• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 372
  • 176
  • 108
  • 78
  • 50
  • 44
  • 25
  • 13
  • 11
  • 10
  • 10
  • 9
  • 8
  • 7
  • 5
  • Tagged with
  • 1082
  • 109
  • 107
  • 104
  • 95
  • 90
  • 74
  • 69
  • 67
  • 59
  • 53
  • 52
  • 51
  • 50
  • 50
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Counter IED : Är den svenska försvarsmakten anpassad för internationellt arbete? En fallstudie av den svenska försvarsmakten / Counter-IED : Is the Swedish Armed Forces adapted for international operations? A comparison between NATO and the Swedish Armed Forces concerning C-IED operations.

Brandt, Gustav January 2010 (has links)
Den svenska försvarsmakten har genomgått en förändring mot ett insatsförsvar från ett invasionsförsvar. I dagsläget genomför Försvarsmakten insatser internationellt, tillsammans med flera olika nationer, något som ställer krav på interoperabilitet. Försvarsmakten har genomfört insatser i Afghanistan sedan 2002 och har där varit med om utvecklingen av IED-hotet och på så sätt blivit tvungen att genomföra en anpassning. Hur långt har denna anpassning kommit, främst i form av utbildning och direktiv utgivna av Försvarsmakten? Ett tydligt mål är uppsatt men finns underlaget för att nå detta mål? I uppsatsen kommer jag att jämföra de styrningar som finns i målet, NATO 2294 och AJP 3.15, med de direktiv som Försvarsmakten har gett ut och de krav som ställs på utbildning. / The Swedish Armed Forces have transformed from being mainly a national defence force to becoming a mission-based force, capable of being deployed within and outside the Swedish border. Currently, the Swedish Armed Forces are operating internationally, with several other nationalities. It has therefore become important for the Armed Forces to be capable of operating with other nations. Since the beginning of 2002, the Swedish Armed Forces has been operating in Afghanistan and experienced the changes in the level of IED-threat and has been forced to adapt to it. How far has this adaptation come, with focus on training and instructions? There is a goal stated, but do the necessary qualities exist? In this paper I will compare the goal, NATO STANAG 2294 and AJP 3.15, with the instructionsand the demands on training that the Swedish Armed Forces has developed.
72

Low Power Frequency Synthesizer

Wu, Feng-Ji 21 July 2006 (has links)
This thesis presents the CMOS integer-N frequency synthesizer for 2 GHz 802.11 WLAN applications with 1.8V power supply. The frequency synthesizer is fabricated in a TSMC 0.18£gm CMOS 1P6M technology process. The frequency synthesizer consists of a phase-frequency detector, a charge pump, a loop filter, and a pulse-swallow counter. In pulse-swallow counter, we use less numbers of transistors divide-by-2/3 prescaler to work in high frequency in order to reduce power consumption. We complete the design of pulse-swallow counter for 2-GHz (seven channels) and the 5-GHz (four channels) application. The average power consumption of pulse-swallow counter is 2.49 mW and 2.98 mW for 2-GHz and 5-GHz application respectively. We use Verilog-A language to complete VCO behavior model for frequency synthesizer and utilize the Spectre simulation results justify the feasibility of our proposed frequency synthesizer. The total power consumption of frequency synthesizer is 3.432mW and 4.673mW for 2-GHz and 5-GHz frequency synthesizer, respectively.
73

Zodiacal Light and Counter-Glow and the Photography of Large Areas and Faint Contrasts

Douglass, A.E. January 1916 (has links)
Read before the Royal Photographic Society of Great Britain on December 14th, 1915.
74

