To see the other types of publications on this topic, follow the link: Incident data.

Dissertations / Theses on the topic 'Incident data'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Incident data.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Anand, Sumit. "Novel applications of data mining methodologies to incident databases." Texas A&M University, 2003. http://hdl.handle.net/1969.1/3998.

Full text
Abstract:
Incident databases provide an excellent opportunity to study the repeated situations of incidents in the process industry. The databases give an insight into the situation which led to an incident, and if studied properly can help monitor the process, equipment and chemical involved more closely, and reduce the number of incidents in the future. This study examined a subset of incidents from National Response Center’s Incident database, focusing mainly on fixed facility incidents in Harris County, Texas from 1990 to 2002. Data mining has been used in the financial and marketing arena for many
APA, Harvard, Vancouver, ISO, and other styles
2

Igboamalu, Frank Nonso. "Decision tree classifiers for incident call data sets." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/27076.

Full text
Abstract:
Information technology (IT) has become one of the key technologies for economic and social development in any organization. Therefore the management of Information technology incidents, and particularly in the area of resolving the problem very fast, is of concern to Information technology managers. Delays can result when incorrect subjects are assigned to Information technology incident calls: because the person sent to remedy the problem has the wrong expertise or has not brought with them the software or hardware they need to help that user. In the case study used for this work, there are n
APA, Harvard, Vancouver, ISO, and other styles
3

Gray, Michael David Thomas Robert Evans. "Data mining medication administration incident data to identify opportunities for improving patient safety." Auburn, Ala., 2009. http://hdl.handle.net/10415/1998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Malley, Mark G. "Proactive IT Incident Prevention: Using Data Analytics to Reduce Service Interruptions." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3404.

Full text
Abstract:
The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headq
APA, Harvard, Vancouver, ISO, and other styles
5

Grispos, George. "On the enhancement of data quality in security incident response investigations." Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7293/.

Full text
Abstract:
Security incidents detected by information technology-dependent organisations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organisations in an effort to minimise the damage from security incidents. To help organisations develop security incident response capabilities, several security incident response approaches and best practice guidelines have been published in both industry and academia. The final phase within many of these approaches and best practices is the ‘feedback’ or ‘follow-up’ phase. Within this phase, it
APA, Harvard, Vancouver, ISO, and other styles
6

Xia, Jingxin. "DYNAMIC FREEWAY TRAVEL TIME PREDICTION USING SINGLE LOOP DETECTOR AND INCIDENT DATA." UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_diss/315.

Full text
Abstract:
The accurate estimation of travel time is valuable for a variety of transportation applications such as freeway performance evaluation and real-time traveler information. Given the extensive availability of traffic data collected by intelligent transportation systems, a variety of travel time estimation methods have been developed. Despite limited success under light traffic conditions, traditional corridor travel time prediction methods have suffered various drawbacks. First, most of these methods are developed based on data generated by dual-loop detectors that contain average spot speeds. H
APA, Harvard, Vancouver, ISO, and other styles
7

Salter, Chris. "Economics of fire : exploring fire incident data for a design tool methodology." Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13199.

Full text
Abstract:
Fires within the built environment are a fact of life and through design and the application of the building regulations and design codes, the risk of fire to the building occupants can be minimised. However, the building regulations within the UK do not deal with property protection and focus solely on the safety of the building occupants. This research details the statistical analysis of the UK Fire and Rescue Service and the Fire Protection Association's fire incident databases to create a loss model framework, allowing the designers of a buildings fire safety systems to conduct a cost bene
APA, Harvard, Vancouver, ISO, and other styles
8

Thomas, Kim. "Incident detection on arterials using neural network data fusion of simulated probe vehicle and loop detector data /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18433.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Castillo, Jose Carlos. "The User-Reported Critical Incident Method for Remote Usability Evaluation." Thesis, Virginia Tech, 1997. http://hdl.handle.net/10919/35513.

Full text
Abstract:
<P>Much traditional user interface evaluation is conducted in usability laboratories, where a small number of selected users is directly observed by trained evaluators. However, as the network itself and the remote work setting have become intrinsic parts of usage patterns, evaluators often have limited access to representative users for usability evaluation in the laboratory and the users' work context is difficult or impossible to reproduce in a laboratory setting. These barriers to usability evaluation led to extending the concept of usability evaluation beyond the laboratory, typically usi
APA, Harvard, Vancouver, ISO, and other styles
10

Cheevarunothai, Patikhom. "Development of methods for improving inductance loop data quality and quantifying incident-induced delay on freeways /." Thesis, Connect to this title online; UW restricted, 2008. http://hdl.handle.net/1773/10204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Michel, David. "Efficient and Responsible Incident Management : Designing a Service Desk Web Application with Integrated Major Incident Reporting Functionality for Swedish Government Agencies." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105852.

