• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 10
  • 9
  • 5
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 55
  • 14
  • 11
  • 10
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Using Landscape Variables to Assess Stream Health in Ohio's Western Allegheny Plateau

King, Lisa A. 25 April 2008 (has links)
No description available.
42

Chemical and Geological Controls on the Composition of Waters and Sediments in Streams Located within the Western Allegheny Plateau: The Shade River Watershed

Gbolo, Prosper 29 July 2008 (has links)
No description available.
43

Wireless Application Development

Mujib, Rahat M. 01 January 2004 (has links)
Wireless Application Development has become a major area of research in recent times. With the increasing availability of wireless technologies such as cellular, Bluetooth, Infrared etc. it has become essential to develop applications that suit the various types of hardware that support such wireless technologies. The goal of this thesis is to explore the motivations behind application development methodologies and the tools associated with it, for small mobile devices that employ cellular technologies. Due to extremely high demand of cell phones among people who have over the years become extra mobile, there has been a trend of decreasing costs for users for the last several years. As more people start using these devices every day the demand for support of various applications and services are on the rise. This thesis will explore the leading application development tools and technologies for small mobile devices WAP (Wireless Application Protocol), J2ME (Java 2 Platform, Micro Edition) and some others. This thesis will also take a brief look into cellular network technology termed 3G, in terms of its usefulness for applications developed using the aforementioned technologies. The thesis includes the development of a J2ME application using a wireless device emulator.
44

企業採用創新技術之關鍵評估因素研究-以WAP應用為例

張洪瑞 Unknown Date (has links)
創新技術採用是一策略性議題,涉及企業與環境之間的介面管理和企業內部組織面與策略面的調整及規劃,因此企業在評估創新技術採用上應以系統觀點加以考量。在過去關於創新採用之文獻中較少針對通訊方面的技術加以探討,較多是針對企業採用自動化系統、管理資訊系統等議題,本研究選擇通訊技術中無線終端接取網際網路之技術應用WAP為題,探討國內包括行動電話系統業者及WAP領域的相關業者,在採用該項創新技術上的關鍵評估因素,藉以瞭解該項技術採用對業者之策略意涵。 本研究以定性分析之方法,採取個案訪談之方式,個案對象包括三家行動電話系統業者、銀行與兩家開發WAP應用機制之業者。根據文獻及個案訪談結果,提出四項影響創新技術採用決策之構面因素,分別是企業內部因素,包括組織面及策略面、產業環境、市場因素和技術特性;此外,本研究並提出一項情境因素,即政府法規。研究結果顯示,在電信這類高科技產業中,技術往往具有導引產業發展之地位,在此情況下,創新技術採用決策被少數幾項關鍵因素所支配。新技術資訊多掌握在技術供應商,因此技術供應商的推動是創新採用的主要原因之一。其次新技術對競爭態勢之衝擊,使得業者必須在策略上有所規劃以預做因應,因此競爭策略亦影響創新採用之取向。