Counter-Surveillance in an Algorithmic World

Dutrisac, James George 26 September 2007 (has links)
Surveillance is the act of collecting, analysing, and acting upon information about specific objects, data, or individuals. Recent advances have allowed for the automation of a large part of this process. Of particular interest is the use of computer algorithms to analyse surveillance data. We refer to surveillance that uses this form of analysis as *algorithmic surveillance*. The rapid growth of algorithmic surveillance has left many important questions unasked. Counter-surveillance is the task of making surveillance difficult. To do this, it subverts various components of the surveillance process. Much like surveillance, counter-surveillance has many applications. It is used to critically assess and validate surveillance practices. As well, counter-surveillance serves to protect privacy, civil liberties, and against abuses of surveillance. Unfortunately, counter-surveillance techniques are often considered to be of little constructive use. As such, they are underdeveloped. At present, no counter-surveillance techniques exist that are able to adequately address algorithmic surveillance. In order to develop counter-surveillance methods against algorithmic surveillance, the *process* of surveillance must first be understood. Understanding this process ensures that the necessary components of algorithmic surveillance will be identified and subverted. As such, our research begins by developing a model of the surveillance process. This model consists of three distinct stages: the collection of information, the analysis of that information, and a response to what has been discovered (the action). From our analysis of the structure of surveillance we show that counter-surveillance techniques prior to now primarily address the collection and action stages of the surveillance process. We argue that the neglect of the analysis stage creates significant problems when attempting to subvert algorithmic surveillance, which relies heavily upon a complex analysis of data. As such, we go on to demonstrate how algorithmic analysis may be subverted. To do this, we develop techniques that are able to subvert three common algorithmic analysis techniques: classification, cluster analysis, and association rules. Each of these attacks against algorithmic analysis works surprisingly well and demonstrate significant flaws in current approaches to algorithmic surveillance. / Thesis (Master, Computing) -- Queen's University, 2007-09-18 10:42:21.025
75

Ensuring Respiratory Protection through Respirator Fit Testing and Real-Time Monitoring

Wu, Bingbing 30 October 2018 (has links)
No description available.
76

Digging up memory : suppressed objects during the dictatorship in Chile 1973–1990 / Att gräva fram minnet : Undertryckta föremål under diktaturen i Chile 1973–1990

Vera Oliva, Marcela January 2023 (has links)
This work deals with objects suppressed by individual people after the 1973 coup in Chile, due to the repression exerted by the installed civic-military dictatorship. It collects the memories of those who had to get rid of compromising objects to save their lives, pointing out the strategies chosen for this purpose, as well as the places to carry them out. It shows that the strategies varied and depended on different circumstances. This work is also about the value given to objects and the way in which the functions of objects change according to political circumstances. It highlights the memories created in contrast to the discourses of official history and to forced oblivion. / Detta arbete handlar om de föremål som förtrycktes av enskilda människor efter statskuppen i Chile 1973, på grund av förtrycket som den installerade civil-militära diktaturen utövade. Det samlar in minnen av de som var tvungna att göra sig av med kmpromissande föremål för att rädda sina liv, och pekar ut de strategier som valdes för detta ändamål, såväl som platserna för att utföra dem. Det visar att strategierna varierade och berodde på olika omständigheter. Dat här arbetet handlar även om de värderingar som ges till föremål och hur föremålens funktioner förändras beroende på politiska omständigheter. Det lyfter fram minnet som skapats i kontrast till den officiella historiens diskurser och till påtvingad glömska.
77

Model-Checking in Presburger Counter Systems using Accelerations

Acharya, Aravind N January 2013 (has links) (PDF)
Model checking is a powerful technique for analyzing reach ability and temporal properties of finite state systems. Model-checking finite state systems has been well-studied and there are well known efficient algorithms for this problem. However these algorithms may not terminate when applied directly to in finite state systems. Counter systems are a class of in fininite state systems where the domain of counter values is possibly in finite. Many practical systems like cache coherence protocols, broadcast protocols etc, can naturally be modeled as counter systems. In this thesis we identify a class of counter systems, and propose a new technique to check whether a system from this class satires’ a given CTL formula. The key novelty of our approach is a way to use existing reach ability analysis techniques to answer both \until" and \global" properties; also our technique for \global" properties is different from previous techniques that work on other classes of counter systems, as well as other classes of in finite state systems. We also provide some results by applying our approach to several natural examples, which illustrates the scope of our approach.
78

Les tiers-espaces une analyse de l'ambivalence dans La bagarre et Les pédagogues de Gérard Bessette, The apprenticeship of Duddy Kravitz et The Street de Mordecai Richler

