1 |
The NDP and the Third Party Curse in CanadaMavrikkou, Maria January 2009 (has links)
This thesis evaluates the position of the NDP as Canada’s third party in federal electoral politics. It analyzes three external factors, the electoral system, the party finance system and the effects of voter behaviour and low voter turnout on the electoral success of the NDP. This work aims to discover why the NDP is seemingly caught in what this thesis refers to as a third party curse. Each of the three external factors which are susceptible to change are analyzed individually to discover whether they have a negative effect on the electoral success of the party.
|
2 |
The NDP and the Third Party Curse in CanadaMavrikkou, Maria January 2009 (has links)
This thesis evaluates the position of the NDP as Canada’s third party in federal electoral politics. It analyzes three external factors, the electoral system, the party finance system and the effects of voter behaviour and low voter turnout on the electoral success of the NDP. This work aims to discover why the NDP is seemingly caught in what this thesis refers to as a third party curse. Each of the three external factors which are susceptible to change are analyzed individually to discover whether they have a negative effect on the electoral success of the party.
|
3 |
Monitorování IPv6 uzlů / IPv6 Hosts MonitoringRapavý, Martin January 2010 (has links)
This thesis is dedicated to network layer protocol IPv6, purposes of its creation and penetration. Former chapters briefly describe IPv6 protocol format and protocols, methods and technologies related to IPv6. The thesis summarizes security risks and flaws in IPv6 and ICMPv6 protocols. In context of the risks and flaws the thesis describes several of local ICMP attacks. It also mentions security incidents resulting from exploiting those security flaws and means of countermeasures. One of the used countermeasures is passive monitoring of ICMP messages. Thesis contains brief description of tool used to achieve this - NDPMon with its advantages, disadvantages and concepts of usage. Rest of the thesis describes design and implementation of monitoring tool similar to NDPMon, but with some improvements.
|
4 |
DNA mutations in families with Norrie's diseaseWalker, Jennifer L. January 1998 (has links)
No description available.
|
5 |
Utilisation d'identifiants cryptographiques pour la sécurisation IPv6 / Use of crypto based identifiers for IPv6 securityCombes, Jean-Michel 28 September 2012 (has links)
IPv6, protocole succédant à IPv4, est en cours de déploiement dans l’Internet. Il repose fortement sur le mécanisme Neighbor Discovery Protocol (NDP). Celui-ci permet non seulement à deux nœuds IPv6 de pouvoir communiquer, à l’instar du mécanisme Address Resolution Protocol (ARP) en IPv4, mais il apporte aussi de nouvelles fonctionnalités, telles que l’autoconfiguration d’adresse IPv6. Aussi, sa sécurisation pour le bon fonctionnement de l’Internet en IPv6 est critique. Son mécanisme de sécurité standardisée à l’Internet Engineering Task Force (IETF) se nomme Secure Neighbor Discovery (SEND). Il s’appuie à la fois sur l’utilisation d’identifiants cryptographiques, adresses IPv6 appelées Cryptographically Generated Addresses (CGA) et qui sont générées à partir d’une paire de clés publique/privée, et de certificats électroniques X.509. L’objet de cette thèse est l’étude de ces identifiants cryptographiques, les adresses CGA, ainsi que le mécanisme SEND les employant, et leurs réutilisations potentielles pour la sécurisation IPv6. Dans une première partie de cette thèse, tout d’abord, nous posons l’état de l’art. Dans une deuxième partie de cette thèse, nous nous intéressons à la fiabilité du principal mécanisme connu employant les adresses CGA, le mécanisme SEND. Dans une troisième et dernière partie de cette thèse, nous présentons des utilisations des identifiants cryptographiques pour la sécurisation IPv6 / IPv6, next Internet protocol after IPv4, is under deployment in the Internet. It is strongly based on the Neighbor Discovery Protocol (NDP) mechanism. First, it allows two IPv6 nodes to communicate, like the Address Resolution Protocol (ARP) mechanism in IPv4, but it brings new functions too, as IPv6 address autoconfiguration. So, the security of this mechanism is critical for an Internet based on IPv6. The security mechanism standardized by the Internet Engineering Task Force (IETF) is Secure Neighbor Discovery (SEND). It is based on the use of cryptographical identifiers, IPv6 addresses named Cryptographically Generated Addresses (CGA) and generated from a public/private keys pair, and X.509 certificates. The goal of this PhD thesis is the study of such cryptographical identifiers, CGA addresses, as well as SEND using them, and their potential re-use to secure IPv6. In a first part of this thesis, we recall the main features of the IPv6 protocol. In a second part of this thesis, we are interested in the reliability of the main known mechanism using the CGA addresses, SEND. In a third and last part of this thesis, we present different uses of cryptographical identifiers to secure IPv6
|
6 |
Processorbelastning vid bearbetning av inkommande ARP och NDP-paketWärlinge, Gustav, Martin, Patrik January 2011 (has links)
No description available.
