• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 20
  • 12
  • 6
  • 6
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 81
  • 27
  • 23
  • 22
  • 16
  • 15
  • 11
  • 11
  • 10
  • 9
  • 7
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Svenska internetoperatörers beslutsprocess kring val av Wi-Fi-Router : En kvalitativ intervjustudie / Swedish internet service providers decision-making process surrounding the choice of Wi-Fi-Routers : A qualitative interview study

Lindeberg, Adrian, Laihinen, Patrick January 2023 (has links)
This study investigates how Swedish internet service providers (ISP) choose a Wi-Fi-Router for use by private customers. The study investigates the process of choosing a Wi-Fi-Router and what features the companies prioritize during the process. These features can be aspects such as security, speed, capacity, Wi-Fi standard and price. The study seeks to answer how the decision-making process is carried out in the companies, but also how the Wi-Fi-Routers features are prioritized during the decision-making process.  This was investigated using qualitative methods in the form of semi-structured interviews. The interviews were held remotely, which allowed for a larger spread of respondents. After the interviews, the data was coded using thematic analysis to arrive at the results of the study.  The study identified several different phases during the decision-making process that ISP’s go through. After identifying the phases, they were placed in a model which seeks to describe the decision-making process for all ISPs.  The most important aspect during the decision-making process was the price. The remaining aspects were decided by the Wi-Fi-Router's price and compromises had to be made to lower the price to a reasonable level for both the company and the customer. In addition to the price, the companies aimed to find a balance between the other features, where compromises can be made for features they consider to be less important.
42

Inference for the intrinsic separation among distributions which may differ in location and scale

Ling, Yan January 1900 (has links)
Doctor of Philosophy / Department of Statistics / Paul I. Nelson / The null hypothesis of equal distributions, H0 : F1[equals]F2[equals]...[equals]FK , is commonly used to compare two or more treatments based on data consisting of independent random samples. Using this approach, evidence of a difference among the treatments may be reported even though from a practical standpoint their effects are indistinguishable, a longstanding problem in hypothesis testing. The concept of effect size is widely used in the social sciences to deal with this issue by computing a unit-free estimate of the magnitude of the departure from H0 in terms of a change in location. I extend this approach by replacing H0 with hypotheses H0* that state that the distributions {Fi} are possibly different in location and or scale, but close, so that rejection provides evidence that at least one treatment has an important practical effect. Assessing statistical significance under H0* is difficult and typically requires inference in the presence of nuisance parameters. I will use frequentist, Bayesian and Fiducial modes of inference to obtain approximate tests and carry out simulation studies of their behavior in terms of size and power. In some cases a bootstrap will be employed. I will focus on tests based on independent random samples arising from K[greater than and equals]3 normal distributions not required to have the same variances to generalize the K[equals]2 sample parameter P(X1>X2) and non-centrality type parameters that arise in testing for the equality of means.
43

Algorithms for the enhancement of dynamic range and colour constancy of digital images & video

Lluis-Gomez, Alexis L. January 2015 (has links)
One of the main objectives in digital imaging is to mimic the capabilities of the human eye, and perhaps, go beyond in certain aspects. However, the human visual system is so versatile, complex, and only partially understood that no up-to-date imaging technology has been able to accurately reproduce the capabilities of the it. The extraordinary capabilities of the human eye have become a crucial shortcoming in digital imaging, since digital photography, video recording, and computer vision applications have continued to demand more realistic and accurate imaging reproduction and analytic capabilities. Over decades, researchers have tried to solve the colour constancy problem, as well as extending the dynamic range of digital imaging devices by proposing a number of algorithms and instrumentation approaches. Nevertheless, no unique solution has been identified; this is partially due to the wide range of computer vision applications that require colour constancy and high dynamic range imaging, and the complexity of the human visual system to achieve effective colour constancy and dynamic range capabilities. The aim of the research presented in this thesis is to enhance the overall image quality within an image signal processor of digital cameras by achieving colour constancy and extending dynamic range capabilities. This is achieved by developing a set of advanced image-processing algorithms that are robust to a number of practical challenges and feasible to be implemented within an image signal processor used in consumer electronics imaging devises. The experiments conducted in this research show that the proposed algorithms supersede state-of-the-art methods in the fields of dynamic range and colour constancy. Moreover, this unique set of image processing algorithms show that if they are used within an image signal processor, they enable digital camera devices to mimic the human visual system s dynamic range and colour constancy capabilities; the ultimate goal of any state-of-the-art technique, or commercial imaging device.
44

