• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 66
  • 6
  • 6
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 139
  • 34
  • 27
  • 26
  • 25
  • 24
  • 23
  • 23
  • 22
  • 21
  • 20
  • 16
  • 16
  • 16
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

The perceptions of a group of first year undergraduate Malawian students of the essay writing process

Kalikokha, Chimwemwe January 2008 (has links)
The purpose of this study was to explore the perceptions of the essay writing process of first year undergraduates at Chancellor College (University of Malawi) and to a lesser extent those of the lecturers responsible for teaching academic skills. A mixed methods design, combining qualitative and quantitative techniques, was employed in order to obtain richer data for deeper understanding of the students’ writing process. Two hundred students from the humanities and social science faculties responded to a self-completion questionnaire towards the end of semester one. Based on the students’ responses, an open-ended questionnaire was administered to four full time English for Academic Purposes (EAP) instructors. Findings from this study indicate that most students find it very challenging to obtain sufficient and relevant source text information, paraphrase or summarise information, and use an appropriate academic writing style. As solutions to these challenges, the students suggested the need for timely essay writing instruction, availability of resources for essay writing, increased amount of time spent on essay writing instruction, and discipline specific instruction in essay writing. EAP instructors identified lack of teaching and learning materials, large EAP classes, and students’ negative attitude towards the EAP course, as some of the challenges they encounter when teaching the course. The EAP instructors proposed an increase in the number of staff members, making students aware of the significance of the EAP course at an early stage, and the availability of up to date resources, as some of the ways in which the teaching of the course can be improved. Overall, the findings seem to suggest that difficulties that students encounter during the writing process and teaching challenges that EAP instructors face, have great impact on students’ perception of academic writing as well as their approach to writing tasks. The findings also suggest a lack of dialogue between the students and their lecturers. This is evident in students’ unawareness of the nature of the writing demands of their lecturers and disciplines; students’ desire to have timely essay writing instruction; and the lecturers’ concerns about students’ negative attitude towards the EAP course.
92

Investigating perceptions of student engagement in class practices of Vietnamese learners of academic English

Edmunds, Trevor 12 1900 (has links)
Thesis (MA)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: Over the last 25 years socially-based SLA research has increasingly focused on contextual factors that constitute the local learning environments of learners of English as a second language in attempting to better comprehend the socially embedded nature of learning outcomes. These scholars have largely postulated language learning not only as the acquisition of linguistic knowledge in the abstract but rather as fundamentally constituted by participation in social praxis as situated within local sociocultural and institutional contexts. The emergence of „the social‟ in SLA research is especially significant to academic contexts in which learners belonging to diverse cultural and literacy traditions typically struggle to identify with target literacy practices of their academic communities. Drawing on a sociocultural approach and the community of practice construct, this thesis takes a qualitative approach. Through the analysis of teacher and student focus group data, this thesis sets out to illustrate learner and teacher articulations surrounding what constitutes learner engagement in an academic English program at an international university in Vietnam. The data collected in this study suggests that the focal learners perceived higher levels of learner engagement in learning contexts in which collaborative, dialogic activity was extensively integrated in the acquisition of target academic literacy practices. While the focal teacher articulations surrounding student engagement also took into account the importance of such collaborative class activity, the teachers did not attribute the same level of importance to it that the focal students did. This study concludes that teachers should extensively use activity frameworks within class that encourage group work in the learning of target academic literacy practices, especially academic reading and writing practices. Even where target practices will ultimately be elaborated and assessed on an individual basis, this study illustrates that collaborative dialogic frameworks seemed to provide students with opportunities to pool linguistic, content, and skills-related resources, thus allowing students to overcome learning difficulties associated with academic literacy practices. Ultimately, such activity frameworks appeared to mediate higher levels of student engagement within class activities, which students linked to more effective and enjoyable learning of academic English. / AFRIKAANSE OPSOMMING: Geen opsomming beskikbaar
93

Impacto dos choques de renda sobre a alocação de tempo da criança/adolescente entre escola e mercado de trabalho / Income shock impact on child/teenager time allocation among school and job.

