• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 258
  • 67
  • 64
  • 48
  • 45
  • 26
  • 20
  • 13
  • 7
  • 7
  • 7
  • 6
  • 3
  • 2
  • 2
  • Tagged with
  • 650
  • 194
  • 119
  • 101
  • 83
  • 83
  • 70
  • 62
  • 53
  • 53
  • 52
  • 50
  • 47
  • 46
  • 44
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
531

Optimal economic design of mail surveys: influences on response rates and the impact of responses to a second mailing

Gregory, Alexandra January 1900 (has links)
Doctor of Philosophy / Department of Agricultural Economics / John A. Fox / Mail surveys are used to gather information in order to make inferences about populations. This study examines cost effective methods to maximize response rates to a mail survey. A consumer mail survey was developed and used to study consumer demand for safer foods. In addition, the study will verify if additional responses from follow-up mailings changes econometric analysis results, thus validating follow-up mailing costs. A test was created to maximize response rates and incentives were used in both mailings. An Ordinary Least Square (OLS) model was developed to analyze response rates and mail survey costs while a willingness to pay model and an ordered probit were used for the consumer demand analysis. Results showed that when a consumer survey was sent to a city within the school's state no incentive should be included while if sent to a city outside the school's state an incentive should be included. Moreover, if the outcome from the first mailing resulted in a low response rate a monetary incentive should be included in the follow-up mailing to increase response rates. Results from the consumer willingness to pay for irradiated salad greens showed that consumers are willing to pay higher prices for irradiated salad greens. Furthermore, results showed that there is no statistical difference between the coefficients, in both the willingness to pay and the ordered probit, from the model using additional observations from follow-up mailing and the model that included only observations from the first mailing. Even though coefficients were not statistically different in the ordered probit, significance of the marginal effects for some variables were different between models.
532

Voting and meaning in Hooggenoeg, Grahamstown : an audience's reception of Grocott's Mail's 2011 municipal election coverage

Amzat, Ajibola Taofeek January 2014 (has links)
This thesis examines the meanings that residents of the township of Hooggenoeg (in Grahamstown, in the Eastern Cape province of South Africa) made of the election coverage in the Grocott’s Mail newspaper during 2011 municipal elections in South Africa. In addition, this study also sought to understand the particular set of ‘normative roles’ played by the paper, both with reference to the well-established body of theory about the normative roles of journalism in a democracy, and in terms of the paper’s own conceptualisation of its role in the functioning of local democracy. Grocott’s Mail, the oldest independent newspaper in South Africa, provided extensive pre-election coverage, which included producing and distributing an unprecedented free edition of the paper. The paper also facilitated a town hall debate in order to encourage residents to vote, and empower them to make a more informed choice about their vote. Three qualitative research methods, namely qualitative content analysis, focus group interviews, and individual interviews were used to examine the relationship between the content provided by the paper and the audience’s process of ‘making sense’ and deriving meaning from the content provided. The study concludes that Grocott’s attempt to encourage democratic culture in Grahamstown, in keeping with the more ‘facilitative’ normative roles that the local media can play, was only partially successful. Much of the election reporting subordinated the voices of the ordinary people, and privileged reporting that focussed narrowly on the voting process, and which foregrounded the views of political parties. Overall this coverage largely failed to resonate with the Grocott’s readers who live in Hooggenoeg (a largely ‘coloured’ area of Grahamstown), whose key concerns in terms of their daily life – such as poverty, unemployment, crime, lack of services – seemed, to them, unaddressed by this election coverage and, consequently, was not as engaging or convincing as the publishers/editors had hoped it would be. It can be also argued that Grocott’s narrow conceptualisation of democracy as entailing only public participation in electoral processes failed to cater for how audiences can be made aware of how they can participate in governance beyond the election period.
533

