• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 146
  • 37
  • 25
  • 24
  • 23
  • 12
  • 8
  • 8
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 350
  • 55
  • 42
  • 32
  • 27
  • 26
  • 23
  • 22
  • 22
  • 22
  • 19
  • 19
  • 18
  • 18
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Facteurs de risque de la dépendance chez des femmes âgées françaises : étude sur la cohorte E3N / Risk factors of disability among French elderly women : results from the E3N cohort study

Bouscaren, Nathalie 11 December 2018 (has links)
Avec le vieillissement démographique, le nombre de personnes âgées dépendantes augmente et les proches (ou "tierces personnes") sont de plus en plus sollicités à leur côté. Dans une visée de santé publique, il importe d'étudier la place des tierces personnes dans le vieillissement et la relation entre dépendance et accumulation de facteurs de risque accessibles à la prévention.Le premier axe de cette thèse s'intéresse à l'intervention des tierces personnes dans les études de cohorte avançant en âge. Le deuxième axe consiste à analyser l'association entre la dépendance et l'accumulation de déficits sensoriels ou de comportements de santé.Cette thèse se base sur les données des femmes de la cohorte E3Nnées entre 1925 et 1930 : celles auto-rapportées et celles recueillies auprès d'une tierce personne. La dépendance est définie comme la présence d'une limitation dans au moins une des huit activités de l'échelle des activités instrumentales de la vie quotidienne (IADL).Les tierces personnes corroborent globalement la perception des personnes âgées concernant leur capacité à réaliser les IADL, étayant ainsi l'intérêt de leur implication dans les études épidémiologiques portant sur le vieillissement. Nous montrons également qu'un double déficit sensoriel est associé à un risque accru de survenue de la dépendance à court terme. De plus, le non-respect des recommandations concernant cinq comportements de santé était associé à une augmentation du risque de dépendance une dizaine d'année plus tard, selon un schéma cumulatif.Cette thèse contribue à valoriser la place des tierces personnes dans les études épidémiologiques et à améliorer les connaissances sur les facteurs de risque modifiables de la dépendance. Elle ouvre des pistes d'actions ciblées permettant d'améliorer la qualité de vie des personnes âgées tout en augmentant leur durée de vie sans incapacité. / The number of people living with disabilities is rising with the ageing of the population, leading to an increased need in proxy' help (or from "third partie"). Preventive approaches to delay disability or increase disability-free life expectancy are needed. In that respect, it is essential to study proxies'role in ageing, to identify risk factors of disability, and to analyze the effect of combinations of risk factors on risk of disability.The first aim of this PhD thesis was to study the contribution of proxies in cohorts of older people. The second aim was to analyze the association between disability and cumulative sensory impairments or health behaviours.The study population consisted in a subpopulation of the E3N cohort of women born between 1925 and 1930. Data were self-reported and/or reported by a proxy. Disability was defined as a limitation in at least one of the eight instrumental activities of daily living (IADL) scale.Results supported the interest of proxy involvement in epidemiological studies, particularly in those dealing with ageing. Indeed, most proxies corroborated the perception of the elderly women about their ability to perform IADL. In the study of risk factors of disability, having a dual sensory impairment was associated with higher short-term incidence of disability. Moreover, not adhering to the recommendations in the five studied health behaviours was associated with an increased risk of disability ten years later, in a dose-dependent manner.This work contributes to highlight the usefulness of proxies in large epidemiological studies, and to enhance knowledge about risk factors of disability. It suggests tracks of targeted actions to improve the quality of life of older people, and to increase their disability-free life duration.
182

Návrh řešení autentizace uživatelů pro malé a střední počítačové sítě / Design of user authentication for small and medium networks

Hajný, Jan January 2008 (has links)
The main focus of this Master’s thesis is user authentication and access control in a computer network. I analyze the TCP/IP model in connection with security and describe main stepping stones of authentication protocols (mainly hash functions). The authentication protocol analysis follows. I begin with LANMAN protocol analysis for the reason of a security comparison. The NTLM, Kerberos and Radius follows. The focus is on the Kerberos which is chosen as a main authentication protocol. This is also a reason why the modification used in MS domains is described. The implementation and functional verification is placed in the second part which is more practical. The virtualization technology is used for an easier manipulation. The result is a computer network model requiring user authentication and minimizing the possibility of an attack by unauthorized clients.
183

