• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 88
  • 35
  • 15
  • 12
  • 12
  • 6
  • 5
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 232
  • 42
  • 36
  • 23
  • 21
  • 19
  • 19
  • 19
  • 18
  • 18
  • 16
  • 16
  • 16
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Changement des normes communicatives en allemand contemporain : mots et discours / Change of communicative norms in contemporary german : words and speech

Gautherot, Laure 13 November 2015 (has links)
Cette thèse sur le changement des normes communicatives en allemand contemporain se positionne dans le paradigme explicatif du changement linguistique par Rudi Keller, connu sous le nom de « théorie de la main invisible ». L’objectif de recherche est de montrer par l’analyse de cinq faits « variants » que le changement des normes communicatives a lieu sous l’impulsion d’un désir des locuteurs germanophones contemporains de plus d’authenticité et de respect de l’autre. Cette mentalité communicative, héritée de la remise en cause sociétale par les mouvements contestataires de la fin des années 1960, conditionne les attentes des locuteurs germanophones dans la réception des discours publics en terme d’ethos et de positionnement éthique. Au corpus sur lequel sont effectuées les analyses linguistiques des cinq faits variants – les « mots à charge négative » (ou « belastete Wörter »), les néologismes euphémistiques, la neutralisation du genre, l’ethos des locuteurs politiques, le tutoiement d’adresse – composé de documents prescriptifs universitaires, de discours politiques, et de supports publicitaires de l’espace public allemand, s’ajoute un corpus de réception relevant du type épilinguistique, composé de métacommentaires de locuteurs non-spécialistes. L’étude révèle la parole des locuteurs ordinaires comme signe annonçant et accompagnant le changement linguistique. / This PhD dissertation focuses upon the change of communicative norms in contemporary German and positions itself on the explanatory paradigm of language change by Rudi Keller,also known as “the theory of the invisible hand”. My research aims at pointing out – through the analysis of five “variant” facts – that the change of communicative norms is driven by the desire of contemporary German native speakers for more authenticity as well as respect for the other. The communicative mentality inherited from the counter-culture movements in the late 1960’s that challenged society order influences German native speakers’ expectations towards the reception of public discourses in terms of ethos and ethical positioning. In addition to the corpus upon which the linguistic analyses of the five variant facts are carriedout – the “negative words” (or “belastete Wörter”), euphemistic neologisms, gender neutralisation, the ethos of politicians, being on first name terms with someone – which consists of prescriptive college documents, political discourses and the advertising supports ofthe German public space – , there is a reception corpus that amounts to epilinguistic type and is composed of metacomments from non-specialist speakers. The study brings the speech ofordinary speakers to the fore as a sign that announces and goes along with language change.
192

HOTET I PRESIDENTERNAS TAL : Diskursanalys av begreppet hot hos USA:s presidentermellan 1989–2017

Price, Malin January 2017 (has links)
Previously threats were conceived as being connected to wars and armed attacks on other countries. But if we observe the world today there are financial situations that, if they got out of hand, could cause severe problems for large parts of a countries population. The environment is another area where severe consequences can be expected. Buzan, Waever and de Wilde (1998:2) work from the premises that security can, and should, be applied to a wider selection of areas in society. From this stand point this Bachelor thesis will cover the discourse of threats in the inaugural addresses of USAs five most recent presidents: Bush, Clinton, Bush, Obama and Trump. The inaugural address` were chosen because it is the presidents opportunity to outline their strategy and ‘set the tone’ for their term in office (Brownell 2016).Throughout the analysis there is a focus on the five sections outlined in Buzans (1991:116) analysis model: military, politics, economy, ecology and societal. The analysis frame is based on both traditional realism and more alternative security theory. There is also a comparing element to examine whether there have been any changes in the discourse, connected to threats, since the 9/11 attacks. Furthermore, the study sets out to see if any of the subjects have shown signs of becoming securitized.The result of this study shows that the discourse of threat is mainly focused around the military section. There has been a general increase in the number of threats mentioned since 9/11, although some sections have decreased. Terrorism and immigration are the two questions that meets the criteria to have undergone securitization.
193

Určení pozice útočníka při pokusu o neoprávněný přístup do operačního systému / Location of attacker attempting unauthorized access to operating system

Pokorný, Josef January 2013 (has links)
My master thesis estimates physical location of potential operating system attacker. It deals with basic methods of attack against operating system: spam and viruses, searching the Internet, port scanning and operating system detection. The thesis disserts about a port scanner Nmap, a port scanning detector Scanlogd and about a system log watch Swatch. The thesis deals with geolocation methods of potential operating system attacker. These geolocation methods are divided into an active and a passive types. The active methods measure delay in the Internet. The passive methods query the database. I mentioned a freely accessible Whois database and MaxMind databases. There is a program developed and practically tested. The program simulates an attacker beginning an attack by scanning ports of target machine. The program works with dataset of real IP addresses. The program also detects the attack against operating system. The real and evaluated location of an attacker is got and then shown in a map. At the end there is a review of results and data comparison with colleagues.
194

Optimalizace přepínače v konvergované síti / Switch optimization in converged network

