Dissertations / Theses on the topic 'Providing access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 dissertations / theses for your research on the topic 'Providing access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Palacios, Francisco Emiliano Garcia. "Providing quality of service in wireless ATM access points." Thesis, Queen's University Belfast, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326392.
Full textWilkinson, Renee, and Renee Wilkinson. "Equal Access: Providing Urban Agricultural Benefits to Under-Served Communities." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12358.
Full textWerbel, Daniel T. "Evaluating alternative methods of providing database access over low speed communications." Master's thesis, This resource online, 1996. http://scholar.lib.vt.edu/theses/available/etd-12232009-020321/.
Full textMarks, Lori J. "Project PAVE: Providing Access to the Visual Environment: Low Vision Inservice." Digital Commons @ East Tennessee State University, 1999. https://dc.etsu.edu/etsu-works/3718.
Full textHameseder, Katrin. "Providing access to a Public Transport Schedule system for Smart Phone Clients." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-93621.
Full textMorel, Mary. "Providing Equal Access to the Information Infrastructure: Public Libraries and the Internet." Thesis, The University of Arizona, 1995. http://hdl.handle.net/10150/292247.
Full textFong, Joseph Shi Piu. "A methodology for providing a relational interface to access hierarchical or network databases." Thesis, University of Sunderland, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357033.
Full textWallace, Rick L., and Jamie Price. "Information Revolution: Arming the Troops: Providing PDA Training to Rural Critical Access Hospitals." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/8771.
Full textRiley, Mark, Charles Gerba, and Menachem Elimelech. "Biological approaches for addressing the grand challenge of providing access to clean drinking water." BioMed Central, 2011. http://hdl.handle.net/10150/610168.
Full textLukinski, Stella. "Benefits of providing supports for non-traditional students to access and complete post-secondary education." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0025/MQ51747.pdf.
Full textWallace, Rick L. "Collaborating with a State Hospital Association by Providing PDA Training to Rural Critical Access Hospitals." Digital Commons @ East Tennessee State University, 2006. https://dc.etsu.edu/etsu-works/8782.
Full textChance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.
Full textJohnston, Lisa Jeannie. "Providing linguistic access to curriculum: A description and assessment of American Sign Language proficiency of the teachers of the deaf." Thesis, The University of Arizona, 1995. http://hdl.handle.net/10150/144640.
Full textÖncel, Melih, and Gonzalo Marion. "Providing Sustainable Life-solutions with a Hybrid Micro-Power Plant in Developing Countries: an Assessment of Potential Applications." Thesis, KTH, Industriell ekologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122296.
Full textPérez, Méndez Alejandro. "Proporcionando acceso federado y SSO a servicios de internet mediante kerberos e infraestructuras AAA = Providing federated access and SSO to internet services by means of kerberos and AAA infrastructures." Doctoral thesis, Universidad de Murcia, 2015. http://hdl.handle.net/10803/287163.
