• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 16
  • 16
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Investigation of the Decision-Making and Time-Keeping Abilities of SIFamide Signalling in Drosophila Melanogaster

Schweizer, Justine January 2017 (has links)
Drosophila melanogaster is an invaluable model organism for the study of basic neuroscience. Using two previously characterized mating behaviours (Longer- and Shorter-Mating Duration), this research aims to further our knowledge of the neural circuit involved in each, and shed light on the mechanism by which four SIFamide producing neurons are involved in both. We also seek to investigate the involvement of core circadian clock genes in interval timing mechanisms. To do so, we investigated the populations of SIFamide receptor expressing neurons necessary for each behaviour and studied the contribution of circadian clock genes within the SIFamide signalling pathway. Our main experimental approach consisted of population specific knock-downs of the SIFamide receptor, the impact of which was assessed using a simple behavioural assay. This approach was complemented by rescue experiments and feminization of neurons. Finally, our investigation of the circadian clock was mediated by circadian gene knock-downs in SIFamide expressing neurons. Our results show that SIFamide signalling for each mating behaviour is mediated by segregated signalling to different, non male-specific SIFamide receptor expressing neuronal populations. We further demonstrate that SIFamide expressing neurons are not involved in the interval timing mechanism of these mating behaviours via core circadian gene contribution. This work presents preliminary results towards the investigation of a novel model of decision-making via neuronal signalling.
2

A Novel Technique of Network Auditability with Managers In The Loop

Shelley, Rian 01 December 2008 (has links)
Network management requires a large amount of knowledge about the network. In particular, knowledge about used network addresses, access time, and topology is useful. In a network composed of managed devices, much of the data necessary can come from simple network management protocol (SNMP) queries. Other data can come from other databases, or analysis of existing data. In particular, layer-two network topology can be determined by analyzing the mac address forwarding tables of layer-two devices. The layer-two topology can be merged with a layer-three topology to generate a complete topology of the network. This information is useless unless it is easily accessible to the network manager; therefore, a simple interface should be used to give access to all of this data.
3

Mapping and Filling Metabolic Pathway Holes

Kaur, Dipendra 21 April 2008 (has links)
The network-mapping tool integrated with protein database search can be used for filling pathway holes. A metabolic pathway under consideration (pattern) is mapped into a known metabolic pathway (text), to find pathway holes. Enzymes that do not show up in the pattern may be a hole in the pattern pathway or an indication of alternative pattern pathway. We present a data-mining framework for filling holes in the pattern metabolic pathway based on protein function, prosite scan and protein sequence homology. Using this framework we suggest several fillings found with the same EC notation, with group neighbors (enzymes with same EC number in first three positions, different in the fourth position), and instances where the function of an enzyme has been taken up by the left or right neighboring enzyme in the pathway. The percentile scores are better when closely related organisms are mapped as compared to mapping distantly related organisms.
4

Mapa de rede de impactos como metodologia de gestão estratégica em organizações complexas: estudo de caso no SESI-BA

