• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 26
  • 25
  • 7
  • 6
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 79
  • 79
  • 32
  • 22
  • 13
  • 11
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Les changements de la politique de santé en Suède : Comparés avec la politique de santé en France, avec l'exemple de l'indemnité journalière

Olofsson, Louise January 2009 (has links)
After the elections in 2006 there was a change of government in Sweden, when the Moderate Party with the right block took over the power from the Social democrats. The politics of the new government is more liberal than the politics of the Social democrats, which implied several changes of the Swedish social security system, in particular some important changes of the sickness benefit. The objective of this essay has been to examinate the changes of the system, as well as the reasons for the changes, and also to compare the system in Sweden to the one in France, who has another structure. The methods used are archive and corpus crossings in terms of collecting information from literature and websites of the social insurance offices in Sweden and in France. Further a qualitative method has been carried out in shape of an interview with the administrative official responsible of the sickness benefit at the social insurance office in Växjö. The result has shown that there are several reasons for the changes in the Swedish system. It seems as if the most important reason is the big number of individuals on the sick-list which causes economical problems, since the employment rate is too low compared to the retired quotient of the population. The economical crises might have an influence on the changes of the systems, but not the present recession. Despite the rather big changes from a social system towards a more liberal one, the Swedish scheme has still kept its basic characteristics. / En 2006, la Suède a eu un changement de gouvernement. Les sociaux-démocrates ont été remplacés par l'alliance entre les partis à droite. Le nouveau gouvernement mène une politique plus libérale que les sociaux-démocrates, et ils ont introduit plusieurs changements dans le système de santé et particulièrement dans le règlement de l'indemnité journalière. Ce mémoire a pour but d'examiner les changements dans le système, ainsi que les raisons de ces changements. Les méthodes appliquées sont l'archive et le corpus, puisque j'ai étudié les ouvrages relatifs à la santé ainsi que les sites Internet des institutions responsables de l'indemnité journalière en Suède et en France. J'ai aussi eu un entretien avec un employé de la Caisse de Sécurité sociale à Växjö qui s'occupe particulièrement de l'indemnité journalière. Les résultats de cette étude montrent qu'il y a plusieurs raisons à l'origine des changements dans le système suédois. Il semble que la raison la plus importante soit le nombre croissant de personnes en arrêt maladie ce qui génère des difficultés économiques, de même la proportion de la population active par rapport aux retraités est au cœur de la problématique. Enfin, les crises économiques peuvent influencer le système, mais la crise actuelle ne semble pas avoir eu une influence importante sur les changements. Malgré les changements assez bouleversants vers un système plus libéral en Suède, qui tend à se rapprocher légèrement du système français, le système suédois reste plus social que le système français.
62

Conselho Sul-Americano de Defesa : gênese, desenvolvimento inicial e desafios (2008-2010)

