• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7011
  • 1944
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 11713
  • 11713
  • 8064
  • 8064
  • 1211
  • 1207
  • 927
  • 845
  • 842
  • 774
  • 767
  • 552
  • 479
  • 461
  • 459
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
371

Dynamic Selection of Cryptographic Algorithms in Runtime Environment Using the Weighted Metric Method

Raissi, Jalal 01 January 2007 (has links)
Information technology is faced with a growing demand for stronger security and more speed at minimum cost in real-time, performance-sensitive, and high-volume applications. There is also disjoint between high-level quality-of-service requirements and low-level cryptographic service providers, between the user and the engineer. The challenge is to enforce security while maintaining fast speed at minimum cost and to bring the low-level security to the high-level application. This research was founded on the notion that current practice of "defensive security" results in adoption of static provider service provisioning schemes, in which a "magic" cipher is selected with static key size, block size, and encryption mode for cryptographic services. Research illustrated that while defensive security is easy to implement, it often results in bottlenecks, performance degradations, mismatches of cryptographic services, and waste of energy. The hypothesis of this research was that a dynamically selected cryptographic algorithm provides suitable and often more efficient cryptographic service than a statically assigned cipher can, regardless of the strength of the latter. The goal of this research was to provide empirical data in support of dynamic-provider service provisioning of cryptographic services by outlining a framework, theorem, and algorithm for dynamic selection of cryptographic algorithms in a runtime environment using the weighted metric method. Toward that goal, the author developed a proof-of-concept simulator and a full-scale prototype using Java and C#/VB. The simulator was used to provide theoretical evidence in support of the dynamic-provider service-provisioning theorem in general. The full scale prototype was used to perform empirical data collection, selection, and reporting functions. The data collection function included running cipher performance benchmarks and storing the results in data repositories located on servers and end-hosts. A runtime cryptographic algorithm selection process was used to select suitable ciphers for an assorted array of cryptographic service requests. Analysis of the test data collected in this investigation reaffirms the notion that a dynamically selected cipher provides suitable and often more efficient cryptographic service than a statically-assigned magic cipher can. The empirical data presented in this report supports the hypothesis of author's dissertation research.
372

An Examination of Factors Associated with Students' Ethical Decision Making in Post-Secondary E-Learning Programs

Ramim, Michelle M. 01 January 2008 (has links)
Technological advances and the increasing popularity of the Internet have contributed to the implementation of e-learning programs in post-secondary educational institutions. Students' enrollment in e-learning programs substantially increased over the past decade. However, ethical issues related to students' conduct in e-learning programs, such as plagiarism, cheating, and falsifying information, are a major concern. Moreover, students' unethical conduct has intensified due to the use of technology. For this investigation, the author constructed a model based on an analysis of the following factors that impact students' ethical decision making: their familiarity with the university’s code of conduct, their academic experience, and their experience with the use of technology. Participants consisted of356 students enrolled in e-learning programs at two universities, an independent institution and a public institution. The author constructed a proposed theoretical model by using ordinal logistic regressions for determining the significance of the contribution of each of the three independent variables on students' ethical decision making. Outcomes of this investigation resulted in an overall significant model of the three aforementioned factors in predicting the odds of students' ethical decision making. Results show that students' familiarity with the university's code of conduct and their academic experience are significant predictors of the dependent variable, while students' experience with the use of technology appears to have little or no contribution to students' ethical decision making. Additionally, results of the interaction analysis show that the interaction of students' familiarity with the university's code of conduct and their academic experience appears to have a significant contribution to students' ethical decision making. Moreover, a Mann-Whitney U test analysis was performed, demonstrating no differences between undergraduate and graduate students in the scores of their overall ethical decision making. However, the scores of two specific ethical decision making items were found to be significantly different between undergraduate and graduate students. The benefits of this research are threefold. First, this investigation adds empirical data regarding the factors that contribute to students' ethical decision making. Second, this study points out the significance of students' familiarity with the university's code of conduct as an important contributor to their ethical decision making. Finally, the findings are relevant to researchers and educators alike.
373

Wireless Integrated Secure Data Options Model (WISDOM) for Converged Network Security

