• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 22
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Young people leaving care : plans, challenges and discourses

Lamond, Catherine January 2016 (has links)
This small-scale study explored plans for four young people leaving care and the perspectives of twelve key adults supporting them. Using Fairclough’s model of critical discourse analysis, the rationale for this research was concern about the difference in outcomes between care leavers and young people in general. Aims were to explore if contradictions in plans and ideas contributed to problems for the young people, and to examine explanations and justifications made by the adult participants. Data were collected by semi-structured interviews from an opportunistic sample. Findings indicated that the established problem of young people having to leave care too early persists in spite of initiatives to prevent this happening. Theories drawn from the psychology of child development influence the professionals’ constructions of the young people, thereby limiting the responses which adults can offer. It is proposed that neoliberal discourses of individual responsibility and continuous self-improvement constrain systems which encourage young people to leave care before they are ready. Two concepts of chop (abrupt change, such as end of school phase) and churn (disruption, such as staff turnover) are used to examine how frequent disturbance in the life of a looked after child is exacerbated by points of rupture which are caused by the structures of children’s services. This study adds to calls for increased stability for young people, and recommends earlier planning for the future of young people in care. Implications for educational practice are presented, including the need to ensure that leaving mainstream education for segregated provision is not an irreversible decision. It is suggested that educators should consider critically the labelling of looked after children as having Special Educational Needs, as this can lead to practices which encourage compliance by young people, and pathologise resistance which could instead be re-framed as self-reliance.
12

Nouveaux Protocoles de Tolérances aux Fautes pour les Applications MPI du Calcul Haute Performance / New Fault Tolerance Protocols for MPI HPC Applications

Guermouche, Amina 06 December 2011 (has links)
Avec l'évolution des machines parallèles, le besoin en protocole de tolérance aux fautes devient de plus en plus important. Les protocoles de tolérance aux fautes existants ne sont pas adaptés à ces architectures car soit ils forcent un redémarrage global (protocoles de sauvegarde de points de reprise coordonnés) soit ils forcent l'enregistrement de tous les messages (protocoles à enregistrement de messages). Nous avons étudié les caractéristiques des protocoles existants. Dans un premier temps, nous avons étudié le déterminisme des applications, étant donné que les protocoles existants supposent des exécutions non déterministes ou déterministes par morceaux. Dans notre étude, nous nous sommes intéressés au modèle par échange de messages, et plus précisément aux applications MPI. Nous avons analysé 26 applications MPI et avons mis avant une nouvelle caractéristique appelée "déterminisme des émissions" qui correspond à la majorité des applications étudiées. Dans un second temps, nous nous sommes intéressés aux schémas de communications des applications afin d'étudier l'existence des groupes de processus dans ces schémas. L'étude a montré que pour la plupart des applications, il est possible de créer des groupes de processus de façon à minimiser la taille des groupes et le volume des messages inter-groupe. A partir de là nous avons proposé deux protocoles de tolérance aux fautes. Le premier est un protocole de sauvegarde de points de reprise non coordonnés pour les applications à émissions déterministes qui évite l'effet domino en n'enregistrant qu'un sous ensemble des messages de l'application. Nous avons également adapté le protocole pour l'utiliser sur des groupes de processus. Par la suite, nous avons proposé HydEE, un protocole hiérarchique fondé sur le déterminisme des émissions et les groupes de processus. Il combine un protocole de sauvegarde de points de reprise coordonnés au sein des groupes à un protocole à enregistrement de messages entre les groupes. / With the evolution of parallel computers, the need for fault tolerance protocols is becoming increasingly important. The existing fault tolerance protocols are not adapted to thèse architectures because they either force a global restard (coordinated checkpointing protocols) or all message logging (message logging protocols). We studied the characteristics of the existing protocols. We first studied the determinism of the applications, since existing protocols assumenon deterministic or piecewise deterministic executions. In our study, we examined the message passing model, and more specifically MPI applications. We have analyzed26 MPI applications and have put forward a new characteristic called "send-determinism" which corresponds to moststudied applications. In a second step, we studied the communication patterns of the applications to study the existence of clusters of processes in these patterns. The study showed that for most applications, it is possible to create clusters of processes to minimize the size of clusters and the volume of inter-cluster messages. Then we designed two fault tolérance protocols. The first one is an uncoordinated checkpointing protocol which is based on the send-deterministic assumption and avoids emissions deterministic domino effect while logging only a subset of the application messages. We have also adapted the protocol to clusters of processes. Then, we proposed HydEE, a hierarchical protocol that is lso based on the send-deterministic assumption and that is used on clusters of processes. It combines coordinated checkpointing protocol inside clusters to a message logging protocol for inter-cluster messages.
13

