Thèses sur le sujet « Compliance analysi »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Compliance analysi.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Compliance analysi ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Engiel, Priscila. « Eunomia (Εὐνομία) : A Requirement Engineering based Compliance Framework for Software Systems ». Doctoral thesis, Università degli studi di Trento, 2018. http://hdl.handle.net/11572/283380.

Texte intégral
Résumé :
Laws and regulation affect software development, as they frequently demand changes in software’ requirements to protect individuals and businesses regarding security, privacy, governance, sustainability and more. Legal requirements can dictate new requirements or constrain existing ones. The problem of software compliance is howto ensure that the software complies with the norms that the legislation imposes. The problem is particularly challenging because it combines difficultsteps: 1)analyze legal documents, 2) extract requirements from those documents, 3) identify conflicting requirements with those already implemented in software and 4) ensure that software remains compliant even with the changes. Compliance is a continuous process: laws, software and the context within which software system operates changes continuously. The works dealing with the compliance problem focus only on one or two subjects: analyze legal documents or extract requirements or identify conflicts or changes. This thesis deals with all the problems at the same time; the idea is to extract requirements from legal text, compare them with the software requirement, resolve the possible conflicts that may arise, continuously leading with the changes on environment, laws and requirements. For this, this work proposes a framework that is composed of a compliance process and continuous monitoring of environmental changes. The framework deals with different types of laws (security, privacy, transparency, health care) that are represented in explicit norms. The compliance process supports the identification, extraction, comparison and conflict resolution to help software compliance, by producing a compliant set of requirements. The compliance process is based on the semantic annotation and goal model. The semantic annotation helps to extract requirements from thelaw, using patterns. The goal model is used to help the comparison between requirement and to represent requirements in a formal and consistent requirement specification. The process is tool supported; some tools were reused (Desiree and NomosT) to further each step. It was necessary to adapt the tools for the context of the compliance process, creating a guideline, patterns, and heuristics. The continuous monitoring is concerned about the changes that affect the software compliance and has 7 the mechanism to ensure that even with those changes the software will regain compliance. The compliance monitor is basedon agents and Non Functional Requirements. The agents are represented using in i*, the idea is to showthe collaboration between the agents to ensure the continuous compliance. The requirement specification of how each agent should behave was also generated using Business Process Modeling Notation and Desiree language. The Non Functional Requirements catalogue is used to help to define operalizations for the software awareness. The framework validation was made in two parts: first, the compliance process and after all the framework proposed. For the compliance process, the effort and correctness were measured comparing the use of the proposed process andan ad-hoc method. For the entire framework, the example of monitoring the changes in the environment when an automated car is crossing the border between Washington and Canada was used. The study shows that context has a strong influence on the software requirements, and nonconformity problems may incur penalties. The contribution of this work is the Eunomia framework that has a process and goal model perspective with emphasis on monitoring that helps to deal with the compliance challenge. The framework equips the requirements engineering team with a systematic method. Eunomia framework is a tool-supported and systematic process which can be reused to reduce the time effort and to improve the quality of the requirement specification that helps to create a compliant software requirement specification that is compliant over the time.
Styles APA, Harvard, Vancouver, ISO, etc.
2

CORDA, TIZIANA. « THE POLITICS OF SANCTIONS COMPLIANCE. EXPLAINING SANCTIONS EFFECTIVENESS THROUGH THE LENS OF DOMESTIC VETO PLAYERS. EMPIRICAL EVIDENCE FROM THE CASES OF ERITREA, IRAN, AND SUDAN ». Doctoral thesis, Università degli Studi di Milano, 2022. http://hdl.handle.net/2434/918917.

