• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6542
  • 1926
  • 919
  • 814
  • 686
  • 370
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 76
  • 76
  • Tagged with
  • 14798
  • 2965
  • 2025
  • 1872
  • 1447
  • 1375
  • 1343
  • 1298
  • 1259
  • 1163
  • 1153
  • 1145
  • 1073
  • 1030
  • 948
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
381

Saudi national security policy

Al-Saud, Naef bin Ahmed January 2006 (has links)
No description available.
382

The League of Arab States and peace-keeping in the Lebanon 1976-1983

Pogany, I. January 1988 (has links)
No description available.
383

Linear discriminant analysis and its application to face identification

Li, Yongping January 2000 (has links)
No description available.
384

Food security in the Kullu District, India: perspectives, policies and learning in the transition to commercial agriculture

Dunne, Leanne 26 February 2014 (has links)
The transition from subsistence agriculture to crop commercialization can raise concerns about food security at the local level. Contributing factors and impacts of this transition and resulting local perspectives on food security issues are examined in the Manali area, Kullu District, Himachal Pradesh, India. The overall purpose of this research was to explore how the transition from a subsistence land-use system of agriculture to commercial cropping has impacted local perspectives of food security. The results indicate that although people feel food secure within the commercial cropping system, new areas of vulnerability to food insecurity has arisen. Climate change, market fluctuations, disease and an increasing reliance on chemicals are among the present challenges and concerns for farmers today. Also, although dietary preferences have changed, traditional crops still have value and importance within the new type of system, providing a sense of security in socio-cultural and religious ways.
385

An In-memory Database for Prototyping Anomaly Detection Algorithms at Gigabit Speeds

Friesen, Travis 11 September 2013 (has links)
The growing speeds of computer networks are pushing the ability of anomaly detection algorithms and related systems to their limit. This thesis discusses the design of the Object Database, ODB, an analysis framework for evaluating anomaly detection algorithms in real time at gigabit or better speeds. To accomplish this, the document also discusses the construction a new dataset with known anomalies for verification purposes. Lastly, demonstrating the efficacy of the system required the implementation of an existing algorithm on the evaluation system and the demonstration that while the system is suitable for the evaluation of anomaly detection algorithms, this particular anomaly detection algorithm was deemed not appropriate for use at the packet-data level.
386

Food security in the Kullu District: perspectives, policies and learning in the transition to commercial agriculture

Dunne, Leanne 26 February 2014 (has links)
The transition from subsistence agriculture to crop commercialization can raise concerns about food security at the local level. Contributing factors and impacts of this transition and resulting local perspectives on food security issues are examined in the Manali area, Kullu District, Himachal Pradesh, India. The overall purpose of this research was to explore how the transition from a subsistence land-use system of agriculture to commercial cropping has impacted local perspectives of food security. The results indicate that although people feel food secure within the commercial cropping system, new areas of vulnerability to food insecurity has arisen. Climate change, market fluctuations, disease and an increasing reliance on chemicals are among the present challenges and concerns for farmers today. Also, although dietary preferences have changed, traditional crops still have value and importance within the new type of system, providing a sense of security in socio-cultural and religious ways.
387

Age and sex : the relationship upon perceived job satisfaction among exempt level employees

Wills, Beverly R. January 1982 (has links)
The purpose of the study was to investigate and analyze perceived intrinsic satisfaction, extrinsic satisfaction, and general job satisfaction among exempt level employees. Specifically, the study was designed to identify job satisfaction relative to employee age and sex. The research was conducted in a manufacturing organization listed in Fortune 500.Data collection involved the administration l: confidential self-report instrument (Minnesotasatisfaction Questionnaire, Short Form) regarding employee perceptions of job satisfaction. The final sample included fifty-seven exempt level employees of which. twenty- six were female and thirty-one were male. The average age the male was 37.3 years and for females 32.8 years. The average age of the two groups was 34.5 years. Data obtained from the respondents were analyzed by applying a 2 x 3 analysis of variance with the factors of age and sex considered to be fixed.An analysis made of the data obtained from the respondents determined no significant correlation of intrinsic satisfaction, extrinsic satisfaction, and general job satisfaction existed relative to respondent age. The data, however, did indicate a significant correlation between intrinsic satisfaction and general job satisfaction did exist relative to respondent sex. No correlation between extrinsic satisfaction relative to respondent age was found.The data further found both male and female groups described job security to be the source of highest satisfaction. Advancement was the source of least satisfaction for both groups.
388