Braga, Jéssica Jesus dos Santos 19 December 2014 (has links)
Submitted by Tatiana Lima (tatianasl@ufba.br) on 2015-11-26T19:17:14Z No. of bitstreams: 1 Braga, Jessica Jesus dos Santos.pdf: 2123635 bytes, checksum: 02906b7ac32d799e41e4858e324636c4 (MD5) / Approved for entry into archive by Tatiana Lima (tatianasl@ufba.br) on 2015-12-01T21:12:55Z (GMT) No. of bitstreams: 1 Braga, Jessica Jesus dos Santos.pdf: 2123635 bytes, checksum: 02906b7ac32d799e41e4858e324636c4 (MD5) / Made available in DSpace on 2015-12-01T21:12:55Z (GMT). No. of bitstreams: 1 Braga, Jessica Jesus dos Santos.pdf: 2123635 bytes, checksum: 02906b7ac32d799e41e4858e324636c4 (MD5) / A pesquisa, do tipo Estudo de Caso, visa a verificar as contribuições da metodologia Mapa de Rede de Impactos (MRI) à gestão estratégica da organização complexa Serviço Social da Indústria – Departamento Regional da Bahia (SESI-BA), por meio do acompanhamento da implantação dessa metodologia no período de 2012 a 2014. Para tanto, inicialmente, realizouse uma pesquisa quantitativa, mediante a aplicação de questionários via Google Docs a sete gerentes do SESI-BA e seis pesquisadores da UFBA que participaram do processo de implantação do MRI na organização, com o objetivo de mapear a interdependência entre os projetos estratégicos do PE 15 anos (2013-2027) do SESI-BA. Para o tratamento desses dados e construção do mapa sistêmico MRI do PE 15 anos do SESI-BA foi utilizada a metodologia Análise de Redes (AR), por meio da qual também se identificaram as posições e papéis assumidos pelos projetos na rede estratégica organizacional. Em seguida, visando avaliar os resultados gerenciais do SESI-BA com a utilização do MRI, adotaram-se técnicas qualitativas de coleta e tratamento de dados. Para acompanhar as ações estratégicas na organização após a implantação do MRI utilizou-se a técnica Observação Participante em duas fases: como pesquisa exploratória de campo; e em reuniões do SESI-BA. A Pesquisa Documental foi utilizada para conhecer o histórico de criação, características e dinâmica da organização e verificar as influências exercidas pela metodologia MRI sobre o desempenho do seu sistema estratégico. Por último, aplicou-se a técnica Entrevista do tipo semiestruturada a seis executivos do SESI-BA detentores de informações estratégicas e conhecedores do sistema estratégico organizacional (três deles pertencentes ao nível tático; um do nível estratégico; e dois do operacional) visando sondar as suas percepções, expectativas, nível de consciência, opiniões e avaliações sobre aspectos e efetividade dos componentes da metodologia MRI na organização. Para o tratamento dos dados obtidos por meio da observação, da pesquisa documental e das entrevistas utilizou-se a técnica Análise de Conteúdo, tomando como categorias as dimensões Eficiência, Eficácia, Relevância e Sustentabilidade (LUSTHAUS et al., 1999) e como subcategorias os elementos principais da metodologia MRI. Para organizar a análise dos dados qualitativos foi utilizado o software ATLAS.ti. Como resultados dessa pesquisa, afirma-se que o Mapa de Rede de Impactos favoreceu um melhor entendimento da realidade organizacional do SESI-BA, mais rápida adaptação e respostas às mudanças do seu ambiente. Também se constatou que o MRI contribuiu para o avanço na gestão estratégica da organização complexa SESI-BA, atuando como um método complementar ao tradicional BSC. Diante das constantes mudanças no sistema estratégico do SESI-BA, concluiu-se que as contribuições mais permanentes do MRI à gestão estratégica dessa organização complexa consistiram em: auxílio à definição das Direções Estratégicas para a tomada de decisão, com base nos valores organizacionais e nos conhecimentos e experiências dos parceiros internos; potencialização das capacidades endógenas; incentivo