Texte intégral
Résumé :
Sanctions scholarship overwhelmingly expects that authoritarian states defy and resist the demands attached to sanctions imposed on them. In practice, however, authoritarian states do sometimes accommodate to sanctions-related demands and offer political concessions consistent with them. What explains their choice of compliance or defiance? When do they decide to offer political concessions aligned with sanctions-related demands, and why are those concessions sometimes short-lived and not robust, and why can they be more or less expedited? This research project argues the answer lies in the domestic configuration of institutional and political constraints, also called veto players, of the states under sanctions. As a contribution to the domestic-politics branch of the literature on international sanctions, which has become increasingly more relevant in light of the evolution of sanctions from comprehensive to targeted, this research project aims to investigate the under-researched application of a typically public-policy approach such as the veto player analysis to the literature on international sanctions and understand if and how domestic constraints such as veto players, who cut across regime type classifications that are frequently –but often inconclusively– used in the literature on sanctions, affect the effectiveness of sanctions in achieving the desired political concessions. Differently from previous studies, this project intends to examine this interaction along three different dimensions of the targeted state’s aggregate policy response to sanctions, that are the direction, robustness, and expedition of the policy change which together describe the overall effectiveness of sanctions. To test how three different elements of the configuration of the targeted state’s veto players such as the concentration of the agenda power, the congruence of policy preferences, and the internal cohesion, can affect those three outcome dimensions, the project adopts different methodological strategies. After performing some statistical analyses which expose some issues which remain largely unaddressed by the extant literature and probe alternative hypotheses, the project builds on those findings to develop a new theoretical framework and related spatial model which is applied to few selected comparative case studies to trace how veto power operates inside a state targeted by sanctions and test the hypotheses identified, one per dimension of the policy response to sanctions. This empirical part aims to verify the empirical support for the hypotheses and illustrate how the explanatory power of the veto player lens outperforms explanations that focus instead only on regime type classifications in decoding the politics of sanctions compliance.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Sirois, Jean-Karl. « Statistical Analysis of Treatment Compliance for Clinical Trials using Electronic Compliance Monitoring ». Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32235.

Texte intégral
Résumé :
Compliance, the extent to which patients follow a medication regimen, has been recognized as one of the most serious problems facing medical practice today. Recent developments in assessing compliance include electronic compliance monitors (ECM), devices that record the date and time of the release of medication from its original container. This allows utilizing ECM compliance data in statistical analyses related to clinical trials. This thesis proposes ways of dealing with the time-varying nature of compliance. We examine the compliance behaviour from real ECM data through statistical analysis of compliance rate, followed by a time-to-event analysis with respect to first noncompliance event. Then, using discrete event simulation and proportional hazards models we compare analyses using a fixed treatment covariate and time-varying compliance covariate based on pharmacokinetic principles in estimating treatment effect. We observe a reduction of up to 40% in EMSE in favour of the latter model for treatment effect estimation.
Styles APA, Harvard, Vancouver, ISO, etc.
4

McAllister, Patricia Leigh. « An eigenscrew analysis of mechanism compliance ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ36056.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Lehne, Jens. « Constitutional compliance : a game-theoretic analysis / ». Berne : Staempfli [u.a.], 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/522420281.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Liu, Feng. « Face Gear Design and Compliance Analysis ». The Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=osu1392373365.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Crane, Nathan B. « Compliant Centrifugal Clutches : Design, Analysis, and Testing ». BYU ScholarsArchive, 2003. https://scholarsarchive.byu.edu/etd/79.

Texte intégral
Résumé :
Existing classes of centrifugal clutch concepts were reviewed. The pseudo-rigid-body model (PRBM), rigid-body replacement synthesis, force-deflection analysis, compliance potential evaluation, and compliant concept evaluation were used to develop effective new centrifugal clutch concepts. These methods helped develop and model four novel compliant centrifugal clutch designs, model two existing designs, and identify a concept with excellent potential for low-cost centrifugal clutch applications. This concept, the floating opposing arm (FOA) clutch, doubles the torque capacity metric relative to existing compliant designs. Torque and engagement speed models for this clutch were developed and verified against four prototype clutches. Additional novel designs devel-oped through this work have lower torque capacities, but also show good potential because of other unique characteristics. All of the designs were prototyped and tested to measure their torque-speed relationships.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ongwamuhana, Kibuta. « Tax compliance in Tanzania : an analysis of law and policy affecting voluntary taxpayer compliance ». Doctoral thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/12250.

Texte intégral
Résumé :
Includes abstract.
Includes bibliographical references (p. 278-300).
This study examines the problem of low level tax compliance in Tanzania. It proceeds from the premise that high level taxpayer compliance is essential to the success of the tax system. Unless taxpayer compliance is achieved at sufficient levels, the performance of the tax system will be significantly impaired.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Sun, Junfeng. « Stochastic models for compliance analysis and applications ». Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1117049743.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Halinár, Martin. « Compliance analýza v oblasti IT managementu ». Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223989.