Full text
Abstract:
In this 7.5 HEC B-level thesis in Computer Science, a service desk web application is designed for Swedish government agencies with integrated major incident reporting functionality to the Swedish Civil Contingencies Agency (Myndigheten för samhällsskydd och beredskap). There are several advantages to integrating the major incident reporting procedure into the regular incident management process - information would no longer have to be duplicated, and the problems of untraceability and under-reporting could additionally be solved. The proof-of-concept application was designed and partially dev
APA, Harvard, Vancouver, ISO, and other styles
12

Krishnaswamy, Vijay. "Heuristic network generator : an expert systems approach for selection of alternative routes during incident conditions /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-05022009-040559/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kobezak, Philip D. "Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83375.

Full text
Abstract:
Challenges exist in higher education networks with host inventory and identification. Any student, staff, faculty, or dedicated IT administrator can be the primary responsible personnel for devices on the network. Confounding the problem is that there is also a large mix of personally-owned devices. These network environments are a hybrid of corporate enterprise, federated network, and Internet service provider. This management model has survived for decades based on the ability to identify responsible personnel when a host, system, or user account is suspected to have been compromised or is d
APA, Harvard, Vancouver, ISO, and other styles
14

Kadletz, Lukáš. "Anotace NetFlow dat z pohledu bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255446.

Full text
Abstract:
This thesis describes design and implementation of application for offline NetFlow data annotation from perspective of network security. In this thesis is explained the NetFlow architecture in detail along with methods for security incidents detection in the captured data. The application design is based on analysis of manual annotation and supported by several UML diagrams. The Nemea system is used for detecting security events and Warden system as a source of information about reported security incidents on the network. The application uses technologies such as PHP 5, Nette framework, jQuery
APA, Harvard, Vancouver, ISO, and other styles
15

Steenkamp, Margaretha. "Multiple imputation of missing data and prognostic survival modelling for incident patients starting dialysis in England, Wales and Northern Ireland." Thesis, University of Bristol, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.665465.

Full text
Abstract:
Background The UK Renal Registry (UKRR) collects data, performs clinical audit and reports on achievement of clinical standards and outcomes for patients on renal replacement therapy (RRT). Mortality predictions for patients starting dialysis are important, especially for elderly patients with an increased risk of death. Studies have shown that patients who are considering starting dialysis, do want prognostic information to aid informed decision making. The main aim of the prognostic model developed in this research, is to provide realistic and objective prognostic information to clinicians w
APA, Harvard, Vancouver, ISO, and other styles
16

Medupe, Tsietsi Jacob. "Configuration management data base in an information and communication technology environment / T.J. Medupe." Thesis, North-West University, 2009. http://hdl.handle.net/10394/4769.

Full text
Abstract:
There are more requirements for business to be able to run its operations successfully in terms of legal compliance and revenue streams optimisations. Businesses are placing high demands on Information and Communication Technology (ICT) to adapt to changing conditions. However, ICT organisations tasked with providing increased service levels at lower costs do not have the resources to reinvent itself with every technological or regulatory change. Without frameworks in place to leverage automation and best practices, these ICT, organisations are consumed with the day-to-day operations of ICT wi
APA, Harvard, Vancouver, ISO, and other styles
17

Ahlqvist, Petter, and Johan Vagiström. "Kravställning på Incidenthanteringssystem." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-1035.

Full text
Abstract:
Användandet av IT relaterade tjänster har ökat kraftigt de senaste åren och visar inga tecken på att avstanna. Men i takt med att användningen ökar så ökar även riskerna, för vad händer egentligen när de IT-tjänster som så många företag och privatpersoner förlitar sig på plötsligt fallerar eller på annat sätt blir oåtkomliga? För att skydda sig mot sådana scenarier så blir det allt vanligare bland företag som driver IT-tjänster att använda sig incidenthantering, vars syfte är att genom fördefinierade processer återställa IT-tjänster till fungerande läge när en incident väl inträffar. För att i
APA, Harvard, Vancouver, ISO, and other styles
18

Khazraeian, Samaneh. "Methods for Utilizing Connected Vehicle Data in Support of Traffic Bottleneck Management." FIU Digital Commons, 2017. https://digitalcommons.fiu.edu/etd/3496.

