• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 146
  • 37
  • 25
  • 24
  • 23
  • 12
  • 8
  • 8
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 350
  • 55
  • 42
  • 32
  • 27
  • 26
  • 23
  • 22
  • 22
  • 22
  • 19
  • 19
  • 18
  • 18
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

O estreito de Ormuz : da competição estratégica à Guerra Proxy regional no Oriente Médio

Rucks, Jessika Tessaro January 2017 (has links)
O presente trabalho tem por objetivo analisar o papel do estreito de Ormuz nas dinâmicas de competição no Golfo Pérsico. Ormuz é um estreito geograficamente estratégico, uma vez que é a única via marítima entre o Golfo Pérsico, o Golfo de Omã e o Oceano Índico e encontra-se em uma área rica em hidrocarbonetos. Em vista disso, o primeiro capítulo busca analisar o conceito e as características que qualificam a relevância que alguns estreitos possuem para o Sistema Internacional, caracterizando-os como Pontos de Estrangulamento e, nesse sentido, averiguar as razões que definem o estreito de Ormuz como o principal ponto de estrangulamento marítimo no mundo. Já o segundo capítulo tem como foco o estudo da Competição Estratégica, estabelecida entre Estados Unidos e Irã (2003-2013), que somente tornou-se possível graças às características de Ormuz (e, à assimetria de capacidades). Por fim, o terceiro capítulo procura averiguar o papel do estreito na escalada das rivalidades entre Arábia Saudita e Irã que deflagram a Guerra Proxy, e o seu transbordamento para outros pontos de estrangulamento do Oriente Médio. Espera-se como resultado oferecer uma melhor contextualização e compreensão sobre o tema de Ormuz em particular, bem como dos pontos de estrangulamento, contribuindo dessa forma para a instrumentalização dessas categorias no estudo das Relações Internacionais contemporâneas. / This study aims to analyze the Strait of Hormuz role in the competition dynamics in the Persian Gulf. Hormuz is a strait geographically strategic, since it is the only maritime way between the Persian Gulf, the Gulf of Oman and the Indian Ocean and is located in an area rich in hydrocarbons. In view of this, the first chapter analyzes the concept and characteristics that qualify the relevance of some straits to the International System, characterizing them as Choke points and, accordingly, find out the reasons that define the Strait of Hormuz as the main maritime choke point in the world. The second chapter focuses on the study of the Strategic Competition, established between the United States and Iran (2003-2013), which only became possible because of the characteristics of Hormuz (and because of capacity asymmetry). Finally, the third chapter seeks to ascertain the strait role in escalating rivalries between Saudi Arabia and Iran that trigger the Proxy War and its spillover to other bottlenecks in the Middle East. It is expected as a result provide better context and understanding of Hormuz particular theme and bottlenecks, thus contributing to the exploitation of these categories in the study of contemporary international relations.
172