Intrastat v praxi / Intrastat in Practice

Fekerlová, Martina January 2014 (has links)
This work focuses on issues of Intrastat and its main goal is to describe the collection and processing of data, sending statistical reports customs administration and the subsequent identification of the most common mistakes and problems. The thesis is indirectly divided into theoretical and practical part. In the theoretical section are described the concepts related to the international movement of goods and Intrastat. Component of practical part is also the methodology of work, which includes research question and ways of getting information. It is about a qualitative research, precisely observations, analysis of documents and interviews in several companies in the Pilsen Region. The resulting data were processed and the result is a description of the most common problems. The thesis includes proposals for solutions to eliminate these fauls.
14

Insider perspectives of education, health and care plans

Redwood, Morwenna January 2015 (has links)
The introduction of Education, Health and Care (EHC) plans proposed in the Children and Families Act 2014 has aimed to give parents and children who are going through the assessment process greater control and choice in decisions, and enhance the multi-professional collaboration between education, health services and social care. This research seeks to evaluate to what extent parents’, children and young people’s, and professionals' experiences correspond to these values at an early stage of implementation. The methodology of this thesis is based on a realistic evaluation framework informed by the work of Pawson and Tilley (1997). Realistic evaluation aims to construct a programme theory which links three distinct broad aspects of a programme: its context, mechanisms and outcomes (C-M-Os). This research employs a programme theory of how an EHC assessment is conducted and has been developed from the current literature on person-centred theory. Person-centred theory has been chosen because of its corresponding value base to the SEND reforms and the recommendation of its use in a number of government policy documents including the SEND Code of Practice (DfE, 2014). The programme theory has been used to devise questionnaires that have sought to gain professionals' experiences of the assessment process, particularly in relation to multi-agency working, and their perceptions of the person-centred nature of the assessment. In addition, five case studies have explored these issues in more depth to ascertain whether the EHC assessment process in this authority is meeting the core aims of the Children and Families Act 2014. Semi structured interviews and card sorting tasks were devised using the programme theory and conducted with a total of one child, five families and five professionals from five individual EHC assessments. This analysis goes beyond a description of the facilitating factors and barriers to person-centred support and examines how person-centred outcomes arise from specific contexts and mechanisms. Findings suggest that experiences of face-to-face multi-professional collaboration were positive within the EHC assessment group. Nevertheless, professionals expressed frustration that in some cases colleagues were not able to attend meetings due to time constraints, capacity within their services and the commissioning arrangements of their services. Parental and professional experiences of the process appear to be positive. The research demonstrates one case study where a person centred planning approach was utilised very successfully from the perspective of all involved. However, there are significant concerns raised in both phases of this study as to the way in which children and young people are provided with opportunities of contributing to their EHC assessment. The findings are relevant to the development of the EHC assessment process in the local authority (LA) in which I am employed, and will contribute to the debate about the role of educational psychologists (EPs) in evaluating this national policy.
15

Personal data and direct marketing : Coase Theorem on EU Directive 95/46/EC

Edberg, Tobias January 2000 (has links)
<p>The right to personal data is compared with the right to land. The concept of rights may be regarded as bundles of rights of which the right to use of scarce resources, the right to exclude and the right transfer rights are the most important ones. The development of Information Technology has reduced considerably the cost of using personal data leadingto an increased use of the data in the context of direct marketing by different firms. However, the use and processing of personal data may cause externalities, both positive and negative ones, on the individual to whom the data relates. This situation can be analysed with the Coase Theorem, where the transaction costs have important function. In a state of zero transaction costs the parties, firms and individuals, can make agreements of an optimal use of the personal data, independently of the assignments of rights to the personal data. Such agreements internalise further the externalities. However, in the real life the transaction costs are high meaning that the assignments of rights are most significant leading to that the externalities remain. To pass by the problem of transaction costs and externalities, zoning procedure with transference of rights can be used. The background of bundles of right to personal data together with the Coase Theorem and zoning procedure are applied to the Directive 95 /46/EC adopted by the European Union regarding the processing of personal data and the protection of privacy. This Directive may however be interpreted in different ways leading to that the assignment of rights and level of direct marketing is different between Member States.</p>
16