Full text
Abstract:
The decision to select the best Intelligent Transportation System (ITS) technologies from available options has always been a challenging task. The availability of connected vehicle/automated vehicle (CV/AV) technologies in the near future is expected to add to the complexity of the ITS investment decision-making process. The goal of this research is to develop a multi-criteria decision-making analysis (MCDA) framework to support traffic agencies’ decision-making process with consideration of CV/AV technologies. The decision to select between technology alternatives is based on identified perf
APA, Harvard, Vancouver, ISO, and other styles
19

Galletti, Thomas. "Data breach - services for threat detection, analysis and response." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7026/.

Full text
Abstract:
Nel mondo della sicurezza informatica, le tecnologie si evolvono per far fronte alle minacce. Non è possibile prescindere dalla prevenzione, ma occorre accettare il fatto che nessuna barriera risulterà impenetrabile e che la rilevazione, unitamente ad una pronta risposta, rappresenta una linea estremamente critica di difesa, ma l’unica veramente attuabile per poter guadagnare più tempo possibile o per limitare i danni. Introdurremo quindi un nuovo modello operativo composto da procedure capaci di affrontare le nuove sfide che il malware costantemente offre e allo stesso tempo di sollevare i c
APA, Harvard, Vancouver, ISO, and other styles
20

Dunbar, Rory. "Accuracy and completeness of notification of tuberculosis in two high incident communities in Cape Town, South Africa." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17870.

Full text
Abstract:
Thesis (MScMedSc)--Stellenbosch University, 2011.<br>ENGLISH ABSTRACT: Introduction: Tuberculosis (TB) treatment registers and laboratory records are essential recording and reporting tools in TB control programmes. Reliable data are essential for any TB control programme but under-registration of TB cases has been well documented internationally, due to under-reporting of patients on treatment or failure to initiate treatment. The accuracy and completeness of routinely collected data are seldom monitored. Aim: This study used record linking to assess the accuracy and completeness of TB t
APA, Harvard, Vancouver, ISO, and other styles
21

Zeng, Chunqiu. "Large Scale Data Mining for IT Service Management." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/3051.

Full text
Abstract:
More than ever, businesses heavily rely on IT service delivery to meet their current and frequently changing business requirements. Optimizing the quality of service delivery improves customer satisfaction and continues to be a critical driver for business growth. The routine maintenance procedure plays a key function in IT service management, which typically involves problem detection, determination and resolution for the service infrastructure. Many IT Service Providers adopt partial automation for incident diagnosis and resolution where the operation of the system administrators and automat
APA, Harvard, Vancouver, ISO, and other styles
22

Petraglia, Elizabeth Ellen. "Estimating County-Level Aggravated Assault Rates by Combining Data from the National Crime Victimization Survey (NCVS) and the National Incident-Based Reporting System (NIBRS)." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1439027433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Homem, Irvin. "LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.

Full text
Abstract:
The Internet in its most basic form is a complex information sharing organism. There are billions of interconnected elements with varying capabilities that work together supporting numerous activities (services) through this information sharing. In recent times, these elements have become portable, mobile, highly computationally capable and more than ever intertwined with human controllers and their activities. They are also rapidly being embedded into other everyday objects and sharing more and more information in order to facilitate automation, signaling that the rise of the Internet of Thin
APA, Harvard, Vancouver, ISO, and other styles
24

Christoforou, Zoi. "Incidence occurrence and response on urban freeways." Phd thesis, Université Paris-Est, 2010. http://tel.archives-ouvertes.fr/tel-00626573.

Full text
Abstract:
Research on road safety has been of great interest to engineers and planners for decades. Regardless of modeling techniques, a serious factor of inaccuracy - in most past studies - has been data aggregation. Nowadays, most freeways are equipped with continuous surveillance systems making disaggregate traffic data readily available ; these have been used in few studies. In this context, the main objective of this dissertation is to capitalize highway traffic data collected on a real-time basis at the moment of accident occurrence in order to expand previous road safety work and to highlight pot
APA, Harvard, Vancouver, ISO, and other styles
25

Cahová, Veronika. "Inovace procesů zpracování osobních údajů u státní organizace." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222375.