Full textNowadays identity federations for web applications and for the network access service are widely used and accepted. But, what happens with other kind of applications that do not support these technologies? The objective of this thesis is designing solutions to allow establishing identity federations beyond the web, avoiding the issues shown by the state of the art alternatives. For doing that, this thesis has analyzed and selected a set of technologies associated to access control. These technologies, once integrated, provide the totality of the desired functionality. • Kerberos, to perform the access control to application services, given the great features it has (secure, lightweight, SSO, etc.), its wide deployment, and its extensive range of supported applications and operating systems. • AAA infrastructures, to provide federation substrate, given their wide usage to provide federated access to the network service (e.g. eduroam). • SAML, to provide support for authorization, due to its great history of success and wide deployment for web-based federations. Hence, the general objective of this PhD thesis can be expressed as: To analyse, design, and validate solutions that enable end users to bootstrap Kerberos credentials for a specific service provider, as the result of an authentication process conducted through the AAA-based federation, and an authorization process based on the exchange of SAML statements with the home organization. This objective has been approached in the different ways, depending on the target scenario, and resulting into three more specific sub-objectives: 1. To design a solution allowing the bootstrapping of Kerberos credentials by means of the integration of the Kerberos and AAA infrastructures in the service provider. 2. To design a solution enabling the bootstrapping of Kerberos credentials by means of an auxiliary protocol (out-of-band) which makes use of the AAA infrastructure to authenticate the end user. 3. To design a solution enabling the bootstrapping of Kerberos credentials as a result of the federated authentication to the network service. Besides, the following transversal sub-objectives are defined: 1. To design an authorization model enabling the distribution of authorization information through the AAA infrastructure. 1. To validate the designed solutions by means of analytical models and prototype implementations. In order to accomplish with these objectives, this PhD thesis defines three solutions to the problem stated problem: • FedKERB integrates the Kerberos and AAA infrastructures by means of the definition of a new pre-authentication mechanism for Kerberos based on GSS-API and EAP (objective 1). Besides, it includes the possibility of performing advanced authorization based on the generation and transport of a SAML assertion from the IdP in the home organization to the Kerberos infrastructure in the service provide (objective 4). • PanaKERB defines an alternative to FedKERB that does not require the modification of the Kerberos pre-authentication mechanism. Instead, it makes use of an out-of-band protocol with native support for AAA infrastructures (i.e. PANA) to perform the federated authentication of the end user (objective 2). • EduKERB provides a cross-layer architecture integrating Kerberos with the authentication process performed during the network access process (based on AAA), by means of a new pre-authentication mechanism that makes use of the results of a successful previous EAP authentication (objective 3). Besides, this PhD thesis provides a functional and performance analysis of the aforementioned contributions (objective 5), consisting of the definition of a theoretical performance model, the implementation of prototypes to demonstrate their feasibility, and the actual performance measurement based on these prototypes. To major conclusions have been extracted from the results of this analysis. On the one hand, the three contributions have shown reasonable execution times (i.e. similar to the ones shown for the network access service, used as a reference). Besides, since they have been implemented and executed in a real environment, they feasibility has been proven.
Iyengar, Navneet. "Providing QoS in Autonomous and Neighbor-aware multi-hop Wireless Body Area Networks." University of Cincinnati / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1439306913.
Full textKipfer-Westerlund, B. A. "Towards the onomasiological dictionary : The use of the computer in providing diversified access as exemplified by an electronic lexicon of baby and child-care concepts." Thesis, University of Exeter, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.234553.
Full textLindblad, Jacob, and Nordin Mimmi Gröhn. ""Det ska vara gratis, det ska vara tillgängligt, det ska finnas något för alla" : En kvalitativ studie i hur begreppet tillgänglighet kan tolkas i folkbibliotekets verksamhet." Thesis, Uppsala universitet, Institutionen för ABM, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447043.
Full textWilkinson, David. "An examination of the costs and benefits of the quality assurance mechanisms of Authorised Validating Agencies applicable to three key stakeholder groups - higher education institutions, Access Course providing institutions and students." Thesis, City University London, 2000. http://openaccess.city.ac.uk/8161/.
Full textDiemling, Maria, and Hannah Holtschneider. "Surfing the Great British Jewish Web: Jewish History Resources Online." HATiKVA e.V. – Die Hoffnung Bildungs- und Begegnungsstätte für Jüdische Geschichte und Kultur Sachsen, 2015. https://slub.qucosa.de/id/qucosa%3A34902.
Full textKounga, Gina. "Strong authentification for providing secure services in ad hoc networks." Versailles-St Quentin en Yvelines, 2009. http://www.theses.fr/2009VERS0047.
