• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1158
  • 852
  • Tagged with
  • 2013
  • 2013
  • 98
  • 41
  • 40
  • 36
  • 34
  • 33
  • 32
  • 32
  • 28
  • 25
  • 24
  • 23
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1331

The Washington chapter of the Black Panther Party : from revolutionary militants to community activists /

Preusser, John January 2007 (has links) (PDF)
Thesis (M.A.)--University of North Carolina at Wilmington, 2006. / Includes bibliographical references (p. 62-66)
1332

Of Gog and Naboth : the Christian response to the Panama Canal Treaties of 1977 /

Hinkson, James Robert. January 2006 (has links)
Thesis (M.A.)--University of North Carolina at Wilmington, 2006. / Includes bibliographical references (p. [89]-95)
1333

The examination of the effects of peer coaching on the practices of pre-service teachers /

Britton, Linda R. January 2006 (has links) (PDF)
Thesis (M.A.)--University of North Carolina at Wilmington, 2006. / Vita. Includes bibliographical references and index.
1334

The highly preorganized ligands 1,10-Phenanthroline-2,9-Dialdoxime and BIS-1, 10-Phenanthroline, and their complexing properties with metal ions /

Boone, Lindsay Leighton. January 2006 (has links) (PDF)
Thesis (M.A.)--University of North Carolina at Wilmington, 2006. / Includes bibliographical references (leaves: 96-97)
1335

Hydrography and bottom boundary layer dynamics : influence on inner shelf sediment mobility, Long Bay, NC /

Davis, Luke A. January 2006 (has links) (PDF)
Thesis (M.S.)--University of North Carolina at Wilmington, 2006. / Vita. Includes bibliographical references (leaves: 60-63)
1336

The effects of proximity to a subtidal channel on habitat utilization of intertidal oyster reefs /

Artabane, Stephen J. January 2006 (has links) (PDF)
Thesis (M.S.)--University of North Carolina at Wilmington, 2006. / Includes bibliographical references (leaves: 65-73)
1337

Mineralization pattern, mineral phases, and selected elemental analysis of the dorsal carapace of postecdysial blue crabs, Callinectes sapidus /

Johnson, Samantha. January 2006 (has links) (PDF)
Thesis (M.S.)--University of North Carolina at Wilmington, 2006. / Includes bibliographical references (leaves: [83]-91)
1338

Where the two kingdoms merge: the struggle for balance between national and religious identity among Mennonites in Wilhelmine Germany

Regier, James 05 1900 (has links)
When the German Reich was created in 1871, it was an artificial construct born of Hohenzollern power projection and not of nationalism. Otto von Bismarck’s Realpolitik used the power of nationalism to unite Germans behind the Kaiser, but also divisively to keep liberals and potential opponents of the Kaiser firmly divided. The Kulturkampf was one such set of policies that attempted to suppress Catholic political authority while dividing Germany’s religious groups against one another. The Kulturkampf was also used against other religious minorities in Germany, including the Mennonites. Though strongly German in their identity, Mennonites did not quite fit in with the rest of the Reich because of their traditional opposition to military service, which was an important rite of citizenship. Although the Kulturkampf enforced the end to their military exemption and effectively put a stop to those objections, it was only one of a series of struggles Mennonites faced during the Kaiserreich to reinvent their religious identity in terms more compatible with their new German identity. Although this study refers to German Mennonites, its primary focus is on the Prussian Mennonites in the Kaiserreich. By German unification in 1871, Prussia covered a significantly greater amount of territory than it had even a decade before, encompassing all of Germany except of the southern states of Bavaria, Baden, and Würtemburg. While this study does not specifically deal with the Mennonites of Baden and Würtemburg, the expanding territories of Prussia seemed to render the referent of "Prussian Mennonite" insufficiently descriptive. / Thesis (M.A.)--Wichita State University, Dept. of History. / "May 2006."
1339

A new alternate routing scheme with endpoint admission control for low call loss probability in VoIP network

