Dissertations / Theses on the topic 'SSO'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'SSO.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chripko, Juraj. "Systém Excalibur - implementace SSO." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445588.
Full textKřenek, Jan. "Konfigurace SSO ve vnitropodnikové síti proti Active Directory." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-199213.
Full textAlcántara, Pope Moisés, and Cruz Eileen Belinda Loayza. "Implementación de un Sistema de Gestión de Seguridad y Salud Ocupacional en Minería Subterránea basado en las Normas Peruanas en la Contrata Minera Madsur SRL." Bachelor's thesis, Universidad Continental, 2019. http://repositorio.continental.edu.pe/handle/continental/5755.
Full textMaachaoui, Mohamed. "Sécurité et performances des réseaux de nouvelle génération." Phd thesis, Toulouse, INPT, 2015. http://oatao.univ-toulouse.fr/14266/1/Maachaoui.pdf.
Full textFeldmann, Florian [Verfasser], Jörg [Akademischer Betreuer] Schwenk, and Christina [Akademischer Betreuer] Pöpper. "Binding credentials : securing (SSO) authentication / Florian Feldmann. Gutachter: Jörg Schwenk ; Christina Pöpper." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1081246677/34.
Full textPérez, Méndez Alejandro. "Proporcionando acceso federado y SSO a servicios de internet mediante kerberos e infraestructuras AAA = Providing federated access and SSO to internet services by means of kerberos and AAA infrastructures." Doctoral thesis, Universidad de Murcia, 2015. http://hdl.handle.net/10803/287163.
Full textNowadays identity federations for web applications and for the network access service are widely used and accepted. But, what happens with other kind of applications that do not support these technologies? The objective of this thesis is designing solutions to allow establishing identity federations beyond the web, avoiding the issues shown by the state of the art alternatives. For doing that, this thesis has analyzed and selected a set of technologies associated to access control. These technologies, once integrated, provide the totality of the desired functionality. • Kerberos, to perform the access control to application services, given the great features it has (secure, lightweight, SSO, etc.), its wide deployment, and its extensive range of supported applications and operating systems. • AAA infrastructures, to provide federation substrate, given their wide usage to provide federated access to the network service (e.g. eduroam). • SAML, to provide support for authorization, due to its great history of success and wide deployment for web-based federations. Hence, the general objective of this PhD thesis can be expressed as: To analyse, design, and validate solutions that enable end users to bootstrap Kerberos credentials for a specific service provider, as the result of an authentication process conducted through the AAA-based federation, and an authorization process based on the exchange of SAML statements with the home organization. This objective has been approached in the different ways, depending on the target scenario, and resulting into three more specific sub-objectives: 1. To design a solution allowing the bootstrapping of Kerberos credentials by means of the integration of the Kerberos and AAA infrastructures in the service provider. 2. To design a solution enabling the bootstrapping of Kerberos credentials by means of an auxiliary protocol (out-of-band) which makes use of the AAA infrastructure to authenticate the end user. 3. To design a solution enabling the bootstrapping of Kerberos credentials as a result of the federated authentication to the network service. Besides, the following transversal sub-objectives are defined: 1. To design an authorization model enabling the distribution of authorization information through the AAA infrastructure. 1. To validate the designed solutions by means of analytical models and prototype implementations. In order to accomplish with these objectives, this PhD thesis defines three solutions to the problem stated problem: • FedKERB integrates the Kerberos and AAA infrastructures by means of the definition of a new pre-authentication mechanism for Kerberos based on GSS-API and EAP (objective 1). Besides, it includes the possibility of performing advanced authorization based on the generation and transport of a SAML assertion from the IdP in the home organization to the Kerberos infrastructure in the service provide (objective 4). • PanaKERB defines an alternative to FedKERB that does not require the modification of the Kerberos pre-authentication mechanism. Instead, it makes use of an out-of-band protocol with native support for AAA infrastructures (i.e. PANA) to perform the federated authentication of the end user (objective 2). • EduKERB provides a cross-layer architecture integrating Kerberos with the authentication process performed during the network access process (based on AAA), by means of a new pre-authentication mechanism that makes use of the results of a successful previous EAP authentication (objective 3). Besides, this PhD thesis provides a functional and performance analysis of the aforementioned contributions (objective 5), consisting of the definition of a theoretical performance model, the implementation of prototypes to demonstrate their feasibility, and the actual performance measurement based on these prototypes. To major conclusions have been extracted from the results of this analysis. On the one hand, the three contributions have shown reasonable execution times (i.e. similar to the ones shown for the network access service, used as a reference). Besides, since they have been implemented and executed in a real environment, they feasibility has been proven.
Bertilsson, Emil, and Sebastian Arvidsson. "Fartygsskydd och rollen som SSO : En kvalitativ undersökning om fartygsskyddet och SSOrollenombord på olika typer av fartyg efter införandet avISPS." Thesis, Linnéuniversitetet, Sjöfartshögskolan (SJÖ), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-52406.
Full textThis thesis is about ship security and the role of the SSO on different types of vessels. The purpose of the survey was to find out how the ship type and trade area of the ship affects how the on-board work with security and ISPS is conducted. The study was carried out during the summer and autumn 2015 by making qualitative semi-structured interviews with the SSOs on four vessels of different type in different trade areas. The vessels in the survey consist of a cruise ship in ocean traffic, a tanker in European traffic, a car carrier in world-wide ocean traffic and a ferry in short voyage traffic. In the study it was concluded that there are differences between both the investigated vessel types and trade areas, and that this affects how the interviewees: the SSOs perceive their role. The result indicates that the largest difference in the organization of ship security is found between the two main types of vessels in the study, between passenger ships and cargo ships, and that this difference can largely be explained by the size of the crew.
Calagua, Begazo Gian Carlo. "Propuesta de Gestión por procesos aplicada a la Seguridad y Salud Ocupacional adaptada a la ley N°29783 que permita la integración y desarrollo de los procesos en las MYPES de Lima metropolitana pertenecientes al sector hotelero." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/626456.
