• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 126
  • 30
  • 16
  • 15
  • 7
  • 7
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 262
  • 79
  • 78
  • 44
  • 30
  • 28
  • 27
  • 25
  • 21
  • 20
  • 19
  • 18
  • 16
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

The Laie Hawaii Temple: A History from Its Conception to Completion

Dowse, Richard J. 12 July 2012 (has links)
The Laie Hawaii Temple majestically overlooks the beaches of Oahu and has stood as an emblem of the Latter-day Saint faith to the world since 1919. Although the structure is iconic and highly significant to Latter-day Saints, a comprehensive history of the Laie Hawaii Temple has never been published. This thesis provides such a history from the conception of the temple until its dedication. The history of this particular temple is important for several reasons. At its dedication, the temple in Laie became the fifth operating temple of The Church of Jesus Christ of Latter-day Saints. It was the first dedicated temple outside of the state of Utah (following the exodus) and outside of North America. It was also the first temple built in one of the missions of the Church. It was a pioneering temple as one of the first that catered to a large number of patrons from different cultures speaking different languages. Its multi-cultural, multi-lingual integration is something that would not be seen in other temples for several decades. Over the years, the temple and the attractions built around it have drawn millions of other visitors as well. Its location has made it an internationally recognized edifice and a valuable tool for the Church to introduce its message to the world. This history is also compelling because of what the temple in Laie, Hawaii represents in terms of the Latter-day Saint conception of the doctrine of the "gathering." As the first temple built outside of the traditional centers of Mormon colonization, this temple became an early prototype of a method of gathering that does not appear to begin taking hold Church-wide until the mid-twentieth century. Ahead of its time in other ways, the temple was built in a place where, according to the thinking of the time, Church membership was not yet sizable enough to warrant a temple. This thesis explains why the temple was built in Hawaii. These aspects of the temple's history produced ramifications that continue to impact the Church today, nearly 100 years later. As with many temples, a folk history of oral tradition has developed around the story of the Laie Hawaii Temple. This thesis will also provide a review of the historical record and offer clarity in sorting through that tradition.
252

Visualisering av svarstider mellan mobila klienter och datacenter / Visualisation of Latencies Between Mobile Clients and Datacenters

Sidenvall, Adrian, Truong, Andy, Boman, Erik, Szreder, Mikael, Lind, Oskar, Eriksson, Simon, Petersson, Simon January 2015 (has links)
Rapporten är en sammanställning av gruppens samlade erfarenheter och lärdomar av ett projekt vars syfte var att utveckla ett verktyg som ska visualisera svarstider mellan mobila klienter och datacenter. Genom att använda kontinuerlig prototypning har gruppen kunnat arbeta på ett användarna sätt för att uppfylla kundens verkliga behov. För att uppnå detta användes utvecklingsmetodiken Kanban. Under projektets gång anpassades metodiken för att bättra passa in i arbetet. Projektets användartester har lett till sammanfattande erfarenheter om visualisering av data. Visualiseringar som projektgruppen ansetts tydliga uppfattades inte alltid på samma sätt av användarna. Att visualisera flera parametrar på en världskarta anses vara problematiskt då kartan i sig endast består av länder. För visualisering av flera parametrar måste då även externa användas, exempelvis cirklar eller andra former.
253

Renegotiating identity : re-authoring narratives post infidelity and divorce

Day, Penelope Joy 30 November 2007 (has links)
This qualitatively oriented Practical Theology research journey, informed by postmodernism and social constructionism, was based on a narrative enquiry into the healing and renegotiation of identity of five "faithful spouses" post infidelity and divorce. These conversations occurred within a small group context, where narratives were spoken and witnessed (pastoral therapeutic gatherings), and were aimed at enabling the participants to remember and re-author preferred identities and new ways of being. This dissertation attempts to bring together the narratives of the participants, the literature, narrative therapy and pastoral care. My research curiosity was prompted by my mother's experience of divorce, and by the myriad number of conversations I have had with both "infidels" and "faithful spouses" in my pastoral practice. This research journey examines the process of co-creating, along with my fellow travellers (research participants), a viable model of divorce recovery in the face of infidelity and divorce. / Philosophy, Practical and Systematic Theology / M.Th. (Pastoral Theology)
254

The effect of the 1996 Constitution on section 5 of the Regulation of Gatherings Act 205 of 1993