Proxy firewall / Proxy firewall

Kugler, Zdeněk January 2009 (has links)
This diploma thesis deals with the topic of proxy servers and firewalls and considers other associated technologies and network techniques. It systematically describes the general issues of firewalls, with a special focus on proxy firewalls and their safety. Additional systems mentioned in this document are intrusion detection systems (IDS), antivirus systems and content control filters – as these are also connected with safety of networks, servers and workstations or with limiting various Internet sources. IDS systems can be typically supplemented with various additional applications or tools that enrich them and increase their potential – including graphic additions. This part is remembered too. Some systems can communicate with each other, which is successfully utilised (FW & IDS co-operation, for example). The purpose of the first large chapter is to present firewall technologies, to list firewall types, their basic functionality and to present the final comparison. It marginally mentions firewall applications in practice. Chapter two explains the theory of network address translation (NAT), deals with its functionality, safety and with limiting the NAT mechanism. Chapter three brings a comprehensive presentation of proxy servers. It explains their principle from the point of view of functionality and the specification of application areas. The chapter is complete with a clear list of proxy server types and their descriptions. The last chapter named Linux Proxy Firewall is the key part of the work. It deals generally with the Linux platform, the Debian GNU/Linux distribution, principles of safety policy, network configuration, network server safety, Linux firewalls (Netfilter framework, Iptables tool) and with the Squid proxy server. The following subchapters respect the previous structure: they describe the theories of intrusion detection systems, antivirus checks and content filtering based on different methods. All this is presented similarly to the previous chapters. A proxy firewall solution built on the Linux operating system has been proposed in the practical part. The Debian GNU/Linux distribution has been chosen, being very suitable for server use due to its features. This environment is also used for additional safety software contained in the proxy firewall: antivirus protection, content filtering and an intrusion detection system. The priority is the most comprehensive computer network security, which requires detection abilities with the broadest possible coverage in the area of network safety. The purpose of this diploma thesis is not only to describe the principle of operation of proxy servers and to compare them with other types and other systems, but it also brings my own proposed free solution, which increases network safety and has the ambition of comparing it with clearly commercial products available on the market.
184

Acyklická komunikace po Profinetu mezi měniči Sinamics a PLC řady Simatic S7-1200 / Acyclic Profinet Communication between Sinamics Converters and Simatic S7-1200 PLCs

Dostál, Jiří January 2013 (has links)
This paper deals with acyclic communication of Siemens Simatic S7-1200 PLCs and Sinamics drives on the Profinet industrial bus. Various possibilites of communication of the devices in accordance to the PROFIdrive profile is presented. General Proxy FBs for acyclic read/write of the drive's parameters are implemented. Together with other two FBs, that make use of acyclic communication to read the drive's fault buffer and to adjust an absolute encoder, an application with visualization for a simple positioning and for a demonstration of the Proxy FBs functionality is presented using a demo box.
185

Implementace IMAP v C++ / IMAP Implementation in C++

Pohl, Marek January 2010 (has links)
This thesis has focused on development of library of IMAP network protocol in C++ programming language. This work has focused on design and on interface of the library. Object design of this library is based on analysis of the IMAP protocol. Developed library contains implementation of a client and server part of the IMAP protocol. This work shows also the another IMAP libraries and evaluates pros and cons of the different solutions. Security of a network transfer is explained here in this thesis. This work deals with authentication methods, which are used to protect user credentials during authentication process. Created library can be easily used by software developers to develop an applications like an email client program and IMAP mail server. Part of this work has focused on testing of this developed library.
186

Proxy servery v síti Internet / Proxy servers in Internet

Henek, Jan January 2016 (has links)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
187

Self-efficacy och proxy efficacy för utveckling i yrkesrollen

Aili, Oskar January 2020 (has links)
Tron på den egna förmågan, self-efficacy, utgår från att individen själv försöker utöva påverkan på sin omgivning. Påverkan kan även utövas genom ombud och tilltron till ombudets förmåga att göra något för individen benämns som proxy efficacy. Syftet med studien var att undersöka sambandet mellan self-efficacy och proxy efficacy för utveckling i yrkesrollen. Tre hypoteser och 1 frågeställning formulerades. En enkät besvarades av 85 medarbetare från ett fastighetsföretag i Stockholmsregionen och materialet undersöktes med korrelationer, regressionsanalys, samt t-test. Hypotes 1 fick stöd då proxy efficacy och self-efficacy var positivt korrelerade. Hypotes 3 fick stöd då medarbetare med kortare anställningstid (0-3.9 år) rapporterade högre proxy efficacy jämfört med medarbetare med längre (4-20 år) anställningstid. Proxy efficacy inte kunde predicera self-efficacy (hypotes 2) och inga skillnader i proxy efficacy kunde påvisas mellan könen (frågeställning 1). Resultaten diskuteras utifrån hur proxy efficacy kan definieras samt innebörden i begreppet där mer forskning krävs.
188

