• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 110
  • 6
  • 3
  • 1
  • Tagged with
  • 120
  • 100
  • 7
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Modern hybrids or senior gerillas : Hezbollahs operations in the Second Lebanon War

Lindmark, Alex January 2020 (has links)
Hezbollahs success during the second Lebanon war in 2006 caused a great stirr through the field of military theorists and analysts. The organization was by most numericals clearly out-gunned and out-numbered compared to the combat-experienced Israel defense forces. The Lebanese forces however managed to not only stifle the Israeli offensive actions but held their ground through the 34 days long war resulting in a stalemate and a United Nations resolution. Theories have evolved from or in ways of explaining this puzzling case. Dual approaches have been identified as some theorize that hybrid warfare is a completely new phenomenon where others state it’s a flavor of the month expression for the same old tactics seen many times before. This study seeks to further explore the complex nature of irregular conflicts and find whether a new theory of hybrid warfare ’Unrestricted warfare’ or a senior compendium’On guerrilla warfare’ best can explain this.The findings of this study concludes that neither theory can be out-ruled and opens for further research within the the second Lebanon war as well as on the theories ’On guerrilla warfare’ and ’Unrestricted warfare’.
112

Potentialytan av N8: En kvantkemisk studie / Potential Energy Surface of N8: A Quantum Chemical Study

GUSTAFSSON STJERNQVIST, FRED January 2015 (has links)
In this study, quantum chemical methods have been used to study two isomers of the proposed high energy density material N8. It has been suggested as a green substitute for conventional solid rocket fuel. Several techniques were used to study the barrier height towards decomposition along reaction path of four N8 isomers. The potential energy surfaces around the transition states of two of the isomers were further investigated. Results show that the bond length of the isomers may have been overestimated, and one of the isomers has a lower barrier and may have a more complicated reaction route. Furthermore, there is a rather large difference in barrier height between calculations at the CCSD and CCSD(T) levels of theory / I den här studien har kvantkemiska beräkningsmetoder använts för att studera två isomerer av N8. På grund av sitt höga energiinnehåll har N8 föreslagits som ett grönt alternativ till konventionellt fast racketbränsle. Flera tekniker har använts för att studera barriären för nedbrytning utefter reaktionskoordinaten för fyra N8-isomerer. Potentialytan runt aktiveringstillståndet för två av isomererna studerades närmare. Resultaten visar att bindningslängden hos isomererna kan ha överskattats och en av isomererna har en lägre barriär samt kan ha en mer komplicerad reaktionsväg. Vidare är det en tämligen stor skillnad i aktiveringsenergi mellan CCSD- och CCSD(T)- nivåerna.
113

Lika barn leka bäst? : En studie om förskolebarns kamratrelationer i den fria leken i utomhusmiljön

Kabenge, Immaculate, Selenhag, Janie January 2022 (has links)
The purpose of this study is to unveil how inclusion in contrast to exclusion, between children, is being exercised during unrestricted play. Furthermore, the study intends to highlight how educators discern how children are given equal opportunities regarding influence and participation during unrestricted play. The following questions arise as a resultant: How can we recognize the appearance of relationships among the children during unrestricted play? How do the educators acknowledge that the children have an opportunity to influence and participation in the unrestricted play?The theoretical assumption used in this essay is based on the sociocultural perspective and sociologist William Corsaro’s theory about peer culture. As a basis for the survey method, we have interviewed five educators that consisted of preschool teachers and caretakers. The observations were made by studying both the young and older children’s section which in turn provided a wide scope of data. In summary, the result from this study demonstrates that both inclusion and exclusion are present during children’s unrestricted play simply since these phenomena coexist and are dependent on each other. In addition, relationships among children surface during social interaction based on the children’s various peer affiliations created within particular peer culture. These relationships vary based on aspects like age and language. In conclusion, the opportunity for children to have influence during unrestricted play presents itself during negotiations of different roles and can also be seen through their actions during this type of play.
114

