• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 13
  • 8
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 96
  • 28
  • 26
  • 21
  • 13
  • 12
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

A Security Analysis of Some Physical Content Distribution Systems

Jiayuan, Sui January 2008 (has links)
Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution systems with which the content is distributed via physical media such as CDs, Blu-ray discs, etc. This thesis studies physical content distribution systems. Specifically, we concentrate our study on the design and analysis of three key components of the system: broadcast encryption for stateless receivers, mutual authentication with key agreement, and traitor tracing. The context in which we study these components is the Advanced Access Content System (AACS). We identify weaknesses present in AACS, and we also propose improvements to make the original system more secure, flexible and efficient.
42

A Security Analysis of Some Physical Content Distribution Systems

Jiayuan, Sui January 2008 (has links)
Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution systems with which the content is distributed via physical media such as CDs, Blu-ray discs, etc. This thesis studies physical content distribution systems. Specifically, we concentrate our study on the design and analysis of three key components of the system: broadcast encryption for stateless receivers, mutual authentication with key agreement, and traitor tracing. The context in which we study these components is the Advanced Access Content System (AACS). We identify weaknesses present in AACS, and we also propose improvements to make the original system more secure, flexible and efficient.
43

A Case Study of E-Reader OEM/ODM Dilemma and Business Strategy under Globalization ¡V A Case Study

Su, Yu-Hsun 08 August 2012 (has links)
The International environmental become significant issue for each countries, base on green trend more and more green products launched into market. E-Reader is one of the green product that growing rapidly in recent years due to the internet blooming. There have lot of advantages for people using E-Reader, such as easy to carry and you can own thousand of books content inside the E-Reader, it is amazing convenient for this development. The E-reader in this case study was identified by using electronic paper as the panel material, which is different from the LCD panel screen reader¡]Tablet¡^. So far Taiwan is the biggest OEM/ODM manufacturer area for worldwide E-reader market beause the E-paper source, also Taiwan maker can laverge all manufactuer capabilities coming from electronic and 3C industries and have well integrated supplier resource, that¡¦s why Taiwan maker can control 90% OEM/ODM E-reader manufactureing in the world. The global recession since 2008 has resulted in sharp drop for international business. It is getting more and more difficult for business competition, especially for OEM/ODM model. Although Taiwan E-reader manufacturers still have margin at this moment, but gradually they will face other competitors from China or Kera, on the other hand the threat from Tablet-reader is getting apparent, and the DRM still don¡¦t have well organized by governments, more and more challenges close to E-reader manufacturers. In the case of A company, base on five force model & Resources basic model as it can be aware how A company running his E-reader business under Globalization. The industrial circumstances change rapidly, it is important for Tawian maker to think over how to apply their own resource and make the right business strategy. By reviewing this case of A company, here is some suggestions for Taiwan E-reader industry. 1. Bring up for globalization talents. 2. Global system reinforcement. 3. To have Strong and well finance management. 4. Enchance RD capabilities by using core technology. 5. Process techniques and quality stability. 6. Strengthen the business strategic alliance.
44

Trusted Computing & Digital Rights Management : Theory & Effects

Gustafsson, Daniel, Stewén, Tomas January 2004 (has links)
<p>Trusted Computing Platform Alliance (TCPA), now known as Trusted Computing Group (TCG), is a trusted computing initiative created by IBM, Microsoft, HP, Compaq, Intel and several other smaller companies. Their goal is to create a secure trusted platform with help of new hardware and software. TCG have developed a new chip, the Trusted Platform Module (TPM) that is the core of this initiative, which is attached to the motherboard. An analysis is made on the TCG’s specifications and a summary is written of the different parts and functionalities implemented by this group. Microsoft is in the development stage for an operating system that can make use of TCG’s TPM and other new hardware. This initiative of the operating system is called NGSCB (Next Generation Secure Computing Base) former known as Palladium. This implementation makes use of TCG’s main functionalities with a few additions. An analysis is made on Microsoft’s NGSCB specifications and a summary is written of how this operating system will work. NGSCB is expected in Microsoft’s next operating system Longhorn version 2 that will have its release no sooner than 2006. Intel has developed hardware needed for a trusted platform and has come up with a template on how operating system developers should implement their OS to make use of this hardware. TCG’s TPM are also a part of the system. This system is called LaGrande. An analysis is also made on this trusted computing initiative and a sum up of it is written. This initiative is very similar to NGSCB, but Microsoft and Intel are not willing to comment on that. DRM (Digital Rights Management) is a technology that protects digital content (audio, video, documents, e-books etc) with rights. A DRM system is a system that manages the rights connected to the content and provides security for those by encryption. First, Microsoft’s RMS (Rights Management System) that controls the rights of documents within a company is considered. Second, a general digital media DRM system is considered that handles e-commerce for digital content. Analysis and discussion are made on what effects TC (Trusted Computing) and DRM could result in for home users, companies and suppliers of TC hardware and software. The different questions stated in the problemformulation is also discussed and considered. There are good and bad effects for every group but if TC will work as stated today, then the pros will outweigh the cons. The same goes for DRM on a TC platform. Since the benefits outweights the drawbacks, we think that TC should be fullfilled and taken into production. TC and DRM provides a good base of security and it is then up to the developers to use this in a good and responsible way.</p>
45

