• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 263
  • 94
  • 30
  • 30
  • 22
  • 22
  • 9
  • 8
  • 6
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • Tagged with
  • 582
  • 149
  • 141
  • 78
  • 77
  • 66
  • 66
  • 61
  • 51
  • 50
  • 48
  • 46
  • 46
  • 45
  • 44
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Interdicting a force deployment : two-sided optimization of asset selection, lift scheduling, and multi-commodity load planning /

Koprowski, Peter M. January 2005 (has links) (PDF)
Thesis (M.S. in Operations Research)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Gerald G. Brown. Includes bibliographical references (p. 49-50). Also available online.
112

Das Erfassen und Handhaben von Produktanforderungen methodische Voraussetzungen und Anwendung in der Praxis /

Ahrens, Gritt. Unknown Date (has links)
Techn. Universiẗat, Diss., 2000--Berlin.
113

Nutzung von Felddaten in der qualitätsgetriebenen Produktentwicklung und im Service

Edler, Andreas. Unknown Date (has links) (PDF)
Techn. Universiẗat, Diss., 2001--Berlin.
114

Childbirth education: module utilizing mothers for father-infant attachment during deployment

Rinaldi, Sabrina January 1900 (has links)
Master of Science / School of Family Studies and Human Services / Melinda S. Markham / Childbirth has an effect on an individual and family. In Western culture, the presence of fathers is expected at labor and birth. The role fathers play during pregnancy, labor and birth, and postpartum is ambiguous. Paternal and infant attachment are developed during this transition to parenthood. There are many choices and unexpected outcomes but through childbirth education, individuals and families can be empowered to have a satisfying experience, ultimately setting the family up for success. Military individuals and families have unique and often challenging obstacles when it comes to participation in childbirth. Utilizing education developed to address concerns military individuals and families might face can lead to an empowering and satisfying experience, and help family bonds during a deployment. A module was created to bridge the gap in childbirth education, specifically for military families facing deployment. The module was developed to supplement existing childbirth education curriculum and is divided into three subsections: pregnancy, labor and birth, and postpartum.
115

Profiling emotion regulation : exploring patterns of regulation in classroom behaviour

Sinclaire-Harding, Lysandra January 2018 (has links)
Emotion Regulation describes the ability to influence the experience and expression of affect. Adaptive emotion regulation contributes to healthy development, social competence and academic success (Kochanska, Murray & Harlan, 2000). This study investigated the behavioural strategies for emotion regulation, emotion expression, regulatory styles and classroom behaviour in middle childhood. One hundred and twenty-eight children were recruited from five UK public and private primary schools. From within their school setting, participant sensitivity to emotion-eliciting events was recorded using ambulatory skin conductance technology whilst age-group paired children performed two LEGO construction tasks. Observed behaviours were video-recorded and coded to establish frequencies of distinct regulatory behaviours. These were compared to self-reports of emotion regulation strategies and teacher-reports of classroom behaviour. Iterative partitioning cluster analysis methods were used to identify four regulatory profiles: 1) the ‘Adaptive’ cluster: employed high levels of positive problem solving and reappraisal strategies and frequently expressed both positive and negative emotions; 2) the ‘Maladaptive’ cluster: used more negative regulation (avoidant or obstructive strategies), expressed more negative emotion and had more social and behavioural problems in class; 3) the ‘Reactive’ cluster showed high levels of electrodermal activity, expressed little emotion and were reported as inattentive/hyperactive in class; and 4) the ‘Distracted’ cluster demonstrated high levels of behavioural and cognitive distraction. These results indicate four meaningful profiles that could support the identification of vulnerable individuals for positive school-based intervention and support.
116

Deployment and analysis of DKIM with DNSSEC / Driftsättning och analys av DKIM med DNSSEC

Bondesson, Rickard January 2008 (has links)
As the email system is widely used as a communication channel, and often is crucial for the performance of organizations, it is important that users can trust the content of what is being delivered to them. A standard called DomainKeys Identified Mail (DKIM) has been developed by the IETF to solve the problem with authentication and integrity, by using digital signatures. This master's thesis goal is to evaluate the solution where an implementation of DKIM is extended with DNSSEC validation. DNSSEC is a solution which secures, among other, the mapping between IP addresses and domain names. The implementation of DKIM is deployed and evaluated with function testing, domain testing, threat analysis, and interoperability testing.DKIM does not need any new public-key infrastructure, thus inflicting less cost on the deployment compared with other cryptographic solutions such as S/MIME and PGP. We recommended to use DKIM together with DNSSEC to secure the transportation of the DKIM public key. The upcoming standard ADSP can inform the recipient of whether a domain is signing its email or not and thereby a possibility to detect any unauthorized signature removal. A further problem is that mailing lists often manipulate the email, thus breaking the signature. We therefore recommend to send email directly to the recipient or active DKIM signing on the mailing lists.
117

