• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 353
  • 185
  • Tagged with
  • 540
  • 540
  • 540
  • 540
  • 540
  • 540
  • 540
  • 69
  • 54
  • 51
  • 46
  • 45
  • 33
  • 32
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

The Internationalization Process of Telenor: A Case Study of Telenor in Thailand

Chanmongkolpanich, Kittiya, Panthong, Supasana January 2009 (has links)
This thesis is to describe the internationalization process of Telenor in terms of entry modes and management of control. While reading this thesis, readers will be acknowledged more about the appropriate process that Telenor applied to Thailand. Moreover, the suitable control to manage Telenor’s international operation in Thailand is also shown herewith.
12

Stop starting, start finishing : En fallstudie om formell kompetensutveckling med fokus på utvärderingsfasen

Ingers, Åsa, Nilsson, Hanna January 2014 (has links)
Vi lever idag i ett samhälle i ständig utveckling vilket ställer krav på verksamma företag att konstant driva på den egna utvecklingen. I detta arbete är kompetenta och kunniga medarbetare viktigt, men det är enligt Rekryteringsenkäten 2012 (Svenskt Näringsliv, 2012) svårt för företagare att anställa den kompetens de behöver. Om inte kompetensen finns på arbetsmarknaden är intern kompetensutveckling ett möjligtalternativ för att ta fram den kompetens som efterfrågas och detta är något som det årligen investeras stora summor i. Vilken effekt dessa investeringar har på företagen är dock något som inte utvärderas i någon större utsträckning (Pineda, 2010) vilket leder till att pengar riskerar att upprepade gånger investeras i overksamma insatser. Hur kan detta åtgärdas? Det finns ett flertal teoretiska modeller för utvärdering av kompetensutveckling, men det saknas empirisk forskning som visar hur företag arbetar med området och det är denna lucka uppsatsen bidrar till att fylla. Undersökningen syftar till att genom en fallstudie beskriva de olika stegen i formell kompetensutveckling på organisationsnivå, med särskilt fokus på utvärdering, och undersöka den problematik som finns kring dessa aspekter utifrån existerande modeller för formell kompetensutveckling och utvärdering av kompetensutvecklande insatser. Följande forskningsfrågor besvaras: 1. Vilka nyckelaktiviteter utförs i det formella kompetensutvecklingsarbetet? 2. Saknas några nyckelaktiviteter i jämförelse med teoretiska modeller för formell kompetensutveckling och utvärdering av kompetensutvecklande insatser? 3. Vilka hinder finns i arbetet med utvärdering av kompetensutveckling och hur kan dessa överbryggas? Undersökningen har antagit en deduktiv ansats och en kvalitativ metod. En fallstudie har genomförts där sex aktörer på olika nivåer i fallföretaget genom personliga intervjuer fått beskriva kompetensutvecklingsprocessen och hur kompetensutveckling utvärderas. Resultatet har därefter analyserats med hjälp utav ADDIE-modellen och Kirkpatricks fyra-nivå modell. Resultatet ger en bild av kompetensutvecklingsarbetet som ostrukturerat och omedvetet där utvärderingsarbetet till stor del är personberoende. Alla faser i ADDIE går att finna i det arbete företaget gör och de hinder som identifierats är övergripande av en strukturell karaktär. Förbättringsmöjligheterna för utvärderingsarbetet består främst av att tydliggöra rutiner, ansvar och praktiska hjälpmedel.
13

Evaluation of Citizen Help Request (CHR) initiated by Bangladesh Police: A Case Study

Hasan, Mohammad Mahmudul January 2012 (has links)
No description available.
14

Identifying the existing status of e-services' sustainability research

Husnain, Ali January 2012 (has links)
No description available.
15

Securing hospitals from exploitation of hardware ports

Axetun, Magnus January 2017 (has links)
Electronic devices are widely used in today’s hospitals and the possibilities they offer are increasing every day. The devices are often embedded systems, running outdated operating systems and need to have a high uptime which makes them vulnerable to malicious software (malware). This thesis examines the ways malware can propagate through the Universal Serial Bus (USB) with the help of social engineering. Valuable assets are defined and different threat scenarios to these assets are presented. Lastly, the different scenarios are evaluated based on which assets they impact and how to effective mitigate the threats they present. Short- and long-term mitigations are presented to secure the devices in a broader view.
16

