• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 41
  • 22
  • 22
  • 20
  • 8
  • 3
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 142
  • 30
  • 28
  • 27
  • 22
  • 19
  • 18
  • 11
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Olika perspektiv på informationssäkerhet : En fallstudie på ett universitet

Wallin, Emma, Andersson, Ellinor January 2022 (has links)
Utbildningssektorn har sedan en tid tillbaka varit extra utsatt för cyberattacker, dels på grund av dess öppna nätverk och det stora antalet användare, men ofta också på grund av ett bristande informationssäkerhetsarbete (Wood 2014). Syftet med uppsatsen är att undersöka vad ett svenskt universitet och dess anställda har för uppfattning av informationssäkerhet samt om och i så fall hur dessa syner skiljer sig åt. Det med hjälp av teorin Technological frames (Orlikowski & Gash 1994). I studien har sex anställda och enheten för informationssäkerhet på universitetet intervjuats. Författarna har även utfört en deltagande observation vid en internutbildning i informationssäkerhet. Resultaten visar att de två grupperna bland annat har en samsyn om att människan är det största hotet för infektioner och attacker, att information i olika former är viktig att skydda, att den fysiska säkerheten samt lösenord är viktiga, att organisationen måste hitta en lagom nivå av informationssäkerhet och att ansvar för informationssäkerhetsutbildning för anställda främst ligger hos organisationen men att det trots allt också finns ett ansvar hos individen att själv ta reda på information. Det förelåg olika syner på huruvida phishing-mejl skulle raderas direkt eller rapporteras och vilka kommunikationsvägar som bör användas mellan enheten för informationssäkerhet och de anställda. De anställda hade dessutom en snävare syn på vad informationssäkerhet är jämfört med enheten för informationssäkerhet. / The education sector has recently been particularly exposed to cyber attacks, partly due to its open networks and the large number of users, but also due to a lack of information security (Wood 2014). The purpose of the thesis is to investigate what image a Swedish university and its employees have of information security and if these views differ, and in that case how. This study draws on the theory Technological frames (Orlikowski & Gash 1994). In the study, six employees and the information security unit at the university were interviewed. We also per­formed participatory observation during an internal course in information security. The results show that the two groups agree that humans are the biggest threat when it comes to cyber at­tacks, that information in various forms is important to protect, that physical security and pass­words are important, that the organization must find a reasonable level of information security and that the organization should have the primary responsibility for information security train­ing for employees, but that individuals also have a responsibility. There were different views on whether phishing emails should be deleted directly or reported. The views differ when it comes to which communication channels should be used between the unit of information secu­rity and the employees. The employees also had a narrower view of what information security is compared to the unit for information security.
72

KONSTEN ATT BALANSERA SÄKERHET OCH ÖPPENHET : En kvalitativ studie av offentliga organisationers hantering av säkerhetshot / THE ART OF BALANCING SECURITY AND OPENNESS : A qualitative study of public organizations' management of security threats