à participação dos parceiros internos nas iniciativas estratégicas; incentivo à implantação de processos favoráveis ao compartilhamento de conhecimentos na organização; e aprendizado estratégico, por meio de exercícios de reflexão global, sistematização e representação visual das inter-relações de impacto entre os vetores estratégicos. / This research, a case study, aims to verify the contributions of the methodology Outcome Network Map (ONM) to the strategic management of the complex organization Social Service of the Industry – Regional Department of Bahia (SESI-BA), through the follow-up of implementation of this methodology from 2012 to 2014. For that, initially, was applied a quantitative research, by applying questionnaires via Google Docs to seven SESI-BA managers and six researchers from UFBA that participated in the ONM implantation process in the organization, in order to map the interdependence between the strategic projects of SP (Strategic Planning) 15 years (2013-2027) of SESI-BA. For the processing of such data and construction of systemic map ONM SP 15 years of SESI-BA, was used Network Analysis (NA) methodology, through which also was identified the positions and roles played by the projects in the organizational strategic network. Then, to evaluate the management results of SESI-BA with the use of ONM, it was adopted qualitative techniques for data collecting and processing. To follow-up the strategic actions in the organization after the ONM implantation, it was used the Participant Observation technique in two stages: as field exploratory research; and in some SESI-BA meetings. The Documentary Research was used to understand the history of creation, characteristics and dynamics of the organization and check the influences exerted by ONM methodology on the performance of its strategic system. Finally, it was applied the semi-structured Interview technique to six SESI-BA executives who hold strategic information and know the strategic organizational system (three of them belonging to the tactical level; one to the strategic level, and two to the operational level) in order to probe their perceptions, expectations, level of awareness, opinions and evaluations of aspects and effectiveness of the ONM methodology components in the organization. To treat data obtained by observation, documentary research and interviews it was used the Content Analysis technique, using as categories the dimensions Efficiency, Effectiveness, Relevance and Sustainability (Lusthaus et al., 1999) and as subcategories the main elements of the ONM methodology. To organize the analysis of qualitative data it was used ATLAS.ti software. As results of this research, it is stated that the Outcome Network Map favored a better understanding of SESI-BA organizational reality, faster adaptation and responses to changes in their environment. Results also highlight the fact that the ONM contributed to the advance of the strategic management of the complex organization SESI-BA, acting as a complementary method to the traditional BSC. Up fronted by the constant changes in the SESI-BA strategic system, it was concluded that the most permanent contributions of ONM to the strategic management of this complex organization consisted of: support of the definition of Strategic Directions for decision making, based on organizational values and in the knowledge and experiences of internal partners; enhancement of endogenous capacities; encouraging the participation of internal partners on the strategic initiatives; incentives to the implementation of favorable processes to knowledge sharing in the organization; and strategic learning through global reflection exercises, systematization and visual representation of the inter-relationships impact between strategic vectors.
5

