• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11693
  • 2106
  • 1106
  • 946
  • 844
  • 499
  • 271
  • 259
  • 245
  • 226
  • 178
  • 132
  • 104
  • 71
  • 68
  • Tagged with
  • 23268
  • 3426
  • 2891
  • 2207
  • 2099
  • 2024
  • 1944
  • 1761
  • 1716
  • 1658
  • 1585
  • 1551
  • 1514
  • 1498
  • 1489
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
741

Hybrid Botnet Detection

Huang, Ming-Zong 13 August 2010 (has links)
There are three mail types of Botnet: IRC-based Botnet, P2P-based Botnet,Web-based Botnet and they have become major threat to the Internet recently. Web-based Botnet is popular and more harmful to users. The architecture of Web-based Botnet is simpler than P2P-based Botnet, and its malicious traffic can be hidden in a large number of normal traffic. In this study, we built an experimental environment of using malicious bot programs to detect suspicious traffic and malware features. Except network attacking and identity theft, Botnet could also be used by hackers to extend the life time of rouge websites by combining with the technology of Fast Flux Domain. Botnet and the technology of Fast Flux Domain closely link to each other in the real world. Both of Web-based Botnet and Fast Flux Domain technology use HTTP protocol to communicate, and Botnet provides a large number of infected hosts to be Fast Flux Agents which act like a relay station to block the direct link of malicious websites from clients, but completes the mutual connection. In the research, not only the analysis and detection of Web-based Botnet are focused, but also the impact of Fast Flux Domain technology is included. We expect to clear the architecture of Botnet and the technology of Fast Flux Domain, and make the detection mechanism more precisely.
742

Diversification Management of TV Stations¡GInternet Business Entry Strategies and Performance Assessment

Chang, Jin-an 30 August 2010 (has links)
Nowadays, most of the TV stations in Taiwan have the same acts, which are involving in online business, but different in scopes. Some of them are running all kinds of different tasks online, such as e-commerce, ad-sells, pay per view and information offering. However, others are just providing the information offering service. According to this, we can notice that there has no identical processing procedure in the industry. Every firm has its own strategy about running business online. And it seems like the different entry strategies have play a important role in it. Thus, the study focuses on knowing how TV stations decided to run online business and formulated their entry strategies while conducting the diversification management. Within that, it also contains issues of strategic goals, business scopes and performance evaluations which will also be discussed in the study. This article uses case study approach and analyses two TV stations¡¦, Formosa Television and TVBS, diversification strategies. Combining the results and theories with secondary sources, we suggest that: (1) TV stations¡¦ Internet strategies are based on digital strategies. (2) The Internet plays a support function to the TV stations. (3) Diversification defines the scopes of the Internet business. (4) Owners¡¦ attitude. (5) Popularity decides the marketing platforms. (6) Functional resource-based view. (7) Program division decides the results of the promotion. (8) A mixing departmental performance assessment. (9) Unique performance assessment between different strategic activities.
743

The effects of Project-based Research of creating blogs on high school students under the framework of knowledge management

Ku, Chun-Chi 26 July 2011 (has links)
The purposes of the research which is based on the framework of knowledge management whose five dimensions are knowledge gaining, depositing, sharing, applying and innovating are divided into two parts. First, under the framework of knowledge management, evalueate how junior school students perform towards each dimension. Second, discuss the reasons and effects from the information of questionnaires. And, from five dimensions of the framework of knowledge management, analyze different behaviors on blogs of junior school students and various factors of influences in this survey. The method is mainly by qualitative research and auxiliarily by quantitative research. The study subjects consist of 59 students in the weekend project-based learning class of academic year of 2006 in Guo-Guang Laboratory School,NSYSU. The research time was from September in 2006 to August in 2007. Based on the five dimensions of the framework of knowledge management, we can draw conclusions as follows. First, the gaining of knowledge was mostly from the internet and also others¡¦ blogs. If it was from academic books, we would surely gain knowledge of higher levels. Second, it was easy to deposit gained knowledge on blogs. However, it would be a better deposition after systematically sorting. Also, blogs which kept tracks of learning struggles efficiently could produce metacognitions. Third, on blogs, students were looking forward to others¡¦ responses. However, the course was limited in excessively close relationships and some factors. As a result, sharing behaviors were not quite frequent. Blogs made distance closer and turned one way construction of knowledge into mutual. Building internet groups on blogs tended to produce the common languages and impelled us to apply knowledge. It took more psychology levels to innovate knowledge and needed higher spontaneous motivations to learn.
744

