• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 156
  • 87
  • 38
  • 26
  • 13
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 396
  • 86
  • 56
  • 54
  • 45
  • 39
  • 39
  • 38
  • 32
  • 32
  • 32
  • 32
  • 31
  • 30
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Factors influencing retention rates in secondary schools within the Wollongong region

Repetylo, Anna H., n/a January 1993 (has links)
Throughout the 1980s, there was a trend in Australia towards increased participation rates in post-compulsory education. This study examines factors that influence Year 12 retention rates in four Government secondary schools within the Wollongong Sub-Region. Factors that were thought to influence students to continue to Year 12 and sit for the New South Wales Higher School Certificate Examination included those related to Gender, Socio-economic (relating to occupation of parents, government financial assistance, and language background), Educational and Career. The study involved surveying over 400 Year 10 students in four schools by questionnaires. These schools were chosen for their geographical location and to include two schools with a history of high retention rates and two schools with low retention rates. The questions in the survey were incorporated with a larger survey conducted in 1989 by the Faculty of Education at the University of Wollongong under the coordination of Dr. Noeline Kyle ("Everyone expects you to know; A report on careers advice and industry attitudes towards female students in non-traditional study and work in the Illawarra", 1990). The questionnaire was piloted in 1988 and after seeking recommendations from students, teachers and the NSW Department of School Education Research Group, the survey was administered in 1989. The study used descriptive research methodology, and Chi-square analysis was used to establish significance levels in the data. With regard to gender, the data clearly demonstrated that female students were more inclined than male students to stay on to Year 12, and have positive reasons for their decision. Concerning Socio-Economic factors, the results of this study showed that students whose parents have a professional background are more likely to stay on to Year 12. In addition, the achievement of the Higher School Certificate as a preIV requisite for further study was a strong motivating factor for students staying on to Year 12. However, students in receipt of Austudy did not appear to relate in a statistically significant manner with any of the factors that influence the student to stay on to Year 12. As well, no statistical inference could be drawn from intention to sit for the HSC and the language most used at home by parents. With regard to educational factors, the responses from each of the four schools surveyed showed a high percentage (82 to 85%) of students intending to stay on to Year 12 and sit for the HSC examination. None of these schools had an appreciably higher proportion of students intending to sit the HSC exam. However, it was found that students from one particular school were more likely to undertake further study and students from this school had a high percentage of both parents with a professional occupation than any other school. The findings relating to career factors showed that students who have a professional career in mind are more likely to proceed to Year 12. It was also found that students who had school work experience in a professional occupation were more likely to proceed to Year 12. The study relates the survey findings to the research literature in Australia, and also includes a discussion of the limitations of the survey.
82