Multi-agent malicious behaviour detection

Wegner, Ryan 24 October 2012 (has links)
This research presents a novel technique termed Multi-Agent Malicious Behaviour Detection. The goal of Multi-Agent Malicious Behaviour Detection is to provide infrastructure to allow for the detection and observation of malicious multi-agent systems in computer network environments. This research explores combinations of machine learning techniques and fuses them with a multi-agent approach to malicious behaviour detection that effectively blends human expertise from network defenders with modern artificial intelligence. Success of the approach depends on the Multi-Agent Malicious Behaviour Detection system's capability to adapt to evolving malicious multi-agent system communications, even as the malicious software agents in network environments vary in their degree of autonomy and intelligence. This thesis research involves the design of this framework, its implementation into a working tool, and its evaluation using network data generated by an enterprise class network appliance to simulate both a standard educational network and an educational network containing malware traffic.
389

Key establishment for wireless sensor networks using third parties

Almowuena, Saleh 18 October 2011 (has links)
Wireless sensor networks are employed in a wide range of applications including disaster relief operations, forest-fire detection, battlefield surveillance, pollution measurement, and healthcare applications. Because of the characteristics of these applications, a wireless sensor network is more vulnerable to security threats than traditional networks. In order to protect the sensor network from outside attacks, it is necessary to implement a cryptographic mechanism that can achieve three major security objectives: confidentiality, integrity and authentication. Even though the topic of cryptography has been well studied for traditional networks, many conventional cryptographic approaches cannot easily be applied to sensor networks. To illustrate, public key-based schemes and even some symmetric key methods are complex with regards to computations, memory, communication, and packet size requirements. On the other hand, sensor networks suffer from severe constraints on their available resources as a result of the necessity to increase the lifetime of the complete network, minimize the physical size of the sensor nodes, and reduce the cost of sensor nodes. Consequently, it is important to propose cryptographic solutions designed specifically for wireless sensor networks. A fundamental element in an effective cryptographic system is how sensor nodes are equipped with the cryptographic keys needed to create secure radio connections with their local neighbours. This thesis contributes to the challenging field of key establishment by introducing three key agreement schemes whose memory, processing, and communication requirements are low. These methods utilize the concept of third parties, and sometimes also deployment knowledge, to reduce the cryptographic burden of public-key based schemes and the key management overhead of symmetric key approaches. The proposed methods employ just a few simple hash operations in the sensor nodes. Furthermore, additional nodes called third parties are deployed to assist sensor nodes in the key establishment phase. Our key agreement schemes have many advantages over existing approaches. For instance, a sensor node in these schemes needs to make just a few local contacts to establish a secure radio connection with its neighbours with very high probability. In addition, the majority of sensor nodes must store only a small number of secret keys in their memory. These methods also employ an authentication mechanism to prevent impersonation attacks. / Graduate
390

KeySafe The platform-independent password safe with external security

Björklund, Olof January 2015 (has links)
Storing and accessing sensitive data has become an important task in today’s society. Many different services require login credentials for users to remember in order to authenticate themselves. A common habit is to use the same password for several services. This is considered a security risk since if someone uncovers the user’s password they will gain access to all of the different accounts using the same password. Hence users are encouraged to use different login credentials for different services, resulting in an increasingly large list of sensitive data the user needs to remember. KeySafe provides a password storage service which makes all your digital keys available with the use of physical one. In this project, a platform independent service has been created with an Android application which implements external authentication using NFC tags. Using Google App Engine with the Endpoints API backend the service becomes available to a range of different devices such as iPhone, PC, Tablet or Mac. This resulted in a flexible, secure system that makes it an easy task to use strong and independent passwords for different login-services. All data stored by the application is encrypted using the AES encryption cipher and the AES key needed for decryption is stored on the external NFC tag.

Page generated in 0.0821 seconds