• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2582
  • 1642
  • 1321
  • 1039
  • 381
  • 224
  • 192
  • 138
  • 110
  • 101
  • 101
  • 94
  • 55
  • 49
  • 49
  • Tagged with
  • 9657
  • 1733
  • 1150
  • 1135
  • 1073
  • 1048
  • 768
  • 658
  • 616
  • 598
  • 566
  • 523
  • 488
  • 470
  • 466
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
401

"La protection de l’enfant" à Madagascar : représentations et pratiques d’accompagnement dans la lutte contre la maltraitance / The protection of the child in Madagascar : representations and practices of accompaniment(support) at the actors against child abuse.

Phan Van Hien, Noelivao Olga 04 April 2014 (has links)
La recherche porte sur l’accompagnement dans le cadre de la politique de la protection de l’enfant à Madagascar. Malgré la montée de la maltraitance, dans un contexte de crises économiques et sociales répétitives provoquant l’extrême précarité de la population, cette protection peine à s’organiser du fait du manque de moyens de l’Etat, de l’absence d’une politique claire dans ce domaine, de l’insuffisance de coordination des « acteurs » engagés dans les réseaux de protection de l’enfance,Fondé sur vingt ans d’expériences de l’auteur dans le domaine social, sur un recueil de données mené par entretiens et questionnaires auprès de professionnels de terrain et des parents, cette recherche fait apparaître la contradiction entre les traditions coutumières propres à la culture malgache (mariage précoce, rejet des jumeaux…) et les exigences de la convention internationale relative aux droits de l’enfant à laquelle Madagascar a adhéré. Elle montre, compte-tenu de ces contradictions, la nécessité de l’accompagnement de l’enfant et de ses parents. En s’appuyant sur les recherches relatives à l’accompagnement et sur le rôle des différentes formes que prend ce dernier dans le développement d’un processus de résilience, l’auteur fait apparaître qu’une démarche fondée sur une pluralité d’accompagnements « naturel »,« psychosocial » et institutionnel peut initier un changement dans les représentations traditionnelles de l’enfant. Cette pluralité, en permettant de dépasser la simple « prise en charge », facilite aussi une implication accrue des familles et des communautés dans la prévention et la lutte contre la maltraitance. / This research study is on the accompaniment in framing policy with regard to theprotection of child in Madagascar. Despite the increasing abuse in the context of repeatingsocial and economic crisis provoking an extreme danger to the population, this protectionis not easy due to the facts of lack of state resources, absence of a clear policy in this area,and the requisite co-ordination of “actors” engaged in protection networks of children.Founded on the experience of the author for twenty years in social domain, and on theresponses collected through interviews and questionnaires from professionals in this areaand the parents, this study reveals the contradiction between the customs of the Malagasyculture (early marriage and rejection of twins…) and the requirement of InternationalConvention related to the rights of children to which the Madagascar has given itsadherence. It also gives an account of these contradictions and the necessity ofaccompaniment of the parents and the children.Basing herself on the related studies of accompaniment and on the role of different forms ittakes in the development process of resilience, the author shows that this process, foundedon the plurality of accompaniments “natural”, “psychological” and “institutional”, caninitiate a change in the child related traditional beliefs. This plurality, permitting us tobypass a simple approach of “control”, facilitates an implication increasing the role of thefamilies and communities in the struggle against and prevention of abuse.
402