Johansson, Matthias, Påander, Erik January 2023 (has links)
Offentliga organisationer har flera krafter som trycker och påverkar deras säkerhetspraktik, dessa är både externa men även interna. För att förstå hur den offentliga organisationen hanterar dessa krafter som kräver öppenhet respektive IT-säkerhet har studien använt sig av kvalitativ datainsamling i form av intervjuer med medarbetare med olika roller inom den offentliga sektorn. Studien har inspirerats av induktion som ansats och utvecklat sitt teoretiska ramverk efter det att empirin färdigställts. Teoretiska begrepp som används i analysen är bland annat det politiska systemet, skugg-IT och Information Security Awareness. Empirin består av intervjuer med personer som är anställda hos en offentlig organisation. Utmaningar för IT-säkerhetspraktiken uppstår i form av syn på utbildning och svårigheten att nå ut till personal som följd av den komplexitet som är inneboende i den offentliga organisationen. Studien ger insyn och förslag på hur detta skulle kunna hanteras för att göra arbetet att upprätthålla säkerheten mer effektiv. Arbetet utmynnar i framtagandet av ett ramverk som visualiserar det förlopp som aktualiseras i studien, där knyts sambandet mellan olika krafter och synpunkter som påverkar varandra. / Public organizations face various forces that exert pressure and influence their security practices, both externally and internally. To understand how public organizations manage these forces, which require both transparency and IT security, this study employed qualitative data collection in the form of interviews with employees in different roles within the public sector. The study was inspired by an inductive approach and developed its theoretical framework after the completion of empirical data gathering. The theoretical concepts used in the analysis include the political system, shadow IT, and Information Security Awareness. The empirical data consists of interviews with individuals employed by a public organization. Challenges for IT security practices arise in the form of differing views on education and the difficulty of reaching personnel due to the inherent complexity of the public organization. The study provides insight and suggestions on how to address these challenges in order to make the task of maintaining security more effective. The work culminates in the development of a framework that visualizes the progression highlighted in the study, establishing connections between the various forces and perspectives that influence one another.
73

Design a Three-Stage Pipelined RISC-V Processor Using SystemVerilog

He, Ziyan January 2022 (has links)
RISC-V is growing in popularity as a free and open RISC Instruction Set Architecture (ISA) in academia and research. Also, the openness, simplicity, extensibility, and modularity, among its advantages, make it more and more used by designers in industry. The aim of this thesis is to design an open-source RISC-V processor. The development of this RISC-V processor was based on the prototype which was made in the course IL2232 Embedded Systems Design Project (SoI-CMOS Design group), against an experimental high-temperature SoC CMOS process. SystemVerilog was used for RTL coding. ModelSim was used for RTL simulation. Genus was used for digital synthesis and Innovus was used for digital place & route. The thesis concludes that this RISC-V processor can run the compiled C-code which has been produced by the virtual platform tool Imperas OVP. The instruction set RV32IM is the Instruction Set base for this processor. Through simulation, the CPI of this RISC-V processor can be collected while running different benchmark programs developed in two parallel Master thesis to this one. To a certain extent, it can reflect the performance of the processor. However, the actual execution time needs to be tested by loading the processor to the hardware. This part will not be discussed in this thesis but is left for future work. The gate count is collected by digital synthesis and the corresponding area is collected after digital place & route. / RISC-V växer i popularitet som en gratis och öppen RISC ISA inom akademi och forskning. Öppenheten, enkelheten, utbyggbarheten och modulariteten, bland dess fördelar, gör att den används mer och mer av designers inom industrin. Syftet med denna avhandling är att designa en RISC-V-processor med öppen källkod. Utvecklingen av denna RISC-V-processor baserades på prototypen som gjordes i kursen IL2232 Embedded Systems Design Project (SoI-CMOS Design group). Mot en experimentell högtemperatur, SoC CMOS-process diskuteras. SystemVerilog användes för RTL-kodning. ModelSim användes för RTL-simulering. Genus användes för digital syntes och Innovus användes för digital plats & rutt. Avhandlingen drar slutsatsen att denna RISC-V-processor kan köra den kompilerade C-koden som har producerats av det virtuella plattformsverktyget Imperas OVP. Instruktionsuppsättningen RV32IM är instruktionsuppsättningens bas för denna processor. Genom simulering kan CPI för denna RISC-V-processor samlas in samtidigt som man kör olika benchmarkprogram utvecklade i två parallella masteruppsatser till denna. Till viss del kan det spegla processorns prestanda. Den faktiska exekveringstiden måste dock testas genom att ladda processorn till hårdvaran. Denna del kommer att diskuteras i denna uppsats men lämnas för framtida arbete. Grindräkningen samlas in genom digital syntes och motsvarande yta samlas in efter den digitala platsen & rutten.
74

