• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 20
  • 12
  • 6
  • 6
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 81
  • 27
  • 23
  • 22
  • 16
  • 15
  • 11
  • 11
  • 10
  • 9
  • 7
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Vysokofrekvenční obvodový analyzátor s DDS / DDS Based High-frequency circuit analyzer

Priškin, Jiří January 2010 (has links)
At first this thesis is dealing with the basic principles of network analyzers and afterwards goes to propose conception of a polyscope, as a special type of the scalar network analyzer, designed for magnitude frequency response measurement of two-port devices. As a result of this part of the thesis is the polyscope's block circuit diagram and also selection of key integrated circuits for sweep generator, logarithmic detector and control circuits. As the following part of the thesis is a design of the all basic analyzer's circuits resulting in their schematics diagrams and printed circuit boards, do assembly of all modules and mechanical construction of the instrument and look of the front panel. Some of the tasks is implementation of the firmware and personal computer application able to download measured data from the circuit analyzer via USB and generate chart in Microsoft Office Excel book.
72

Řídicí jednotka pro robotický vysavač / Control Unit for Autonomous Vacuum Cleaner

Matějů, Jan January 2012 (has links)
This paper is in introduction focused on review of robotic vacuum cleaning and evaluation of available products qualities. However the main focus of this paper is system design of all subsystems, control systems and PCD design of robot electronics. In this paper is also described a method for evaluating approximate distance of robot from the obstacle. There are also described problems of system design of IR proximity sensors. The last part of this work is development of control software for robot and its testing.
73

Měření veličin ve stavebních konstrukcích / Meassuring system for building constructions

Vladař, Martin January 2015 (has links)
This thesis deals with the measurement of physical quantities in building using decentralized system for data collecting. The system consists of Raspberry Pi as a master device of the system. There are three branches connected to this master device. Each branch consists of up to 32 modules for data-concentration from sensors of physical quantities. The Raspberry Pi has implemented web interface for displaying measured values and system administration.
74

Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level / Implementation av datainsamlingsverktyg med NetFlow på ISP-nivå för statistisk analys av datatrafik

Karlström, Daniel January 2012 (has links)
Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. This is achievable by monitoring the flows to- and from the target and identifying the attacker's IP addresses, allowing the company or their ISP to block the addresses itself by blackholing them (also known as a null route). Using the IP accounting and monitoring tool “pmacct”, this thesis aims to investigate whether or not the pmacct suite is suited for larger installations when tracking and mitigating DDoS-attacks, such at an Internet Service Provider (ISP). Potential problems are the amount of traffic that need to be analyzed and the computational power required to do it. This thesis also provide information about the pmacct suite at large. The conclusions are positive, indicating it does scale up to handle larger installations when given careful consideration and planning. / Att försvara sig mot DoS-och DDoS-attacker är svårt att åstadkomma; att hitta och filtrera ut illegitim trafik från det legitima flödet är nästan omöjligt. Att vidta åtgärder när en sådan attack upptäcks kan endast göras när IP-adresserna från angriparna är kända. Detta kan uppnås genom att man övervakar trafikflödet mellan målet för attacken och angriparna och ser vilka som sänder mest data och på så sätt identifierar angriparna.. Detta tillåter företaget eller dess ISP att blockera trafiken ifrån dessa IP-adresser genom att sända trafiken vidare till ingenstans. Detta kallas blackhole-routing eller null-routing. Genom att använda redovisnings- och övervakningsprogrammet pmacct syftar denna uppsats på att undersöka hurvida pmacct-sviten är lämpad för större installationer när det gäller att spåra och förhindra DDoS-attacker, såsom hos en Internetleverantör eller dylikt. Potentialla problem som kan uppstå är att mängden trafik som måste analyserar blir för stor och för krävande. Denna avhandling går även igenom pmacct-verktyget i sig. Slutsatserna är lovande, vilket indikerar att den har potential av att kunna hantera sådana stora miljöer med noggrann planering.
75

Vývoj a limity autorskoprávní ochrany v globální informační společnosti / The Evolution and the Limits of the Copyright Protection in the Global Information Society

Andruško, Alena January 2017 (has links)
CHARLES UNIVERSITY IN PRAGUE Faculty of Law Institute of Copyright, Industrial Property Rights and Competition Law DOCTORAL DISSERTATION The Evolution and the Limits of the Copyright Protection in the Global Information Society ABSTRACT Author: Mgr. Alena Andruško Supervisor: Prof. JUDr. Dr. iur. h. c. Jan Kříž, CSc. Field of Study: Civil Law Theoretical Legal Science Year: 2015 ABSTRACT Copyright law is one of the branches of law that has become, with the development of the Internet, the center of interest for different types of stakeholders in the global information society. With the evolution of "Web 2.0", sometimes called the "Participative Web", represented by user-generated content (UGC), and also with the evolution of peer-to-peer (P2P) file sharing and recently cyberlockers, the effectiveness of copyright protection online has become a problem where solutions can be found only with difficulty. Online copyright infringement is a complex phenomenon with a multiplicity of contributing factors. To see and understand these factors one must not only know and understand the territorial and international legal rules governing copyright, but also know and understand the online ecosystem in which copyright infringement takes place, which is impossible without knowing the history, evolution and technical...
76