Les agences de conseil en vote / Proxy advisors

Trouche, Axel-Philippe 03 April 2018 (has links)
L’internationalisation et la professionnalisation de l’actionnariat des sociétés cotées a directement participé au dérèglement de la souveraineté décisionnelle des assemblées générales d’actionnaires. En réponse à ce déséquilibre systémique qui a favorisé l’hégémonie de l’organe du conseil d’administration, les professionnels de l’intermédiation financière ont été vivement encouragés à voter d’une manière efficiente lors des assemblées. Or, la structure organisationnelle de nombreux investisseurs institutionnels demeure inadaptée au traitement de la multitude de projets de résolution qui émanent des dizaines, voire des centaines de firmes où ils détiennent des participations. Un pourcentage conséquent de « zinzins » fait donc appel à des agences de conseil en vote, qui leur fournissent des recommandations de vote. En parallèle, certaines agences ont également développé des services annexes, tel que la fourniture d’une plateforme de vote, ou encore un service de governance rating.Les agences de conseil en vote sont des organismes profondément clivants. Pour certains, elles épaulent efficacement une frange d’investisseurs institutionnels ne parvenant pas à faire un usage efficient de son vote aux assemblées. Pour d’autres, ces agences développent une forme illégitime d’externalisation du pouvoir actionnarial. Quoi qu’il en soit, les proxy advisors ont construit les contours d’une influence substantielle par le biais d’une promotion opiniâtre des valeurs du gouvernement d’entreprise, influence qui leur a conféré un rôle de soft law maker et de « lanceur d’alerte » en matière de corporate governance.L’influence des proxy advisors est devenue telle que de nombreux conseils d’administration se conforment à leurs politiques de gouvernance, dans le but de s’assurer un vote favorable aux assemblées générales d’actionnaires. Ainsi, les agences de conseil en vote se métamorphosent-elles progressivement en agence de gestion des sociétés cotées. Cette transformation atteint un degré paroxysmique quand le leader de cette industrie propose un service de recommandation de vote aux investisseurs, ainsi qu’un service de conseil en gouvernance à destination des émetteurs (par le biais d’une filiale détenue à 100%).Bien que les pratiques d’exercice des proxy advisors gagnent en transparence et se standardisent, elles demeurent perfectibles. Les conseillers proxy n’ont que récemment fait l’objet d’un encadrement de type « soft law » à l’échelle européenne, avec la publication d’un Code de bonne conduite. Certaines clefs de la légitimation de l’influence de ces organismes demeurent donc encore fragiles. Cette réalité peut plaider en faveur de l’établissement d’une réglementation contraignante des proxy advisors. Or, le Marché n’impute aucun dysfonctionnement à ces organismes, et un tel changement de paradigme pourrait être vecteur d’importantes perturbations dans le fonctionnement de certains « zinzins ». Rien ne permet donc d’affirmer, qu’à ce jour, un encadrement contraignant des proxy advisors pourra se révéler d’avantage efficient que la réglementation souple actuellement existante, règlementation « soft law » que nous proposerons toutefois d’enrichir. / The internationalisation and professionalisation of shareholding in listed companies directly contributed to the destabilisation of the shareholders’ sovereign decision-making process during shareholders’ general meetings. In reaction to this systemic unbalance that favoured the board of directors’ hegemony, professionals of financial intermediation were strongly encouraged to vote efficiently during these meetings. However, the organisation of large numbers of institutional investors remain ill-suited for managing multiple resolution projects from dozens and sometimes hundreds of companies. Therefore, an important percentage of institutional investors rely on proxy advisors, who provide voting recommendations. In addition, several proxy advisors developed additional services such as voting platforms or governance rating services.Proxy advisors are very differently perceived. For some, they efficiently accompany institutional investors which happen to not use their voting rights. For others, they indirectly and illegitimately exercise shareholders’ prerogatives. In any case, proxy advisors exert a substantial influence favouring corporate governance values. This influence elevated them to the position of soft law makers and “whistleblowers” regarding corporate governance.Proxy advisors’ influence became so substantial, many boards of directors started to abide their governance policies to ensure a favourable vote during shareholders general meetings. Thus, proxy advisors slowly became governance agencies for shareholding companies. This transformation reached its peak when the industry leader offered a voting recommendation service to investors, while also offering a governance advising service targeted to shares issuers (through a 100% owned subsidiary company).Even if proxy advisors’ practical modes to exercise are getting more transparent and standardized, they still could be improved. Proxy advisors were only recently subject to some level of soft law regulation at a European level, with the publication of a Code of good practices. Therefore, several aspects of the legitimisation of proxy advisors’ influence still remain fragile. This situation may advocate the establishment of a binding regulation for proxy advisors’ activities. However, the market does not believe proxy advisors to be the cause of any dysfunctions, and on the contrary considers that such regulation might cause major perturbations to functioning for some institutional investors. To date, there is no evidence to suggest that a binding regulation could turn out to be more efficient than the current soft law regulation, which is why we will merely try to improve it.
173

Paleoekologická studie prameniště v centru starosídelní oblasti. / Palaeoecological study of mire in the centre of an old-settlement area.

BERNARDOVÁ, Alexandra January 2009 (has links)
The palaeoecological development of alum mire since early Eneolithic on the basis of the results of macro-remains, pollen, and chemical analysis. The developement of local vegetation and nearest surrounding area was studied.
174

"On tue un enfant " : de la clinique de la maltraitance infantile à la structure du fantasme / "A child is being killed" : from the clinic of child abuse to the structure of phantasy