Švec, Adam January 2013 (has links)
Switch Optimization in a Converged Network thesis discusses the role of the Ethernet switch in the network. It describes differences between the switch and the hub in the network and the impacts on the collision domain size. In the converged network, priority data switching according to their origin and thus the qualitative point of view is also addressed - e-mails, voice services and multimedia will each behave differently. A real element, switch L3 - a switch with services quality support - is mentioned. The tool Matlab - Simulink is briefly described and a functional simplified model of the ethernet switch was created. Furthermore, the topic was used as a theme for a laboratory task in the subject Services of Telecommunication Networks. A model for Simulink and an example of the laboratory protocol for the created task are attached to the thesis.
195

Meteostanice s rozhraním Ethernet / Weather Station with Ethernet Interface

Novák, Pavel January 2013 (has links)
This thesis deals with the design and construction of the meteorological station. The meteorological station is designed and constructed to be able to measure the basic meteorological parameters (temperature, humidity, air pressure) and the other three variables (measuring rainfall, wind speed, wind direction). This thesis will introduce you to meteorology. Meteorology determines the daily weather forecast and the results are used for examples in aviation or maritime affairs. The method of atmospheric origin is given in the theoretical part. Meteorology must use measuring instruments to determine quantities. The dissertation also includes analysis of the measuring instruments. The meteorological station uses the Ethernet technology. In the chapter devoted to Ethernet are described its principles, types and method of power supply over Ethernet. The following section describes the design of the entire meteorological station, selection of all components and description of their connection. The chapter about implementation contains a description of the parts which forms program part of the meteorological station. The aim of the thesis is a summary of the achieved results including price comparison of the renovated meteorological station with other meteorological stations, which can be normally bought.
196

Optimalizace překladu agentních jazyků různé úrovně abstrakce / Optimalisation of Agent Languages Compiler

Kalmár, Róbert January 2012 (has links)
The aim of this work is an optimization of AHLL language compiler. Several intermediate representations of compiled code along with code optimization techniques are introduced. The main part of the work is focused on implementing these optimization techniques and generation of the target code in ALLL language. At the end of the work, the results achieved by new version of AHLL compiler are presented. In addition, there are also presented some ideas for the future work on AHLL and the compiler.
197

Modelování protokolů HSRP a GLBP pro redundanci brány / Modelling HSRP and GLBP Gateway Redundancy Protocols

Holuša, Jan January 2016 (has links)
This thesis deals with theoretical analysis of First Hop Redundancy Protocols. It describes Hot Standby Router Protocol, Virtual Router Redundancy Protocol and Gateway Load Balancing Protocol. It also shows examples of configuration of each protocol on Cisco devices with supported version of the Cisco IOS. Furthermore, this thesis includes design of two of these protocols, Hot Standby Router Protocol and Gateway Load Balancing Protocol, and their implementation in discrete event simulator OMNeT++ and Automated Network Simulation and Analysis library. Finally, the thesis presents results of testing of the implementations in comparison with actual Cisco devices.
198

Security issues in Address Autoconfiguration Protocols

Langer, André, Kühnert, Tom 20 April 2007 (has links)
Dynamic address assignment is one of the most important features in wireless ad hoc networks if nodes should be enabled to join and to work in the network by automatically configuring all necessary settings. Different approaches have been developed throughout the last years to achieve this objective of Dynamic Address Autoconfiguration but research primarily focused on efficiency and correctness, less on security issues. Whereas Duplicate Address Detection has become reliable in commonplace scenarios, it is still relatively easy to suspend the whole network functionality in extraordinary situations within the boundaries of a Dynamic Address Configuration Protocol. In this paper, we therefore want to point out shortcomings and weaknesses in existing protocol solutions which address dynamic IP address assignment. We concentrate on a leader-based approach called ODACP and want to propose several solutions which improve the original protocol in such a way that it is safer against malicious host activities. Finally, we will demonstrate the improvements of our solution in a separate test scenario.
199

Práce třídního učitele s pravidly života ve třídě 1. stupně základní školy / Teacher's work with organizational a behavioral rules at a primary school class

Kunzmannová, Renata January 2020 (has links)
The aim of the diploma thesis is to describe and characterize possible causes of class indiscipline, to find a connection between non-disciplinary pupils at primary school and chosen teacher strategies for dealing with indecision and to introduce possible means of regulating pupil's behavior and learning with respect to maintaining positive class climate. The practical part describes the action research of the selected class and the innovation of the established disciplinary means based on the recommendations of professional literature, conclusions from the theoretical diploma part and practical experience. A number of factors, such as pupil's psychological development, teacher and pupil personality, learning style, pupil's attitude to school, temperament, or selected teacher's means to regulate pupil behavior and learning, influence classroom discipline and can contribute to problem behavior. Appropriate selection of strategies and educational means based on a respectful teacher-pupil relationship can reduce pupils' disturbing behavior and thus affect the overall building of a positive classroom climate. Research analyzes educational measures and suggests effective measures to maintain discipline and regulate behavior. The conclusion of the thesis points out the importance of the teacher 's...
200

Návrh testeru paměti RAM ve VHDL / RAM-Tester Design in VHDL

Charvát, Jiří Unknown Date (has links)
This paper describes various approaches to hardware testing semiconductor memory. We describe the priciple of basic memory types, the way which each of them stores information and their comunication protocol. Following part deals with common failures which may occur in the memory.  The section also describes the implementation of memory model and tester designed in VHDL language. It is possible to inject some errors into memory, which are later detected by the tester. The final section shows the response of tester to various error types according to used error detection method. The paper is especially focused on failure detection by variants of march test.

Page generated in 0.0374 seconds