Memory performance in young adults with language and learning disabilities

Voss, Kellie Kathleen 19 November 2013 (has links)
This thesis investigated the memory skills of young adults with and without language and learning disabilities (LLD) using the Deese-Roediger-McDermott word recall paradigm (Roediger & McDermott, 1995). Three types of word lists were presented: semantic lists consisted of words that are related to a non-presented critical item (CI) (e.g., bad) in meaning (good, rotten, harmful, worse); phonological lists included words related to the CI in sound (e.g., had, lad, bat, bag); and hybrid lists included words related to the CI in both meaning and sound (e.g., good, lad, rotten, bat). Individuals with diagnoses of LLD were classified as "true LLD" or "compensated LLD" based on language test scores and a discriminating composite score, while those without LLD were considered the "typical language" (TL) group. Hypotheses were made regarding veridical recall and memory intrusions, including intrusions of the non-presented critical item (CI). For veridical recall, the compensated LLD and TL groups were expected to have higher recall accuracy than the true LLD group. As for CI intrusions, two possible outcomes were considered: the true LLD group may recall more CIs due to inability to discriminate between presented and non-presented words (Kirchner & Klatzky, 1985); or they may recall fewer CIs due to difficulties forming traces of the gist of the word list (Weekes et al., 2005). Data from 30 participants (ages 18 to 25) -- 12 true LLD, 8 compensated LLD, and 10 TL -- were included in this thesis. Results indicated that the true LLD group showed a non-significant tendency to have lower recall accuracy scores than the other two groups, and a higher number of CI intrusions. List-type also affected accuracy and CI intrusions, as semantically-related lists increased recall accuracy and hybrid semantic-phonological lists increased CI intrusions. Possible conclusions from these data are presented along with recommendations for future research. / text
46

The effect of semantic features on gist and verbatim memory in young adults with language-learning disabilities

Blau, Megan Johanna 22 November 2013 (has links)
This thesis is an expansion of an ongoing examination of gist and verbatim memory in young adults with language-learning disabilities (LLD) using the DRM paradigm (Deese, 1959; Roediger & McDermott, 1995). This study uses lists based on situation semantic features in addition to DRM lists based on backwards associative strength (BAS), which were categorized as strong-, mid-, and low-BAS (Stadler, Roediger, & McDermott, 1999). Items in each list (e.g., bacon, toast, cereal, muffin) related to a non-presented word (e.g., breakfast): the critical lure (CL). BAS is a measure of the likelihood that a list item will elicit the CL. Thirty young adults participated in this study and were divided into three groups: true LLD, compensated LLD, and typically developing (TD). Participants listened to word lists and verbally recalled the words they remembered hearing. Accurate recall was an indicator of verbatim memory; CL recall was an indicator of gist memory. The true LLD group recalled CL at a significantly higher rate than the other groups in the case of the situation lists; additionally, the compensated LLD group recalled CL for the low-BAS lists at a significantly higher rate than the other groups. These findings suggest that the LLD participants may process semantic information differently or may rely on gist memory to a greater extent than the TD controls. Results also indicated list type differences for both verbatim and gist recalls, supporting the effects of both semantic features and BAS together with other factors. / text
47

