• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1804
  • 639
  • 355
  • 325
  • 198
  • 131
  • 49
  • 44
  • 41
  • 38
  • 26
  • 22
  • 22
  • 22
  • 22
  • Tagged with
  • 4428
  • 832
  • 769
  • 576
  • 520
  • 414
  • 400
  • 328
  • 323
  • 321
  • 310
  • 309
  • 308
  • 307
  • 302
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

Load recorder

Waja, Aadil Ahmed January 1987 (has links)
Thesis (Masters Diploma (Electrical Engineering)) --Cape Technikon, Cape Town, 1987 / This thesis describes the development of a computerized Load Recorder. The load recorder is used by the Cape Town City Council to assist in the tariff investigation of electricity consumers. This investigation assists the consumers in selecting the best cost effective electricity tariff. It also motivates the consumers to maintain a constant load which in turn assists the Council in supplying the required electricity. The load recorder replaces a manual and time consuming method used in conducting the tariff investigation. The development of the load recorder involved the design of hardware and software. It was designed in a compact enclosure to hook up to the electricity meters of the consumer for a period of 7 days. The software was designed in the 6805 assembly language to log data and record the electricity load every 15 or 30 minutes for this period. At the end of this period the data is downloaded into the HP85 personal computer. A basic program was designed for the HP85 to analyse and compute the downloaded data. A graphical representation and analysis is printed by the HP85 computer. The given graph of the results represents the electricity used for this period. The tariff rates are analysed and calculated to determine the best cost effective tariff. A CMOS micro computer intergrated circuit was chosen due to the determined specification of the load recorder. In order to make the development of the load recorder possible an aid (tool) had to be designed and built for the chosen microprocessor. This development aid, the emulator, is included as part of this thesis. The Motorola exorciser only supported a cross assembler for the chosen microprocessor family. The emulator was designed and built to enable testing and debugging on the Exorciser. The development on the emulator involved a detailed analysis of the Exorciser development system. The emulator was designed using hardware and software. The hardware emulator board was designed as a standard Motorola size card which plugs into the Exorciser. The software was designed for the 6809 exorciser and for the 6805 emulator. The emulator was soak tested and debugged during the development of the load recorder. The emulator opened further avenues for future microcomputer design projects especially where a confined area and compactness is an important factor. The design and development of the emulator and the load recorder was conducted in the Computer Section of the City Electrical Engineer's Department of Cape Town.
292

As condições institucionais de cumprimento das medidas socioeducativas aos adolescentes autores de infração /

Carvalho, Natália Hernandes. January 2011 (has links)
Orientador: Elizabeth Piemonte Constantino / Banca: Rosane Gumiero Dias da Silva / Banca: Heloisa Maria Heradão Rogone / Resumo: A presente pesquisa teve por objetivo investigar as condições institucionais relacionadas á execução das medidas socioeducativas aos adolescentes autores de infração. Trata-se de um estudo de caso de caráter quanti-qualitativo, realizado numa instituição não-governamental - (ATISA) - Associação dos Toxicômanos de Ilha Solteira -, sede de três projetos distintos - curativo, preventivo e de orientação de medidas socioeducativas. Visando também compreender os processos indiretamente relacionados ao cumprimento dessas medidas e a efetivação dos princípios do ECA, levantou-se ainda informações junto ao Conselho Tutelar e ao Sistema Judiciário. Para tanto, foram utilizados como recursos metodológicos a análise documental dos documentos oficiais da entidade e dos processos judiciais dos adolescentes, entrevistas fechadas, semiestruturadas e observação participante, utilizando-se como sujeitos seis (6) funcionários da ATISA e dois (2) funcionários do Conselho Tutelar. Os resultados foram tratados e analisados a partir dos seguintes eixos temáticos: Condições de infraestrutura da instituição foco - ordem física, de recursos humanos e financeiros; Dinâmica e funcionamento da entidade pesquisada: gestão e relações humanas no trabalho; e Aspectos educativos e sociais: projetos desenvolvidos, cursos profissionalizantes, experiências de trabalho e formação de vínculos sociais. De modo geral, a análise dos dados indicou que as condições de execução das medidas pela instituição apresentam problemas de infraestrutura física, material e humana, esta última traduzida pela necessidade de se investir na formação dos profissionais para lidar com o adolescente autor de infração. Além disso, foram detectadas questões relacionadas à falta de investimentos em políticas públicas, educação e garantia de direitos. / Abstract: The present research has the purpose of investigating internal conditions of operational and institutional dynamics related to the fulfillment of social and educational measures for teenager offenders. This paper is a quantitative/qualitative case study, held at a nongovernmental institution - (ATISA) - Associação dos Toxicômanos de Ilha Solteira -, which is the head office for three distinct projects - healing, preventing and also guiding social-educational measures. Aiming at the understanding of processes indirectly related to the fulfillment of those measures and the realization of principles of ECA, rose information concerning the Protection Council and the Judicial System. Therefore, the methodological resources used were the analysis of official documents from the institution and the analysis of the prosecution of teenagers, closed and semistructured interviews and participant observation, using six (6) people from the staff of ATISA and two (2) from the Protection Council as subject. The results were processed and analyzed under the following topics: infrastructure conditions of the focus institution - physic, human and financial resourses -; dynamic and operation institutional conditions - management and human relations at work-; and the educational and social aspects - developed projects, professionalising courses, work activities and construction of social relations. Generally, the achieved results indicated that the conditions for fulfillment of the measures are surrounded by difficulties of physic, material and human relations, this one, translated by the need to invest on professional training to deal with the teenager offenders. Moreover, issues related to lack of investiment in public policies, education and rights guarantees were detected. / Mestre
293