An Exploration of Diversification of Large Conglomerates from Resource-Based View - A Case of Far Eastern Group and Yuen Foong Yu Group

Lei, Chun-Yu 15 July 2012 (has links)
With the changing economic structure, from the textile, food, petrochemicals, steel,to high-tech industry, capital and technical requirements are gradually increasing. With the liberalization and internationalization, market competition was intensified. The large conglomerates have strong financial, human, technical resources and capabilities, who are more competitive to face the intense environmental change. Taiwan 100 Group's asset size is 600 times than 40 years ago. As a result, large conglomerates grasp Taiwan's economic lifeline. The majority of conglomerates engaged in diversification, but which resources and capabilities can engage in what kind of diversification to deliver competitive advantage for conglomerates is an important subject. Therefore, this study chooses two long history and successful business group in Taiwan, which are Far Eastern Group and Yuen Foong Yu Group. To investigate that what kind of resources and capabilities they use to implement diversification strategies. Then escalating group¡¦s resources and further expand the scale of the groups. According to this study, the analysis showed that the Far Eastern Group and Yuen Foong Yu Group, technology, human resources, assets, industry position, industry business experience, management ability, organizational ability, are the key resources and capabilities to perform any kind of diversification strategies.
745

A case study of the Resource-Based View to Acer group's Reengineering

Lee, Chin-Tai 31 August 2012 (has links)
As the leading brand in the international PC industry, Acer has been encountered countless challenges on dramatically environmental change when it endeavored to create and operate its own brand. To achieve the aim of sustainable management and the strategy of organizational growth, Acer has embarked on its reengineering several times since it was established. The purpose of this study is based on the Resource-Based View to uncover what kind of key factories contributed in Acer¡¦s two time of reengineering? And what kind of unique resources and capabilities were created? This study also characterized and catalogued these unique resources and capabilities to figure out clearly that what kind of main resources and capabilities existed at the first glance. There are three stages for Acer¡¦s transformation: the first time reengineering was happened in 1992; the reengineering in 1998 was called the quasi-reengineering stage that Acer adjusted its organizational structure to relocate operational direction; the second time reengineering was happened in the end of 2000. Based on above three different stages, this study analyzes the effect of internal and external environment as well as the operational strategies on each stage to infer its resources and capabilities. Moreover, This study categorizes these resources and capabilities by the classify method of Fong- Cher Min (2000) into four groups, Tangible Asset, Intangible Asset, Human Resource and Organization Capability, and discuss how Acer used these resources and capabilities to foster them became the Sustainable Competitive Advantage to overcome the harsh IT industry environment. By the way of analyzing the case company in depth, this study found that the probability of resources or capabilities can be upgrade into the Sustainable Competitive Advantage was not only affect by the properties such as Appropriability or Inimitable, but also greatly influence by outside environment. Furthermore, the next time success of reengineering was attributed to those of resources or capabilities which have been accumulated since earlier periods. Therefore, this study suggests that a firm should continuously adjust its competences as well as accumulate reengineering experiences to cope with the unpredictable environment.
746