Full textThis thesis seeks to development a management system using real data, taken from surveys conducted in metropolitan Lima hotels, the focus was placed on medium and small companies whose growth potential is high, within this development is proposed the management system use of management tools in industrial engineering. The management system is based on standards. OHSAS 18001, as well as the Peruvian company Law 29783 _ Occupational Health and Safety Law, looking, in this way, to minimize any risk and/or penalty that the company may suffer, maximizing its life time, this system also seeks interaction with other existing processes in hotels.
Tesis
Pinto, Telêmaco Janson Mendes. "Caracterização ecológica da herpetofauna de uma Reserva de Sso Sustentável na Amazônia central, Amazonas, Brasil." Universidade Federal do Amazonas, 2011. http://tede.ufam.edu.br/handle/tede/3025.
Full textCAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
We present here the ecological assessment of the herpetofauna of a sustainable use reserves in the Central Amazonia, Amazonas State, Brazil. Besides the list of species, issues such as potential impacts on the herpetofauna are discussed, as well as the sampling methods employed in the study. The study was conducted during the rainy season in the region with the application of six complementary methods often used this type of study: time limited visual search, pitfall traps with drift fence, collections made by others, occasional collections, hearing record and interviews. We recorded 74 species of amphibians and reptiles included in the orders Anura (33), Testudine (05), Crocodylia (03) and Squamata (33; 17 lizards and 16 snakes). An undescribed genus of lizard family Gymnophtalmidae and four species of frogs of the families Hylidae and Aromobatidae were recorded in this study. Some of the recorded species are cited in the lists of endangered animals such as turtles belonging to the family of Podocnemididae. Apparently consumption by communities is identified as the main threat to turtle populations in this region. Certainly the location of this species list is not complete. This study deals with a point sampling herpetofauna in a region hitherto unknown herpetofaunistic the point of view, and is therefore by the inflow of new information about the area where it was held
Apresentamos aqui a avaliação ecológica da herpetofauna de uma reserva de uso sustentável na Amazônia Central, Estado do Amazonas, Brasil. Além da lista de espécies, questões como os impactos em potencial sobre a herpetofauna são discutidos, bem como os métodos de amostragem empregados no estudo. O trabalho foi realizado durante a estação chuvosa na região com a aplicação de seis métodos complementares frequentemente utilizados neste tipo de estudo: procura visual limitada por tempo, armadilha de interceptação e queda com cerca guia, coletas por terceiros, encontros ocasionais, registro auditivo e entrevistas. Foram registradas 74 espécies entre anfíbios e répteis incluídas nas ordens Anura (33), Testudines (05), Crocodylia (03) e Squamata (33; 17 lagartos e 16 serpentes). Um gênero de lagarto da família Gymnophtalmidae e quatro espécies de anuros das famílias Aromobatidae e Hylidae ambos não descritos foram registrados neste estudo. Algumas das espécies registradas são citadas nas listas de animais ameaçados de extinção como é o caso dos quelônios pertencentes à família Podocnemididae. Aparentemente o consumo pelas comunidades tradicionais é apontado como a principal ameaça às populações de quelônios nesta região. Certamente a lista de espécies desta localidade não está completa. O estudo trata de uma amostragem pontual 24 da herpetofauna de uma região até então desconhecida do ponto de vista herpetofaunístico, justificando-se assim pelo aporte de informações inéditas sobre a área onde foi realizado. Palavras-chave: anfíbios, répteis, diversidade, conservação, Amazonas, Brasil
Panasiuk, Oleksandr. "Towards better practices in detection of wastewater pollution in stormwater sewers and volume estimation of SSO discharges." Licentiate thesis, Luleå tekniska universitet, Arkitektur och vatten, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17406.
Full textGodkänd; 2015; 20151102 (olepan); Nedanstående person kommer att hålla licentiatseminarium för avläggande av teknologie licentiatexamen. Namn: Oleksandr Panasiuk Ämne: VA-teknik/Urban Water Engineering Uppsats: Towards Better Practices in Detection of Wastewater Pollution in Stormwater Sewers and Volume Estimation of SSO Discharges Examinator: Professor Maria Viklander, Institutionen för samhällsbyggnad och naturresurser, Avdelning: Arkitektur och vatten, Luleå tekniska universitet. Diskutant: Professor Sveinung Sægrov, NTNU Department of Hydraulic and Environmental Engineering. Tid: Onsdag 9 december, 2015 kl 10.00 Plats: E632, Luleå tekniska universitet
Miranda, Luís Henrique Fernandes Moura. "Context-aware multi-factor authentication." Master's thesis, Faculdade de Ciências e Tecnologia, 2009. http://hdl.handle.net/10362/4111.
Full textAuthentication systems, as available today, are inappropriate for the requirements of ubiquitous, heterogeneous and large scale distributed systems. Some important limitations are: (i) the use of weak or rigid authentication factors as principal’s identity proofs, (ii) non flexibility to combine different authentication modes for dynamic and context-aware interaction criteria, (iii) not being extensible models to integrate new or emergent pervasive authentication factors and (iv) difficulty to manage the coexistence of multi-factor authentication proofs in a unified single sign-on solution. The objective of this dissertation is the design, implementation and experimental evaluation of a platform supporting multi-factor authentication services, as a contribution to overcome the above limitations. The devised platform will provide a uniform and flexible authentication base for multi-factor authentication requirements and context-aware authentication modes for ubiquitous applications and services. The main contribution is focused on the design and implementation of an extensible authentication framework model, integrating classic as well as new pervasive authentication factors that can be composed for different context-aware dynamic requirements. Flexibility criteria are addressed by the establishment of a unified authentication back-end, supporting authentication modes as defined processes and rules expressed in a SAML based declarative markup language. The authentication base supports an extended single sign-on system that can be dynamically tailored for multi-factor authentication policies, considering large scale distributed applications and according with ubiquitous interaction needs.