Kessaci, Lyasmine 30 November 2013 (has links)
« On bat un enfant » ; « on tue un enfant » : pour la plupart de nos contemporains, c’est là l’horreur même — la transgression de ce qui reste encore de sacré dans notre culture dite moderne. Pour quelques autres, c’est une réalité clinique : celle que l’on saisit à travers ce que l’on appelle d’ordinaire « maltraitance infantile » et « infanticides ». Et pour tous (pour tout sujet), il s’agit également de la présentification d’un fantasme — le plus fondamental qui soit, encela qu’il convoque d’un côté le rapport au père et le masochisme primordial, d’un autre le rapport à l’idéal et le narcissisme primaire. Le plus fondamental des fantasmes, au point de pouvoir être considéré comme une écriture de sa « formule », le texte en exprimant au mieux la logique.C’est à nouer ces registres — structure du fantasme et réel clinique de la maltraitance infantile — et à en explorer les tenants et aboutissants, que se consacre cette thèse. Qui s’emploie à montrer d’abord comment la féminité peut porter à la maternité, et ce qui se joue dans le « désir d’enfant », voire dans le désir de mort de l’enfant (c’est-à-dire dans le ravage quand il aboutit à l’acte). Puis quels extrêmes peut atteindre la clinique avec le « syndrome de Münchhausen par procuration », d’une part, et les « néonaticides » avec conservation des corps des nouveau-nés, d’autre part (c’est-à-direavec ces situations où l’horreur se montre pour mieux se dissimuler, et se cache pour mieux s’exhiber).Ce qui permet donc, en dépliant ainsi ces figures de la mère, de l’enfant, et du mal, d’éclairer la logique du fantasme par le réel clinique — et réciproquement. C’est-à-dire d’éclairer la structure subjective, saisie au « coeur de l’être ». / « A child is being beaten » ; « a child is being killed » : for most of our contemporaries, this is an epitome of horror — a transgression of what is still considered as sacred in our socalled modern culture.For some others, it is a clinical reality : the one we observe through what is usually called « child abuse » and infanticides.And for everybody (for every subject), it is also the presentification of a phantasy — the most basic of all, as it concerns on one hand the relationship with the father and the primordial masochism, and on the other one the relation with the ideal and the primary narcissism. It is the most fondamental of phantasies so much that it can be considered as an account of its « formula », the text expressing its logic at best.Intertwining these two matrixes — structure of the phantasy and clinical reality of child abuse — and exploring the ins and outs ; this is the issue analyzed in the thesis. First, what is shown here is how feminity can lead to maternity and what is at stake in « desiring a child », even in the desire for the child’s death (i.e. in the « ravage » when it leads to the acting out). Then which extreme can the clinical approach get close to with « The Munchausen syndrom by proxy » on one hand, and « neonaticides » with the keeping of the bodies of the new borns on the other one (i.e. where horror can be shown to hide all the better and to hide to be better exhibited).Hence the possibility, by unfolding the figures of the mother, of the child, and of the evil, to shed light on the logic of the phantasy thanks to the clinical reality — and vice versa.In other words, to throw light on the subjective structure, seized in the « heart of being ».
175

Framework for Flexible Connectors with Java Reflection Proxies

Tao, Bo, Jiang, Xiaoming January 2009 (has links)
This report presents the results of a master level thesis project that analyzes and designs about the issue “Framework for Flexible Connectors with Java Reflection Proxies”. In this project, there are two main issues; first one is about finding a way to implement the function of a connector. And the other one is to build a framework for flexible connectors. By studying on Java’s dynamic proxy, we find we can use it to implement the function of a connector. When building a connector chain, we use an important Java technique--Java Reflection API.
176

Information Centric Development of Component-Based Embedded Real-Time Systems

Hjertström, Andreas January 2009 (has links)
This thesis presents new techniques for data management of run-time data objectsin component-based embedded real-time systems. These techniques enabledata to be modeled, analyzed and structured to achieve data managementduring development, maintenance and execution.The evolution of real-time embedded systems has resulted in an increasedsystem complexity beyond what was thought possible just a few years ago.Over the years, new techniques and tools have been developed to manage softwareand communication complexity. However, as this thesis show, currenttechniques and tools for data management are not sufficient. Today, developmentof real-time embedded systems focuses on the function aspects of thesystem, in most cases disregarding data management.The lack of proper design-time data management often results in ineffectivedocumentation routines and poor overall system knowledge. Contemporarytechniques to manage run-time data do not satisfy demands on flexibility,maintainability and extensibility. Based on an industrial case-study that identifiesa number of problems within current data management techniques, bothduring design-time and run-time, it is clear that data management needs to beincorporated as an integral part of the development of the entire system architecture.As a remedy to the identified problems, we propose a design-time data entityapproach, where the importance of data in the system is elevated to beincluded in the entire design phase with proper documentation, properties, dependenciesand analysis methods to increase the overall system knowledge.Furthermore, to efficiently manage data during run-time, we introduce databaseproxies to enable the fusion between two existing techniques; ComponentBased Software Engineering (CBSE) and Real-Time Database ManagementSystems (RTDBMS). A database proxy allows components to be decoupledfrom the underlying data management strategy without violating the componentencapsulation and communication interface. / INCENSE
177

