• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 927
  • 358
  • 270
  • 233
  • 128
  • 69
  • 64
  • 58
  • 46
  • 38
  • 34
  • 13
  • 12
  • 9
  • 8
  • Tagged with
  • 2706
  • 569
  • 396
  • 350
  • 286
  • 247
  • 242
  • 241
  • 237
  • 236
  • 234
  • 227
  • 222
  • 197
  • 197
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
401

Soul-to-soul: deconstructing defiict thinking in the classroom

2013 November 1900 (has links)
This thesis explores educator beliefs, attitudes and practices in teaching First Nations, Inuit, Métis and Ethnic students in Canada, including Muslim and Arabic students. Research supports evidence of on-going systemic racism toward the First Nations, Métis and Inuit, and New Canadians in society, and therefore, within our schools and our classrooms. Evidence also exists regarding how racism, invisibly instilled in educators as societal norms, permeates classrooms and helps continue to perpetuate marginalization and Othering of students. The research question was: How can teachers begin to deconstruct Euro-Centric, White Dominant beliefs, practices, attitudes and expectations in order to positively impact all students and their academic well-being? I examine the questions: What are some teachers doing which positively impacts learning for all students? What can be done to help teachers realize that some of their teaching practices and ways of dealing with students are disrespectful to the individual children and contribute to systemic racism?
402

A Study of the Relationship Between Levels of Technology Implementation (LoTi) and Student Performance on Texas Assessment of Knowledge and Skills (TAKS) Scores

Berkeley-Jones, Catherine Spotswood 2012 August 1900 (has links)
The purpose of this study was to examine teacher Levels of Technology Implementation (LoTi) self-ratings and student Texas Assessment of Knowledge and Skills (TAKS) scores. The study assessed the relationship between LoTi ratings and TAKS scores of 6th, 7th, and 8th grade students as reported in student records at Alamo Heights Independent School District (AHISD), San Antonio, Texas. The study determined the degree to which teacher LoTi self-ratings were a predictor of success on student TAKS exam scores for English Language Arts and Math, as reported in student records at Alamo Heights Independent School District, San Antonio, Texas. Further, the study examined whether teacher self-reported LoTi ratings were a predictor of success on student TAKS exam scores for the variable of socioeconomic status as reported in student records at Alamo Heights Independent School District, San Antonio, Texas. For the purpose of this study, school and student performance analysis was restricted to the Alamo Heights Junior School in the Alamo Heights Independent School District, San Antonio, Texas. The student data in the study derived from approximately 825 6th, 7th, and 8th grade students who took the math TAKS test in 2009 and approximately 946 6th, 7th, and 8th grade students who took the English Language Arts (ELA) TAKS test in 2009. The research findings for this study included: 1. In English Language Arts (ELA), a difference in achievement may be inferred between teacher LoTi levels and ELA TAKS scores. 2. In math, a difference in achievement may be inferred between teacher LoTi levels and math TAKS scores. 3. There was not a statistically significant difference between the teacher LoTi level and student mean scores on ELA TAKS for students in the low SES category. 4. There was not a statistically significant difference between the teacher LoTi level and student mean scores on math TAKS for students in the low SES category.
403

Automated Key Rotations In a Continuous Deployment Pipeline

Rylander, Jim, Moberg, Jacob January 2018 (has links)
Background. To the best of our knowledge, there is no related work that brings up key management in Continuous Deployment. Most of the previous research within the area handles challenges and how to apply to continuous methods. Objectives. By performing this research our goal was to determine how to apply automated key rotation as a way of improving the security in a Continuous Deployment pipeline. We also wanted to compare a manual way of rotating the keys compared to an automated way. When comparing these different scenarios to a scenario where no key rotation was active we hoped to reach a conclusion of whether it is worth implementing automated key rotations in a CDE pipeline or not. Methods. By configuring different tools like GitLab, GitLab-Runner and Vagrant we created a working test pipeline. Since manual key rotation can be implemented in the CDE pipeline, the goal was to create a script that could automate the same process. In our tests we focused on the keys between GitLab and GitLab-Runner. Our tests consisted of comparing three different scenarios, a pipeline with: no, manual and automated key rotations. The three different scenarios where compared on 7 factors to help us reach a conclusion of whether automated key rotations was worth applying as a way to improve the security in a CDE pipeline. Results. With the help of tools like cURL and sshpass we managed to automate the key rotation. When we measured the different processes between no, manual and automated key rotations, the result showed us that the automated process has an average time of 1.6 seconds run time and 1.14 seconds average of server downtime. The run time is 70 times faster than the manual key rotation and has 5 times less average server downtime. Conclusions. We came to the conclusion that it is possible to use key rotation and keep the CDE process fully automated. It makes the process safer but also have the side effect of server downtime.
404

Vysokoškolské studium oboru Učitelství 1. stupně ZŠ z pohledu studenta prezenčního studia / University studies of primary school teaching from a full-time student´s point of view.