Galerani, Kleber Antonio January 2011 (has links)
Nesta dissertação são abordados os antecedentes, as realizações, as perspectivas e os desafios para a consolidação do Conselho Sul Americano de Defesa (CSD). O trabalho é um estudo de caso, de natureza descritiva, baseado na Teoria dos Complexos Regionais de Segurança. Com o fim da bipolaridade houve um movimento para a atualização e a ampliação dos estudos de segurança internacional, pois as teorias e métodos vigentes se revelaram inábeis para explicar a nova realidade. Esse movimento também aconteceu na América do Sul. Diante da perda de legitimidade das instituições de defesa e de segurança continentais, como o Tratado Interamericano de Defesa Recíproca (TIAR) e a Junta Interamericana de Defesa (JID); e da progressiva diminuição do engajamento dos Estados Unidos da América (EUA) em assuntos de outras regiões, em dezembro de 2008, foi criado o CSD, para tratar dos temas de defesa da região. Durante os seus dois primeiros anos de funcionamento, o CSD logrou diversas realizações como o estabelecimento de um mecanismo de confiança mútua e a criação de um centro de estudos estratégicos em defesa e segurança. Entretanto, a estratégia de se integrar por um mínimo denominador comum pode comprometer o futuro da integração. Para se consolidar o CSD enfrentará diversos desafios. Nesse trabalho são analisados dois deles: o aumento substancial dos gastos em defesa pelos países da região e a relação assimétrica entre os EUA e os países da América do Sul e seus reflexos na integração em defesa. / This dissertation examines the history, achievements, prospects and challenges for the consolidation of South American Defense Council (CSD). This work is a case study, descriptive in nature, based on the Regional Security Complex Theory (RSCT). With the end of bipolarity it began a movement for the upgrade and expansion of international security studies, because the existing theories and methods have proved inappropriate to explain the new reality. This movement also happened in South America. Due to the loss of legitimacy of the institutions of continental defense and security, as the Rio Treaty and the Inter-American Defense Board (IADB), and the gradual reduction of United States of America (USA) engagement in the affairs of other regions in December 2008 was created the CSD, to deal with defense issues in the region. During its first two years of operation, the CSD has managed several accomplishments such as establishing a mechanism of mutual trust and creating a center of strategic studies in defense and security. However, the strategy to integrate for a minimum common denominator may jeopardize the future of integration. In its consolidation, the CSD will face many challenges. This work analyzes two of them: the substantial increase in defense spending by countries in the region and the asymmetric relationship between the USA and the countries of South America and its impacts on integration in defense.
63

PRÉ-DESPACHO DE POTÊNCIA ATIVA CONSIDERANDO AS ÓTICAS DOS AGENTES GERADORES E DO OPERADOR DO SISTEMA / PRE-ORDER IN ACTIVE POWER CONSIDERING THE OPTICIANS OF AGENTS GENERATORS AND SYSTEM OPERATOR

Pereira Neto, Aniceto de Deus 25 July 2008 (has links)
Made available in DSpace on 2016-08-17T14:52:49Z (GMT). No. of bitstreams: 1 Aniceto_de_Deus_Pereira_Neto.pdf: 1168768 bytes, checksum: adc4488efe00f3201345ff8a783ac6bb (MD5) Previous issue date: 2008-07-25 / The restructuring and deregulation of electricity markets has caused signi¯cant changes in electrical power systems in several countries. This process has result in a market-based competition by creating an open market environment. In this new environment each generation company runs the Unit Commitment to maximize their pro¯ts, and have no obligation to meet the energy and spinning reserve demands, as happened in the past. With this new structure, the Unit Commitment problem has received special attention, since generation companies in actual model always seek the maximum pro¯t without concern to serve all demands. On the other hand, there is the system operator, which always seeks to optimize overall system at the lowest cost. So, there are two di®erent situations into this competitive market environment: generators seeking the maximum bene¯t without concern to the system security operating, and independent system operator seeking always operate the system safely and at less cost. This work presents the mathematical models and the solution Unit Commitment problem, which was implemented considering two view points: the generation companies and the system independent operator views. Moreover, an auction model is extended to PRD in a horizon of 24 hours. This auction model simulates the interaction between generators and system operator to meet demands and security of the system. The idea is to stimulate the players to o®er products to energy (primary) and reserve (Ancilar Service) markets using only prices o®ered by market operator for each product. This iterative process is ¯nalized when generators supply su±cient to meet demand, and not cause any violation on °ow limits in transmission lines. The solution method proposed for Unit Commitment is based on evolution strategies and Lagrange Relaxation, resulting in a robust hybrid algorithm. The method have been validated in a test system composed of 6 buses, 7 transmission lines and 10 generating units. The results showed the e±ciency of the hybrid model proposed, which was able to solve the unit commitment problem in its various models considered here. / A reestruturação dos mercados de energia elétrica provocou mudanças significativas nos sistemas elétricos de potência de diversos países. Neste novo ambiente, cada empresa de geração executa individualmente o Pré-Despacho para maximizar seus benefícios financeiros, e não têm a obrigação em atender suas demandas de potência e reserva girante, como acontecia no modelo tradicional. Por outro lado existe o operador do sistema, o qual sempre busca a otimização global do sistema ao menor custo. Assim, têm-se duas situações distintas neste ambiente competitivo: os geradores buscando o máximo benefício sem preocupação com a segurança operativa do sistema, e o operador independente buscando sempre operar o sistema de forma segura e ao menor custo. Este trabalho apresenta as modelagens matemáticas e a solução do Pré- Despacho executado sob os dois pontos de vista: dos agentes de geração e do operador independente do sistema. Além do mais, um modelo de leilão é estendido para o PRD num horizonte de 24 horas. Este modelo simula a interação entre os agentes de geração e o operador do sistema na busca por uma solução única que concilie o interesse de ambos. A idéia é estimular os agentes geradores a ofertarem os produtos para os mercados de energia (primário) e de reserva (Serviço Ancilar) mediante oferta de preços pelo operador do mercado para os respectivos produtos. Esse procedimento iterativo é finalizado quando a oferta dos geradores for suficiente para atender completamente a demanda e, não provocar violações em nenhum limite de fuxos na malha de transmissão. O método de solução proposto para o Pré-Despacho é baseado em estratégias evolutivas e Relaxação de Lagrange, resultando em um modelo híbrido robusto. Os modelos e técnicas foram validados em um sistema teste composto por 6 barras, 7 linhas de transmissão e 10 unidades geradoras. Os resultados obtidos demonstraram a eficiência do método de solução, o qual se mostrou capaz de resolver o problema de Pré-Despacho nas suas diversas modelagens utilizadas.
64

