o PICC pode ser utilizado com sucesso na maioria dos pacientes internados na oncohematologia e em outros setores no ambiente hospitalar, assim como em crianças. Pode ser inserido por enfermeiros, desonerando o ambiente cirúrgico, processo anestésico e o médico especialista, conferindo-lhes autonomia.
The Peripherally Inserted Central Catheter (PICC) consists of an intravenous device, installed through a peripheral vein, wich advanced to the vena cava acquiring central catheter characteristics. In this sense, the present study had as general objective: to identify the feasibility conditions for the definition of standards and protocols that allow the use of PICC in adult and pediatric patients. And as specific objectives: to analyze the performance of the first and third generation of PICC in oncohematology patients comparing with the international literature; to detect sensitive points in the context of the use of the PICC for the protocol proposal; propose an instrument for the collection and relevant investigation of data and variables; and to propose protocol of use of PICC for pediatric and adult patients. This is a descriptive prospective longitudinal observational exploratory study with a quantitative approach. The research was developed in the Hematology, Oncology and Hematology Unit (UHHO) in the following sectors: Bone Marrow Transplantation Service (STMO), High Risk Chemotherapy (QTAR) and its outpatient clinics, Intensive Care Unit (ICU), cardiac, medical clinic and pediatric in a teaching hospital in the southern region of the country. The sample was non-probabilistic, for convenience consisted of two groups, (Group 1) patients who used the first generation of PICC and (Group 2) patients who used the third generation of the device. Data were collected from January 2015 to August 2016 through an instrument developed for this study, containing 22 socio-demographic variables and 35 clinical variables. 40 firstgeneration PICCs were inserted in 36 patients by "blind" techniques, totaling 830 days of catheter, average of 20.71 days, with a minimum range of two and a maximum of 141 days. Regarding the third generation of the catheter, ten PICCs were inserted in ten patients by Ultrasound-guided Modified Seldinger Technique (TSM), totaling 397 days of catheter, mean of 39.7 days with a minimum range of ten and a maximum of 86 Days. A descriptive analysis was performed by means of the absolute frequency distribution, mean and standard deviation. Afterwards, all variables were analyzed by 'Software R', we identified 11 main components that were strongly related and formed the basis of the Structural Equations Model (MEE). These variables express themselves in a relevant way for the development of future investigations. In summary, PICC can be used successfully in most patients admitted to oncohematology and other sectors in the hospital setting, as well as in children. It can be inserted by nurses, discharging the surgical environment, anesthetic process and the specialist doctor, granting them autonomy.
49

Hadded, Mohamed. "Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs)". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0023.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Les accidents routiers et leurs dommages représentent un problème croissant dans le monde entier. Dans ce contexte, les réseaux véhiculaires (VANETs) peuvent être déployés pour réduire les risques et pour améliorer le confort. Ils permettent aux véhicules d'échanger différents types de données qui vont des applications de sécurité et de gestion du trafic aux applications de confort. De nos jours, les applications de sécurité sont l’objet de beaucoup d'attention des chercheurs ainsi que des fabricants d'automobiles. Dans cette thèse, nous étudierons les applications critiques pour la sécurité routière visant à fournir une assistance dans des situations dangereuses ou difficiles. Notre objectif principal sera de proposer de nouveaux protocoles de contrôle d'accès au support de transmission (MAC) et de routage, qui peuvent s’adapter dynamiquement aux changements fréquents de topologies des VANETs. Après un aperçu des protocoles d’accès sans contention dans les VANETs, nous proposons des solutions basées sur la technique de division du temps: Time Division Multiple Access (TDMA). D’abord, nous nous concentrons sur le développement d’un nouveau protocole distribué (DTMAC), qui ne repose pas sur l’utilisation d’infrastructure. DTMAC utilise les informations de localisation et un mécanisme de réutilisation des slots pour assurer que les véhicules accèdent au canal efficacement et sans collision. Les résultats obtenus ont confirmé l’efficacité de notre protocole, DTMAC se comporte très significativement mieux que VeMAC (protocole MAC basé sur TDMA.) Ensuite nous proposons TRPM, un protocole de routage basé sur une approche cross-layer. Dans TRPM, l’ordonnancement des slots TDMA construit par DTMAC et la position de la destination sont utilisés pour choisir le meilleur relais. Les résultats montrent que TRPM offre de meilleures performances, du nombre moyen de relais et de la fiabilité de livraison des messages comparé à d’autres protocoles. Dans la deuxième partie de cette thèse, nous nous focaliserons sur les mécanismes centralisés d’allocation de slots qui utilisent des coordinateurs. D’abord, nous proposons CTMAC, un protocole basé sur TDMA centralisé utilisant les RSUs (RoadSide Units) pour