Brandväggar för hemmakontor

Nezirevic, Esmeralda January 2006 (has links)
Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable. It is important to understand how the firewall protects the network and how to configure it. This paper gives the reader a clear idea how firewalls can protect against different attacks and improve the security. Computers are not safe when connected to Internet. This paper is about how to use a personal firewall to protect a computer when connected to Internet. One of the firewalls in this examination is Norton Personal Firewall 2005. Perkins, “Firewalls 24seven, 2nd Edition” and Brian Komar, Ronald Beekelaar and Joern Wettern “Firewalls for Dummies”. Information has also been collected from Apples home page. It is important to have knowledge about different attacks against network traffic and also about how to protect against them. To know the risks is the first step to be able to evolve an own strategy; too defend network attack.
178

Paleohydrology and Paleoecology of the Neogene Siwalik rocks, Nepalese Himalaya using multi-proxy lipid biomarker isotopic study

Neupane, Prabhat Chandra 19 May 2017 (has links)
This study deploys compound-specific multi-proxy isotopic study of lipid biomarkers to understand Neogene climatic and ecological variabilities in the Himalayan foreland. The investigation of compound-specific carbon and hydrogen isotopes along with glycerol dialkyl glycerol tetraether (GDGT) is the first of its kind for the Nepalese Siwalik. A total of 49 mudstone (and some paleosol) samples were collected from the paleomagnetically age-constrained Siwalik strata in the Surai Khola and Karnali River sections. δ13C results suggest a domination of C3 trees between 12 and 8.5 Ma, and a stepwise expansion of C4 grasses starting gradually at 8.5 Ma and culminating rapidly around 5.5 Ma. δD results show an overall gradual increase in rainfall since 12 Ma, with a rapid intensification around 5.5 Ma. The negative correlation between rainfall and GDGT-derived paleotemperature prior to 5.5 Ma indicates that the region experienced higher rainfalls during colder periods and vice versa. We propose that this negative correlation could be related to the strong presence of mid-latitude westerlies in the region because of the subdued Himalayas, when summer monsoon winds were weaker, that brought enhanced winter-precipitation particularly during colder periods. After 5.5 Ma, our data show a conspicuous positive correlation between rainfall and annual temperature, indicating the onset of modern-style seasonality in rainfall in the Indian subcontinent, which generates more rainfall during summer than during winter. Notably, this initiation of the Indian monsoon around 5.5 Ma favored the dominance of C4 grasses over C3 trees that is reflected in our δ13C data.
179

An investigation into the contribution of e-learning to the improvement of higher education opportunities for women in Saudi Arabia

