• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 582
  • 452
  • 344
  • 102
  • 72
  • 52
  • 25
  • 22
  • 21
  • 18
  • 18
  • 13
  • 11
  • 8
  • 7
  • Tagged with
  • 2027
  • 319
  • 278
  • 273
  • 255
  • 221
  • 209
  • 182
  • 173
  • 159
  • 159
  • 158
  • 124
  • 120
  • 108
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The role of perceived organizational support in the relationship between justice perceptions and employee outcomes in the professional context.

January 2003 (has links)
Loi Chi-ho. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 96-106). / Abstracts in English and Chinese. / ABSTRACT (in English) --- p.i / ABSTRACT (in Chinese) --- p.iii / ACKNOWLEDGEMENTS --- p.iv / TABLE OF CONTENTS --- p.v / LIST OF TABLES AND FIGURES --- p.vii / CHAPTERS / Chapter 1. --- INTRODUCTION --- p.1 / Chapter 1.1 --- Background of the Study --- p.1 / Chapter 1.2 --- Purposes and Objectives of the Study --- p.3 / Chapter 1.3 --- Significance of the Study --- p.6 / Chapter 1.4 --- Structure of the Thesis --- p.8 / Chapter 2. --- LITERATURE REVIEW --- p.10 / Chapter 2.1 --- The Social Exchange Perspective --- p.10 / Chapter 2.2 --- Organizational Support Theory and Social Exchange Perspective --- p.16 / Chapter 2.3 --- Organizational Justice and Social Exchange --- p.20 / Chapter 2.3.1 --- Distributive Justice --- p.20 / Chapter 2.3.2 --- Procedural Justice --- p.23 / Chapter 2.4 --- The Professional Context --- p.25 / Chapter 2.4.1 --- The Professional Model --- p.26 / Chapter 2.4.2 --- Professional Identification --- p.29 / Chapter 3. --- HYPOTHESES DEVELOPMENT --- p.33 / Chapter 3.1 --- Organizational Justice and Organizational Commitment --- p.33 / Chapter 3.2 --- Organizational Justice and Job Satisfaction --- p.38 / Chapter 3.3 --- Moderating Effect of Professional Identification --- p.41 / Chapter 4. --- RESEARCH METHODOLOGY --- p.47 / Chapter 4.1 --- Sample and Procedure --- p.47 / Chapter 4.2 --- Measurement and Variables --- p.49 / Chapter 4.3 --- Analytical Strategy --- p.53 / Chapter 5. --- RESEARCH RESULTS --- p.56 / Chapter 5.1 --- Factor Structure of the Measures --- p.56 / Chapter 5.2 --- Descriptive Statistics --- p.58 / Chapter 5.3 --- Test of the Mediating Hypotheses --- p.62 / Chapter 5.4 --- Test of the Moderating Hypotheses --- p.69 / Chapter 6. --- DISCUSSION --- p.74 / Chapter 6.1 --- Does Distributive Justice Matter? --- p.74 / Chapter 6.2 --- Moderating Effect of Professional Identification --- p.78 / Chapter 6.3 --- Implications for Theory --- p.80 / Chapter 6.4 --- Implications for Practice --- p.82 / Chapter 6.5 --- Limitations of the Study --- p.85 / Chapter 7. --- CONCLUSION --- p.88 / APPENDIX I Questionnaire of Professional Career Survey --- p.91 / REFERENCES --- p.96
22

