• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1356
  • 417
  • 399
  • 307
  • 259
  • 94
  • 63
  • 50
  • 45
  • 30
  • 29
  • 25
  • 24
  • 24
  • 21
  • Tagged with
  • 3548
  • 465
  • 314
  • 258
  • 237
  • 197
  • 193
  • 193
  • 186
  • 178
  • 174
  • 171
  • 167
  • 167
  • 166
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

“My ma se taal of leertaal?” A study of different forms of Afrikaans spoken by the ‘coloured’ adult learners at E.W.Hobbs ABET center in Eldoradopark, Gauteng

Davids, Bernice 26 October 2006 (has links)
Faculty of Humanities School of Education 0002687e kenbenneth@yahoo.com / This is a phenomenological study that studies a small group (5) of adult learners and two (2) teachers at E.W. Hobbs ABET center in Eldoradopark, and investigates how the colloquial Afrikaans spoken in Eldoradopark and the home environment influences the learners’ competency in the classroom where ‘standard’ Afrikaans is required. The study revealed that standard Afrikaans is a requirement across the curriculum at this center, but is only rigorously applied in the Afrikaans class. This proved to have an impact on learning as colloquial Afrikaans is accepted in all other classes except the Afrikaans class. The implications of this is that the curriculum should be reevaluated and adjusted to implement standard Afrikaans in all learning areas, or accept colloquial Afrikaans in all subjects, including the Afrikaans class.
142

Describing the Relationship Between Three Ice Hockey Helmet Impact Tests and Reconstructions of Concussive Injuries in Professional Ice Hockey

Meehan, Andrew 22 July 2019 (has links)
Ice hockey helmets effectively mitigate the risk of skull fractures and focal traumatic brain injuries in professional ice hockey (PIH), but do not manage diffuse brain injuries such as concussion. This is due to current standard tests, which only represent one head impact event (a fall to the ice) and do not measure rotational head kinematics. It is important that helmets are evaluated using impact conditions that represent how players sustain concussions in ice hockey. The objective of this study was to describe the relationship between three ice hockey helmet tests and reconstructions of three concussive injury events in PIH. A flat anvil drop test (representing head-to-ice impacts), angled anvil drop test (representing head-to-boards impacts at 30o and 45o) and pneumatic ram test (representing medium and high compliance shoulder-to-head impacts) were performed using parameters reflecting concussive injuries in PIH. Stepwise regressions identified the dynamic response variables producing the strongest relationships with MPS. For the flat anvil drop test, dominant linear acceleration had the strongest relationship with MPS (R2 = 0.960), while there were no significant predictors of MPS from the PIH head-to-ice reconstructions. Rotational velocity had the strongest relationship for the 30o (R2 = 0.978) and 45o Anvil Drop Tests (R2 = 0.977), while rotational acceleration had the strongest relationship for the PIH head-to-boards reconstructions (R2 = 0.649). Resultant rotational acceleration had the strongest relationship for the medium compliance ram test (R2 = 0.671), the high compliance ram test (R2 = 0.850) and the PIH shoulder-to-head reconstructions (R2 = 0.763). The flat anvil drop test results indicate that falls on a flat, rigid surface induce primarily linear acceleration of the head. Standards should continue using this type of test to ensure helmets prevent skull fracture and focal TBI. Ice hockey helmets should also be evaluated using an angled anvil drop test and a collision ram test, representing two unique head impact events known to cause concussive injuries. The 45o Anvil Drop Test provided a closer representation of concussive head-to-boards impacts in PIH, with rotational velocity producing the strongest relationship with MPS. For collision impacts, the Medium Compliance Ram Test yielded repeatable impact conditions while the High Compliance Ram Test provided a closer representation of real-world concussive shoulder-to-head impacts. For these pneumatic ram tests, rotational acceleration produced the strongest relationship with MPS. The information in this thesis may be used by standards organizations when designing future ice hockey helmet tests.
143

Multiplexing video traffic using frame-skipping aggregation technique.