Preconditioned iterative methods for PDE-constrained optimization problems with pointwise state constraints

Ström, Anders January 2017 (has links)
Optimization problems constrained by partial differential equations (PDEs) arise in a variety of fields when one wants to optimize a system governed by a PDE. The goal is to compute a control variable such that a state variable is as close as possible to some desired state when control and state are coupled by some PDE. The control and state may have additional conditions acting on them, such as, the so-called box constraints which define upper and lower bounds on these variables. Here we study the optimal control of the Poison equation with pointwise inequality constraints on the state variable with Moreau-Yosida regularization. The state constraints make the optimality system nonlinear and a primal-dual active set method is used to solve it. In each nonlinear step a large saddle point system has to be solved. This system is generally ill-conditioned and preconditioning is required to efficiently solve the system with an iterative solution method. The preconditioner should also be efficiently realizable. The convergence rate is also dependent on model and discretization parameters, for this reason, a preconditioning technique needs to be applicable to a wide range of parameters. Three preconditioners are tested for the problem and compared in terms of iteration counts and execution time for wide range of problem and discretization parameters.
17

Network Virtualization in Multi-hop Heterogeneous Architecture

Köhler, Fredrik January 2018 (has links)
Software Defined Networking is a technology that introduces modular and programmable networks that uses separated control- and data-planes. Traditional networks use mostly proprietary protocols and devices that needs to communicate with each other and share information about routes and paths in the network. SDN on the other hand uses a controller that communicates with devices through an open source protocol called OpenFlow. The routing rules of flows can be inserted into the networking devices by the controller. This technology is still new and it requires more research to provide evidence that it can perform better, or at least as good as, the conventional networks. By doing some experiments on different topologies, this thesis aims at discovering how delays of flows are affected by having OpenFlow in the network, and identifying overhead of using such technology. The results show that, the overhead can be to large for time and noise sensitive applications and average delay is comparable to conventional networks.
18

Pixel Based and Object Oriented Multi-spectral Remotely Sensed Data Analysis for Flood Risk Assessment and Vulnerability Mapping.

Hassan, Waqar Ul January 2010 (has links)
Geographical information system with remotely sensed data can be instrumental in many ways for disaster management and post disaster rehabilitation. During last few decades the usage of remotely sensed data has extensively increased, although image interpretation tools are not highly accurate but still considered as fast, reliable and useful way to get information from imagery. Disaster assessment, management and rehabilitation are always creates challenge for experts. Population growth, expansion in settlements either in the rural or in the urban areas bring more problems not only for the humans but it also affect the global environment Such global changes on the massive scale disturbs the ecological processes. GIS along with Remote sensing data can change the whole scenario in very short period of time. All the departments concerning to strategic disaster planning process can share their information by using the single platform, so for this purpose spatial database can be helpful by providing the spatial data in digital format to the department concerned. Spatial phenomena can be observed by using different image analysis techniques and the resultant thematic map display the spatial variations and changes that describe the particular phenomenon whether it was any disaster or change in soil type or vegetation type. Remotely sensed data like aerial, satellite and radar images are very useful for disaster management strategy formulation process. Integration of GIS and remote sensing proved itself the best especially for land-use, land-cover mapping. For this purpose pixel based, sub-pixel based, pre-field and object oriented classification approach are being in use around the world. But thematic maps created from image analyzed by using object oriented classifiers contain more accuracy than any other techniques.
19

Mobile phone use and reproductive health care in Nakuru Provincial Hospital, Kenya

Ibembe, John Daniel January 2011 (has links)
No description available.
20

Information and Communication Technology in developing economies : A literature review on the reasons for failures of ICT; The case of Cameroon

Ishmael, Shu Aghanifor January 2011 (has links)
No description available.

Page generated in 0.2686 seconds