• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 88
  • 35
  • 15
  • 12
  • 12
  • 6
  • 5
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 232
  • 42
  • 36
  • 23
  • 21
  • 19
  • 19
  • 19
  • 18
  • 18
  • 16
  • 16
  • 16
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Model of detection of phishing URLsbased on machine learning

Burbela, Kateryna January 2023 (has links)
Background: Phishing attacks continue to pose a significant threat to internetsecurity. One of the most common forms of phishing is through URLs, whereattackers disguise malicious URLs as legitimate ones to trick users into clickingon them. Machine learning techniques have shown promise in detecting phishingURLs, but their effectiveness can vary depending on the approach used.Objectives: The objective of this research is to propose an ensemble of twomachine learning techniques, Convolutional Neural Networks (CNN) and MultiHead Self-Attention (MHSA), for detecting phishing URLs. The goal is toevaluate and compare the effectiveness of this approach against other methodsand models.Methods: a dataset of URLs was collected and labeled as either phishing orlegitimate. The performance of several models using different machine learningtechniques, including CNN and MHSA, to classify these URLs was evaluatedusing various metrics, such as accuracy, precision, recall, and F1-score.Results: The results show that the ensemble of CNN and MHSA outperformsother individual models and achieves an accuracy of 98.3%. Which comparing tothe existing state-of-the-art techniques provides significant improvements indetecting phishing URLs.Conclusions: In conclusion, the ensemble of CNN and MHSA is an effectiveapproach for detecting phishing URLs. The method outperforms existing state-ofthe-art techniques, providing a more accurate and reliable method for detectingphishing URLs. The results of this study demonstrate the potential of ensemblemethods in improving the accuracy and reliability of machine learning-basedphishing URL detection.
92

Bronx - změna adresy (přestavba káznice) / Bronx - address substitution (reconstruction house of correction)

Janoušková, Zuzana January 2009 (has links)
Bronx - address substitution (reconstruction house of correction) The graduation thesis deals with an architectural study of a new utilization of the top security prison building and its sorrounding in „the Bronx“ of Brno. The prison with the chapel of the Assumption of the Virgin from the 18th century is a significant building of about one city block large. The project includes the modification of the original prison building and its extension, the removal of the unsuitable parts of the building and building of new objects connected to the prison and public places. The group of buildings has been designed with the regard to the alternative culture and forms of living places, which would lead to healing of the Roman ghetto. New arrangement and size of objects form two new squares. It reveals the prison in its original shape at the same time. On the south site there is a tall building designed as a dominating feature of the area.
93

Gauging Student Knowledge Base and Creating a Plan to Address Deficits

Calhoun, McKenzie L. 01 October 2019 (has links)
No description available.
94

A GDPR compliant address infrastructure mobile application for Ugandan and Rwandan users / En GDPR-kompatibel adressinfrastruktur-applikation för mobiltelefoner ämnad för Ugandiska och Rwandiska användare

Modin Larsson, Lina January 2018 (has links)
More than half of the world's population are negatively affected by inadequate addresses. In Uganda and Rwanda, efforts have been done to implement a national address system but the effectiveness of those efforts have been prevented, due to lack of understanding and fears regarding its impact. With the help of Information and Communication Technology (ICT), because of its knowledge-generating foundation and substantial growth in East Africa, traditional address initiatives could be streamlined. However, negative consequences with ICT, such as surveillance, could cause the already existing reluctance to accept a system that not only registers a location but also an identity, to increase. Privacy, security and trust are therefore key factors to consider when developing a system that target areas characterized by distrust in organizations and government. This paper argues that the General Data Protection Regulation (GDPR) provides a strong framework when accomplishing this. By evaluating the user rights defined in GDPR from an interaction design perspective, this research aims to propose design guidelines that gives users agency of their personal information. This paper argues that redefining the rights as potential user actions gives the users control to manage their personal information, and further, that interest and understanding are important to enable conscious actions. With a Research through Design approach, user studies were conducted in Uganda and Rwanda, to evaluate how to design actions and information in order to enhance interest and understanding, and resulted in three design guidelines: User actions, Action layers and Information layers. / Mer än hälften av världens befolkning är negativt påverkade av bristfälliga adresser. I Uganda och Rwanda har det gjorts insatser för att implementera ett nationellt adressystem, men effektiviteten av dessa insatser har förhindrats på grund av bristande förståelse och rädsla för dess inverkan. Med hjälp av Informations- och Kommunikationsteknik (IKT), på grund av sin kunskapsgenererande struktur och starka ökning i Östafrika, kan traditionella addressinitiativ effektiviseras. Negativa konsekvenser med IKT, såsom övervakning, skulle dock kunna leda till att den redan befintliga motviljan att acceptera ett system som inte bara registrerar en plats utan också en identitet, ökar. Integritet, säkerhet och förtroende är därför viktiga faktorer att tänka på när man utvecklar ett system som riktar sig till områden som karaktäriseras av misstro mot organisationer och myndigheter. Denna artikel argumenterar för att den nya Dataskyddsförordningen (GDPR) utformar ett starkt ramverk för att uppnå detta. Genom att utvärdera de användarrättigheter som definieras i GDPR från ett interaktionsdesignperspektiv, syftar denna forskning till att föreslå designriktlinjer som ger användaren full kontroll över sin personliga information. Detta arbete argumenterar att omdefiniera rättigheterna till potentiella användarfunktioner ger användarna kontroll att hantera sin personliga information, och vidare, att intresse och förståelse är viktiga faktorer för att möjliggöra medvetna handlingar. Med en Research through Design-metod genomfördes användarstudier i Uganda och Rwanda, för att utvärdera hur man bör utforma funktioner och information för att öka intresse och förståelse för användarrättigheterna. Detta resulterade i tre designriktlinjer: Användarfunktioner, Funktionslager och Informationslager.
95