Utökat ballistiskt skydd mot finkalibriga projektiler på ytstridsfartyg

Westin, Jonas January 2009 (has links)
<p>Detta arbete handlar om med vilka material som det ballistiska skyddet mot finkalibriga projektiler kan förbättras på befintliga svenska ytstridsfartyg. Eftersom det befintliga fartygets konstruktion i sig innehar en viss skyddsförmåga (grundskydd) behöver denna inledningsvis beskrivas för att definiera utgångspunkt.</p><p>Att förbättra skyddsförmågan genom att komplettera den redan befintliga konstruktionen med tilläggsskydd innebär att fartyg får helt förändrade förutsättningar att klara av nya hot och uppgifter och därmed också få en förbättrad livslängd.</p><p>Genom att studera för- och nackdelar hos olika tekniska lösningar framkommer vilka som är realistiska.</p><p>Fartyg kommer sannolikt att utrustas med olika material eftersom ytor- och utrymmen kommer att behöva prioriteras. Olika materialval kommer också att styras av kompromisser mellan ballistiskt skydd och lastbärande konstruktioner.</p> / <p>This paper investigates which technical solutions can improve ballistic protection against small arm projectiles onboard Swedish naval surface warships.</p><p>Since the construction of the ship itself has a basic protection against projectiles, this will be described first.</p><p>By improving the protection capability with extra protection (supplementary protection), the ship can successfully handle several new threats that come with new tasks while also improving its length of life.</p><p>A study of advantages and disadvantages of different technical solutions will show which solutions are realistic ones.</p><p>The ship will probably be equipped with different kind of materials because of the need of prioritized areas and surfaces onboard. Different materials will be a compromise between the ballistic protection ability and construction strength.</p> / ChpT 08-10
403

Utökat ballistiskt skydd mot finkalibriga projektiler på ytstridsfartyg

Westin, Jonas January 2009 (has links)
Detta arbete handlar om med vilka material som det ballistiska skyddet mot finkalibriga projektiler kan förbättras på befintliga svenska ytstridsfartyg. Eftersom det befintliga fartygets konstruktion i sig innehar en viss skyddsförmåga (grundskydd) behöver denna inledningsvis beskrivas för att definiera utgångspunkt. Att förbättra skyddsförmågan genom att komplettera den redan befintliga konstruktionen med tilläggsskydd innebär att fartyg får helt förändrade förutsättningar att klara av nya hot och uppgifter och därmed också få en förbättrad livslängd. Genom att studera för- och nackdelar hos olika tekniska lösningar framkommer vilka som är realistiska. Fartyg kommer sannolikt att utrustas med olika material eftersom ytor- och utrymmen kommer att behöva prioriteras. Olika materialval kommer också att styras av kompromisser mellan ballistiskt skydd och lastbärande konstruktioner. / This paper investigates which technical solutions can improve ballistic protection against small arm projectiles onboard Swedish naval surface warships. Since the construction of the ship itself has a basic protection against projectiles, this will be described first. By improving the protection capability with extra protection (supplementary protection), the ship can successfully handle several new threats that come with new tasks while also improving its length of life. A study of advantages and disadvantages of different technical solutions will show which solutions are realistic ones. The ship will probably be equipped with different kind of materials because of the need of prioritized areas and surfaces onboard. Different materials will be a compromise between the ballistic protection ability and construction strength. / ChpT 08-10
404

Das Sachleistungsvertragskonzept der Verbrauchsgüterkaufrichtlinie im deutschen, englischen und französischen Recht /

Bartfeld, Sven. January 2009 (has links)
Zugl.: Heidelberg, Universiẗat, Diss., 2008. / Includes bibliographical references (p. 313-338).
405

Dosažitelnost prostředků individuální ochrany v zóně a mimo zónu havarijního plánování. / The availability of individual protection devices among inhabitants in the zone and outside the zone of the emergency planning zone