Link layer topology discovery in an uncooperative ethernet environment

Delport, Johannes Petrus 27 August 2008 (has links)
Knowledge of a network’s entities and the physical connections between them, a network’s physical topology, can be useful in a variety of network scenarios and applications. Administrators can use topology information for fault- finding, inventorying and network planning. Topology information can also be used during protocol and routing algorithm development, for performance prediction and as a basis for accurate network simulations. Specifically, from a network security perspective, threat detection, network monitoring, network access control and forensic investigations can benefit from accurate network topology information. The dynamic nature of large networks has led to the development of various automatic topology discovery techniques, but these techniques have mainly focused on cooperative network environments where network elements can be queried for topology related information. The primary objective of this study is to develop techniques for discovering the physical topology of an Ethernet network without the assistance of the network’s elements. This dissertation describes the experiments performed and the techniques developed in order to identify network nodes and the connections between these nodes. The product of the investigation was the formulation of an algorithm and heuristic that, in combination with measurement techniques, can be used for inferring the physical topology of a target network. / Dissertation (MSc)--University of Pretoria, 2008. / Computer Science / unrestricted
6

Mapping and identifying misplaced devices on a network by use of metadata

Fenn, Edward, Fornling, Eric January 2017 (has links)
Context. Network placement of devices is an issue of operational security for most companies today. Since a misplaced device can compromise an entire network and in extension, a company, it is essential to keep track of what is placed where. Knowledge is the key to success, and knowing your network is required to make it secure. Large networks however may be hard to keep track of, since employees can connect or unplug devices and make it hard for the administrators to keep updated on the network at all times. Objectives. This analysis focuses on the creation of an analysis method for network mapping based on metadata. This analysis method is to be implemented in a tool that automatically maps a network based on specific metadata attributes. The motivation and goal for this study is to create a method that will improve network mapping with regard to identifying misplaced devices, and to achieve a better understanding of the impact misplaced systems can have on a network. Method. The method for analyzing the metadata was manually checking the network metadata that was gathered by Outpost24 AB’s proprietary vulnerability scanner. By analyzing this metadata, certain attributes were singled out as necessary for the identification. These attributes were then implemented in a probability function that based on the information determines the device type. The results from the probability function are then presented visually as a network graph. A warning algorithm was then run against these results and prompted warnings when finding misplaced devices on subnets. Results. The proposed method is deemed to be 30 878 times faster than the previous method, i.e. the manual control of metadata. It is however not as accurate with an identification rate of between 80% and 93% of devices and correct device type identification of 95-98% of the identified devices. This is as opposed to the previous method, i.e. the manual control of metadata, with 80-93%% identification rate and 100% correct device type identification. The proposed method also flagged 48.9% of the subnets as misconfigured. Conclusion. In conclusion, the proposed method proves that it is indeed possible to identify misplaced devices on networks based on metadata analysis. The proposed method is also considerably faster than the previous method, but does need some further work to be as efficient as the previous method and reach a 100% device type identification rate. / Kontext. Placeringen av enheter i nätverk har idag blivit en säkerhetsfråga för de flesta företagen. Eftersom en felplacerad enhet kan äventyra ett helt nätverk, och i förlängning, ett företag så är det essentiellt att ha koll på vad som är placerat vart. Kunskap är nyckeln till framgång, och att ha kunskap om sin nätverksstruktur är avgörande för att göra nätverket säkert. Stora nätverk kan dock vara svåra att ha koll på om anställda kan lägga till eller ta bort enheter, och på så sätt göra det svårt för administratören att ständigt hålla sig uppdaterad om vad som finns vart. Mål. Den här studien fokuserar på skapandet av en analysmetod för att kartlägga ett nätverk baserat på metadata från nätverket. Analysmetoden ska sedan implementeras i ett verktyg som sedan automatiskt kartlägger nätverket utifrån den metadata som valts ut i analysmetoden. Motivationen och målet med den här studien är att skapa en metod som förbättrar nätverkskartläggning med syftet att identifiera felplacerade enheter, och att uppnå en större förståelse för den inverkan felplacerade enheter kan få för ett nätverk. Metod. Metoden för att analysera metadatan var att genom att för hand leta igenom den metadata som Outpost24 ABs sårbarhetsskanner samlade in när den letade efter sårbarheter i ett nätverk. Genom att analysera metadatan så kunde vi singla ut enskilda bitar som vi ansåg vara nödvändiga för att identifiera enhetens typ. Dessa attribut implementerades sedan i en sannolikhetsfunktion som avgjorde vilken typ en enhet hade, baserat på informationen i metadatan. Resultatet från denna sannolikhetsfunktion presenterades sedan visuellt som en graf. En algoritm som matade ut varningar om den hittade felkonfigurerade subnät kördes sedan mot resultaten från sannolikhetsfunktionen. Resultat. Den i den här rapporten föreslagna metoden är fastställt till att vara cirka 30 878 gånger snabbare än föregående metoder, i.e. att leta igenom metadatan för hand. Dock så är den föreslagna metoden inte lika exakt då den har en identifikationsgrad på 80-93% av enheterna på nätverket, och en korrekt identifikationsgrad på enhetstypen på 95-98% av de identifierade enheterna. Detta till skillnad från den föregående metoden som hade 80-93% respektive 100% identifikationsgrad. Den föreslagna metoden identifierade också 48.9% av alla subnät som felkonfigurerade. Sammanfattning. För att sammanfatta så bevisar den föreslagna metoden att det är möjligt att identifiera felplacerade enheter på ett nätverk utifrån en analys av nätverkets metadata. Den föreslagna metoden är dessutom avsevärt snabbare än föregående metoder, men behöver utvecklas mer för att nå samma identifikationsgrad som föregående metoder. Det här arbetet kan ses som ett proof-of-concept gällande identifikation av enheter baserat på metadata, och behöver därför utvecklas för att nå sin fulla potential.
7