Full textEntity authentification is a precondition to provide secure services in ad hoc networks. In order to define an entity authentification solution that suits the characteristics of ad hoc networks, we do an in-depth analysis of existing authentification solutions and how they have been adapted to work in mobile ad hoc networks. This permits to identify their limitations as well as the problems that still need to be solved. We then propose a first solution that solves these remaining problems. It is improved in a second solution that additionally permits each node to manage alone its cryptographic key pairs. The authenticity of such generated public keys can be verified without accessing any third party. We finally use this improved solution to define three secured applications that first highlight how that solution can be used to fulfil various security requirements and that second permits to generate some revenues in ad hoc networks. The first application permits individuals to buy some multimedia resources in ad hoc networks. Non-repudiation is provided to guarantee that at the end of a transaction the buying node receives the resource it has bought and is able to view or play it. It is further provided to guarantee that the selling node is sure that it will be paid for having sold the resource. The second application permits vehicles to exchange anonymously some safety information and to evaluate the reliability of this information. The third application finally permits nodes to negociate and provide the access to a fixed network in a way that avoids defrauding. The performances of the improved solution, on wich these applications rely, show that it can be used on mobile device
Boudour, Ghalem. "Bandwidth reservation in mobile ad hoc networks for providing QoS : adaptation for voice support." Toulouse 3, 2010. http://thesesups.ups-tlse.fr/1033/1/Boudour_Ghalem.pdf.
Full textQoS provisioning over Mobile Ad-Hoc Networks (MANETs) has attracted a great attention in recent years. While much research effort has been devoted to provide QoS over wired and cellular networks, QoS solutions for the support of real-time traffic over MANETs remains one of the most challenging and least explored areas. In fact, real-time applications such as voice and video could not function properly on MANETs without a QoS oriented medium access control (MAC) scheme. Indeed, real-time traffics claim strict requirements in terms of transmission delay and packet dropping that can be fulfilled only if the MAC sub-layer provides bounded channel access delay, and low collision rate. The purpose of this thesis is the proposal and analysis of an efficient reservation MAC protocol to provide QoS support over MANETs. Firstly, we study one major issue in resource reservation for MANETs which is reservation consistency. Our analysis of existing reservation MAC protocols for MANETs reveals that many reservation conflicts between neighbor nodes occur during the reservation establishment phase. These conflicts which are mainly due to collisions of reservation control messages, have an important impact on the performance of the reservation protocol, and lead to a significant collision and loss of packets during the life-time of the connection, which is not acceptable for real-time traffics. We design a new reservation MAC protocol that resolves these conflicts. The main principle of our protocol is to achieve better coordination between neighbor nodes in order to ensure consistency of reservations. Thus, before considering a reservation as successful, the protocol tries to ensure that each reservation control message transmitted by a node is successfully received by all its neighbors. In the second part of this thesis, we apply the proposed reservation protocol to voice traffic. .
Liao, Chia-Yuan, and 廖珈媛. "An Integrated NFC Platform Providing Service-based Access Control." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/36444194851272550577.
Full text國立交通大學
資訊管理研究所
102
The Near Field Communication and related mobile applications have received a growing world-wide attention. More and more NFC-enabled Smart phones are available, like Samsung Galaxy S III and Google Nexus, making mobile phones as electronic purse. Consumers can use cell phones to enter the transport gate as same as tickets. Moreover, NFC-enabled phone can be used like the credit card to pay the bills. Before mobiles providing these services, an integrated platform will be needed for the management of mobile NFC services. Since the mobile service is a cross industry combined with mobile devices, telecom operator, banking financial, etc. The platform should manage multiple embedded applications on mobile phone and keep consumers’ privacy information in the security. Moreover, it is important to offering adequate services while user has authority to choose. As a result, we proposed a platform which serves multiple actors and supports several business models based on NFC standards, and we also design a schema to protect the privacy of the information while client applying for new service and using them. Finally, we will build the integrated system on the mobile to simulate the real context of use, and use service-based access control to verify the different services.
Nkaelang, Boitumelo Tshegofatso. "ICT model providing SMMEs with access to governmental financial resources." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000654.
Full textThis study addresses the key need for access to finance through ICT. A qualitative research approach with a multiple case study design was adopted to provide an in-depth understanding of the situation from the perspective of the development finance institutions (DFIs) providing financial support for small, medium and micro enterprises (SMMEs), as well as SMMEs that have been beneficiaries. After analysing the findings obtained from the interviews, survey and other sources, an e-finance model was developed. This model comprises three environments, namely the lending subsystem, the service consumer environment and the financial provider environment. The e-finance model is perceived as representing a new distribution channel (an add-on channel rather than a substitute) for the DFIs products and services and it offers a way of reaching a broader range of new clients. Moreover, it serves to improve the turnaround time of the application by automating the process and making it efficient and effective.