STUDY ON HIGH-RATE TELEMETRY DATA REAL-TIME PROCESSING TECHNIQUES

Chun, Yang, Hongling, Yang, Jie, Zhou 10 1900 (has links)
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California / Owing to rapid development of PC industry, personal computer has been surprisingly improved on reliability and speed and it has been applied to many fields, such as aerospace, satellite and telemetry applications. As we all known, two aspects decide how fast the PC-based data acquisition can be reached. One aspect is CPU processing and the other is I/O bandwidth. Indeed, the first aspect has changed increasingly insignificant because the frequency of CPU has exceeded 700MHz which can satisfy fully the need of high rate data processing. So I/O bandwidth is the only key factor of the high rate PC-based data acquisition and we must adopt efficient data buffer techniques to satisfy the demand of telemetry data entry. This paper presents a buffered data channel which use memory mapping, EPLD and Dual-Port SRAM techniques. The operation platform of this design is WINDOWS95/98 and the software includes device driver and real-time processing routines.
75

SIMULTANEOUS DATA PROCESSING OF MULTIPLE PCM STREAMS ON A PC BASED SYSTEM

Weisenseel, Chuck, Lane, David 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada / The trend of current data acquisition and recording systems is to capture multiple streams of Pulse Code Modulation (PCM) data on a single media. The MARS II data recording system manufactured by Datatape, the Asynchronous Realtime Multiplexer and Output Reconstructor (ARMOR) systems manufactured by Calculex, Inc., and other systems on the market today are examples of this technology. The quantity of data recorded by these systems can be impressive, and can cause difficulties in post-test data processing in terms of data storage and turn around time to the analyst. This paper describes the system currently in use at the Strategic Systems Combined Test Force B-1B division to simultaneously post-flight process up to twelve independent PCM streams at twice real-time speeds. This system is entirely personal computer (PC) based running the Window NT 4.0 operating system with an internal ISA bus PCM decommutation card. Each PC is capable of receiving and processing one stream at a time. Therefore, the core of the system is twelve PCs each with decommutation capability. All PCs are connected via a fast ethernet network hub. The data processed by this system is IRIG 106 Chapter 8 converted MIL-STD-1553B bus data and Chapter 4 Class I and II PCM data. All system operator inputs are via Distributed Component Object Modeling (DCOM) provided by Microsoft Developers Studio, Versions 5.0 and 6.0, which allows control and status of multiple data processing PCs from one workstation. All data processing software is written in-house using Visual C++ and Visual Basic.
76

Computational treatment of superlatives

Scheible, Silke January 2009 (has links)
The use of gradable adjectives and adverbs represents an important means of expressing comparison in English. The grammatical forms of comparatives and superlatives are used to express explicit orderings between objects with respect to the degree to which they possess some gradable property. While comparatives are commonly used to compare two entities (e.g., “The blue whale is larger than an African elephant”), superlatives such as “The blue whale is the largest mammal” are used to express a comparison between a target entity (here, the blue whale) and its comparison set (the set of mammals), with the target ranked higher or lower on a scale of comparison than members of the comparison set. Superlatives thus highlight the uniqueness of the target with respect to its comparison set. Although superlatives are frequently found in natural language, with the exception of recent work by (Bos and Nissim, 2006) and (Jindal and Liu, 2006b), they have not yet been investigated within a computational framework. And within the framework of theoretical linguistics, studies of superlatives have mainly focused on semantic properties that may only rarely occur in natural language (Szabolsci (1986), Heim (1999)). My PhD research aims to pave the way for a comprehensive computational treatment of superlatives. The initial question I am addressing is that of automatically extracting useful information about the target entity, its comparison set and their relationship from superlative constructions. One of the central claims of the thesis is that no unified computational treatment of superlatives is possible because of their great semantic complexity and the variety of syntactic structures in which they occur. I propose a classification of superlative surface forms, and initially focus on so-called “ISA superlatives”, which make explicit the IS-A relation that holds between target and comparison set. They are suitable for a computational approach because both their target and comparison set are usually explicitly realised in the text. I also aim to show that the findings of this thesis are of potential benefit for NLP applications such as Question Answering, Natural Language Generation, Ontology Learning, and Sentiment Analysis/Opinion Mining. In particular, I investigate the use of the “Superlative Relation Extractor“ implemented in this project in the area of Sentiment Analysis/Opinion Mining, and claim that a superlative analysis of the sort presented in this thesis, when applied to product evaluations and recommendations, can provide just the kind of information that Opinion Mining aims to identify.
77