Full text
Abstract:
Master's thesis "Innovation processes personal data for the state organization," deals with the protection of personal data for processing, both in paper, as well as electronic form. The main topic is security policy, the assessment of security risks resulting proposals for the introduction of innovative processes aimed to prevent possible leakage and misuse of personal data.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Linxi. "Behind the Chatbot : Investigate the Design Process of Commercial Conversational Experience." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-265544.

Full text
Abstract:
The messaging-based conversational interfaces, commonly called Chatbots, have seen massive growth lately. With the proliferation of Chatbots, there is a growing demand for a better understanding of the design practices behind conversational user experience. This thesis looked into the design process of a Chatbot-based project built on the RCS business messaging platform, and the workflow was investigated through contextual inquiry and critical incident interview techniques. The challenges experienced by practitioners from different disciplines are detailed, with a focus on their respective wor
APA, Harvard, Vancouver, ISO, and other styles
27

Khatri, Chandra P. "Real-time road traffic information detection through social media." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53889.

Full text
Abstract:
In current study, a mechanism to extract traffic related information such as congestion and incidents from textual data from the internet is proposed. The current source of data is Twitter, however, the same mechanism can be extended to any kind of text available on the internet. As the data being considered is extremely large in size automated models are developed to stream, download, and mine the data in real-time. Furthermore, if any tweet has traffic related information then the models should be able to infer and extract this data. To pursue this task, Artificial Intelligence, Machine Lear
APA, Harvard, Vancouver, ISO, and other styles
28

Lima, Mariana Sarmanho de Oliveira. "A aplicabilidade do gás natural do ponto de vista mercadológico, econômico e ambiental: um estudo para os Estados do Amazonas e de São Paulo." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/18/18140/tde-27062011-141122/.

Full text
Abstract:
A atividade industrial é um dos principais causadores dos impactos negativos ao meio ambiente, pois, para operar um processo produtivo, é indispensável o uso de insumos oriundos de recursos naturais. Para amenizar esse problema, é importante ampliar a participação de insumos energéticos mais limpos na matriz energética da indústria brasileira, a fim de promover um crescimento calcado nas propostas do desenvolvimento sustentável. Uma alternativa energética, que passou a ter importância diante da crise energética de 2000/2001, foi o gás natural (GN). O GN traz grandes expectativas ao consumidor
APA, Harvard, Vancouver, ISO, and other styles
29

Mohd, Saudi Madihah. "A new model for worm detection and response : development and evaluation of a new model based on knowledge discovery and data mining techniques to detect and respond to worm infection by integrating incident response, security metrics and apoptosis." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5410.

Full text
Abstract:
Worms have been improved and a range of sophisticated techniques have been integrated, which make the detection and response processes much harder and longer than in the past. Therefore, in this thesis, a STAKCERT (Starter Kit for Computer Emergency Response Team) model is built to detect worms attack in order to respond to worms more efficiently. The novelty and the strengths of the STAKCERT model lies in the method implemented which consists of STAKCERT KDD processes and the development of STAKCERT worm classification, STAKCERT relational model and STAKCERT worm apoptosis algorithm. The new
APA, Harvard, Vancouver, ISO, and other styles
30

Carrick, Grady Thomas. "Data collection needs for work zone incidents." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0015618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Samita, Sembakutti. "Analysis of aggregated plant disease incidence data." Thesis, University of Edinburgh, 1995. http://hdl.handle.net/1842/27331.

Full text
Abstract:
If diseased plants (or plant units) are randomly dispersed, the frequency distribution of diseased plants (or plant units) per sample may be described by a binomial distribution, and statistical analyses may be based on the linear logistic model. Since most disease incidence data do not have a random spatial pattern, the binomial distribution can hardly ever, in practice, be used to describe observed frequencies. In this study, the use of conditional probability distributions, such as the logistic-normal binomial distribution, for such data is illustrated. Both descriptive distribution fitting
APA, Harvard, Vancouver, ISO, and other styles
32

Brizzi, Francesco. "Estimating HIV incidence from multiple sources of data." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/273803.

