• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 146
  • 37
  • 25
  • 24
  • 23
  • 12
  • 8
  • 8
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 350
  • 55
  • 42
  • 32
  • 27
  • 26
  • 23
  • 22
  • 22
  • 22
  • 19
  • 19
  • 18
  • 18
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Evolution of the Sefidrud Delta (south west Caspian Sea) during the last millennium

Haghani, Safiyeh January 2015 (has links)
The Sefidrud has developed a large delta in the south west of the Caspian Sea. Its delta is characterized by rapid sedimentation rate (20 mm/yr) in the delta plain and low sedimentation rate (1.67 mm/yr) in a very steep delta front. Sefidrud Delta evolution depends upon sediment supply by river and longshore current under rapid Caspian Sea Level (CSL) fluctuation and tectonic setting at the point of entry to the basin. The tectonic setting caused a very steep slope in the delta front. Sediment supply is variable and affected by river avulsion and dam construction. The CSL has undergone significant changes during the last millennium. Therefore, the Sefidrud Delta evolution during the last millennium is explained based on CSL fluctuations. This fluctuation has major impacts not only on coastal lagoons, but also more inland in wetlands when the CSL rose up to at least -21.44 m (i.e. >6 m above the present water level) during the early Little Ice Age. Although previous studies in the southern coast of the Caspian Sea have detected a high-stand during the Little Ice Age period, this study presents the first evidence that this high-stand reached so far inland and at such a high altitude. This study also examines the interdependence of different factors in the evolution of coastal lagoons as a part of delta evolution. Dam flushing operations and rapid sea–level rise (~3 m between 1977 and 1995) have accelerated the infilling of the coastal lagoon system. This rapid infilling (31 mm/yr) makes the whole system more prone to sediment encroachment in the short term. Because the lagoons are short-lived and have dynamic evolution, the impact of the Anthropocene is also visible in the delta evolution.
142

O estreito de Ormuz : da competição estratégica à Guerra Proxy regional no Oriente Médio

Rucks, Jessika Tessaro January 2017 (has links)
O presente trabalho tem por objetivo analisar o papel do estreito de Ormuz nas dinâmicas de competição no Golfo Pérsico. Ormuz é um estreito geograficamente estratégico, uma vez que é a única via marítima entre o Golfo Pérsico, o Golfo de Omã e o Oceano Índico e encontra-se em uma área rica em hidrocarbonetos. Em vista disso, o primeiro capítulo busca analisar o conceito e as características que qualificam a relevância que alguns estreitos possuem para o Sistema Internacional, caracterizando-os como Pontos de Estrangulamento e, nesse sentido, averiguar as razões que definem o estreito de Ormuz como o principal ponto de estrangulamento marítimo no mundo. Já o segundo capítulo tem como foco o estudo da Competição Estratégica, estabelecida entre Estados Unidos e Irã (2003-2013), que somente tornou-se possível graças às características de Ormuz (e, à assimetria de capacidades). Por fim, o terceiro capítulo procura averiguar o papel do estreito na escalada das rivalidades entre Arábia Saudita e Irã que deflagram a Guerra Proxy, e o seu transbordamento para outros pontos de estrangulamento do Oriente Médio. Espera-se como resultado oferecer uma melhor contextualização e compreensão sobre o tema de Ormuz em particular, bem como dos pontos de estrangulamento, contribuindo dessa forma para a instrumentalização dessas categorias no estudo das Relações Internacionais contemporâneas. / This study aims to analyze the Strait of Hormuz role in the competition dynamics in the Persian Gulf. Hormuz is a strait geographically strategic, since it is the only maritime way between the Persian Gulf, the Gulf of Oman and the Indian Ocean and is located in an area rich in hydrocarbons. In view of this, the first chapter analyzes the concept and characteristics that qualify the relevance of some straits to the International System, characterizing them as Choke points and, accordingly, find out the reasons that define the Strait of Hormuz as the main maritime choke point in the world. The second chapter focuses on the study of the Strategic Competition, established between the United States and Iran (2003-2013), which only became possible because of the characteristics of Hormuz (and because of capacity asymmetry). Finally, the third chapter seeks to ascertain the strait role in escalating rivalries between Saudi Arabia and Iran that trigger the Proxy War and its spillover to other bottlenecks in the Middle East. It is expected as a result provide better context and understanding of Hormuz particular theme and bottlenecks, thus contributing to the exploitation of these categories in the study of contemporary international relations.
143