Ivan Donizetti de Paula Júnior 09 June 2014 (has links)
Existe uma vasta literatura evidenciando os determinantes que repercutem negativamente na acumulação de capital humano do menor de idade. O trabalho infantil seria uma dessas causas. Outros trabalhos mostram que um choque de renda sofrido pelas famílias pode estar por trás da oferta de trabalho de outros membros da família (esposa e filhos). Tal efeito é conhecido na literatura como efeito trabalhador adicional e pode estar relacionado, pelo menos no Brasil, à restrição de liquidez das famílias. O objetivo deste trabalho é averiguar o impacto de um choque de renda representado pela perda de emprego do chefe da família sobre a alocação do tempo dos filhos em idade escolar entre escola e mercado de trabalho. Para realizarmos este trabalho usamos dados da Pesquisa Mensal do Emprego, do IBGE, entre 2003 e 2012. De acordo com os resultados obtidos, o tratamento, ou melhor, o choque de renda representado perda de emprego do chefe da família não possui impacto significativo sobre a escolha das famílias de manter o filho apenas na escola ou de enviar o filho para o mercado de trabalho. Entretanto, nos casos em que o efeito do tratamento é persistente percebemos um impacto sensivelmente maior, apesar de ainda não ser estatisticamente diferente de zero. Na última subseção reproduzimos nosso modelo com dados da PME antiga com o intuito de checar a interferência da diferença de metodologia entre a PME antiga e a nova nos resultados. Notamos que com nosso desenho de modelo não encontramos os mesmos resultados de Duryea et al. (2007). / There is a vast literature demonstrating the determinants that negatively affect the human capital accumulation of child under eighteen. Child labor would be one of these causes. Other studies show that an income shock suffered by families may be behind the labor supply of other family members (spouse and children). This effect is known in the literature as additional worker effect and may be related, at least in Brazil, the liquidity constraint of households. The objective of this study is to investigate the impact of an income shock represented by the loss of employment of head of household on the time allocation of schoolage children between school and the labor market. To accomplish this work we use data from the Monthly Employment Survey, IBGE, between 2003 and 2012. According to the results, treatment, or better, the income shock represented by of the household head\'s job loss has no significant impact on the families\' choice to keeping the child in school or just send the child to the market job. However, in cases where the treatment effect is persistent, we noticed a substantially greater impact, although not statistically different from zero. In the last subsection we applied our model using the old PME data base aiming to check if the methodological differences interfere with the results. We noted that using our new model design, we didn\'t find out the same results as Duryea et al. (2007).
94

Snabb och säker roaming i WLAN / Fast and Secure Roaming in WLAN

Falk, Magnus January 2004 (has links)
This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE. Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i. The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity. This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.
95

Implementering av 802.1x i trådbundna datanätverk / Implementation of 802.1x in wired computer networks

Forsman, Gustaf, Hult, Daniel January 2008 (has links)
I dagsläget ligger oftast fokus för datasäkerhet hos de flesta företag och organisationer på att skydda gränsen mellan det egna interna datanätverket och det yttre publika. Detta kan leda till att skyddet på insidan försummas och öppna upp möjligheter för olika typer av obehörig användning. Företag X har ett stort datanätverk med behov av skydd på insidan. Detta beror på att fysisk tillgång till nätverket är svår att begränsa på grund av att det till största del är placerat i öppna miljöer. Detta examensarbete behandlar en implementation av standarden 802.1x hos detta företag. 802.1x gör det möjligt att begränsa användandet av datanätverket baserat på vilka premisser ändutrustningen verifierar sig med. Åtkomst till nätverket sätts redan på den fysiska porten i nätverket där utrustningen kopplas in. Kraven och önskemålen från företaget har varit att ta fram och genomföra test av en lösning som innehåller verifieringsmetoder för olika typer av ändutrustning. Kraven har inkluderat metoder för att verifiera ordinarie användare, besökare och övrig utrustning. Dessutom fanns krav på att lösningen inte skulle påverka nuvarande produktionssystem nämnvärt samt vara redundant för att garantera kontinuerlig tillgänglighet. För att ta fram denna lösning utfördes laborationer i en miljö som motsvarar företagets produktionsmiljö. Lösningen som togs fram bygger i månt och mycket på befintliga komponenter i företagets datasystem. En radiusserver tar emot inloggningsförfrågningar från ändutrustning och verifierar mot katalogtjänsten. För att passa in i nuvarande system har FreeRADIUS använts för detta ändamål då funktionalitet finns för samarbete gentemot företagets befintliga katalogtjänst som är Novell eDirectory. Olika sorters användare och ändutrustning får sedan tillgång till rätt resurser dynamiskt beroende på deras förutbestämda rättigheter. / In today’s computer networks, the companies and organisations concerns of security mostly are about protecting the border between the internal and external networks. This can lead to neglecting the inside protection which creates opportunities for unauthorized usage of the companies resources. The company that this thesis discusses have a large computer network with protection needed on the inside as physical access to the network is hard to limit due to open environments. This thesis focuses on an implementation of the 802.1x standard at the above mentioned company. 802.1x make it possible to limit usage of the computer network based on the credentials delivered from the connected devices. The devices get validated on the physical port that they connect to the network through. The company requested a solution which included methods for authentication of different kinds of users and equipment. This could be regular users, visitors and other devices. Part from that there were demands of a minimal influence on the existing environment and redundancy to guarantee highest possible availability. To reach the solution, a test setup was implemented in an environment corresponding to the company’s production system. The final solution was mainly built on components already existing at company’s site. Authentication requests made by users or devices are passed to a radius server which in turn asks the directory service for authentication validation. FreeRADIUS have been the solution of choice for this as it fits the requirements to cooperate with the company’s already existing Novell eDirectory. The end users and devices then dynamically get access to appropriate resources based on their assigned rights.
96