|
7 |
The Doer/Dexter model: political marketing and the NDP 1988 to 2009Moyes, Michael 14 April 2016 (has links)
This Master of Arts thesis examines how political marketing, and the Doer/Dexter model specifically, helped the NDP in Manitoba and Nova Scotia win elections from 1999 through 2007 in Manitoba and in 2009 in Nova Scotia. The study uses content analysis on the election platforms of the period and elite interviews with key political strategists of the NDP in order to gain insight and draw conclusions on what political marketing elements were critical to the party’s electoral success. This study concludes that the NDP in Manitoba and Nova Scotia used market research and a similar comprehensive political marketing strategy, now known as the Doer/Dexter model, which focused on the simplification of communication, the moderation of policy and the inoculation of any perceived weakness in order to win power. / May 2016
|
8 |
Utilisation d'identifiants cryptographiques pour la sécurisation IPv6Combes, Jean-Michel 28 September 2012 (has links) (PDF)
IPv6, protocole succédant à IPv4, est en cours de déploiement dans l'Internet. Il repose fortement sur le mécanisme Neighbor Discovery Protocol (NDP). Celui-ci permet non seulement à deux nœuds IPv6 de pouvoir communiquer, à l'instar du mécanisme Address Resolution Protocol (ARP) en IPv4, mais il apporte aussi de nouvelles fonctionnalités, telles que l'autoconfiguration d'adresse IPv6. Aussi, sa sécurisation pour le bon fonctionnement de l'Internet en IPv6 est critique. Son mécanisme de sécurité standardisée à l'Internet Engineering Task Force (IETF) se nomme Secure Neighbor Discovery (SEND). Il s'appuie à la fois sur l'utilisation d'identifiants cryptographiques, adresses IPv6 appelées Cryptographically Generated Addresses (CGA) et qui sont générées à partir d'une paire de clés publique/privée, et de certificats électroniques X.509. L'objet de cette thèse est l'étude de ces identifiants cryptographiques, les adresses CGA, ainsi que le mécanisme SEND les employant, et leurs réutilisations potentielles pour la sécurisation IPv6. Dans une première partie de cette thèse, tout d'abord, nous posons l'état de l'art. Dans une deuxième partie de cette thèse, nous nous intéressons à la fiabilité du principal mécanisme connu employant les adresses CGA, le mécanisme SEND. Dans une troisième et dernière partie de cette thèse, nous présentons des utilisations des identifiants cryptographiques pour la sécurisation IPv6
|
9 |
Development of National Drug Policy in the State of KuwaitAlali, Khaled Y.A.A January 2016 (has links)
This Thesis examines the benefits and usefulness of a National Drug Policy (NDP) for the developing of the Health Care System in Kuwait. The NDP is one of the most important structures of the Health System which can lead to improved health services by establishing guidelines, proposals and directives to organize, structure and regulate health legislation; it is of help to ensure the availability of quality, safety and efficacy in using medicines and it can reduce the irrational use of medicines. The NDP is a frame work between the government, schools and universities, media, health professionals, pharmaceutical industries and companies and public. It is cooperation between the public and private sectors to achieve the goal of access to good quality medicines for all. However there are many key factors which need to be examined before the National Drug Policy is introduced and these are considered the baseline for establishing a good policy, and includes; selection of essential drugs, affordability of drugs, drug financing, supply management, drug regulation, rational use of drugs, drugs registration, purchasing of drugs, health research and human resource development. During this research study from 2012 – 2015 several visits to the public and private health areas, were undertaken. At this time there were discussions with 121 health professionals and data was collected and this indicated that in Kuwait there are no such policies. This is despite the availability of financial means, specialized human resources and the existence of the ministerial decisions and regulations governing the health sector in both public and private, whether hospitals, health centers, pharmacies and health departments. In addition it is suggested that the process of a good NDP should be built around 3 main components which includes: 1.Development, 2. Implementation and 3. Monitoring and Evaluation. Therefore the establishing of a NDP without implementation and monitoring is not enough and does not achieve the desired results. The aim of this Thesis is to establish a NDP in the State of Kuwait. This policy is necessary for the State of Kuwait to ensure development an improvement of the Health Care System and ensure better health for population.