Improved estimation for linear models under different loss functions

Hoque, Zahirul January 2004 (has links)
This thesis investigates improved estimators of the parameters of the linear regression models with normal errors, under sample and non-sample prior information about the value of the parameters. The estimators considered are the unrestricted estimator (UE), restricted estimator (RE), shrinkage restricted estimator (SRE), preliminary test estimator (PTE), shrinkage preliminary test estimator (SPTE), and shrinkage estimator (SE). The performances of the estimators are investigated with respect to bias, squared error and linex loss. For the analyses of the risk functions of the estimators, analytical, graphical and numerical procedures are adopted. In Part I the SRE, SPTE and SE of the slope and intercept parameters of the simple linear regression model are considered. The performances of the estimators are investigated with respect to their biases and mean square errors. The efficiencies of the SRE, SPTE and SE relative to the UE are obtained. It is revealed that under certain conditions, SE outperforms the other estimators considered in this thesis. In Part II in addition to the likelihood ratio (LR) test, the Wald (W) and Lagrange multiplier (LM) tests are used to define the SPTE and SE of the parameter vector of the multiple linear regression model with normal errors. Moreover, the modified and size-corrected W, LR and LM tests are used in the definition of SPTE. It is revealed that a great deal of conflict exists among the quadratic biases (QB) and quadratic risks (QR) of the SPTEs under the three original tests. The use of the modified tests reduces the conflict among the QRs, but not among the QBs. However, the use of the size-corrected tests in the definition of the SPTE almost eliminates the conflict among both QBs and QRs. It is also revealed that there is a great deal of conflict among the performances of the SEs when the three original tests are used as the preliminary test statistics. With respect to quadratic bias, the W test statistic based SE outperforms that based on the LR and LM test statistics. However, with respect to the QR criterion, the LM test statistic based SE outperforms the W and LM test statistics based SEs, under certain conditions. In Part III the performance of the PTE of the slope parameter of the simple linear regression model is investigated under the linex loss function. This is motivated by increasing criticism of the squared error loss function for its inappropriateness in many real life situations where underestimation of a parameter is more serious than its overestimation or vice-versa. It is revealed that under the linex loss function the PTE outperforms the UE if the nonsample prior information about the value of the parameter is not too far from its true value. Like the linex loss function, the risk function of the PTE is also asymmetric. However, if the magnitude of the scale parameter of the linex loss is very small, the risk of the PTE is nearly symmetric.
115

Effects Of Monetary Policy On Banking Interest Rates: Interest Rate Pass-through In Turkey

Sagir, Serhat 01 October 2011 (has links) (PDF)
In this study, the effects of CBRT monetary policy decisions on the consumer, automobile, housing and commercial loans of the banks during the period from the early of 2004 to the middle of 2011 are examined. In order to perform this study, it is benefited from weekly weighted average loan interest rate data of the banks, which is the data having the highest frequency that could be obtained from the electronic data distribution system of CBRT. Monetary policy instruments of Central Bank may change in the course of time or monetary policy could be executed by more than one instrument. Therefore, as the political interest rate would be insufficient in the calculation of the effect of monetary policy on loan interest rates of the banks, Government Dept Securities&rsquo / premiums are used instead of the political interest rates in this study to make it reflect the policies of central bank more clearly as a whole. Among the Government Dept Securities that have different maturity structure, benchmark bonds that are adapted to the expected political interest rate changes and that react to the unexpected interest rate changes at the high rate (reaction coefficient 0.983) are used. In order to weight the cointegration relation between interest rates, unrestricted error correction model is established and it is determined by Bound Test that there is a long-term relation between each interest rate and interest rate of benchmark bond. After a cointegration relation is determined among the serials, autoregressive distributed lag model is used to determine the level of transitivity and it is determined that monetary policy decisions affect the banking interest rate at 77% level and by 13 weeks delay on average.
116

Theoretical calculations of heavy atom effects in magnetic resonance spectroscopy