Van der Walt, Johannes Albertus 11 1900 (has links)
The Regulation of Gatherings Act 205 of 1993 is a old order piece of legislation, but gives full recognition to the right to freedom of assembly and expression. These rights are entrenched in sections 16 and 17 of the Bill of Rights and enjoy a generous interpretation. Section 5 of the Act creates limitations on these rights, as the responsible officer of a local authority is allowed to prohibit a gathering when he has reasonable grounds to believe that the police will not be able to prevent traffic disruption, injury or substantial damage to property. Given the fact that this limitation serves to protect a compelling state interest, it constitutes a reasonable and justifiable limitation in terms of section section 36 of the Bill of Rights. / Law / LL.M.
255

Naissance de la diplomatie moderne. L'ambassadeur au croisement du droit, de l'éthique et de la politique / The Birth of Modern Diplomacy. the Ambassador between Law, Ethics and Politics

Fedele, Dante 05 December 2014 (has links)
S’appuyant sur un corpus de textes que l’on qualifie normalement de « traités sur l’ambassadeur », cette thèse s’attache à reconstruire la naissance de la diplomatie moderne tout au long d’une période qui va du XIIIe au XVIIe siècle, en essayant d’analyser la manière dont la figure de l’ambassadeur à été élaborée à l’intérieur d’un champ de problématisation qui se caractérise par une imbrication réciproque du droit, de l’éthique et de la politique et va constituer une véritable expérience de la diplomatie.Ce travail s’articule en deux parties. Dans la première il s’agit de comprendre comment la figure de l’ambassadeur a été façonnée sous le profil de son statut juridique, à savoir comme une persona publica chargée d’un officium et devant représenter son mandant, avec les conséquences qui en découlent quant à l’établissement de son pouvoir de négociation, à la définition de ses immunités ainsi qu’à la détermination des honneurs qu’il a le droit de recevoir. L’analyse de ces questions permettra d’apprécier la contribution apportée par notre corpus non seulement à la définition du statut juridique de l’ambassadeur, mais aussi à la formation du nouveau droit des gens destiné à régir l’Europe moderne. La seconde partie s’attache à comprendre comment la figure de l’ambassadeur a été façonnée sous le profil de son statut professionnel : on s’interroge alors sur les fonctions qui lui sont attribuées, sur les moyens qui lui sont fournis et les conditions qui lui sont demandées pour s’en acquitter de la manière la plus efficace, ainsi que sur la problématisation éthique à laquelle son action est soumise. Tout en essayant de faire ressortir la spécificité de l’ambassadeur, cette partie se propose aussi de contribuer à l’étude de la professionnalisation du fonctionnaire public. / Using a collection of texts commonly known as the “treatises on the ambassador”, this research examines the birth and the development of the experience of diplomacy from the 13th to the 17th Century. It aims, in particular, to explore the development of the figure of the ambassador within a field of problematization involving ethics, politics and law.After some methodological and historical remarks, the thesis deals with the development of the status of the ambassador from two perspectives, the legal and the professional. Regarding his legal status, the medieval legal conceptualisation of the role of the ambassador as a genuine public “office”, and that of the diplomatic function as “representation”, are examined. The way in which these conceptualisations help to define the negotiating powers conferred on the ambassador, his immunities and the honours to which he is entitled is then considered. This analysis allows for an investigation of the complex links between the exercise of diplomacy and claims to sovereignty during Europe’s transition from the Middle Ages to Modernity. Regarding his professional status, the thesis reconstructs the functions of the ambassador (particularly in relation to information gathering and negotiation), the means provided for the ambassador to undertake his functions (his salary and the assignment of an escort) and the objective, intellectual or moral qualities required of him. As well as illustrating the techniques which have been required for ambassadorial success since the 15th Century, this analysis offers some hints for studying the professionalization of public officials and the emergence of the modern criteria of political analysis.
256

Mezinárodněprávní aspekty získávání informací zpravodajskými službami / International legal aspects of obtaining information by intelligence service

Hanžl, Pavel January 2015 (has links)
This diploma thesis deals with intelligence gathering and its international law aspects. The main research question of this diploma thesis is as follows: is the intelligence gathering legal from the point of view of international law? In light of recent scandals and accusations of secret services of illegal espionage, it is very important to find an answer to this question. There are almost no relevant Czech academic sources about this issue and foreign sources are rather contradictory. Included in the main research question are number of additional issues, such as: are there differences in legality between intelligence gathering during peacetime or wartime? What are the international law sources regarding espionage? Is the work of secret services affected by international law? Is international law relevant to espionage? As part of the introduction the diploma thesis outlines various intelligence gathering methods and defines relevant terms. The diploma thesis also addresses the issue of compatibility of espionage with the international law principle of non-intervention and state sovereignty. Next, three current approaches to the question of legality of espionage are presented to the reader and one new approach is introduced. Furthermore, the international implications of the unlawful behavior of...
257