Explanation in human geography : some implications for teaching

Sullivan, Ian W., n/a January 1985 (has links)
As a teacher of the New South Wales Higher School Certificate Geography Syllabus in the 1970s, I became aware of problems of interpretation and implementation of syllabus documents dealing with models and theories of human aggregate behaviour. A positivistic underpinning allowed explanation in human geography to employ deductive - nomological methodology. This field study investigates a defined literature of academic geography including journals, and both secondary and tertiary documents to identify the extent and quality of nomothetic and idiographic traditions from the late 19th century to the mid 1970s. The literature prior to the late 1950s revealed a dominant regional tradition and idiographic methodology with an emphasis on description of uniqueness of areal phenomena. But underlying currents of a nomothetic nature, running parallel to this regionalidiographic tradition,exerted a noticeable challenge to gain acceptance in geographic circles. This kind of nomothetism was in the form of environmental determinism which held that physical laws operating in nature were also at work to shape and direct human societies. Environmental determinism contained generalised assertions, enjoyed some appeal, but lacked rigorous justification. Even within regional frameworks, authors used environmentally induced determinants to explain the unique character of regions. Not until the 1930s did environmental determinism lose its appeal, after which time the regional - idiographic tradition strengthened as an explanatory mode of human behaviour. Nomothetism emerged in the late 1950s in Australia in the application of models and theories explaining human behaviour. Normative theory was supported by an increased use of quantification and by the growing preference for systematic studies in geography. Neither mode of explanation exists at the total exclusion of the other; so that while nomothetism enjoyed widespread appeal in academic geography from the late 1950s, significant challenges were mounted against it because of its inadequacies as a mode of explaining human aggregate behaviour. Nomothetic explanation in human geography can be seen at the research level and in education circles. Many normative models and theories found their way into senior geography courses to the extent they promoted a systems approach. Teachers would have been aware of normative theory in geography from their university studies and teacher training courses during the late 1950s and throughout the 1960s. The tension between associated explanatory modes in systematic and regional geography becomes apparent in the analysis of the N.S.W. H.S.C. Geography Syllabus in which confusing statements raise problems for teachers interpreting and implementing this prescriptive document. Given these tensions and problems of explanation in human geography, the adoption of a critical rationalist viewpoint as propounded by Karl Popper is suggested as a possible solution for geography teachers when interpreting a syllabus such as that of the N.S.W. H.S.C. Falsification rather than verification should be the node of inquiry towards explanation of human aggregate behaviour.
83

Look who's talking? : NCEA and learning partnerships. A case study of a lesson. A dissertation submitted in partial fulfilment of the requirements of the degree of Master of Educational Management at UNITEC Institute of Technology [i.e. Unitec New Zealand] /

Munro-Keene, Judy. January 2006 (has links)
Thesis (M.Ed. Mgt.)--Unitec New Zealand, 2006. / Includes bibliographical references (leaves 120-132).
84

An investigation into whether a modification in the double impression marking scheme used in the assessment of English language compositions in the Hong Kong Certificate of Education would benefit the markers and give equally reliable results

Marshall, Marjorie Elaine. January 1983 (has links)
Thesis (M.Ed.)--University of Hong Kong, 1983. / Includes bibliographical references. Also available in print.
85

Quality assurance with TL 9000 in agile software development of set-top boxes : The case of Motorola and the use of Scrum

Gustafsson, Kristofer, Jacobsson, Johan January 2009 (has links)
<p>In today’s fast-paced world, there is a constant demand for better and more efficient ways of doing business. Motorola in Linköping are using the agile development framework, Scrum in their software development. A certain level of quality must also be assured of the delivered goods and services. Is it possible to use Scrum and still meet the quality requirements?</p><p>This Master Thesis is performed to investigate if it is possible to achieve a quality certificate from TL 9000, the telecom industry extension of ISO 9000, when using the agile development framework Scrum. The investigation consists of interviews and observations at Motorola, Linköping, along with literature studies about quality systems and agile development.</p><p>The conclusion is that it is possible to meet the TL 9000 requirements when using Scrum, under the condition that some additional processes are performed and that other parts of the organization also fulfills the remaining requirements. This is needed since there are requirements that are out of scope for the Scrum framework. Examples of the suggested additions are to follow the Scrum framework more strictly and to adopt a more specific definition of done.</p>
86

Säkerhetsutvärdering certifikatserver i stället för aktiva kort / Security evaluation certificate server instead of smartcard

Jensen, Jonas January 2005 (has links)
<p>Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. </p><p>I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware. The method uses a server that stores all cryptographic keys for the user centrally to achieve stronger security. This report is based on a previous report which tested to implement this solution, in this report I will question the security of this system. I will then give an architecture proposal where this method is used to authenticate and allow cryptographic recourses for the user. </p><p>The conclusions you can get from this report is that the possibilities with comparable ease increase the security without investing in new hardware. But the solution will not be comparable by a ``smart card solution''in security levels. That means that the method described in this thesis is suitable for organizations that either do not need that strong security as smart card give or want a good solution without being forced to use some external hardware.</p>
87