Establishing DANE TLSA Deployment Levels Among Swedish Second Level Domains

Sandelin, Rikard January 2017 (has links)
Domain Based Authentication of Named Entities (DANE) is an Internet Engineering Task Force (IETF) standard released in 2012 intended to complement or in some cases replace the current Public Key Infrastructure (PKI) model. The current PKI model uses Transport Layer Security (TLS) certificates issued by Certificate Authorities (CA) binding domain names to public key. These CAs act as trust anchors during the certificate validation process. Web browsers and other TLS supported applications have large lists of trusted CA public keys. If one of these trusted CAs are compromised the whole system is compromised. DANE uses the Domain Name System (DNS) to publish TLS certificate information and create certificate associations to domain names. DANE relies on DNS Security Extensions (DNSSEC) for authentication and message integrity. Using the DNS root as a single trust anchor instead of the many CA trust anchors the attack surface is drastically reduced.In this study a quantitative survey among Swedish DNSSEC signed Second Level Domains (SLD) is performed with the aim to establish the DANE TLSA deployment level among the SLDs in Top Level Domain (TLD) .se.The results show that 686 471 of the Swedish SLDs have been DNSSEC signed which is approximately 49% of all Swedish SLDs. The number of domains that have deployed DANE is very low, with only 79 SLD found to have DANE TLSA resource records in DNS. The total number of DANE TLSA resource records were 175 and the most common service used with DANE TLSA was HTTPS on port 443 which was 62% of all DANE TLSA resource records found. The most common certificate usage field setting was three, domain issued certificates.
118

The Need for Speed : Delays in Deployment of UN Peacekeepers and Mission Effectiveness

Jansson, Gunilla January 2018 (has links)
No description available.
119

Spousal support in the South African National Defence Force during external military deployment : a model for social support services

Pitse, Cynthia Apile 16 May 2010 (has links)
Deployment and separation are indivisible components of military life. Separation of family members due to deployment is stressful and challenging. The importance of spousal resilience has been reflected by the nature of problems that have been experienced by the spouses at home while the member/members were on external military deployment. Therefore, the model on social support services to the South African National Defence Force (SANDF) members’ spouses during external military deployment is not in place. Furthermore, the efficiency and effectiveness of spousal support services during external military deployment within the SANDF have not been scientifically evaluated. The design of a model for social support services to the spouses of SANDF members during external military deployment is therefore critical in ensuring that the members are mission-ready. The objectives of the study were as follows: • To undertake an in-depth literature review that would conceptualise social support services to SANDF members’ spouses while on external military deployment. • To evaluate the implementation, efficiency and effectiveness of existing social support services to SANDF members’ spouses while the member is on external military deployment. • To inform the SANDF management about the results of the study on the need for social support services to SANDF members’ spouses during the members' external military deployment. • To design a model for social support services to the SANDF members’ spouses while the member is on external military deployment as a prerequisite for combat readiness amongst the SANDF members. The research approach that was used in this study is a combination of both qualitative and quantitative approaches. A semi-structured interview schedule was used in soliciting information that aided in the design of a model for social support services to the spouses of SANDF members while members are on external military deployment. Interviews were conducted with the spouses of the members of the SANDF who are or have been involved in external military deployment. Social workers from each of the deploying units within the nine provinces of the RSA undertook interviews with the spouses of the SANDF members who are or have been involved in external military deployment whilst the researcher conducted interviews within the ninth province being Gauteng. Self-constructed questionnaires were used as a quantitative data collection method to elicit information from the SANDF members who are or have been involved in external deployment, regarding the nature of social support services during the external military deployment of the member. Social workers who were deployed with those members assisted with the administration of questionnaires. Following the guidelines provided in the findings and conclusions of the study, the model for social support services during external military deployment of the member was designed. The proposed model is the SANDF Unit Family Support Groups (SANDF UFSGs) model that will address all the challenges and issues that have been identified in this study. The formation of UFSG committees in all the deploying units in the SANDF in order to address deployment related issues and challenges is thus of great importance. Based on the abovementioned, the study was able to attain its goal and objectives. / Thesis (DPhil)--University of Pretoria, 2010. / Social Work and Criminology / unrestricted
120

An Infrastructure Based Worm Spreading Countermeasure for Vehicular Ad Hoc Networks

Zhang, Qi January 2017 (has links)
VANETs are the essential component of the intelligent transport system, which attract research and industrial interests increasingly. As the multifunctional mobile nodes integrating transporting, sensing, information processing, and wireless communication capabilities, vehicular nodes are facing remarkable security issues and more vulnerable to malware attack than conventional communication nodes. In this thesis, the behavior and the security issues of the worm spreading on VANETs are studied. The approaches of the worm spreading on VANETs are discussed and an infrastructure based worm containment strategy is proposed. The infrastructure based worm containment problem is modeled as minimum contamination problem by introducing the expected contamination degree. Then the existing greedy method is applied to solve the proposed problem in VANETs scenario. After that, the Grid-shrinking Greedy Method and the Simplified Greedy Method are proposed which incorporate the characteristics of road networks and VANETs respectively. Simulation results show the two proposed methods outperform the existing greedy method and the comparison method from both complexity and solution quality aspects.

Page generated in 0.0407 seconds