Reliability and Load Handling Problem in Internet Service Provider’s Network

Abrar, Mirza Kashif, Pervaiz, Imran January 2009 (has links)
<p>This thesis puts forward a new solution to provide the reliable network to the Internet Service Provider (ISP). This study mainly focuses on the ISPs network to provide reliability and the load balancing. It offers a guide line for the best reliable solution to the ISPs, individual organizations or other types of service providers which are engaged in providing reliable communications to their subscribers. These reliable services may be real time communications which include weather forecasts, tracking systems, online Internet protocol TV (IPTV) programs and many other ISPs services which are totally depend on the reliable network.</p><p>With the appearance and expansion of Internet subscribers all over the world, ISPs services are becoming more popular. The rapid increase of connection-demand and highly traffic network is the main reason behind the need to scale reliable network. To offer better solutions, a new theoretical and practical approach should be considered that can cover the reliable network.</p><p>The suggested network structure monitors the links, spreads the network traffic with multiple devices and takes a backup (redundant) link automatically when changes occur in the network topology. In order to support the redundancy, load balancing and reduce the failover time, the hot standby routing protocol (HSRP) is implemented on the suggested network. As we have analyzed that in any network, scalability bringing to raised the network traffic broadcast issue. Broadcast storms can be prevented by setting threshold values of traffic-filters. The threshold level helps to control broadcast traffic in networks.</p><p>With regard to suggested solutions, it is necessary to observe the limitations and advantages of the recommended reliable network structure. Therefore, this research will include the advantages and limitations of the techniques used to offer ISP services such as scalability, security and IPv6.</p>
45

Reliability and Load Handling Problem in Internet Service Provider’s Network

Abrar, Mirza Kashif, Pervaiz, Imran January 2009 (has links)
This thesis puts forward a new solution to provide the reliable network to the Internet Service Provider (ISP). This study mainly focuses on the ISPs network to provide reliability and the load balancing. It offers a guide line for the best reliable solution to the ISPs, individual organizations or other types of service providers which are engaged in providing reliable communications to their subscribers. These reliable services may be real time communications which include weather forecasts, tracking systems, online Internet protocol TV (IPTV) programs and many other ISPs services which are totally depend on the reliable network. With the appearance and expansion of Internet subscribers all over the world, ISPs services are becoming more popular. The rapid increase of connection-demand and highly traffic network is the main reason behind the need to scale reliable network. To offer better solutions, a new theoretical and practical approach should be considered that can cover the reliable network. The suggested network structure monitors the links, spreads the network traffic with multiple devices and takes a backup (redundant) link automatically when changes occur in the network topology. In order to support the redundancy, load balancing and reduce the failover time, the hot standby routing protocol (HSRP) is implemented on the suggested network. As we have analyzed that in any network, scalability bringing to raised the network traffic broadcast issue. Broadcast storms can be prevented by setting threshold values of traffic-filters. The threshold level helps to control broadcast traffic in networks. With regard to suggested solutions, it is necessary to observe the limitations and advantages of the recommended reliable network structure. Therefore, this research will include the advantages and limitations of the techniques used to offer ISP services such as scalability, security and IPv6.
46

Säkerställande av upphovsrättigheter : Kan en Internetleverantör åläggas att blockera sina kunders tillgång till tjänster/webbsidor som används för att begå upphovsrättsintrång? / Enforcement of copyrights : Can an ISP be imposed to block its customers’ access to services/websites that are used to commit copyright infringement?