Fourier analysis of frequency domain discrete event simulation experiments

Hazra, Mousumi Mitra 01 January 1993 (has links)
Frequency Domain Experiments (FDEs) were first used in discrete-event simulation to perform system parameter sensitivity analysis for factor screening in stochastic system simulations. FDEs are based on the intuitive assertion that if one or more system parameters are oscillated at fixed frequencies throughout a simulation run, then oscillations at the same frequencies will be induced in the system's response. Spectral (Fourier) analysis of these induced oscillations is then used to characterize and analyze the system. Since their introduction 12 years ago, significant work has been done to extend the applicability of FDEs to regression analysis, simulation optimization and gradient estimation. Two fundamental theoretical and data analysis FDE problems remain, however. Both problems are addressed in this dissertation.;To perform a FDE Fourier analysis, a sampled data sequence of response observations is used; i.e., the selected system response is sampled using a suitable oscillation (sampling) index. The choice of an appropriate oscillation index is an open problem in the literature known as the FDE indexing problem. This dissertation presents a solution to the FDE indexing problem. Specifically, a FDE Fourier data analysis algorithm is developed which uses the simulation clock as the oscillation index. This algorithm is based on the well-established theory of counting (Poisson) processes. The algorithm is implemented and tested on a variety of systems including several networks of nonstationary M/G/1 queues.;To justify the use of Fourier methods, a basic FDE model assumption is that if a particular system response statistic is sensitive to a system parameter, then sinusoidal variation of that system parameter at a fixed frequency will induce similar sinusoidal variations in the response statistic, at the same frequency. There is, however, a lack of theoretical support for this model assumption. This dissertation provides some of that theoretical support; i.e., the FDE Fourier data analysis algorithm developed in this dissertation is used to analyze the frequency response of a M/M/1 queuing system. An equation is derived which accurately characterizes the extent to which the departure process from a M/M/1 queuing system can be modeled as an amplitude-modulated, phase-shifted version of the oscillated arrival process.
23

A basic operational calculus for q-functional equations

MacLeod, Barbara. January 1975 (has links) (PDF)
No description available.
24

Management of operational risks related to information security in financial organizations

Mehmood, Furhan, Rafique, Rajia January 2010 (has links)
<p><strong>Date</strong>: 30<sup>th</sup> May 2010</p><p><strong>Authors</strong>: Rajia Rafique, Furhan Mehmood</p><p><strong>Tutor:</strong> Dr. Michael Le Duc, Dr. Deepak Gupta</p><p><strong>Title:</strong> Management of Operational Risks related to Information Security in Financial Organizations</p><p><strong>Introduction: </strong>Information security is very significant for organizations, especially for financial organizations where customer information and their satisfaction are considered the most important assets for financial organizations. Therefore customer information must be sustained from information security breaches in order to satisfy customers. Financial organizations use their customer’s information several times a day to deal with different operations. These operations contain several types of risks. Operational risks related to information security are becoming sensational for financial organizations. Financial organizations concentrate to reduce the exposure of operational risk related to information security because these risks can affect the business to a great extent. Financial organizations need such policies and techniques which can be used to reduce the exposure of operational risk and to enhance information security. Several authors discuss about several types of operational risk related to information security, and several authors discuss about the techniques to avoid these risks in order to enhance information security.</p><p><strong>Problem:</strong> Investigate the concept of Operational Risks related to Information Security and how it is perceived in Financial Organization?<strong><em> </em></strong></p><p><strong>Purpose: </strong>The aspiration of writing this report is to describe and analyze operational risks related to information security in financial organizations and then to present some suggestions in form of polices or techniques which can be used by financial organizations to enhance their information security.</p><p><strong>Method:</strong> Since the type of our thesis is Qualitative based, therefore exploratory research approach is used to carry out research. Authors tried to use secondary source of information as well as primary source of information in order to get maximum knowledge about the topic and to come up with maximum possible output.</p><p><strong>Target Audience</strong></p><p>The target audience in our mind for this paper consists of both, academic readers and professionals who have interest and some knowledge about information security and operational risks. Target audience for this research work includes professionals, academic readers and both investigated organizations (NCCPL and CDC).</p><p><strong>Conclusion</strong></p><p>By critically analyzing the literature written by various authors and the worthy information provided by our primary sources gave us the opportunity to develop a solution to keep the operations secure from risks and to fix the current problems related to information security. We found that there are different types of operational risks related to information security which can affect the business of financial organizations and there are various techniques which can be used by financial organizations to solve the current issue related to operational risks in order to enhance information security. It was also found that top management in financial organizations is interested in issues about information security operational risk and they showed their keen interest in adopting new effective techniques.</p><p><strong>Keywords:</strong> Information Security, Information Security Risks, Operational Risks, Operational Risk Management, Operational Risks in Financial Organizations.</p>
25

Design of high-performance operational amplifiers using an embedded compensation technique