January 1998 (has links)
by Alan Yeung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 53-[56]). / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- MPEG Overview --- p.5 / Chapter 3 --- Framework of Frame-Skipping Lossy Aggregation --- p.10 / Chapter 3.1 --- Video Frames Delivery using Round-Robin Scheduling --- p.10 / Chapter 3.2 --- Underflow Safety Margin on Receiver Buffers --- p.12 / Chapter 3.3 --- Algorithm in Frame-Skipping Aggregation Controller --- p.13 / Chapter 4 --- Replacement of Skipped Frames in MPEG Sequence --- p.17 / Chapter 5 --- Subjective Assessment Test on Frame-Skipped Video --- p.21 / Chapter 5.1 --- Test Settings and Material --- p.22 / Chapter 5.2 --- Choice of Test Methods --- p.23 / Chapter 5.3 --- Test Procedures --- p.25 / Chapter 5.4 --- Test Results --- p.26 / Chapter 6 --- Performance Study --- p.29 / Chapter 6.1 --- Experiment 1: Number of Supportable Streams --- p.31 / Chapter 6.2 --- Experiment 2: Frame-Skipping Rate When Multiplexing on a Leased T3 Link --- p.33 / Chapter 6.3 --- Experiment 3: Bandwidth Usage --- p.35 / Chapter 6.4 --- Experiment 4: Optimal USMT --- p.38 / Chapter 7 --- Implementation Considerations --- p.41 / Chapter 8 --- Conclusions --- p.45 / Chapter A --- The Construction of Stuffed Artificial B Frame --- p.48 / Bibliography --- p.53
144

Exposing the medium access control vulnerabilities in IEEE 802.11.

January 2007 (has links)
Ma Yu Tak. / Thesis submitted in: October 2006. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (leaves 70-73). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- IEEE 802.11 Standard --- p.4 / Chapter 3 --- Vulnerabilities of IEEE 802.11 --- p.8 / Chapter 3.1 --- Authentication Vulnerabilities --- p.8 / Chapter 3.2 --- Medium Access Control Vulnerabilities --- p.9 / Chapter 3.3 --- Proposed Counter-Measures --- p.10 / Chapter 4 --- Denial-of-Service Attacks by Exploiting the MAC protocol --- p.12 / Chapter 5 --- Simulation Results --- p.20 / Chapter 5.1 --- General DoS Attack Simulations --- p.21 / Chapter 5.1.1 --- Topology 1: A Simple Wireless Network --- p.21 / Chapter 5.1.2 --- Topology 2: Wireless Network in Ad-Hoc Mode --- p.24 / Chapter 5.1.3 --- Topology 3: Network with Hidden Node Problem --- p.29 / Chapter 5.2 --- Targeted DoS Attack Simulations --- p.32 / Chapter 5.2.1 --- Topology 4: A Simple Wireless Network --- p.32 / Chapter 5.2.2 --- Topology 4: A Simple Network with Reversed TCP Flows --- p.38 / Chapter 6 --- Detecting and Solving the Attacks --- p.41 / Chapter 6.1 --- Detection of Attacker --- p.41 / Chapter 6.1.1 --- Detecting General DoS Attackers --- p.41 / Chapter 6.1.2 --- Detecting Targeted DoS Attackers --- p.44 / Chapter 6.2 --- Possible Solutions to the DoS Attacks --- p.53 / Bibliography --- p.70 / Chapter A --- TCP Exponential Backoff with Non-Zero Throughput --- p.74 / Chapter A.1 --- TCP Exponential Backoff Background --- p.74 / Chapter A.2 --- Illustration by Simulation --- p.76 / Chapter A.3 --- Implication of the Finding --- p.77 / Chapter B --- Idle Sense in networks with Hidden Node Problem --- p.79 / Chapter B.1 --- Simulation findings --- p.79 / Chapter B.1.1 --- Four hidden nodes case --- p.79 / Chapter B.1.2 --- Analysis of the simulation results --- p.81 / Chapter B.1.3 --- Study of mixed node types --- p.82 / Chapter B.2 --- Possible approaches to use Idle Sense with Hidden Node Problem --- p.84 / Chapter B.2.1 --- Performance Evaluation --- p.88 / Chapter B.3 --- Conclusions --- p.91
145

Measurement of the CP violating phase ϕs using B⁰/s → ψ(2S)ϕ decays at the LHCb Experiment

Ferguson, Dianne January 2016 (has links)
The LHCb experiment at the Large Hadron Collider (LHC) at CERN is designed to make precise measurements of processes including B and D mesons to test the Standard Model (SM) predictions for CP violation, and to search for new physics. From its inception one of the key aims of the LHCb collaboration has been to precisely measure the CP violating phase ϕs, the weak phase due to the interference between B⁰/s -B¯⁰/s mixing and decay. Having collected 3 fb-1 of data in Run 1, the combined results of LHCb measurements of ϕs from various decay modes are in agreement with SM predictions. The aim now is to improve the precision of the LHCb measurement to be sensitive to any small deviation from the SM prediction of ϕs. One strategy to achieve this, in addition to collecting more data, is to expand the number of modes used to measure ϕs to improve the sensitivity of the combination. This thesis presents the measurement of the CP violating phase ϕs in the yet unstudied B⁰/s→ ψ(2S)ϕ decay mode. In addition to providing a measurement of ϕs the study of this mode presents an opportunity to confirm the lifetime difference of the B⁰/s mass eigenstates ∆Γs, currently only measured in the B⁰/s→ Jψϕ decay mode. The results from 3 fb-1 of LHCb data are; ϕs = 0:23+0:29-0:28 ± 0:02 rad, ∆Γs = 0:066+0:041-0:044 ± 0:007 ps-1. which are in agreement with the SM and the results from the LHCb measurement from B⁰/s→ Jψϕ decays.
146

