• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 84
  • 29
  • 22
  • 12
  • 11
  • 9
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 205
  • 52
  • 25
  • 21
  • 20
  • 19
  • 18
  • 18
  • 17
  • 17
  • 17
  • 15
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Modul elektrické zabezpečovací ústředny s komunikátorem Ethernet / Module of electronic security central with Ethernet communicator

Strašil, Ivo January 2010 (has links)
This diploma thesis deals with a design of a burglar alarm control panel, equipped with an Ethernet interface. The thesis contains a discusson of present solutions of control panels and of present usage of Ethernet communication. An idea of sensors, directly connected to LAN, was discarded on basis of a component price survey. Finally, a new concept of the panel has been chosen. This concept allows a free definition of internal logic using a C-like scripting and provides a possibility to create a network of these panels in a LAN network, using a software-only supervising main control panel. A new control panel following this concept was designed and succesfully tested.
52

Risikobetrachtung für den Asphaltaus- und -einbau im Grenzbereich zum fließenden Kraftfahrzeugverkehr unter Berücksichtigung der Standardarbeitsverfahren und Arbeitsmittel

Krell, Klaus-Michael 01 October 2020 (has links)
Jeden Tag sind auf Straßenbaustellen in Deutschland unzählige Versicherte der BG BAU durch den fließenden Straßenverkehr gefährdet. Zirka eineinhalb Jahren nach Inkraftsetzung der Regel für Arbeitsstätten ASR A 5.2 erfolgt eine Auswertung über die Umsetzung dieser Regel - hierbei soll speziell der Asphaltaus- und -einbau betrachtet werden. Ist der Mitgänger neben der Asphaltfräse bzw. neben dem Asphaltfertiger im Grenzbereich zum fließenden Verkehr tätig, so ist dieser beson-ders gefährdet. Das Ziel dieser Masterarbeit ist zum einen zu ermitteln, welche Standardarbeitsverfahren im As-phaltaus- und - einbau in der Regel für Arbeitsstätten nicht beschrieben sind. Für diese soll dann eine Tätigkeitsanalyse und Risikobetrachtung gemacht werden. Hierbei ist festzustellen, dass für den Einbau von bituminösen Asphalttragschichten im Handeinbau die größte, bisher nicht aufge-führte freie Bewegungsfläche benötigt wird. Zum anderen wird der Mitgängerbetrieb neben der Aspahltfräse bzw. dem Asphaltfertiger betrachtet. Dazu werden die folgenden Forschungsfragen gestellt. - Welche Aufgaben nimmt der Mitgänger bei seiner Tätigkeit wahr? - Wieviel Zeit verbringt der Mitgänger am Aussenbedienstand eines Straßenfertigers im Lauf einer Arbeitsschicht? - Welche technischen und organisatorischen Möglichkeiten gibt es die freie Bewegungsfläche und den seitlichen Sicherheitsabstand zu reduzieren? - Welche technischen und organisatorischen Möglichkeiten gibt es, den Mitgängerbetrieb überflüssig zu machen oder auf ein Minimum zu beschränken? Um die Forschungsfragen zu beantworten, ist neben Literaturrecherchen und Experteninterviews, eine deutschlandweite Befragung von Beschäftigten auf Straßenbaustellen durchgeführt worden. Die Befragten stellen im großen Umfang fest, dass es durch das in Kraft setzen der Regel für Arbeitsstätten Verbesserungen im Bereich des Arbeitsschutzes gegeben hat, diese aber eher im Bereich von Bundesfernstraßen zum Tragen kommen.
53

Efficient Fully Homomorphic Encryption and Digital Signatures Secure from Standard Assumptions / 標準仮定の下で安全で効率的な完全準同型暗号とディジタル署名

Hiromasa, Ryo 23 March 2017 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(情報学) / 甲第20511号 / 情博第639号 / 新制||情||111(附属図書館) / 京都大学大学院情報学研究科社会情報学専攻 / (主査)教授 石田 亨, 教授 中村 佳正, 教授 岡部 寿男, 岡本 龍明 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
54