Särskilt betydelsefulla områdens inverkan på revisionens transparens : En tvärsnittsstudie om utformningen och rapporteringen av ett nytt avsnitt i revisionsberättelsen

Johansson, Carl, Nyström, Carl January 2017 (has links)
Den standardiserade revisionsberättelsen har under en längre tid kritiserats för att inte vara tillräckligt informativ. Detta har resulterat i att IAASB infört en helt ny standard, ISA 701. Införandet av ISA 701 innebär stora förändringar för revisorn som nu tvingas rapportera om Särskilt betydelsefulla områden, SBO. IAASB:s övergripande syfte är att SBO ska öka revisionens transparens gentemot användare av finansiella rapporter. Det finns dock vissa motsättningar inom ramen för revisionsprofessionen vilka riskerar att hindra revisorn från att genom rapporteringen av SBO öka revisionens transparens. Den problematik, bestående av intressekonflikter, revisorn utsätts för i kombination med att det är den första rapporteringsperioden har lett fram till studiens frågeställningar: (1) Hur resonerar praktiserande revisorer gällande sina möjligheter att öka revisionens transparens genom rapporteringen av SBO? (2) Hur väl efterlevs ISA 701 vid revisorns rapportering av SBO bland svenska noterade bolag? För att besvara studiens frågeställningar syftar studien till att undersöka och förklara revisorns inställning gällande utformningen av SBO, samt kartlägga och analysera den första rapporteringen av SBO i svenska noterade bolag och tillsammans öka förståelsen för SBO och dess inverkan på revisionens transparens. Genom en kombinerad forskningsansats med både kvalitativa och kvantitativa inslag har empiri från intervjuer med 6 revisorer som har en central roll vid utformningen kombinerats med en dokumentstudie där innehållet i 75 noterade bolags SBO-avsnitt kartlagts. Studiens resultat visar att revisorn i stor utsträckning upplever det möjligt att öka revisionens transparens även om det ständigt krävs en balansgång mellan transparens och faktorer som tystnadsplikt, vinstsyfte och relationen till klienten. Dokumentstudien visar att efterlevnaden i generella termer är hög. Studien har vidare lyckats identifiera vissa tendenser i rapporteringen. Vid situationer där stöd i form av årsredovisningen finns tenderar revisorn att lämna mer bolagsspecifik och uttömmande information medan revisorn lämnar mer försiktig och neutral information vid situationer där stöd istället saknas. Studien indikerar att revisorn har incitament att säkerställa att informationen i SBO avspeglar den utförda revisionen, i kombination med den höga efterlevnaden av ISA 701 förefaller således revisionens transparens gentemot omgivningen ökat. Trots denna slutsats är ett anmärkningsvärt resultat det faktum att revisorn är skeptisk till värdet av SBO. Trots omfattande förändringar av revisionsberättelsen upplever revisorn att intresset från användarna är fortsatt lågt, vilket kan komma att leda till transparensen och efterlevnaden i framtida rapporteringsperioder minskar.
78