GETTINGEROVÁ, Alena January 2016 (has links)
Thesis topic is "The availability of individual protection devices among inhabitants in the zone and outside the zone of emergency planning zone." The theoretical part provides an overview of the historical development of the protection of the population from 1935 through to civil protection in the Czech Republic. Another subsection includes a legislative framework for the protection of the population, where you find the individual legislation that relates to protection of the population and implementing regulation to these laws. Furthermore, the work is divided into individual means of protection that are crucial for this work. After the next chapter there are chapters which deal separetaly with plans for individual protection, which can be found in the regional emergency plan, in the external regional emergency plan, in the external emergency plan for building with dangerous chemical substances and also in the internal emergency plan for the building with dangerous substances and also this chapter mentions about internal emergency plan for nuclear equipment and equipment IV. category. In the second part is formulated a research question which is: "What is the readiness of the population in the vicinity of Temelin nuclear power plant in case of nuclear accident within the framework of civil defense?" Firstly there was a pilot study, whose task was to determine whether respondents understand the questions and are able to answer them. This study was conducted in September 2015. On its basis there has been a change in the order of questions and change in the wording of one question in the survey itself, which took place in May 2016. Both questionnaires 25 questions which investigated basic information about the respondents, followed by questions which related to the protection of the population, individual protection of people and the extempore protection. Survey results are analyzed in chapter "3 Results" with the help of graphs and the results of the pilot study are presented in chapter "3 Results" They are shown in the table where the individual questions with the answers of percentage of respondents. Followed by the evaluation of the results with the help of statistical surveys and with the help of method 2-tests of good conformity to assess dependency of respondents' answers that are examined in the context of statistical surveys and pilot studies. To evaluate the awareness and the availability of means of individual and improvised protection and success rate has been assigned of 80 % of correct answers. The results show that the overall awareness reached 23 % and the overall facilities, and individual means of improvised protection is 0 %. Hypothesis no. 1, which reads: "The population in the emergency planning zone and outside of the recommended manners of behavior when an extraordinary event with special emphasis on individual means of protection reaching 80 % of correct answers" was not confirmed and vice versa hypothesis no. 2 which reads: "the population in the emergency planning zone and beyond about the recommended manners of behavior when an extraordinary event with special emphasis on the individual and improvised means of protection does not depend on the location of the respondent" was confirmed. The results of this thesis will be used to enhance public awareness in order to learn how to use extempore equipment to protect themselves.
406

Analýza transformace civilní ochrany v České republice od roku 1918 do současnosti s návrhem dalšího směřování ochrany obyvateltva / An Analysis of the Civil Protection Transformation in the Czech Republic from 1918 to the Present with a Proposal of the Future Inhabitants Protection

HANZAL, Jan January 2014 (has links)
Civil protection as well as the protection of the population is a dynamic field which has a deep history in the Czech Republic dating back to the dark time of World War I. The civil protection was first based on the voluntariness principle. The real origin of the civil protection came with Act No. 82/1935 Coll. on the protection and defense against air attacks. The aim of this thesis is to characterize the protection of the population and propose the future direction of protecting of the population through changes or innovations that would strengthen the protection of the population. In the practical part of this thesis is based on the research question: "Has the civil protection transformation established a reliable system that does not require either major changes or minor changes?" The research part of the thesis is based on a qualitative research. The practical part of the thesis is based on a research method "structured interview". The structured interviews were conducted with the experts at the regional level all seven territorial departments of the Fire and Rescue Services of the South Bohemian Region. The conclusion of this thesis (mainly based on the strucutred interviews with the experts) is a statement that by the civil protection transformation was created a reliable system of protection of the population with a minor space for improvement. The fundamental change in the system would be a consolidation of the system legislative into a separate law on civil protection / protection of the population. The current crisis legislation would be subordinate to this Act. Other proposed changes to the protection of the population and its further direction of protection of the population are presented in the section "Conclusion".
407

Systém chránění s využitím výstupu z elektronického senzorického systému měření proudu a napětí / The Protection System Working on Output of Electronic Sensor System Measuring Current and Voltage

Bajánek, Tomáš January 2017 (has links)
At present, there is a widespread use of alternative measurement technologies in electrical networks that include current and voltage sensors. Their use is closely related to the use of IEC 61850-9-2 for data transfer of measured values within the substation for the purpose of protection and measurement. The use of sensors and communication standard IEC 61850 together with high-speed Ethernet will simplify the concept of the arrangement of protection terminals in substations and enable the development of a new protection system based on central protection. The dissertation is focused on protection algorithms, which use the SV according to IEC 61850-9-2, and their implementation into the central protection model. Thesis describes development in the field of protection of substations and the currently available solutions using IEC 61850-9-2 and the principle of central protection. Thesis explains algorithms for selected protection functions - overcurrent protection, negative sequence overcurrent protection, logic busbar protection and differential protection. Further, thesis deals with the programming of protection function algorithms in LabView development environment in the form of a central protection model. The model processes data from a process bus according to IEC 61850-9-2 and sends a GOOSE message over Ethernet in the event of a failure. To verify the correct function of the programmed protection algorithms, a testing procedure was developed using OMICRON 256plus, the current sensor and the merging unit. The results of the testing of the central protection model and the proposed algorithms were compared with the results of testing the currently used protections. At the end, the thesis deals with the assessment of the benefits of central protection for protecting substations and the possibility of further utilization of the central protection model. The thesis highlights a new way of protecting the electrification system using digital data from MU transferred via the process bus described in IEC 61850-9-2.
408

