Rozprawy doktorskie na temat „Safety protocol”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Safety protocol”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Bennett, Jill M. "Assessing school preparedness an evaluation of a safety assessment protocol /". Menomonie, WI : University of Wisconsin--Stout, 2007. http://www.uwstout.edu/lib/thesis/2007/2007bennettj.pdf.
Pełny tekst źródłaNelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol". Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.
Pełny tekst źródłaMeireles, Tiago Hipkin. "Wireless protocols to support vehicular safety applications". Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/16287.
Pełny tekst źródłaIn the last decades the number of vehicles travelling in European road has raised significantly. Unfortunately, this brought a very high number of road accidents and consequently various injuries and fatalities. Even after the introduction of passive safety systems, such as seat belts, airbags, and some active safety systems, such as electronic brake system (ABS) and electronic stabilization (ESP), the number of accidents is still too high. Approximately eight per cent of the fatal accidents occur in motorways, in the Portuguese case, the number of fatalities has remained constant in the first decade of the 21st century. The evolution of wireless communications, along with the north-American and European policies that reserve spectrum near the 5,9GHz band for safety applications in the vehicular environment, has lead to the development of several standards. Many of these applications are based on the possibility of using a wireless communication system to warn drivers and passengers of events occurring on the road that can put at risk their own safety. Some examples of safety applications are the hard-brake warning, the wrong-way warning and the accident warning. This work aims to contribute in defining a communication protocol that guarantees the timely dissemination of safety critical events, occurring in scenarios with a high number of vehicles or in the neighbourhood of so called motorway “blackspots”, to all vehicles in the zone of interest. To ensure information integrity and user trust, the proposed system is based on the motorway infrastructure, which will validate all events reported by the vehicles with the usage of several means, such as video surveillance or other sensors. The usage of motorway infrastructure that has full motorway coverage using fixed stations also known as road side units, allows to have a global vision of the interest zone, avoiding the problems associated to networks that depend solely on vehicle to vehicle communication, generally total ad-hoc networks. By using the infrastructure, it is possible to control medium access, avoiding possible badly intended intrusions and also avoiding the phenomenon known as alarm showers or broadcast storm that occur when all vehicles want to simultaneously access the medium to warn others of a safety event. The thesis presented in this document is that it is possible to guarantee in time information about safety events, using an architecture where the road side units are coordinated among themselves, and communicate with on board units (in vehicles) that dynamically register and deregister from the system. An exhaustive and systematic state of the art of safety applications and related research projects is done, followed by a study on the available wireless communications standards that are able to support them. The set of standards IEEE802.11p and ETSI-G5 was created for this purpose and is found to be the more adequate, but care is taken to define a scenario where WAVE enabled and non-enabled vehicles can coexist. The WAVE medium access control protocol suffers from collision problems that do not guarantee a bounded delay, therefore a new protocol (V-FTT) is proposed, based on the adaptation of the Flexible Time Triggered protocol to the vehicular field. A theoretical analysis of the V-FTT applied to WAVE and ETSI-G5 is done, including quantifying a real scenario based on the A5 motorway from Lisbon to Cascais, one of the busiest Portuguese motorways. We conclude the V-FTT protocol is feasible and guarantees a bounded delay.
Nas últimas décadas tem-se assistido a um aumento do número de veículos a circular nas vias rodoviárias europeias, trazendo consigo um elevado número de acidentes e como consequência muitos feridos e vítimas mortais. Apesar da introdução de sistemas de segurança passivos, tais como cintos de segurança, airbags e de alguns sistemas de segurança activos, tais como o sistema electrónico de travagem (ABS) e o sistema electrónico de estabilidade (ESP), o número de acidentes continua a ser demasiado elevado. Aproximadamente oito por cento dos acidentes fatais na Europa ocorrem em auto-estradas, no caso Português, o número de vítimas mortais tem-se mantido constante ao longo da primeira década do século XXI. A evolução das comunicações sem fios, acompanhada de políticas europeias e norte-americanas no sentido de reservar frequências próximas dos 5,9GHz para aplicações de segurança no ambiente veicular, levou à especificação de várias normas. A maior parte destas aplicações baseiam-se na possibilidade de usar um sistema confiável de comunicação sem fios para alertar os condutores e passageiros de veículos para eventos ocorridos nas estradas que possam colocar em risco a sua segurança. Exemplos de aplicações de segurança crítica são o aviso de travagem brusca, o aviso de veículo em contra mão e o aviso de acidente na estrada. Este trabalho contribui para a definição de protocolos de comunicação capazes de garantir que a informação sobre eventos relacionados com situações de segurança crítica, que ocorram em cenários com um elevado número de veículos em zonas urbanas ou na vizinhança dos chamados “pontos negros” das auto-estradas, é disseminada com pontualidade por todos os veículos localizados na zona de interesse Por uma questão da integridade das comunicações e confiança dos condutores, o sistema proposto baseia-se na infra-estrutura do concessionário da auto-estrada, que validará os eventos reportados pelos veículos usando vários meios à sua disposição, como por exemplo sistemas de videovigilância e outros sensores. O uso de uma infra-estrutura de comunicações, que dispõe de cobertura integral a partir de estações fixas, permite uma visão global da zona coberta, evitando os problemas associados a redes baseadas apenas na comunicação entre veículos, que são em geral totalmente ad-hoc. O uso da infra-estrutura permite, entre outras vantagens, controlar o acesso ao meio, evitando simultaneamente intrusões de estranhos ao sistema e o fenómeno conhecido como “chuva de alarmes” desencadeado quando todos os veículos querem aceder simultaneamente ao meio para avisar os restantes da existência dum evento de segurança crítica. A tese apresentada neste documento defende que é possível garantir informação atempada sobre eventos que põem em risco a segurança dos veículos a partir de uma arquitectura de interligação entre as estações de comunicações fixas, coordenadas entre si, e unidades móveis (veículos) que se registam e se desligam dinamicamente do sistema. Nesta tese faz-se um levantamento exaustivo e sistemático das aplicações de segurança abordando projectos de investigação relacionados, estudam-se as tecnologias de comunicação sem fios disponíveis e a sua possibilidade de suportar aplicações de segurança rodoviária. Desta análise, conclui-se que a norma norte americana WAVE/IEEE802.11p e a europeia ETSI-G5, criadas especificamente para o efeito são as que mais se adequam à finalidade desejada. Considera-se que o cenário de utilização é evolutivo, podendo coexistirem veículos que não dispõem de sistemas de comunicação com outros que suportam a norma WAVE. Dado que o protocolo de acesso ao meio proposto pela norma WAVE não garante um acesso determinístico ao meio partilhado, propõe-se um novo protocolo, o Vehicular Flexible Time-Triggered protocol (VFTT). Faz-se a análise teórica da viabilidade do protocolo proposto para a norma WAVE e respectiva norma europeia (ETSI-G5). Quantifica-se o protocolo VFTT para um cenário real: a auto-estrada A5 Lisboa-Cascais, uma das autoestradas portuguesas mais movimentadas. Conclui-se que o protocolo é viável e garante um atraso restringido temporalmente.
Xie, Hong. "A Protocol Stack in TinyTimber for PIEs that Cooperate for Traffic Safety". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17541.
Pełny tekst źródłaFoster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development". Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.
Pełny tekst źródłaLorenzen, Torsten [Verfasser]. "Design of an adaptive congestion control protocol for reliable vehicle safety communication / Torsten Lorenzen". Hannover : Technische Informationsbibliothek (TIB), 2018. http://d-nb.info/1166077322/34.
Pełny tekst źródłaAlsubaihi, Badr. "Semantic and Self-Decision Geocast Protocol for Data Dissemination over Vehicle Ad Hoc Network". Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31783.
Pełny tekst źródłaRasoamanana, Aina Toky. "Derivation and Analysis of Cryptographic Protocol Implementation". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.
Pełny tekst źródłaTLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus on a specific class of vulnerabilities affecting both protocols implementations, state machine errors. These vulnerabilities are caused by differences in interpreting the standard and correspond to deviations from the specifications, e.g. accepting invalid messages, or accepting valid messages out of sequence.We develop a generalized and systematic methodology to infer the protocol state machines such as the major TLS and SSH stacks from stimuli and observations, and to study their evolution across revisions. We use the L* algorithm to compute state machines corresponding to different execution scenarios.We reproduce several known vulnerabilities (denial of service, authentication bypasses), and uncover new ones. We also show that state machine inference is efficient and practical enough in many cases for integration within a continuous integration pipeline, to help find new vulnerabilities or deviations introduced during development.With our systematic black-box approach, we study over 600 different versions of server and client implementations in various scenarios (protocol versions, options). Using the resulting state machines, we propose a robust algorithm to fingerprint TLS and SSH stacks. To the best of our knowledge, this is the first application of this approach on such a broad perimeter, in terms of number of TLS and SSH stacks, revisions, or execution scenarios studied
Sjödin, Andreas, i Marcus Gruneau. "The ADS-B protocol and its'weaknesses : Exploring potential attack vectors". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.