Bezdrátové zabezpečovací zařízení / Wireless Security and Surveillance System

Výborný, Jiří January 2008 (has links)
This Master’s thesis deals with design and construction of a wireless security and surveillance system in ZigBee wireless networks (IEEE802.15.4). The design consists of creating a star network topology with intended monitoring of home area via end device boards paired with coordinator board, which provides basic networking functionality. End device is used to send data from a temperature sensor DS1631 and magnetic reed switches to coordinator. ZigBee module ZDM-A1281-A2 made by MeshNetics company embedded on each board contains a micro controller ATMega1281 and a transceiver AT86RF230 working in a 2,4GHz frequency band. System is able to notice of any door or window move actions and too high temperature. The non-fully functional ZigBee stack, which is called an Open MAC software, based on MAC (Media Access Control ) layer and PHY (Physical) layer from MeshNetics, has been used to develop the user software. Open MAC consists of three application samples in C code. One of them was modified by the user for an application of communication between the module and sensors. The same design with module RC2204AT made by Radiocrafts company was tested as well, but it couldn’t be executed. All developed boards have been constructed and tested via Terminal PC program.
65

Zabezpečovací systém s komunikací přes mobilní telefon / Security system with mobile phone communication

Ulbrich, Jakub January 2009 (has links)
This thesis deals with the question of electronic security systems. In the forepart are described electronic security system components such as keyboards, detectors, alarm devices etc. Various methods of security or de-security of properties, trespassing and other events detection methods, and ways of alarm calling are described there too. The next part of the master’s thesis focuses on the construction of an alarm system which is designed for security of a common-size flat with one entry. The system manages to control up to four movement detectors. The operation of the system is handled by a 16 button keyboard, and easy orientation is provided thanks to a liquid crystal display. The alarm is signaled by an indoor alert siren, however, other alarm announcing devices with an input matched for the log. 0 or log. 1 reception can be connected too. The system contains communication equipment (mobile phone) which signals alarm at a distance to the three telephone numbers. User can use a distance control by text message to unlock system or to determine its status. The system is controlled by the microcontroller AVR ATmega16, the product of Atmel company. A brief description of all components of the electronic alarm system is included in this work.
66