Teh, Anselm. "Providing quality of service for realtime traffic in heterogeneous wireless infrastructure networks." 2009. http://arrow.unisa.edu.au/vital/access/manager/Repository/unisa:41467.
Full textHan, Yan, Jeanne Pfander, and Marianne Stowell Bracke. "Digitizing Rangelands: Providing Open Access to the Archives of Society for Range Management Journals." 2005. http://hdl.handle.net/10150/106439.
Full textLukinski, Stella. "Benefits of providing supports for non-traditional students to access and complete post-secondary education." 1999. http://hdl.handle.net/1993/2402.
Full textGuerriere, Theresa. "Implications for Providing Access to Driver’s Education for Disabled Students: Results of Related Health Assessments." Thesis, 2019. https://doi.org/10.7916/d8-t2gb-3g31.
Full textKollen, Christine. "Spatial Data Explorer: Providing Discovery and Access to Geospatial Data at the University of Arizona." 2016. http://hdl.handle.net/10150/621698.
Full textThe University of Arizona (UA) Libraries has been providing GIS services and access to geospatial data since the 1990's, first by providing access to US Federal Depository Program geospatial data on CD-ROMs and DVDs, later through the Arizona Electronic Atlas and more recently the UA Institutional Repository (UAiR) and the UA Campus Repository. Focus groups with faculty and staff confirmed our view that neither the UAiR nor the Campus Repository meet the needs of the UA's GIS community. To address their needs, the UA Libraries investigated various solutions for developing a geospatial data portal that would facilitate discovery, access, sharing, and retrieval of distributed geospatial data resources and consolidate several repositories at the University into one accessible and modern interface. An inventory was completed, interviews were conducted with relevant campus stakeholders and geospatial data portal managers at various academic libraries, and various options were investigated. Based on several factors, the UA decided to implement Open Geoportal (http://www.opengeoportal.org), a collaboratively developed, open source, federated web application for discovering, previewing, and retrieving geospatial data from multiple repositories. The UA Libraries released the resulting geospatial data portal, Spatial Data Explorer (SDE), in the fall 2015. In anticipation of the release, a survey was conducted in spring 2015 of faculty, staff, and students to gauge interest in contributing data to the SDE. The poster will include why we decided to implement Open Geoportal, screen shots showing the SDE interface and functionality, results of the survey and follow-up interviews with potential contributors, and use statistics.
Owen, Brian. "The Public Knowledge Project: providing open source software for OA publishing." 2008. http://hdl.handle.net/2429/2751.
Full textBissonnette, Leo Adolphe. "Teaching and learning at Concordia University : meeting the evolving education needs of faculty in providing access for university students with disabilities." Thesis, 2006. http://spectrum.library.concordia.ca/8741/1/NR16269.pdf.
Full textWu, Jia-Yu, and 吳家宇. "Copper(I)-Catalyzed One-Pot Three-Component Reaction Providing a New Access to Thioimidates and Developed a New Way to Synthesize 3,4-Dihydroquinazolines." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/zr28yk.
Full text國立中興大學
化學系所
107
A copper(I)-mediated denitrogenative reaction has been successfully developed for the preparation of many important organic molecules. In this study, the synthesis of thioimidates has developed via the copper(I)-catalyzed three-component reaction. The reaction of sulfonyl azide, terminal alkynes, and thiols were catalyzed by copper(I) iodide in dichloromethane at room temperature, including optimized base selection of 4-dimethylaminopyridine (DMAP), afforded substituted thioimidates. Moreover, various thiols were simply prepared from substituted thioacetates, which were deprotected by Dy(OTf)3 catalyst under methanol system, followed used to the next step without purification. Additionally, facile transformation of thioimidates to imidates and amidines were also successful. Finally, the thioimidates was transferred to 3,4-dihydroquinazolines by using p-toluenesulfonic acid monohydrate (PTSA) at room temperature. And the 3,4-dihydroquinazolines can be oxidized to quinazolines under proper oxidants. In future, we want to use N-tosylthioimidates as important intermediates to synthesize various important organic molecules.