Sanderson, Ellinor January 2012 (has links)
Informationsplattformen Internet har blivit som en självklarhet för många. Dock har den tekniska utvecklingen medfört omfattande upphovsrättsintrång på Internet och utmaningen att komma till rätta med problemet utgör främst fall där Internetleverantörer eller så kallade mellanhänder av teknikens hjälp endast tillhandahåller uppkoppling till nätet. Med anledning av att Internetleverantörers tjänster utnyttjas av kunder för att begå intrång kan det diskuteras huruvida det är möjligt och eftersträvbart att ålägga dessa leverantörer en blockeringsskyldighet för att begränsa åtkomsten av Internet. Vitesförbudsbestämmelsen 53 b § i upphovsrättslagen och även annan reglering ger begränsat utrymme för att meddela förelägganden mot mellanhänder i den utsträckning som torde vara önskvärd utifrån den olagliga verksamhet som förekommer på Internet. Med stöd av 53 b § har Internetleverantörer förbjudits att tillhandahålla uppkoppling till tjänster som används på ett sätt som innebär upphovsrättsintrång. Domstolen är uppenbart medveten om att ”förbjuda uppkoppling” respektive ”blockera” endast innebär en hårfin skillnad. Även i den situation när tjänsten kommer ifrån ett land utanför EU och torde vara laglig i det landet verkar heller inte påverka svaret på frågan. Det kan anses att EU-rätten talar för en mer generös tolkning med hänsyn till exempelvis ett nyligen avgjort mål från Storbritannien. Dock framgår det av EU-rättspraxis att nationell domstol inte tillåts att i förebyggande syfte och utan utredning om intrång framtvinga blockering eller införande av filtreringssystem. En annan frågeställning som aktualiseras är om en möjlig censur av Internet kan anses förenlig med censurförbudet i grundlagarna och om ett åläggande kan anses förenligt med förbudet för medlemstaterna att ålägga en allmän övervakningsskyldighet för tjänsteleverantörer. / Internet as a platform for information has become as obvious to many. However, technological developments have resulted in widespread copyright infringement on the Internet and the challenge to deal with the problem are mostly cases where Internet service providers (ISPs) or known as intermediaries by using technology only provides connectivity to the Internet. As a result of those ISPs whose services are utilized by customers to infringe, it may be arguable whether it is possible and pursued to impose these suppliers a blockage obligation to limit access of the Internet. The rule of injunction § 53 b of the copyright law and other regulations provide limited scope for injunctions against intermediaries to the extent as would be desirable from the illegal activities on the Internet. According to § 53 b, the ISPs are banned from providing access to services that are used in a way that constitutes copyright infringement. The Court is obviously aware of the subtle difference between “prohibit access” and “block”. Even in the situation when the service comes from a country outside the EU and could probably be legal there does not seem to affect the response to the question. It may be considered that EU law could points out a more generous interpretation regarding, for example, a recently determined case from the UK. However, it appears from the EU law that national courts are not allowed to force blocking or introduction of filtering system only in order to prevent a future infringe and without investigation of such an infringe. Another question that arises is whether a possible censorship of the Internet can be considered as consistent with the censorship ban in the constitutions and whether an injunction may be considered compatible with the prohibition for Member States to impose a general monitoring obligation on service providers.
47

A Study of Variable Thrust, Variable Specific Impulse Trajectories for Solar System Exploration