Une approche interdisciplinaire de la pertinence et de la faisabilité d'une co-gestion de la pêche récréative sur l'île d'Oléron : l'étrille, Necora puber (Linnaeus, 1767), comme modèle biologique / An interdisciplinary approach to assess the relevancy and feasibility of recreational fishing co-management on Oléron island : a target species, the velvet swimming crab (Necora puber, Linnaeus, 1767)

Coz, Richard 17 September 2013 (has links)
Parmi les nombreuses activités exercées sur les systèmes socio-écologiques littoraux, la pêche récréative a connu un essor important devenant ainsi un enjeu de développement durable. En France, les défauts de gouvernance de l'État dans la gestion du DPM invitent à s'interroger sur la pertinence et la faisabilité d'une co-gestion de ces pratiques de loisir. Ce paradigme, se voulant une alternative à une gestion top-down, prône la participation accrue des populations locales dans la gestion de l'environnement pour améliorer ses résultats. L'île d'Oléron ne déroge pas à ces constats qui sont renforcés par les modifications sociétales spécifiques aux territoires insulaires. Dans le cadre de recherches dont l'objet d'étude est une problématique sociétale, il est approprié de faire appel à une approche interdisciplinaire pour améliorer la pertinence des réponses apportées. Concernant la pêche à pied récréative à l'étrille, les résultats obtenus en biologie et en écologie mettent en évidence des caractéristiques qui semblent indiquer un faible impact potentiel à court comme à long termes de ces perturbations ponctuelles sur les populations locales. D'un point de vue sociétal, la pertinence d'une co-gestion de la pêche récréative est clairement établie par les nombreux conflits d'usages impliquant les pêcheurs récréatifs, le manque de moyens pour gérer la pratique et acquérir des données scientifiques, le manque de concertation, etc. La dynamique de développement du territoire oléronais et les initiatives locales à l'instar des conflits d'usages soutiennent l'idée de l'existence d'une « fenêtre politique » pouvant permettre la mise en place d'une co-gestion de la pratique dans les prochaines années, sous réserve d'une communication suffisante et d'une réelle volonté des acteurs concernés par la gestion de la pratique. / Among several other activities practice on coastal socio-ecological system, recreational fishing ones have significantly increased over the past few years, becoming an issue for sustainable development. In France, the weakness of states governance concerning DPM management, questions the relevancy and feasibility of a co-management policy for these leisure activities. This paradigm, constituting a good substitute for top-down management, recommends an increased participation of local populations for managing environments and improving their outcomes. Oléron Island is thus affected by these observations, which are intensified by societal changes distinguishing island territories. In the current research context, aiming at solving societal problematic, it is relevant to consider an interdisciplinary approach to provide relevant answers. Concerning recreational shellfish gathering targeting the velvet swimming crab, results in biology and ecology highlight some characteristics which should indicate a weak short and long terms potential impact of the disturbances affecting local populations. As regards to societal aspects, the relevancy of co-management is clearly demonstrated by several land-use conflicts, a lack of means to manage the practice and scientific data, the lack of consultation, etc. The territorial dynamic and local initiatives, as well as land-use conflicts, underline the existence of a “political window” which should allow the implementation of a co-management process for recreational fishing in the following years, subject to further efficient communication and a real desire from stakeholders concerned by the management of this practice.
258

Offences rising from the right to gather : a legal comparative study

Steyn, Anna Sophia 02 1900 (has links)
To gather together is a natural human activity shared by all people. The majority of these activities take place without the involvement of the government, and is of no interest to the law. In South Africa, the right to assemble peacefully, to demonstrate, to picket or to present petitions, is protected in the Constitution of the Republic of South Africa, 1996. When people gather, be it peaceful or violent, participants run the risk of being arrested for committing offences. The way the government of the day reacts to gatherings influence the policing, prosecution and adjudication of offences arising from the right to gather. Current legislation and common-law offences utilised to curb disorder in South Africa are measured against international and regional case law and guidelines. Most of these case law and guidelines linked to international and regional instruments are similar in many respects, and can be deemed as universally acceptable. It is proposed that the government revisits the mixture of current offences utilised by the prosecution during dissent, public violence or protest action, and that specific public order offences are created, providing for specific unlawful conduct with corroborating sentences. Police powers must furthermore be clearly defined to strengthen the hand of the police to secure law and order, serve as guarantee for the rights and freedoms of everyone, and to create legal certainty. The government must organise applicable public order offences in a single public order act. Legislation applicable to public order must be accessible and easily understandable since protest may be the only avenue for a member of the public to bring his or her plight under the attention of the government. Existing guidelines from applicable international and regional instruments which guide and monitor executive conduct must be included since these guidelines qualify as public order offences. / Criminal and Procedural Law / LL. D. (Criminal and Procedural Law)
259

