• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 186
  • 146
  • 114
  • 44
  • 42
  • 21
  • 9
  • 8
  • 8
  • 7
  • 5
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 678
  • 118
  • 86
  • 85
  • 62
  • 61
  • 58
  • 58
  • 56
  • 50
  • 48
  • 47
  • 46
  • 45
  • 42
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
511

Bibliothek und Sammlungen der technischen Bildungsanstalt: Moderne Lehrmittel in den Gründungsjahren der TU Dresden

Mauersberger, Klaus 23 August 2006 (has links)
Die Gründung der damaligen Technischen Bildungsanstalt im Jahr 1828 war zugleich die Geburtstunde der späteren Universitätsbibliothek. ...
512

Collaborative security for the internet of things / Sécurité collaborative pour l’internet des objets

Ben Saied, Yosra 14 June 2013 (has links)
Cette thèse aborde des nouveaux défis de sécurité dans l'Internet des Objets (IdO). La transition actuelle de l'Internet classique vers l'Internet des Objets conduit à de nombreux changements dans les modèles de communications sous-jacents. La nature hétérogène des communications de l’IdO et le déséquilibre entre les capacités des entités communicantes qui le constituent rendent difficile l'établissement de connexions sécurisées de bout en bout. Contrairement aux nœuds de l’Internet traditionnel, la plupart des composants de l'Internet des Objets sont en effet caractérisés par de faibles capacités en termes d'énergie et de puissance calcul. Par conséquent, ils ne sont pas en mesure de supporter des systèmes de sécurité complexes. En particulier, la mise en place d'un canal de communication sécurisé de bout en bout nécessite l’établissement d'une clé secrète commune entre les deux nœuds souhaitant communiquer, qui sera négociée en s'appuyant sur un protocole d'échange de clés tels que le Transport Layer Security (TLS) Handshake ou l’Internet Key Exchange (IKE). Or, une utilisation directe de ces protocoles pour établir des connexions sécurisées entre deux entités de l’IdO peut être difficile en raison de l'écart technologique entre celles-ci et des incohérences qui en résultent sur le plan des primitives cryptographiques supportées. Le sujet de l'adaptation des protocoles de sécurité existants pour répondre à ces nouveaux défis a récemment été soulevé dans la communauté scientifique. Cependant, les premières solutions proposées n'ont pas réussi à répondre aux besoins des nœuds à ressources limitées. Dans cette thèse, nous proposons de nouvelles approches collaboratives pour l'établissement de clés, dans le but de réduire les exigences des protocoles de sécurité existants, afin que ceux-ci puissent être mis en œuvre par des nœuds à ressources limitées. Nous avons particulièrement retenu les protocoles TLS Handshake, IKE et HIP BEX comme les meilleurs candidats correspondant aux exigences de sécurité de bout en bout pour l'IdO. Puis nous les avons modifiés de sorte que le nœud contraint en énergie puisse déléguer les opérations cryptographiques couteuses à un ensemble de nœuds au voisinage, tirant ainsi avantage de l'hétérogénéité spatiale qui caractérise l’IdO. Nous avons entrepris des vérifications formelles de sécurité et des analyses de performance qui prouvent la sureté et l'efficacité énergétique des protocoles collaboratifs proposés. Dans une deuxième partie, nous avons porté notre attention sur une classe d’attaques internes que la collaboration entre les nœuds peut induire et que les mécanismes cryptographiques classiques, tels que la signature et le chiffrement, s'avèrent impuissants à contrer. Cela nous a amené à introduire la notion de confiance au sein d'un groupe collaboratif. Le niveau de fiabilité d'un nœud est évalué par un mécanisme de sécurité dédié, connu sous le nom de système de gestion de confiance. Ce système est lui aussi instancié sur une base collaborative, dans laquelle plusieurs nœuds partagent leurs témoignages respectifs au sujet de la fiabilité des autres nœuds. En nous appuyant sur une analyse approfondie des systèmes de gestion de confiance existants et des contraintes de l’IoD, nous avons conçu un système de gestion de confiance efficace pour nos protocoles collaboratifs. Cette efficacité a été évaluée en tenant compte de la façon dont le système de gestion de la confiance répond aux exigences spécifiques à nos approches proposées pour l'établissement de clés dans le contexte de l'IdO. Les résultats des analyses de performance que nous avons menées démontrent le bon fonctionnement du système proposé et une efficacité accrue par rapport à la littérature / This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
513

Disturbance and Dispersal Mechanism as Facilitators to Climate Change-Induced Tree Species Migration

