• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 21
  • 12
  • 12
  • 6
  • 6
  • 5
  • 4
  • 2
  • 1
  • Tagged with
  • 94
  • 15
  • 13
  • 11
  • 9
  • 9
  • 8
  • 8
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Metodologia para aferi??o do n?vel de maturidade associado ? interoperabilidade t?cnica nas a??es de Governo Eletr?nico / Assessment methodology for E-Government technical interoperability maturity level

Corr?a, Andreiwid Sheffer 23 November 2012 (has links)
Made available in DSpace on 2016-04-04T18:31:32Z (GMT). No. of bitstreams: 1 Andreiwid Sheffer Correa.pdf: 4501821 bytes, checksum: 3d9f7fecc118ff0dc70b11ea481d5e67 (MD5) Previous issue date: 2012-11-23 / The unstructured and unplanned implementation of technological solutions leads to wastage of resources and imposes itself as a barrier to achieving the potential benefits of information technologies and communication. The problem increases when managers who operate these technologies are part of the public administration, as structural issues make this scenario open for merely temporary, strictly proprietary, experimental or doomed to obsolescence solutions, resulting in interoperability problems. Thus, the possible damage extrapolates financial issues and compromise expected social return. In an attempt to avoid this problem, several countries are developing and adopting government interoperability frameworks to guide their actions in electronic government. These architectures expose successful solutions for technical, semantic and organizational dimension of interoperability, and reflect on the best path according to the understanding of its government. However, specifically for the technical dimension, there is no way to evaluate the effectiveness of these architectures and assess how the solutions are interoperable. This work aims to propose a maturity model for technical interoperability in order to assess the use of standards and assist software and systems engineers, as well as professionals in general, to focus their efforts on the use of recommended technologies by good practices. It has been based on e-PING architecture, which is the Brazilian standard for interoperability. In addition, this work proposes the development and use of a rule-based system that implements fuzzy logic to assist evaluation and adherence to the model. To verify model feasibility and validate the developed system, this paper also uses a real scenario as the basis of analysis of interoperability. / A implementa??o desestruturada e n?o planejada de solu??es tecnol?gicas ? fonte de desperd?cio de recursos e imp?e-se como barreira para obten??o dos potenciais benef?cios do uso das tecnologias da informa??o e comunica??o. O problema acentua-se quando gestores dessas tecnologias atuam para a administra??o p?blica, pois quest?es estruturais fazem com que este cen?rio abra espa?o para solu??es pontuais e transit?rias, estritamente propriet?rias, experimentais ou fadadas ? obsolesc?ncia, o que resulta em problemas de interoperabilidade. Desse modo, os poss?veis danos extrapolam o sentido financeiro por comprometer o retorno social esperado. Na tentativa de contornar essa quest?o, v?rios pa?ses v?m desenvolvendo e adotando as arquiteturas de interoperabilidade governamentais para orientar suas a??es de governo eletr?nico. Essas arquiteturas buscam evidenciar, a partir dos aspectos t?cnicos, sem?nticos ou organizacionais, as solu??es bem sucedidas e aceitas universalmente, al?m de refletirem o melhor caminho para a interoperabilidade, segundo o entendimento de cada governo. No entanto, especificamente para o aspecto t?cnico, n?o existe um meio para avaliar a efetiva utiliza??o dessas arquiteturas e aferir o qu?o interoper?veis as solu??es se encontram. Este trabalho visa propor um modelo de maturidade para interoperabilidade t?cnica com o objetivo de medir o uso de padr?es de interoperabilidade e auxiliar engenheiros de softwares e de sistemas, assim como profissionais em geral, a direcionar seus esfor?os no emprego de tecnologias consagradas pelas boas pr?ticas de mercado. Tem-se, como base para a constru??o do modelo, a arquitetura e-PING, que ? o padr?o brasileiro de interoperabilidade. Adicionalmente, este trabalho prop?e o desenvolvimento e utiliza??o de um sistema baseado em regras que emprega l?gica nebulosa para auxiliar no processo de avalia??o da ader?ncia ao modelo. Para verifica??o da viabilidade do modelo e valida??o do sistema desenvolvido, este trabalho tamb?m utiliza um cen?rio real para servir de base de an?lise da interoperabilidade.
62