Personal data and direct marketing : Coase Theorem on EU Directive 95/46/EC

Edberg, Tobias January 2000 (has links)
The right to personal data is compared with the right to land. The concept of rights may be regarded as bundles of rights of which the right to use of scarce resources, the right to exclude and the right transfer rights are the most important ones. The development of Information Technology has reduced considerably the cost of using personal data leadingto an increased use of the data in the context of direct marketing by different firms. However, the use and processing of personal data may cause externalities, both positive and negative ones, on the individual to whom the data relates. This situation can be analysed with the Coase Theorem, where the transaction costs have important function. In a state of zero transaction costs the parties, firms and individuals, can make agreements of an optimal use of the personal data, independently of the assignments of rights to the personal data. Such agreements internalise further the externalities. However, in the real life the transaction costs are high meaning that the assignments of rights are most significant leading to that the externalities remain. To pass by the problem of transaction costs and externalities, zoning procedure with transference of rights can be used. The background of bundles of right to personal data together with the Coase Theorem and zoning procedure are applied to the Directive 95 /46/EC adopted by the European Union regarding the processing of personal data and the protection of privacy. This Directive may however be interpreted in different ways leading to that the assignment of rights and level of direct marketing is different between Member States.
17

O Envio do Messias: Uma análise de João 7 à luz do contexto histórico e literário / O Envio do Messias: Uma análise de João 7 à luz do contexto histórico e literário / The send Messiah: an analysis of Jonh 7 in the lihth of historical and literary context / The send Messiah: an analysis of Jonh 7 in the lihth of historical and literary context

Domingues, Vanderson Eduardo 10 April 2013 (has links)
Made available in DSpace on 2016-08-03T12:19:27Z (GMT). No. of bitstreams: 1 VandersonRodrigues.pdf: 980791 bytes, checksum: c75b486c816884d68ef3f9530f2a049d (MD5) Previous issue date: 2013-04-10 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / A presente dissertação objetiva demonstrar as causas do conflito da comunidade joanina na segunda metade do século I, bem como revelar as estratégias de releitura da história de Jesus a partir do prisma do autor do QE para combater os inimigos da comunidade, assegurar-lhes a fé, fortalecer os perseguidos e duvidosos e formar uma cristologia solidificada em um pensamento soteriológico quanto a pessoa de Jesus como Messias. Para tanto pretende-se analisar a pluralidade sociopolítica e religiosa da Palestina no século I, demonstrando como o meio influenciou a escolha do autor do QE ao redigir um texto de forma a fazer uma releitura da vida de Jesus em defesa da fé de sua comunidade. Também serão estudadas as vozes em conflito dentro do texto e as vozes discordantes que cercam a perícope, buscando entendê-las a partir do texto do QE, pois este é o elemento mais palpável de que dispomos para o estudo dos conflitos e motivos que geraram esse evangelho. Para melhor expor e entender o argumento de defesa do autor que representa a comunidade joanina, será desenvolvido um estudo sobre o uso dos verbos pe,mpw e avposte,llw no texto do QE, especialmente no capítulo 7, com o intuito de mostrar como o autor entendia este Jesus Messias e como isto moldou sua teologia.
18

Sportovní centrum / Sports Center

Weinlich, Petr January 2022 (has links)
This diploma thesis discusses a design of a sports center in a city of Prostějov. It is an elaboration of its blueprints for construction realization. The sports center consists of two (above-ground) floors with partial basement that provides storage for hardware. Upper floors provide office and work space aswell as sports and communication equipment. The sports centre provides 9 gyms, each focusing on different kind of exercising. Vertical structural system of the building floor as well as its basement is built using send-lime block. Horizontal structural system is provided from reinforced prestressed hollow core slab ceilings. The construction is cieled by a warm flat green roof. The apartment house is considered as a Nearly zero-energy building.
19