Développement et formulations de produits solaires conditionnés sous forme d'aérosol

Durand, Laurence 25 May 2010 (has links)
L’exposition au soleil, et donc aux rayons ultraviolets, est de plus en plus fréquente chez l’homme dans les pays occidentaux. En effet, les modes de vie ont fortement changé ces dernières années, avec pour résultat une augmentation non négligeable des loisirs en extérieur. Ceci a pour conséquence une augmentation de l’apparition des cancers cutanés, dont le pronostic de survie est souvent mauvais et l’issue fatale. De plus, les traitements associés à ces maladies sont lourds et n’agissent pas toujours de façon efficace. Les campagnes d’information et de prévention face aux dangers du soleil restent donc les principales mesures efficaces pour lutter contre le cancer cutané lié à une surexposition au soleil. La recherche de nouveaux produits permettant de protéger de manière efficace la peau des effets néfastes des rayons UV reste donc un défi permanent et primordial pour la recherche dans l’industrie cosmétique. <p><p> Dans un premier temps, le travail a consisté à développer des nouvelles formulations de produits solaires contenant des concentrations élevées en filtres UV, conditionnées sous forme d’aérosol, celles-ci valables pour le marché européen. Une émulsion E/H et une émulsion E/Si ont donc été réalisées. Elles contenaient au final 27% de filtres UV pour l’émulsion E/H et 16,5% de filtres UV pour l’émulsion E/Si, dont 4% de filtres inorganiques pour les deux types d’émulsion. Leur viscosité était de 6800 mPa.s pour l’émulsion E/H et de 2800 mPa.s pour l’émulsion E/Si. Ces formulations étaient stables lorsqu’elles étaient conservées pendant 2 mois à 40°C et également lorsqu’elles subissaient 5 cycles de température entre 5°C et 40°C. La mise en aérosol de ces émulsions a nécessité l’utilisation de 22% de gaz propulseur (mélange :butane, propane, isobutane). <p>La taille des gouttelettes étant un paramètre important de la caractérisation des aérosols pour le choix des matériaux à utiliser ainsi que pour sécurité afin d’éviter toute inhalation pulmonaire, l’influence de différents éléments sur celle-ci a été étudiée. Nous avons ainsi montré que la concentration en gaz, la viscosité, la présence ou non de filtres inorganiques ainsi que le choix des valves et diffuseurs utilisés jouent un rôle dans la taille des gouttelettes émises, celle-ci ne pouvant pas être inférieure à 30 µm de diamètre. La taille des gouttelettes émises était supérieure à 50 µm avec pas plus de 0.1% ayant une taille inférieure à 10 µm et maximum 25% des gouttelettes ayant une taille comprise entre 10 et 30 µm. <p><p> Les produits formulés contenaient de grandes quantités en filtres solaires, organiques et inorganiques (27% pour l’émulsion E/H et 16,6% pour l’émulsion E/Si), il était donc important de vérifier qu’aucun des filtres présents dans les émulsions ne passaient à travers la peau lors de l’application des produits solaires. En effet, ceux-ci doivent rester à la surface de l’épiderme afin de maintenir l’efficacité des produits solaires et d’éviter des effets néfastes systémiques éventuels en pénétrant la peau. Une étude in vitro utilisant de la peau humaine excisée et des cellules de diffusion de Franz nous a permis de constater que les filtres inorganiques présents dans les formulations restaient en surface de la peau, et seulement deux des filtres organiques (l’EMC et MBBT) présentaient un potentiel de pénétration cutanée négligeable et non nocif pour la santé humaine (maximum 1,21 µg/ml/cm2 pour EMC et maximum 0,14 µg/ml/cm2 pour MBBT). De plus, après 24 h d’expérience, plus de 50% des filtres restaient à la surface de la peau, ce qui permettait de maintenir l’efficacité des produits solaires. Afin de mener à bien cette étude, des méthodes analytiques pour l’analyse simultanée des filtres solaires organiques d’une part, par CLHP (Chromatographie Liquide Haute Performance), et inorganiques d’autre part, par ICP-OES (Inductively Coupled Plasma - Optical Emission Spectrometry), ont été mises au point et validées. <p>Une étude in vivo non invasive, basée sur le prélèvement des couches successives du stratum corneum, a été réalisée par la suite. Cette dernière a été effectuée par la méthode du « tape stripping », qui utilise des disques adhésifs rigides, et sur 9 volontaires pendant une période de 8 h. Elle a permis de confirmer les résultats obtenus avec la méthode in vitro. Une bonne corrélation entre ces deux types d’étude a été observée. <p><p> Enfin, la dernière partie du travail a porté sur l’EMC, un des filtres organiques utilisé dans la plupart des produits solaires mis sur le marché et dans les émulsions E/H et E/Si formulées. Ce filtre présente une sensibilité à la lumière et aux rayons UV. L’encapsulation lipidique de celui-ci a donc été envisagée afin de produire des nanoparticules dont la matrice lipidique a pour but de protéger l’EMC contre une dégradation causée par les rayons UV. Trois lipides différents ont été investigués et ont montré des résultats positifs de protection vis-à-vis des rayonnements UV. En effet, après 2 h d’irradiation par les UV, une perte d’efficacité de 30% de l’EMC pur a été observée contre 10% à 21% pour l’EMC encapsulé par les différents lipides. De plus, les nanoparticules n’ont pas montré de potentiel d’augmentation de pénétration cutanée de l’EMC. <p> / Doctorat en Sciences biomédicales et pharmaceutiques / info:eu-repo/semantics/nonPublished
409