Oprea, Corneliu I. January 2006 (has links)
<p>This thesis presents quantum chemical calculations, applications of the response function formalism recently implemented within the framework of density functional theory (DFT) by our research group. The purpose of the calculations is to assess the performance of this perturbative approach to determining heavy atom effects on magnetic resonance parameters. Relativistic corrections can be generated by spin-orbit interactions or by scalar relativistic effects due to high velocity electrons in the atomic core region of heavy atoms. In this work, the evaluation of nuclear magnetic resonance (NMR) parameters is considered, the nuclear shielding tensor and the indirect nuclear spin-spin coupling tensor. For series of homologous compounds, it is found that both types of corrections to these parameters are increasing in size upon substitution of a constituent atom by a heavier element, but that their relative importance is system dependent. The obtained results are compatible with the ones provided by electron correlated <em>ab initio</em> methods, and a qualitative agreement with experimentally determined parameters is overall achieved. The methodology presented in this thesis aims to be a practical approach which can be applied in the study of molecular properties of large systems.</p><p>This thesis also addresses the calculation of hyperfine coupling constants, and evaluates a novel approach to the treatment of spin-polarization in spin restricted calculations without the spin contamination associated with spin unrestricted calculations.</p>
117

Theoretical calculations of heavy atom effects in magnetic resonance spectroscopy

Oprea, Corneliu I. January 2006 (has links)
This thesis presents quantum chemical calculations, applications of the response function formalism recently implemented within the framework of density functional theory (DFT) by our research group. The purpose of the calculations is to assess the performance of this perturbative approach to determining heavy atom effects on magnetic resonance parameters. Relativistic corrections can be generated by spin-orbit interactions or by scalar relativistic effects due to high velocity electrons in the atomic core region of heavy atoms. In this work, the evaluation of nuclear magnetic resonance (NMR) parameters is considered, the nuclear shielding tensor and the indirect nuclear spin-spin coupling tensor. For series of homologous compounds, it is found that both types of corrections to these parameters are increasing in size upon substitution of a constituent atom by a heavier element, but that their relative importance is system dependent. The obtained results are compatible with the ones provided by electron correlated ab initio methods, and a qualitative agreement with experimentally determined parameters is overall achieved. The methodology presented in this thesis aims to be a practical approach which can be applied in the study of molecular properties of large systems. This thesis also addresses the calculation of hyperfine coupling constants, and evaluates a novel approach to the treatment of spin-polarization in spin restricted calculations without the spin contamination associated with spin unrestricted calculations. / QC 20101122
118

Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas. / An architecture to grouping security controls in information technology environments based on unrestricted cooperative bargains.