créer et maintenir les ordonnancements. CTMAC met en œuvre un mécanisme qui permet d’empêcher les “Access Collisions” de se produire plus que deux fois entre les véhicules qui tentent d’acquérir un même slot disponible. Les résultats ont montré que CTMAC permet de mieux minimiser les collisions, ainsi que le surcoût généré pour créer et maintenir les ordonnancements par rapport aux protocoles MAC, basés sur TDMA distribué. Cependant, dans CTMAC, les véhicules roulant vite devront acquérir des nouveaux slots après une courte période de temps à chaque fois qu’ils quittent les zones de leurs RSUs courants. Cette situation rend les protocoles centralisés inefficaces et couteux dans les réseaux à grande vitesse. Afin de pallier à ce problème inhérent à l’utilisation des RSUs, nous adaptons un algorithme d’ordonnancement basé sur le clustering dans lequel certains véhicules sont élus pour gérer l'accès au canal. Ceci permet aux véhicules de rester attachés à leurs clusters plus longtemps. Pour ce faire, nous proposons 1- un protocole de clustering nommé AWCP afin de former des clusters stables avec une longue durée de vie. AWCP est basé sur l’algorithme de clustering pour les réseaux mobiles WCA dans lequel les têtes des clusters sont élues en se basant sur une fonction de poids. 2- Nous formulons le réglage des paramètres de protocole AWCP comme un problème d’optimisation multi-objective et nous proposons un outil d’optimisation qui combine la version multi-objective de l’algorithme génétique appelé NSGA-II avec le simulateur de réseau ns-2 pour trouver les meilleurs paramètres du protocole AWCP. 3- Nous proposons ASAS, une stratégie adaptative pour l’attribution des slots temporels basée sur une approche cross-layer entre TDMA et AWCP
Road crashes and their damages represent a serious issue and are one of the main causes of people death. In this context, Vehicular Ad hoc NETworks (VANETs) are deployed to reduce the risk of road accident as well as to improve passengers’ comfort by allowing vehicles to exchange different kinds of data which ranges widely from road safety and traffic management to infotainment. Nowadays, safety applications are receiving a great deal of attention from researchers as well as from automobile manufacturers. In this thesis, we particularly focus on safety-critical applications, designed to provide drivers assistance in dangerous situations and to avoid accidents in highway environments. Such applications must guarantee to the vehicles access to the medium and have strict requirements regarding end-to-end delay and packet loss ratio. Therefore, our main goal is to propose new medium access control and routing protocols, which can efficiently adapt to frequent changing VANET network topologies. After a comprehensive overview of free-contention MAC protocols, we propose several solutions, based on Time Division Multiple Access Technique (TDMA). We have designed DTMAC, a fully distributed TDMA-based MAC protocol, which does not rely on an expensive infrastructure. DTMAC uses vehicles’ locations and a slot reuse concept to ensure that vehicles in adjacent areas have collision-free schedule. Using simulations, we prove that DTMAC provides a lower rate of access and merging collisions than VeMAC, a well-known TDMA based MAC protocol in VANET. Then, in order to ensure that event-driven safety messages can be sent over a long distance, we propose TRPM, a TDMA aware Routing Protocol for Multi-hop communication. Our routing scheme is based on a cross layer approach between the MAC and the routing layers, in which the intermediate vehicles are selected using TDMA scheduling information. Simulation results show that TRPM provides better performances in terms of average end-to-end delay, average number of hops and average delivery ratio. In the second part, we focus on coordinator-based TDMA scheduling mechanisms. First, we propose the Centralized TDMA based MAC protocol (CTMAC) which uses Road Side Units (RSUs) as a central coordinator to create and maintain the TDMA schedules. CTMAC implements an Access Collision Avoidance mechanism that can prevent the access collision problem occurring more than twice between the same vehicles that are trying to access the channel at the same time. Using simulation we show an improvement in terms of access and merging collisions as well as the overhead required to create and maintain the TDMA schedules compared to distributed scheduling mechanisms. However, in the CTMAC protocol, fast moving vehicles will need to compete for new slots after a short period of time when they leave their current RSU area, which makes a centralized scheduling approach very expensive. In order to further improve the performance of coordinator-based TDMA scheduling mechanisms, we focus on cluster-based TDMA MAC protocols in which some vehicles in the network are elected to coordinate the channel access, allowing the vehicles to remain connected with their channel coordinator for a longer period of time. To this end, first we propose an adaptive weighted clustering protocol, named AWCP, which is road map dependent and uses road IDs and vehicle directions to make the clusters’ structure as stable as possible. Then, we formulate the AWCP parameter tuning as a multi-objective problem and we propose an optimization tool to find the optimal parameters of AWCP to ensure its QoS. Next, we propose ASAS, an adaptive slot assignment strategy for a cluster-based TDMA MAC protocol. This strategy is based on a cross layer approach involving TDMA and AWCP. The objective is to overcome the inter-cluster interference issue in overlapping areas by taking into account vehicles’ locations and directions when the cluster head assign slots