Vad utgör risken, egentligen? : En diskursanalys av kommunala risk- och sårbarhetsanalyser

Fäldt, Maja, Petersson, Josephin January 2022 (has links)
I denna studie undersöks diskursiva mönster i kommunala risk- och sårbarhetsanalyser. Syftet med studien var att problematisera risk- och sårbarhetsanalysens självklara roll inom svensk risk- och krishantering samt bidra med kunskap om hur risker framställs och vilka maktstrukturer som existerar i policydokument. Studien har genomförts med hjälp av What’s the problem represented to be? – ansatsen, vilket är ett diskursanalytiskt ramverk för att studera policydokument. Analysen har genomförts på 21 kommunala risk- och sårbarhetsanalyser från år 2019. I resultatet uppmärksammas och problematiseras följande diskurser; (1) den kalkylerbara och objektiva synen på risk, (2) hur avsaknaden av fantasiplanering begränsar analysen, (3) hur klimatrelaterade risker transformeras till nationella osäkerheter, (4) hur det skyddsvärda subjektet framställs, (5) hur vissa risker omgärdas av politiska ställningstaganden och därmed hur policydokumentet skapar och reproducerar makt och kunskap. Genom att kartlägga diskursiva mönster bidrar studien till ökad kunskap om risk- och sårbarhetsanalyser. Studiens slutsats påvisar att risk- och sårbarhetsanalysens självklara och objektiva ställning bör ifrågasättas och problematiseras ytterligare i framtida forskning. / <p>2022-06-13</p>
55

RSA authentication in Internet of Things : Technical limitations and industry expectations / RSA-autentisering i Sakernas Internet : Tekniska begränsningar och industrins förväntningar

Jonsson, Fredrik, Tornkvist, Martin January 2017 (has links)
The objective of this thesis is to evaluate if it is possible to run RSA authentication in a specified scenario. A Raspberry Pi with a limited CPU is used to simulate a low-performance device. A series of tests on this device shows that it is not possible to run RSA authentication in the provided scenario.A survey conducted on IT-professionals shows that there is a strong belief that this is possible. The results shows that there is a disparity between the tested RSA performance and the perception in the industry. However since ambiguity exists in the scenario it is hard to draw conclusions about the results. / Syftet med den här uppsatsen är att utvärdera om det är möjligt att använda RSA autentisering i ett specificerat scenario. En Raspberry Pi med begränsad CPU används för att simulera en enhet med låg prestanda. Ett antal tester med den här enheten visar att det inte är möjligt att använda RSA autentisering i det givna scenariot. En enkät utgiven till anställda inom IT-branschen visar att det finns en stark uppfattning om att detta är möjligt. Resultatet visar att det finns en avvikelse mellan den testade RSA prestandan och uppfattningen inom branschen. Det existerar dock otydligheter i scenariot vilket gör det svårt att dra slutsatser om resultatet.
56

RSA, Public-Key Cryptography, and Authentication Protocols

Wright, Moriah E. 11 June 2012 (has links)
No description available.
57

The Maternal Force Awakens Emerging Fear Reactivity and Regulation: Preliminary Results from the Baby JEDI Study