Seguridad en redes de computación ubicua: contribución a la validación de credenciales

Hinarejos Campos, M. Francisca 30 June 2010 (has links)
Technology progress in both user devices and networks allows communications anytime and anywhere. New communication environments offer a wide range of possibilities to users, but also generate new threats. For this reason, it is necessary to establish measures to find out who is establishing a communication and what actions is authorized to do. Currently proposed solutions in the literature are not completely adapted to the new features such as user mobility, network disconnections and constraints of devices and networks. Many of the existing proposals have focused in providing specific solutions to particular scenarios, but they do not consider a global heterogeneous scenario. Therefore, it is necessary to design security mechanisms able to adapt themselves to new scenarios. In this sense, digital certificates are a standardized and widely used solution. Digital certificates enable performing user authentication and authorization in a distributed way. The problem is that ubiquitous environments complicate the process of digital certificates validation. This complexity could result in a service being not accessible. The goal of this thesis is to contribute in making ubiquitous scenarios more secure. More specifically, the work proposes solutions for reducing the credential validation cost and for improving the availability of authentication and authorization services. In first place, we propose a solution for credential validation that works properly in environments with connection to on-line servers and also in environments where the connection to servers is sometimes not possible. In second place, we propose a cascade revocation system where the delegation is partially centralized. Delegation provides high flexibility to authorization systems, but adds complexity to the system. Our proposal reduces the burden on the verifier-side. In third place, we propose a revocation system for delegation chains based on prefix codes. This proposal deals with the problem of centralization of the previous proposal. In particular, the decentralized solution presented keeps the load reduction achieved in the partially centralized proposal, and also enables dynamic delegation and distribution of revocation data. While the user is connected, revocation data distribution can be done with a certificate revocation list. However, in scenarios where the connection can be lost temporally, this might not be possible. To address this issue, we have proposed a system in which users can perform the functions of revocation servers without being trusted entities. This will allow increasing the availability of validation service, and reduce resource consumption. Each proposal has been analyzed and compared with existing solutions to verify the improvements achieved. / El avance tecnológico tanto de los dispositivos de usuario como de las redes permite que se puedan establecer comunicaciones en cualquier momento y en cualquier lugar. Si bien estos entornos ofrecen un gran abanico de posibilidades a los usuarios, también es cierto que generan nuevas amenazas. Por este motivo, son necesarias medidas que permitan saber con quién se está estableciendo la comunicación y qué acciones se pueden autorizar. Las soluciones propuestas en la literatura no se adaptan completamente a las nuevas características de movilidad, desconexión y limitaciones tanto de los dispositivos como de las redes. De hecho, muchas de las propuestas existentes se han centrado en ofrecer soluciones concretas a escenarios particulares, sin tener en cuenta que el usuario puede entrar a formar parte de entornos heterogéneos. Por lo tanto, se hace necesario diseñar mecanismos de seguridad que conviviendo con los estándares vigentes, se adapten a los nuevos escenarios. En este sentido, los certificados digitales son una solución estandarizada y ampliamente extendida. Los certificados digitales permiten llevar a cabo tanto la autenticación como la autorización de un usuario de forma distribuida. Sin embargo, las características de los entornos ubicuos complican el proceso de validación de certificados. Esta complejidad podría llevar a que no se puediera acceder a los servicios. El objetivo de esta tesis es contribuir a aumentar la seguridad en entornos ubicuos. Más concretamente, se proporcionan soluciones para reducir la carga en la validación de credenciales y aumentar la disponibilidad de los servicios de autenticación y autorización. En primer lugar se propone un sistema de verificación de credenciales que se adapta para funcionar tanto en entornos con conexión a servidores on-line, como en sistemas off-line. Por otra parte, el proceso de delegación en sistemas de autorización, aporta una gran flexibilidad a estos entornos, pero a su vez añade complejidad al sistema. Para reducir esta carga sobre el verificador se propone un sistema de revocación en cascada con delegación centralizada. Sin embargo, esta centralización del servicio limita la escalabilidad y flexibilidad de la solución. Para dar solución a ese inconveniente, se ha propuesto un sistema de revocación en cadenas de delegación basado en códigos prefijo. Esta solución permite mantener la reducción de la carga en la validación lograda en la propuesta centralizada, y además, hace posible la delegación dinámica y la distribución de la información de revocación. Esta distribución puede realizarse a través de listas de revocación de credenciales. En redes con desconexión temporal esta información podría no estar accesible. Para solventarlo, se ha propuesto un sistema en el que los usuarios pueden realizar las funciones de servidores de revocación sin ser entidades de confianza. De esta forma se permite aumentar la disponibilidad del servicio de validación, y reducir el consumo de los recursos. Cada una de las propuestas realizadas se ha analizado para verificar las mejoras proporcionadas frente a las soluciones existentes. Para ello, se han evaluado de forma analítica, por simulación y/o implementación en función de cada caso. Los resultados del análisis verifican el funcionamiento esperado y muestran las mejoras de las propuestas frente a las soluciones existentes.
88