Texte intégral
Résumé :
Tato práce se zabývá jednou z významných částí fungování velkých korporací, tedy Compliance, se zvláštní pozorností na IT management. Diplomová práce zevrubně prozkoumává danou oblast. Tento průzkum si klade zároveň za cíl nalezení obtíží, ke kterým dochází v každodenní praxi. Následně je nastíněn způsob možných řešení zjištěných problematických jevů.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Ciblak, Namik. « Analysis of cartesian stiffness and compliance with applications ». Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/17972.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Engiel, Priscila. « Eunomia (Εὐνομία) : A Requirement Engineering based Compliance Framework for Software Systems ». Doctoral thesis, Università ; degli studi di Trento, 2018. http://hdl.handle.net/11572/283380.

Texte intégral
Résumé :
Laws and regulation affect software development, as they frequently demand changes in software’ requirements to protect individuals and businesses regarding security, privacy, governance, sustainability and more. Legal requirements can dictate new requirements or constrain existing ones. The problem of software compliance is howto ensure that the software complies with the norms that the legislation imposes. The problem is particularly challenging because it combines difficultsteps: 1)analyze legal documents, 2) extract requirements from those documents, 3) identify conflicting requirements with those already implemented in software and 4) ensure that software remains compliant even with the changes. Compliance is a continuous process: laws, software and the context within which software system operates changes continuously. The works dealing with the compliance problem focus only on one or two subjects: analyze legal documents or extract requirements or identify conflicts or changes. This thesis deals with all the problems at the same time; the idea is to extract requirements from legal text, compare them with the software requirement, resolve the possible conflicts that may arise, continuously leading with the changes on environment, laws and requirements. For this, this work proposes a framework that is composed of a compliance process and continuous monitoring of environmental changes. The framework deals with different types of laws (security, privacy, transparency, health care) that are represented in explicit norms. The compliance process supports the identification, extraction, comparison and conflict resolution to help software compliance, by producing a compliant set of requirements. The compliance process is based on the semantic annotation and goal model. The semantic annotation helps to extract requirements from thelaw, using patterns. The goal model is used to help the comparison between requirement and to represent requirements in a formal and consistent requirement specification. The process is tool supported; some tools were reused (Desiree and NomosT) to further each step. It was necessary to adapt the tools for the context of the compliance process, creating a guideline, patterns, and heuristics. The continuous monitoring is concerned about the changes that affect the software compliance and has 7 the mechanism to ensure that even with those changes the software will regain compliance. The compliance monitor is basedon agents and Non Functional Requirements. The agents are represented using in i*, the idea is to showthe collaboration between the agents to ensure the continuous compliance. The requirement specification of how each agent should behave was also generated using Business Process Modeling Notation and Desiree language. The Non Functional Requirements catalogue is used to help to define operalizations for the software awareness. The framework validation was made in two parts: first, the compliance process and after all the framework proposed. For the compliance process, the effort and correctness were measured comparing the use of the proposed process andan ad-hoc method. For the entire framework, the example of monitoring the changes in the environment when an automated car is crossing the border between Washington and Canada was used. The study shows that context has a strong influence on the software requirements, and nonconformity problems may incur penalties. The contribution of this work is the Eunomia framework that has a process and goal model perspective with emphasis on monitoring that helps to deal with the compliance challenge. The framework equips the requirements engineering team with a systematic method. Eunomia framework is a tool-supported and systematic process which can be reused to reduce the time effort and to improve the quality of the requirement specification that helps to create a compliant software requirement specification that is compliant over the time.
Styles APA, Harvard, Vancouver, ISO, etc.
13

John, Jo-Anne Louise. « An investigation into compliance and the rotating disc ». Thesis, University of Birmingham, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.369721.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Edwards, Jonathan Mansell. « An analysis of compliance competence in the life assurance sector ». Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412231.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Ombede, Guy André. « Analyse de la compliance par Répartition de Puissance Robot : environnement ». Lyon, INSA, 1996. http://www.theses.fr/1996ISAL0115.

