• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 57
  • 8
  • 6
  • 6
  • 4
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 198
  • 198
  • 198
  • 55
  • 35
  • 34
  • 32
  • 22
  • 21
  • 20
  • 18
  • 18
  • 17
  • 17
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Inside the Tent: An In-Depth Analysis on Refugee Camps Through a Science, Technology, and Society Perspective

Shenoi, Sonia 01 January 2017 (has links)
Currently, over 65 million people around the world have been forced from their homes; among them are nearly 21 million refugees. Thus, the discussion of refugees and refugee camps on a global scale is ever more salient given the recent heightened attention to the global crises. This thesis uses an interdisciplinary Science, Technology, and Society (STS) approach to analyze the United Nations High Commissioner for Refugees (UNHCR) policies, refugee camps, and their implication in the greater society.
42

The Frontiers of Technology in Warhead Verification

Toivanen, Henrietta N 01 January 2017 (has links)
How might new technical verification capabilities enhance the prospects of success in future nuclear arms control negotiations? Both theory and evidence suggest that verification technologies can influence the dynamics of arms control negotiations by shaping and constraining the arguments and strategies that are available to the involved stakeholders. In the future, new technologies may help transcend the specific verification challenge of high-security warhead authentication, which is a verification capability needed in future disarmament scenarios that address fewer warheads, limit new categories of warheads, and involve nuclear weapons states other than the United States and Russia. Under these circumstances, the core challenge is maintaining the confidentiality of the classified information related to the warheads under inspection, while providing transparency in the verification process. This analysis focuses on a set of emerging warhead authentication approaches that rely on the cryptographic concept of zero-knowledge proofs and intend to solve the paradox between secrecy and transparency, making deeper reductions in warhead arsenals possible and thus facilitating future nuclear arms control negotiations.
43

Nuclear Risk and Rationality: Reevaluating Rational Decision Making through the Lens of Tohoku’s Nuclear Evacuees

James, Kayon K 01 January 2017 (has links)
The purpose of this paper is the examination of previous STS-based frameworks for rational risk evaluation and the role of Fukushima residents as co-creators of new technical codes in safety and risk. To accomplish this task, the causes of nuclear refugees’ uncertainty and distrust towards the industry and the applicability of frameworks for scientific proceduralism and democratic rationalization by Kristin Shrader-Frechette and Andrew Feenberg to this issue will be discussed.
44

Development of a Reflexive Modernization Theoretical Perspective to Predict Indiana Residents’ Perceptions of Emergent Science and Technology

Kami J. Knies (5930702) 14 August 2019 (has links)
The current research uses mail survey methodology to measure Indiana residents’ perceived optimism that emergent science and technologies will be beneficial to them and their families. A structured questionnaire was developed specifically for use in this study. After field-testing, the questionnaire was mailed to 4,500 Indiana households through a stratified random sampling design. Up to three contacts were made with subjects, resulting in receipt of usable responses from 1,003 households, or a 26% response rate.
45

Epidemic orientalism: social construction and the global management of infectious disease

White, Alexandre 27 November 2018 (has links)
This dissertation examines how certain epidemic outbreaks become "global threats", that is, diseases that become the focus of international regulations and organized responses while others do not. To answer this question, this dissertation draws upon archival data collected at the World Health Organization (WHO) archives in Geneva, the Western Cape Archives in Cape Town, the British Library, British National Archives, the Wellcome Library Archives in London, and twelve qualitative interviews with senior global health actors in order to analyze five cases when disease threats were prioritized internationally as well as how these constructions patterned responses to outbreaks. I begin by exploring the formation of the first international disease controls in the 19th century, the International Sanitary Conventions, created to prevent the spread of three diseases- plague, cholera and yellow fever. I probe how these earliest conventions patterned responses to diseases covered under them and limited responses to those beyond their scope. Examining how these conventions transformed, I explore why the same disease priorities were maintained by the WHO in their International Sanitary Regulations of the 1950's. Finally, I analyze the transformation of the International Health Regulations in 2005 and its effects on the assessment of disease threat. This dissertation shows that three factors structure the construction of disease threat: epidemic orientalism, economic concerns and field dynamics. Epidemic Orientalism, a discourse motivating the construction of disease threat that first emerged in the 17th, 18th and 19th centuries, positioned the colonized world as the space from which Europe and the Imperial powers needed to be protected. This orientalist gaze prioritizes the control of diseases emanating from colonial sites that threaten international trade and commerce and has been re-inscribed in all past and present regulations. These factors explain how and why plague, cholera and yellow fever came to be maintained as the primary diseases of international concern until the 21st century. As the WHO has recently been challenged in its authority to manage disease threats, these two factors are also mediated by the WHO's manipulation of symbolic power within a new field of infectious disease management which conditions responses to outbreaks today.
46