Romanelli, Matteo. "Un sistema di ticketing per i tecnici del Dipartimento di Informatica." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4488/.
Full textMokitlane, Ofentse Clifford. "Exploratory study : how do Somali shop owners (SSO) succeed in running businesses in Soweto : a South African perspective." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1015653.
Full textTopal, Baran. "Comparison of Methods of Single Sign-On : Post authentication methods in single sign on." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183144.
Full textSingle sign-on (SSO) är en sessionkontrollmekanism som gör det möjligt för en kund att använda en ett enda par av lösenord och namn för att kunna få tillgång till flera olika program. Mekanismen validerar klienten för alla anrop och eliminerar behovet av ytterligare inloggningsdialoger när en användare växlar mellan program inom en session. SSO-mekanismer kan klassificeras enligt olika kriterier, såsom programvara kontra hårdvara eller kunder krav orienterade mot serversidan arrangemang. De fem vanligen använda mekanismerna för Single Sign-On är närvarande: Web Single Sign-On Enterprise Single Sign-On, Kerberos (eller Token autentisering), Open ID och Federation eller Federated Identity. SSO har den stora fördelen att en användare kan få tillgång till många olika system utan att behöva logga in på vart och ett av dem separat. Men SSO inför också en säkerhetsrisk i och med att tillgång till ett enda av systemen också automatiskt innebär tillgång till samtliga. Denna avhandling beskriver SSO-teknik, Security Assertion Markup Language, och fördelarna och riskerna med att använda SSO, samt undersöker autentiseringsmekanismer och deras lämplighet för SSO integration. Tyngdpunkten är en beskrivning av en mekanism som minskar några av nackdelarna med SSO genom att övervaka användarnas beteende med avseende på en mall. Om en användare utför åtgärder som passar det beteende som beskrivs av mallen, då den föreslagna mekanismen kommer att hantera autentiseringen automatiskt. Om, å andra sidan, en användare gör något oförutsett, kommer mekanismen inte att automatiskt utföra autentisering för den här användaren, utan utlöser manuellt autentisering. Om denna manuella autentiseringen lyckas, så kan användare fortsätta att fortsätta att interagera med systemet, annars kommer användarsessionen att avslutas. Denna beteendebaserade utvidgning av autentiseringsmekanismen är en lovande metod som minskar behovet av att komma ihåg många namn och lösenord, utan att lämna delsystem öppna till de säkerhetsproblem som uppstår i ren SSO, och utan att vara beroende av biometriska egenskaper som kan förändras över tiden. Denna metod kan integreras med befintliga webbaserade lösningar utan ökad risk och ökade kostnader.
Hellberg, Axel. "Autentisering, hantering och provisionering av användare : Ett koncepttest med PhenixID." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42158.
Full textMålet med detta arbete har varit att konfigurera och presentera en lösning som omfattar en kunds behov av system för autentisering, hantering och provisionering av användare. Lösningen tillämpar produkter från PhenixID och konfigurationsarbetet sker på uppdrag av en verksamhet som här agerar konsult åt kunden. Arbetet ämnar samtidigt att ge upphov till ny kunskap inom verksamheten om de tillämpade verktygens möjligheter och funktioner. Den resulterande lösningen möjliggör provisionering av användare från en enkel CSV-fil till ett central användarkatalog, via denna katalog till Google. Till detta används programvaran Identity Provisioning. Lösningen omfattar en rekommendation för samma process till Azure genom ett första-partslösning från Microsoft. Lösningen omfattar konfiguration av autentiseringssystemet PhenixID Authentication Services som kan användas av de provisionerade användarna till att logga in på tjänster från Google och Microsoft, så kallad single sign-on, SSO. Denna autentisering är SAML-baserad och tillämpar multifaktorsautentisering genom en mobilapplikation. Ett webbaserat system för rollbaserad användarhantering, Identity Manager, konfigureras till att hantera användare i den centrala användarkatalogen. Genom detta system tillämpas roller med associerade rättigheter vars syfte är att delegera användarhanteringen till de nödvändiga instanserna av en verksamhet. Den sammantagna konfigurationen utgör ett koncepttest av produkterna för kundens användningsområden och är därför relativt grundläggande till naturen.
Jenčík, Štěpán. "Autentizace v informačních systémech." Master's thesis, Česká zemědělská univerzita v Praze, 2017. http://www.nusl.cz/ntk/nusl-260529.
Full textPellegrino, Giancarlo. "Détection d'anomalies logiques dans les logiciels d'entreprise multi-partis à travers des tests de sécurité." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0064/document.
Full textMulti-party business applications are distributed computer programs implementing collaborative business functions. These applications are one of the main target of attackers who exploit vulnerabilities in order to perform malicious activities. The most prevalent classes of vulnerabilities are the consequence of insufficient validation of the user-provided input. However, the less-known class of logic vulnerabilities recently attracted the attention of researcher. According to the availability of software documentation, two testing techniques can be used: design verification via model checking, and black-box security testing. However, the former offers no support to test real implementations and the latter lacks the sophistication to detect logic flaws. In this thesis, we present two novel security testing techniques to detect logic flaws in multi-party business applicatons that tackle the shortcomings of the existing techniques. First, we present the verification via model checking of two security protocols. We then address the challenge of extending the results of the model checker to automatically test protocol implementations. Second, we present a novel black-box security testing technique that combines model inference, extraction of workflow and data flow patterns, and an attack pattern-based test case generation algorithm. Finally, we discuss the application of the technique developed in this thesis in an industrial setting. We used these techniques to discover previously-unknown design errors in SAML SSO and OpenID protocols, and ten logic vulnerabilities in eCommerce applications allowing an attacker to pay less or shop for free
Kirchner, Peter. "Verteilte Autorisierung innerhalb von Single Sign-On-Umgebungen : Analyse, Architektur und Implementation eines Frameworks für verteilte Autorisierung in einer ADFS-Umgebung." Master's thesis, Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2008/2228/.