Silva, Anderson Aparecido Alves da 15 December 2016 (has links)
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento entre mecanismos de detecção e de previsão não é trivialmente resolvido. Neste trabalho é proposta uma arquitetura, denominada de Arquitetura Estratégica de Agrupamento - Strategic Grouping Architecture (SGA) - para agrupamento de controles de segurança voltados para detecção e/ou previsão, que tem como base a busca de um equilíbrio entre as configurações e os resultados individuais de cada mecanismo de proteção envolvido. Para alcançar este equilíbrio a arquitetura proposta divide a análise dos eventos (legítimos e maliciosos) que passam pelos controles de segurança em dois níveis de abstração: o técnico, onde são coletadas as configurações e os resultados dos controles de segurança; e o estratégico, onde os dados obtidos no nível técnico são analisados por meio de barganhas cooperativas irrestritas - Unrestricted Cooperative Bargains (UCB), conceito proveniente da Teoria dos Jogos, que busca a otimização e equilíbrio entre resultados. Justamente por ser realizada em um nível de abstração diferente, a análise gerada pelo SGA identifica a influência que cada configuração exerce nos resultados agrupados. Para explorar a capacidade da arquitetura proposta, dois experimentos, bastante diferentes, que envolvem a ação de eventos indesejados em ambientes de TI são conduzidos. Os resultados obtidos mostram a viabilidade do agrupamento de controles de segurança de detecção e previsão e a possibilidade do uso do SGA em outros ambientes, que não estejam necessariamente ligados à segurança de TI. Baseada na literatura científica a validação do SGA consiste de uma transformação prévia na categoria dos jogos estratégicos usados - cooperativos para não-cooperativos - e na busca de situações como o Equilíbrio de Nash (EN) e o ótimo de Pareto, que indicam os melhores resultados de um jogo. / Security controls, also called protection mechanisms, focused on forecasting and detection of unwanted events are increasingly employed in Information Technology (IT) environments. The little understanding about the characteristics of unwanted events which act on the systems and the low rate of compatibility among several protection mechanisms are both problems that arise in that scenario. Different settings make difficult combining the results of these mechanisms and two or more controls rarely complement each other. Due to that, grouping mechanisms of detection and forecasting is not a trivial matter. In this work a framework called Strategic Grouping Architecture (SGA) is proposed to grouping security controls focused on detection and/or forecasting. SGA is based on the search for equilibrium between the settings and the individual results of each protection mechanism involved. In order to reach this equilibrium the proposed framework divide the analysis of events (legitimates and malicious) which go through the security controls in two abstract levels: the technical level, where the settings and the results of security controls are collected; and the strategic level, where the data obtained in the technical level are analyzed through Unrestricted Cooperative Bargains (UCB), concept from Game Theory that seeks to optimize and balance the results. Precisely because it is performed on a different level of abstraction, the analysis generated by the SGA identifies the influence that each setting has on the clustered results. In order to exploit the capability of the proposed architecture, two experiments, quite different, involving the action of unwanted events in IT environments, are conducted. The obtained findings show the feasibility of grouping detection and forecasting security controls and the possibility of using the SGA in other environments that are not necessarily related to IT security. Based on scientific literature SGA validation consists of a previous transformation in the category of strategy games used - cooperative to non-cooperative - and the search for situations such as the Nash Equilibrium (NE) and the Pareto optimal, indicating the best results a game.
119

Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas. / An architecture to grouping security controls in information technology environments based on unrestricted cooperative bargains.

Anderson Aparecido Alves da Silva 15 December 2016 (has links)
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento entre mecanismos de detecção e de previsão não é trivialmente resolvido. Neste trabalho é proposta uma arquitetura, denominada de Arquitetura Estratégica de Agrupamento - Strategic Grouping Architecture (SGA) - para agrupamento de controles de segurança voltados para detecção e/ou previsão, que tem como base a busca de um equilíbrio entre as configurações e os resultados individuais de cada mecanismo de proteção envolvido. Para alcançar este equilíbrio a arquitetura proposta divide a análise dos eventos (legítimos e maliciosos) que passam pelos controles de segurança em dois níveis de abstração: o técnico, onde são coletadas as configurações e os resultados dos controles de segurança; e o estratégico, onde os dados obtidos no nível técnico são analisados por meio de barganhas cooperativas irrestritas - Unrestricted Cooperative Bargains (UCB), conceito proveniente da Teoria dos Jogos, que busca a otimização e equilíbrio entre resultados. Justamente por ser realizada em um nível de abstração diferente, a análise gerada pelo SGA identifica a influência que cada configuração exerce nos resultados agrupados. Para explorar a capacidade da arquitetura proposta, dois experimentos, bastante diferentes, que envolvem a ação de eventos indesejados em ambientes de TI são conduzidos. Os resultados obtidos mostram a viabilidade do agrupamento de controles de segurança de detecção e previsão e a possibilidade do uso do SGA em outros ambientes, que não estejam necessariamente ligados à segurança de TI. Baseada na literatura científica a validação do SGA consiste de uma transformação prévia na categoria dos jogos estratégicos usados - cooperativos para não-cooperativos - e na busca de situações como o Equilíbrio de Nash (EN) e o ótimo de Pareto, que indicam os melhores resultados de um jogo. / Security controls, also called protection mechanisms, focused on forecasting and detection of unwanted events are increasingly employed in Information Technology (IT) environments. The little understanding about the characteristics of unwanted events which act on the systems and the low rate of compatibility among several protection mechanisms are both problems that arise in that scenario. Different settings make difficult combining the results of these mechanisms and two or more controls rarely complement each other. Due to that, grouping mechanisms of detection and forecasting is not a trivial matter. In this work a framework called Strategic Grouping Architecture (SGA) is proposed to grouping security controls focused on detection and/or forecasting. SGA is based on the search for equilibrium between the settings and the individual results of each protection mechanism involved. In order to reach this equilibrium the proposed framework divide the analysis of events (legitimates and malicious) which go through the security controls in two abstract levels: the technical level, where the settings and the results of security controls are collected; and the strategic level, where the data obtained in the technical level are analyzed through Unrestricted Cooperative Bargains (UCB), concept from Game Theory that seeks to optimize and balance the results. Precisely because it is performed on a different level of abstraction, the analysis generated by the SGA identifies the influence that each setting has on the clustered results. In order to exploit the capability of the proposed architecture, two experiments, quite different, involving the action of unwanted events in IT environments, are conducted. The obtained findings show the feasibility of grouping detection and forecasting security controls and the possibility of using the SGA in other environments that are not necessarily related to IT security. Based on scientific literature SGA validation consists of a previous transformation in the category of strategy games used - cooperative to non-cooperative - and the search for situations such as the Nash Equilibrium (NE) and the Pareto optimal, indicating the best results a game.
120