Full text
Abstract:
This thesis develops novel statistical methodology for estimating the incidence and the prevalence of Human Immunodeficiency Virus (HIV) using routinely collected surveillance data. The robust estimation of HIV incidence and prevalence is crucial to correctly evaluate the effectiveness of targeted public health interventions and to accurately predict the HIV- related burden imposed on healthcare services. Bayesian CD4-based multi-state back-calculation methods are a key tool for monitoring the HIV epidemic, providing estimates of HIV incidence and diagnosis rates by disentangling their competi
APA, Harvard, Vancouver, ISO, and other styles
33

Bedford, Ronald L. Field R. William. "Utility of death certificate data in predicting cancer incidence." [Iowa City, Iowa] : University of Iowa, 2009. http://ir.uiowa.edu/etd/336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Bedford, Ronald L. "Utility of death certificate data in predicting cancer incidence." Thesis, University of Iowa, 2009. https://ir.uiowa.edu/etd/336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bhatkhande, Yogesh Dilip. "Comparison of Traditional and Activity Theory Based Analysis Methods for Verbal Protocol Data." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/34221.

Full text
Abstract:
The think aloud method has been used in this research to generate data that reveals the thoughts of participants of a study while they are performing tasks. The pioneers of this method, Simon and Ericsson, have provided a method to analyze the data so as to obtain meaningful results. However, this analysis method is complicated and time consuming. Most researchers use some form of categorization to perform their analysis. Critical incidents were used to categorize the data gathered in the tests conducted as part of this research. This research proposed the use of tenets of Activity Theory whil
APA, Harvard, Vancouver, ISO, and other styles
36

Kingkeow, Chamnong. "The use of routinely collected epidemiological data to improve malaria control in northwestern Thailand." Thesis, London School of Hygiene and Tropical Medicine (University of London), 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Legrand, Véronique. "Confiance et risque pour engager un échange en milieu hostile." Thesis, Lyon, INSA, 2013. http://www.theses.fr/2013ISAL0041.

Full text
Abstract:
De nos jours, l’échange électronique est le seul média qui offre l’accès à l’information pour tous, partout et tout le temps, mais en même temps il s’est ouvert à de nouvelles formes de vulnérabilités. La régulation des systèmes numériques, en héritage de la régulation cybernétique, maintient les équilibres à l’aide d’une boucle de rétroaction négative. Ainsi, leurs sys-tèmes de défense, désignés sous le terme de zone démilitarisée (DMZ) suivent-ils une régulation cybernétique en émettant ce que l’on appelle des évènements de sécurité. De tels évènements sont issus de sondes de surveillance qu
APA, Harvard, Vancouver, ISO, and other styles
38

Currie, Janet Elizabeth. "Joint modelling of point process and geostatistical measurement data." Thesis, Lancaster University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Akpinar, Ebru. "Using Geographic Information Systems In Analysing The Pattern Of Crime Incidents And The Relationship Between Landuse And Incidents." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12605931/index.pdf.

Full text
Abstract:
The location where crime events occur is an important factor in the analysis of crime. It is not only important where a crime incident takes place but also the characteristics of those places and the environment in which incident occurs. Thus, examination of spatial data such as street networks, parcel information, school locations, commercial and residential zoning, is imperative for effective crime analysis, crime prevention and police activities. Using variables, relating to five incident types as burglary, auto, pick pocket, usurp and murder, which are recorded by the police in 2003 and i
APA, Harvard, Vancouver, ISO, and other styles
40

Ferracin, Andrea. "Acquisizione, ricostruzione ed analisi di dati rotazionali da dispositivo mobile." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6704/.

Full text
Abstract:
Abbiamo analizzato il comportamento di dispositivi mobili allo scopo di acquisire, ricostruire ed analizzare dati rotazionali da veicoli in movimento. E' possibile ricostruire solo l'urto iniziale di un incidente tra automobili attraverso segnale GPS e accelerometri interni ai veicoli, non è possibile ricostruire l'intera dinamica dell'incidente poiché si perde la rotazione assunta dai mezzi di trasporto dopo l'urto. Per questo scopo abbiamo studiato il comportamento di un dispositivo mobile capace di percepire movimenti rotatori. Abbiamo creato un'architettura software per ricostruire grafi
APA, Harvard, Vancouver, ISO, and other styles
41

Majeke, Lunga. "Preliminary investigation into estimating eye disease incidence rate from age specific prevalence data." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/464.

Full text
Abstract:
This study presents the methodology for estimating the incidence rate from the age specific prevalence data of three different eye diseases. We consider both situations where the mortality may differ from one person to another, with and without the disease. The method used was developed by Marvin J. Podgor for estimating incidence rate from prevalence data. It delves into the application of logistic regression to obtain the smoothed prevalence rates that helps in obtaining incidence rate. The study concluded that the use of logistic regression can produce a meaningful model, and the incidence
APA, Harvard, Vancouver, ISO, and other styles
42

Xu, Xinfeng. "Modeling and Predicting Incidence: Critical Systems Failures and Flu Infection Cases." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89909.