Sportovní centrum Brno / Sport Centre Brno

Havlíková, Terezie January 2013 (has links)
The theme of my dissertation is to create the architectural study of a football stadium in Brno behind Lužánky. The proposed stadium is to create facilities for football Brno, athletes and fans. Stadium capacity is 23 thousands audience. Object is an organic shape and is forming two main parts. The first part of the concrete superstructuce and second is a steel structure carrying a transparent facade composed of ETFE foil.
260

Détection dynamique des intrusions dans les systèmes informatiques / Dynamic intrusion detection in computer systems

Pierrot, David 21 September 2018 (has links)
La démocratisation d’Internet, couplée à l’effet de la mondialisation, a pour résultat d’interconnecter les personnes, les états et les entreprises. Le côté déplaisant de cette interconnexion mondiale des systèmes d’information réside dans un phénomène appelé « Cybercriminalité ». Des personnes, des groupes mal intentionnés ont pour objectif de nuire à l’intégrité des systèmes d’information dans un but financier ou pour servir une cause. Les conséquences d’une intrusion peuvent s’avérer problématiques pour l’existence d’une entreprise ou d’une organisation. Les impacts sont synonymes de perte financière, de dégradation de l’image de marque et de manque de sérieux. La détection d’une intrusion n’est pas une finalité en soit, la réduction du delta détection-réaction est devenue prioritaire. Les différentes solutions existantes s’avèrent être relativement lourdes à mettre place aussi bien en matière de compétence que de mise à jour. Les travaux de recherche ont permis d’identifier les méthodes de fouille de données les plus performantes mais l’intégration dans une système d’information reste difficile. La capture et la conversion des données demandent des ressources de calcul importantes et ne permettent pas forcément une détection dans des délais acceptables. Notre contribution permet, à partir d’une quantité de données relativement moindre de détecter les intrusions. Nous utilisons les événements firewall ce qui réduit les besoins en terme de puissance de calcul tout en limitant la connaissance du système d’information par les personnes en charge de la détection des intrusions. Nous proposons une approche prenant en compte les aspects techniques par l’utilisation d’une méthode hybride de fouille de données mais aussi les aspects fonctionnels. L’addition de ces deux aspects est regroupé en quatre phases. La première phase consiste à visualiser et identifier les activités réseau. La deuxième phase concerne la détection des activités anormales en utilisant des méthodes de fouille de données sur la source émettrice de flux mais également sur les actifs visés. Les troisième et quatrième phases utilisent les résultats d’une analyse de risque et d’audit technique de sécurité pour une prioritisation des actions à mener. L’ensemble de ces points donne une vision générale sur l’hygiène du système d’information mais aussi une orientation sur la surveillance et les corrections à apporter. L’approche développée a donné lieu à un prototype nommé D113. Ce prototype, testé sur une plate-forme d’expérimentation sur deux architectures de taille différentes a permis de valider nos orientations et approches. Les résultats obtenus sont positifs mais perfectibles. Des perspectives ont été définies dans ce sens. / The expansion and democratization of the digital world coupled with the effect of the Internet globalization, has allowed individuals, countries, states and companies to interconnect and interact at incidence levels never previously imagined. Cybercrime, in turn, is unfortunately one the negative aspects of this rapid global interconnection expansion. We often find malicious individuals and/or groups aiming to undermine the integrity of Information Systems for either financial gain or to serve a cause. The consequences of an intrusion can be problematic for the existence of a company or an organization. The impacts are synonymous with financial loss, brand image degradation and lack of seriousness. The detection of an intrusion is not an end in itself, the reduction of the delta detection-reaction has become a priority. The different existing solutions prove to be cumbersome to set up. Research has identified more efficient data mining methods, but integration into an information system remains difficult. Capturing and converting protected resource data does not allow detection within acceptable time frames. Our contribution helps to detect intrusions. Protect us against Firewall events which reduces the need for computing power while limiting the knowledge of the information system by intrusion detectors. We propose an approach taking into account the technical aspects by the use of a hybrid method of data mining but also the functional aspects. The addition of these two aspects is grouped into four phases. The first phase is to visualize and identify network activities. The second phase concerns the detection of abnormal activities using data mining methods on the source of the flow but also on the targeted assets. The third and fourth phases use the results of a risk analysis and a safety verification technique to prioritize the actions to be carried out. All these points give a general vision on the hygiene of the information system but also a direction on monitoring and corrections to be made.The approach developed to a prototype named D113. This prototype, tested on a platform of experimentation in two architectures of different size made it possible to validate our orientations and approaches. The results obtained are positive but perfectible. Prospects have been defined in this direction.

Page generated in 0.0716 seconds