Full textCurrent software systems allow distributed authentication of users using directory services, which are located both in the intranet and in the extranet, to establish cooperation with part-ners over domain boundaries. The next step is to outsource the authorization out of the local applications and to delegate the authorization decisions to external parties. In particular the authorization request is back delegated to the authentication partner. Based on an analysis of the state of the art this paper presents a framework which allows the distributed authorisation of ADFS authenticated users. The authorization decisions are based on the user’s identity and groups. In this work there will be developed a prototypical imple-mentation of services which are capable of delegating authorization requests. Additionally, this work points out the integration of these services into the .NET framework to demonstrate the usability in a modern development environment. Finally there will be a prospect of further questions and work.
Musolesi, Nicolò. "Sviluppo di un software per la valutazione della porzione di sfera celeste osservabile da un satellite LEO con payload astronomico." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textCakir, Ece. "Single Sign-On : Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-24377.
Full textMezzetti, Cristian. "Progettazione e implementazione di un servizio di autenticazione a più fattori per i servizi dell'ateneo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9593/.
Full textP, Svensson Gustav, and Filip Eriksson. "En säkerhetsanalys och jämförelse av SAML och OAuth." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166571.
Full textHedmark, Alice. "Undersökning av webbsidors säkerhet vid användning avFacebook Login : Vidareutveckling och analys av OAuthGuard." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36859.
Full textSingle Sign-On (SSO) is an authentication process that allows a developer to delegate the authentication responsibility to a dedicated service. OAuth 2.0 is an authorization framework that often serves as a base for authentication layers to be built upon that in turn allows for SSO. An identity provider is the service that is responsible for handling user credentials and the authentication, two common identity providers are Google and Facebook that implement SSO with the authentication layers OpenID Connect respectively Facebooks own authentication layer. It has been shown that many clients using OAuth 2.0 as base for SSO make faulty implementations leading to security issues, a number of studies has proposed solutions to these issues but faulty implementations are continually being made. To create various tools to promote security in these contexts is a method where OAuthGuard has been developed with the vision to also directly protect the common website user directly from the browser. OAuthGuard has been used in an earlier study to analyze the security of clients using Google SSO and discovered that 50% of the analyzed clients had flaws, no comparable study has been done for clients using Facebook SSO, which is the second largest third party log in variant. This study made a comparable investigation for Facebook SSO clients with a further developed version of OAuthGuard and found that these clients suffer from flaws with a similar trend as the previous study with Google-SSO clients, although fewer Facebook-SSO clients suffer from these flaws. When further developing OAuthGuard a dumber of difficulties was discovered and the future of these kind of tools needs to be investigated. Further analysis needs to be done to assess if Facebook-SSO should be recommended over Google-SSO from a security perspective and also further exploration of new methods to promote security needs to be done.
Лісачук, Георгій Вікторович, Руслан Вікторович Кривобок, Ярослав Миколайович Пітак, П. П. Вабіщевич, and О. П. Карпович. "Геометро-топологічна характеристика фаз системи SrO – TiO₂ – SiO₂." Thesis, Діса Плюс, 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40375.
Full textПітак, Ярослав Миколайович, Георгій Вікторович Лісачук, Руслан Вікторович Кривобок, А. П. Гребенюк, and Л. С. Лимаренко. "Термодинамічний аналіз реакцій у системі SrO – TiO₂ – SiO₂." Thesis, Діса Плюс, 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40376.
Full textПитак, Ярослав Николаевич, Георгий Викторович Лисачук, А. П. Гребенюк, and П. С. Кораблева. "Термодинамический анализ реакций в системе SrO – TiO₂ – SiO₂." Thesis, Національний технічний університет України "Київський політехнічний інститут" ім. Ігоря Сікорського, 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40378.
Full textNop, Dominik. "Vylepšení architektury systému správy identit ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399861.
Full textRasiwasia, Akshay. "A Framework To Implement OpenID Connect Protocol For Federated Identity Management In Enterprises." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64848.
Full textPellegrino, Giancarlo. "Détection d'anomalies logiques dans les logiciels d'entreprise multi-partis à travers des tests de sécurité." Electronic Thesis or Diss., Paris, ENST, 2013. http://www.theses.fr/2013ENST0064.
Full textMulti-party business applications are distributed computer programs implementing collaborative business functions. These applications are one of the main target of attackers who exploit vulnerabilities in order to perform malicious activities. The most prevalent classes of vulnerabilities are the consequence of insufficient validation of the user-provided input. However, the less-known class of logic vulnerabilities recently attracted the attention of researcher. According to the availability of software documentation, two testing techniques can be used: design verification via model checking, and black-box security testing. However, the former offers no support to test real implementations and the latter lacks the sophistication to detect logic flaws. In this thesis, we present two novel security testing techniques to detect logic flaws in multi-party business applicatons that tackle the shortcomings of the existing techniques. First, we present the verification via model checking of two security protocols. We then address the challenge of extending the results of the model checker to automatically test protocol implementations. Second, we present a novel black-box security testing technique that combines model inference, extraction of workflow and data flow patterns, and an attack pattern-based test case generation algorithm. Finally, we discuss the application of the technique developed in this thesis in an industrial setting. We used these techniques to discover previously-unknown design errors in SAML SSO and OpenID protocols, and ten logic vulnerabilities in eCommerce applications allowing an attacker to pay less or shop for free
Захаров, Артем Вячеславович. "Радіопрозорі керамічні матеріали на основі системи SrO – Al₂O₃ – SiO₂." Thesis, НТУ "ХПІ", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/36526.