Pełny tekst źródłaThe ADS-B protocol is currently in use all around the world. The purpose behind the protocol is to give pilots and traffic control a better picture of the situation in the air. Previous research shows that there exists a vulnerability in the protocol since it lacks authentication. The protocol is solely built upon trust between sender and receiver.Our work is inspired by previous studies made in the area, where it has been demonstrated that one can inject fake aircraft by sending fake ADS-B data using the protocol. The purpose behind this report was to perform a penetration test according to the OSSTMM3, a manual on how to perform scientific penetration tests.We wanted to test a real product (ADS-B receiver) made for pilots and measure if we could manipulate the environment presented to the pilot.Our testing shows that the receiver blindly trusts the protocol without any data validation. We managed to inject fake static aircraft just like previous researchers have done, but also move them around in the environment in a way that breaks the laws of physics and flood the device with fake data, effectively denying the service provided.Since we managed to deny the service, which is to give the user a correct picture of the nearby air traffic, we feel like our tests were successful.
Umeno, Shinya. "Proving safety properties of an aircraft landing protocol using timed and untimed I/O automata : a case study". Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38920.
Pełny tekst źródłaPage 222 blank.
Includes bibliographical references (p. 195-196).
This thesis presents an assertional-style verification of the aircraft landing protocol of NASA's SATS (Small Aircraft Transportation System) concept of operation using the timed and untimed I/O automata frameworks. We construct two mathematical models of the landing protocol using the above stated frameworks. First, we study a discrete model of the protocol, in which the airspace of the airport and every movement of the aircraft are all discretized. The model is constructed by reconstructing a mathematical model presented in using the untimed I/O automata framework. Using this model, we verify the safe separation of aircraft in terms of the bounds on the numbers of aircraft in specific discretized areas. In addition, we translate this I/O automaton model into a corresponding PVS specification, and conduct a machine verification of the proof using the PVS theorem prover. Second, we construct a continuous model of the protocol by extending the discrete model using the timed I/O automata framework. A refinement technique has been developed to reason about the external behavior between two systems. We present a new refinement proof technique, a weak refinement using a step invariant.
(cont.) Using this new refinement, we carry over the verification results for the discrete model to the new model, and thus guarantee that the safe separation of aircraft verified for the discrete model also holds for the new model. We also prove properties specific to the new model, such as a lower bound on the spacing of aircraft in a specific area of the airport, using an invariant-proof technique.
by Shinya Umeno.
S.M.
Win, Htoo Aung. "BSM Message and Video Streaming Quality Comparative Analysis Using Wave Short Message Protocol (WSMP)". Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538706/.
Pełny tekst źródłaAnsari, Mohammed Toseef. "Possible fibrino(geno)lytic activity in an earthworm extract: development of a trial protocol to identifyinitial efficacy and safety, and further clinical development". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B3197000X.
Pełny tekst źródłaCollinson, Wendy Jane. "A standardised protocol for roadkill detection and the determinants of roadkill in the greater Mapungubwe Transfrontier Conservation Area, Limpopo Province, South Africa". Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002056.
Pełny tekst źródłaAnsari, Mohammed Toseef. "Possible fibrino(geno)lytic activity in an earthworm extract development of a trial protocol to identify initial efficacy and safety, and further clinical development /". Click to view the E-thesis via HKUTO, 2001. http://sunzi.lib.hku.hk/hkuto/record/B3197000X.
Pełny tekst źródłaSebastian, Alvin. "Efficient safety message dissemination for cooperative collision warning via context modelling". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/50793/1/Alvin_Sebastian_Thesis.pdf.
Pełny tekst źródłaBridi, Marcelle Engler. "Protocolo de avaliação das práticas de gestão da segurança e saúde no trabalho no setor da construção civil". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/79847.
Pełny tekst źródłaSeveral academic studies have investigated Occupational Safety and Health (OSH) managerial practices in order to identify factors that contribute for the success of accident prevention programs in the construction industry. Most of those studies were based on surveys and aimed to identify correlations between accident rates and the existence or non-existence of such practices, establishing sets of practices that have the greatest impact on OSH. Despite the contributions of those studies, especially regarding the identification and dissemination of practices associated with accident prevention, four main drawbacks can be pointed out: (a) the lack of definition for best practices and of criteria for categorizing them, (b) scope limited to large companies from developed countries, (c) the lack of theoretical foundation, and (d) the descriptive focus of the methodological approach adopted. The main objective of this research work is to devise a protocol for characterizing and evaluating the degree of implementation of OSH managerial practices based on multiple sources of evidence, aiming to get a more detailed understanding of those practices, and take into account the context of application. Regarding the method, the constructive research approach was adopted, since this investigation proposes the development of a protocol for solving a problem with practical and theoretical relevance. Initially, a literature review on OSH managerial best practices and on the Resilience Engineering (RE) theoretical framework was undertaken. The protocol has been proposed based on both a literature review and also on a survey conducted with a sample of construction companies. The tool was developed and tested in five case studies in construction sites carried out sequentially. In addition, it was also applied in three construction sites in Spain in order to evaluate its applicability in another context. The results of those construction sites were processed and analyzed to illustrate the data produced. Finally, based on the evaluation of the protocol, some guidelines for implementing it were proposed. The main contributions of this research are related to the protocol, which has a prescriptive approach. From one hand, it enables the systematic collection of data on OSH practices that can be used for assessing the OSH management system of construction companies, making it possible to carry out internal and external benchmarking. From the other hand, with the tool may contribute for the documentation and dissemination of OSH best practices in the construction sector.
Rajendran, Rajapandiyan. "The Evaluation of GeoNetworking Forwarding in Vehicular Ad-Hoc Networks". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23982.
Pełny tekst źródłaZamouril, Jakub. "Flight Software Development for Demise Observation Capsule". Thesis, Luleå tekniska universitet, Rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64420.
Pełny tekst źródłaDemise Observation Capsule
Dobler, Rodrigo Jaureguy. "FITT : fault injection test tool to validate safety communication protocols". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/143198.
Pełny tekst źródłaSafe communication protocols are essential in industrial automation environments, where undetected failures in the communication of devices can cause irreparable damage to life or to the environment. These safe protocols must be developed according to some safety standard, like IEC 61508. According to it, part of the process of implementing these protocols is to select appropriate techniques for validation, including the fault injection, which should consider an appropriate fault model for the operating environment of the protocol. Generally, these environments are characterized by the existence of various forms of electric and electromagnetic interference, which can cause failures in existing electronic systems. In data communication systems, this can lead to the destruction of the data signal and cause erroneous operation states in the devices. Thus, it is necessary to use a fault injection technique that allows simulating the types of communication errors that may occur in industrial environments. So, it will be possible to verify the behavior of the fault tolerance mechanisms in the presence of failures and ensure its correct functioning. For this purpose, this work presents the development of FITT fault injector for validation of safety communication protocols. This tool was developed to be used with Linux operating system. The fault injector makes use of PF_RING, a module for the Linux Kernel and that is responsible to perform the direct communication between the network interfaces and the fault injector. Thus the packages do not need to go through the Linux Kernel structures, avoiding additional delays to be inserted into the process of receiving and sending messages. The developed fault injection functions follow the communication fault model described in the IEC61508 standard, composed by the errors of repetition, loss, insertion, incorrect sequence, addressing, data corruption, delay, masking and memory failures within switches. The fault injection tests applied with this model allow to properly validate the fault tolerance mechanisms of safety protocols.
Erdene-Ochir, Ochirkhand. "Résilience et application aux protocoles de routage dans les réseaux de capteurs". Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00862710.
Pełny tekst źródłaLakhani, Shahzia A. "Preventing neuromuscular deconditioning in critically ill patients". Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/456.
Pełny tekst źródłaB.S.N.
Bachelors
Nursing
Nursing
Sabouni, Imad. "Génération de modules dédiés aux circuits de communication de contrôle-commande : une étude de conception appliquée dans le cadre de la voiture sûre PROMETHEUS". Grenoble INPG, 1992. http://www.theses.fr/1992INPG0143.
Pełny tekst źródłaRyan, Jason C. (Jason Christopher). "Evaluating safety protocols for manned-unmanned environments through agent-based simulation". Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/97255.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 217-230).