另外,由於行動通訊服務屬於一種系統性產品,也就是必須聯合所有組件方能產生效用,技術與系統相容性的問題亦是影響採用決策之關鍵因素。相容性會進一步促進服務的普及,使得市場成長,並帶動所謂網路效應的產生。 本研究根據個案訪談結果,提出創新技術採用決策架構。此架構中,企業內部因素以組織面之組織結構化程度與企業營業規模,以及策略面之競爭策略、競爭態勢與高階主管的技術認知程度最具關鍵性。產業環境方面,競爭程度及與供應商之互動對決策之評估具有關鍵性。市場因素以網路規模及產品範圍,技術特性則以相容性及複雜性具關鍵性。根據本研究之發現與結論,建議相關業者應儘量以內容形成差異化,以提高顧客之轉換成本進而創造鎖住效果,並且將創新技術採用由功能性思考提升至策略性思考,另外,由於技術快速變化,企業在採用評估上應採取預應式的評估方式,尤其在電信產業,掌握新技術資訊,並且預先在策略上與組織上加以規劃調整,更是企業續存的必要條件。在學術貢獻上,本研究突顯出對於穩定之技術及演進中之技術,在採用決策上評估重點之差異,並且建構了關於演進中之技術如通訊技術的採用決策架構,此架構強調關鍵因素之影響,同時也呈現關鍵因素之動態性。 / This study examines the adoption of innovative technology, such as WAP (Wireless Application Protocol), which allows users of mobile phones to access Internet. The purpose of this study is to identify the determinants contributing to the adoption of innovative technology. Unlike previous studies that focused on mature technology: for instance, information systems, manufacturing automation systems, or CAD/CAM, this study highlights fast changing technology-telecommunication. Based on the technological innovation literatures, this study proposes a model with four dimensions, such as corporate inner factors including organization and strategy, industrial environment, market factors, and characteristics of technology. Case studies were conducted in 3 operators, I bank, and 2 WAP solution providers. The results of this study show that organizational factors (organization structure and size), strategic factors (competitive strategy, competitive posture, and level of technological knowledge of CEO), industrial environment (competitive magnitude and vendors' initiative), market factors (the scale of networks and product scopes), and characteristics of technology (compatibility and complexity) are the most important determinants in the decision of adopting new technology. Besi es that, the study also finds a new contextual variable, government policy, which will influence the decision of adopting new technology in a corporate. This research provides a decision model of WAP adoption in which company will use it as a platform to provide value-added service like providing customized information, mobile banking services, or online brokerage services. Since the Internet and the mobile telephony have both been growing so fast, many companies need to develop some applications to create their competitive advantage with new technology. This model will assist managers to evaluate if they really need to adopt innovative technology and how it will enhance performance of the company.
45