Ziazadeh, Ramsin M. 04 December 1997 (has links)
Graduation date: 1998
26

Opamp characterization techniques

Ramamurthy, Karthik 22 June 1993 (has links)
Standard methodologies exist for testing and characterizing digital circuits but the same cannot be said of analog circuits. Though much theoretical work has been done to model the linear and nonlinear aspects of analog circuits, a firm practical background for the design of testable analog cells has yet to be set. The industry largely looks for solutions wherein some form of built in self-test (BIST) can be incorporated into the analog circuits to make the testing at the manufacturing level easy and accurate. Since the testers in the industry are generally digital, test circuits that use logic levels at the output to make measurements are attractive. This thesis examines the design of such test circuits for one specific analog circuit, the opamp. Test circuits to measure the gain, gain-bandwidth product, phase response and the slew rate of the opamp have been designed and experimental results are presented. The main advantages of these tests are that they are simple, fast, accurate and easy to incorporate in an integrated circuit. / Graduation date: 1994
27

Management of operational risks related to information security in financial organizations

Mehmood, Furhan, Rafique, Rajia January 2010 (has links)
Date: 30th May 2010 Authors: Rajia Rafique, Furhan Mehmood Tutor: Dr. Michael Le Duc, Dr. Deepak Gupta Title: Management of Operational Risks related to Information Security in Financial Organizations Introduction: Information security is very significant for organizations, especially for financial organizations where customer information and their satisfaction are considered the most important assets for financial organizations. Therefore customer information must be sustained from information security breaches in order to satisfy customers. Financial organizations use their customer’s information several times a day to deal with different operations. These operations contain several types of risks. Operational risks related to information security are becoming sensational for financial organizations. Financial organizations concentrate to reduce the exposure of operational risk related to information security because these risks can affect the business to a great extent. Financial organizations need such policies and techniques which can be used to reduce the exposure of operational risk and to enhance information security. Several authors discuss about several types of operational risk related to information security, and several authors discuss about the techniques to avoid these risks in order to enhance information security. Problem: Investigate the concept of Operational Risks related to Information Security and how it is perceived in Financial Organization? Purpose: The aspiration of writing this report is to describe and analyze operational risks related to information security in financial organizations and then to present some suggestions in form of polices or techniques which can be used by financial organizations to enhance their information security. Method: Since the type of our thesis is Qualitative based, therefore exploratory research approach is used to carry out research. Authors tried to use secondary source of information as well as primary source of information in order to get maximum knowledge about the topic and to come up with maximum possible output. Target Audience The target audience in our mind for this paper consists of both, academic readers and professionals who have interest and some knowledge about information security and operational risks. Target audience for this research work includes professionals, academic readers and both investigated organizations (NCCPL and CDC). Conclusion By critically analyzing the literature written by various authors and the worthy information provided by our primary sources gave us the opportunity to develop a solution to keep the operations secure from risks and to fix the current problems related to information security. We found that there are different types of operational risks related to information security which can affect the business of financial organizations and there are various techniques which can be used by financial organizations to solve the current issue related to operational risks in order to enhance information security. It was also found that top management in financial organizations is interested in issues about information security operational risk and they showed their keen interest in adopting new effective techniques. Keywords: Information Security, Information Security Risks, Operational Risks, Operational Risk Management, Operational Risks in Financial Organizations.
28

A Novel Voltage-Control Sinusoidal Oscillator using Operational Transconductance Amplifier

Wang, Chao-Ho 19 July 2002 (has links)
Abstract In this research, we intend to develop a sinusoidal VCO with low harmonic distortion. A new sinusoidal VCO is developed with only two OTAs. The number of OTAs is fewer than that previously presented in other papers. The oscillator will be easy to debug and the complexity of the oscillator can be reduced. An AGC control mechanism is applied to the VCO to control the oscillation amplitude and to reduce the harmonic distortion. The oscillation is designed with the frequency around 100MHz and the oscillation amplitude is around 100mV. The simulation results and the problem encountered are discussed.
29

Operational risk Management bei Banken /

Piaz, Jean-Marc. January 2002 (has links)
Thesis (doctoral)--Universität, Zürich, 2001.
30

Design of a signal generator using current feedback operational amplifiers

Haque, Akm Sydul. January 2008 (has links)
Thesis (Ph.D.) -- University of Texas at Arlington, 2008.

Page generated in 0.1114 seconds