Phillips, Jennifer Julia 17 May 2024 (has links)
Fear is an adaptive emotion that typically increases across infancy to help keep infant exploration in check. Too much fear, however, can become maladaptive and lead to psychopathology later in childhood. Thus, it is important to understand how both fear reactivity and regulation develop early in life in order to identify at-risk children early on. Maternal factors, such as parenting behaviors and personality, are associated with both fear reactivity and regulation, but results have been mixed, possibly due to a trait-based approach to assessing maternal personality. The goal of my dissertation was to examine the growth trajectories of fear reactivity and regulation across infancy and toddlerhood both unconditionally and within the contexts of maternal parenting and personality functioning. Infants and mothers were assessed when infants were 10-months (n = 48), 14-months (n = 42), and 18-months (n = 34) old. At each age, infant fear reactivity was assessed using behavioral coding during the Laboratory Temperament Assessment Battery fear tasks and infant fear regulation was examined via respiratory sinus arrhythmia reactivity during the fear tasks. At 10- and 14-months, maternal parenting behaviors were coded during an interaction task and maternal personality functioning was assessed via maternal self-report. Hierarchical linear modeling demonstrated that maternal personality functioning moderated the association between maternal affect and infant fear reactivity growth and maternal personality functioning moderated the association between maternal directiveness and infant fear regulation growth. These results aid in the understanding of how maternal factors relate to infant fear development. / Doctor of Philosophy / Fear is an adaptive emotion that increases across infancy to help keep infants safe as they gain the ability to explore their environments independently. Some infants, however, exhibit heightened levels of fear that set them on a path for negative consequences, like anxiety disorders, in childhood. This typically occurs when infants have high levels of fear without appropriate regulation strategies to manage such. Maternal factors, like parenting behaviors and personality, have both been shown to affect the development of fear and the regulation of fear, but results are not consistent. Given this, the goal of my dissertation was to examine how level of fear (fear reactivity) and management of fear (fear regulation) develop across infancy and toddlerhood under the context of maternal parenting and personality. Infants and mothers were assessed when infants were 10-months (n = 48), 14-months (n = 42), and 18-months (n = 34) old. At each age, infant fear reactivity was assessed using behavioral coding during the Laboratory Temperament Assessment Battery fear tasks and infant fear regulation was examined via physiological means based on heart rate. At 10- and 14-months, maternal parenting behaviors were coded during an interaction task and maternal personality functioning was assessed via maternal self-report. Results demonstrated that maternal personality functioning moderated the association between maternal affect and infant fear reactivity development and maternal personality functioning moderated the association between maternal directiveness and infant fear regulation development. These results aid in the understanding of how maternal factors relate to infant fear development.
58

Analyse théorique et empirique de la théorie de la recherche d'emploi : un essai de modélisation du Revenu de Solidarité Active / Empirical and theorical analysis of job search theory : essai of modeling the french Active Solidarity Income

Talarowski, David 24 June 2011 (has links)
Cette thèse présente le modèle de recherche d’emploi en partant du modèle élémentaire pour aboutir à un modèle destiné à analyser les mécanismes d’incitation à la reprise d’emploi. Le mécanisme analysé est celui du Revenu de Solidarité Active. La première partie sert à mettre en place les éléments théoriques nécessaires aux modèles de la seconde partie. On part du modèle élémentaire en élargissant le débat aux modèles plus complexes et moins restrictifs en termes d’hypothèses. Cette partie est ponctuée d’analyses empiriques effectuées sur les données de l’Enquête emploi de 2006. La seconde partie tente d’analyser les effets du RSA sur le comportement de recherche des travailleurs à bas niveau de qualification dans le cadre du modèle de recherche d’emploi en utilisant les méthodes de simulations numériques calibrées sur l’Enquête emploi pour obtenir des résultats. / This thesis presents the job-search model, starting from the elementary model to reach a model analyzing mechanisms designed to enhance employment recovery. This study concerns the French active solidarity income mechanism (Revenu de Solidarité Active or RSA). The first part will allow us to implement the theoretical elements we will need in the second part. In the first part, we will start with the elementary model, and then widen the debate to more complex models and less restrictive assumptions. We will punctuate this part with empirical analysis based on the 2006 employment survey data. The second art is aimed at analyzing the effects of the RSA on the job search behavior of workers, especially those with low levels of ualification. We will use numerical simulation methods calibrated on the employment survey in order to achieve results.
59

Kommunal krisberedskap : Hur övar kommunerna krisberedskap? / Local government crisis management in Sweden : How is crisis management put into action by Swedish local government?