Contribución al desarrollo de un entorno seguro de m-commerce

Ponce Vásquez, Diego Arturo 02 July 2002 (has links)
La exitosa implantación de la telefonía móvil a escala mundial presenta una muy importante oportunidad para la expansión del comercio electrónico sobre entornos inalámbricos. El comercio electrónico para móviles, m-Commerce, implica tres aspectos básicos: 1) la negociación y el servicio en la vecindad de cliente, 2) información oportuna y georeferenciada mientras el usuario esta en movimiento, 3) la posibilidad para completar una transacción en cualquier sitio y momento. El usuario debe tener las facilidades siguientes: la negociación y la entrega inmediata, métodos rápidos de micro y de macro pago, y facilidad de uso en el ambiente de móvil. Una de las novedades del comercio móvil es la posibilidad de atraer a clientes en el vecindario hacia un centro de venta y/o servicios proporcionándoles la información apropiada. Existen, sin embargo, una serie de factores que dificultan la implantación y el desarrollo del comercio móvil respecto al comercio electrónico. Esos inconvenientes se relacionan con las características del ambiente inalámbrico: normalmente menor ancho de banda, latencia más baja, menos estabilidad de conexiones, la disponibilidad menos previsible. Y las limitaciones en los equipos móviles: la unidad de procesamiento central menos potente, menos memoria, limitaciones en el consumo de potencia, formato reducido de pantalla, y otras más.La seguridad extremo a extremo entre el servidor de Internet y el terminal móvil es indispensable para aplicaciones de comercio electrónico. La especificación de la capa de seguridad WTLS (Wireless Transport Layer Security de WAP) no proporciona este nivel de seguridad. El uso de WTLS y la seguridad a nivel de la capa de transporte TLS (Transport Layer Security) permite la privacidad en los canales inalámbrico e Internet, pero la seguridad alcanzada no es suficiente para aplicaciones de comercio electrónico; por ello se precisan mecanismos de seguridad extremo a extremo. En esta tesis se propone una alternativa a la arquitectura de la seguridad de WAP para resolver el problema mencionado, basada en la implementación de una capa de seguridad nueva dentro de la capa WAE (Wireless Application Environment). Esto hace posible la seguridad extremo a extremo, compatibilidad con TLS, transparencia ante el usuario, y se evita la traducción y descompresión en la pasarela de WAP. Varios estudios sobre usabilidad de los dispositivos con capacidades de WAP indican que los usuarios se desconectaron debido a tiempos de respuesta lentos y la falta de comodidad en el uso (interfaces no agradables, servicios costosos, . ). Los estudios coincidieron en que las velocidades más rápidas y el uso extendido de equipos móviles de datos promueven el comercio móvil, y que el número de usuarios familiarizados con equipos móviles sube constantemente, particularmente entre usuarios de WAP, de modo que estos usuarios comienzan a ver sus teléfonos móviles como algo más que meros teléfonos. La movilidad del usuario contribuye a hacer las redes inalámbricas más complejas, y constituyen los nuevos paradigmas en el intercambio de información. Las posibilidades que se abren para la Internet inalámbrica constituyen una oportunidad importante para el comercio electrónico. El futuro e impacto social de las tecnologías utilizadas, WAP, GPRS, UMTS, . son cuestionadas habitualmente. En esta tesis se analiza la posibilidad de realizar operaciones de m-Commerce sobre WAP. Por ello, se presentan los mecanismos de seguridad de WTLS (Wireless Transport Layer Security) y se analiza la seguridad extremo a extremo en este protocolo. En redes inalámbricas, existe la necesidad de acelerar la respuesta al usuario, facilitarle el uso en ambientes ruidosos, con desconexión no previsible, sobre dispositivos con formato limitado. Para paliar los problemas relacionados a la entrega de información, facilitar el uso y personalizar el servicio con el cliente, se presenta una propuesta basada en un sistema intermediario. Los objetivos de dicho intermediario son a) reducir el tráfico de datos en el canal inalámbrico delegando tareas tales como la búsqueda, interacción y filtrado de la información al Intermediario aún estando fuera de línea; b) Reutilizar contenidos: reutilizar la información residente en el almacén intermedio mediante un sistema distribuido de caches y proxies; c) Personalizar la información: conociendo previamente el perfil del usuario se puede filtrar y distribuir información en forma predictiva y d) Gestionar la información del estado de los certificados con OCSP (On-line Certificate Status Protocol).
46

Insights Into The Hormonal Regualtion Of Epididymal Function : A Role For Estrogen