50

Oliveira, Junior Maurício Lauro de. "Segurança do paciente: análise da adequação da prescrição em um hospital de ensino em relação ao protocolo do Ministério da Saúde". Niterói, 2017. https://app.uff.br/riuff/handle/1/5004.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Submitted by Ana Lúcia Torres (bfmhuap@gmail.com) on 2017-10-26T11:46:46Z No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) DISSERTAÇAO MAURICIO OLIVEIRA JUNIOR.pdf: 1023259 bytes, checksum: 4ed2457b73e6102347a2ed9685dc851c (MD5)
Approved for entry into archive by Ana Lúcia Torres (bfmhuap@gmail.com) on 2017-10-26T11:47:08Z (GMT) No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) DISSERTAÇAO MAURICIO OLIVEIRA JUNIOR.pdf: 1023259 bytes, checksum: 4ed2457b73e6102347a2ed9685dc851c (MD5)
Made available in DSpace on 2017-10-26T11:47:08Z (GMT). No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) DISSERTAÇAO MAURICIO OLIVEIRA JUNIOR.pdf: 1023259 bytes, checksum: 4ed2457b73e6102347a2ed9685dc851c (MD5) Previous issue date: 2017
Universidade Federal Fluminense. Centro de Ciências Médicas. Hospital Universitário Antônio Pedro
A primeira etapa da chegada do medicamento até o paciente se inicia através da elaboração da prescrição, sendo um dos pontos críticos e que influencia diretamente possíveis erros em etapas posteriores. No Brasil, através da portaria 529 de 2013 do Ministério da Saúde fica instituído o Programa Nacional de Segurança do Paciente que tem como objetivo estimular a cultura de segurança e para isso determina algumas ações e estratégias. Ainda em 2013 é lançado uma coleção de 6 protocolos de segurança, ente eles o de prescrição, uso e administração de medicamentos, que traz orientação para minimização do risco quanto ao processo de utilização do medicamento dentro de estabelecimentos de saúde. O presente estudo teve como objetivos analisar a adequação das prescrições em um hospital universitário frente ao protocolo, analisando para tal os diferentes setores e quantificando os tipos de prescrições existentes. Para tanto foi feito um estudo retrospectivo, onde foram analisadas 2006 prescrições, totalizando 20255 medicamentos onde a média foi de 10,10 ± (5,10) medicamentos por prescrição. Dessas, 100% (n=2006) tiveram algum tipo de erro, 47,6% (n=954) tiveram antibióticos prescritos e 87,5% (n=1755) de injetáveis prescritos. Dos medicamentos analisados 79,2% (n=16049) foram prescritos pelo nome genérico e 96,4% (n=19524) constavam na lista de padronização do hospital. Quanto ao tipo de prescrições 73,8% (n=1480) foram digitadas, 16,7% (n=336) foram manuscritas e 9,5% (n=190) foram mistas, sendo que 5,98% (n=120) foram consideradas ilegíveis (n=6), ou parcialmente ilegíveis (n=114) e desse total 94,2% (n=112) foi proveniente das prescrições manuscritas o que mostra uma associação entre a legibilidade e o tipo de prescrição. É importante ressaltar que a busca pela qualidade e segurança é um processo constante, devendo estar sempre em evolução na instituição, e diante do exposto, a identificação das inadequações, pode contribuir com o direcionamento das ações internas para minimizar os riscos aos pacientes, assim como servir como base para estudos futuros
The first stage of the arrival of the drug to the patient begins with the elaboration of the prescription, being one of the critical points and that directly influences possible errors in later stages. In Brazil, starting in 2013, the National Patient Safety Program (PNSP) is set up in order to stimulate the safety culture, and for this purpose it determines some actions and strategies. Also in 2013, a collection of 6 safety protocols, including prescription, use and administration of medicines, is launched, which provides guidance on risk minimization regarding the process of drug use within health facilities. The present study had as objectives to analyze the adequacy of the prescription of a university hospital regarding such protocol, analyzing the different sectors and quantifying the types of prescriptions available. For that, a retrospective study was carried out, where 2006 prescriptions were analyzed and a total of 20255 drugs were used, where the average was 10.10 ± (5.10) prescription medications. Of these, 100% (n = 2006) had some type of error, 47.56% (n = 954) had prescribed antibiotics and 87.49% (n = 1755) of prescribed injectables. Of the drugs analyzed, 79.23% (n = 16049) were prescribed by the generic name and 96.39% (n = 19524) were on the hospital standardization list. Regarding the type of prescriptions 73.8% (n = 1480) were entered 16.7% (n = 336) were handwritten and 9.5% (n = 190) were mixed, with 5.98% (n=120 were considered illegible (n = 6) or partially illegible (n = 114) and 94.2% (n = 112) came from handwritten prescriptions, which shows an association between readability and type of prescription. It is important to emphasize that the search for quality and safety is a constant process, and should always be evolving in the institution and before the exposed the identification of the inadequacies, can contribute with the direction of the internal actions to minimize the risks as well as to serve as basis for studies Futures

Vai alla bibliografia