Information security with special reference to database interconnectivity.

Coetzee, Marijke 29 May 2008 (has links)
Information can be considered a company’s most valued asset and should be protected as such. In the past, companies allowed very limited access to corporate information. Today, the rapid growth of the Internet increases the importance of connecting to existing databases. Access to such web-enabled databases, containing sensitive information such as credit card numbers must be made available only to those who need it. The security of web-enabled databases is challenged, as huge user populations access corporate information, past traditional perimeters. Providing a secure web-enabled database environment is not as simple as creating a few dynamic pages linked to a secured database. As a web-enabled database is very sophisticated, consisting of various applications in front of the database, it is vulnerable to attack. Furthermore, since most malicious intrusions occur from inside, defences such as firewalls, intrusion detection and virus scanning provide limited protection. The principle aim of this study was to consider security services and mechanisms that would provide protection to web-enabled databases. As database security has been a well-researched topic ever since the first databases were used, it was decided to investigate whether traditional database security could possibly provide a basic framework to be used when approaching the security of web-enabled databases. An investigation was made into nine current state database security services and their associated mechanisms. Additional services and mechanisms were identified, that could provide protection in the new environment. The integrated service provided by web-enabled databases was contrasted to the service provided by current state database security. A model was developed that illustrated how these services and mechanisms could be applied to create a secure web-enabled database. The study was brought to an end with a conclusion on the security that can be attained by web-enabled databases. Further problem areas, which could be researched in the future, were touched upon briefly. / Prof. J.H.P. Eloff
294

A security model for a virtualized information environment

Tolnai, Annette 15 August 2012 (has links)
D.Phil. / Virtualization is a new infrastructure platform whose trend is sweeping through IT like a blaze. Improving the IT industry by higher utilization from hardware, better responsiveness to changing business conditions and lower cost operations is a must have in the new generation of virtualization solutions. Virtualization is not just one more entry in the long line of “revolutionary” products that have hit the technology marketplace. Many parts of the technology ecosystem will be affected as the paradigm shifts from the old one-to-one correspondence between software and hardware to the new approach of software operating on any hardware that happens to be most suitable to use at the time. This brings along with it security concerns, which need to be addressed. Security evolving in and around the virtualized system will become more pertinent the more virtualization is employed into everyday IT technology and use. In this thesis, a security model for virtualization will be developed and presented. This model will cover the different facets needed to address virtualization security.
295

Developing an aviation safety strategy within the Southern African context: a stakeholder perspective.