Vindkraftens framtida scenarier / Possibilities for wind power in the future

Arvidsson, Ida, Ringvall, Angelica January 2012 (has links)
In several countries that have been early in the development of wind farms, there is today a second hand market for the used wind turbines. The European Union (EU) has established a waste hierarchy in order to minimize throwaway mentality. The second hand market is a part of this as the steps are to minimize, reuse, recycle, extract energy and landfill. In order to promote the development of renewable energy, there are energy certificates for the producers that provide it, wind power being one type of renewable energy. After 15 years the energy certificates for a specific wind turbine are no longer paid, and after that there are several different scenarios for the wind turbine. The scenarios investigated in this bachelor’s thesis are export of the wind turbine to countries that are not as far along as Sweden in their development towards renewable energy, selling in Sweden to individuals, and recycling of the wind turbine, as it mostly consists of metals and therefore is recyclable. In these three scenarios it is assumed that the sites for wind turbines are being reused for new larger wind turbines that produce more energy. Two additional scenarios are to reduce the number of wind turbines in a wind farm by half, in this way gaining access to free spare parts for the remaining wind turbines and continued operation, i.e. operate them for as long time as possible. To assure the decommissioning of the wind turbines and restoration of the site, there are several economical choices for the operator of the wind turbine. No matter what choice is made, the total amount should be 500 000 SEK according to the permission for the wind turbine. A Swedish authority, Miljöprövningsdelegationen, decides whether the operators choice in reassuring and make a decision based on that. To see which scenario is most profitable the economical part is crucial in this bachelor’s thesis. As a wind turbine is a large investment, the investment calculation is sensitive even to small changes. Inflation, interest rate, electricity price and energy certificate price can all vary a good deal but as it is almost impossible to predict the development of these factors, the inflation, interest rate and energy certificate price are all on a fixed level in this report. The electricity price is assumed to be dependent of the inflation solely. By using these assumptions and Microsoft Excel it has been clear that selling the wind turbine and reuse the site for a new larger wind turbine is the most profitable. Sweden has the goal to have 30 TWh, equivalent to 20 %, electricity from wind until year 2020. Today the part is 6.5 TWh, equivalent to 4 %. To make this goal reality it is necessary to make the permitting process easier and faster than the case is today. If Sweden compares to Denmark they already have 28 % electricity from wind and they aim for 50 %. / I flera länder som har legat i framkant med att uppföra vindkraftsparker finns idag en andrahandsmarknad för verken. Inom Europeiska Unionen (EU) har en avfallshierarki upprättats för att minska slit- och slängmentaliteten. Andrahandsmarknaden är en del i detta då stegen är minimera, återanvända, återvinna, energiutvinna och deponera. För att främja utvecklingen av förnyelsebar el finns elcertifikat till de producenter som tillhandahåller detta, däribland vindkraft. Efter 15 år slutar elcertifikatet att utbetalas för ett specifikt vindkraftverk, och då finns olika scenarier för vindkraftverket. De scenarier som undersöks i detta examensarbete är export av verket till länder som inte kommit lika långt som Sverige med förnyelsebar energi, försäljning inom Sverige till privatpersoner och återvinning av verket, som främst består av metaller och därmed är återvinningsbart. I dessa tre scenarier avses det att samma plats återanvänds för nya större verk som producerar mer. Ytterligare två scenarier är att halvera antalet verk i en park och på så vis få tillgång till gratis reservdelar till de återstående verken samt fortsatt drift av verket, det vill säga köra dem så länge det går. För att säkerställa nedmontering av vindkraftverk och återställning av platsen finns olika ekonomiska alternativ för verksamhetsutövaren. Oavsett vilket alternativ som väljs ska summan resultera i 500 000 kronor per vindkraftverk enligt tillståndet till verket. Miljöprövningsdelegationen (MPD) avgör om verksamhetsutövarens valda alternativ är betryggande och beslutar utifrån det. För att se vad som är det mest lönsamma scenariot spelar den ekonomiska delen en stor roll för arbetet. Eftersom vindkraft är en stor investering blir investeringskalkylen känslig även för små förändringar. Inflationen, räntan, elpriset och elcertifikatpriset är poster som kan variera mycket men eftersom det är i princip omöjligt att förutspå hur utvecklingen kommer se ut är inflationen, räntan och elcertifikatpriset satt på en fast nivå. Elpriset är sedan beroende av inflationen. Med hjälp av dessa antaganden och Microsoft Excel har det mest lönsamma scenariot tagits fram vilket är att sälja verket och sätta upp ett nytt större på platsen. Sverige har som mål att fram till år 2020 ha 30 TWh, motsvarande 20 %, el från vindkraft i elnätet. Idag är andelen 6,5 TWh, motsvarande 4 %. För att detta ska bli verklighet måste tillståndsprocessen förenklas och gå snabbare än vad fallet är idag. Jämförs Sverige med Danmark har de redan 28 % vindkraftsel och siktar på 50 %.
89