Deshpande, Shayu 11 1900 (has links) (PDF)
No description available.
47

Mobile commerce over GSM: A banking perspective on security

Van der Merwe, Pieter Ben 20 July 2004 (has links)
GSM has changed the face of communication and information exchange, much as the Internet did. With the advances made in the mobile technology arena, new opportunities are created. Mobile Commerce (m-Commerce) is one such opportunity. Each new advance in technology brings with it associated risks. This dissertation focuses on the risks involved with m-Commerce for the banking industry. This dissertation provides a detailed overview of basic services that any m-Commerce application should provide to the banking industry. These principles provide the foundation for securing any financial transaction over untrusted networks. Several mechanisms to provide these services are also discussed. Examples of such mechanisms include hash functions, Message Authentication Codes and Digital Signatures. The security of GSM networks has come under attack in the past. This is largely due to the fact that the GSM consortium opted to develop their security technologies in secret, rather than in the public domain. This dissertation aims to evaluate the security offered by GSM and assess potential attacks in order to further understand risks associated with m-Commerce applications over GSM. In recent years there have been significant additions to the GSM enabling technology family. The arrival of the SIM Application Toolkit and the Wireless Application Protocol promised to again change the face of commerce. Although market acceptance of these technologies proved to be initially slow, usage is set to increase exponentially within the next couple of years. A detailed analysis of these enabling technologies is presented in the dissertation. Possible attacks on these technologies are discussed in the latter part or this document. Based on the findings of the research, some changes to either the application architectures or the processing of the data have been suggested in order to enhance the security offered by these services. It is not the intent of this dissertation to redesign these applications, but to rather leverage off the current technologies in order to enable secure m-Commerce over these channels. This dissertation provides a detailed overview of basic services that any m-Commerce application should provide to the banking industry. These principles provide the foundation for securing any financial transaction over untrusted networks. Several mechanisms to provide these services are also discussed. Examples of such mechanisms include hash functions, Message Authentication Codes and Digital Signatures. The security of GSM networks has come under attack in the past. This is largely due to the fact that the GSM consortium opted to develop their security technologies in secret, rather than in the public domain. This dissertation aims to evaluate the security offered by GSM and assess potential attacks in order to further understand risks associated with m Commerce applications over GSM. In recent years there have been significant additions to the GSM enabling technology family. The arrival of the SIM Application Toolkit and the Wireless Application Protocol promised to again change the face of commerce. Although market acceptance of these technologies proved to be initially slow, usage is set to increase exponentially within the next couple of years. A detailed analysis of these enabling technologies is presented in the dissertation. Possible attacks on these technologies are discussed in the latter part or this document. Based on the findings of the research, some changes to either the application architectures or the processing of the data have been suggested in order to enhance the security offered by these services. It is not the intent of this dissertation to redesign these applications, but to rather leverage off the current technologies in order to enable secure m-Commerce over these channels. / Dissertation (M.Sc (Electronics))--University of Pretoria, 2005. / Electrical, Electronic and Computer Engineering / unrestricted
48

Streamwater and Sediment Chemistry of Ohio's Western Allegheny Plateau Ecoregion and their Relation to Aquatic Life

Amaning, Kwarteng, Jr 26 September 2006 (has links)
No description available.
49

A Predictive (RIVPACS-Type) Model for Streams of the Western Allegheny Plateau

North, Sheila H. 02 October 2008 (has links)
No description available.
50

Εφαρμογή τεχνητών νευρωνικών δικτύων σε παιχνίδια στρατηγικής - mobile edition

Καλαντζής, Χρήστος 26 April 2012 (has links)
Αντικείμενο της Διπλωματικής εργασίας είναι η μεταφορά ενός παιχνιδιού στρατηγικής, πού έχει αναπτυχθεί με γνώμονα τους κανόνες της Ενισχυτικής Μάθησης (Reinforcement Learning) & των Νευρωνικών δικτύων (Neural Networks), σε πλατφόρμα κινητού τηλεφώνου 6ης γενιάς & μέσω διαδικτύου με σκοπό την εκπαίδευσης του συστήματος από τον απλό χρήστη. Σκοπός της διπλωματικής εργασίας είναι η σχεδίαση, ανάπτυξη του συστήματος λογισμικού βασισμένου σε τεχνολογίες διαδικτύου & κινητής τηλεφωνίας. Η Παρούσα εργασία επικεντρώνεται σε τρεις τομείς: • Έρευνα υφιστάμενων mobile τεχνολογιών • Δυνατότητα επανασχεδιασμού εφαρμογής με χρήση τεχνολογιών mobile internet • Έλεγχος υφιστάμενης δυνατότητας επανασχεδίασης και επαναϋλοποίησης του παιχνιδιού με χρήση άλλων συστημάτων (πλατφόρμων) σε συνδυασμό με χρήση ενισχυτικής μάθησης. / In this paper we review our work on th acquisition of game-playing capabilitiew by a computer , when the only source of knowledge comes from extended self-play and sparsely dispersed human-expert play. We summarily present experiment that showhow a reinforcement learning backbone coupled with neural networks for approximation can indeed serve as amechanism of the acquisition oof game playing skill and we derive game interestingness measures that are inexpensive and strightforward to compute, yert also capture the relative quality of the game playing engine.

Page generated in 0.0518 seconds