de Beer, Johan 22 October 2007 (has links)
Certain new realities, such as the liberalisation of the skies and increased air traffic in South Africa are bound to test the existing safety strategies, regulations and maintenance of standards. In order to obtain a picture of the future architecture and the standard of aviation safety in South Africa, the mental models of stakeholders in the industry were investigated in a qualitative, study. A qualitative interpretive research design was followed. The research question was: What are the mental models of key stakeholders in the aviation safety environment and how does this need to be accounted for in the development of an aviation safety strategy, in a Southern African context? In order to obtain a broad spectrum of the social constructs of key stakeholders with regard to aviation safety and to enhance the trustworthiness of the information, three research interventions or information gathering processes were applied. These were the individual interviews through Kelly’s Repertory Grid (Rep Grid) technique, outcomes analysis of the job of a safety manager through a focus group process and a scenario development process (in this sequence). Data was then considered in relation to certain theoretical perspectives, as well as realities in the aviation safety environment in Southern Africa. The study identified pertinent gaps between the mental models elicited from research participants during individual interventions and those elicited during group interventions, as well as a disparity between their mental models and the demands of the aviation safety environment in Southern Africa and the international community. The participants’ individual mental models (or theories in use) focused more on micro systems and symptoms of “unsafety” than the broader systemic relationships and problems. Tendencies towards silo-thinking and single loop learning were indicated. In contrast with the individual mental models, the collective or shared mental models of the participants, elicited during group interventions, represented a more systemic view and a more effective or desired model with regard to aviation safety. The broader system together with its interrelated elements, entropy and unpredictability, as well as critical elements that need to be accounted for in an aviation strategy, were identified. These were, amongst others, effective coordinated regulation and safety oversight on national and regional level; risk management; international recognition; legitimacy; authorisation and market access for airlines; maintenance of standards; international cooperation; and training. It also became clear that safety cannot be understood and managed by focussing on Newtonian laws without a proper appreciation of human factors. Other important perspectives that were identified are the need for the establishment of a study-field for aviation psychology and effective human factors training; as well as the need for a regional regulatory function in Southern Africa. / Prof.J.S Uys
296

Information security with specific reference to browser technology

Prinsloo, Jacobus Johannes 28 August 2012 (has links)
M.Comm. / The present study was undertaken in the realm of the Internet working environment, with its focus on measures by which to secure executable code in the Web-browsing environment. The principal aim of this study was to highlight the potential security risks that could be incurred while a user is browsing the World Wide Web. As a secondary objective, the researcher hoped, by means of a prototype and the process of real-time risk analyses, to alert the general Internet user population to these risks. The main objective of the prototype was to provide a framework within which users could be warned of potentially dangerous actions effected by executing code in their browsing environments in real time. Following, an overview of the research methodology employed to realise the objectives of this study. The study commenced with an introduction to the Internet and, along with that, to the World Wide Web. In the course of the introduction, the researcher took a closer look at a number of risks associated with this environment. In sketching the Internet environment and its associated risks, the researcher also provided ample motivation for the study. After having established the clamant need to secure the Web-browsing environment, a conceptual model was expounded. This model would later form the basis for the Real-time Risk Analyser prototype to be presented. In order, however, to justify further research into and development of the said RtRA prototype, it was necessary first to evaluate existing browsing technologies. A formal approach was followed to draw a comparison between the existing browsers. The said comparison also served to uncover some of the shortcomings of these browsers in terms of the security features they support. Since the focal point of this study was to be the various ways in which to secure executable code on the Internet, it was decided to launch an investigation into Java, as it probably is the most familiar executable code used in the Web browsing environment. The Java Security Model was, therefore, thoroughly researched in a bid to determine possible ways in which to monitor executable Java code. After having investigated the browsing environment and after having determined possible ways of performing real-time risk analyses, a prototype was developed that could monitor executable Java code in a browsing environment. Following, the prototype was put through its paces in a hypothetical scenario. The study culminated in a summary of the results of and the conclusions about the research study. Further problem areas that could become the focal points of future research projects were also touched upon.
297

