165 research outputs found

    Doctor of Philosophy

    Get PDF
    dissertationThe task of comparing and evaluating the performance of different computer-based clinical protocols is difficult and expensive to accomplish. This dissertation explores methods to compare and evaluate computer-based insulin infusion protocols based on an in silico analytical framework iteratively developed for this study, using data from the intensive care unit (ICU). In Methods for Aim 1, we used a pairwise comparative technique to evaluate two computer-based insulin infusion protocols. Our result showed that the pairwise method can rapidly identify a promising computer-based clinical protocol but with limitations. In Methods for Aim 2, we used a ranking strategy to evaluate six computer-based insulin infusion protocols. The ranking method enabled us to overcome a key limitation in Methods for Aim 1, making it possible to compare multiple computer-based clinical protocols simultaneously. In Methods for Aim 3, we developed a more comprehensive in silico method based on multiple-criteria decision analysis that included user-defined performance evaluation criteria examining different facets of the computer-based insulin infusion protocols. The in silico method appears to be an efficient way for identifying promising computer-based clinical protocols suitable for clinical evaluation. We discuss the advantages and disadvantages for each of the presented methods. We also discuss future research work and the generalizability of the framework to other potential clinical areas

    Protecting critical infrastructure in the EU: CEPS task force report

    Get PDF
    2sìCritical infrastructures such as energy, communications, banking, transportation, public government services, information technology etc., are more vital to industrialized economies and now than ever before. At the same time, these infrastructures are becoming increasingly dependent on each other, such that failure of one of them can often propagate and result in domino effects. The emerging challenge of Critical (information) Infrastructure Protection (C(I)IP) has been recognized by nearly all member states of the European Union: politicians are increasingly aware of the threats posed by radical political movements and terrorist attacks, as well as the need to develop better response capacity in case of natural disasters. Responses to these facts have been in line with the available resources and possibilities of each country, so that certain countries are already quite advanced in translating the C(I)IP challenge into measures, whereas others are lagging behind. In the international arena of this policy domain, Europe is still in search of a role to play. Recently, CIIP policy has been integrated in the EU Digital Agenda, which testifies to the growing importance of securing resilient infrastructures for the future. This important and most topical Task Force Report is the result of in-depth discussions between experts from different backgrounds and offers a number of observations and recommendations for a more effective and joined-up European policy response to the protection of critical infrastructure.openopenAndrea Renda; Bernhard HaemmerliRenda, Andrea; Bernhard, Haemmerl

    Current Efforts Concerning ICT Security of the Power Grid

    Get PDF
    GRID is a Coordination Action funded under the Trust and Security objective of the IST Programme of the 6th Framework to achieve consensus at the European level on the key issues involved by power systems vulnerabilities, in view of the challenges driven by the transformation of the European power infrastructure and ICT integration. GRID wants to assess the needs of the EU power sector on these issues, so as to establish a Roadmap for collaborative research in this area. The present report provides a survey on current efforts somewhat related to the objectives of GRID. Similar to GRID, a number of European and US endeavours have attempted in recent years to draw a Road Map so as to coordinate efforts concerning energy transport/distribution research and CIP.JRC.G.6-Sensors, radar technologies and cybersecurit

    Informacijos saugos valdymo karkasas smulkiam ir vidutiniam verslui

    Get PDF
    Information security is one of the concerns any organization or person faces. The list of new threats appears, and information security management mechanisms have to be established and continuously updated to be able to fight against possible security issues. To be up to date with existing information technology threats and prevention, protection, maintenance possibilities, more significant organizations establish positions or even departments, to be responsible for the information security management. However, small and medium enterprise (SME) does not have enough capacities. Therefore, the information security management situation in SMEs is fragmented and needs improvement. In this thesis, the problem of information security management in the small and medium enterprise is analyzed. It aims to simplify the information security management process in the small and medium enterprise by proposing concentrated information and tools in information security management framework. Existence of an information security framework could motivate SME to use it in practice and lead to an increase of SME security level. The dissertation consists of an introduction, four main chapters and general conclusions. The first chapter introduces the problem of information security management and its’ automation. Moreover, state-of-the-art frameworks for information security management in SME are analyzed and compared. The second chapter proposes a novel information security management framework and guidelines on its adoption. The framework is designed based on existing methodologies and frameworks. A need for a model for security evaluation based on the organization’s management structure noticed in chapter two; therefore, new probability theory-based model for organizations information flow security level estimation presented in chapter three. The fourth chapter presents the validation of proposed security evaluation models by showing results of a case study and experts ranking of the same situations. The multi-criteria analysis was executed to evaluate the ISMF suitability to be applied in a small and medium enterprise. In this chapter, we also analyze the opinion of information technology employees in an SME on newly proposed information security management framework as well as a new model for information security level estimation. The thesis is summarized by the general conclusions which confirm the need of newly proposed framework and associated tools as well as its suitability to be used in SME to increase the understanding of current information security threat situation.Dissertatio