Recent advances in autonomous system capabilities have improved their performance sufficiently to make the integration of unmanned and autonomous vehicles systems into human-centered civilian environments a realistic near-term goal. In these systems, such as the national highway system, mining operations, and manufacturing operations, unmanned and autonomous systems will be required to interact with large numbers of other unmanned vehicle systems as well as with manned vehicles and other human collaborators. While prior research provides information on the different methods of controlling unmanned vehicles and the effects of these methods on individual vehicle behavior, it has typically focused on only a small number of unmanned systems acting in isolation. The qualities that provide the desired behavior of an autonomous system behavior in isolation may not be the same as the characteristics that lead to desirable performance while interacting with multiple heterogeneous actors. Additionally, the integration of autonomous systems may include constraints on operations that limit interactions between manned and unmanned agents. It is not clear which constraints might be most effective in promoting safe operations and how these constraints may interact with unmanned system control architectures. Examining the effects of unmanned systems in these large, complex systems in reality would require significant capital investment and the physical construction and implementation of the un- manned vehicles of interest. Both of these aspects make empirical testing either difficult or impossible to perform and may also limit the ability of testing to fully examine all the parameters of interest in a safe and efficient manner. The objective of this thesis is the creation of a simulation environment that can replicate the behavior of the unmanned vehicle systems, manned vehicles, and human collaborators in the environment in order to enable an exploration of how parameters related to individual actor behavior and actor interactions affect performance. The aircraft carrier flight deck is chosen as an example domain, given that current operations require significant interactions between human collaborators and manned vehicles and current research addresses the development of unmanned vehicle systems for flight deck operations. Because the complexity of interactions be- tween actors makes the creation of closed-form solutions of system behavior difficult, an agent-based modeling approach is taken. First, a list of actors and their characteristic tasks, decision-making processes, states, and parameters for current aircraft carrier flight deck operations was generated. Next, these models were implemented in an object-oriented programming language, enabling the definition of independent tasks, actors, parameters, and states. These models were later extended to incorporate features of unmanned vehicle control architectures by making minor modifications to the state, logic functions, or parameters of current agents (or tasks). This same tactic can be applied by future researchers to further pursue examinations of other in influential aspects of system performance or to adapt the model to other domains. This model, the Multi-Agent Safety and Control Simulation (MASCS), was then compared to data for current flight deck operations to calibrate and partially validate simulation outputs, first addressing an individual vehicle task before proceeding to mission tasks utilizing many vehicles at once. The MASCS model was extended to incorporate models of different unmanned vehicle control architectures and different safety protocols that affect vehicle integration. These features were then tested at different densities of mission operations on the flight deck and compositions (unmanned vs. manned) of missions in order to fully explore the interactions between variables. These results suggest hat productivity on the flight deck is more heavily influenced by the safety protocols that in influence vehicle integration as opposed to the types of unmanned vehicle control architecture employed. Vehicle safety is improved by increasing the number of high-level constraints on operations (e.g. separating unmanned and manned aircraft spatially or temporally), but these high-level constraints may conflict with implicit constraints that are part of crew-vehicle interactions. Additional testing explored the use of MASCS in understanding the effects of changes to the operating environment, independent of changes to unmanned vehicle control architectures and safety protocols, as well as how the simulation can be used to explore the vehicle design space. These results indicate that, at faster operational tempos, latencies in vehicle operations drive significant differences in productivity that are exacerbated by the safety protocols applied to operations. In terms of safety, a tradeoff between slightly increased vehicle safety and significant increases in the risk rate of crew activity is created at faster tempos in this environment. Lastly, the limitations and generalizability of the MASCS model for use in other Heterogeneous Manned-Unmanned Environments (HMUEs) was discussed, along with potential future work to expand the models.
by Jason C. Ryan.
Ph. D. in Human Systems Engineering
Perera, Dhammika. "A Comparison of the Safety and Efficacy of Three Medical Abortion Protocols". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6649.
Pełny tekst źródłaMartínez, Domínguez Francisco José. "Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios". Doctoral thesis, Universitat Politècnica de València, 2011. http://hdl.handle.net/10251/9195.
Pełny tekst źródłaMartínez Domínguez, FJ. (2010). Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/9195
Palancia
Soua, Ahmed. "Vehicular ad hoc networks : dissemination, data collection and routing : models and algorithms". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00919774.
Pełny tekst źródłaLeite, Giulena Rosa. "Protocolo de cirurgias seguras numa região neotropical no Brasil Central: processo de implantação, avaliação e revisão da literatura". Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/7076.
Pełny tekst źródłaApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-04-05T11:53:47Z (GMT) No. of bitstreams: 2 Tese - Giulena Rosa Leite - 2017.pdf: 2944113 bytes, checksum: 9194b3c298e35ecddd0323e013b325c0 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2017-04-05T11:53:47Z (GMT). No. of bitstreams: 2 Tese - Giulena Rosa Leite - 2017.pdf: 2944113 bytes, checksum: 9194b3c298e35ecddd0323e013b325c0 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-03-31
Aiming at evaluating the implementation of a safe surgery protocol, developed by the Brazilian National Health Surveillance Agency (ANVISA), an integrative literature review followed by an uncontrolled, quasi-experimental before-and-after intervention study was conducted in public health institutions that possess a surgical center, which are from 5 cities that make up the Southwest Health Region II of the State of Goiás. The review consisted of 19 scientific articles searched by the association of the keywords surgical and checklist and world health organization and implantation. The population was composed of 84 workers from the multiprofessional team before the intervention, 77 workers after the intervention and 680 patients in postoperative period. The data organization process was conducted with Microsoft ® Excel 2010 program and the data analysis was made with the Statistical Package for the Social Sciences (SPSS) program. In order to present the situational diagnosis state of the stages "before training" and "after training" of the professionals, descriptive statistics were used. Then, the comparison of after-training and before-training collected data was performed using the chi-square test to test the significance between proportions. P values <0.05 were considered statistically significant. The female proportion of Healthcare Professionals (PAS) (79.9%) was statistically higher than that of males (20.1%), (p <0.020). The average age was 39.2 (± 9), the predominant age group was 41 years and over (43.9%) and the educational level was less than or equal to twelve years of study (56.1%). Regarding their training, more than a half of them was composed of nursing technicians (77.7%) and worked in a medium-sized hospital (56.8%). Healthcare professionals with a higher academic training level were nurses (8.6%) and medical surgeons or anesthesiologists (13.7%). There was a higher proportion of health professionals who responded positively to the procedures confirmation in step II (98.7%) compared to stage I (67.7%). Likewise, all the items related to visual confirmation and demarcation of the surgical site (1.6% stage I to 97.4% stage II), pulse oximeter presence (82.3% stage I to 98.7% stage II) and verbal review with the anesthesiologists (69.4% stage I to 98.7% in stage II) presented p <0.005. Regarding stage II, “before leaving the surgery room”, the items "compress/instruments count", "surgical specimen identification", "equipment functionality revision" were already performed with great consistency, even before the protocol implementation. Regarding the stage III of the checklist "before leaving the operating room", when we compared the health professionals’ perceptions, before and after the implementation of the checklist, it was observed that the variables "occurrence of wrong procedures notifications”, “the occurrence of surgeries in the wrong patients”, “the occurrence of surgeries in wrong places”, “inadequate antibiotic prophylaxis” and “revision of the postoperative and anesthesia care plan” (p <0.005) were statistically significant (p = 0.000). Conclusion: the level of evidence VI was the one of greater predominance among the articles produced in the period investigated. We interviewed 84 health professionals who work in public surgical centers of RSS II, 90.5% of the female gender; (40.5%), with professional training of Nursing Technicians (82.1%) and schooling less than 12 years of schooling (54.8%). Moments 1 "before the anesthesia" and 2 "before the surgical incision" of the checklist, had a higher rate of adhesion by professionals.