Ransome, James F. 01 January 2004 (has links)
There is a significant need for a comprehensive network security methodology that integrates wired and wireless and addresses the characteristics and security requirements of these converged technologies. This work presents a model developed by the author and is known as the Wireless Secure Data Options Model (WISDOM). An extensive literature review has shown wireless converged networks are subject to security vulnerabilities and risks. This dissertation proposes a security model to mitigate or eliminate these risks. The literature review identified the 802.11 Wireless Local Area Network (WLAN) as the most vulnerable and critical node in wireless converged network security. WLANs can easily be reconfigured, are very mobile, allow for potentially continuous exposure, and require the security profile to be scrutinized even more than is required for wired networks. This includes inherent security flaws known to exist in 802.11 architecture that result in additional risks to otherwise secure converged networks. An even worse scenario to consider is one where an insecure WLAN is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. After evaluating the security vulnerabilities and risks in 802.11 WLANs, risk mitigation solutions were identified and associated with taxonomic structures that form the basis for WISDOM. WISDOM provides three tiered security options with proper hardware, software, and security requirements delineated to secure a WLAN at a corresponding security levels equivalent to the wired network it connects with. A testing matrix with specific procedures to replicate and test WISDOM in a real world environment was developed from the literature research. A well-known testing lab, The PKI Group, used this matrix to independently test WISDOM and record the results. The dissertation includes an analysis of the behavior of WISDOM in an operational environment based on the results of the independent testing. The dissertation also provides documentation for researchers in industry who are equipped with the appropriate corporate or laboratory resources to build, operationally test, and subsequently apply WISDOM in a converged network environment. WISDOM will make a major contribution in the field of converged WLAN and wired security.
374

A Comparative Analysis of Design Techniques for the Construction of an Expert System for Aircraft Engine Diagnostics

Raton, Mitch 01 January 2003 (has links)
The lack of knowledge and understanding of diagnostic aircraft propulsion systems causes inappropriate problem diagnosis. Because of increasing complexity, technicians are incapable of performing the necessary tasks in accordance with standard regulations. More sophisticated systems are needed today to "assist" the user technician in decision-making. This work provided a study of rule-based and frame-based expert system techniques to determine the most appropriate solution in the domain of complex diagnosis using large amounts of deterministic data. The study produced a framework that facilitates the diagnosing of faults on aircraft engines, thus reducing the burden on the aircraft mechanic regardless of experience level. An intelligent system, the Virtually Automated Maintenance Analysis System (V AMAS), was created as a test model. It was used to compare the relative efficiency of the different expert systems techniques and the effectiveness of expert systems. One aviation malfunction problem was identified. Information collected for the Main Ignition Malfunction was developed into question sets and coded. Six specific subsets of problems were addressed. This research compared the rule-based and frame-based knowledge representation techniques using a set of evaluation factors: computational efficiency, correctness, expressiveness, and consistency. From the analysis it was concluded that the frame based knowledge representation technique ranked higher than the rule-based representation, and is suitable for use with an expert system to represent an aircraft propulsion system 's deterministic data.
375

School-Based Support for Elementary School Teaching with Technology

Rawls, Pamela 01 January 2004 (has links)
Research has shown that teachers' effective use of technology in the classroom is positively related to the amount of administrative support they receive. However, most principals lack the technical background or sufficient training that would help them to provide essential areas of support for those involved with the use of technology in teaching. The purpose of this study was the development of a knowledge base for models of administrative support for teaching with technology in elementary schools, including prescriptions for technology training for principals. The knowledge base and prescriptions were synthesized from analysis of qualitative and quantitative data collected from responses to a survey of elementary school principals in Georgia. The critical factors that contributed to elementary school principals' support for teaching with technology were an above average to high level of computer technology skills, years of computer experience, the training area of productivity and professional practice, and the number of years involved with facilitating support. The level of computer technology skills contributed to the principals' stages of concern regarding facilitating support. Impact concerns associated with collaboration and the level of computer skills were predictors for principal support. Several prescriptions and recommendations for improving principal support for teaching with technology contributed to the educational knowledge base. School districts need to encourage their principals to collaborate with their colleagues in strong technology schools in order to move them toward the impact level of concern with supporting teaching with technology. Schools should encourage their principals to take training to become proficient in computer technology skills. State and local school systems must restructure their technology certification programs by providing a component for principals that emphasizes content-based skills in administrative areas of responsibility emphasizing the six categories from the National Educational Technology Standards for Administrators (NETS-A), developed by the International Society for Technology in Education (ISTE). University preparatory programs and professional development programs should also emphasize these six content areas from the NETS-A to provide the knowledge and skills needed to comprehensively support the integration of technology into the learning environment.
376

