• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1189
  • 356
  • 274
  • 60
  • 50
  • 44
  • 34
  • 32
  • 19
  • 18
  • 18
  • 10
  • 8
  • 8
  • 8
  • Tagged with
  • 2445
  • 926
  • 881
  • 175
  • 175
  • 174
  • 167
  • 152
  • 150
  • 147
  • 137
  • 128
  • 123
  • 120
  • 112
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Farm and non-farm sources of income : rural livelihood diversification in Malawi

Kutengule, Milton January 2000 (has links)
No description available.
122

Ethnic identities in action : the experience of Turkish young people in London

Yalcin, Cemal January 2000 (has links)
No description available.
123

The molecular characterisation and rapid detection of methicillin-resistant Staphylococcus aureus

Rettberg, Jill Walker January 2000 (has links)
No description available.
124

Agriculture under the Doha Round and food security in Sub-Saharan Africa.

Hailu, Martha Belete January 2005 (has links)
The objectives of the research was to critically analyse arguments for and against agricultural trade liberalization and its impact on food security, investigating the nexus between the three pillars of agriculture and food security, considering how the Agreement on Agriculture and the Food Aid Convention addressed the concerns that were raised by the different parties during the negotiation period, and finally it considered how the current multilateral negotiations in agriculture can provide a secure framework within which developing African countries can pursue effective policies to ensure their food security.
125

African military intervention in African conflicts: an analysis of military intervention in Rwanda, the DRC and Lesotho.

Likoti, Fako Johnson January 2006 (has links)
<p>The dissertation examines three military interventions in Sub-Saharan Africa which took place in the mid and late 1990s in Rwanda, the DRC and Lesotho. These interventions took place despite high expectations of international and regional peace on the part of most analysts after the collapse of cold war in 1989. However, interstate and intrastate conflicts re-emerged with more intensity than ever before, and sub-Saharan Africa proved to be no exception.</p> <p><br /> The study sets out to analyse the motives and/or causes of military interventions in Rwanda in 1990, the DRC in 1996-7, and the DRC military rebellion and the Lesotho intervention in 1998. In analysing these interventions, the study borrows extensively from the work of dominant security theorists of international relations, predominantly realists who conceptualise international relations as a struggle for power and survival in the anarchic world. The purpose of this analysis is fourfold / firstly, to determine the reasons for military interventions and the extent to which these interventions were conducted on humanitarian grounds / secondly, to investigate the degree to which or not intervening countries were spurred by their national interests / thirdly, to assess the roles of international organisations like Southern African Development Community (SADC), the Organisation of African Unity (OAU) and the United Nations, in facilitating these interventions / as well as to evaluate the role of parliaments of intervening countries in authorising or not these military interventions in terms of holding their Executives accountable. In this context, the analysis argues that the intervening countries / Angola, Botswana, Burundi, Chad, Namibia, Rwanda, Sudan, South Africa, Uganda and Zimbabwe appeared to have used intervention as a realist foreign policy tool in the absence of authorisation from the United Nations and its subordinate bodies such as the OAU and SADC.</p>
126

Autoritätskonzept und Autoritätswandel in Ghana, Nigeria and Uganda

Mensah, Augustine Kobina Ebow, January 1970 (has links)
Inaug.-Diss.--Munich. / Vita. Bibliography: p. 277-295.
127

The role of political behavior and socio-economic development in the transition and consolidation of liberal democracy in Sub Saharan Africa

Wachira, Godfrey. January 2004 (has links)
Thesis (M.A.)--Duquesne University, 2004. / Title from document title page. Abstract included in electronic submission form. Includes bibliographical references (p. 77-81) and index.
128

Breakthrough of indicator organisms from slow sand filters as part of a drinking water production system for Sub-Saharan Africa

Ba, Sidy. January 2008 (has links) (PDF)
Thesis (MS)--Montana State University--Bozeman, 2008. / Typescript. Chairperson, Graduate Committee: Warren L. Jones. Includes bibliographical references (leaves 42-45).
129

Australia's foreign policy towards Sub-Saharan Africa 1972-96 /

Osei-Amo, Yaw. January 2004 (has links) (PDF)
Thesis (Ph.D.) - University of Queensland, 2004. / Includes bibliography.
130

Coping With Delays And Hazards In Buses And Random Logic In Deep Sub-Micron

Skoufis, Michael N. 01 January 2009 (has links)
A new data capturing technique for a potentially coupled bus of lines is proposed that always accommodates fast operation. The proposed method utilizes multiple reference voltages available within a line's receiving logic and the initial conditions of the involved wires in order to determine early and accurately the transmitted data in the current cycle. The presented data reading technique rarely requires repeater insertion and it can considerably accelerate signal propagation. The introduced logic at the receiver-end of a victim wire entails an affordable area overhead. Experimental results are given in the 65nm CMOS process for interconnects of various lengths. An architecture is proposed that allows for data reading with fault detection capability on lines which are likely to operate under a potentially wide range of capacitive coupling. In order to develop such a methodology, multiple reference or threshold voltages in the receiving logic of the lines are considered instead of typically one. The proposed technique utilizes the additional reference voltages to evaluate whether an intermittent fault has occurred during the capture of the transmitted data. Some combinational logic is introduced on the receiver side to accomplish this task. The mechanism is initially illustrated on a line with one adjacent aggressor. Subsequently, the case of a line with two adjacent aggressors is discussed and it is shown how to generalize the technique for wide buses. In this work the efficiency of the detection mechanism is evaluated for both single and multiple faulty occurrences. A novel circuit to treat crosstalk induced glitches on local interconnects is presented. Design irregularities and manufacturing defects on wires may result in spurious electrical events that impact the reliability of the interconnect infrastructure. The proposed methods act by dynamically adjusting the threshold voltage of the receiving gate on the victim line. The proposed technique can be used in combination with encoding algorithms on data buses. A comparative study in the 180nm CMOS process is presented that supports the applicability of the approach. Transient faults due to radiation have become increasingly observable in combinational logic. This is due to the weakening of inherent protective mechanisms that logic traditionally held against such flawed spurious events. Further boosting of such effects is increasingly probable due to the interaction of transients appearing at the inputs of logic gates. Such multiple instances of transients can arise either because of re-convergent circuit paths or because of significant reduction in the critical charge of modern technologies. The latter, in particular, makes more than one circuit nodes susceptible to the same high energy ions. A static transient propagation is employed to address possible transient interaction and to compute its worst-case effects in logic. The quantified effects of interest are the maximum duration and slope of the resulting hazards at the circuit outputs. A hardening methodology is also proposed to protect combinational logic from such events. For this purpose, filtering circuits are inserted in logic and several placement algorithms are developed and evaluated.

Page generated in 0.0298 seconds