Full textThesis for the degree of Candidate of Technical Sciences (pre-Ph.D. in Philosophy), specialty 05.17.11 – technology of refractory non-metallic materials. – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2018 The thesis is devoted to the development of radio-transparent ceramic materials on the basis of the crystalline phase – slavsonite the synthesis of which is carried out at a reduced temperature. A database was created for the thermodynamic analysis of phase formation reactions in the SrO – Al₂O₃ – SiO₂ system. The process of solid-phase synthesis of slavsonite was thoroughly investigated and possible ways of the reaction of formation of slavsonite from different intermediate compounds were found. It has been established that due to the formation of intermediate silicon strontium from 400 and 500 °C (Sr₂SiO₄ and SrSiO₃ respectively), the synthesis of slavsonite begins at 1200 °C. In the case of the formation of strontium aluminates Sr₃Al₂O₆ and SrAl₂O₄ (in the case of SiO₂ deficiency), the synthesis of slavsonite occurs after crystallization and subsequent decomposition of Sr-gelite at a temperature of ~ 1600 °C. Within primary slavsonite crystallization in SrO – Al₂O₃ – SiO₂ systems non-stechiometric composition (SrAl₂,₀₃₄Si₃,₁₀₈O₁₀,₂₆₇), that ensures the synthesis of the slavsonite at temperatures up to 1250 °С, were found. The influence of single-component (SnO₂, Cr₂O₃, Li₂O, ZrSiO₄, TiO₂, B₂O₃, MoO₃, CaF₂) and multicomponent eutectic (LiF : NaF, LiF : KF, KF : NaF, LiF : KF : NaF, Li₂O : SnO₂) additives on the intensification of sintering and phase formation processes of slavonite ceramics was studied. The patternes of the formation of microstructure and phase composition of low temperature radio-transparent ceramics in the presence of additives of complex intensifiers which enables the formation of eutectic alloys, and the reduction of the temperature of the formation of the slavonite phase are established. The influence of the Li₂O additive (2% by weight over 100% by weight) on the formation of the non - stoichiometric composition of slavsonite, and Li₂O : SnO₂ eutectic additive (in the amount of 1 mass % over 100 mass %) for the synthesis of the stoichiometric composition of the slavsonite in the temperature interval of 1250 – 1350 °C were proved. On the basis of new data, the formulae and the technological parameters for the production of radio-transparent ceramic materials with certain electrophysical properties (ε = 3.57...5.26, tgδ = 0.0073...0.0122 in the microwave range 26 – 37.5 GHz) and increased resource exploitation which determines their functional reliability were developed. Industrial and laboratory-industrial tests were conducted at the enterprises and practical recommendations for the use of the results were developed. The research results are introduced into the educational process of the department of technology of ceramics, refractories, glass and enamels of NTU "KhPI".
Захаров, Артем Вячеславович. "Радіопрозорі керамічні матеріали на основі системи SrO – Al₂O₃ – SiO₂." Thesis, НТУ "ХПІ", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/36525.
Full textThesis for the degree of Candidate of Technical Sciences (pre-Ph.D. in Philosophy), specialty 05.17.11 – technology of refractory non-metallic materials. – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2018 The thesis is devoted to the development of radio-transparent ceramic materials on the basis of the crystalline phase – slavsonite the synthesis of which is carried out at a reduced temperature. A database was created for the thermodynamic analysis of phase formation reactions in the SrO – Al₂O₃ – SiO₂ system. The process of solid-phase synthesis of slavsonite was thoroughly investigated and possible ways of the reaction of formation of slavsonite from different intermediate compounds were found. It has been established that due to the formation of intermediate silicon strontium from 400 and 500 °C (Sr₂SiO₄ and SrSiO₃ respectively), the synthesis of slavsonite begins at 1200 °C. In the case of the formation of strontium aluminates Sr₃Al₂O₆ and SrAl₂O₄ (in the case of SiO₂ deficiency), the synthesis of slavsonite occurs after crystallization and subsequent decomposition of Sr-gelite at a temperature of ~ 1600 °C. Within primary slavsonite crystallization in SrO – Al₂O₃ – SiO₂ systems non-stechiometric composition (SrAl₂,₀₃₄Si₃,₁₀₈O₁₀,₂₆₇), that ensures the synthesis of the slavsonite at temperatures up to 1250 °С, were found. The influence of single-component (SnO₂, Cr₂O₃, Li₂O, ZrSiO₄, TiO₂, B₂O₃, MoO₃, CaF₂) and multicomponent eutectic (LiF : NaF, LiF : KF, KF : NaF, LiF : KF : NaF, Li₂O : SnO₂) additives on the intensification of sintering and phase formation processes of slavonite ceramics was studied. The patternes of the formation of microstructure and phase composition of low temperature radio-transparent ceramics in the presence of additives of complex intensifiers which enables the formation of eutectic alloys, and the reduction of the temperature of the formation of the slavonite phase are established. The influence of the Li₂O additive (2% by weight over 100% by weight) on the formation of the non - stoichiometric composition of slavsonite, and Li₂O : SnO₂ eutectic additive (in the amount of 1 mass % over 100 mass %) for the synthesis of the stoichiometric composition of the slavsonite in the temperature interval of 1250 – 1350 °C were proved. On the basis of new data, the formulae and the technological parameters for the production of radio-transparent ceramic materials with certain electrophysical properties (ε = 3.57...5.26, tgδ = 0.0073...0.0122 in the microwave range 26 – 37.5 GHz) and increased resource exploitation which determines their functional reliability were developed. Industrial and laboratory-industrial tests were conducted at the enterprises and practical recommendations for the use of the results were developed. The research results are introduced into the educational process of the department of technology of ceramics, refractories, glass and enamels of NTU "KhPI".
Andersson, Johan. "Rekommendationer för införande av public key infrastructure." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1177.
Full textThe use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure. In this thesis we shall se what PKI really is in a more detailed way and which entities it constitutes of. We will also investigate some of the areas in which we could make use of it, for instance secure e-mail and virtual private networks. Next, we will look into some of the drawbacks with PKI and what you should think of in order to aviod these. Finally, we'll give recommendations for the implementation itself. As for the theory of cryptography, the basics is presented to the interested reader in a separate appendix.
Rocha, Nicole Andrade da. "Observação social sistemática: estudo de caso em duas regiões urbanas de Juiz de Fora - MG." Universidade Federal de Juiz de Fora, 2015. https://repositorio.ufjf.br/jspui/handle/ufjf/107.