Cognitive Based Adaptive Path Planning Algorithm for Autonomous Robotic Vehicles

Razavian, Adam A. 01 January 2004 (has links)
Processing requirement of a complex autonomous robotic vehicle demands high efficiency in algorithmic and software execution. Today's advanced computer hardware technology provides processing capabilities that were not available a decade ago. There are still major space and time limitations on these technologies for autonomous robotic applications. Increasingly, small to miniature mobile robots are required for reconnaissance, surveillance, and hazardous material detections for military and industrial applications. The small sized autonomous mobile robotic applications have limited power capacity as well as memory and processing resources. A number of algorithms exist for producing optimal traverses given changing arc costs. One algorithm stands out as the most used algorithm in simple path finding applications such as games, named the A * algorithm. This dissertation investigated the hypothesis that cognitive based adaptive path planning algorithms are efficient. This assumption is based on the observed capability of biological systems, which ignore irrelevant information and quickly process non-optimum but efficient paths. Path planning function for all organisms from insects to humans is a critical function of survival, and living organisms perform it with graceful accuracy and efficiency. This hypothesis was tested by developing a Cognitive Based Adaptive Path Planning Algorithm (CBAPPA) and a limited simulation program to test the theory of the algorithm, and comparing the result with other known approaches. This dissertation presented a new cognitive based approach in solving the path planning problems for autonomous robotic applications. The goal of this paper was to show that adaptive cognitive based techniques are more efficient by comparing this paper's path planning approach to analytical and heuristic algorithms. This study presented a two-step methodology of Primary Path and Refined Path. Each step was implemented by a number of heuristic algorithms. This paper illustrated that the CBAPPA’s path-finding efficiency exceeds the efficiency of some popular analytical and heuristic approaches. This research paper concluded that the hypothesis was verified and cognitive based path planning algorithm is efficient and is a viable approach for autonomous robotic applications.
377

Strategic Information Technology Investment Decisions in the Banking Industry

Read, Tony J. 01 January 2005 (has links)
Spending on IT has continually increased over the last 10 years within the North American retail banking industry, but debate remains as to whether organizations have seen the expected value from these IT investments. Greater management focus is being placed on evaluating and realizing shareholder value from IT investments. The challenge is to reduce IT costs from operational infrastructure and move spending to strategic IT investments for business growth and shareholder value. Banks need to develop and implement improved techniques for planning, investing, value realization, and governing strategic IT investments. The goal of the study was to investigate the strategic environment of the retail banking industry in North America and understand how banks decide upon strategic IT investments. The study consisted of a description of the retail banking strategic environment and applied bank strategies, a literature review of how IT is used within the banks, differentiating between strategic and non-strategic investments, and a cross disciplinary literature review of financial and organizational IT investment techniques for evaluating strategic IT investments. A survey was conducted at a large bank to identify what IT investment techniques were used in practice and why techniques identified in the literature review were not being applied. The study found that there were varying approaches to assessing strategic IT investments within the banking industry, but typical techniques deployed were traditional financial and conventional planning methods. Emerging organizational management techniques, like the balanced scorecard, proved to be more important than expected and were being actively deployed. Emerging information economics and decision support methods proved promising, but were deemed advanced and less important in the absence of more basic business measures. The study proposes a maturity framework and 16 techniques for assessing strategic IT investments, which showed promise at the surveyed bank. Future research could consider empirically testing the framework in a longitudinal bank study, evaluating the techniques over the life of strategic projects, in addition to evaluating the framework's potential in other industries. The author hopes that the study has promoted a better understanding of bank's strategic IT investment decision-making, and the applicability of assessment techniques for effective investment management.
378

Electronic Mail Retention Policies in Mid-sized Manufacturing Companies in The United States