Automated Spacecraft Docking Using a Vision-Based Relative Navigation Sensor

Morris, Jeffery C. 14 January 2010 (has links)
Automated spacecraft docking is a concept of operations with several important potential applications. One application that has received a great deal of attention recently is that of an automated docking capable unmanned re-supply spacecraft. In addition to being useful for re-supplying orbiting space stations, automated shuttles would also greatly facilitate the manned exploration of nearby space objects, including the Moon, near-Earth asteroids, or Mars. These vehicles would allow for longer duration human missions than otherwise possible and could even accelerate human colonization of other worlds. This thesis develops an optimal docking controller for an automated docking capable spacecraft. An innovative vision-based relative navigation system called VisNav is used to provide real-time relative position and orientation estimates, while a Kalman post-filter generates relative velocity and angular rate estimates from the VisNav output. The controller's performance robustness is evaluated in a closed-loop automated spacecraft docking simulation of a scenario in circular lunar orbit. The simulation uses realistic dynamical models of the two vehicles, both based on the European Automated Transfer Vehicle. A high-fidelity model of the VisNav sensor adds realism to the simulated relative navigation measurements. The docking controller's performance is evaluated in the presence of measurement noise, with the cases of sensor noise only, vehicle mass errors plus sensor noise, errors in vehicle moments of inertia plus sensor noise, initial starting position errors plus sensor noise, and initial relative attitude errors plus sensor noise each being considered. It was found that for the chosen cases and docking scenario, the final controller was robust to both types of mass property modeling errors, as well as both types of initial condition modeling errors, even in the presence of sensor noise. The VisNav system was found to perform satisfactorily in all test cases, with excellent estimate error convergence characteristics for the scenario considered. These results demonstrate preliminary feasibility of the presented docking system, including VisNav, for space-based automated docking applications.
747

Performance-based approach to evaluate alkali-silica reaction potential of aggregate and concrete using dilatometer method

Shon, Chang Seon 15 May 2009 (has links)
The undesirable expansion of concrete because of a reaction between alkalis and certain type of reactive siliceous aggregates, known as alkali-silica reactivity (ASR), continues to be a major problem across the entire world. The renewed interest to minimize distress resulting from ASR has emphasized the need to develop predictable modeling of concrete ASR behavior under field conditions. Current test methods are either incapable or need long testing periods in which to only offer rather limited predictive estimates of ASR behavior in a narrow and impractical band of field conditions. Therefore, an attempt has been made to formulate a robust performance approach based upon basic properties of aggregate and concrete ASR materials derived from dilatometry and a kinetic-based mathematical expressions for ASR behavior. Because ASR is largely an alkali as well as a thermally activated process, the use of rate theory (an Arrhenius relationship between temperature and the alkali solution concentration) on the dilatometer time-expansion relationship, provides a fundamental aggregate ASR material property known as “activation energy.” Activation energy is an indicator of aggregate reactivity which is a function of alkalinity, particle size, crystallinity, calcium concentration, and others. The studied concrete ASR material properties represent a combined effects of mixture related properties (e.g., water-cementitious ratio, porosity, presence of supplementary cementitious materials, etc.) and maturity. Therefore, the proposed performance-based approach provides a direct accountability for a variety of factors that affect ASR, such as aggregate reactivity (activation energy), temperature, moisture, calcium concentration, solution alkalinity, and water-cementitious material ratio. Based on the experimental results, the following conclusion can be drawn concerning the performance-based approach to evaluate ASR potential of aggregate and concrete using dilatometer method; (i) the concept of activation energy can be used to represent the reactivity of aggregate subjected to ASR, (ii) the activation energy depends on the reactivity of aggregate and phenomenological alkalinity of test solution, and (iii) The proposed performance-based model provides a means to predict ASR expansion development in concrete.
748

Assessment tool for nuclear material acquisition pathways

Ford, David Grant 15 May 2009 (has links)
An assessment methodology has been developed at Texas A&M University for predicting weapons useable material acquisition by a terrorist organization or rogue state based on an acquisition network simulation. The network has been designed to include all of the materials, facilities, and expertise (each of which are represented by a unique node) that must be obtained to acquire Special Nuclear Material (SNM). Using various historical cases and open source expert opinion, the resources required to successfully obtain the goal of every node within the network was determined. A visual representation of the network was created within Microsoft Visio and uses Visual Basic for Applications (VBA) to analyze the network. This tool can be used to predict the most likely pathway(s) that a predefined organization would take in attempting to acquire SNM. The methodology uses the resources available to the organization, along with any of the nodes to which the organization may already have access, to determine which path the organization is most likely to attempt. Using this resource based decision model, various sample simulations were run to exercise the program. The results of these simulations were in accordance with what was expected for the resources allocated to the organization being modeled. The program was demonstrated to show that it was capable of taking many complex resources considerations into account and modeled them accurately.
749