Cause of relapse post treatment for substance dependency within the South African Police Services

Chetty, Mahendhree 29 October 2012 (has links)
The aim of this research was to explore the causes of relapse post treatment for substance dependency within the South African Police Services (SAPS). “Alcoholism is a chronic relapsing brain disease, so individuals with substance abuse disorders face the possibility of relapse once they stop using alcohol even if they have had a successful treatment” (Perkinson, 2004:180). According to Connors, Maisto and Donovan (1996:5) research revealed that relapse rates among persons treated for alcoholism were approximately 35% and 58% at two weeks and three months after treatment, respectively. A relapse or uncontrolled return to alcohol or other drug use following competent treatment, is one of the greatest problems substance abusers and their counselors face (Lewis, Dana&Blevins, 2002:105; Johnson, 2003:271). The objective of the study was to explore the challenges that members in the South African Police Services (SAPS) experience or are exposed to causing them to relapse post treatment for substance dependency. The findings are intended to provide recommendations to the management of SAPS to develop a relapse prevention programme in the workplace to prevent relapse post treatment. The researcher utilized a quantitative research approach to identify the causes of relapse among SAPS members post rehabilitation for substance dependency. The type of research is applied research as the focus of the study is on identifying the causes for members within the SAPS to relapse post treatment for substance dependency and to address a specific practical issue in the workplace. The literature review focused on understanding the relapse process. The cognitive-behavioural Model of relapse was discussed at length including the prevalence of substance abuse among police members and concluded with information on the relapse prevention programme. A self-administered questionnaire was used as a research tool to collect data from the respondents (See annexure C). The population of this study was the members of the SAPS who had undergone treatment for substance dependency from January 2008 to April 2009. The researcher concentrated on those members in the KZN Province. Consultation with the social workers revealed a population size of 50 members. Due to the small size of the population, no sampling procedure was necessary as the whole population was selected as the sample. The findings of the study were based on 44 questionnaires that were returned by the respondents. The findings were analyzed and presented using tables and graphs which were then interpreted in words. The study revealed that the majority of the respondents attributed their main cause for relapse due to Intrapersonal determinants - they experienced a negative emotional state (for example, feelings of anger, frustration and anxiety) that initially triggered their need to taking that first drink. Secondly respondents identified exposure to peer pressure and boredom as also being a cause for their relapse. They disclosed that at times their peers would pressurize them to consume alcohol. The temptation, urges and cravings and being in the presence of other people consuming alcohol proved too difficult to resist. Alcohol being the recreational drug of choice proved to be tempting to members especially when socialising with colleagues. Based on the findings of the study conclusions and recommendations were made to the development of the relapse prevention programme to assist members post treatment to maintain their sobriety. Copyright / Dissertation (MA)--University of Pretoria, 2012. / Social Work and Criminology / unrestricted
97

Kyperská cesta z finanční krize - změna přístupu k bankovní pomoci? / Cyprus banking crisis - changing approach to bank aid?

Černík, Jaroslav January 2014 (has links)
The thesis focuses on Cyprus financial crisis which began in 2012 and on reform tools used by Cyprus government under the Economic Adjustment Programme in order to fix consequential fiscal and monetary imbalances in the economy. Thesis provides description of main factors leading Cyprus in the crisis and broadly analyses reform tools under the EAP. Thesis positively valuates government success in implementing EAP reform tools and describes way the program was financed. Macroeconomic indicators such as GDP, inflation, unemployment and external balance are analyzed and strong influence of reform measures mainly on development of unemployment and external balance is highlighted. Cyprus banking crisis is also a first case of using banks bail-in as a tool to fix financial market imbalances. Shortly discussed is role of Cyprus bank crisis in bail-out to bail-in paradigm change and possible influence of bail-in measures on creditors' behavior and stability of financial institutions.
98