|
10 |
從國防報告書探討我國國防政策之轉變 / The Transition of ROC National Defense Policy Change by Reviewing The National Defense Report陳勇憲, Chen, Yung-Hsien Unknown Date (has links)
資訊革命伴隨全球化時代的來臨,使得具備跨國性、複雜性的綜合安全議題,成為當代世界各國關注的焦點,同時也改變了過去以戰爭行動做為確保主權國家安全的傳統圖像,此一環境的改變,促使世界各國興起軍事國防轉型的熱潮。
中共受到1991年第一次波灣戰爭的啟示,以及藉由改革開放所帶來的經濟成長及綜合國力的提升,加速了其軍事現代化的腳步,對於我國國家安全的威脅更甚以往。我國除了面對國際社會體系變遷及全球化進程所衍生的新安全問題外,來自中共軍事的傳統威脅也日趨嚴峻。
在國內方面,受到整體政治環境隨著戒嚴與動員勘亂體制的廢除、黨禁、報禁的開放及透過憲法與法律制度的改革,在80年代逐漸由威權體制朝民主政體發展,進一步促成國防改革的驅動力。綜合上述國際環境、中共軍事威脅及國內政治體制變化,使得我國在國防政策上面臨轉型的重大的挑戰。
本研究主要目的,是透過自民國81年起至今發行的10本國防報告書及國、內外有關戰略及國防政策、戰略相關議題的著作、期刊、論文及官方文件的蒐集,藉由國際情勢、兩岸互動以及國內政治環境之變化等面向分析,提供讀者瞭解我國自民國81年以來國防政策的演變歷程與外在因素的關係。
關鍵字:國防報告書、國防政策、國防轉型 / With the coming era of globalization, a revolution of information does not only cause each country in world to place emphasis on addressing the comprehensive and complex issues with regard to the international security but reconstruct the framework of national security which is originally based on the warfare operation. This shifted the relationship among countries and contributed significantly to a trend of reform regarding national defense in each country around the world.
What promoted the PRC’s military modernization are the domestic rapid economic growth and comprehensive national strength that is activated by the reform and open policy. However, this brings a serious threat to national security much more than ever before. Now, not only does our nation have to cope with the problems in globalization as well as power shift of the international society but we also have to confront the conventional military threat form the PRC.
On the other hand, the development from an authority system to the democratic polity, which did away with the martial law and established open policy including abolishment of suppression of factions and restrictions on medium, facilitated our national defense system to reform in the 80s. In short, that are those factors with respect to the international relationship, military threats from the PRC, and shits of domestic polity bring the great challenge to our national defense policy while reforming.
This paper explored ten national defense reports published in 1992 to date, and speculated works, journals and theses regarding discussion over national defense policy and strategy and the collections of official documents, so as to have readers comprehend the relations between the process of NDP reform and some outside factors. This research is based on the data analysis in 1992 to date within the realm of international circumstance, interactions across straight, and the shift in domestic policy.
Key words: national defence report, national defence policy (NDP), national defence reform
|
Page generated in 0.0223 seconds