Protection-based Distributed Generation Penetration Limits on MV feeders - Using Machine Learning

Nxumalo, Emmanuel 11 March 2022 (has links)
The rise of disruptive technologies and the rapid growth of innovative initiatives have led to a trend of decentralization, deregulation, and distribution of regulated/centralized services. As a result, there is an increasing number of requests for the connection of distributed generators to distribution networks and the need for power utilities to quickly assess the impacts of distributed generators (DGs) to keep up with these requests. Grid integration of DGs brings about protection issues. Current protection systems were not designed for bi-directional power flow, thus the protective devices in the network lose their ability to perform their main functions. To mitigate the impact of distributed generation (DG), some standards and policies constrain the number of DG that can be connected to the distribution network. The problem with these limits is that they are based only on overload and overvoltage, and do not adequately define the DG size/threshold before the occurrence of a protection issue (NRS 097-2-3). The other problem with distributed generation is the vast difference in the technology, location, size, connection sequence, and protection scheme requirements which results in future DG network planning inadequacies – The Network DG Planning Dilemma. To determine the amount of DG to connect to the network, a detailed analysis is required which often involves the use of a simulation tool such as DIgSILENT to model the entire network and perform load flow studies. Modelling networks on DIgSILENT is relatively easy for simple networks but becomes time-consuming for complex, large, and real networks. This brings about a limitation to this method, planning inadequacies, and longer connection approval periods. Thus, there is a need for a fast but accurate system-wide tool that can assess the amount of DG that can be connected to a network. This research aims to present a technique used for calculating protection-based DG penetration limits on MV networks and develop a model to determine medium voltage opportunity network maps. These maps indicate the maximum amount of DG that can be connected to a network without the need for major protection scheme changes in South Africa. The approach to determining protection-based penetration limits is based on supervised machine learning methods. The aim is to rely on protection features present in the distribution network data i.e. fault level, Inverse Definite Minimum Time (IDMT) curve, pick-up current settings, Time Multiplier Settings (TMS), calculated relay operating times and relay positions to see how the network responds at certain DG penetration levels (‘actual' relay operating times). The dataset represents carefully anonymized distribution networks with accepted protection philosophy applied. A supervised machine learning algorithm is applied after nontrivial data pre-processing through recommendation systems and shuffling. The planning dilemma is cast into three parts: the first part is an automated pattern classification (logistic regression for classification of protection miscoordination), the second part involves regression (predicting operating time after different levels of DG penetration), and the last part involves developing a recommendation system (where, when and how much photovoltaic (PV) DG will be connected). Gradient descent, which is an optimisation algorithm that iterates and finds optimal values of the parameters that correspond to the local or global minimum values of the cost function using calculus was used to measure the accuracy of each model's hypothesis function. The cost function (one half mean squared error) for the models that predict ‘actual' relay operating times before DG penetration, at 35%, 65%, and 75% DG penetration converged to values below 120, 20, 15, and 15 seconds2 , respectively, within the first 100 iterations. A high variance problem was observed (cross-validation error was high and training error was low) for the models that used all the network protection features as inputs. The cross-validation and training errors approached the desired performance of 0.3±0.1 for the models that had second-order polynomials added. A training accuracy of 91.30%, 73.91%, 82.61%, and a validation accuracy of 100%, 55.56%, 66.67% was achieved when classifying loss of coordination, loss of grading and desensitization, respectively. A high bias problem was observed (cross-validation error was high and training error was high) for the loss of grading classification (relay positions eliminated) model. When the models (horizontal network features) were applied to four MV distribution networks, loss of coordination was not predicted, the loss of grading model had one false positive and the de-sensitization model had one false negative. However, when the results were compared to the vertical analysis (comparing the operating times of upstream and downstream relays/reclosers), 28 points indicated a loss of coordination (2 at 35%, 1 at 65% and 25 at 75% DG penetration). Protection coordination reinforcements (against loss of grading and desensitization) were found to be a requirement for DG connections where the MV transformer circuit breaker TMS is between 0.5 and 1.1, and where the network fault level is between 650 and 800A. Distribution networks in affluent neighbourhoods similar to those around the Western CapeSomerset West area and Gauteng- Centurion area need to be reinforced to accommodate maximum DG penetration up to the limit of 75% of the After Diversity Maximum Demand (ADMD). For future work, the collection of more data points (results from detailed analytical studies on the impact of DG on MV feeders) to use as training data to solve the observed high variance problem is recommended. Also, modifying the model by adding upstream and downstream network features as inputs in the classification model to solve the high bias problem is recommended.
410