我國ISP業者降低客戶流失率做法之研究

楊昭仁 Unknown Date (has links)
本研究所欲探討的主題,為國內 ISP 業者降低客戶流失率所採用的做法。由於目前ISP業競爭十分激烈,各業者為了爭奪市場,常常以低價,乃至於不計成本的做法爭取客戶。然而這些虧本爭取的客戶若不能有效的留住,之前的投資可為白白浪費。因此,如何能夠有效的降低客戶流失率,是ISP業者非常重要的課題。 降低客戶流失的可行手段之一,是提高服務品質,讓客戶滿意於供應商的服務而樂於長期使用。另一種方式則是產品之鎖定機制 (Lock-in) 的運用,使客戶一旦購買某一項服務,因受到產品機制的鎖定而提高轉換成本,而不願轉換 ISP。一旦ISP能夠以適當有效的做法降低客戶流失率,就能以各種即使沒有利潤乃至於虧損的做法先吸引客戶進門,再由後續的服務回收應得的利潤。也唯有如此,ISP業者才能在嚴酷的競爭中存活。 本研究透過瞭解 ISP 產業之特性與類型;對台灣的十一家具有代表性之ISP業者,調查與整理其服務品質,以及所使用的產品鎖定機制;探討服務品質高低與市場佔有率之關係,以及不同類型之 ISP 所採用之做法的差異,並給予不同的改進建議。主要的研究結論如下: ◆ 高品質的服務有助於大型ISP業者維持市場佔有率,同時對於中小型業者的市場佔有率提昇有所助益。反之,低服務品質對於ISP維持市場佔有率有不利的影響。 ◆ 同時有助於吸引新客戶與維繫舊客戶的服務要素,以及可直接增加營收,或是減少成本的服務要素,為ISP優先重視之項目。 ◆ 服務品質領先之業者與落後者的差異,主要為交易中的服務要素。 ◆ 大型與中小型ISP在服務品質有差異之項目上,大型業者具有絕對領先優勢。兼營IDC業務之ISP與純ISP,在服務品質有差異之項目上,兼營IDC之業者具有絕對領先優勢。 ◆ 簡單之產品鎖定機制最受到ISP業者的歡迎。
77

以交易成本理論探討顧客滿意度與忠誠度之關係-舉入口網站及ISP市場為例

郭欣惠, Kuo, Sin-Hui Unknown Date (has links)
行銷學研究的重點,從過去著重在單次交換行為形成的原因,到現在已逐漸延伸為探討如何與消費者建立長期關係,也就是說把早期研究重點從發現消費者的需求、確立產品定位、改善產品品質等方式來滿足消費者,逐漸轉為探討如何建立與消費者的長期關係、取得消費者的信任等相關課題。  本研究研究目的在於以交易成本理論為基礎,探討可能影響消費者滿意度與忠誠度的原因;研究第二目的,由資產專屬建立強弱與否,來比較消費者態度、忠誠度是否因為產品種類而有不同。同時探討投機主義知覺程度、公司信任度、預期更好商品這些因素對滿意度與忠誠度的影響。  實證結果發現: (一)顧客滿意度方面:無論入口網站或ISP消費者,對於入口網站或ISP產品表現的滿意度皆會產生對公司的整體滿意度;同時服務的滿意度會影響消費者對入口網站及ISP業者的信任程度;同時對公司的信任度會影響對消費者對入口網站或ISP業者整體滿意度,而且上述關係皆為顯著正相關。  (二)顧客忠誠度方面:無論入口網站或ISP消費者,對入口網站或ISP業者整體滿意度及對公司的信任度皆會造成顧客的忠誠度,而且為顯著正相關。  (三)交易成本方面:無論入口網站或ISP消費者,若資產專屬性越高,則轉換成本愈高,且為顯著正相關。在投機知覺方面,兩群消費者皆表現出若投機知覺度愈高,顧客對公司信任度越不足,且為顯著負相關。  同時根據實證結果,提供業者在交易成本理論下,如何創造顧客滿意度與顧客忠誠度的實務建議。
78

Assessing information security compliant behaviour using the self-determination theory