Full text
Abstract:
Given several related critical infrastructure (CI) networks, such as power grid, transportation, and water systems, one crucial question emerges: how to model the propagation of failed facilities and predict their spread over time to the whole system? Given digital surveillance data, can we predict the impact of Influenza-Like Illness (ILI), including the percentage of outpatient doctors visits, the season duration, and peak? These two questions are related to modeling and predicting the incidence of different types of contagions. In the case of CI, the contagions are the failures of facilitie
APA, Harvard, Vancouver, ISO, and other styles
43

Magidin, de Kramer Raquel. "Evaluation of Cross-Survey Research Methods for the Estimation of Low-Incidence Populations." Thesis, Boston College, 2016. http://hdl.handle.net/2345/bc-ir:107241.

Full text
Abstract:
Thesis advisor: Henry Braun<br>This study evaluates the accuracy, precision, and stability of three different methods of cross-survey analysis in order to determine their suitability for estimating the proportions of low-incidence populations. Population parameters of size and demographic distribution are necessary for planning and policy development. The estimation of these parameters for low-incidence populations poses a number of methodological challenges. Cross-survey analysis methodologies offer an alternative to generate useful, low-incidence population estimates not readily available in
APA, Harvard, Vancouver, ISO, and other styles
44

Holst, Carl-Johan. "Utilising accelerometer and gyroscope in smartphone to detect incidents on a test track for cars." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-65554.

Full text
Abstract:
Every smartphone today includes an accelerometer. An accelerometer works by detecting acceleration affecting the device, meaning it can be used to identify incidents such as collisions at a relatively high speed where large spikes of acceleration often occur.A gyroscope on the other hand is not as common as the accelerometer but it does exists in most newer phones. Gyroscopes can detect rotations around an arbitrary axis and as such can be used to detect critical rotations.This thesis work will present an algorithm for utilising the accelerometer and gyroscope in a smartphone to detect inciden
APA, Harvard, Vancouver, ISO, and other styles
45

Vadeby, Anna. "Computer based statistical treatment in models with incidental parameters : inspired by car crash data." Doctoral thesis, Linköping : Univ, 2003. http://www.bibl.liu.se/liupubl/disp/disp2003/tek814s.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Holloway, Jennifer Patricia. "Time series analysis of count data with an application to the incidence of cholera." Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11088.

Full text
Abstract:
Includes bibliographical references (leaves 88-93).<br>This dissertation comprises a study into the application of count data time series models to weekly counts of cholera cases that have been recorded in Beira, Mozambique. The study specifically looks at two classes of time series models for count data, namely observation-driven and parameter-driven, and two models from each of these classes are investigated. The autoregressive conditional Poisson (ACP) and double autoregressive conditional Poisson (DACP) are considered under the observation-driven class, while the parameter-driven models us
APA, Harvard, Vancouver, ISO, and other styles
47

Lee, Michael D. "Incidental text priming without reinstatement of context, the role of data-driven processes in implicit memory." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0006/MQ45081.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Aa, Maaike Anne van der. "Variation in incidence and outcome of cervical cancer in the Netherlands studies based on cancer registry data /." [S.l.] : Rotterdam : [The Author] ; Erasmus University [Host], 2008. http://hdl.handle.net/1765/11129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Smolina, Ekaterina. "Examination of the epidemiology of acute myocardial infarction in England using linked hospital and mortality data." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:791b416e-140e-4ced-9703-76d76895e9f8.

Full text
Abstract:
Background: Acute myocardial infarction (AMI) is a major public health concern. There are limited recent national-level population-based epidemiological data on AMI in England. As a result, the current burden of disease is difficult to quantify. Aim: This thesis addresses gaps in knowledge on AMI in England. It aims to provide a comprehensive analysis of AMI epidemiology over the last decade. Methods: This is a population-based study using person-linked routine hospital and mortality data for England for the period from 1 April 1998 to 31 March 2008. Main outcome measures include: trends in ev
APA, Harvard, Vancouver, ISO, and other styles
50

McCabe, Ashleigh K. "Has Richmond, Virginia Become Safer in the Past Five Years (2002-2006)?: An analysis of ambulance data regarding penetrating trauma incidents." VCU Scholars Compass, 2007. http://hdl.handle.net/10156/2163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!