Substituição processual sindical

Pimenta, Adriana Campos de Souza Freire 01 July 2010 (has links)
Made available in DSpace on 2016-03-15T19:33:39Z (GMT). No. of bitstreams: 1 BDTD - trabalhos retidos.docx: 11621 bytes, checksum: 0452b8296967440b491d0b515ed6814d (MD5) Previous issue date: 2010-07-01 / In Brazil, through social rights were recognized, in parallel, the civil and political rights. Even at authoritarian times, social rights have been formally recognized, given that the Federal Constitution of 1988 gave them enormous attention. However, realization of social rights requires, beyond the state action, the commitment of workers and their unions, occupying Article 8., III CF/88 position of prominence in this particular, by allowing the union, as a procedural substitute, to file lawsuits in defense of collective rights (especially of a certain workers class) and homogeneous individual rights of its members. This ensures isonomic access to justice to the members of the class (especially professional), and also decrease the excessive amount of individual claims and increase the number of workers protected. Finally, the most frequent activities of the union as a procedural substitute for workers, beyond strengthening the ties between them, will reduce the low rate of spontaneous compliance of the constitutional and legal norms which enshrine social rights by employers, also reducing, as a result, judicial cases and relieving the Labor Courts. / No Brasil, através dos direitos sociais, foram consagrados, de forma paralela, os direitos civis e políticos. Mesmo em períodos autoritários, os direitos sociais foram reconhecidos formalmente, sendo certo que a Constituição Federal de 1988 deu a eles enorme destaque. Contudo, a concretização dos direitos sociais, além de prestações do próprio Estado, requer o empenho dos trabalhadores e de seus sindicatos, ocupando o artigo 8º., III da CF/88, neste particular, posição de destaque, ao possibilitar que o sindicato, na condição de substituto processual, ajuíze ações em defesa dos direitos coletivos (da categoria profissional, enquanto tal) e dos direitos individuais homogêneos de seus membros. Isso garante aos integrantes da categoria (notadamente profissional) isonomia no acesso à justiça, além de diminuir a quantidade excessiva de reclamações individuais e aumentar o número de trabalhadores tutelados. Por fim, a atuação mais freqüente do sindicato como substituto processual dos trabalhadores, além de fortalecer os laços entre eles, aumentará o baixo índice de cumprimento espontâneo pelos empregadores das normas constitucionais e legais que consagram os direitos sociais, reduzindo também, via de conseqüência, os processos judiciais e desafogando a Justiça do Trabalho.

Page generated in 0.6035 seconds