The State of Man-in-the-Middle TLS Proxies: Prevalence and User Attitudes

ONeill, Mark Thomas 01 October 2016 (has links)
We measure the prevalence and uses of Man-in-the-Middle TLS proxies using a Flash tool deployed with a Google AdWords campaign. We generate 15.2 million certificate tests across two large-scale measurement studies and find that 1 in 250 TLS connections are intercepted by proxies. The majority of these proxies appear to be benevolent, however we identify over 3,600 cases where eight malware products are using this technology nefariously. We also find thousands of instances of negligent, duplicitous, and suspicious behavior, some of which degrade security for users without their knowledge. Distinguishing these types of practices is challenging in practice, indicating a need for transparency and user awareness. We also report the results of a survey of 1,976 individuals regarding their opinions of TLS proxies. Responses indicate that participants hold nuanced opinions on security and privacy trade-offs, with most recognizing legitimate uses for the practice, but also concerned about threats from hackers or government surveillance. There is strong support for notification and consent when a system is intercepting their encrypted traffic, although this support varies depending on the situation. A significant concern about malicious uses of TLS inspection is identity theft, and many would react negatively and some would change their behavior if they discovered inspection occurring without their knowledge. We also find that a small but significant number of participants are jaded by the current state of affairs and have lost any expectation of privacy.
144

Problèmes de sécurité posés par les proxies d'adaptation multimédia : proposition de solutions pour une sécurisation de bout-en-bout

Kaced, Ahmed Réda 09 June 2009 (has links) (PDF)
L'évolution des techniques d'adaptation et des contenus multimédias adaptables a montré la nécessité de définir des techniques et des pratiques concernant la sécurité des échanges sur les réseaux. Dans la mesure où l'adaptation des documents multimédia nécessite d'autoriser la modification de ces documents entre le serveur et le client, il est important d'étudier les conditions nécessaires pour assurer ces modifications de façon sécurisée. Nous avons donc, dans ce cadre, à présenter un système de communication multimédia qui préserve l'authenticité et l'intégrité des contenus originaux de bout en bout tout en permettant l'adaptation de ces contenus par des intermédiaires. C'est l'objectif général de cette thèse. Dans ce mémoire, nous présentons SEMAFOR, une plate-forme de communication multimédia offrant aux utilisateurs la possibilité d'adapter leur contenus (selon les besoins) par des n\oe uds intermédiaires. La particularité de cette plate-forme est sa capacité de sécuriser le contenu émis de bout-en-bout, cette sécurisation repose sur deux mécanismes proposés et décrits dans cette thèse : AMCA pour l'authentification des contenu et XSST pour le chiffrement et rechiffrement intermédiaire. Les tests et les mesures de performances présentés à la fin de ce mémoire démontrent la validité des propositions décrites dans cette thèse et valident la pertinence des résultats obtenus.
145

Information Centric Development of Component-Based Embedded Real-Time Systems

Hjertström, Andreas January 2009 (has links)
<p>This thesis presents new techniques for data management of run-time data objectsin component-based embedded real-time systems. These techniques enabledata to be modeled, analyzed and structured to achieve data managementduring development, maintenance and execution.The evolution of real-time embedded systems has resulted in an increasedsystem complexity beyond what was thought possible just a few years ago.Over the years, new techniques and tools have been developed to manage softwareand communication complexity. However, as this thesis show, currenttechniques and tools for data management are not sufficient. Today, developmentof real-time embedded systems focuses on the function aspects of thesystem, in most cases disregarding data management.The lack of proper design-time data management often results in ineffectivedocumentation routines and poor overall system knowledge. Contemporarytechniques to manage run-time data do not satisfy demands on flexibility,maintainability and extensibility. Based on an industrial case-study that identifiesa number of problems within current data management techniques, bothduring design-time and run-time, it is clear that data management needs to beincorporated as an integral part of the development of the entire system architecture.As a remedy to the identified problems, we propose a design-time data entityapproach, where the importance of data in the system is elevated to beincluded in the entire design phase with proper documentation, properties, dependenciesand analysis methods to increase the overall system knowledge.Furthermore, to efficiently manage data during run-time, we introduce databaseproxies to enable the fusion between two existing techniques; ComponentBased Software Engineering (CBSE) and Real-Time Database ManagementSystems (RTDBMS). A database proxy allows components to be decoupledfrom the underlying data management strategy without violating the componentencapsulation and communication interface.</p> / INCENSE
146