DNS traffic based classifiers for the automatic classification of botnet domains

Stalmans, Etienne Raymond January 2014 (has links)
Networks of maliciously compromised computers, known as botnets, consisting of thousands of hosts have emerged as a serious threat to Internet security in recent years. These compromised systems, under the control of an operator are used to steal data, distribute malware and spam, launch phishing attacks and in Distributed Denial-of-Service (DDoS) attacks. The operators of these botnets use Command and Control (C2) servers to communicate with the members of the botnet and send commands. The communications channels between the C2 nodes and endpoints have employed numerous detection avoidance mechanisms to prevent the shutdown of the C2 servers. Two prevalent detection avoidance techniques used by current botnets are algorithmically generated domain names and DNS Fast-Flux. The use of these mechanisms can however be observed and used to create distinct signatures that in turn can be used to detect DNS domains being used for C2 operation. This report details research conducted into the implementation of three classes of classification techniques that exploit these signatures in order to accurately detect botnet traffic. The techniques described make use of the traffic from DNS query responses created when members of a botnet try to contact the C2 servers. Traffic observation and categorisation is passive from the perspective of the communicating nodes. The first set of classifiers explored employ frequency analysis to detect the algorithmically generated domain names used by botnets. These were found to have a high degree of accuracy with a low false positive rate. The characteristics of Fast-Flux domains are used in the second set of classifiers. It is shown that using these characteristics Fast-Flux domains can be accurately identified and differentiated from legitimate domains (such as Content Distribution Networks exhibit similar behaviour). The final set of classifiers use spatial autocorrelation to detect Fast-Flux domains based on the geographic distribution of the botnet C2 servers to which the detected domains resolve. It is shown that botnet C2 servers can be detected solely based on their geographic location. This technique is shown to clearly distinguish between malicious and legitimate domains. The implemented classifiers are lightweight and use existing network traffic to detect botnets and thus do not require major architectural changes to the network. The performance impact of implementing classification of DNS traffic is examined and it is shown that the performance impact is at an acceptable level.
534

Web-based e-mail client for computer science

Wu, Jichuan 01 January 2003 (has links)
The project is a web e-mail application to provide a web page interface for all CSCI faculty, staff and students to handle their e-mails. The application is written by JSP, Java Servlets, JavaScript and custom JSP tag libraries. Regular e-mail capabilities have been enhanced by the feature of allowing users to store and manage messages by day (store to daily folders, view in daily folders, append notes for that day).
535

Som ett öppet vykort? : En fallstudie av hantering och bevarande av e-post ur ett informationssäkerhet- och informationskulturperspektiv / Like an Open Postcard? : A Case Study of the Management and Preservation of E-mail from an Information Security and Information Culture Perspective

Silander, Jenny January 2019 (has links)
This thesis is based on a case study of two Swedish municipalities. I have studied which strategies archivists and registrars use for managing and preserving e-mail within these organizations. The study constitutes a comparison between a municipality that has introduced a e-archive and one that has not done so. I also explore how the way in which e-mail is managed has changed over time in the municipalities since The General Data Protection Regulation (GDPR) was introduced in Sweden and throughout the EU in 2018. The study was conducted through qualitative methods. Semi-structured interviews with archivists and registrars from the two municipalities were completed. The empirical material from the interviews has been analysed using qualitative content analysis. This means that notes and transcriptions of the interviews was sorted and categorized and then transformed into the results of the study. The thesis theoretical framework consists of information culture and I have analysed in which way the information culture has changed in the organizations since the GDPR came into force. In addition, I also analysed my results from an information security perspective, since this is up-to-date with the GDPR and is an important aspect to consider in relation to of e-government and records management in the society today. The results show that there are a lot of challenges in the municipalities studied concerning management and preservation of e-mail, especially regarding how the people working in the organization tackle the e-mail. There is a great need that increased education about records management reaches out more in the organizations.The conclusion of this challenges is that information culture also has changed noticeably since the GDPR was introduced. The result of this has in many cases meant that many employees have gained a greater awareness that they need to start reviewing their e-mail inboxes, but they do not know how or in what way it should be done. To solve these problems, it is therefore essential that the education initiatives between archivists and registrars and the employees, that had begun to be implemented in the municipality’s, continues to be expanded. In conclusion and in summary, I would like to emphasize that it is important to consider information culture in organizations today. It is important both to be able to develop the organization's records management and also in a wider social context, in order to satisfy a good structure of public documents and our democratic right to take part of these. In addition to this, in my study, I have come to the conclusion that it is essential to consider the information security both within the public organizations and from a wider societal context, especially linked to management and preservation of e-mail. So far, the topic of managing and preserving e-mail linked to strategies used by organizations and how people influence these has been a rather unexplored area in the field of archival science. This study aims to create new knowledge about an area that is both current and important from a wider societal perspective as well as from an archival science perspective. This is a two years master's thesis in Archival Science.
536

Speciální bezpečnostní systém / Special security system

Náhlík, Ondřej January 2015 (has links)
This master’s thesis is focused on design and realisation of special security system for space and property protection. System is devided into two parts, transmitting and receiving. Transmitting part is formed by Raspberry Pi Model B+, motion sensor, webcam and USB LTE modem Huawei E398. Receiving part consists of computer with suitable application for communication with FTP server. Data transfer in mobile systems is described in the first part of this thesis, transmitting part is designed in the second part. There is one transmitting option chosen in the third part and there are also described applications of the transmitting part. The last part of this thesis is focused on the receiving part and its application.
537