Com o objetivo de avaliar o processo de implantação do protocolo de cirurgias seguras, da Agência Nacional de Vigilância Sanitária – Brasil, realizou-se uma revisão integrativa de literatura seguida por uma pesquisa de intervenção, quase experimental do tipo antes e depois, não controlada, em instituições públicas de saúde que possuem centro cirúrgico, de 5 municípios que compõem a Região de Saúde Sudoeste II do Estado de Goiás. A revisão constou de 19 artigos científicos buscados pela associação das palavras chave surgical and checklist and world health organization and implantation. A população foi constituída por 84 trabalhadores da equipe multiprofissional antes da intervenção, 77 trabalhadores após a intervenção, e 680 pacientes em pós-operatório. Os dados foram organizados no programa Microsoft ® Excel 2010 e analisados com auxílio do programa Statistical Package for the Social Sciences (SPSS). Para apresentar as etapas do diagnóstico situacional “antes da capacitação” dos profissionais e “após a capacitação” dos mesmos, foi utilizada a estatística descritiva. Em seguida, foi realizada a comparação dos dados coletados antes e após a capacitação, utilizando o teste de qui-quadrado para testar a significância entre as proporções. Valores de p<0,05 foram considerados estatisticamente significantes. A proporção dos PAS (Profissionais da Área da Saúde) do sexo feminino (79,9%) foi estatisticamente superior em relação ao sexo masculino (20,1%), (p < 0,020). A idade média foi de 39,2 (± 9), enquanto a faixa etária predominante foi acima de 41 anos (43,9%) e escolaridade menor ou igual a doze anos de estudo (56,1%). Quanto à formação, mais da metade eram técnicos em enfermagem (77,7%) e trabalhavam em hospital de médio porte (56,8%). A participação de PAS com formação superior foi de enfermeiros (8,6%) e de médicos cirurgiões ou anestesistas (13,7%). Verificou-se uma proporção maior de PAS que responderam positivamente à confirmação dos procedimentos na etapa II (98,7%) em relação a etapa I (67,7%). Da mesma forma os itens relativos a confirmação visual e demarcação do sítio cirúrgico (1,6% etapa I para 97,4% etapa II), presença do oxímetro de pulso (82,3% etapa I para 98,7% na etapa II) e revisão verbal com o anestesista (69,4% etapa I para 98,7% na etapa II) apresentaram valor de p < 0,005. Em relação ao momento II, antes de sair da sala de cirurgias, os itens “contagem de compressa/instrumental”, “Identificação de qualquer amostra cirúrgica”, “Revisão da funcionalidade equipamentos” já eram realizados com grande consistência, mesmo antes da implantação do protocolo. Em relação ao terceiro momento do checklist “antes de sair da sala cirúrgica”, quando comparamos a percepção dos profissionais de saúde, antes e após a implantação do checklist, observa-se que as variáveis “notificações de ocorrência de procedimentos errados”, “ocorrência de cirurgia em pacientes errados”, “ocorrência de cirurgias em locais errados”, “notificação de antibioticoprofilaxia inadequada” e “revisão do plano de cuidado pós-operatório e anestésico” (p<0,005) foram estatisticamente significativas (p=0,000). Conclusão: o nível de evidência VI foi o de maior predominância entre os artigos produzidos no período investigado. Foram entrevistados 84 profissionais de saúde que atuam em centros cirúrgicos públicos da RSS II, 90,5% do gênero feminino; a maioria com idade maior que 41 anos (40,5%), com formação profissional de Técnicos de Enfermagem (82,1%) e escolaridade menor que 12 anos de estudo (54,8%). Os momentos 1 “antes da anestesia” e 2 “antes da incisão cirúrgica” do checklist, tiveram maior taxa de adesão por profissionais.
Allal, Salim. "Optimisation des échanges dans le routage géocast pour les réseaux de Véhicules Ad Hoc VANETs". Thesis, Paris 13, 2014. http://www.theses.fr/2014PA132056/document.
Pełny tekst źródłaVehicular ad hoc networks (VANETs) are a part of intelligent transportation systems (ITS). These letter attempt to answer the question of how to equip vehicles with wireless communication means to avoid accidents, better manage congestion and have positive impact on economics, energy and environment. Indeed, with wireless communication mechanisms such as IEEE 802.11p, a vehicle may exchange information with its near neighbors at one hop or at two furthur hops trhough relaying messages technique across intermediate vehicles. Some of these messages may cover vehicles wich are in a defined geographical area and spread throughout the network will consume bandwidth and penalize other vehicles. This is the case for information on the road trafic, for example. In the latter case, routing protocols said Geocast are used for the dissemination of these messages. The protocols are used to route a message from a unique source to multiple destination vehicles locked in the same geographic area. In this thesis, we considered the case where we have several geographic areas of interest and have proposed a new Geocast routing mechanism, called GeoSUZ, for conveying a message optimally between a source and multiple destination areas. An optimized broadcasting mechanism within an area is also combined with GeoSUZ algorithm to ensure end-to-end routing with minimal overhead
Torrent-Moreno, Marc. "Inter-vehicle communications : achieving safety in a distributed wireless environment : challenges, systems and protocols /". Karlsruhe : Univ.-Verl. Karlsruhe, 2007. http://www.uvka.de/univerlag/volltexte/2007/263/.
Pełny tekst źródłaRuppert, Guilherme Cesar Soares. "NFS Guard : uma solução de segurança para o protocolo NFS". [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276483.
Pełny tekst źródłaDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-06T04:50:10Z (GMT). No. of bitstreams: 1 Ruppert_GuilhermeCesarSoares_M.pdf: 908627 bytes, checksum: 2eb5cfc8a9692f72179b7c1cd2596b39 (MD5) Previous issue date: 2006
Resumo: Os sistemas de arquivos distribuídos são um componente importante em praticamente todas as redes coorporativas, acadêmicas e até mesmo domésticas. Neste cenário, o NFS (Network File System) é um dos sistemas de maior importância, não só pela importância histórica em ter sido um dos pioneiros, mas por ser largamente utilizado em todo o mundo. Porém, o NFS foi projetado com recursos insuficientes de segurança. A versão 3 do NFS, que é a versão utilizada atualmente em ambientes de produção, apresenta um nível de segurança praticamente nulo. Mais recentemente, foi elaborada a especificação da versão 4 do protocolo que corrige adequadamente os problemas de segurança. Contudo, o protocolo apresenta um grau de complexidade extremamente elevado e, devido a isso, poucos estão dispostos a enfrentar sua implementação. Atualmente, existem apenas algumas implementações preliminares deste protocolo e as mesmas não se encontram completas e estáveis. Logo, a migração para o NFSv4 a curto prazo é inviável. Neste trabalho foi realizado um amplo estudo dos diversos aspectos envolvidos com a segurança de sistemas de arquivos distribuídos, em especial o NFS. Foram levantadas as deficiências do NFS e foram analisados diversos trabalhos envolvendo segurança no compartilhamento de arquivos. Este trabalho resultou no projeto e implementação do NFS Guard, uma ferramenta para agregar segurança ao NFS versão 3 de forma simples e totalmente compatível com as redes NFS já instaladas. O NFS Guard utiliza clientes e servidores NFS padrão e não requer recompilação de nenhum software já instalado, podendo ser utilizado inclusive em sistemas de código fechado. Para isso foi desenvolvida uma técnica de Kerberização utilizando interceptação de pacotes, que também pode ser utilizada para agregar segurança a outros serviços além do NFS
Abstract: Distributed File Systems are an important component in practicalIy every corporate, academic or even home network. In this scenario, NFS (Network File System) is one of the most important of these systems, not only due to its historical importance for being one of the pioneers, but also for being largely used alI over the world. However, NFS was designed with insufficient security features. NFS version 3, which is the version currently being used in production environments, presents an almost nulI security leveI. More recently, the version 4 of the protocol was designed,among other thigs, to tackle the security issues. Nevertheless, this protocol presents an extremely high leveI of complexity, and consequently, a few want to face its implementation. At the moment, a few preliminary implementations are available, but usualIy incomplete and unstable. Hence, the migration to NFSv4 in a short term is not feasible. In this work we accomplished a wide study of many aspects involved with distributed file system security, specialIy with regards to NFS. NFS's shortcoming were identified e many works involving security in file sharing were analyzed. This work resulted in the design and implementation of NFS Guard, a tool to add security do NFS version 3 in a simple way and totalIy compatible with instalIed NFS networks. NFS Guard uses standard NFS client and server and does not require recompilation of any installed software, so it can be used with closed source systems. To accomplish that, a Kerberization technique was developed using packet interception, which can also be used to add security to other services besides NFS
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Panno, Simone Franciscatto. "ADESÃO AO PROTOCOLO DE IDENTIFICAÇÃO DO PACIENTE EM UNIDADES PEDIÁTRICAS: ESTRATÉGIA PARA O CUIDADO SEGURO". Centro Universitário Franciscano, 2017. http://www.tede.universidadefranciscana.edu.br:8080/handle/UFN-BDTD/639.
Pełny tekst źródłaMade available in DSpace on 2018-08-22T14:20:42Z (GMT). No. of bitstreams: 2 Dissertacao_SimoneFranciscattoPanno.pdf: 24728642 bytes, checksum: 70b8361698b1e4342af3bd188424423e (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-11-30
The correct identification of the patient is fundamental in the provision of safe care, being the first international safety goal of the World Health Organization. Protocols for patient identification in health services standardize actions and reduce the occurrence of errors. The general objective of this study was to evaluate the adherence of the professionals to the institutional protocol of identification of the patient, in the pediatric units of a teaching hospital. As specific objectives were considered: verify if the health care professionals identify the patients with bracelets; identification of the patient prior to care / procedures / transfers / discharge and educating / advising patients / caregivers on the correct identification, according to the protocol; verify the presence and general compliance of identification wristbands; and, produce a video emphasizing the importance of identification actions. A cross-sectional study was carried out, with a descriptive design and a quantitative approach. The population was composed by the health / support professionals, who worked in the care of patients of the Pediatric Emergency Room, the Pediatric Intensive Care Unit and the Pediatric Clinical and Surgical Unit of a teaching hospital in Rio Grande do Sul. The sample consisted of 385 opportunities of actions. At each opportunity, we sought: to verify if the patients were identified with bracelets - action 1; to observe if the professionals confer the identification of the patients - action 2; and, if the patients / companions were educated about the correct identification - action 3. Also, in the opportunities in which the bracelet was present, the conformity of the bracelet with the protocol was verified. Data collection took place from April to June 2017, through the completion of a research instrument. Data was entered into Excel 2007 spreadsheets and analyzed by descriptive statistics. The adhesion of professionals to action 1 was 74.28%, action 2 had no adhesion, and action 3 had adhesion of 2.08%. The bracelet was present at 82.85% of the opportunities and overall compliance was 12.22%. Regarding the location / fixation of the bracelet, compliance was 89.56%; in the presence of the three correct identifiers, 25.07% and, in the specifications, 69.29%. The findings contributed to establish the situational diagnosis of the professionals' adherence to the institutional protocol. In addition, it will enable the implementation of measures for compliance with the proposed actions and strengthening of the safety culture. The resulting product was a video aimed at informing and sensitizing health professionals / support, patients and caregivers as to the importance of the first goal.