Taylor, Sparbanie January 2021 (has links)
No description available.
514

Mezinárodní daňová optimalizace / International Tax Optimization

Pavliska, Petr January 2016 (has links)
This thesis deals with ICE - industrial services as The company must pay a withholding tax on their invoices received. Economic activity is undertaken in Germany. Company income from the supply of goods and services. Selected issue will be resolved by the formation of a permanent establishment or establishing a subsidiary in Germany. Developed solution provides the possibility of effective expansion into foreign markets. Results of the work allows the company to decide which option is best for her.
515

THE IMPACT OF DIRECT TO CONSUMER SHIPPING LAWS ON THE SIZE DISTRIBUTION OF WINERIES

Pesavento, Matthew Todd 30 July 2019 (has links)
No description available.
516

Growth and Establishment of Newly Planted Street Trees

Sherman, Alexander R 01 January 2013 (has links) (PDF)
Developing quantified establishment period estimates for newly planted trees will help set realistic goals for plant performance in the urban landscape. Nine years of tree planting records obtained from the city of Boston, MA and the town of Brookline, MA were used to derive samples of trunk caliper for hedge maple (Acer campestre), London planetree (Platanus x acerifolia), and red oak (Quercus rubra). Several site characteristics were measured to identify effects on newly planted tree growth. Breakpoint estimates of the piecewise regression models fell at 4 years and 6 years for London planetree and hedge maple respectively, showing establishment periods for urban trees are longer than the conventional 3 years. Pit area has a significant effect on caliper growth for London planetree and red oak, with larger growing spaces yielding larger trees. Observed soil bulk densities did not have a significant effect on caliper measurement for any of the species tested. Mean soil bulk density was 1.4 g/cm3, 1.45 g/cm3, and 1.49 g/cm3 for hedge maple, London planetree, and red oak respectively. Soil texture was significant for hedge maple only, with percent clay showing significant positive effects and percent sand as marginally significant. Pit type showed a significant effect on caliper measurement of London planetree with grass strips producing the largest caliper trees followed by open pits. Planting locations with tree grates produced the smallest caliper trees. Presence of perforated air vents produced significantly larger caliper trees than sites with an air vent present for red oak.
517

行政責任論の応用研究 : 行政改革および行政組織の設置を事例として / ギョウセイ セキニンロン ノ オウヨウ ケンキュウ : ギョウセイ カイカク オヨビ ギョウセイ ソシキ ノ セッチ オ ジレイ トシテ

鏡 圭佑, Keisuke Kagami 21 March 2019 (has links)
本博士論文では行政責任論の応用研究を実施した。行政責任論の応用研究とは、行政責任論の概念または考え方を用いて、行政活動の実態を考察する研究を指す。先行研究のほとんどは行政責任論の概念の理論的な精緻化のみを目的とし、それらが現実の行政の把握にあたって、どのように有用であるのかを確認してこなかった。本博士論文では行政責任論の観点から、行政改革および行政組織の設置を考察し、行政責任論の意義を再検討した。 / 博士(政策科学) / Doctor of Philosophy in Policy and Management / 同志社大学 / Doshisha University
518

Management mateřských škol v soukromém a veřejném sektoru / Management of kindergartens in private and public sector

Čadková, Kateřina January 2021 (has links)
This diploma thesis is focuses on management in private and public kindergarten. The aim of the thesis is find out specifics of management in two different preschool institutions. Diploma thesis is consisting of theoretical and practical parts. First part of theoretical thesis inform about public and private sector briefly. The main topic of theoretical part is describing different functions of management, which are important for the functioning of the school. It includes the areas of school management, school funding, but also personnel management. Furthermore, it is also focuses on the legislative conditions, curricular documents and qualifications of leaders in pre primary institutions include their rights, obligations and competences. The end of the theoretical part is describing cooperation with the founders and parents, which is one of the most important factors affecting the quality of kindergarten. Practical part of diploma thesis contains two case studies of two preschool institutions. These institutions are similar in their size, number of classes, capacity of children and number of employees, but they are different in their founders. This part follows specifics of management and finding out about common and different points in these institutions. The end of the practical part is...
519