Daramola, Ayodeji Olufemi. "Founding and launching bubble, a start-up aimed at helping companies build distributed tech teams by providing access to top-tier engineers in Nigeria." Master's thesis, 2020. http://hdl.handle.net/10362/123215.
Full textNampeya, Chrissie Ennie. "The use of cataloguing tools and resources by cataloguers in the University of Malawi libraries and the Malawi National Library service in providing access to information." Thesis, 2009. http://hdl.handle.net/10413/717.
Full textRasal, Sneha. "Reconnecting The City With The Riverfront, To Revitalize The Socio-Economic Conditions Of Springfield, Ma." 2012. https://scholarworks.umass.edu/theses/795.
Full textCoelhoso, João Pedro Esteves. "Factors influencing mobile marketing acceptance in higher education students in the United Arab Emirates." Doctoral thesis, 2019. http://hdl.handle.net/10284/7695.
Full textOs avanços tecnológicos na comunicação móvel tiveram um rápido aumento nos últimos anos. Da mesma forma, o uso das tecnologias móveis provou ser de extrema importância na vida do consumidor. O principal objetivo deste estudo é investigar e identificar o impacto das atividades de marketing na aceitação do marketing móvel praticado por estudantes do ensino superior. Assistido pelo Modelo de Aceitação de Tecnologia (TAM) e pela Teoria de Usos e Gratificações, este estudo testa um modelo conceitual que explica os fatores que influenciam a aceitação do marketing móvel. Foi adotada uma metodologia de pesquisa quantitativa, descritiva e explicativa auxiliada pelo uso do questionário. O estudo foi realizado em instituições federais de ensino superior nos Emirados Árabes Unidos. Este estudo pesquisou 402 estudantes do ensino superior usando um método probabilístico de amostragem estratificada. As descobertas gerais revelaram que a aceitação de riscos, fornecimento de informações, compartilhamento de conteúdo, acesso a conteúdo, valor percebido e vinculação pessoal influenciam positivamente a aceitação do marketing móvel e validam um novo modelo usando a Modelagem de Equações Estruturais. Além disso, este estudo destaca o estado atual da utilização do marketing móvel juntamente com os diferentes tipos de serviços mais utilizados. Esta pesquisa tem o potencial de beneficiar as empresas na criação de melhores estratégias de marketing móvel para que possam ser incorporadas nos produtos e serviços e recomenda ações para criar uma campanha de marketing móvel mais eficaz que beneficie tanto os consumidores quanto as organizações.
Les progrès technologiques dans la communication mobile ont augmenté rapidement ces dernières années. De même, l’utilisation des technologies mobiles s’est avérée d’une importance capitale dans la vie du consommateur. L'objectif principal de cette étude est d'étudier et d'identifier l'impact des activités de marketing sur l'acceptation du marketing mobile pratiqué par les étudiants de l'enseignement supérieur. Assistée du modèle d'acceptation technologique (TAM) et de la théorie des usages et des gratifications, cette étude teste un modèle conceptuel qui explique les facteurs qui influencent l'acceptation du marketing mobile. L'étude a été menée dans des établissements d'enseignement supérieur fédéraux des Émirats Arabes Unis. Une recherche descriptive et explicative utilisant une méthodologie de recherche quantitative a été adoptée. Cette étude a examiné 402 étudiants de l'enseignement supérieur utilisant une méthode probabiliste d'échantillonnage stratifié. Les conclusions générales ont révélé que l'acceptation des risques, la fourniture d'informations, le partage de contenu, l'accès au contenu, la valeur perçue et les liens personnels influencent positivement l'acceptation du marketing mobile et valide un nouveau modèle utilisant la modélisation par équation structurelle. En outre, cette étude met en évidence l’état actuel de l’utilisation du marketing mobile ainsi que des différents types de services les plus utilisés. Cette recherche pourrait aider les entreprises à créer de meilleures stratégies de marketing mobile afin de les intégrer à des produits et services, et recommande des actions pour créer une campagne de marketing mobile plus efficace, bénéfique pour les consommateurs et les organisations.