Memory intrusions in young adults with and without language learning disability

Blecher, Virginia Grace 17 June 2011 (has links)
This report investigated the various types of memory intrusion errors of adults with language learning disability (LLD) in comparison to age- and gender-matched typically developing (TD) adults using lists that are specifically designed to induce memory intrusions adapted from Roediger and McDermott (1995) and modified by Watson et al. (2001; 2003). The 28 participants between the ages of 18:9 - 24:3 listened to pre-recorded lists of twelve words that converged on a critical lure either semantically, phonologically, or dually with a hybrid list. This report tested the hypotheses that 1) hybrid lists would be more likely to induce memory intrusions of the critical lure than either semantic or phonological lists for each group; 2) adults with LLD would demonstrate more intrusion errors than their TD counterparts; 3) the error profiles of the LLD and TD groups should be largely similar; however, the adults with LLD might show deficits in extracting the semantic gist of word lists in light of such patterns in children with specific language impairment (Sheng & McGregor, 2010a). Results showed that the hybrid lists induced the greatest number of critical lure intrusions producing a super-additive effect. Contrary to our hypothesis, the LLD group did not produce more memory intrusions than the TD group. The fact that the two groups performed similarly on all standardized measures suggests that the participants with LLD may have outgrown their disability. Results also revealed that interference and intrusions increased when there was an increase in phonological similarity among words for both groups. Lastly, our preliminary evidence suggests that adults with LLD are not as efficient as their TD counterparts at extracting the gist of semantically-related words. The inclusion of a greater number of participants may provide stronger support for the hypothesis that lexical-semantic organization is less efficient in young adults with LLD. / text
48

Physical activity, burnout and ill health status among Dutch Reformed ministers / Evette du Toit

Du Toit, Evette January 2009 (has links)
Thesis (M.A. (Biokinetics))--North-West University, Potchefstroom Campus, 2010.
49

Physical activity, burnout and ill health status among Dutch Reformed ministers / Evette du Toit

Du Toit, Evette January 2009 (has links)
Thesis (M.A. (Biokinetics))--North-West University, Potchefstroom Campus, 2010.
50

Trusted Computing &amp; Digital Rights Management : Theory &amp; Effects

Gustafsson, Daniel, Stewén, Tomas January 2004 (has links)
Trusted Computing Platform Alliance (TCPA), now known as Trusted Computing Group (TCG), is a trusted computing initiative created by IBM, Microsoft, HP, Compaq, Intel and several other smaller companies. Their goal is to create a secure trusted platform with help of new hardware and software. TCG have developed a new chip, the Trusted Platform Module (TPM) that is the core of this initiative, which is attached to the motherboard. An analysis is made on the TCG’s specifications and a summary is written of the different parts and functionalities implemented by this group. Microsoft is in the development stage for an operating system that can make use of TCG’s TPM and other new hardware. This initiative of the operating system is called NGSCB (Next Generation Secure Computing Base) former known as Palladium. This implementation makes use of TCG’s main functionalities with a few additions. An analysis is made on Microsoft’s NGSCB specifications and a summary is written of how this operating system will work. NGSCB is expected in Microsoft’s next operating system Longhorn version 2 that will have its release no sooner than 2006. Intel has developed hardware needed for a trusted platform and has come up with a template on how operating system developers should implement their OS to make use of this hardware. TCG’s TPM are also a part of the system. This system is called LaGrande. An analysis is also made on this trusted computing initiative and a sum up of it is written. This initiative is very similar to NGSCB, but Microsoft and Intel are not willing to comment on that. DRM (Digital Rights Management) is a technology that protects digital content (audio, video, documents, e-books etc) with rights. A DRM system is a system that manages the rights connected to the content and provides security for those by encryption. First, Microsoft’s RMS (Rights Management System) that controls the rights of documents within a company is considered. Second, a general digital media DRM system is considered that handles e-commerce for digital content. Analysis and discussion are made on what effects TC (Trusted Computing) and DRM could result in for home users, companies and suppliers of TC hardware and software. The different questions stated in the problemformulation is also discussed and considered. There are good and bad effects for every group but if TC will work as stated today, then the pros will outweigh the cons. The same goes for DRM on a TC platform. Since the benefits outweights the drawbacks, we think that TC should be fullfilled and taken into production. TC and DRM provides a good base of security and it is then up to the developers to use this in a good and responsible way.

Page generated in 0.0557 seconds