Texte intégral
Résumé :
Les tâches manufacturières telles que les opérations d'assemblage robotisées ou le parachèvement (ébarbage, ébavurage, rainurage. . . ) nécessitent des interactions entre le robot et l'environnement ou les objets liés à la manipulation. Dans ces actions contraintes, les forces d'interactions doivent être accommodées à la tâche plutôt que résistantes : c'est la technique des mouvements compliants. Différentes méthodes ont été développées pour satisfaire cette exigence. Dans les directions de recherches liées à ce thème, les considérations énergétiques dans le système global constitué par le robot et son environnement ne sont pas envisagées durant la tâche. Dans ce mémoire, nous proposons une modélisation de la compliance du point de vue flux de puissance circulant entre le robot et l'environnement en interaction. Après avoir formellement décrit le couple robot – environnement sous forme d'un réseau de Norton, le formalisme "Scattering" est utilisé pour analyser les échanges de puissance dans ce réseau. Par cette approche, nous choisissons les meilleurs paramètres de réglage des correcteurs (PID) du robot sous commande impédance, c'est-à-dire ceux permettant de transférer le maximum de puissance du robot à l'environnement, et donc d'adapter l'impédance du robot asservi à celle de l'environnement
Manufacturing tasks required mechanical interaction with the environment or the object being manipulated. In constrained maneuvers, the interaction forces must be accommodated rather than resisted. It is compliant motion theory. A lot of methods have been suggested to solve these requirements. In the axis inherent in this research, energizing considerations are not taken into account in the global system which involves the robot and his environment during task execution. In this thesis, we modelize the interaction in terms of power waves flowing between the robot and the environment. After describing the couple robot environment as a Norton circuit, we use the Scattering approach to analyze the exchanged powers in the circuit then this approach is used to choose the best parameters of the controller which ensure the maximum transfer of average power from robot to environment. The impedance of robot is matched to the impedance of environment
Styles APA, Harvard, Vancouver, ISO, etc.
16

Schöberle, Bernd Michael. « Evaluation of viscoelastic materials for MEMS by creep compliance analysis ». Tönning Lübeck Marburg Der Andere Verl, 2008. http://d-nb.info/98953068X/04.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Wiedmann, Stephen Louis. « Kinematic Analysis of a Threaded Fastener Assembly ». Thesis, Virginia Tech, 2000. http://hdl.handle.net/10919/31685.

Texte intégral
Résumé :
The demands for an increase in productivity and reduced assembly costs require engineers to automate solutions that replace manual labor. This work concentrated on a common assembly primitive, threaded fastener insertion, in an effort to determine the nature of contact between a bolt and nut during thread mating. The assembly problem was initially simplified as a two-dimensional analysis to gain an understanding about how contacts between the bolt and nut change during counter-clockwise motion. Tessellated solid models were used during three-dimensional collision analysis in such a way that the approximate location of the contact point was enumerated. The advent of a second contact point presented a more constrained contact state since we are interested in maintaining both contacts; thus the bolt rotated about a vector defined by the initial two contact points until a third contact location was found. By analyzing the depth of intersection of the bolt into the nut as well as the vertical movement of the origin of the bolt reference frame, we determined that there are three types of contacts states present: unstable two-point, quasi-stable two-point, stable three point. Though the unstable case remains to be deciphered, the parametric equations derived in this work can be used without modification to create a full spectrum of maps at any point in the history of a threaded assembly problem. We investigated 81 potential orientations, each of which has its own set of contact points. From this exhaustive examination, we are capable of detailing a contact state history and, from this, have the potential to develop a constraint network.
Master of Science
Styles APA, Harvard, Vancouver, ISO, etc.
18

Dantec, Delphine. « Analysis of the cost of recycling compliance for the automobile industry ». Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32273.