Virtual Network Mapping with Traffic Matrices

Wang, Cong 01 January 2011 (has links) (PDF)
Nowadays Network Virtualization provides a new perspective for running multiple, relatively independent applications on same physical network (the substrate network) within shared substrate resources. This method is especially useful for researchers or investigators to get involved into networking field within a lower barrier. As for network virtualization, Virtual Network Mapping (VNM) problem is one of the most important aspects for investigation. Within years of deeply research, several efficient algorithms have been proposed to solve the Virtual Network Mapping problem, however, most of the current mapping algorithm assumes that the virtual network request topology is known or given by customers, in this thesis, a new VNM assumption based on traffic matrix is proposed, also using existing VNM benchmarks, we evaluated the mapping performance based on various metrics, and by comparing the new traffic matrix based VNM algorithm and existing ones, we provide its advantages and shortcomings and optimization to this new VNM algorithm.
8

A whole system approach to increasing children's physical activity in a multi-ethnic UK city: a process evaluation protocol

Hall, Jennifer, Bingham, Daniel D., Seims, Amanda, Dogra, Sufyan A., Burkhardt, Jan, Nobles, J., McKenna, J., Bryant, M., Barber, Sally E., Daly-Smith, Andrew 20 December 2021 (has links)
Yes / Engaging in regular physical activity requires continued complex decision-making in varied and dynamic individual, social and structural contexts. Widespread shortfalls of physical activity interventions suggests the complex underlying mechanisms of change are not yet fully understood. More insightful process evaluations are needed to design and implement more effective approaches. This paper describes the protocol for a process evaluation of the JU:MP programme, a whole systems approach to increasing physical activity in children and young people aged 5-14 years in North Bradford, UK. This process evaluation, underpinned by realist philosophy, aims to understand the development and implementation of the JU:MP programme and the mechanisms by which JU:MP influences physical activity in children and young people. It also aims to explore behaviour change across wider policy, strategy and neighbourhood systems. A mixed method data collection approach will include semi-structured interview, observation, documentary analysis, surveys, and participatory evaluation methods including reflections and ripple effect mapping. This protocol offers an innovative approach on the use of process evaluation feeding into an iterative programme intended to generate evidence-based practice and deliver practice-based evidence. This paper advances knowledge regarding the development of process evaluations for evaluating systems interventions, and emphasises the importance of process evaluation. / Sport England’s Local Delivery Pilot - Bradford
9

Výskyt a podmínky existence obojživelníků a plazů / Incidence and conditions of the existence of amphibians and reptiles

KUS, Lukáš January 2010 (has links)
Thesis deals with the mapping of our species of amphibians and reptiles in the hills of St. Thomas and the right bank of Lipno. Findings of older data in the atlas and the lack of extension work to monitor the biodiversity of species inspired me to map the location. Alignment of the square with the border position was more than 40 years, closed intensive human activities. This reasoning was that the richness and diversity of amphibians and reptiles could be acknowledge. The aim was to monitor the designated area and to identify the occurrence of individual species of amphibians and reptiles. Locate their habitats in which they propose to Match and protect this natural heritage for the future.
10

Community networks: identifying social capital in Emerado, North Dakota

Atkinson, Lisa January 1900 (has links)
Master of Science / Department of Landscape Architecture, Regional and Community Planning / Stephanie Rolley / The City of Emerado, North Dakota, population 414, located in northeast North Dakota is the subject of a Social Network Analysis (SNA), conducted prior to it being the subject of a University of North Dakota Center for Community Engagement, Community Connect Forum. The SNA was developed based on the results of 25 interviews conducted with local residents, elected officials and business owners, using snowball sampling and following grounded theory methods. The interview results were coded and memos were written to aid in the analysis. Social Network data was entered into the Sentinel Visualizer software (FMS Advanced Systems Group) to develop a visual image of the network, including nodes (people, organizations or businesses) and links to illustrate the relationships between nodes. The SNA helps to frame the relationships in terms of bridging and bonding social capital. The SNA provides the ability to mathematically determine the most important nodes to the community social network, using calculations to determine levels of degree centrality, betweenness centrality, closeness centrality, Eigenvalue, and network density. After calculating these elements, categorical descriptions of the top ten individuals for each category are provided. The networks of five individuals are reviewed in depth to aid in comprehending the process of incrementally expanding networks.

Page generated in 0.0743 seconds