Thörn, Anders, Johansson, Björn January 2019 (has links)
Risk- och sårbarhetsanalys (RSA) är ett verktyg som kommuner och landsting enligt lag skall göra. Dessa RSA ska sedan ligga till grund för en utbildnings- och övningsplan. På så sätt kommer de övningar som genomförs på kommunal och länsnivå fokuseras på omhändertagande av dess risker och sårbarheter.Myndigheten för samhällsskydd och beredskap, MSB, gjorde 2018 en utvärdering och fann att inte alla övar på sina risker och sårbarheter men att det var oklart hur många de var. Denna studie ger en bild av vad kommuner väljer att öva på i sina årliga krisberedskapsövningar om de inte övar på att hantera sina risker och sårbarheter. För att svara på frågan har juridiska dokument analyserats samt intervjuer genomförts med representanter för Myndigheten för samhällsskydd och beredskap samt säkerhetscheferna vid två kommuner.Studiens slutsats är att kommunerna dels tar krisberedskapsarbetet på stort allvar, men att brister i spårbarhet mellan RSA och utbildnings- och övningsplan medför att man inte övar på sina risker och sårbarheter. Studiens resultat är fem hypoteser som skulle kunna användas vid efterkommande forskning. / Risk and Vulnerability Analysis (RSA) is a tool that municipalities and county councils must do according to law. The RSA will then form the basis of a training and exercise plan. In this way, the exercises that are carried out at municipal and county level will be focused on dealing with these risks and vulnerabilities.The Swedish Civil Contingencies Agency, the MSB, made an evaluation in 2018 and found that not all were practising risks and vulnerabilities, but it was unclear how many they were. This study gives a picture of what municipalities choose to practice in their annual emergency preparedness exercises if they do not practice managing risks and vulnerabilities. In order to answer the question, legal documents have been analyzed and interviews have been conducted with representatives of the Swedish Civil Contingencies Agency and the security managers at two municipalities.The study's conclusion is that the municipalities take the emergency preparedness work very seriously, but that deficiencies in traceability between the RSA and the education and training plan mean that they do not practice risks and vulnerabilities. The study's results are five hypotheses that could be used in subsequent research.
60

Reconstrução da chave secreta do RSA multi-primo / Reconstructing the secret key of RSA multi-prime

Caceres Villena, Reynaldo 23 September 2013 (has links)
Em 2009, N. Heninger e H. Shacham apresentaram um algoritmo de reconstrução que permite recuperar a chave secreta sk do criptossistema RSA básico em tempo polinomial tendo em forma aleatória 27 % dos seus bits. Sabemos que podemos obter uma versão com erros (bits modicados) da chave secreta RSA graças aos ataques cold boot. O algoritmo apresentado por Heninger-Shacham corrige esses erros fazendo uso das relações matemáticas que existe entre as chaves pública e secreta do criptossistema RSA básico. O objetivo deste trabalho é estudar esse algoritmo para implementar e analisar seu análogo para o criptossistema RSA multi-primo. Os resultados obtidos mostram que para reconstruir a chave secreta sk do criptossistema RSA u-primos é preciso ter uma fração de bits corretos maior a 2 - 2^((u+2)/(2u+1)), mostrando assim que a segurança oferecida pelo criptossistema RSA multi-primo (u>/ 3) é maior com relação ao criptossistema RSA básico (u = 2). / In 2009, N. Heninger and H. Shacham presented an algoritm for reconstructing the secret key sk of the basic RSA cryptosystem in polynomial time With a fraction of random bits greater or equal to 0.27 of its bits. We know that secret key with errors sk can be obtained from DRAM using cold-boot attacks. The Heninger and Shacham\'s algorithm xes these errors using the redundancy of secret and public key of basic RSA cryptosystem. In this work, the topic is to study this algoritm to implement and analyze its analogous for the multi-prime RSA cryptosystem. Our obtained results show the secret key sk of multi-prime RSA cryptosystem can be Reconstructed having a fraction equal or greater than 2 - 2^((u+2)/(2u+1)) of random bits. therefore the security of multi-prime RSA cryptosystem (u >/ 3) is greater than basic RSA cryptosystem (u = 2).

Page generated in 0.0155 seconds