Zabezpečovací systém pro rodinný dům / Security system for family house

Sohr, Martin January 2012 (has links)
Family house, security system, wireless communication, IQRF, RSA, central control unit, SPI, I2C, glass break sensors, motion sensors, magnetic contact sensors, graphic displey, LCD displey, microcontroler, SIM900, 24FJ256GB106, EA DOGM106, eDIPTFT43-A.
67

Akviziční jednotka pro zabezpečovací techniku / Acquisition Unit for Security System

Pejchal, Luboš January 2012 (has links)
Project is focused to development of security unit for security of homes, flats and other similar spaces against intruders (thieves). Design is focused to solution of hardware and firmware for security units and their control software for PC. Hardware design solve supply over ethernet PoE, backup of supply, connection securities sensors to security unit. Firmware prevents failure of units and it is communicating with sensors and PC. Software in PC provides settings of security units, deactivating of alarm and measure temperature by security unit.
68

Systém pro podporu auditu managementu informační bezpečnosti / System for Audit Support of Information Security Management

Soukop, Tomáš January 2012 (has links)
This master thesis describes creation of system for audit support of information security management. In the next chapters I will explain what is the information security, system of information security, audit system and what standards we have for this. Last but not least is described how to create a system for audit support. The whole design is created with usage of standards for quality management and information security management. System is oriented for web environment.
69

Monitorovací a zabezpečovací systém / Monitoring and Security System

Felix, Martin January 2010 (has links)
This master's thesis deals with design and implementation of system for securing and monitoring objects. The whole system is serving as an application getaway between typical TCP/IP network and heterogeneous network containing different end devices such as security cameras, microphones and some sensors (e.g. for temperature measurement). In case of detected event, the notification is created, recorded and the user is informed via administrative front-end. System can be managed from remote location and data from devices can be shown by web interface. Theoretical part of this project concerns with the analysis of different types of connecting devices and sensors and the possibilities of their usage for the monitoring systems along with description of communications protocols for each end device. The next part deals with the cameras interfaces, content analysis and connectivity with central server. Practical part describes methods and techniques used for implementation of system.
70

Cybersecurity framework for cloud computing adoption in rural based tertiary institutions

Patala, Najiyabanu Noormohmed 18 May 2019 (has links)
MCom (Business Information Systems) / Department of Business Information Systems / Although technology is being progressively used in supporting student learning and enhancing business processes within tertiary institutions, certain aspects are hindering the decisions of cloud usage. Among many challenges of utilizing cloud computing, cybersecurity has become a primary concern for the adoption. The main aim of the study was to investigate the effect of cloud cyber-security usage at rural based tertiary institutions in order to compare the usage with an urban-based institution and propose a cybersecurity framework for adoption of cloud computing cybersecurity. The research questions focused on determining the drivers for cloud cybersecurity usage; the current adoption issues; how cybersecurity challenges, benefits, and quality affects cloud usage; the adoption perceptions and awareness of key stakeholders and identifying a cloud cybersecurity adoption framework. A quantitative approach was applied with data collected from a simple random sample of students, lecturers, admin and IT staff within the tertiary institutions through structured questionnaires. The results suggested compliance with legal law as a critical driver for cloud cybersecurity adoption. The study also found a lack of physical control of data and harmful activities executed on the internet as challenges hampering the adoption. Prevention of identity fraud and cheaper security costs were identified as benefits of adoption. Respondents found cloud cybersecurity to be accurate and effective, although most of the students and employees have not used it. However, respondents were aware of the value of cybersecurity adoption and perceive for it to be useful and convenient, hence have shown the intention of adopting it. There were no significant elements identified to differentiate the perceptions of usage at rural and urban-based tertiary institutions. The results of the study are to be used for clarifying the cybersecurity aspects of cloud computing and forecasting the suitability cloud cybersecurity within the tertiary institutions. Recommendations were made on how tertiary institutions and management can promote cloud cybersecurity adoption and how students, lecturers, and staff can effectively use cloud cybersecurity. / NRF

Page generated in 0.0378 seconds