    Water.orgs New Ventures Fund

    Get PDF
    The New Venture Fund was mandated to support a wide portfolio of innovations, situating its interventions at the base of the economic pyramid (BOP), with reference to people who live on less US$1.25-6/day, creating and responding to bottom-up demand for water supply and sanitation (WSS) solutions. This evaluation was designed for the purposes of learning. For Water.org, the C&A Foundation and other related stakeholders, this evaluation has sought to provide insights on the design of the NVF, on its effectiveness in supporting the generation of innovations and results, and on the sustainability and scalability of those innovations

    Quality of life in intestinal failure

    Get PDF
    PhDAims/objectives: The objectives of this research were to investigate and compare aspects of Quality of Life (QoL) in adult patients who require HPN, in adult patients who have pseudo-obstruction, and in carers of, and children on, HPN. Methods: Demographic data, clinical parameters and current symptoms were collected and analysed. Generic QoL questionnaires were applied to the above groups. Results: HPN patients have significantly lower QoL than the rest of the UK population, report increased levels of bodily pain, anxiety and depression, a reduction in physical functioning, social functioning, general health, vitality and satisfactory levels of mental health and emotional functioning. Aspects of QoL improve over the first 6 months on HPN. Pseudo-obstruction has a negative impact on all aspects of QoL when compared to a normal population. A previous intestinal resection and opiate use had a negative impact on aspects of QoL. Carers of a child on HPN seek more social support and use more positive reappraisal coping strategies, more planful problem solving and less distancing than the controls and a higher level of psychiatric disorder is also seen. Children on HPN have a poorer functional status than those not on HPN, and there is a correlation between level of child dysfunction and parental general health. Families caring for a child on HPN function within normal and healthy parameters. Conclusions: Our studies indicate that the loss of intestinal function does have a negative impact on aspects of QoL but patients make adjustments to meet everyday requirements, even if it produces limitations with which these persons have to live by

    Application of Power Electronics Converters in Smart Grids and Renewable Energy Systems

    Get PDF
    This book focuses on the applications of Power Electronics Converters in smart grids and renewable energy systems. The topics covered include methods to CO2 emission control, schemes for electric vehicle charging, reliable renewable energy forecasting methods, and various power electronics converters. The converters include the quasi neutral point clamped inverter, MPPT algorithms, the bidirectional DC-DC converter, and the push–pull converter with a fuzzy logic controller

    Innovation-ICT-cybersecurity: The triad relationship and its impact on growth competitiveness

    Get PDF
    This study examines the global growth competitiveness of countries using the dynamics of growth, ICT, and innovation. It also introduces a new dynamic, cybersecurity, and argues that within a growth competitiveness framework, ICT, innovation, and cybersecurity mechanisms allow some countries to achieve higher ranks on the competitiveness ladder than others. Based on a theoretical framework that encompasses the economic growth model, the complementarity theory, and the international law theory, a model that integrates ICT, innovation, and cybersecurity, depicts the relationships amongst them and with growth competitiveness, and incorporates complementary factors with possible moderating effect is presented. The model proposed relationships are then tested using PLS-PM. The model proves to have adequate goodness-of-fit as well as predictive validity. Results support most hypotheses showing: (1) a positive relationship between ICT and innovation; (2) a positive relationship between each of innovation and ICT with growth competitiveness; (3) a mediating effect of innovation has in the ICT – growth competitiveness relationship; (4) a positive relationship between ICT and innovation on one hand and cybersecurity on the other; (5) a mediating role of cybersecurity in the ICT – growth as well as the innovation – growth relationships; and the (6) moderating effect that human capital has in the above relationships. Cyber threats, however, do not have a moderator role in these relationships. These findings are interpreted in relation to the extant body of knowledge related to ICT, innovation, and cybersecurity. Moreover, the theoretical and the practical implications are discussed and the practical significance is shown. Finally, the study limitations are listed, the recommendations are presented, and the direction for future work is discussed
    corecore