Guidelines for cybersecurity education campaigns

Reid, Rayne January 2017 (has links)
In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process. If these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in these cybersecurity solutions. It is essential that all users be educated to combat any threats. Children are a particularly vulnerable subgroup within society. They are digital natives and make use of ICT, and online services with increasing frequency, but this does not mean they are knowledgeable about or behaving securely in their cyber activities. Children will be exposed to cyberspace throughout their lifetimes. Therefore, cybersecurity and cybersafety should be taught to children as a life-skill. There is a lack of well-known, comprehensive cybersecurity and cybersafety educational campaigns which target school children. Most existing information security and cybersecurity education campaigns limit their scope. Literature reports mainly on education campaigns focused on primary businesses, government agencies and tertiary education institutions. Additionally, most guidance for the design and implementation of security and safety campaigns: are for an organisational context, only target organisational users, and mostly provide high-level design recommendations. This thesis addressed the lack of guidance for designing and implementing cybersecurity and cybersafety educational campaigns suited to school learners as a target audience. The thesis aimed to offer guidance for designing and implementing education campaigns that educate school learners about cybersecurity and cybersafety. This was done through the implementation of an action research process over a five-year period. The action research process involved cybersecurity and cybersafety educational interventions at multiple schools. A total of 18 actionable guidelines were derived from this research to guide the design and implementation of cybersecurity and cybersafety education campaigns which aim to educate school children.
298

Secret message sharing through JPEG images on social media platform

Lyn, Ran January 2017 (has links)
University of Macau / Faculty of Science and Technology / Department of Computer and Information Science
299

A dynamic distributed trust model to control access to resources over the Internet

Lei, Hui. 10 April 2008 (has links)
The access control mechanisms used in traditional security infrastructures, such as ACL and password applications, have been proven inadequate, inflexible, and difficult to apply in the Internet due to the incredible magnitude of today's Internet. Recently, research for expressing trust information in the digital world has been explored to be complementary to security mechanisms. This thesis deals with the access control for the resources provided over the Internet. On line digital content service is exemplary of such an application. In this work, we have concentrated on the idea of a trust management system, which was first proposed by Blaze et a1 in 1996, and we have proposed a general-purpose, application-independent Dynamic Distributed Trust Model (DDTM). In our DDTM, access rights are directly associated with a trust value. The trust values in this thesis are further classified into direct trust values, indirect trust values and trust authorization levels. We have calculated and expressed each type of the trust values as explicit numerical values. The core of this model is the recommendation-based trust model, organized as a Trust Delegation Tree (TDT), and the authorization delegation realized by delegation certificate chains. Moreover, the DDTM provides a distributed key-oriented certificate-issuing mechanism with no centralized global authority. A Dynamic Distributed Trust Protocol (DDTP) was developed as a general protocol for establishing and managing the trust relationship in a TDT structure. The protocol was verified by means of the verification tool, SPIN, and was prototyped to simulate communication and behaviors among the certificate issuer nodes on a TDT.
300

Novel framework to support information security audit in virtual environment

Nagarle Shivashankarappa, A. January 2013 (has links)
Over the years, the focus of information security has evolved from technical issue to business issue. Heightened competition from globalization compounded by emerging technologies such as cloud computing has given rise to new threats and vulnerabilities which are not only complex but unpredictable. However, there are enormous opportunities which can bring value to business and enhance stakeholders’ wealth. Enterprises in Oman are compelled to embark e-Oman strategy which invariably increases the complexity due to integration of heterogeneous systems and outsourcing with external business partners. This implies that there is a need for a comprehensive model that integrates people, processes and technology and provides enterprise information security focusing on organizational transparency and enhancing business value. It was evident through interviews with security practitioners that existing security models and frameworks are inadequate to meet the dynamic nature of threats and challenges inherent in virtualization technology which is a catalyst to cloud computing. Hence the intent of this research is to evaluate enterprise information security in Oman and explore the potential of building a balanced model that aligns governance, risk management and compliance with emphasis to auditing in virtual environment. An integrated enterprise governance, risk and compliance model was developed where enterprise risk management acts as a platform, both mitigating risk on one hand and as a framework for defining cost controls and quantifying revenue opportunities on the other. Further, security standards and frameworks were evaluated and some limitations were identified. A framework for implementing IT governance focusing on critical success factors was developed after analysing and mapping the four domains of COBIT with various best practices. Server virtualization using bare metal architecture was practically tested which provides fault-tolerance and automated load balancing with enhanced security. Taxonomy of risks inherent in virtual environments was identified and an audit process flow was devised that provides insight to auditors to assess the adequacy of controls in a virtual environment. A novel framework for a successful audit in virtual environment is the contribution of this research that has changed some of the security assumptions and audit controls in virtual environment.

Page generated in 0.0466 seconds