Alhareth, Yahya January 2014 (has links)
Electronic learning (e-learning) has recently introduced by the Saudi government to expand educational opportunities at higher education level, especially for women. However, due to the status of women in Saudi society, understanding the ability of women to take advantage of such technology rather than just making it available to them is required and should not be ignored. In this regard, this study aims to illuminate the ability of Saudi women to convert the opportunity offered by e-learning into a valuable educational achievement, by identifying the factors that affect their ability and the dimensions that characterise their capability requirements. To achieve this, the study adopts the capability approach as a guiding theoretical framework to provide a strong foundation and address the developmental theoretical insights as well as to demonstrate the ability of Saudi women to access and use e-learning freely in order to achieve their higher educational goals. Semi-structured interviews were conducted to collect data from twenty-four women living in the Najran and Northern Border regions in the Kingdom of Saudi Arabia using a proxy interview approach. Alkire’s and Robeyns’ techniques, with the support of the Straussian grounded theory procedures, were used to analyse the data collected. The study finds that the ability of Saudi women to convert the opportunity offered by e-learning into a valuable educational achievement is limited and affected by four factors: tribal society culture, cultural use of the internet, family willingness and government stimulation factors. It also identifies thirty-four dimensions that empower or prevent Saudi women’s freedom to access and use e-learning efficiently as a means to attain a valuable educational outcome. The value of the capability approach to inform an analysis on Saudi women's access to e-learning as well as the usefulness of applying the grounded theory to support the capability approach in the process of selecting the valuable dimensions for Saudi women to access e-learning, were also found. The study concludes that e-learning could probably be a bridge to enable women in the Kingdom of Saudi Arabia to access higher education. However, the issue is not just about technical availability, it is also about the capability of women to benefit from such a technology. Therefore, it is not enough to provide Saudi women with an opportunity to complete their higher education via e-learning without giving them the power to access and use it freely, whenever they are able to and want to do so. The study contributes by helping to open the window in front of women so they can make their voices heard and draw the attention of the government on the dimensions that characterise their capability requirements to access and use e-learning freely, as well as to give a better understanding about their situation within Saudi society and its role in affecting their ability. It also introduces a distinctive analytical framework to combine practical and theoretical strands in order to develop practical capability approach dimensions.
180

A multi-proxy study of Late Holocene environmental change in the Prokletije Mountains, Montenegro and Albania

Wilkinson, Rose January 2011 (has links)
Palaeoenvironmental investigations from the Lake Plav catchment of the Prokletije Mountains in Montenegro and Albania, allowed primarily climatic change and anthropogenic influences during the Late Holocene and particularly the Little Ice Age (LIA) to be identified. Three sediment cores were analysed, two from Lake Plav (904 m a.s.l., cores LPCA and LPCB) and one from the upper catchment site of Lake C in Buni i Jezerces (1754 m a.s.l., core BJC1). These sediments were analysed for a variety of proxies including pollen, ostracoda, organic content, magnetic susceptibility and particle size. Chronologies for each sediment core were constructed using AMS radiocarbon, 210Pb and 137Cs dating techniques. The lower sites provided a record of past flood events, anthropogenic influences, lake development and infilling that have occurred since c. AD 500. Core BJC1 provided longer-term data since c. 2720 BC, providing complementary records of Pediastrum and thermophilous arboreal types, identified following a catchment vegetation survey. Glacial geomorphological mapping of the Maja e Koljaet glacier in Buni i Jezerces, Albania, enabled a catchment specific palaeotemperature record to be constructed from AD 1859 to the present. Glacial features were dated using lichenometry before degree-day modelling enabled temperature reconstruction. The palaeotemperature reconstruction for the Albanian Little Ice Age glacial maximum (LIAGM) suggests that temperatures were 0.9°C below the 1980-2008 annual temperature mean. This work also provided the first record of glacial extent during the LIA in Albania, indicating that the Albania LIAGM occurred c. AD 1859, around a decade after the European LIAGM and two decades before that of Montenegro. Anthropogenic indicators were used to reconstruct human activity in the catchment, which suggested that arable farming was pursued throughout the Medieval Warm Period (MWP; c. AD 800-1090) and continued during a period of transition to the LIA, between c. AD 1090 and AD 1300. The LIA (c. AD 1300 - 1860) was characterised by an abrupt Alnus decline, thought to be the result of anthropogenic clearance of the floodplain and reduction of both arable and thermophilous types. During the LIA sedimentation rates were up to 1.41 + 0.17 cm yr-1 at Lake Plav causing lake infilling and shallowing allowing wetland expansion c. AD 1570. The result of lake infilling is highlighted during the early 20th century, when the lake extent fell by around 42% as a result of climatic amelioration post-LIA causing lake levels to fall and wetland indicators to decline. The inferred past climatic changes from the Lake Plav catchment are compared to data from around the Mediterranean and Southern Europe. This allows identification of the climatic influences affecting the site during the Late Holocene. Catchment records have provided evidence of cooler and wetter conditions coeval to the occurrence of solar minima such as the Wolf, Spörer and Maunder minima. Overall, the records suggest that continental atmospheric circulation patterns such as the North Sea-Caspian Pattern (NCP) and East Atlantic-West Russia pattern (EA-WR), dominated the site until the late 1800s, when records become more synchronous with the NAO index and Mediterranean/Southern European data.

Page generated in 0.0316 seconds