FORMANOVÁ, Andrea January 2015 (has links)
The teacher of the primary education at elementary school is becoming an important authority in the process of school attendance of every student. This is the reason for a preparation and knowledge in a variety of different subjects from various fields, more than in the case of the specialized teacher, because the general outlook and professionalism is expected. This diploma thesis is divided into a theoretical and practical part. The theoretical part deals with the problematic of preparation of the teacher for the profession in Czech Republic and abroad. Further it contains chapters touching the personality of the teacher and the key teacher's competences. The practical part presents the results of mixed research realized on students of the first and fifth years. For the purposes of the research survey the method of interview and questionnaire were used. The aim of this diploma thesis and the research survey is to outline the view and the expectations of the first and fifth year students of the primary education at the pedagogical faculty. Together with this aim the comparison of the results of the Hana Reifova's diploma thesis dealing with a similar question from the point of view of the beginner teacher is noticeable.
405

O modelo de gerência de contas especiais: um estudo exploratório em instituições financeiras no Brasil. / Key Account Management model a exploratory study in finantial institutions in Brazil

Francisco Javier Sebastian Mendizabal Alvarez 07 June 2004 (has links)
Esta tese de doutorado estuda a implantação e gestão do modelo de Gerência de Contas Especiais, em instituições financeiras no Brasil. O aumento da competitividade de mercado, fez com que os bancos tivessem que buscar novas formas de interação com seus clientes, como forma de garantir sua posição competitiva de mercado. A aplicação do modelo se inicia como uma forma diferenciada de atendimento de vendas aos principais clientes que são segmentados, em um primeiro momento, pelo volume de faturamento. A partir da evolução da implantação do modelo se identifica a necessidade de mudar o foco de vendas para o foco de marketing de relacionamento, o que exige a aplicação de instrumentos de gestão diferentes e uma mudança no foco da organização. Os instrumentos que devem ser desenvolvidos são : -a base de dados individual dos clientes, que além de transacional passa a ser gerencial e contemplar informações quantitativas e qualitativas dos clientes -o plano de negócios por cliente. O objetivo final é conseguir mudar o foco de obter resultados pelo volume de vendas de produtos aos clientes para o objetivo de obter rentabilidade no cliente pelo desenvolvimento do relacionamento. / This thesis studies the Key Account Management model implementation in financial institutions in Brazil. The growth of market competition, direct the banks to look for new forms of interaction with their clients, as a way to garantee the competitive position in the market. The model implementation starts as a different way of sales calls to major clients, that are segmented at the first moment, per turnover value. With the evolution of the implementation of this model, it is possible to identify the need to change the focus from sales to relationship marketing, what demands the application of different management tools and the change of organization focus. The tools to be developed are : -The database of individual clients, has to be focussed not only in transactional aspects but should also contemplate the quantitative and qualitative managerial data from each client. -The client Business Plan The final objective is to manage the change in focus, from products sales volume to clients to the objective to obtain rentability on the client by the relationship development with clients.
406

Héroisme et spiritualité dans les romans du Graal et le Shahnameh [livre des Rois] de Ferdowsi / Heroism and spirituality in the Grail romance and in the Shâhnâmeh [Book of Kings] of Ferdowsi

Abaï, Andia 04 November 2010 (has links)
Ce travail comparatif étudie les ressemblances thématiques, symboliques et narratives entre plusieurs romans du Graal de la fin du XIIe siècle et du 1er quart du XIIIe siècle [le Conte du Graal de Chrétien de Troyes, le Parzival de Wolfram von Eschenbach, la Troisième Continuation du Conte du Graal de Manessier, le Haut Livre du Graal], et l’épopée persane du Livre des rois de Ferdowsi, achevée au début du XIe siècle. On étudie d’abord les ressemblances entre le Graal et le farr ou gloire royale iranienne : tous deux se caractérisent par la luminosité, constituent des sources d’abondance, ont une relation particulière avec les êtres, sont liés à la royauté. On étudie ensuite les destins parallèles du chevalier Perceval et du roi iranien Key Khosrow, en mettant en évidence les ressemblances entre les moments clés de leur existence : leur lignage, leur jeunesse orpheline loin du monde, leurs qualités spirituelles et royales, les épreuves qu’ils traversent, leur consécration, leur relation au sacré [au Graal pour le premier, au farr pour le second]. / This comparative work examines the thematic, symbolic and narrative similarities between several texts of the Grail legend written between the late 12th century and the 1st quarter of the 13th century [the Conte du Graal of Chrétien de Troyes, Parzival of Wolfram von Eschenbach, the Troisième Continuation du Conte du Graal of Manessier, le Haut Livre du Graal], and the Book of Kings of Ferdowsi, a Persian epic completed at the beginning of the 11th century. A first part examines the similarities between the Holy Grail and the farr [the Iranian royal Glory]: both are characterized by light, are sources of abundance, have a special relationship with human beings, are linked to the kingship. A second part examines the destinies of the knight Perceval and of the Iranian King Key Khosrow, highlighting the similarities between the key moments of their lives: their lineage, their orphaned youth away from the world, their spiritual and royal qualities, their ordeals, their consecration, their relationship to the sacred [to the Grail for the former, to the farr for the latter].
407