Essential Healthcare Services and Cloud Computing

Hourani, Osama January 2021 (has links)
Like many organizations, critical infrastructures and essential services are adopting cloud computing. The many benefits are however clouded with security concerns. These types of organizations and services are associated with severe societal and individual consequences from failures or incidents. They are naturally subject to strict regulations and requirements. Even if critical and essential services are adopting and utilizing cloud computing, organizations hesitate due to unsolved challenges with cloud computing for critical and essential services. To mitigate such unnecessary impediments and to enhance secure Health-CC, there is a need for an exploration of existing solutions for Health-CC, as well as investigating gaps, to provide improving considerations. To address this problem, the thesis investigated existing challenges and solutions for cloud computing security, regarding cloud computing within essential healthcare. Here, called “Health-CC”, and encompasses settings and processes where cloud computing is highly involved and where system, assets, and data protection are intensively actualized. The research question required the author to identify cloud computing challenges, thematize related solutions, patterns, gaps, and laying a basis for a well-based discussion on possible improving considerations – from a pertinent critical infrastructure protection perspective, for essential healthcare services. The chosen research question necessitated a problem-driven mixed methods approach, where a systematic literature review was utilized for the overall research guidance and selection procedures. Selection criteria were formulated to capture the mentioned Health-CC security settings. An integrated traditional literature review was added for the purpose of the scientific base. At the analysis level, the mixed methods approach facilitated a thematic synthesis analysis – to identify themes, patterns, and gaps or shortcomings, as well as lay the basis for following discussion of improving security considerations. Three solution groups were identified: specific techniques, software architecture, and assessment models. Further analysis of their solution types from a pertinent critical infrastructure protection perspective, identified multiple patterns: from recurring techniques or administrative components, targeted security issues, Health-CC environment focus, framework coverage, to the type of aspects and perspectives involved. This resulted in general patterns of solution components and perspectives, although revealing several shortcomings and possible improving considerations for enhanced Health-CC security: explicit critical infrastructure protection perspective; focus on continuity aspects; multi-party and multi-actor nature of Health-CC arrangement deserves more focus; system protection emphasis; availability concept and deterring properties highly considered; cloud environment specified when possible; data protection concerns only crucial and sensitive data required by law. Its conclusions on the exploration of solutions as well as improving considerations contribute to the HealthCC security field, to a satisfying degree.

Page generated in 0.0775 seconds