地方政治與公共政策-高屏溪雙園大橋上下游違法魚塭拆除事件之個案分析

洪堯棟, HONG, YAO-DONG Unknown Date (has links)
公共政策需要經由政府間的行動來達成,特別是許多情況下,中央政府的政策並非由 本身去執行,而是透過各層級的政府來完成。我國的政治制度採均權利度,在此制度 下地方政府具有雙重資格:一方面以公法人資格,基於地方特殊需要處理地方公共事 務;一方面以國家官署的資格,執行中央或上級政府的法令,處理國家性質的事務。 因此,地方政府在政策執行過程中扮演重要角色,地方政策執行良窳,影響國家整體 政策一致性。地方政府與其他參與者在地方執行環境下的互動,實為研究整個執行過 程不可或缺的一部分。 然而對地方政治的忽略,主要是因為對於地方的政治參與者(包括地方官員、政治人 物、派系、利益團體等等)、政治制度以及政治衝突缺乏了解。本文試圖以高屏溪違 法魚塭拆除事件的做為個案,探討地方政治運作與公共政策執行間的關係。 本文共計六章:第一章為結論,說明本文之研究動機、範圍和目的,以及研究方法和 限制;第二章為理論架構,檢視目前有關政策執行的研究途徑以建構適合本國案的分 析架構;第三章為高屏溪違法魚塭拆除過程的詳細描述,以為理論印證的前引;第四 、五兩章為理論對個案的解釋;第六章為結論,摘要本研究的發現,並提出建議。
63

習近平的「中國夢」到「一帶一路」的實踐 / The Belt and Road Initiative :How Xi jin-ping Realizes his"Chinese Dream"

謝采彤 Unknown Date (has links)
習近平出身紅二代,不同於前幾代中國大陸領導人以傳統意識形態路線為施政主軸,習近平卻提出了訴諸情感的「中國夢」。 既稱之為夢,即有無限想像空間,難加以具體化。而「中國夢」的戰略觀構想,不僅為主導與型塑著習近平時代中共的對外政策、戰略規劃與全球佈局。當前,「中國夢」的內涵伴隨著情勢發展和現實需要不斷的擴充,不僅積極應處周邊關係,穩定亞太地區、妥善處理海權爭議、牽制美國亞太「再平衡」戰略,並向西推進「一帶一路」戰略。 「一帶一路」不僅是彰顯習近平中國特色的大國外交理念,也創新發展中國外交思想和國際戰略,使對外工作具有鮮明的中國特色、中國風格、中國氣派,更推進中國新一輪對外開放並與沿線國家合作共贏的外交方略。 因此,從習近平擘劃的「中國夢」藍圖下,透由「一帶一路」戰略構想,開創對外政經合作的新格局,將成為習近平「中國夢」的歷史定位。
64

京漢鐵路的建設及其對於近代中國經濟之影響. / Jing Han tie lu de jian she ji qi dui yu jin dai Zhongguo jing ji zhi ying xiang.

January 1975 (has links)
Thesis (M.A.)--香港中文大學. / Manuscript. / Includes bibliographical references (leaves 1-34 (3d group)). / Thesis (M.A.)--Xianggang Zhong wen da xue. / 前言 --- p.1 / Chapter 第一章 --- 京漢鐵路修築的倡議與鐵路總公司的成立 --- p.7 / Chapter 第一節 --- 甲午戰爭前劉銘傳、張之洞築路建議的失敗 --- p.7 / Chapter 第二節 --- 盛宣懷與鐵路總公司 --- p.24 / Chapter 第二章 --- 盧漢鐵路借款 --- p.45 / Chapter 第一節 --- 張之洞、盛宣懷與美、英財團的活動 --- p.45 / Chapter 第二節 --- 比利時借款的一波三折 --- p.55 / Chapter 第三章 --- 盧漢鐵路的修築 --- p.83 / Chapter 第一節 --- 準備階段與築路初期所遇之困難 --- p.83 / Chapter 第二節 --- 工程的進展與完成 --- p.110 / Chapter 第四章 --- 京漢鐵路的支线 --- p.124 / Chapter 第一節 --- 正太鐵路 --- p.125 / Chapter 第二節 --- 道清鐵路 --- p.142 / Chapter 第三節 --- 汴泈鐵路 --- p.153 / Chapter 第五章 --- 京漢鐵路的贖回 --- p.160 / Chapter 第一節 --- 贖路運動的背景及盛宣懷的先見 --- p.160 / Chapter 第二節 --- 陳璧、梁士詒的籌集贖款 --- p.170 / Chapter 第三節 --- 英法匯豐、匯理贖路借款 --- p.179 / Chapter 第六章 --- 京漢鐵路業務成績的檢討 --- p.197 / Chapter 第一節 --- 京漢路業務成績之優良表現 --- p.197 / Chapter 第二節 --- 京漢路業務成績優良的原因 --- p.218 / Chapter 第七章 --- 京漢鐵路對中國鐵路事業的影响 --- p.239 / Chapter 第一節 --- 鐵路總公司之成立 --- p.239 / Chapter 第二節 --- 路權爭奪戰的導火线 --- p.254 / Chapter 第三節 --- 漢路與粤漢鐵路贖回運動 --- p.286 / Chapter 第八章 --- 京漢路與中國煤礦資源的開發 --- p.320 / Chapter 第一節 --- 京漢路沿线煤礦的開發 --- p.327 / Chapter 第二節 --- 鐵路沿線煤礦發展所受之限制 --- p.353 / Chapter 第三節 --- 山西煤礦開發的失敗 --- p.393 / Chapter 第九章 --- 華北農村經濟變化與京漢鐵路之關係 --- p.425 / Chapter 第一節 --- 定縣高陽土布業的興起 --- p.426 / Chapter 第二節 --- 許昌種菸事業的發達 --- p.467 / Chapter 第三節 --- 華北農村其他方面的轉變 --- p.479 / Chapter 第十章 --- 京漢鐵路的其他影響 --- p.506 / Chapter 第一節 --- 金融事業的發展與京漢鐵路的關係 --- p.506 / Chapter 第二節 --- 京漢鐵路與漢陽鐵廠 --- p.528 / Chapter 第三節 --- 京漢路與監運的變化 --- p.540 / 結論 --- p.558 / 清季京漢鐵路大事年表 --- p.569 / 參考書目 --- p.588
65