A identificação correta do paciente é fundamental na prestação do cuidado seguro, sendo a primeira meta internacional de segurança da Organização Mundial da Saúde. Os protocolos para identificação do paciente nos serviços de saúde padronizam as ações e reduzem a ocorrência de erros. O objetivo geral deste estudo foi avaliar a adesão dos profissionais ao protocolo institucional de identificação do paciente, nas unidades pediátricas de um hospital de ensino. Como objetivos específicos foram considerados: verificar se os profissionais de saúde/apoio identificam os pacientes com pulseiras; se conferem a identificação do mesmo antes dos cuidados/procedimentos/transferências/alta e se educam/orientam os pacientes/ acompanhantes sobre a correta identificação, conforme o protocolo; verificar a presença e a conformidade geral das pulseiras de identificação; e, produzir um vídeo enfatizando a importância das ações de identificação. Realizou-se um estudo transversal, com delineamento descritivo e abordagem quantitativa. A população foi composta pelos profissionais de saúde/apoio, atuantes na assistência aos pacientes do Pronto Socorro Pediátrico, Unidade de Tratamento Intensivo Pediátrico e Unidade Pediátrica Clínica e Cirúrgica de um hospital de ensino do Rio Grande do Sul. A amostra foi constituída por 385 oportunidades de observação das ações. Em cada oportunidade buscou-se: verificar se os pacientes estavam identificados com pulseiras – ação 1; observar se os profissionais conferiam a identificação dos pacientes – ação 2; e, se realizavam a educação dos pacientes/acompanhantes sobre a identificação correta – ação 3. Também, nas oportunidades em que a pulseira estava presente foi verificada a conformidade da mesma com o protocolo. A coleta dos dados ocorreu de abril a junho de 2017, mediante o preenchimento de um instrumento de pesquisa. Os dados foram digitados em planilhas do Excel 2007 e analisados por estatística descritiva. A adesão dos profissionais à ação 1 foi de 74,28%, a ação 2 não teve adesão, já a ação 3 teve adesão de 2,08%. A pulseira estava presente em 82,85% das oportunidades e a conformidade geral foi de 12,22%. Em relação à localização/fixação da pulseira, a conformidade foi de 89,56%; na presença dos três identificadores corretos, 25,07% e, nas especificações, 69,29%. Os achados contribuíram para estabelecer o diagnóstico situacional da adesão dos profissionais ao protocolo institucional. Além disso, possibilitará a implementação de medidas em prol do cumprimento das ações propostas e fortalecimento da cultura de segurança. O produto resultante foi um vídeo com a finalidade de informar e sensibilizar os profissionais de saúde/apoio, paciente e acompanhantes, quanto à importância da primeira meta.
Segata, Michele. "Safe and Efficient Communication Protocols for Platooning Control". Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368014.
Pełny tekst źródłaSegata, Michele. "Safe and Efficient Communication Protocols for Platooning Control". Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1644/1/phd-thesis-segata.pdf.
Pełny tekst źródłaSilvius, Mark D. "Building a Dynamic Spectrum Access Smart Radio With Application to Public Safety Disaster Communications". Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/28812.
Pełny tekst źródłaPh. D.
Qureshi, Umer. "AESTHETIC IMPACTS OF WIND FARM OBSTRUCTION LIGHTING : A STUDY ABOUT AVIATION SAFETY PROTOCOLS, LIGHTING TECHNOLOGY, AND PUBLIC ATTITUDES". Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323602.
Pełny tekst źródłaLemos, Cassiane de Santana. "Assistência de enfermagem no procedimento anestésico: protocolo para segurança do paciente". Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/7/7139/tde-13102015-161656/.
Pełny tekst źródłaIntroduction: The anesthetic procedure is critical for the execution of a surgery, and therefore requires the surgical team to prepare the planning of cares in order to ensure the safety and reduce the damages to the patient. In Brazil, the anesthetic procedure is exclusive to the anesthesiologist, while the surgical center nursing team assists the doctor with his/her activities. However, there is no directive on the provision of such cares. Objectives: To create a protocol of actions to orient the nurse during the anesthesia; to assess the validity and pertinence of the contents, the clarity of the items, and the coverage of the created protocol along with anesthesiologists and nurses specialized in perioperative nursing. Method: Survey the literature for articles published between 1978 and 2014, as indexed in the Medline/Pubmed, Cinahl, Lilacs, Cochrane, and Portal BVS databases on the nursing assistance in the surgical room during general anesthesias of adult patients. Elaboration of a protocol with 40 items based on the elaborated revision, and divided into three periods: before the anesthetic induction, induction, and reversal of anesthesia. The protocol was evaluated by 5 judges according to 4 items: validity of the contents, clarity, pertinence, and coverage. Each item was given scores from 1 to 5, according to the Likert scale. Namely: (1) strongly disagree, (2) disagree, (3) undecided, (4) agree, (5) strongly agree. The results were analyzed according to the content validity index (CVI). Results: The protocol was analyzed by 5 judges: 3 anesthesiologists, and 2 surgical center nurses. Before the anesthetic induction, the CVI varied from 60% to 100% in validity, 40% to 100% in clarity, 80% to 100% in pertinence, and 60% to 80% in coverage. The judges suggested changes to the items being tested and also an evaluation of the availability of materials. In the anesthetic induction, the CVI varied from 40% to 100% in validity, clarity, and content coverage, and from 20% to 100% in pertinence. The induction was the period with the most divergences between the judges, as they considered some procedures as exclusive to the anesthesiologist (ventilation assessment, venipuncture, record of vital signs). In the period of reversal of anesthesia, the validity and coverage had a CVI of 80% to 100%, with 6% to 100% for clarity and pertinence. In the reversal period, the judges suggested the monitoring of the patient for transportation, record of devices, and conditions of the patient before leaving the surgical room. Conclusion: In some countries, the nurse has a consolidated role in the anesthetic process, which includes work directives and certification. In Brazil, surgical center nurses assist the anesthesiologist during the anesthetic procedure, but they need an assistance protocol to direct the work and favor the quality, knowledge, and safety of such assistance.
CARADONNA, TIZIANA. "Emerging protozoan parasites and food safety: investigation in 'ready to eat' packaged salads by microscopy and molecular tools". Doctoral thesis, Università di Foggia, 2017. http://hdl.handle.net/11369/363293.
Pełny tekst źródłaTo investigate the prevalence of protozoan contamination by Giardia duodenalis, Cryptosporidium spp., Toxoplasma gondii and Cyclospora cayetanensis, in ‘ready to eat’ (RTE) salads on sale in Italy, 648 packages from industrial and local brands were purchased. Nine individual packages from each brand were collected per month, pooled and subjected to microscopy and molecular analyses. 864 slides were microscopically examined and Cryptosporidium spp. and also Blastocystis hominis and Dientamoeba fragilis were detected. By molecular tools G. duodenalis assemblage A, Cryptosporidium parvum and Cryptosporidium ubiquitum, T. gondii Type I and C. cayetanensis were identified. B. hominis and D. fragilis were also molecularly confirmed. The overall prevalence of each protozoan species was 0.6% for G. duodenalis, 0.8% for T. gondii, 0.9% for Cryptosporidium spp., and 1.3% for C. cayetanensis, whereas the prevalence of B. hominis and D. fragilis were 0.5% and 0.2%, respectively. By microscopy and/or molecular tools, 4.2% of the samples were contaminated by at least one protozoan species, and 0.6% of them showed contamination of two protozoan species with a range number of oocysts from 62 to 554 per g of vegetable for T. gondii, and 46 to 1.580 for C. cayetanensis. This is the Europe’s first large-scale study on the presence of protozoans in packaged salads. The results show that the prevalence of protozoan species in RTE salads is a cause for concern about human health in Europe, and in particular in Italy. Pending the inclusion of protozoan parasites in EU and Italian legislation to reduce the risks of RTE contamination and minimize their foodborne transmission, our results indicate the need for additional surveillance studies of possible sources of food contamination. The sampling methods designed in this research and the results obtained can provide the direction for monitoring fresh produce in other areas, and for surveillance studies on products. In addition, they can provide the basis for food safety guidelines, based also on the HACCP system, in order to reduce the risk of RTE contamination and to minimize foodborne disease transmission
Feliciano, Lizanel. "The efficacy of ware-washing protocols for removal of foodborne viruses from utensils in restaurants and food service establishments". The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345432152.