Einstellung von PI-Reglern bei Send-on-Delta-Abtastung: Regelkreisoptimierung unter Berücksichtigung von Energieeffizienz, Netzlast und Regelgüte

Hensel, Burkhard 25 October 2017 (has links)
Energieeffizienz hat in Forschung und Alltag eine zentrale Bedeutung. Arbeiten verschiedene elektronische Geräte zusammen, um gemeinsam eine Regelungsaufgabe zu lösen, müssen sie miteinander kommunizieren. Ein Beispiel aus dem Alltag sind Funk-Raumtemperaturregler, bei denen ein batteriebetriebener Temperatursensor und ein Heizungsaktor (Stellantrieb am Heizungsventil) über drahtlose Kommunikation zusammenarbeiten. Diese Kommunikation benötigt oft mehr Energie als der Betrieb der eigentlichen (elektronischen) Funktionalität der Teilsysteme. Energieeffizienter als die in Regelkreisen übliche periodische (äquidistante) Abtastung ist – durch eine Verringerung der Nachrichtenrate – eine ereignisbasierte Abtastung. Send-on-Delta-Abtastung ist die am weitesten verbreitete Art der ereignisbasierten Abtastung. Dabei wird der Wert der Regelgröße (im Beispiel die Raumtemperatur) nicht in konstanten Zeitintervallen übertragen, sondern nur dann, wenn er sich um einen bestimmten Betrag geändert hat. Der mit einem Anteil von über 90 % im Praxiseinsatz am weitesten verbreitete Reglertyp ist der PID-Regler, wobei die meisten als „PID-Regler“ bezeichneten Regler aus verschiedenen Gründen keinen D-Anteil (Differential-Anteil) verwenden und daher als „PI-Regler“ bezeichnet werden können. Die vorliegende Arbeit verfolgt das Ziel, systematisch zu untersuchen, wie man PI-Regler einstellen sollte, um neben dem Erreichen einer hohen Regelgüte auch die Vorteile der Send-on-Delta-Abtastung bezüglich der Netzlastreduktion und Energieeffizienz bestmöglich auszunutzen. Die „Gewichtung“ dieser sich teilweise widersprechenden Kriterien ist anwendungsspezifisch einstellbar. / Energy efficiency is very important both in science and everyday life. If different electronic devices work together, for example for solving a control task together, they have to communicate with each other. An everyday life example are room temperature controllers using radio communication between a battery-powered temperature sensor and a heating actuator. This communication often needs more energy than the operation of the actual (electronic) functionality of the components. More energy-efficient than the commonly used periodic sampling is event-based sampling, due to the reduction of the message rate. Send-on-delta sampling is the most widely-known kind of event-based sampling. In that case, the value of the controlled variable (e.g. the room temperature) is not transmitted equidistantly but only when it has changed by a specific amount. The most successful controller in practice is the PID controller. The most so-called “PID controllers” do not use the D part (differential action) for several reasons and can therefore be called “PI controllers”. This work analyses systematically how the parameters of a PI controller should be tuned to reach besides a high control quality also a good exploitation of the advantages of send-on-delta sampling regarding network load reduction and energy efficiency. The “weighting” of these partially contradicting criteria is application specifically adjustable.
20

Försörjning under anfall och försvar

Gustafsson, Marcus January 2021 (has links)
Research question - Which conditions are unique, regardless of time and space, for; supplying units in the defense of one's own territory, and supplying units in an invasion of another nation's territory? Purpose – This study aims to increase the understanding of the differences in logistical conditions for strategic supply, and to contribute to the relatively poorly explored research field of military logistics.  Design/methodology/approach – To answer the research question, the author conducted a structured, focused comparative study on three conflicts; The Finnish War, 1808-1809, Operation Barbarossa, 1941, Operation Iraqi Freedom, 2003. Findings – None of the defending sides were properly prepared. The defenders lost resources to the attackers. The defender controlled the territory before the conflict, and had the opportunity to affect and prepare it. All attackers could choose time and theater of war. All attackers’ units were cut off from their supply source due to weather or climate situation. The attackers had the opportunity to obtain resources from the defenders. The distance between the attackers’ units and their rear supply source increased as the offensive continues.  Originality/value – This is the first study that attempts to identify general differences between supplying the defending and the attacking side during an invasion.

Page generated in 0.0274 seconds