Mandal, Sandipan 07 1900 (has links)
Call admission control (CAC) extends the capabilities of Quality of service (QoS) tools which protect voice traffic from the negative effects of other voice traffic. It does not allow oversubscription of a Voice over Internet Protocol (VoIP) network. To achieve better performance for efficient call admission control, various dynamic routings are being proposed. In the dynamic routing mechanism, the condition of the network is learned by observing the network condition via the probe packets and according to the defined threshold, routes are chosen dynamically. In such schemes, various combination of route selection is used such as two routes are used where one is fixed and other is random or two random routes are chosen and after observation one is chosen if it passes the test. Few schemes use a route history table along with the two random routes. But all have some issues like it selects random routes (not considering the number of hops), does not process memorization before admission threshold test, it calculates all selected paths regardless of the fact that they are selected or not, thereby wasting central processing unit (CPU) time and since these uses two routes so obviously the call admission probability is less. In this thesis work, a new dynamic routing scheme is proposed which considers a routing history table with endpoint admission control increasing the call admission probability, makes call establishment time faster and it saves valuable CPU resources. The proposed scheme considers a combination of three routes with routing history table--one is the direct route and the other two are selected randomly from all available routes and the routing history table is used to memorize the rejected calls. CAC tests like Admission Threshold were performed on the selected routes. Various parameters such as delay, packet loss, jitter, latency etc from the probe packets are used to carry out the tests. Performance of the proposed scheme with respect to other dynamic routing schemes is studied using a mathematical / analytical model. Also, effect of arrival rate probe packets on utilization, busy period, waiting period, acceptance probability of calls, probe packets, and the number of successful calls was also studied. / Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering. / "July 2006."
1340

iSCSI performance over RDMA-enabled network

Pallampati, Amarnath 07 1900 (has links)
With an increase in the amount of information being exchanged every day, there is a need for storage repositories and faster networks to retrieve data with a minimum amount of time delay. Keeping this in mind, inroads have been made in developing different types of storage network technologies including Direct Attached Storage (DAS), Network Attached Storage (NAS), and Storage Area Network (SAN). Developments have also been made in building faster and parallel Input/Output (I/O) peripheral interface systems such as the Small Computer System Interface (SCSI). With the help of SCSI high-speed bus systems that quickly transfer large amounts of data requested by the user have been made, which is a very important need in storage are networks. Internet SCSI (iSCSI) protocol is a Small Computer System Interface (SCSI) transport protocol developed by the Internet Engineering Task Force (IETF), which maps block-oriented storage data over Transmission Control Protocol/Internet Protocol (TCP/IP) networks. This iSCSI storage technology is a viable solution utilizing IP networks for low-cost implementation of managing storage networks. Unlike the file access mechanism provided by protocols such as Network File System (NFS), iSCSI implementation has a block access mechanism to provide better performance and throughput. Remote Direct Memory Access (RDMA) technology provided by Internet Wide Area RDMA Protocol (iWARP), which runs over TCP/IP networks provides efficient data transfers. RDMA protocol is primarily chosen because it efficiently uses storage I/O (Input/Output) systems by providing a Zero Copy transfer mechanism. Implementing iSCSI over RDMA-enabled network adapters exploits RDMA operations for efficient data transfers using the existing infrastructure. This thesis involves the implementation and performance evaluation of iSCSI over RDMA, a process that maps iSCSI This study analyzes, the performance of SAN storage devices, demonstrating that iSCSI over RDMA performs better than running only iSCSI. In addition, the low cost and ease with which an iSCSI over RDMA can be managed make it superior to iSCSI, considering the performance gained. The iSCSI target from iSCSI Enterprise Target (IET) installed in a Fedora Core 5 machine with a 2.6.16 kernel was used to evaluate the iSCSI. The Initiator, was built using a Fedora Core 5 source iSCSI Initiator in a Fedora Core 5 machine with a 2.6.16 kernel and Microsoft iSCSI Initiator in a Microsoft server 2003 machine [1] [2]. This research used RNICs developed by Ammasso Corporation, to directly place data into Initiator buffers using Zero Copy transfer. Hence, unnecessary multiple copying procedures are eliminated, there by memory bus utilization and improving performance, which definitely impacts the overall performance of a system when there is large amount of data being transferred as occurs with iSCSI. The iSCSI over RDMA protocol implementation gives high performance and low overhead for I/O storage. / Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering. / "July 2006." / Includes bibliographic references (leaves 43-46)

Page generated in 0.108 seconds