Wireless LAN security.

January 2005 (has links)
Chan Pak To Patrick. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2005. / Includes bibliographical references (leaves 82-86). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iii / Contents --- p.iv / List of Figures --- p.vii / List of Tables --- p.viii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- The Problems --- p.3 / Chapter 1.3 --- My Contribution --- p.4 / Chapter 1.4 --- Thesis Organization --- p.5 / Chapter 2 --- Wireless LAN Security Model --- p.6 / Chapter 2.1 --- Preliminary Definitions on WLAN --- p.6 / Chapter 2.2 --- Security Model --- p.7 / Chapter 2.2.1 --- Security Attributes --- p.7 / Chapter 2.2.2 --- Security Threats in WLAN --- p.8 / Chapter 2.2.3 --- Attacks on Authentication Scheme --- p.10 / Chapter 2.2.4 --- Attacks on Keys --- p.10 / Chapter 2.3 --- Desired Properties of WLAN Authentication --- p.11 / Chapter 2.3.1 --- Security Requirements of WLAN Authentication --- p.11 / Chapter 2.3.2 --- Security Requirements of Session Keys --- p.12 / Chapter 2.3.3 --- Other Desired Properties of WLAN Authentication --- p.12 / Chapter 3 --- Cryptography --- p.14 / Chapter 3.1 --- Overview on Cryptography --- p.14 / Chapter 3.2 --- Symmetric-key Encryption --- p.15 / Chapter 3.2.1 --- Data Encryption Standard (DES) --- p.15 / Chapter 3.2.2 --- Advanced Encryption Standard (AES) --- p.15 / Chapter 3.2.3 --- RC4 --- p.16 / Chapter 3.3 --- Public-key Cryptography --- p.16 / Chapter 3.3.1 --- RSA Problem and Related Encryption Schemes --- p.17 / Chapter 3.3.2 --- Discrete Logarithm Problem and Related Encryption Schemes --- p.18 / Chapter 3.3.3 --- Elliptic Curve Cryptosystems --- p.19 / Chapter 3.3.4 --- Digital Signature --- p.19 / Chapter 3.4 --- Public Key Infrastructure --- p.20 / Chapter 3.5 --- Hash Functions and Message Authentication Code --- p.21 / Chapter 3.5.1 --- SHA-256 --- p.22 / Chapter 3.5.2 --- Message Authentication Code --- p.22 / Chapter 3.6 --- Entity Authentication --- p.23 / Chapter 3.6.1 --- ISO/IEC 9798-4 Three-pass Mutual --- p.23 / Chapter 3.6.2 --- ISO/IEC 9798-4 One-pass Unilateral --- p.24 / Chapter 3.7 --- Key Establishment --- p.24 / Chapter 3.7.1 --- Diffie-Hellman Key Exchange --- p.24 / Chapter 3.7.2 --- Station-to-Station Protocol --- p.25 / Chapter 3.8 --- Identity-Based Cryptography --- p.25 / Chapter 3.8.1 --- The Boneh-Franklin Encryption Scheme --- p.26 / Chapter 3.8.2 --- Au and Wei's Identification Scheme and Signature Scheme --- p.27 / Chapter 4 --- Basics of WLAN Security and WEP --- p.29 / Chapter 4.1 --- Basics of WLAN Security --- p.29 / Chapter 4.1.1 --- "Overview on ""Old"" WLAN Security" --- p.29 / Chapter 4.1.2 --- Some Basic Security Measures --- p.29 / Chapter 4.1.3 --- Virtual Private Network (VPN) --- p.30 / Chapter 4.2 --- WEP --- p.31 / Chapter 4.2.1 --- Overview on Wired Equivalent Privacy (WEP) --- p.31 / Chapter 4.2.2 --- Security Analysis on WEP --- p.33 / Chapter 5 --- IEEE 802.11i --- p.38 / Chapter 5.1 --- Overview on IEEE 802.11i and RSN --- p.38 / Chapter 5.2 --- IEEE 802.1X Access Control in IEEE 802.11i --- p.39 / Chapter 5.2.1 --- Participants --- p.39 / Chapter 5.2.2 --- Port-based Access Control --- p.40 / Chapter 5.2.3 --- EAP and EAPOL --- p.40 / Chapter 5.2.4 --- RADIUS --- p.41 / Chapter 5.2.5 --- Authentication Message Exchange --- p.41 / Chapter 5.2.6 --- Security Analysis --- p.41 / Chapter 5.3 --- RSN Key Management --- p.43 / Chapter 5.3.1 --- RSN Pairwise Key Hierarchy --- p.43 / Chapter 5.3.2 --- RSN Group Key Hierarchy --- p.43 / Chapter 5.3.3 --- Four-way Handshake and Group Key Handshake --- p.44 / Chapter 5.4 --- RSN Encryption and Data Integrity --- p.45 / Chapter 5.4.1 --- TKIP --- p.45 / Chapter 5.4.2 --- CCMP --- p.46 / Chapter 5.5 --- Upper Layer Authentication Protocols --- p.47 / Chapter 5.5.1 --- Overview on the Upper Layer Authentication --- p.47 / Chapter 5.5.2 --- EAP-TLS --- p.48 / Chapter 5.5.3 --- Other Popular ULA Protocols --- p.50 / Chapter 6 --- Proposed IEEE 802.11i Authentication Scheme --- p.52 / Chapter 6.1 --- Proposed Protocol --- p.52 / Chapter 6.1.1 --- Overview --- p.52 / Chapter 6.1.2 --- The AUTHENTICATE Protocol --- p.56 / Chapter 6.1.3 --- The RECONNECT Protocol --- p.59 / Chapter 6.1.4 --- Packet Format --- p.61 / Chapter 6.1.5 --- Ciphersuites Negotiation --- p.64 / Chapter 6.1.6 --- Delegation --- p.64 / Chapter 6.1.7 --- Identity Privacy --- p.68 / Chapter 6.2 --- Security Considerations --- p.68 / Chapter 6.2.1 --- Security of the AUTHENTICATE protocol --- p.68 / Chapter 6.2.2 --- Security of the RECONNECT protocol --- p.69 / Chapter 6.2.3 --- Security of Key Derivation --- p.70 / Chapter 6.2.4 --- EAP Security Claims and EAP Methods Requirements --- p.72 / Chapter 6.3 --- Efficiency Analysis --- p.76 / Chapter 6.3.1 --- Overview --- p.76 / Chapter 6.3.2 --- Bandwidth Performance --- p.76 / Chapter 6.3.3 --- Computation Speed --- p.76 / Chapter 7 --- Conclusion --- p.79 / Chapter 7.1 --- Summary --- p.79 / Chapter 7.2 --- Future Work --- p.80 / Bibliography --- p.82
147