Full textApproved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2015-12-07T21:39:14Z (GMT) No. of bitstreams: 1 nicoleandradedarocha.pdf: 5589274 bytes, checksum: e35a9c2511e226e70b29092b3dd7f8b9 (MD5)
Made available in DSpace on 2015-12-07T21:39:14Z (GMT). No. of bitstreams: 1 nicoleandradedarocha.pdf: 5589274 bytes, checksum: e35a9c2511e226e70b29092b3dd7f8b9 (MD5) Previous issue date: 2015-02-25
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Este trabalho tem por objetivo principal testar a ferramenta OSS (Observação Social Sistemática) e suas possíveis contribuições para a arquitetura e urbanismo, de forma a aprofundar nos estudos análiticos da realidade urbana e arquitetônica brasileira, visando uma leitura adequada do espaço urbano, tanto físico, quanto formal, que permita compreender o espaço enquanto lugar e as relações que são desenvolvidas nesse contexto. Para tanto, o estudo foi aplicado em duas Regiões Urbanas (RU) de Juiz de Fora- MG, dividido em quatro etapas de estudos: na etapa quali-quantitativa (1), foi realizada uma busca sistemática no Periódicos Capes através de palavras-chave relacionados com o estudo em questão, buscando desta forma, conhecer o estado da arte, métodos mais utilizados e o contexto de aplicação das ferramentas analisadas, que possibilitassem as realizações das análises qualitativa do espaço urbano; na etapa prática (2), aplicou-se a ferramenta nas áreas selecionadas e após a compilações dos dados, expôs-se os resultados encontrados; na etapa de discussão dos resultado (3), buscou-se identificar a aplicabilidade e as limitações do uso da ferramenta; e na etapa final, realizou-se as conclusões e considerações finais (4). Entre os resultados encontrados, conclui-se que a flexibilidade destaca-se entre as vantagens da OSS, já que é possível adaptá-la há vários objetos de estudos e as várias áreas do conhecimento, uma vez que utiliza o levantamento quantitativo dos elementos da paisagem permitindo concomitantemente analises qualitativa da mesma, oportunizando o direcionamento da pesquisa de acordo com enfoco da área estudada. Entretanto, a ferramenta possibilita a análise apenas da camada mais próxima da paisagem, sem explorá-la mais profundamente e em detalhes já que atua na escala do pedestre. Além disso, a OSS se mostra interessante ao propor um processo rápido e barato da captação das camadas da paisagem mais próxima do observador. Desta forma, quando buscamos respostas, na arquitetura e urbanismo, para as questões que envolvem métricas do espaço urbano a partir de estudos sistemáticos, qualitativos e quantitativos, percebemos que existem poucos estudos desenvolvidos nesse sentido. Talvez, uma alternativa a essa questão seja o de buscar, em outras áreas do conhecimento (que é multidisciplinar), a contribuição e apoio pautados nos princípios heurísticos permitindo novos rumos para a pesquisa.
This work has as main objective to test the OSS tool (Social Systematic Observation) and their contributions to the study of architecture and urbanism, in order to deepen the analytical studies of urban reality and Brazilian architectural, seeking a proper reading of urban space, both physical, as formal, in order to understand the space as a place and the relationships that are developed in this context. Therefore, the study was applied in two Urban Regions (RU) in Juiz de Fora - MG, the study was divided into four stages: Qualitative and quantitative stage (1), was a systematic search in Portal Periodicos Capes through keywords related to the study in question, looking this way, knowing the state of the art, methods more used and the application context of the analyzed tools that would enable the achievements of qualitative analysis of urban space; Practice stage (2) in which the tool was applied in selected areas and after compilation of data and was explained the results; Discussion of the result (3), we sought to identify the applicability and limitations of the tool; and in the last stage the final conclusions (4). Among the results, we can conclude that flexibility stands out like advantages of OSS, because it is possible to adapt it for several objects of study and the various areas of knowledge, since it uses the quantitative survey of landscape elements concurrently allowing qualitative analysis thereof. However the tool allows the analysis only in the layer closest to the landscape without exploring it more deeply and in detail. This tool shows interesting on to propose a quick and inexpensive process of capturing the landscape layers in the pedestrian scale, even if it is the closest to the observer. Thus, when we seek answers, in architecture and urbanism, to the issues surrounding metrics of urban space from systematic, qualitative and quantitative studies, we realize that there are few studies in this direction. Perhaps an alternative to this question is to seek, in other areas of knowledge that is multidisciplinary, the contribution of knowledge, support and insights for new directions of research.
Al-Fawaz, Khaled. "Investigating enterprise resource planning adoption and implementation in service sector organisations." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/10078.
Full textOliveira, Phelipe Sena. "Desenvolvimento de uma nova t?cnica para otimiza??o de circuitos planares inspirada no comportamento social das aranhas." PROGRAMA DE P?S-GRADUA??O EM ENGENHARIA EL?TRICA E DE COMPUTA??O, 2017. https://repositorio.ufrn.br/jspui/handle/123456789/24644.