Bazinet, Nolan January 2011 (has links)
In Critical Practice, Catherine Belsey states how traditionally, classic realism is interpreted as a genre that"presents individuals whose traits of character, understood as essential and predominantly given, constrain the choices they make" (Belsey 74). Belsey's claim is significant in that it articulates what is often the locus of tension and conflict in the genre: rigid, essentialist identitary discourse.In summarizing and considering the various identitary discourses at play within Mordecai Richler's The Apprenticeship of Duddy Kravitz and The Street and Gérard Bessette's La bagarre and Les pédagogues, the purpose of this thesis is to analyse how issues surrounding constructions of identity are dramatized in these classic realist, satirical texts in order to show how their cultural work in terms of identity can be understood as being more ambivalent than has heretofore often been thought. The thesis' theoretical focus is rooted primarily in post-colonial theory, especially the ways it interrogates representations of cultural and ethnic struggles for recognition and power that are a result of colonial and/or cultural hegemonic domination. More specifically, the thesis discusses and appropriates the theory and concepts of the post-colonial critic Homi K. Bhabha, particularly in terms of how the selected primary texts can be said to exemplify Bhabha's notions of ambivalence, hybridity and a Third Space of identity; how the narratives' main conflicts and tensions around identity can be better understood by looking at how some of the characters can be said to inhabit a Third Space. However, the thesis will also show that while Bhabha's claim that instances of ambivalence, hybridity and the Third Space in the selected texts can be said to represent" neither the one [...], nor the Other [...] but something else besides which contests the terms and the territories of both [i.e. of competing identities]," (Bhabha 41) their concomitant essentialist discourses can be said to trouble the idealism of Bhabha's faith in such notions.In short, this thesis posits that though the selected texts perform important cultural work via their complex problematizations of the ambivalence of said discourses, they also satirize and critique essentialist and ethnocentric discourses.
79

Foreign aid and the effectiveness of international counter-terrorism conventions

Pascoe, Henry Baker 14 October 2014 (has links)
In the contemporary international system, non-state actors pose an acute threat to the interests of states. Transnational terrorism is a particularly notable example of the security threats that non-state actors pose. While the literature on international agreements has focused on state-level compliance, much of international law concerns the behavior of non-state entities such as terrorist groups, transnational crime organizations, corporations, and individuals. This study considers whether the international counter-terrorism regime developed over the past five decades has been effective at reducing transnational terrorism and consider the implications for the study of other instruments of international law which regard non-state actor behavior. Because these agreements establish clear benchmarks, they provide observable outcomes for donors that may want to give foreign aid, but are uncertain about whether aid recipients will use aid for its intended purpose. Agreements allow donors to condition aid allocation on benchmarks set by treaties, rather than observed levels of non-state behavior alone, increasing donor-recipient trust and capacity building aid flows. I find that countries ratifying counter-terrorism agreements see a significant increase in foreign aid receipts. I then assess the effectiveness of eight UN counter-terrorism conventions individually, using terrorism data germane to the type of terrorist activity the specific agreement attempts to curtail. I find support for the hypothesis that counter-terrorism agreements reduce transnational terrorism for five of the agreements in issue areas of terrorist bombing, kidnapping, hostage-taking, and financing. I conclude by discussing how the variation in effectiveness of counter-terrorism agreements found may help shed light on the design of effective international agreements when the locus of compliance is non-state actors and treaty design more generally. / text
80

相對貿易之研究

陳吉山, CHEN, JI-SHAN Unknown Date (has links)
現代國際貿易運作,關係一國經際發展甚鋸,尤以高貿易依存之我國經濟更顯重要。 當前貿易保護色彩日濃,貿易障礙重重,且衡諸其他非貿易因素,相對貿易(Gount- er-trade)之採行,已然成為貿易拓展之新利器。本論文乃以我國發展相對貿易作為 研究主題。從相對貿易操作一般性探討著眼,配合攸關貿易法規,揭櫫我國發展相對 貿易之道;俾業者採行相對貿易有所參考,能靈活運用,進一步開展我國對外貿易。 本論文共壹冊,分捌章,約捌萬元- 第壹章緒論:包括研究動機與目的、研究方法與限制,以及範圍界定。 第貳章相對貿易發展:揭露相對貿易發展沿革、現況及其使用時宜。 第參章相對貿易型態:介紹各型相對貿易及其特點、操作程序與適用性。 第肆章相對貿易合約:探討相對貿易合約內容、談判及訂約技巧與原則。 第伍章相對貿易融資:解析相對貿易融資方式及探討其運用。 第陸章相對貿易策略及其運作機構:配合政府政策、態度,訂定相對貿易策略;組織 適行之運作機構,以推動相對貿易提案。 第柒章相對貿易個案研究:提出相對貿易操作實例,俾業者對相對貿易操作有整體概 念。 第捌章結論與建議:包括總結、建議及未來展望。

Page generated in 0.062 seconds