• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 34
  • 20
  • 18
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 100
  • 12
  • 12
  • 11
  • 8
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Pressure groups and the decision making process : a study of the Precious Blood affair /

Lui, Wai-chung, Joseph. January 1900 (has links)
Thesis (M. Soc. Sc.)--University of Hong Kong, 1984.
72

Pressure groups and the decision making process a study of the Precious Blood affair /

Lui, Wai-chung, Joseph. January 1900 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1984. / Also available in print.
73

Estudo do efeito dos transformadores de relação de transformação variável sobre a capacidade de sincronização intermáquinas /

Peraro, Naryanne Rodrigues. January 2010 (has links)
Orientador: Laurence Duarte Colvara / Banca: Percival Bueno de Araujo / Banca: Silvia Galvão de Souza Cervantes / Resumo: O presente trabalho trata da influência de transformadores de relação de transformação variável, o ULTC (Under Load Tap Changing) e o PS (Phase Shifter Transformer), nas interações entre máquinas em um ambiente multimáquinas. A rede é reduzida às barras internas dos geradores com representação das consequências da ação do ULTC e do PS nas admitâncias de transferência entre máquinas. São determinados coeficientes denominados coeficiente de eficácia e Fator de Efeito, em que se identificam propriedades úteis para avaliar os efeitos da variação da relação de transformação do ULTC e do PS nas interações entre cada par de máquinas do sistema, assim como estabelecimento de lei de controle do próprio ULTC e do PS com vistas a determinado desempenho dinâmico/transitório / Abstract: This work deals with the influence of the variable ratio transformer, the ULTC (Under Load Tap Changing) and the PS (Phase Shifter Transformer) in the interactions between machines in a multimachines environment. The network is reduced to the internal busses of generators with representation of the consequences of the PS and the ULTC action in the transfer admittances between machines. Coefficients called effectiveness coefficient and Effect Factor are determined, which have useful properties for evaluating the effects of changes in the transformation ratio of the ULTC and the PS in the interactions between each generic pair of system machines, as well as establishing the control law of the ULTC and the PS overlooking a particular dynamic/transient performance / Mestre
74

Uso de gás natural para produção de óleo diesel no Brasil a partir da rota gás-to-liquids: estudo de viabilidade técnico-econômica usando reservas do Pré-sal / Natural gas usage for diesel fuel production in Brazil through the gas-to-liquids route: Technical and economical feasibility analysis using natural gas reserves from the pre salt. 2016. 113 f. Dissertação (Mestrado em Energia) Instituto de Energia e Ambiente, Universidade de São Paulo, São Paulo, 2016.

Gelsio Pereira Quiroga 30 September 2016 (has links)
Devido à sua natureza, o gás natural (GN) tem na distância aos pontos de consumo um obstáculo para sua utilização, a qual vai além simples queima para geração de energia ou obtenção de calor. Portanto, é importante que sejam discutidos novos métodos para distribuí-lo e transformá-lo em fontes de energia de maior valor agregado ou em matéria-prima para fabricação de produtos a serem utilizados na indústria química. Uma opção é a conversão do GN em combustíveis líquidos de pronto uso como óleo diesel, gasolina e querosene de aviação através da rota Gas-To-Liquids (GTL). O presente trabalho avalia o potencial da tecnologia GTL no contexto do crescimento da oferta de gás natural no Brasil pelos gasodutos Rota 2 e Rota 3, contextualizando o cenário brasileiro desse energético, as perspectivas futuras e o estado da tecnologia GTL com o processo Fisher-Tropsch. Para tanto, é simulado e analisado o desempenho econômico de uma planta de diesel GTL operante por 30 anos em cenários de preços de insumo e produto obtidos por projeções de reconhecimento internacional. / The usage of natural gás (NG) is related to the distance to the final customers, that is a real obstacle to its full utilization which is beyond the usage as fuel for electricity or heat generation. It is important to prospect, analyze and propose new methods for distribution and transformation of this important energy suppy to more value added products or special raw material for the chemical industry. The transformation in ready for use liquid fuels like diesel, gasoline and kerosene through the gas-to-liquid route (GTL) is one of the options. This dissertation evaluates the GTL technology in a context of the NG additional volume available through 2 new pipelines coming from offshore, Rota 2 and Rota 3 in the Brazilian context of NG current usage and its future perspectives taking advantage of this additional availability via the traditional and long term tested GTL Fischer-Tropsch (FT) technology. A GTL FT Diesel plant operating for 30 years was taken as an example considering different scenarios for NG and Oil prices retrieved from the IEA data base that is internationally considered as a consistent source of information.
75

Bezpečnostní rizika v pasivních optických sítích / Security Risks in Passive Optical Networks