Designated Directors in the Boardroom: Their Impact on Governance and Performance and Shareholder Wealth Effects

Cole, Laura Seery 01 August 2011 (has links)
This dissertation examines the appointment of designated directors on boards of directors. Designated director appointments are uncontested board appointments by activist investors, whereby normal nominating and voting election procedures are circumvented. Instances such as these, where directors are appointed rather than elected, are a form of shareholder access to the proxy. In this dissertation, new evidence is provided that is relevant to the proxy access debate by investigating the hypothesis that firms with appointed designated directors have different firm and governance characteristics than firms with elected directors. In particular, the following questions are asked: what are the shareholder wealth effects surrounding the announcement of (i) a designated director on a board, (ii) the appointment of a new designated director to a board, and (iii) a designated director continuing service on the board? Also, what firm and governance characteristics lead to the appointment of a designated director on the board? The answers to these questions can help determine whether firms with better corporate governance structures are more likely to have designated directors appointed to their boards because they are serving all shareholders’ interests, or whether firms with worse corporate governance are less likely to have designated directors appointed because of the board of directors’ insulation.
147

Scalable Proxy Architecture for Mobile and Peer-to-Peer Networks

Jayanthi, Praveena 05 December 2006 (has links)
The growth of wireless telecommunications has stipulated the interest for anywhere-anytime computing. The synergy between networking and mobility will engender new collaborative applications with mobile devices on heterogeneous platforms. One such middleware is “SYSTEM ON MOBILE DEVICES”, SYD developed by the Yamacraw Embedded Systems research team. This type of middleware is an opening step towards Peer-to-Peer mobile networks. This project envisioned collaborative applications among mobile devices and PDAs were used as servers. This thesis studies various existing architectures in mobile computing and their scalability issues. We also proposed new scalable flexible thick client proxy system FTCPS, an architecture suitable for mobile Peer-to-Peer networks. Our empirical study showed that FTCPS has low response time compared to other architectures.
148

Lake Cycles and Sediments: Locality 80, Olduvai Gorge, Tanzania

Berry, Patricia A 07 August 2012 (has links)
Studies have shown that Bed I and Lower Bed II (1.92Ma- 1.76Ma) of Paleolake Olduvai at Locality 80 are primarily composed of the authigenic lacustrine clay minerals illite, smectite, and interlayered illite-smectite. X-ray fluorescence analysis and the sedimentation rates of Hay and Kyser (2001) were used to identify four apparent lake cycles beginning and ending with saline alkaline phases. Peaks in Al2O3/MgO ratios, and TiO2 and P2O5 abundances occur at approximately the same elevations within the stratigraphic section. Low values in these three parameters indicate saline alkaline conditions whereas high values represent fresh water conditions. Lake Cycles (LC) 1 and 4 completed in approximately 44,000 years and 42,000 years respectively, which is similar to the 41k.y. year cycle associated with Earth’s obliquity. Lake Cycles 2 and 3 span approximately 24,000 years and are similar to the 21k.y. precession cycle.
149

The Uranium-Lead Geochemistry of the Mount McRae Shale Formation, Hamersley Basin, Western Australia