The major security challenges to cloud computing.

Inam ul Haq, Muhammad January 2013 (has links)
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero & Llorente, 2012). A distinctive cloud is affected by different security issues such as Temporary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011). The purpose of this study is to bridge the research gap between the cloud security measures and the existing security threats. An investigation into the existing cloud service models, security standards, currently adopted security measures and their degree of flawless protection has been done. The theoretical study helped in revealing the security issues and their solutions whereas the empirical study facilitated in acknowledging the concerns of users and security analysts in regards to those solution strategies. The empirical methods used in this research were interviews and questionnaires to validate the theoretical findings and to grasp the innovativeness of practitioners dealing with cloud security.With the help of theoretical and empirical research, the two-factor mechanism is proposed that can rule out the possibility of flashing attacks from remote location and can help in making the cloud components safer. The problem of junk traffic can be solved by configuring the routers to block junk data packets and extraneous queries at the cloud outer-border. This security measure is highly beneficial to cloud security because it offers a security mechanism at the outer boundary of a cloud. It was evaluated that a DOS attack can become a huge dilemma if it affects the routers and the effective isolation of router-to-router traffic will certainly diminish the threat of a DOS attack to routers. It is revealed that the data packets that require a session state on the cloud server should be treated separately and with extra security measures because the conventional security measures cannot perform an in-depth analysis of every data packet. This problem can be solved by setting an extra bit in the IP header of those packets that require a state and have a session. Although this change should be done at universal level and would take time; it can provide a protocol-independent way to identify packets which require extra care. It will also assist firewalls to drop bits which are requesting a session sate without a state-bit being set. The cloud security analysts should consider that the interface and authentication layer should not be merged into a single layer because it endangers the authentication system as the interface is already exposed to the world. The use of login-aiding devices along with secret keys can help in protecting the cloud users. Moreover, a new cloud service model “Dedicated cloud” is proposed in this research work to reinforce the cloud security. It was discovered that the optimal blend of HTTPS and SSL protocols can resolve the problem of session hijacks. The client interface area should be protected by HTTPS protocols and the secure cookies should be sent through a SSL link along with regular cookies. Disallowing the multiple sessions and the use of trusted IP address lists will help even further. A reasonable amount of care has been paid to ensure clarity, validity and trustworthiness in the research work to present a verifiable scientific knowledge in a more reader-friendly manner. These security guidelines will enhance the cloud security and make a cloud more responsive to security threats. / Program: Masterutbildning i Informatik
66

The oral epidemiology of 45-64 year-old Chinese residents of a housing estate in Hong Kong periodontal health status /

Sou, Son-chio, Sammy. January 1988 (has links)
Thesis (M.D.S.)--University of Hong Kong, 1988. / Also available in print.
67