Sakai, Tadashi 07 December 2004 (has links)
A study has been performed to determine the advantages and disadvantages of variable thrust and variable specific impulse (Isp) trajectories for solar system exploration. There have been several numerical research efforts for variable thrust, variable Isp, power-limited trajectory optimization problems. All of these results conclude that variable thrust, variable Isp (variable specific impulse, or VSI) engines are superior to constant thrust, constant Isp (constant specific impulse, or CSI) engines. However, most of these research efforts assume a mission from Earth to Mars, and some of them further assume that these planets are circular and coplanar. Hence they still lack the generality. This research has been conducted to answer the following questions: - Is a VSI engine always better than a CSI engine or a high thrust engine for any mission to any planet with any time of flight considering lower propellant mass as the sole criterion? - If a planetary swing-by is used for a VSI trajectory, is the fuel savings of a VSI swing-by trajectory better than that of a CSI swing-by or high thrust swing-by trajectory? To support this research, an unique, new computer-based interplanetary trajectory calculation program has been created. This program utilizes a calculus of variations algorithm to perform overall optimization of thrust, Isp, and thrust vector direction along a trajectory that minimizes fuel consumption for interplanetary travel. It is assumed that the propulsion system is power-limited, and thus the compromise between thrust and Isp is a variable to be optimized along the flight path. This program is capable of optimizing not only variable thrust trajectories but also constant thrust trajectories in 3-D space using a planetary ephemeris database. It is also capable of conducting planetary swing-bys. Using this program, various Earth-originating trajectories have been investigated and the optimized results have been compared to traditional CSI and high thrust trajectory solutions. Results show that VSI rocket engines reduce fuel requirements for any mission compared to CSI rocket engines. Fuel can be saved by applying swing-by maneuvers for VSI engines, but the effects of swing-bys due to VSI engines are smaller than that of CSI or high thrust engines.
48

Vybrané aspekty ochrany osobnosti se zaměřením na nová média / Selected aspects of protection of personality focused on new media

Holubová, Tereza January 2018 (has links)
This diploma thesis deals with selected aspects of personality rights protection with focus on new media. It provides analysis of national and EU regulation and presents Czech and European case law on the topic. Deficiencies in laws governing this area and in practices used for protection of personality rights are highlighted as well. The first chapter focuses on the internet law, related phenomena and on the definition of the concept of new media. The following chapter introduces the notion of personality protection as embodied in the constitutional and civil law. Attention is focused on the human rights and on the different personality rights, such as right to protection of the name and appearance, right to dignity, honour and respect and right to privacy. Fake profiles on social media and automatic face recognition techniques are mentioned in this context. Chapter three provides a brief introduction to the data protection and targeted advertising. The following section deals with limitations of personality rights, particularly with conflicts between human rights, with legal licenses, permissions and with typical unlawful interference with personality rights, which can be encountered on the internet. The issue of defamation, hate speech and street view services is discussed in detail....
49

Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks

Bauer, Stefan, Bernroider, Edward, Chudzikowski, Katharina 17 April 2017 (has links) (PDF)
In organizations, users' compliance with information security policies (ISP) is crucial for minimizing information security (IS) incidents. To improve users' compliance, IS managers have implemented IS awareness (ISA) programs, which are systematically planned interventions to continuously transport security information to a target audience. The underlying research analyzes IS managers' efforts to design effective ISA programs by comparing current design recommendations suggested by scientific literature with actual design practices of ISA programs in three banks. Moreover, this study addresses how users perceive ISA programs and related implications for compliant IS behavior. Empirically, we utilize a multiple case design to investigate three banks from Central and Eastern Europe. In total, 33 semi-structured interviews with IS managers and users were conducted and internal materials of ISA programs such as intranet messages and posters were also considered. The paper contributes to IS compliance research by offering a comparative and holistic view on ISA program design practices. Moreover, we identified influences on users' perceptions centering on IS risks, responsibilities, ISP importance and knowledge, and neutralization behaviors. Finally, the study raises propositions regarding the relationship of ISA program designs and factors, which are likely to influence users' ISP compliance.
50

Bezpečnost bezdrátové sítě poskytovatele internetových služeb / Wireless Network Security of Internet Service Provider

Parolek, Pavel January 2013 (has links)
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.

Page generated in 0.0228 seconds