Full textApproved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2018-01-24T15:05:44Z (GMT) No. of bitstreams: 1 PhelipeSenaOliveira_TESE.pdf: 2369727 bytes, checksum: 2bb1dad07260b4efd645c7028636e62f (MD5)
Made available in DSpace on 2018-01-24T15:05:44Z (GMT). No. of bitstreams: 1 PhelipeSenaOliveira_TESE.pdf: 2369727 bytes, checksum: 2bb1dad07260b4efd645c7028636e62f (MD5) Previous issue date: 2017-02-06
Conselho Nacional de Desenvolvimento Cient?fico e Tecnol?gico (CNPq)
As novas configura??es de dispositivos e circuitos de micro-ondas resulta em aumento de complexidade nos processos de desenvolvimento, particularmente nos casos de s?ntese. Antenas e superf?cies seletivas de frequ?ncia (Frequency Selective Surface - FSS) s?o estruturas muito importantes nos sistemas de comunica??es, que podem ser otimizadas pela atua??o dos algoritmos bioinspirados. Geralmente, para que os algoritmos bioinspirados auxiliem na otimiza??o dessas estruturas ? necess?ria a implementa??o de t?cnicas de an?lise num?rica como o M?todo dos Momentos ou Elementos Finitos. Diante da dificuldade de modelagem das t?cnicas descritas, ? comum a utiliza??o de uma fun??o de estima??o, como as Redes Neurais Artificiais, para substituir a an?lise num?rica. Embora encontre solu??es desejadas, as estima??es s?o realizadas ap?s um processo de treinamento efetuado atrav?s de uma base de dados. Cada estrutura de antena ou FSS exige uma base de dados espec?fica. Este trabalho prop?e uma t?cnica de otimiza??o baseado na utiliza??o de um algoritmo bioinspirado e um framework que realiza a integra??o do algoritmo ao software comercial ANSYS HFSS. O prop?sito ? realizar as simula??es das poss?veis solu??es durante a execu??o do algoritmo bioinspirado, e com isso, evitar o uso de uma base de dados, e assim, tornar a t?cnica eficiente e flex?vel com rela??o ?s altera??es nas estruturas de antenas ou FSS. Outro objetivo original deste trabalho ? a utiliza??o do algoritmo Social Spider Optimization ? SSO para a solu??o de problemas na ?rea de eletromagnetismo aplicado. Para comprovar a efic?cia da t?cnica proposta alguns projetos de antena e FSS s?o otimizados atrav?s de varia??es em seus par?metros estruturais. Os resultados obtidos na otimiza??o dos projetos dos circuitos s?o comparados com outras t?cnicas, tendo sido observado uma boa concord?ncia.
The new settings for devices and microwaves circuits result in an increase of complexity in the processes of development, specially in regards to the process of synthesis. Antennas and Frequency Selective Surfaces (FSS) are primordial in communication systems. Alternatively, these structures may be optimized through the usage of bio-inspired algorithms. Generally, in order for the bio-inspired algorithms to assist in the optimization of FSS structures, it is necessary to implement several numerical analysis techniques, such as the method of moments or finite elements. Because of the difficulty to model such methods, it has been turned common the usage of a point estimation function, such as artificial neural networks, to substitute the numerical analysis. Although these procedures end up encountering desirable solutions, the estimations are done after a training process conducted through a database. Additionally, every FSS antenna demands a specific database. This work proposes an optimization technique that relies on the usage of a bio-inspired algorithm and a framework (that provides the integration between the algorithm and the commercial software ANSS HFSS). The purpose of the work is to do simulations of possible solutions during the execution of the bio-inspired algorithm; therefore, avoiding the usage of the database; and so, make the technique flexible and efficient in relation to altering the antennas? structures or FSS. Furthermore, another objective of this work is the usage of the algorithm, namely Social Spider Optimization - SSO in the search for solutions in the field of applied electromagnetism. In order to prove the efficiency of the proposed techniques, some FSS? and antennas? projects are optimized through the variation of their structural parameters. In conclusion, the results that were obtained through the procedures previously shown, are compared to other techniques, resulting in a satisfying agreement rate.
Trofymchuk, Dmytro. "Marketing na internetu." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-113216.
Full textFerek, Matúš. "Bezpečená komunikace mezi data loggerem a databazovým serverem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219262.
Full textEvers, Patrick D. M. D. "Prenatal Heart Block Screening in Mothers With SSA/SSB Auto-antibodies: Targeted Screening Protocol is a Cost-Effective Strategy." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1552379621451565.
Full textCoronel, Castro Marianella, Gutiérrez Claudia Alexandra Echevarría, Montero Manuel Daniel López, Arévalo Alejandro Alonso Rodríguez, and Cotrina Alexander Sifuentes. "PSI-SOS." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/655499.
Full textThe aim of this business plan is the development of the company PSI-SOS, which provides an online care service to people with mental health problems through its web platform, for which it has a directory of psychologists, at who is contacted and contracted to provide a specialized service to our registered users. The company is focused on attending to cases referring to mental health problems that are occurring in the population, especially now, at a crucial stage for humanity, such as the Covid-19 pandemic, which marks a precedent in the behavior of human beings. At PSI-SOS we affirm that online therapy is the most accessible way for a session with the psychologist, which is why we have structured an interactive platform to easily inform our potential users, as well as serve our clients. That is why our services are distributed in session packages for the various types of needs and treatment that people can choose, it is also focused on promoting and monitoring our clients to achieve their loyalty to our services, which can also be one of the factors that contribute to an increase in our sales. Finally, after an exhaustive financial analysis, we have recognized an opportunity cost of capital (COK) of 9.99% and a weighted average cost (WACC) of 10.96%, key figures that validate our business plan confirming the economic viability of the company.
Trabajo de investigación
Ярошенко, Я. В. "SSD-накопичувачі." Thesis, Cумський державний університет, 2016. http://essuir.sumdu.edu.ua/handle/123456789/49061.
Full textRubensson, Monica, and Maria Degaardt. "Leg SSk." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26185.
Full textThe purpose of this study was to evaluate the post-operative progress for one-day surgical inguinal hernia patients. Data was collected using structured telephone interviews three days after surgery. A questionnaire with standardized questions and multiple-choice response options was used.The results from the 52 interviews showed that most patients did not exceed Numerical Rating Scale (NRS) 3 day one when at rest or moving around. On day three most patients had more pain while moving than day 1. Most patients complied with the doctor’s prescription of painkillers. Generally the follow-up study showed the patients had few complications and felt high satisfaction post surgery.
Hoxha, Ariela. "New insight into the pathogenesis and treatment of autoimmune congenital heart block." Doctoral thesis, Università degli studi di Padova, 2013. http://hdl.handle.net/11577/3422991.