In Situ Analysis of Void Formation at the Flow Front in RTM

Burton, Perry August 01 June 2018 (has links)
The purpose of this research is to empirically investigate flow front void formation rates and post-formation bubble mobility behavior for composites produced via resin transfer molding (RTM).For this study, in situ observation of bubble formation and migration was accomplished by photographing resin flow progression during infusion tests of carbon reinforcements. An analysis strategy for use in batch processing sequential image sets is presented. The use of MATLAB to process and analyze binary images of infusions for void content has garnered satisfactory results and has shown that analysis of progressive image sequences can greatly enrich the volume of in situ measurements for a given study without compromising the data quality.Semi-automated MATLAB software analysis employed the representative image area (RIA) method to evaluate v0. It was found that the shorter the RIA length, and the more it follows the true flow front shape, the more representative the measured v0 was of the void formation at the flow front.Experimental evidence of in situ bubble formation and mobility behavior is presented. Stitch architecture of NCF reinforcements is shown to influence bubble formation at the flow front. Bubble mobility mechanisms (such as escape and entrapment) are related to stitch orientation relative to the fluid flow direction. Different stitching orientations exhibited different effects on post-formation mobility.Void formation is presented as a function of flow front velocity. Despite differences in preform configurations (stitch orientation with respect to flow) and injection flowrates, bubbles seem to form in a similar fashion for the 3 infusions of carbon fiber NCF reinforcement analyzed in this study. It is observed that bubbles form at stitch lines, regardless of stitch orientation.Bubble migration is documented for infusion of NCF reinforcement with stitching at different orientations. Qualitative observations of bubble migration during infusions of a dense preform of STW, plain weave fabric are discussed. Recommendations are given for future studies involving image-based analysis of in situ bubble formation and migration.
47

The Feasibility of Augmenting a Fixed-Gap Bobbin Friction Stir Welding Tool with Cutters to Join Enclosed Castings

Christensen, Adam Baxter 01 June 2018 (has links)
Bobbin Friction Stir Welding (BFSW) is a new application of Friction Stir Welding (FSW) that can be used to join materials together with little to no axial forces. This eliminates the need of a backplate or anvil needed to apply counter pressure against the tool. The applications of BFSW are growing every day. This new technology is helping the automotive industry and many other industries join materials more effectively and efficiently. This technology can be used to join materials with high strength to weight ratios to make cars lighter to increase fuel efficiency. This will also greatly reduce the cost of current joining technologies.The purpose of this research is to prove the feasibility of augmenting a BFSW tool with cutters to join enclosed castings while simultaneously removing ribs and variations in thickness by (1) penetrating a BFSW tool into the material away from an edge; (2) removing any inconsistencies in the material thickness while maintaining a weld; and (3) removing a BFSW tool from the casting away from an edge leaving a clean exit hole without destroying either the casting or the tool.
48

A Framework for the Performance Analysis and Tuning of Virtual Private Networks

Perez, Fridrich Shane 01 June 2018 (has links)
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter of pick and choose. This study is dedicated to developing a unique process-testing framework for personal devices by comparing the default security encryptions of different VPN architectures to the Federal Information Processing Standards (FIPS) set of complying encryptions. VPN architectures include a vendor-supplied VPN, Palo Alto Networks, open-sourced OpenVPN application, and a Windows PPTP server to test security protocols and measure network speed through different operating platforms. The results achieved in this research reveal the differences between the default security configurations and the encryption settings enforced by FIPS, shown through the collected averaged bandwidth between multiple network tests under those settings. The results have been given additional analysis and confidence through t-tests and standard deviation. The configurations, including difficulty in establishing, between different VPNs also contribute to discovering OpenVPN under FIPS settings to be favorable over a Palo Alto firewall using FIPS-CC mode due to higher bandwidth rate despite following the same encryption standards.
49

Isolation of Temporary Storage in High Performance Computing via Linux Namespacing

Satchwell, Steven Tanner 01 June 2018 (has links)
Per job isolation of temporary file storage in High Performance Computing (HPC) environments provide benefits in security, efficiency, and administration. HPC system administrators can use the mount_isolation Slurm task plugin to improve security by isolating temporary files where no isolation previously existed. The mount_isolation plugin also increases efficiency by removing obsolete temporary files immediately after each job terminates. This frees valuable disk space in the HPC environment to be used by other jobs. These two improvements reduce the amount of work system administrators must expend to ensure temporary files are removed in a timely manner.Previous temporary file removal solutions were removal on reboot, manual removal, or removal through a Slurm epilog script. The epilog script was the most effective of these, allowing files to be removed in a timely manner. However, HPC users can have multiple supercomputing jobs running concurrently. Temporary files generated by these concurrent or overlapping jobs are only deleted by the epilog script when all jobs run by that user on the compute node have completed. Even though the user may have only one running job, the temporary directory may still contain temporary files from many previously executed jobs, taking up valuable temporary storage on the compute node. The mount_isolation plugin isolates these temporary files on a per job basis allowing prompt removal of obsolete files regardless of job overlap.
50

Parent Reciprocal Teaching: Comparing Parent and Peer Reciprocal Teaching in High School Physics Instruction

Welling, Jonathan Jacob 01 June 2018 (has links)
Effective strategies are needed to help parents become more involved in the education of their teenage children. Parent Reciprocal Teaching (PRT) is proposed as an effective strategy to increase parent involvement and help students increase academic performance. 120 students in a 10th-grade high school physics course participated in either the PRT homework assignments or traditional reciprocal teaching (TRT) assignments. The PRT homework assignments required students to teach their parents/guardians at home, while the TRT assignments required students to teach a peer during class time. Data was collected though test scores and surveys sent home to parents and students. Findings indicate that (1) PRT very comparable, and in some instances, better than TRT in its academic benefit, (2) resulted in parents feeling more involved in their child's education, (3) parents were more aware of what their child was learning and more mindful of how well their child understood the course content. It is suggested that more educators incorporate the practice of PRT so that students can benefit from the effect of increased parent involvement as found in other studies on parent involvement: stronger academic achievement, improved school attendance and behavior, more positive perceptions of school and self, and higher educational aspirations.

Page generated in 0.0986 seconds