Call admission control for adaptive bit-rate VoIP over 802.11 WLAN.

January 2009 (has links)
Cui, Yuanyuan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. / Includes bibliographical references (p. 64-68). / Abstract also in Chinese. / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1 .1 --- Motivations and Contributions --- p.1 / Chapter 1.2 --- Related Works --- p.3 / Chapter 1.3 --- Organization of the Thesis --- p.4 / Chapter Chapter 2 --- Background --- p.5 / Chapter 2.1 --- IEEE 802.11 --- p.5 / Chapter 2.1.1 --- IEEE 802.11 Topologies --- p.5 / Chapter 2.1.2 --- IEEE 802.11 MAC --- p.8 / Chapter 2.2 --- Voice over Internet Protocol (VoIP) --- p.11 / Chapter 2.2.1 --- A VoIP system --- p.11 / Chapter 2.2.2 --- QoS requirements for VoIP --- p.11 / Chapter 2.2.3 --- VoIP speech codecs --- p.12 / Chapter 2.3 --- VoIP over WLAN --- p.13 / Chapter 2.3.1 --- System Architecture of VoIP over WLAN --- p.14 / Chapter 2.3.2 --- VoIP Capacity over WLAN --- p.15 / Chapter 2.4 --- Skype --- p.16 / Chapter Chapter 3 --- Skype Rate Adaptation Mechanism --- p.17 / Chapter 3.1 --- Experimental Setting --- p.17 / Chapter 3.2 --- Overview --- p.19 / Chapter 3.3 --- Flow Rate Region --- p.20 / Chapter 3.4 --- Feedback: Receiver Report (RR) --- p.21 / Chapter 3.5 --- Bandwidth Usage Target (BM) --- p.24 / Chapter 3.6 --- Summary of Skype Rate Adaptation Mechanism --- p.28 / Chapter 3.7 --- Skype-emulating Traffic Generator --- p.28 / Chapter Chapter 4 --- "Call Admission, Fairness and Stability Control" --- p.32 / Chapter 4.1 --- Unfair and Instability problems for AVoIP --- p.32 / Chapter 4.1.1 --- Analysis --- p.32 / Chapter 4.1.2 --- Simulation Evaluation --- p.34 / Chapter 4.2 --- CFSC scheme --- p.37 / Chapter 4.2.1 --- Pre-admission Bandwidth-reallocation Call Admission Control (PBCAC) --- p.39 / Chapter 4.2.2 --- Fairness Control --- p.42 / Chapter 4.2.3 --- Stability Control --- p.43 / Chapter Chapter 5 --- Performance Evaluation of CFSC --- p.44 / Chapter 5.1 --- Evaluation of Fairness Control --- p.44 / Chapter 5.2 --- Evaluation of Stability Control --- p.46 / Chapter 5.3 --- Evaluation of PBCAC --- p.46 / Chapter 5.4 --- Evaluation of complete CFSC --- p.49 / Chapter Chapter 6 --- Conclusion --- p.51 / Appendices --- p.53 / References --- p.64
148