Full textPremesse. Il blocco atrioventricolare congenito (CHB) è la manifestazione più frequente del lupus neonatale. Esso è causato dal passaggio transplacentare degli anticorpi anti-Ro/SSA e/o anti-La/SSB con successiva infiammazione e fibrosi del nodo atrioventricolare. Nonostante la dimostrazione di un ruolo diretto degli anticorpi materni nell'indurre CHB sia in vitro che in vivo, i meccanismi coinvolti rimangono poco chiari. Inoltre finora nessuna terapia è risultata efficace nel trattamento del CHB sia di secondo che terzo grado, anche perché la rarità della malattia non consente studi clinici controllati. Obiettivi. Studiare il ruolo degli anticorpi anti-Ro52 nella patogenesi del CHB attraverso la definizione della specificità epitopica degli anticorpi anti-p200. Sviluppare un modello animale per studiare l'effetto sul sistema di conduzione cardiaco degli anticorpi IgG purificati da una paziente con CHB fetale. Infine valutare l'efficacia clinica e la sicurezza di un protocollo di terapia combinato comprendente l’impiego di plasmaferesi, immunoglobuline per via endovenosa (IVIG) e betametasone, nonchè l'effetto di questo trattamento su i livelli degli anticorpi anti-Ro52, anti-p200 e anti-La. Materiali e Metodi. Metodi di laboratorio: ELISA, spettroscopia con dicroismo circolare e purificazione di IgG umane. Procedura sperimentale: trasferimento per via intra-peritoneale degli anticorpi mediante l’iniezione di IgG purificate da una madre con CHB. Metodi strumentali: ecocardiografia fetale ed elettrocardiografia dopo la nascita. Strategia di trattamento: Sei donne diagnosticate con CHB sono state trattate durante la gravidanza con un protocollo di terapia di associazione composta da plasmaferesi settimanale, IVIG 1g/kg a cadenza quindicinale e Betametasone giornaliero (4 mg). Inoltre, IVIG (1 g/kg) sono state somministrate ai neonati ogni quindici giorni subito dopo la nascita fino alla negativizzazione degli anticorpi materni passivi. Analisi statistica: Wilcoxon, Mann-Whitney U, ANOVA e Spearman tests. Il valore di p<0,05 è stato considerato significativo. Risultati e Conclusioni. Parte I: La specificità epitopica dell’anticorpo anti-p200 è stata localizzata nella posizione 233. Tale epitopo potrebbe essere utile per identificare la specificità anticorpale strettamente associata allo sviluppo del CHB e costituire quindi uno strumento per individuare le gravidanze ad alto rischio per CHB. Inoltre potrebbe contribuire a chiarire il ruolo di questo anticorpo nella patogenesi del CHB. Parte II: Abbiamo sviluppato un modello animale del CHB con una semplice tecnica di trasferimento passivo di IgG umane purificate da un paziente con CHB fetale. Gli alti livelli (4 mg) degli anticorpi anti-Ro/SSA ed anti-La/SSB hanno indotto bradicardia, prolungamento dell’intervallo PR e una depressione delle funzione cardiaca nel animale. Invece, i bassi livelli (2 mg) hanno determinato solo una diminuzione della funzione cardiaca. In questo modo è stato dimostrato la patogenicità degli anticorpi anti-Ro/SSA ed anti-La/SSB sul sistema di conduzione cardiaco. Parte III: I risultati ottenuti da queste serie di casi sono i seguenti: a) l’efficacia nel trattamento del CHB di 2° grado, e b) la sicurezza della plasmaferesi e delle IVIG. Tuttavia il basso numero di casi trattati, e il follow-up relativamente breve (media 22,7 mesi ± 10,4 DS, range 12-42 mesi), come anche l'alto costo della procedura possono essere considerati limiti. Parte IV: La plasmaferesi riduce i livelli degli anticorpi anti-Ro52, anti-p200 e anti-La. Tuttavia, un decremento significativo anticorpale non è stato dimostrato nelle pazienti con livelli molto alti di anticorpi anti-Ro52
Veikutis, Donatas. "SEO taikymo analizė." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120702_123614-02385.
Full textExpansion of the Internet and the information contained therein formed such an organization which aims to help the internet users to quickly and efficiently find what he needs. One of them is the Google search engine. It is one of the largest search engine companies in the world. In this paper we will analyse the Google search engine, and its proposed content optimization methods, which it claims to helps achieve better search results positions. The paper will discuss techniques such as HTML meta tags, content headers, site maps, robots.txt file, canonical and Paging functions. These methods will be compared with each other, and we will decide which method is most useful for site optimization.
Collett, Torstein Calvin. "Simple SSH Management." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9130.
Full textKoutný, Jiří. "Data driven SEO." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-150119.
Full textSörensen, Arnd [Verfasser], Kai [Akademischer Betreuer] [Gutachter] Zuber, and Soo-Bong [Gutachter] Kim. "Temperature quenching in LAB based liquid scintillator and muon-induced backgrounds in the SNO+ experiment / Arnd Sörensen ; Gutachter: Kai Zuber, Soo-Bong Kim ; Betreuer: Kai Zuber." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://d-nb.info/1119363136/34.
Full textSörensen, Arnd [Verfasser], Kai [Akademischer Betreuer] Zuber, and Soo-Bong [Gutachter] Kim. "Temperature quenching in LAB based liquid scintillator and muon-induced backgrounds in the SNO+ experiment / Arnd Sörensen ; Gutachter: Kai Zuber, Soo-Bong Kim ; Betreuer: Kai Zuber." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-212092.
Full textPérié, Sophie. "Les muscles du larynx et du pharynx : aspects normaux et pathologiques : modèle d'étude in vitro de la dystrophie musculaire oculopharyngée à partir de cultures de cellules satellites." Paris 7, 2002. http://www.theses.fr/2002PA077146.
Full textSinner-Hettenbach, Martin. "SnO 2 (110) and Nano-SnO 2 characterization by surface analytical techniques /." [S.l. : s.n.], 2000. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8884756.
Full text