Gangire, Yotamu 02 1900 (has links)
Information security research shows that employees are a source of some of the security incidents in the organisation. This often results from failure to comply with the Information Security Policies (ISPs). The question is, therefore, how to improve information security behaviour of employees so that it complies with the ISPs. This study aims to contribute to the understanding of information security behaviour, especially how it can be improved, from an intrinsic motivation perspective. A review of the literature suggested that research in information security behaviour is still predominantly based on the extrinsic perspective, while the intrinsic perspective has not received as much attention. This resulted in the study being carried out from the perspective of the self-determination theory (SDT) since this theory has also not received as much attention in the study of information security behaviour. The study then proposed an information security compliant behaviour conceptual model based on the self-determination theory, (ISCBMSDT). Based on this model, a questionnaire, the ISCBMSDT questionnaire, was developed using the Human Aspects of Information Security Questionnaire and SDT. Using this questionnaire, a survey (n = 263) was carried out at a South African university and responses were received from the academic, administrative and operational staff. The following statistical analysis of the data was carried out: exploratory factor analysis, reliability analysis, analysis of variance (ANOVA), independent samples test (t-tests) and Pearson correlation analysis. The responses to the survey questions suggest that autonomy questions received positive perception followed by competence questions and relatedness questions. The correlation analysis results show the existence of a statistically significant relationship between competence and autonomy factors. Also, a partial significant relationship between autonomy and relatedness factors as well as between competence and relatedness factors was observed. The exploratory factor analysis that was performed on the questionnaire produced 11 factors. Cronbach alpha was then computed for the eleven factors and all were found to be above 0.7, thus suggesting that the questionnaire is valid and reliable. The results of the research study also suggest that competence and autonomy could be more important than relatedness in directing information security behaviour among employees. / School of Computing / M. Tech. (Information Technology)
79

Essays on regulatory impact in electricity and internet markets

Roderick, Thomas Edward 26 June 2014 (has links)
This dissertation details regulation's impact in networked markets, notably in deregulated electricity and internet service markets. These markets represent basic infrastructure in the modern economy; their innate networked structures make for rich fields of economic research on regulatory impact. The first chapter models deregulated electricity industries with a focus on the Texas market. Optimal economic benchmarks are considered for markets with regulated delivery and interrelated network costs. Using a model of regulator, consumer, and firm interaction, I determine the efficiency of the current rate formalization compared to Ramsey-Boiteux prices and two-part tariffs. I find within Texas's market increases to generator surplus up to 55% of subsidies could be achieved under Ramsey-Boiteux pricing or two-part tariffs, respectively. The second chapter presents a framework to analyze dynamic processes and long-run outcomes in two-sided markets, specifically dynamic platform and firm investment incentives within the internet-service platform/content provision market. I use the Ericson-Pakes framework applied within a platform that chooses fees on either side of its two-sided market. This chapter determines the impact of network neutrality on platform investment incentives, specifically whether to improve the platform. I use a parameterized calibration from engineering reports and current ISP literature to determine welfare outcomes and industry behavior under network neutral and non-neutral regimes. My final chapter explores retail firm failure within the deregulated Texas retail electricity market. This chapter investigates determinants of retail electric firm failures using duration analysis frameworks. In particular, this chapter investigates the impact of these determinants on firms with extant experience versus unsophisticated entrants. Understanding these determinants is an important component in evaluating whether deregulation achieves the impetus of competitive electricity market restructuring. Knowing which economic events decrease a market's competitiveness helps regulators to effectively evaluate policy implementations. I find that experience does benefit a firm's duration, but generally that benefit assists firm duration in an adverse macroeconomic environment rather than in response to adverse market conditions such as higher wholesale prices or increased transmission congestion. Additionally, I find evidence that within the Texas market entering earlier results in a longer likelihood of duration. / text
80

Autorské právo v informační společnosti a na vnitřním trhu Evropské unie / An Author's Right in the Information Society and Across the Internal European Union Market

Mikita, Peter January 2018 (has links)
Copyright law is a special category of civil law which, with the upswing of the Internet, has become important for different types of stakeholders in the global information society. The 'participative web' operates with content generated by users. This user-generated content has often disputable origins in terms of copyright clearance. The Internet has opened the possibility for developing new forms of communication between anonymous or individual users who are not easily identifiable. Especially peer-to-peer file sharing and recently the information services offered and operated by the so-called 'cyberlockers' are the reason of questioning the role of copyright protection online which needs a beneficial solution. Copyright infringement in the era of information society is a complex phenomenon with a multiplicity of contributing factors like the importance of information data with big business potential, personal attitudes shown by internet users towards the value and scarcity of intellectual property, or legal responsibility of internet service providers (ISP) who paradoxically act from the safety of the so-called safe harbours as intermediaries of information exchange, representing a new element in the communication chain between rights holders and users. Commercial and business models operating...

Page generated in 0.0323 seconds