Nástroj pro analýzu obsahu síťové komunikace / Analysis Tool for the Network Traffic Content

Mareš, Martin January 2014 (has links)
This paper is about designing and implementing a tool for analysis of the network traffic content. Work is part of the SEC6NET project at FIT - Brno University of Technology. The paper describes specific requirement for such a tool and existing solutions. The main part is devoted to design and implementation of new tool - Netfox Detective. Several problems are handled: data persistence, performance, extensibility, etc. The last part of work describes possibilities and features of the Netfox Detective. The work emphasises extensibility and future development of a created tool.
538

Zefektívnenie prenosu elektronickej pošty pomocou pluginu pre Microsoft Exchange / Efficient Transport of Electronic Mail with Microsoft Exchange Plugin

Jakubis, Tomáš January 2016 (has links)
This project discusses optimization of e-mail and SMTP traffic in proprietary product of Microsoft Exchange 2013 in regard of marine industry. The goal is at first to analyze the requirements of this service on slow and unreliable network connections, SMTP traffic and then the product itself. Afterwards it defines specification  for the final product and prepares the test environment. Design and implementation of transport agent using Exchange Management Shell is described for synchronization of two installations of Microsoft Exchange 2013; and focuses on emerged problems during the development, discusses different approaches and possible solutions. Testing shows various shortcomings of found solution. Finally, analysis of final solution shows possible future improvements and a need of security upgrade before applying to production environment.
539

Workshop Intranet 1997

Ehrig, Matthias 02 December 1997 (has links)
Vortragsfolge: Karsten Priemer: Integration heterogener Applikationsumgebungen in Intranets mit Web - Technologien Swen Gerber: Netzcomputer-Konzepte Sven Graupner: JavaOS - Ein Betriebssystem für Intranets? Patrick Voigt: Netscape Internet Foundation Classes (IFC) Christoph Ziegler: MONARCH - Stand und künftige Aufgaben Holger Trinks: WWW-Robots Frank Richter: ¨Das richtige Mailprogramm¨ Bert Auerbach: Internet-Suchsysteme Frank Richter: Directories - Technologien und Datenadministration Ralph Sontag: Aufbau einer Certification Authority Jörg Hüttmann: Digitales Geld Mario Küchler: Internet-Telefonie Torsten Naumann: Ressourcensteuerung für Internet-Zugänge Michael Hasenstein: Eine zentrale Faxserverlösung auf Basis Hylafax+Web-Frontend Ronald Wahl: Intranet-Nutzermanagement Wolfgang Riedel: Konzepte der Software-Refinanzierung Marco Günther: Linux kontra NT - ¨strategische Plattformen¨? - Teil I Thomas Riedel: Linux kontra NT - ¨strategische Plattformen¨? - Teil II Dietmar Grunewald: WINDOWS-NT im öffentlichen PC-Pool Teil I: Servereinsatz und Nutzerverwaltung Jens Wagner: WINDOWS-NT im öffentlichen PC-Pool Teil II: Anwendungssoftware Matthias Ehrig: Diskless Linux - Möglichkeiten der SysAdmin Matthias Clauß: Skalierbare Systemadministration von LINUX-Rechnern Christian Bobber: WWW-Sicherheitsaspekte Thomas Müller: Authentisierung und Verteilung von Konfigurationsfiles Thomas Förster: Verzeichnissysteme für neue Anwendungen Jürgen Winkler: MathLink - der Kommunikations-Standard von Mathematica Ludwig Wolf: Ethernet - neue Normen, neue Perspektiven Thomas Schier: ATM - Standards und deren praktischer Einsatz Günther Fischer: IP-Routing in unserem (ATM-)Netz Prof. Uwe Hübner: Intranet - Erwartungen und Entwicklungen
540

Mitteilungen des URZ 2/2001

Anders, Clauß, Hübner, Junghänel, Kempe, Petersen, Richter, Riedel, Schier, Sontag 14 August 2001 (has links)
10 Jahre Universitätsrechenzentrum Angebot zur zentralen PC-Beschaffung an der TU Chemnitz Neue Computerpools für die Ausbildung Lehrmaterialien in modernen Medien Benutzbarkeit von Webseiten JAVA3D am Beispiel eines Getriebemodells Filter für E-Mail Das E-Mail-System der TU Chemnitz Neue WWW-Server Campusnetz am G-WiN DFN@home Neuigkeiten zu Campuslizenzen ...

Page generated in 0.0241 seconds