Estimating standard errors of estimated variance components in generalizability theory using bootstrap procedures

Moore, Joann Lynn 01 December 2010 (has links)
This study investigated the extent to which rules proposed by Tong and Brennan (2007) for estimating standard errors of estimated variance components held up across a variety of G theory designs, variance component structures, sample size patterns, and data types. Simulated data was generated for all combinations of conditions, and point estimates, standard error estimates, and coverage for three types of confidence intervals were calculated for each estimated variance component and relative and absolute error variance across a variety of bootstrap procedures for each combination of conditions. It was found that, with some exceptions, Tong and Brennan's (2007) rules produced adequate standard error estimates for normal and polytomous data, while some of the results differed for dichotomous data. Additionally, some refinements to the rules were suggested with respect to nested designs. This study provides support for the use of bootstrap procedures for estimating standard errors of estimated variance components when data are not normally distributed.
149

Non-Standard English Features in the Song Lyrics of Best Selling Music in Sweden

Mangseth, Henrik January 2010 (has links)
No description available.
150

Fria och öppna programvaror inom kommunal verksamhet : Vägen mot öppna standarder? / Free- and open source software in municipalities : The way towards open standards?

Hanson, Malin, Larsson, Mikael January 2009 (has links)
<p>This report deals with the attitudes within municipalities of open source software and open standards and if open source software may be an option to gain open standards. The aim has been to find out if open source software and open standards would be able to solve the lock-in problems that municipalities have against proprietary software. The study is conducted as an exploratory, inductive and qualitative study with depth interviews of subjectively selected informants as data collection method. A literature review has also been implemented by the relevant books and articles. Some economic determinants of municipalities to make use of open source software have not been considered in this study. The informants used in this study are all IT managers in a Swedish municipality and our key informants have been selected in a subjective manner based on the expertise they have in the subject. The conclusions drawn were that municipalities have been difficult to define standards and open standards, and that they do not automatically see the connection between open standards and open software. They also see different areas of interest for standardization.</p> / <p>Denna rapport tar upp kommuners inställning till öppna program och öppna standarder och om öppen programvara kan vara ett alternativ för att få öppna standarder. Syftet har varit att ta reda på om öppna program och öppna standarder skulle kunna lösa de problem som kommuner har med inlåsningar mot proprietär programvara. Studien är genomförd som en explorativ, induktiv och kvalitativ studie med djupintervju av subjektivt utvalda informanter som datainsamlingsmetod. En litteraturgranskning har också genomförts av relevanta böcker och artiklar. Några ekonomiska faktorer för kommuner att använda sig av öppen programvara har inte beaktats i denna studie. De informanter som använts i denna studie är alla ITchefer inom någon svensk kommun och nyckelinformanterna har valts ut på ett subjektivt sätt utifrån den expertkunskap de besitter inom ämnet. Slutsatserna som drogs var att kommuner har svårt att definiera standarder och öppna standarder, och att de inte med automatik ser kopplingen mellan öppna standarder och öppen programvara. De ser också olika områden som intressanta för en standardisering.</p>

Page generated in 0.0593 seconds