The biodegradation of isosaccharinic acid

Kuippers, Gina January 2017 (has links)
The nuclear waste inventory of the UK comprises large quantities of intermediate level wastes (ILW), which will be immobilised by encapsulation within a cementitious grout in stainless steel containers, followed by disposal in a deep engineered geological disposal facility (GDF) within a suitable geological formation. These wastes contain, in addition to radioactive elements, a heterogeneous mix of organic materials, including plastics, cellulose and rubber. Cellulosic items, such as cloth, tissue, filters, paper and wood, are considered particularly problematic, because they are known to be susceptible to degradation under alkaline conditions, forming small chain organic acids with the ability to complex metals and radionuclides. It is predicted that under alkaline conditions isosaccharinic acid (ISA) will form particularly strong complexes with Ni(II), Am(III), Eu(III), Np(IV), Th(IV), and U(IV). As a result, the presence of ISA could affect the migration behaviour of these elements, by increasing their solubility and reducing sorption, thus enhancing their mobility into the near and far field surrounding a GDF. During site operation and then after closure of a GDF, microbial communities have the potential to colonise the steep biogeochemical gradients, running from highly alkaline in the GDF “near field” to circumneutral pH conditions in the surrounding geosphere. Within these steep pH gradients microbial processes can control the fate of organic compounds, such as ISA, and have therefore been considered as an effective self-attenuating mechanism to remove ISA from the groundwater. This thesis aims to deliver a greater understanding of the microbial processes that can potentially use ISA as a carbon source and electron donor, removing it from solution, and thus having a positive impact on radionuclide mobility under GDF-relevant conditions. A microbial enrichment approach was chosen that approaches GDF-relevant conditions to explore the biodegradation of ISA. Cross-disciplinary analyses of water chemistry (pH, Eh, photospectroscopy, IC, ICP), mineralogy (ESEM, XRD, TEM, XAS) and microbiology (light microscopy, next generation sequencing) have demonstrated the ability of bacteria to degrade ISA over a wide range of biogeochemical conditions. Furthermore, key radionuclides (and their non-active analogues), including Ni(II) and U(VI), were precipitated from the groundwater system during ISA biodegradation. Moreover, in the case of uranium, microbial metabolism led to the reduction of U(VI) to U(IV), which is also less soluble. This study highlights the potential for microbial activity to help remove chelating agents from groundwaters surrounding an ILW GDF, and suggests that safety cases that do not include microbial processes may be overly conservative, over-estimating the impact of ISA on radionuclide transport.
79

Fremde Kinder und ideologische Staatsapparate : Wie Momo, Pippi und das Sams Ideologie entgehen / Alien Children and Ideological State Apparatuses – How Momo, Pippi, and the Sams escape ideology

Bonin, Helena January 2018 (has links)
Ideology, as explained by Louis Althusser, is used by ideological state apparatuses (ISAs) to reinforce the control of the dominant class. ISAs in turn consist of elements of society such as families, schools, and churches. In the works of Michael Ende, Astrid Lindgren, and Paul Maars, Momo, Pippi and the Sams defy the ideologies and norms of their respective societies. This thesis shows that the three children can do this because they are alien children and therefore exist beyond the reach of the ISAs of their respective worlds.
80

Chemical mineralogy of cobalt and gold in the Mt Isa block

Munro-Smith, Vera, University of Western Sydney, Faculty of Science and Technology January 1998 (has links)
Several deposits in the Mt Isa - Cloncurry region have been studied, including those held by Australian Resources near Selwyn (Plume, Slate Ridge, Mobs Lease and Straight Eight),in particular, with respect to cobalt and gold mineralisation. Cobalt is associated with pyrite, pyrrhotite and arsenic sulfosalts. Other cobalt deposits in the Eastern Fold Belt of the Mt Isa Block were studied; these include the Queen Sally, Lorena and the Great Australia mine. Varying styles of Co-bearing mineralisation were encountered. In the Queen Sally mine a curious vanadium - substituted heterogenite has been found. This is only the world's second reported occurrence of this mineral of the halotrichite group. At the Great Australia, primary Co mineralisation has been shown to be confined to one generation of cobaltian pyrite. Several generations of pyrite are noted for this and other deposits. / Master of Science (Hons)

Page generated in 0.4248 seconds