Pełny tekst źródłaTorrent-Moreno, Marc [Verfasser]. "Inter-vehicle communications : achieving safety in a distributed wireless environment ; challenges, systems and protocols / Universität Karlsruhe (TH), Institut für Telematik. Marc Torrent Moreno". Karlsruhe : Univ.-Verl. Karlsruhe, 2007. http://d-nb.info/985817410/34.
Pełny tekst źródłaBöhm, Annette, Magnus Jonsson i Elisabeth Uhlemann. "Adaptive Cooperative Awareness Messaging for Enhanced Overtaking Assistance on Rural Roads". Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16467.
Pełny tekst źródła©2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Category number CFP11VTF-ART; Code 87844
Dal, Pozzo Monique Junges. "Educação permanente em saúde: Estratégia para implantar protocolos de segurança do paciente em um hospital público". Universidade do Vale do Rio dos Sinos, 2014. http://www.repositorio.jesuita.org.br/handle/UNISINOS/3911.
Pełny tekst źródłaMade available in DSpace on 2015-06-16T22:55:36Z (GMT). No. of bitstreams: 1 25.pdf: 1986648 bytes, checksum: 2a0ccf033f8c13466acd5aaba5b4995c (MD5) Previous issue date: 2014
Nenhuma
A aplicação de Protocolos Assistenciais de Cuidado em Enfermagem (PACE) busca qualificar as práticas de cuidado, e para isso, a Educação Permanente em Saúde (EPS) é utilizada como uma ferramenta educativa, no sentido de promover o conhecimento sobre segurança do paciente. Objetivos: Implantar no Hospital Universitário de Canoas - RS (HU), os PACE adotados na Rede Mãe de Deus, com vistas ao processo de certificação; verificar como os técnicos vivenciam a aplicação dos PACE identificar contribuições que os PACE podem trazer para o HU; propor um plano de EPS com vistas à aplicação dos PACE. Método: Estudo desenvolvido com dez técnicos de enfermagem, do tipo exploratório-descritivo, enfoque qualitativo. Resultados: Dos Grupos Focais emergiram categorias: interferência da infraestrutura do hospital na assistência de enfermagem; interferência do trabalho desenvolvido pela equipe de enfermagem na assistência ao paciente; EPS como transformadora no cotidiano de trabalho da equipe de enfermagem; elaboração de uma ferramenta que favorece a aplicação das Metas Internacionais de Segurança, e um plano de sugestão de EPS com vistas à aplicação dos PACE. Conclusão: o Estudo servirá de guia para implantar melhorias na prática assistencial. Existem dificuldades, mas os processos de trabalho que dependem das pessoas estão ocorrendo.
The Application of Nursing Care Protocols (NCP) seeks to qualify the care practices, and for this, the Permanent Health Education (PHE) is used as a working tool, to promote knowledge about patient safety. Objectives: Implement in Hospital Universitário de Canoas - RS (HU), NCPs adopted in Network Mãe de Deus, with view to certification process; verify how technical team identifies the application od NCPs; identify contributions that NCPs may bring to HU; propose a PHE plan towards the implementation of NCP. Method: Study conducted with ten practical nurses, exploratory-descriptive, qualitative approach. Results: From the focus groups, categories were emerged: interference of the hospital infrastructure in nursing care; interference of nursing staff work in patient care; PHE as a modifier in the daily work of the nursing staff; development of a tool that promotes the implementation of the International Safety Goals and a PHE cue plan towards the implementation of NCPs. Conclusion: This study will serve as a guide to implement improvements in care practice. There are difficulties, but the work processes that depend on people are happening.
Vieira, Débora Feijó Villas Boas. "Implantação de protocolo de prevenção da pneumonia associada à ventilação mecânica : impacto do cuidado não farmacológico". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2009. http://hdl.handle.net/10183/18777.
Pełny tekst źródłaContext: In the past decade there has been a large increase in the number of measures aimed at improving service quality and promoting patient safety. Most of these measures have been aimed at reducing the incidence of preventable iatrogenic morbidities such as ventilator-associated pneumonia (VAP). While related clinical guidelines do exist, there is still little evidence to indicate which of the many non-pharmacological preventive care (NPPC) measures provide the best protection against VAP. Objectives: To evaluate the impact of NPPC interventions on the incidence of VAP. Methods: The population represented in this study are adult, intensive care patients, admitted without pneumonia, which required mechanical ventilation (MV) for at least 48 hours. The 34 bed intensive care center clinic and surgical is part of a public, university hospital in Porto Alegre, Brazil. The first article describes a quasi-experimental study done during the 40 months between September, 2004 and December, 2007. Halfway through this period a non-pharmacological, VAP prevention protocol was introduced to the routine care intubated patients. As such the control group are those patient treated prior to introduction of the protocol and the experimental group, those patients treated after its introduction. The second article describes a prospective study of cohort of patients requiring mechanical ventilation between June, 2006 and July 2007. Of the 11 NPPC interventions that make up the protocol, 6 were selected for this study: maintaining the head-of-bed elevation between 30º and 45º (HOB), maintaining the mechanical ventilation circuit (MVC) clean and dry, maintaining the heat moisture exchange (HME) equipment; maintaining endotracheal tube cuff pressure (CP) between 18 and 25 mmHg, realizing oral hygiene (OH) and doing respiratory physiotherapy (RP). These interventions were audited, for each patient during their entire length of stay, to measure compliance with the protocol. For each non-pharmacological preventive intervention, any patient receiving ≥8O% of the recommended frequency of care was considered to have received that intervention. Results: During a total of 20285 days of MV, 367 cases of VAP were diagnosed. The incidence of VAP fell 28.7% (p<0.001), between the 20 month pre-intervention period (20.6 cases/1.000 MV days) and the 20 month post-intervention periods (16 cases/1.000 MV days). In the analysis of segmented regression there was a significant abrupt reduction in the level of outcome (t = - 2.506; p=0.017), but reduction of tendency of the outcome was not significant (t= - 1.670; p= 0.104). In the second study compliance with the 6 non-pharmacological preventive interventions was measure by means of 5.781 observations in 541 patients of whom 111 developed VAP. Patients that received ≥8O% of the recommended frequency of a specific intervention exhibited a reduction in the risk of developing VAP: 61% for RP (OR= 0.39; CI95%= 0.18 to 0.84); 43% for HOB (OR= 0.57; CI95%= 0.31 to 0.99); 56% for OH (OR= 0.44; CI95%= 0.24 to 0.82) and 58% for CP (OR= 0.42; CI95%= 0.21 to 0.85). OH and CP maintenance are interdependent. In the absence of the other intervention each goes from being protective to being a risk factor. The VAP risk attributable to non-compliance in each of RP, OH, CP and HOB is estimated to be: 49% (CI95%= 13% to 65%), 29% (CI95%= 9% to 39%), 32% (CI95%= 8% to 44%) and 9% (CI95%= 0% to 13%) respectively. Conclusion: NPPC interventions are technologically simple, low cost that, in combination, provide a patient security and substantial level of protection against VAP.
Stinson, Jill D., Lee Ann McVay i Judith V. Becker. "Post-hospitalization Outcomes for Psychiatric Sex Offenders: Comparing Two Treatment Protocols". Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/7875.
Pełny tekst źródłaCamargo, André Bueno de. "Protocolos de segurança do paciente: proposta de um recurso educacional informatizado". Universidade Federal de São Carlos, 2013. https://repositorio.ufscar.br/handle/ufscar/3268.
Pełny tekst źródłaThis study aimed to develop a computerized educational resource on Patient Safety, and propose a Choosing Priorities in Education Service Tool, which give rise to a questionnaire rank the educational actions which should be priority. The creation of this resource was marked in Planning Learning Activities Supported by Computers, which is a methodology for developing educational content supported by computer. Evaluated the technical quality and usability of the resource based on the scale SUS (System Usability Scale), which quickly evaluates the usability of systems. The feature that prioritizes the educational measures was evaluated positively, can turn into a powerful educational tool in nursing education.