Annulering av ogiltiga certifikat i Public-Key Infrastructures / Revocation of invalid certificates in Public-Key Infrastructures

Nilsson, Christoffer January 2005 (has links)
According to numerous sources, computer security can be explained as; how to address the three major aspects, namely Confidentiality, Integrity and Availability. Public-key infrastructure is a certificate based technology used to accomplish these aspects over a network. One major concern involving PKIs is the way they handle revocation of invalid certificates. The proposed solution will make revocation more secure; validation will be handled completely by the certificate authority, and revokes will be instant, without use of certificate revocation lists. / I enlighet med flertalet källor, kan datorsäkerhet beskrivas som; hur man adresserar de tre mest betydelsefulla aspekterna, nämligen Confidentiality (Tillit), Integrity (Integritet) och Availability (tillgänglighet). PKI är en certifikat baserad teknologi som används för att uppfylla dessa aspekter över ett nätverk. Ett huvudsakligt orosmoment rörande PKI är hur man skall hantera annullering av ogiltiga certifikat. Den föreslagna lösningen kommer att hantera annullering på ett mer säkert sätt; validering av certifikat hanteras uteslutandes av ”certifikat instansen” (the certificate authority), och annulleringar sker omedelbart, utan användning av ”annullerings listor” (certificate revocation lists).
408

Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices

Kamineni, Surya Bharat 05 June 2017 (has links)
In this thesis, we present results of an experimental study in order to generate a secure cryptographic key from the user’s voice which is to be shared between two mobile devices. We identified two security threats related to this problem, discussed the challenges to design the key generation/sharing mechanism, and proposed a new protocol based on bloom filters that overcomes the two main attacks by the intruder. One is when the attacker places its device in the close vicinity of the location where the user attempts to generate/share the key in order to derive the key from eavesdropping on communication messages. The second is when the attacker visually observes the experiment being performed and it tries to replicate the same experiment to reproduce the key. We present several results that demonstrate the practicality of our proposed technique in the context of communications between smart-phone
409

Acordo de chaves criptográficas hierárquico e sem certificado / Hierarchical certificateless criptographic key agreement

Vilc Queupe Rufino 19 November 2009 (has links)
Apresentamos um novo esquema de acordo de chaves criptográficas hierárquico, não Interativo e seguro contra comprometimento de múltiplos nós. Esquemas para Acordo de chaves criptográficas (KAS - Key Agreement Scheme), são usados quando duas ou mais entidades desejam compartilhar uma chave secreta única, afim de para realizar uma comunicação segura por meio de um protocolo de criptografia simétrico. O acordo de chaves proposto possui as seguintes características: Não interativo: Chaves compartilhadas são calculadas sem interação dos nós participantes; Chaves Públicas sem certificados (Certificateless): Para o cálculo da chave compartilhada o nó utiliza sua chave secreta e a chave pública do destinatário, que é certificada pela identidade do destinatário; Hierárquico: Permite que seja utilizado um gerenciamento hierárquico, para concessão, revogação e distribuição de chaves; e Resistente: Permite segurança do sistema mesmo quando nós dentro da hierarquia são comprometidos em qualquer ordem e quantidade. Este trabalho é uma nova abordagem do artigo \"Strongly-Resilent and Non-Interactive Hierarchical Key-Agreement in MANETs\" onde substituímos o uso de sistemas baseados na identidade por sistemas sem certificado, eliminando a custódia de chaves em todos os níveis hierárquicos, aumentando a segurança do sistema quanto ao comprometimento de nós. É apresentado ainda uma discussão sobre a segurança do esquema proposto e de acordos de chaves não interativos. / This work presents a new resilient, hierarchical, non-interactive and certificateless key agreement scheme. Cryptographic key agreement schemes (KAS) are used when two or more entities want to share a secret key, in order to realize secure communication using a symmetric encryption protocol. The proposed key agreement has the following characteristics: Non-interactive: Any two nodes can compute a unique shared secret key without interaction; Certificateless: To compute the shared secret key, each node only needs its own secret key, the identity of its peer and his public key implicitly certified; Hierarchical: The scheme is decentralized through a hierarchy where all nodes in the hierarchy can derive the secret keys for each of its children without any limitations or prior knowledge on the number of such children or their identities; Resilient: The scheme is resilient against compromise of any number of nodes in the hierarchy. This work is a new approach about article ``Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs\" which replaces id based system for certificateless system, eliminating the key escrow on all levels, increasing system security against compromised nodes. It also presents a discussion on the security of the proposed scheme and non-interactive key agreement.
410

The Role of the Affect and the Key Characteristics in Chopin's Piano Music

Hwang, Yeeun 23 June 2021 (has links)
No description available.

Page generated in 0.04 seconds