The Use of Corpus and Network Analysis in Teaching Engineering EAP Phrases

Maria J Pritchett (8635236) 16 April 2020 (has links)
This dissertation is three interlinked studies that pilot new methods for combining corpus linguistics and semantic network analysis (SNA) to understand and teach academic language. Findings indicate that this approach leads to a deeper understanding of technical writing and offers an exciting new avenue for writing curriculum.<br><br>The first phase is a corpus study of fixed and variable formulaic language (n-grams and p-frames) in academic engineering writing. The results were analyzed functionally, semantically and rhetorically. In contrast to previous n-gram analyses, the p-frame analysis found that variable phrases are often participant-oriented and communicate author stance. <br><br>The second phase combined corpus and network analysis tools to create educational materials. Several elements of successful design were highlighted. The final phase tested the materials in two classes with fifteen graduate students, finding evidence for the value of this novel approach.<br>
99

Writing from Sources and Learners of English for Academic Purposes: Insights from the Perspectives of the Applied Linguistics Researcher, the Program Coordinator, and the Classroom Teacher

McCollum, Robb Mark 05 August 2011 (has links) (PDF)
This dissertation investigates the challenges faced by learners of English for academic purposes (EAP) when required to complete writing assignments that use source texts. In order to address this problem, I explore the issue from the perspectives of applied linguistic researchers, writing program administrators, and classroom composition instructors. These three perspectives are highlighted in distinct articles that build on one another to create a more complete understanding of the challenges that EAP students face when writing from sources. The first article contains a literature review of relevant studies that explore the reading-to-write construct. Experts suggest that unintentional plagiarism, or patchwriting, can be attributed to a lack of cultural and linguistic competence. In order to address these limitations, researchers identify several reading and writing subskills that are integral to success in academic source writing. The literature review concludes with recommendations for teaching and testing contexts. The second article details a rater training evaluation study that resulted in unexpected, but welcomed, recommendations. Teacher-raters provided feedback that influenced how the institution made use of benchmark portfolios to train teacher-raters as well as inform students about writing achievement standards. The increased use of benchmark portfolios also helped to clarify classroom and program standards regarding citation, attribution, and anti-plagiarism policies. The final article is a practical guide for classroom composition instructors. I outline a recommended curriculum for teaching source writing to EAP students. The guide incorporates the findings of the literature review and the evaluation study into a collaborative and iterative pedagogical model. This recursive approach to EAP writing instruction helps students to diagnose and develop the advanced literacy subskills required for successful source integration into their writing. As a set, the three articles demonstrate that effective solutions to instructional issues can be developed when a problem is approached from multiple perspectives. Indeed, linguistics-based research, program administration, and teacher experience can be combined to produce a model for writing instruction that acknowledges principles of second-language advanced literacy and accounts for learner struggles as students develop source writing skills.
100

Authentification dans les réseaux maillés sans fils avec la cryptographie basée sur l'identité

Boudguiga, Aymen 10 September 2012 (has links) (PDF)
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou aux secrets partagés. Dans les environnements sans fils, la gestion des certificats est désavantageuse. En effet, les certificats nécessitent le déploiement d'une infrastructure à clés publiques (ICP) et la définition d'une autorité de certification (AC). La AC définit toute une politique qui permet de contrôler la génération, la transmission et la révocation des certificats. Cette politique ne prend pas en considération les limites en termes de puissance et de mémoire que peuvent avoir les stations des clients dans un réseau maillé. Afin de ne pas utiliser les certificats et ne pas déployer une ICP, nous avons étudié dans cette thèse les utilisations possibles de la cryptographie basée sur l'identité (CBI) pour la définition de nouveaux schémas d'authentification pour les réseaux maillés sans fils. La CBI propose de dériver, directement, la clé publique d'une station à partir de son identité. Par conséquent, nous n'avons plus besoin de passer par des certificats pour associer l'identité de la station à sa paire de clés (publique et privée). Par contre, la CBI définit un générateur de clé privée (GCP) qui gère le calcul des clés privées des différentes stations sur le réseau. Par conséquent, ce GCP est capable de réaliser une attaque d'usurpation d'identité (escroc de clés) à l'encontre de toutes les stations légitimes. Pour diminuer le risque de cette attaque, les chercheurs ont tendance à supposer que le GCP est digne de confiance. Dans cette thèse, nous présentons tout d'abord un protocole d'authentification basée sur l'utilisation conjointe d'un mot de passe et de la CBI. En effet, nous proposons d'utiliser le serveur d'authentification de notre réseau maillé comme GCP. Ensuite, nous étudions une liste de mécanismes qui permettent de contrer l'attaque de l'escroc qui caractérise le GCP.

Page generated in 0.0207 seconds