Reavis, David R. 01 January 2006 (has links)
The rapid growth of Internet technologies has increased electronic communications among all types of organizations. E-mail has increased in popularity because the speed of communication is faster than traditional methods and drafting and distributing messages to multiple recipients is easier and less expensive than other methods. The legal aspects of e-mail retention present some risks for the organization. Two of the major risks of using e-mail are the potential for discovery in litigation and the retention of e-mail to comply with various federal and state laws. The goal of this research was to identify actions mid-sized manufacturing companies should consider in mitigating these risks. This research used the descriptive research method to describe the current recommendations made by legal counselor other qualified records managers to companies in the target population. A survey was conducted to collect the information. The goal of the research was to provide mid-sized manufacturing companies with some best practices for e-mail retention in their work environment. The best practices were categorized into general e-mail retention guidelines and guidelines specific to reducing risk in legal areas.
379

Self-Esteem and Intrinsic Motivational Effects of Using a Constructivist and a Behaviorist Approach to Computer Usage in Fifth Grade Hispanic Classrooms

Redden, Sharron A. 01 January 1999 (has links)
An experimental study was conducted with students from four fifth grade classrooms designed to evaluate the non-cognitive effects (self-esteem and intrinsic motivation) of using two different approaches to computer usage with predominantly Hispanic students. The two approaches were broadly categorized as a behaviorist and a constructivist approach. An experimental and a control group of fifth grade students were used to implement the study. The constructivist experimental group integrated computer technology into the classroom curriculum by using a variety of utility/creativity mind tool software applications and used their computer skills to solve problems, create presentations and research projects. Follow-up activities reflected school-wide thematic units that were aligned with state mandated TEKS (Texas Essential Knowledge and Skills) objectives. The behaviorist control group integrated computer technology into the classroom curriculum by using Integrated Learning System (ILS) courseware that is aligned with state mandated TEKS objectives. The ILS courseware incorporated a management system that evaluated and diagnosed academic needs of students, designed an improvement path for each individual student and placed them at an appropriately challenging academic level within the ILS courseware. Data required for the study was derived from pretest and posttest results from the Culture Free Self-Esteem Inventory (CFSEI) and the Children's Academic Intrinsic Motivation Inventory (CAIMI). Two hypotheses were tested twelve weeks after the two technology approaches to computer usage were implemented. The two hypotheses were tested for a .05 level of significance. The constructivist group showed a significant difference in intrinsic motivation on four of the five subtests over the behaviorist group. They also showed a significant difference in self-esteem over the behaviorist group on the self-esteem academic sub-scale. Included with the results and recommendations is a list of related questions for further study.
380

The Value of an Online Learning Environment to an Adult Basic Education Program

Reed, Traci M. 01 January 2005 (has links)
The goal of the study was to increase student retention and achievement by using an online learning environment (OLE). The target population consisted of adults who voluntarily enrolled in adult education courses at Santa Fe Community College, Florida, and consented to participate in the study. The treatment was administered to adult basic education students with skills below the ninth grade. Since adult education programs are funded on a performance basis, student retention is a foremost concern. It is difficult for a program to increase achievement rates if students do not attend the program long enough to accomplish their educational goals. An OLE was developed to offer support beyond the on-campus classroom. Each participant took the Test of Adult Basic Education, to determine initial functioning level and the Computer Placement Exam to determine computer literacy skills. Approximately half of the entering students had sufficient computers skills to navigate WebCT. The control group was taught in a traditional classroom setting; the experimental group was classroom based and had access to a program OLE that resided in WebCT. Student use of the OLE was monitored and usage data were collected. After the 16-week treatment period, the students were reassessed using the same instruments. Changes in test scores were used to determine educational gains. Differences in student achievement data between the control group and the experimental group were analyzed for significant differences. No significant differences were found. Student achievement may have been affected by the small number of students who participated in a post testing session as well as by the slow completion of all courses in the OLE. The retention data were compared to data identified by the literature review and previous groups of adult basic education (ABE) students. The experimental group showed significant increases in student retention. The average number of weeks attended by the experimental group was approximately twice the average number of weeks attended by previous ABE groups. This information suggests the OLE had a positive impact on student retention. The usage data gathered from WebCT and the results of the student questionnaire indicate that the adult basic education students found that the OLE was a valuable addition to their educational experience. The college has made a commitment to continue its development and to work with the teachers to maximize its benefits. In the future, students will have the option of learning in a traditional classroom only or in a hybrid environment made up of a traditional classroom and WebCT.

Page generated in 0.0708 seconds