Fisher, Jennifer G 01 December 2012 (has links)
The late Archean Mount McRae Shale of the Hamersley Basin in Western Australia may record the presence of oxygen in the atmosphere before the Great Oxidation Event (2.4-2.3 Ga). Several prior studies (Anbar et al., 2007; Blum and Anbar, 2010; Duan et al., 2010; Kakegawa et al., 1998; McManus et al., 2006) have used isotopic systems to analyze the Mount McRae Shale and conclude that there was a presence of oxygen before the Great Oxidation Event. The purpose of this study is to determine if the U-Pb system can be used to see through later events to the initial conditions. The uranium-lead values of the Mt McRae Shale provide evidence of the mobilization of U and Pb gain. The geochemical disturbances have been linked to the tectonic activity (460 Ma) in the neighboring Canning basin, which could have possibly opened the geochemical system. In terms of the depositional environment the U-Pb data gathered here do not point to oxygenation of the atmosphere.
150

Transmission Schemes, Caching Algorithms and P2P Content Distribution with Network Coding for Efficient Video Streaming Services

Kao, Yung-cheng 23 February 2010 (has links)
For more than a decade, streaming media services, including on-line conferences, distance education and movie broadcasting, have gained much popularity on the Internet. Due to the high bandwidth requirements and long lived nature of video streaming, it requires huge transmission cost to support these streaming media services. In addition, how to adapt rich multimedia content to satisfy various resource-constrained devices presents a challenge. The limited and time-varying network bandwidth complicates the content adaptation tasks. Differentiated content delivery may be required to meet diverse client profiles and user preferences. Therefore, in order to reduce transmission cost to serve heterogeneous clients for efficient streaming, in this dissertation, several novel schemes including transcoding-enable proxy caching scheme, reactive transmission schemes, and network coding P2P content distribution scheme, are proposed to support efficient multiple-version and layered video delivery in the proxy-attached network environment as well as to provide efficient interactive IPTV service in a peer-to-peer network. Firstly, for multiple-version cache consideration in the transcoding-enable proxy, we focus on reducing the required server bandwidth and startup delay by caching the optimal versions of the video. A generalized video object profit function is derived from the extended weighted transcoding graph to calculate the individual cache profit of certain version of a video object, and the aggregate profit from caching multiple versions of the same video object. This proposed function takes into account the popularity of certain version of a video object, the transcoding delay among versions and the average access duration of each version. Based on the profit function, cache replacement algorithms are proposed to reduce the startup delay and network traffic by efficiently caching video objects with maximum profits. Next, a set of proxy-assisted transmission schemes are proposed to reduce the transmission cost for layered video streaming by integrating the proxy caching with reactive transmission schemes, peer-to-peer mesh networks and multicast capability. These proposed transmission schemes make multiple requests to be serviced by the single transmission and thus to significantly reduce the total required transmission cost. The optimal proxy prefix cache allocation is also calculated for each transmission scheme to identify the cache layers and cache length of each video to minimize the aggregate transmission cost. The process considers the fact that reduction in transmission cost by caching X layers of a video is not only from requests on X layers, but also from requests on less than X layers. Finally, we proposed a network coding equivalent content distribution (NCECD) scheme to decrease server stress, startup delay and jumping latency to support random access operations which are desirable for peer-to-peer on-demand video streaming. The random access operations are difficult to be efficiently supported, due to the asynchronous interactive behaviors of users and the dynamic nature of peers. In NCECD, videos are divided into segments which are then further divided into blocks. These blocks are then encoded into independent encoded blocks that are distributed to the local storage of different peers. With NCECD, a new client only needs to connect to a sufficient number of parent peers in order to view the whole video and rarely needs to find new parents when performing random access operations. Whereas most existing methods must search for parent peers containing interested segments, NCECD uses the properties of network coding to cache equivalent content on most peers, so that searches are rarely needed. The analysis of system parameters is given to achieve reasonable block loss rates for peer-to-peer interactive video-on-demand streaming. Experimental results demonstrate that these proposed schemes can lead to significant transmission cost saving, high delay saving ratio, high bandwidth saving ratio, low startup and jumping searching delays, connecting to a new parent peer delay and less server resources. Hence, these proposed schemes can further be integrated and utilized to build an efficient video streaming platform for providing high-performance and high-quality IPTV services to a diversity of clients.

Page generated in 0.0284 seconds