Anonymous Multi-Receiver Certificate-Based Encryption

Tsai, Pei-Jen 16 August 2011 (has links)
In a multi-receiver encryption environment, a sender can randomly choose a set of authorized receivers while distributing messages to them efficiently and securely. Recently, more and more researchers concern the privacy of receivers. They mentioned that an authorized receiver does not want other entities, except the service provider, to be able to derive her/his identity in many applications such as pay-TV. However, most of these protocols either provide no formal security proofs or are inefficient owing to high computation cost. In this thesis, we construct two provably secure and efficient anonymous multi-receiver certificated-based encryption schemes, PMCE and SCMCE, which avoid the key escrow problem while preserving the implicit certification of identity-based setting. The proposed PMCE and SCMCE get rid of pairing computation to encrypt a message and only need one and two pairing computations to decrypt the ciphertext, respectively. Finally, we define the security models and offer formal proofs to all properties including receiver anonymity.
90

Authentication in peer-to-peer systems / Autenticering i peer-to-peer system

Åslund, Jonas January 2002 (has links)
<p>In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between nodes in a peer-to-peer environment where nodes are exchanging information directly with each other requires more planning than in a typical client-server environment where the authentication methods are server-based. The peer-to-peer applications described in this report use authentication methods based on central authorities as well as solutions without central authorities. </p><p>Lack of standards in the way peer-to-peer systems should communicate and apply security lead to a variety of “local” communication and security solutions. These local solutions make different applications incompatible with each other, meaning that a peer using one application will not be able to communicate and exchange information with other peers using some other application.</p>

Page generated in 0.0599 seconds