La représentation occidentale de la cruauté dans l'art contemporain chinois

Qian, He January 2008 (has links) (PDF)
Le présent mémoire traite de la représentation occidentale de la cruauté dans l'art contemporain chinois. Cet art extrême est apparu vers la fin des années 1990 sur la scène artistique chinoise. Une grande part des pratiques extrêmes des artistes chinois a été introduite en Occident au début des années 2000, suscitant de vives réactions. Trois expositions européennes constituent notre corpus de recherche: l'exposition Hors Limites en 1994, la 5e Biennale d'art contemporain de Lyon en 2000, et l'exposition Mahjong en 2005 à Berne (Suisse). Dans les trois expositions, la mise en scène de la cruauté par les artistes chinois a suscité débats et controverses, et dans certains cas, l'intervention des tribunaux. Les oeuvres litigieuses chinoises ont toutes été censurées: soit interdites d'exposition, soit remplacées par des photographies. Notre problématique porte sur le «déséquilibre implicite» (Sally Price) qui caractérise le traitement et la représentation de l'art contemporain chinois dans les expositions occidentales. Alors que les pratiques extrêmes occidentales (actionnisme viennois, body art...) font l'objet de controverses essentiellement esthétiques, on assiste à un glissement du registre esthétique au registre juridique lorsqu'il s'agit de l'art contemporain extrême chinois. En effet, les oeuvres chinoises ne semblent pas, à l'instar des oeuvres occidentales, jouir de la même autonomie artistique et leur sort ne dépend pas des commissaires et des critiques mais plutôt des avocats et des juges. Ce traitement juridique des oeuvres litigieuses chinoises renverse les principes esthétiques que l'Occident a établi depuis le XIXe siècle: la liberté artistique, l'autonomie de l'oeuvre, la possible transgression de la mimésis. L'universalité de la notion d'art se heurte ici au caractère prétendument extraordinaire de la culture chinoise. En fait, ces cas de censure révèlent les fantasmes que l'Occident n'a cessés de nourrir au cours de son histoire sur la Chine, et sur le lien consubstantiel que la culture chinoise entretiendrait avec la cruauté. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : Art contemporain chinois, Art et cruauté, Art et censure, Huang Yong-ping, Xiao Yu, « Groupe Cadavre».
68

The influence of the Electoral Reforms of Legislators to the Kuomintang in Ping-Tung County

Huang, Ci-yuan 13 January 2009 (has links)
The single non-transferable vote (SNTV) system was mainly used for Taiwan¡¦s electoral system after several reforms. However, most democratic countries already don¡¦t adopt any more the SNTV system which is not appropriate. In order to combat the abuses in electoral system and implement democracy, the single-member district and two-vote system is definitely needed. By using this system, the voters can elect the capable People¡¦s Representatives and the parliamentary quality and efficiency will be enhanced. Taiwan started to use this single-member district and two-vote system from the 7th Legislative Yuan Election. In this study, we¡¦ll observe how the legislative seats of the Kuomintang (KMT) Party have been changed in Ping-tung County. The electoral reform usually affects the results. Therefore, the KMT Party desired to extend their territory by this reform and used different strategies for the three political districts respectively: non-nomination, negotiation and recruitment. In Ping-tung County, the KMT Party¡¦s territory has been always inferior to Democratic Progressive Party (DPP)¡¦s. In the past, the KMT Party was just one third of the seats of the DPP in the Legislative Yuan Election. Consequently, the KMT Party expected to break through the awkward situation after the 7th Legislative Yuan Election. Nevertheless, the KMT didn¡¦t succeed. Thus it is evident that if the KMT Party longs for victory, they will not only rely on the reform of electoral system, but also need to improve themselves in many perspectives.
69

Information Hiding in Networks : Covert Channels

Ríos del Pozo, Rubén January 2007 (has links)
<p>Covert Channels have existed for more than twenty years now. Although they did not receive a special attention in their early years, they are being more and more studied nowadays. This work focuses on network covert channels and it attempts to give an overview on their basics to later analyse several existing implementations which may compromise the security perimeter of a corporate network. The features under study are the bandwidth provided by the channel and the ease of detection. The studied tools have turned out to be in most cases unreliable and easy to detect with current detection techniques and the bandwidth provided is usually moderate but they might pose a threat if not taken into consideration.</p>
70

Information Hiding in Networks : Covert Channels

Ríos del Pozo, Rubén January 2007 (has links)
Covert Channels have existed for more than twenty years now. Although they did not receive a special attention in their early years, they are being more and more studied nowadays. This work focuses on network covert channels and it attempts to give an overview on their basics to later analyse several existing implementations which may compromise the security perimeter of a corporate network. The features under study are the bandwidth provided by the channel and the ease of detection. The studied tools have turned out to be in most cases unreliable and easy to detect with current detection techniques and the bandwidth provided is usually moderate but they might pose a threat if not taken into consideration.

Page generated in 0.0132 seconds