Šimoník, Jan January 2018 (has links)
This diploma thesis deals with the historical development of passive optical networks, according to the standards that was defined by International Telecommunication Union (APON, BPON, GPON, XG-PON and NG-PON). Further, the thesis describes the security of passive optical networks, but also a security threats which the deployment and use of passive optical technology carry. In the introductory chapters of this thesis the passive optical networks are described. The following is a description of the standards of passive optical networks in terms of their historical development. The next part is dedicated to the security of passive optical networks and possible security threats. In conclusion a description of the practical part of this thesis is given -- rack assembly, which will serve for future testing. The basic configuration of the optical line terminations that are fitted in the rack is also described. The last part of this diploma thesis is dedicated to the testing of selected security risks, which was described in the theoretical part of this thesis.
76

Návrh zatahovacího podvozku pro letoun NG4 / The design of retractable landing gear for NG4 aircraft

Bartoněk, Jaroslav January 2011 (has links)
This diploma thesis describes the design of retractable landing gear for the NG-4 ultralight aircraft. Its main part consists of general principle of gear retraction, kinematics analysis, load calculation and structural analysis, material selection and means of controlling by pilot. The thesis contents marginally the typology of aircraft landing gears and their evolution.
77

Perzistence XML v relační databázi / XML Persistence in Relational Databases

Boháč, Martin January 2010 (has links)
The aim of this thesis is to create a client xDB database, which supports visualization and management of XML documents and schemas. The first part deals with the introduction of XML, XML schemas (DTD, XML Schema, RelaxNG, etc.) and contextual technologies. After that the thesis deals with the problem of the XML persistence and it focuses on mapping techniques necessary for an efficient storage in a relational database. The main part is devoted to the design and implementation of client application XML Admin, which is programmed in Java. The application uses the XML:DB interface to communicate with the xDB database. It supports storing XML documents to a collection and the XPath language for querying them. The final section is devoted to application performance testing and comparison with existing native database eXist.
78

Generátor nelegitimního síťového provozu / Generator of illegitimate network traffic

Blažek, Ondřej January 2017 (has links)
The diploma thesis deals with the problems of DoS/DDoS attacks and development of a tool, in C lanugage, for generating them. In the first chapter the principles of DoS attacks targeting the internet and transport layers of ISO/OSI model are described and also according to their characteristics divided. Selected attacks on the application layer are also described here in detail togehter with protocols which they are based on. In the following chapter there has been created a comparison of freely available tools, which could be used as a attack generators. The practical part is dedicated to a development of a tool for DoS attacks, especially design, general description and usage. Further there is a summary of the newly created library, including results of web server testing, and extensions of a web interface, which is part of the developed tool.
79

At the limits of moral markets : Corroborating the critique of the labor market as a sphere of social freedom

Marklund, Joen January 2021 (has links)
What do we require from the labor market in order for it to contribute to a free life? And will the labor market of the future live up to what we expect from it? This study examines how a political philosophy of Hegelian inspiration helps us understand the conditions by which the labor market could be capable of providing for what Axel Honneth refers to as ’social freedom’. An analysis by French jurist Alain Supiot is presented as an informative example of this theoretical framework. Supiot develops a sophisticated critique of the deficiencies of the contemporary labor market, while simultaneously pointing at some professions whose function testify of the possibility of the labor market of generating social freedom under proper conditions. As such, I show that a critical framework of Hegelian inspiration is immensely potent as to its capacity of understanding what we require from the labor market at this time of history. Immensely potent, but perhaps insufficient. Indeed, by introducing the research of Aaron Benanav pertaining to the development of the global labor market, this study corroborates the critique of Honneth and Supiot—a critical framework already introduced by Karen Ng and Timo Jütten—concerning the possibilities of the labor market of providing social freedom at any significant scale and thus hints at the probable necessity of overcoming capitalism during the time to come.
80

Constructing and Evaluating a Raspberry Pi Penetration Testing/Digital Forensics Reconnaissance Tool

Lundgren, Marcus, Persson, Johan January 2020 (has links)
Tools that automate processes are always sough after across the entire IT field. This project's aim was to build and evaluate a semi-automated reconnaissance tool based on a Raspberry Pi 4, for use in penetration testing and/or digital forensics. The software is written in Python 3 and utilizes Scapy, PyQt5 and the Aircrack-ng suite along with other pre-existing tools. The device is targeted against wireless networks and its main purpose is to capture what is known as the WPA handshake and thereby crack Wi-Fi passwords. Upon achieving this, the program shall then connect to the cracked network, start packet sniffing and perform a host discovery and scan for open ports. The final product underwent three tests and passed them all, except the step involving port scanning - most likely due to hardware and/or operating system faults, since other devices are able to perform these operations. The main functionalities of this device and software are to: identify and assess nearby network access points, perform deauthentication attacks, capture network traffic (including WPA handshakes), crack Wi-Fi passwords, connect to cracked networks and finally to perform host discovery and port scanning. All of these steps shall be executed automatically after selecting the target networks and pressing the start button. Based on the test results it can be stated that this device is well suited for practical use within cyber security and digital forensics. However, due to the Raspberry Pi's limited computing power users may be advised to outsource the cracking process to a more powerful machine, for the purpose of productivity and time efficiency.

Page generated in 0.0271 seconds