A Proxy for Distributed Hash Table based Machine-to-Machine Networks

Li, Daoyuan January 2011 (has links)
Wireless sensor networks (WSNs) have been an increasingly interest for both researchers and entrepreneurs. As WSN technologies gradually matured and more and more use is reported, we find that most of current WSNs are still designed only for specific purposes. For example, one WSN may be used to gather information from a field and the collected data is not shared with other parties. We propose a distributed hash table (DHT) based machine-to-machine (M2M) system for connecting different WSNs together in order to fully utilize information collected from currently available WSNs. This thesis specifically looks at how to design and implement a proxy for such a system. We discuss why such a proxy can be useful for DHT-based M2M systems, what the proxy should consist of, and what kind of architecture is suitable. We also look into different communication protocols that can be used in these systems and discuss which ones best suit our purposes. The design of the proxy focuses on network management and service discovery of WSNs, and security considerations as well as caching mechanisms in order to improve performance. A prototype is implemented based on our design and evaluated. We find it feasible to implement such a DHT-based M2M system and a proxy in the system can be necessary and useful. Finally, we draw conclusions and discuss what future work remains to be done.
189

Barnet är bara ett offer i en process : En kvalitativ och kvantitativ studie om barnmisshandel genom sjukvårdsinsatser

Mellin, Carolina January 2021 (has links)
Barnmisshandel genom sjukvårdsinsatser är en allvarlig typ av våld. Barn blir utsatta för onödiga sjukvårdskontakter med olika undersökningar och behandlingar som är en del av den medicinska misshandeln. Vanligtvis är förövaren den biologiska modern till barnet men det kan även vara en annan person i barnets nära omgivning. Något som är problematiskt att sjukvården blir en del av misshandeln då sjukvården är den aktör som utför misshandeln baserat på förvarens information. Syftet med studien var att undersöka socialsekreterares och barnpsykiatrikers erfarenheter av BMSI med fokus på samverkan, insatser, riskfaktorer och framgångsfaktorer. De professioner som samverkan syftar till är polis, åklagare, sjukvård och barnpsykiatriker. Studien har angripit ämnet med en intervju med en barnpsykiatriker och enkätstudie riktad mot socialsekreterare. Den teoretiska utgångspunkten ligger i systemteori eftersom socialarbetare behöver se på barnets situation över olika system samt interaktionerna i och mellan dess system. Resultatet visade att ökad samverkan och kunskap är två viktiga framgångsfaktorer. Vidare framkommer det även att psykisk ohälsa båda hos förövare och offer förekommer i ärenden med BMSI.
190

Tvärprofessionell samverkan vid Barnmisshandel Genom Förfalskning av Symtom

Lundgård, Lisa January 2021 (has links)
Barnmisshandel Genom Förfalskning av Symtom (BGFS), internationellt känt som Münchausen Syndrome by Proxy (MSbP), är en allvarlig och komplex form av barnmisshandel. Främst har BGFS belysts utifrån hälso- och sjukvårdens perspektiv och tidigare internationell forskning har fokuserat på att identifiera och beskriva varningssignaler på att det kan föreligga. Socialnämnden har ett särskilt ansvar för barn som far illa eller riskerar att göra det, vilket innebär att de utgör en central aktör när det kommer till ärenden som rör BGFS. Då BGFS utgör en form av barnmisshandel som främst rör sig inom hälso- och sjukvårdens sfär, är socialtjänsten beroende av hälso- och sjukvårdens kompetens i deras arbete för att utreda barns situation och behov av stöd och/eller skydd vid misstanke om BGFS. Tvärprofessionell samverkan är här en central process, vilket även betonas i litteratur och forskning kring BGFS. Dock saknas det i svensk kontext forskning kring BGFS och samverkan i dessa ärenden. Syftet har därmed varit att utforska den tvärprofessionella samverkan vid ärenden som rör BGFS i svensk kontext. Studien har en kvalitativ ansats och semistrukturerade intervjuer har genomförts med olika professioner som har erfarenhet av arbete med BGFS. Studiens teoretiska ramverk utgörs av organisationsteori, nyinstitutionell teori, samverkansteori och professionsteori. Empiri har sedan tolkats och analyserats utifrån dessa teoretiska perspektiv och tidigare forskning med hjälp av tematisk innehållsanalys. Studiens resultat visar bland annat att det råder en omfattande okunskap kring BGFS och att detta utgör en försvårande faktor för samverkan vid arbete med och utredning av ärenden som rör denna form av barnmisshandel. Förutsättningar för en fungerande samverkan i ärenden som rör BGFS med en tydlig styrning, struktur och samsyn är även bristfälliga.

Page generated in 0.0539 seconds