Este estudo objetivou desenvolver um recurso educacional informatizado sobre Segurança do Paciente, além de propor uma Ferramenta de Escolha de Prioridades de Educação em Serviço (FEPES), que originará um questionário para elencar as ações educativas que deverão ser prioritárias. A criação deste recurso foi pautada no Planejamento de Atividades de Aprendizado Apoiadas por Computador, sendo esta uma metodologia para o desenvolvimento de conteúdos educacionais apoiados por computador. Avaliou-se a qualidade técnica e a usabilidade do recurso baseouse na escala SUS (System Usability Scale), que avalia de forma rápida a usabilidade de sistemas. O recurso que prioriza as ações educativas foi avaliado positivamente, podendo transformar-se em uma ferramenta educacional potente no ensino de enfermagem.
Pereira, Filho José Ilo. "Protocolo para integração de requisitos de saúde e segurança do trabalho ao processo de desenvolvimento do produto da construção civil (PISP)". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2011. http://hdl.handle.net/10183/31394.
Pełny tekst źródłaSince 1990s, the concept design for safety (DFS) has been diffused as way of to reduce the accidents in construction site with causes derived of the characteristics of design. The utilization of DFS in the construction industry awakes the interest of several researches, but yet is low and has a gap between the concept and the application. So, the target this work is to propose a protocol for integration of health and safety work requirements at product development process (PISP), as way of to help engineers and architects to develop safe designs for temporary users of building (workers of construction and maintenance). The research method involved the realization of three cases: a residential undertaking, an industrial and a clinical, was the analysis object. The integration of health and safety work requirements at product development process was analysis unit this work. The protocol has four stages: identification of hazards, assessment of risks, identification of requirements and assessment and register of learning. The application in the development of designs allow the collaborative work between the participants of product development process (PDP), been recommended for incorporation at concurrent engineering process or at integrated development product, however, is adaptive at some method of development of product adopted by designer . The study verified that the integration of health and safety requirements since the early stages of PDP is viable and more solid that when made in design or redesign stages, as suggest the traditional concept of DFS.
Bodri, Daniel. "GNRH antagonists in oocyte donor cycles: the key to safe, simple and efficient stimulation protocols". Doctoral thesis, Universitat Autònoma de Barcelona, 2011. http://hdl.handle.net/10803/32068.
Pełny tekst źródłaBackground: Since its first description in 1984 the indications of oocyte donation (OD) has widened considerably which has led to a continuous increase in the number of OD treatment cycles performed worldwide. Although this treatment option secured the highest pregnancy rates for the recipients of donor oocytes increased efforts were also made to achieve safer and simpler treament protocols for the oocyte donor. During the last decade with the advent and increased use of the GnRH antagonists this new pharmacological agent was also explored in ovarian stimulation protocols specifically tailored for oocyte donors. Materials: The present doctoral thesis summarizes the findings of two recently published articles (2010) on the application of GnRH antagonists in the ovarian stimulation of oocyte donors. Furthermore the findings of another four strictly related articles (published in high-impact international journals between 2006 and 2009) are also discussed. The primary objectives were: 1. to compare efficiency of GnRH antagonist protocols in comparison with GnRH agonist-based protocols in the context of oocyte donation by means of a systematic review and meta-analysis and 2. to illustrate that GnRH antagonist protocols substantially increase the safety of ovarian stimulation for oocyte donors by reducing or even eliminating the incidence of moderate/severe ovarian hyperstimulation syndrome (OHSS). Results: 1. A meta-analysis of eight randomized clinical trials (RCTs) performed in oocyte donors undergoing stimulation with GnRH antagonists showed no significant difference in the number of retrieved oocytes or recipient ongoing pregnancy rate when compared with GnRH agonists. 2. A prospective, follow-up study of a group of high risk oocyte donors showed that early onset moderate/severe OHSS was completely eliminated after triggering with a GnRH agonist. Furthermore the findings of four studies supporting the above conclusions are also presented. Conclusions: In the context of oocyte donation the GnRH antagonist based ovarian stimulation protocols are equally efficient compared to down regulation by GnRH agonists. The induction of final oocyte maturation can be successfully achieved by a GnRH agonist instead of hCG which practically eliminates early-onset moderate/severe OHSS. The proposed ovarian stimulation protocol should be preferentially used because it permits the simplification and considerably increases the safety of ovarian stimulation for oocyte donors.
Hadded, Mohamed. "Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs)". Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0023/document.
Pełny tekst źródłaRoad crashes and their damages represent a serious issue and are one of the main causes of people death. In this context, Vehicular Ad hoc NETworks (VANETs) are deployed to reduce the risk of road accident as well as to improve passengers’ comfort by allowing vehicles to exchange different kinds of data which ranges widely from road safety and traffic management to infotainment. Nowadays, safety applications are receiving a great deal of attention from researchers as well as from automobile manufacturers. In this thesis, we particularly focus on safety-critical applications, designed to provide drivers assistance in dangerous situations and to avoid accidents in highway environments. Such applications must guarantee to the vehicles access to the medium and have strict requirements regarding end-to-end delay and packet loss ratio. Therefore, our main goal is to propose new medium access control and routing protocols, which can efficiently adapt to frequent changing VANET network topologies. After a comprehensive overview of free-contention MAC protocols, we propose several solutions, based on Time Division Multiple Access Technique (TDMA). We have designed DTMAC, a fully distributed TDMA-based MAC protocol, which does not rely on an expensive infrastructure. DTMAC uses vehicles’ locations and a slot reuse concept to ensure that vehicles in adjacent areas have collision-free schedule. Using simulations, we prove that DTMAC provides a lower rate of access and merging collisions than VeMAC, a well-known TDMA based MAC protocol in VANET. Then, in order to ensure that event-driven safety messages can be sent over a long distance, we propose TRPM, a TDMA aware Routing Protocol for Multi-hop communication. Our routing scheme is based on a cross layer approach between the MAC and the routing layers, in which the intermediate vehicles are selected using TDMA scheduling information. Simulation results show that TRPM provides better performances in terms of average end-to-end delay, average number of hops and average delivery ratio. In the second part, we focus on coordinator-based TDMA scheduling mechanisms. First, we propose the Centralized TDMA based MAC protocol (CTMAC) which uses Road Side Units (RSUs) as a central coordinator to create and maintain the TDMA schedules. CTMAC implements an Access Collision Avoidance mechanism that can prevent the access collision problem occurring more than twice between the same vehicles that are trying to access the channel at the same time. Using simulation we show an improvement in terms of access and merging collisions as well as the overhead required to create and maintain the TDMA schedules compared to distributed scheduling mechanisms. However, in the CTMAC protocol, fast moving vehicles will need to compete for new slots after a short period of time when they leave their current RSU area, which makes a centralized scheduling approach very expensive. In order to further improve the performance of coordinator-based TDMA scheduling mechanisms, we focus on cluster-based TDMA MAC protocols in which some vehicles in the network are elected to coordinate the channel access, allowing the vehicles to remain connected with their channel coordinator for a longer period of time. To this end, first we propose an adaptive weighted clustering protocol, named AWCP, which is road map dependent and uses road IDs and vehicle directions to make the clusters’ structure as stable as possible. Then, we formulate the AWCP parameter tuning as a multi-objective problem and we propose an optimization tool to find the optimal parameters of AWCP to ensure its QoS. Next, we propose ASAS, an adaptive slot assignment strategy for a cluster-based TDMA MAC protocol. This strategy is based on a cross layer approach involving TDMA and AWCP. The objective is to overcome the inter-cluster interference issue in overlapping areas by taking into account vehicles’ locations and directions when the cluster head assign slots
Oliveira, Edinaldo Silva de. "Avaliação estatística e protocolo para uso de cateter central de inserção periférica na oncohematologia". Universidade Tecnológica Federal do Paraná, 2017. http://repositorio.utfpr.edu.br/jspui/handle/1/2582.
Pełny tekst źródłaThe Peripherally Inserted Central Catheter (PICC) consists of an intravenous device, installed through a peripheral vein, wich advanced to the vena cava acquiring central catheter characteristics. In this sense, the present study had as general objective: to identify the feasibility conditions for the definition of standards and protocols that allow the use of PICC in adult and pediatric patients. And as specific objectives: to analyze the performance of the first and third generation of PICC in oncohematology patients comparing with the international literature; to detect sensitive points in the context of the use of the PICC for the protocol proposal; propose an instrument for the collection and relevant investigation of data and variables; and to propose protocol of use of PICC for pediatric and adult patients. This is a descriptive prospective longitudinal observational exploratory study with a quantitative approach. The research was developed in the Hematology, Oncology and Hematology Unit (UHHO) in the following sectors: Bone Marrow Transplantation Service (STMO), High Risk Chemotherapy (QTAR) and its outpatient clinics, Intensive Care Unit (ICU), cardiac, medical clinic and pediatric in a teaching hospital in the southern region of the country. The sample was non-probabilistic, for convenience consisted of two groups, (Group 1) patients who used the first generation of PICC and (Group 2) patients who used the third generation of the device. Data were collected from January 2015 to August 2016 through an instrument developed for this study, containing 22 socio-demographic variables and 35 clinical variables. 40 firstgeneration PICCs were inserted in 36 patients by "blind" techniques, totaling 830 days of catheter, average of 20.71 days, with a minimum range of two and a maximum of 141 days. Regarding the third generation of the catheter, ten PICCs were inserted in ten patients by Ultrasound-guided Modified Seldinger Technique (TSM), totaling 397 days of catheter, mean of 39.7 days with a minimum range of ten and a maximum of 86 Days. A descriptive analysis was performed by means of the absolute frequency distribution, mean and standard deviation. Afterwards, all variables were analyzed by 'Software R', we identified 11 main components that were strongly related and formed the basis of the Structural Equations Model (MEE). These variables express themselves in a relevant way for the development of future investigations. In summary, PICC can be used successfully in most patients admitted to oncohematology and other sectors in the hospital setting, as well as in children. It can be inserted by nurses, discharging the surgical environment, anesthetic process and the specialist doctor, granting them autonomy.