”Alltid rumstempererat!” Eine Übersetzungsstudie zu Rezipientenbezügen, Handlungsaufforderungen und Ellipsen in Kochbüchern / "Alltid rumstempererat" : A translation study on recipient references, calls to action and ellipses in cookbooks

Teschner, Isabell January 2023 (has links)
This paper focuses on three aspects of the recipe minilect in translation from Swedish to German. These aspects concern illocutionary speech acts, reader address and ellipsis. The study aims to find out how frequently different translation strategies are used when translating illocutions, reader address and ellipses and to determine why these translation strategies were chosen. The analysis is mainly based on theories on minilects by Nordman (1994), on reader address and illocutionary acts by Rathmayr (2009) and on ellipsis by Teleman et al. (1999) This theoretical background facilitates the classification of the occurrences of illocutions, reader address and ellipsis quantitatively. Also, a qualitative analysis of representative examples is carried out in order to investigate the reason behind the chosen translation strategy. The results show the primary use of infinitives in illocutionary speech acts in German cookbooks in contrast to the imperative in Swedish cookbooks as well as the prominent avoidance of direct reader address in German. Moreover, ellipses are as frequent in German as it is in Swedish cookbooks, the study shows.
96

Longitudinal Characterization of the IP Allocation of the Major Cloud Providers and Other Popular Service Providers : An analysis of the Internet Plane projects collection / Karaktärisering av IP adresser allokerade till moln- och andra populära tjänstleverantörer

Girma Abera, Hyab, Grikainis, Gasparas January 2022 (has links)
With the growth of the internet and exhaustion of IPv4 addresses, the allocation of IP addresses and routing between autonomous systems is an important factor on what paths are taken on the internet. Paths to different destinations are impacted by different neighbouring autonomous systems and their relations with eachother are important in order to find an optimal route from source to destination. In this thesis we look at a longitudinal change of IP observed on the internet that is owned by large organizations. To achieve this we build tools for extracting and parsing data from a dataset from iPlane where we then compare this to the largest domains and cloud providers. From our results we conclude that large domains and cloud providers are found more often as time has passed and they seem to not peer with eachother. We also find that the routing policies within different autonomous systems varies.
97

If I Had a Puppy

Kacsir, Marci Adair 14 November 2006 (has links)
No description available.
98

SPATIAL RELATIONSHIP OF URINARY CANCER INCIDENCE AND THE PREVIOUS NUCLEAR PRODUCTION PLANT IN THE VICINITY OF FERNALD, OH

Qi, Rong January 2000 (has links)
No description available.
99

The aperiodically dampened loudspeaker system

Short, George Elliott III 21 November 2012 (has links)
The theory of the aperiodically damped loudspeaker system is derived and investigated in both the time and frequency domains. The advantages of the aperiodic configuration over sealed box loudspeaker systems are discussed. The aperiodically damped loudspeaker system is described by the parameters used for sealed box loudspeaker systems, with some additions. A real system is constructed which takes full advantage of aperiodic configuration, and its performance is compared with a sealed box system of the same dimensions. Complete derivations of the theory for both the sealed box and aperiodically damped systems are included, as well as methods for measuring all required parameters. / Master of Science
100

Virginians' Responses to the Gettysburg Address, 1863-1963

Peatman, Jared Elliott 16 May 2006 (has links)
By examining Virginia newspapers from the fall of 1863 this paper will bring to light what Civil War-era Southerners thought of the Gettysburg Address. This work is confined to Virginia not because that state is representative of the Confederacy, but because Southern reporting on the Address was wholly shaped by the Richmond papers. The first two chapters of this thesis reveal that Southern editors censored reporting on the Gettysburg Address because of Lincoln's affirmation that "all men are created equal. The final chapter traces Virginians' responses to the Address up to 1963. Drawing on newspaper editorials, textbooks adopted by Virginia's schools, coverage of the major anniversaries of the Address in the state's newspapers, and accounts of Memorial Day celebrations, this chapter makes clear that Virginians largely ignored the Gettysburg Address in the twentieth-century while Northerners considered it an essential national document. In 1963, as in 1863, it was the assertions about equality that Southerners could not abide. This divergence of response, even in 1963, lays bare the myth of a completed sectional reconciliation and shared national identity. / Master of Arts

Page generated in 0.0387 seconds