The "Unidentified Pioneers": An Analysis of Staffordshire Mormons, 1837 to 1870

Arrowsmith, Stephen G. 01 January 2003 (has links) (PDF)
The evidence presented in this thesis advocates an increased level of scholarly interest in English working-class Mormon converts. To illustrate who these people were, and what their roles were as part of Mormon story, this regional study introduces and makes available over twelve hundred Staffordshire Mormons, and asks questions of the collected statistical information. The conservative Staffordshire Mormons clearly assisted the establishment, and continuation, off a Zion in the American West. Much of the data confirms previous scholarship; however, those with “differing visions” of Mormonism (for example, the RLDS Church) attracted Staffordshire converts in larger numbers than previously suggested. The findings suggest a careful re-examination of the early British RLDS membership may reveal similar findings. If so, a reappraisal of RLDS-LDS history not only would be desirable, but also necessary.
520

Begränsningsreglerna avseenderiktade ränteavdrag : En analys av regelverkets förenlighet med EU-rättens fördragsfrihet avseende fria kapitalrörelser / The Swedish targeted interest deduction limitation rules : An analysis of the compatibility of the regulatory framework and the free movement of capital

Woode, Wilma January 2023 (has links)
The purpose of the paper is to contribute to the scientific research field by explaining whether, and if so on what grounds, the Swedish targeted interest deduction limitation legislation can be tested in the European Court of Justice against the free movement of capital. In addition, the study examines whether there can be considered a mutual priority regarding the free movement of capital and the freedom of establishment. The study conducted in the paper is based on the Swedish law, the preparatory work and doctrine, which is combined with case law. Initially, the meaning of the targeted interest deduction limitation rules is presented as well as the theoretical scope of the legislation in relation to its scope in practice. The targeted interest deduction limitation rules are specific provisions addressing the deductibility of interest incurred by certain companies as a result of intra-group financing. The theoretical scope differs from the practical scope due to the vague conceptual definitions in both the legislative text and the preparatory works. Furthermore, it is analysed which determines when the free movement of capital and the freedom of establishment should be applied, based on the EU case law. The study indicates that the controlling interest must be given a significant weight when considering the purpose of the national legislation, but it is difficult to interpret exactly when such an interest occurs in practice. Lastly, it is studied whether it might be possible to review the targeted interest deduction limitation rules against the free movement of capital, and if so, on which grounds. The study shows that there are possibilities to review the targeted interest deduction limitation rules against the free movement of capital. There are incentives that indicate that such a review is possible if both Swedish and EU law practice is interpreted in a fairly narrow way. / Syftet med uppsatsen är att bidra till det vetenskapliga forskningsfältet genom att redogöra för huruvida, och i så fall på vilka grunder, de svenska riktade ränteavdragsbegränsningsreglerna kan prövas gentemot den grundläggande EU-rättsliga fördragsfriheten beträffande fri rörlighet för kapitalrörelser. Därutöver undersöks om det kan anses föreligga en inbördes prioritet beträffande den fria rörligheten för kapital och etableringsfriheten. Den utredning som genomförs i uppsatsen tar avstamp i lagtext, förarbeten och doktrin, vilket kombineras med rättspraxis. Inledningsvis presenteras innebörden av de riktade ränteavdragsbegränsningsreglerna och hur lagreglernas teoretiska tillämpningsområde förhåller sig till dess tillämpningsområde i realiteten. De riktade ränteavdragsbegränsningsreglerna utgörs av särskilda bestämmelser vilka behandlar vissa företags avdragsmöjligheter beträffande räntor uppkomna till följd av, inom en intressegemenskap, intern finansiering. Det teoretiska tillämpningsområdet skiljer sig från tillämpningsområdet i realiteten till följd av vaga begreppsdefinitioner i såväl lagtext som i förarbeten. Vidare analyseras vad det är som avgör när fördragsfriheten den fria rörligheten för kapital respektive etableringsfriheten skall tillämpas, vilket tar avstamp i EU-rättslig praxis. Av utredningen framgår att det bestämmande inflytandet skall tillerkännas stor vikt vid beaktandet av de nationella lagreglernas ändamål, exakt när ett sådant inflytande föreligger är dock svårt att tyda i praxis. Avslutningsvis undersöks om det bör vara möjligt att göra en prövning av de riktade ränteavdragsbegränsningsreglerna gentemot den fria rörligheten för kapital, och i så fall på vilka grunder. Studien visar att det finns möjligheter att för att pröva de riktade ränteavdragsbegränsningsreglerna gentemot fördragsfriheten om fria kapitalrörelser. Det finns incitament som tyder på att en sådan prövning är möjlig under förutsättning att såväl svensk som EU-rättslig praxis tolkas på ett tämligen snävt sätt.

Page generated in 0.1001 seconds