Hadded, Mohamed. "Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs)". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0023.
Pełny tekst źródłaRoad crashes and their damages represent a serious issue and are one of the main causes of people death. In this context, Vehicular Ad hoc NETworks (VANETs) are deployed to reduce the risk of road accident as well as to improve passengers’ comfort by allowing vehicles to exchange different kinds of data which ranges widely from road safety and traffic management to infotainment. Nowadays, safety applications are receiving a great deal of attention from researchers as well as from automobile manufacturers. In this thesis, we particularly focus on safety-critical applications, designed to provide drivers assistance in dangerous situations and to avoid accidents in highway environments. Such applications must guarantee to the vehicles access to the medium and have strict requirements regarding end-to-end delay and packet loss ratio. Therefore, our main goal is to propose new medium access control and routing protocols, which can efficiently adapt to frequent changing VANET network topologies. After a comprehensive overview of free-contention MAC protocols, we propose several solutions, based on Time Division Multiple Access Technique (TDMA). We have designed DTMAC, a fully distributed TDMA-based MAC protocol, which does not rely on an expensive infrastructure. DTMAC uses vehicles’ locations and a slot reuse concept to ensure that vehicles in adjacent areas have collision-free schedule. Using simulations, we prove that DTMAC provides a lower rate of access and merging collisions than VeMAC, a well-known TDMA based MAC protocol in VANET. Then, in order to ensure that event-driven safety messages can be sent over a long distance, we propose TRPM, a TDMA aware Routing Protocol for Multi-hop communication. Our routing scheme is based on a cross layer approach between the MAC and the routing layers, in which the intermediate vehicles are selected using TDMA scheduling information. Simulation results show that TRPM provides better performances in terms of average end-to-end delay, average number of hops and average delivery ratio. In the second part, we focus on coordinator-based TDMA scheduling mechanisms. First, we propose the Centralized TDMA based MAC protocol (CTMAC) which uses Road Side Units (RSUs) as a central coordinator to create and maintain the TDMA schedules. CTMAC implements an Access Collision Avoidance mechanism that can prevent the access collision problem occurring more than twice between the same vehicles that are trying to access the channel at the same time. Using simulation we show an improvement in terms of access and merging collisions as well as the overhead required to create and maintain the TDMA schedules compared to distributed scheduling mechanisms. However, in the CTMAC protocol, fast moving vehicles will need to compete for new slots after a short period of time when they leave their current RSU area, which makes a centralized scheduling approach very expensive. In order to further improve the performance of coordinator-based TDMA scheduling mechanisms, we focus on cluster-based TDMA MAC protocols in which some vehicles in the network are elected to coordinate the channel access, allowing the vehicles to remain connected with their channel coordinator for a longer period of time. To this end, first we propose an adaptive weighted clustering protocol, named AWCP, which is road map dependent and uses road IDs and vehicle directions to make the clusters’ structure as stable as possible. Then, we formulate the AWCP parameter tuning as a multi-objective problem and we propose an optimization tool to find the optimal parameters of AWCP to ensure its QoS. Next, we propose ASAS, an adaptive slot assignment strategy for a cluster-based TDMA MAC protocol. This strategy is based on a cross layer approach involving TDMA and AWCP. The objective is to overcome the inter-cluster interference issue in overlapping areas by taking into account vehicles’ locations and directions when the cluster head assign slots
Oliveira, Junior Maurício Lauro de. "Segurança do paciente: análise da adequação da prescrição em um hospital de ensino em relação ao protocolo do Ministério da Saúde". Niterói, 2017. https://app.uff.br/riuff/handle/1/5004.
Pełny tekst źródłaApproved for entry into archive by Ana Lúcia Torres (bfmhuap@gmail.com) on 2017-10-26T11:47:08Z (GMT) No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) DISSERTAÇAO MAURICIO OLIVEIRA JUNIOR.pdf: 1023259 bytes, checksum: 4ed2457b73e6102347a2ed9685dc851c (MD5)
Made available in DSpace on 2017-10-26T11:47:08Z (GMT). No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) DISSERTAÇAO MAURICIO OLIVEIRA JUNIOR.pdf: 1023259 bytes, checksum: 4ed2457b73e6102347a2ed9685dc851c (MD5) Previous issue date: 2017
Universidade Federal Fluminense. Centro de Ciências Médicas. Hospital Universitário Antônio Pedro
A primeira etapa da chegada do medicamento até o paciente se inicia através da elaboração da prescrição, sendo um dos pontos críticos e que influencia diretamente possíveis erros em etapas posteriores. No Brasil, através da portaria 529 de 2013 do Ministério da Saúde fica instituído o Programa Nacional de Segurança do Paciente que tem como objetivo estimular a cultura de segurança e para isso determina algumas ações e estratégias. Ainda em 2013 é lançado uma coleção de 6 protocolos de segurança, ente eles o de prescrição, uso e administração de medicamentos, que traz orientação para minimização do risco quanto ao processo de utilização do medicamento dentro de estabelecimentos de saúde. O presente estudo teve como objetivos analisar a adequação das prescrições em um hospital universitário frente ao protocolo, analisando para tal os diferentes setores e quantificando os tipos de prescrições existentes. Para tanto foi feito um estudo retrospectivo, onde foram analisadas 2006 prescrições, totalizando 20255 medicamentos onde a média foi de 10,10 ± (5,10) medicamentos por prescrição. Dessas, 100% (n=2006) tiveram algum tipo de erro, 47,6% (n=954) tiveram antibióticos prescritos e 87,5% (n=1755) de injetáveis prescritos. Dos medicamentos analisados 79,2% (n=16049) foram prescritos pelo nome genérico e 96,4% (n=19524) constavam na lista de padronização do hospital. Quanto ao tipo de prescrições 73,8% (n=1480) foram digitadas, 16,7% (n=336) foram manuscritas e 9,5% (n=190) foram mistas, sendo que 5,98% (n=120) foram consideradas ilegíveis (n=6), ou parcialmente ilegíveis (n=114) e desse total 94,2% (n=112) foi proveniente das prescrições manuscritas o que mostra uma associação entre a legibilidade e o tipo de prescrição. É importante ressaltar que a busca pela qualidade e segurança é um processo constante, devendo estar sempre em evolução na instituição, e diante do exposto, a identificação das inadequações, pode contribuir com o direcionamento das ações internas para minimizar os riscos aos pacientes, assim como servir como base para estudos futuros
The first stage of the arrival of the drug to the patient begins with the elaboration of the prescription, being one of the critical points and that directly influences possible errors in later stages. In Brazil, starting in 2013, the National Patient Safety Program (PNSP) is set up in order to stimulate the safety culture, and for this purpose it determines some actions and strategies. Also in 2013, a collection of 6 safety protocols, including prescription, use and administration of medicines, is launched, which provides guidance on risk minimization regarding the process of drug use within health facilities. The present study had as objectives to analyze the adequacy of the prescription of a university hospital regarding such protocol, analyzing the different sectors and quantifying the types of prescriptions available. For that, a retrospective study was carried out, where 2006 prescriptions were analyzed and a total of 20255 drugs were used, where the average was 10.10 ± (5.10) prescription medications. Of these, 100% (n = 2006) had some type of error, 47.56% (n = 954) had prescribed antibiotics and 87.49% (n = 1755) of prescribed injectables. Of the drugs analyzed, 79.23% (n = 16049) were prescribed by the generic name and 96.39% (n = 19524) were on the hospital standardization list. Regarding the type of prescriptions 73.8% (n = 1480) were entered 16.7% (n = 336) were handwritten and 9.5% (n = 190) were mixed, with 5.98% (n=120 were considered illegible (n = 6) or partially illegible (n = 114) and 94.2% (n = 112) came from handwritten prescriptions, which shows an association between readability and type of prescription. It is important to emphasize that the search for quality and safety is a constant process, and should always be evolving in the institution and before the exposed the identification of the inadequacies, can contribute with the direction of the internal actions to minimize the risks as well as to serve as basis for studies Futures