Noticing in text-based computer-mediated communication: a study of a task-based telecommunication between native and nonnative English speakers

Chen, Wen-Chun 15 May 2009 (has links)
This dissertation investigated the occurrence and the effect of incidental noticing in a text-based Computer-Mediated Communication (CMC) environment on enhancing second language learning. Learning proficiency was also examined as a possible intervening variable. This was a quasi-experimental study of sixteen nonnative English speakers from a four-year college in Taiwan, collaborating with sixteen native speaking peers in Texas, via chat agents in order to complete two communicative learning tasks over a two-month period of time. Two posttests were customized for each Nonnative English Speaker (NNES) in order to assess his/her second language learning outcomes. In addition, Language- Related Episode’s (LRE’s) characteristics were expected to serve as powerful predictors of NNES’ correct language learning outcomes. In order to unveil the possible impact of the learner’s language proficiency level and its effect on noticing, eight low- intermediate and eight high- intermediate NNESs were included in the study. The findings revealed that CMC context and native and nonnative English speaking task-based peer interactions promoted learner’s noticing and affected the learning performance of NNESs of different levels. The posttest performance showed that incidental noticing facilitated learner’s linguistic knowledge intake and memory retention. Text-based CMC created a visual and collaborative context which allowed NES peers to offer NNESs of different levels personalized feedback. Among LRE’s characteristics, successful uptake, as a powerful predictor, constantly entered all the models generated by logistic regression analysis, which underpinned the importance of quality uptake during the two-way communication for second language learning. In addition, directness (explicit feedback) and response (elicitation) also appeared in regression models of the subsets of LRE data, which indicated the particular type of feedback needed by learners, especially lower proficiency level ones. In addition, NESs’ involvement also facilitated NNESs’ noticing; NES peers applied elicitation techniques to redirect learner’s attention to the problematic utterances and initiated meaning negotiation. The findings reveal that incidental noticing is beneficial to learning, especially when learners are provided with explicit feedback and incorporate the targeted linguistic items into their language production.
750

Utilization-based delay guarantee techniques and their applications

Wang, Shengquan 15 May 2009 (has links)
Many real-time systems demand effective and efficient delay-guaranteed services to meet timing requirements of their applications. We note that a system provides a delay-guaranteed service if the system can ensure that each task will meet its predefined end-to-end deadline. Admission control plays a critical role in providing delayguaranteed services. The major function of admission control is to determine admissibility of a new task. A new task will be admitted into the system if the deadline of all existing tasks and the new task can be met. Admission control has to be efficient and efficient, meaning that a decision should be made quickly while admitting the maximum number of tasks. In this dissertation, we study a utilization-based admission control mechanism. Utilization-based admission control makes an admission decision based on a simple resource utilization test: A task will be admitted if the resource utilization is lower than a pre-derived safe resource utilization bound. The challenge of obtaining a safe resource utilization bound is how to perform delay analysis offline, which is the main focus of this dissertation. For this, we develop utilization-based delay guarantee techniques to render utilization-based admission control both efficient and effective, which is further confirmed with our data. We develop techniques for several systems that are of practical importance. We first consider wired networks with the Differentiated Services model, which is wellknown as its supporting scalable services in computer networks. We consider both cases of providing deterministic and statistical delay-guaranteed services in wired networks with the Differentiated Services model. We will then extend our work to wireless networks, which have become popular for both civilian and mission critical applications. The variable service capacity of a wireless link presents more of a challenge in providing delay-guaranteed services in wireless networks. Finally, we study ways to provide delayguaranteed services in component-based systems, which now serve as an important platform for developing a new generation of computer software. We show that with our utilization-based delay guarantee technique, component-based systems can provide efficient and effective delay-guaranteed services while maintaining such advantages as the reusability of components.

Page generated in 0.1153 seconds