Texte intégral
Résumé :
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2005.
Includes bibliographical references (leaves 71-73).
Cars are one of the most recycled commercial products. Currently, approximately 75% of the total vehicle weight is recycled. The EU directives on End-of-life vehicles try to push the recycling process further: it fixed the percentage of recyclability (85%) and recoverability (95%) automotive companies have to reach for their new vehicles in 2015. Complying with these directives will imply a cost, which will be borne by one or several of the stakeholders of the automotive life cycle. This cost will not only depend on the type of the vehicle but also on where the vehicle will be recycled and which recycling processes will be used. The scope of this thesis is to study the recycling cost sensitivity to regional practices and to vehicle's type. A technical cost model has been developed to calculate the cost of applying the regulation. Based on the list of parts of a particular vehicle, this tool allows to determine which parts have to be removed to reach the recycling target and the cost associated with this removal. The model was run for a sample group of vehicles and for different regional inputs. The goal is to pinpoint the major recycling cost drivers and discuss how the total cost can be reduced. Finally, this work analyses the magnitude of exposure of a vehicle manufacturer in Europe.
by Delphine Dantec.
S.M.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Blake, Barbara Richmond. « Continuous Improvement Monitoring : An Analysis of State Special Education Compliance Procedures ». W&M ScholarWorks, 2012. https://scholarworks.wm.edu/etd/1539618508.

Texte intégral
Résumé :
The purpose of this policy analysis was to examine the responses of selected states to the special education monitoring requirements of the Individuals with Disabilities Education Act of 2004 (IDEA) with particular attention paid to the years after this most recent reauthorization. This study examined the legislative and litigative history of students with disabilities including the gradually increasing role of the federal government in both general and special education.;The various approaches used by the selected states to monitor special education procedures and student outcomes were identified as well as the procedures used by these states in order to remediate non-compliance issues. Information was reviewed in order to determine the extent that selected states met or failed to meet state indicator targets.;Once the non-compliance issues and due process issues had been associated with their respective priority areas, an analysis was made of the relationship between these two variables. It was determined that a correlation was found to exist between due process proceedings and identified areas of non-compliance. Through the use of qualitative and quantitative research methods, the results obtained from this study indicated that the selected states use similar methods for monitoring special education as well as for remediating non-compliance.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Mukhopadhyay, Jaya. « Analysis of improved fenestration for code-compliant residential buildings in hot and humid climates ». Texas A&M University, 2005. http://hdl.handle.net/1969.1/4162.

Texte intégral
Résumé :
This thesis presents an analysis of energy efficient residential windows in hot and humid climates. To accomplish this analysis, the use of accurate simulation tools such as DOE-2.1e is required, which incorporates the results from the WINDOW-5.2 simulation program to assess accurate fenestration performance. The thesis also investigates the use of optimal glazing types, which, for future applications, could be specified in the code to reduce annual net energy consumption to zero. Results show that combinations of low-E and double pane, clear-glazed windows, which are optimally shaded according to orientation are the best solution for lowering both annual energy consumption and peak electricity loads. The study also concludes that the method used to model fenestration in the simulation program plays an important role in accurately determining the effectiveness of the glazing option used. In this particular study, the use of the WINDOW-5.2 program is highly recommended especially for high performance windows (i.e., low-E glazing). Finally, a discussion on the incorporation of super high performance windows (i.e., super low-E, ultra low-E and dynamic / switchable glazing) into the IECC code concludes that these types of glazing strategies can reduce annual net energy use of the window to zero. Future work identified by this thesis includes a more extensive examination of the passive solar potential of high performance fenestration, and an examination of the appropriate methods for specifying these properties in future versions of the IECC code. This implies that future specifications for fenestration in the IECC code could aim for zero net annual energy consumption levels from residential fenestration.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Perez, Iñigo Sanchez. « Business plan analysis of a Brazilian software company ». Master's thesis, NSBE - UNL, 2013. http://hdl.handle.net/10362/11606.

Texte intégral
Résumé :
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics
Since 2008, Synchro invested in two new products: Governance & Compliance (solution that monitors tax compliance with legal deadlines) and Portal Tributary (website which provides content related to fiscal and tributary issues). This work project summarizes the business plan developed by the author while working in Synchro and further analyzes it by pointing out keys risks and by drawing recommendations. According to the author, the major risks to the success of the products are the delay in launching, lack of engagement of the team and of a marketing plan. A dedicated team to each product, an extensive marketing action and brand-mark concept is some of the solutions proposed.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Lane, Tim. « Information security management in Australian universities : an exploratory analysis ». Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16486/1/Tim_Lane_Thesis.pdf.

Texte intégral
Résumé :
Australian Universities increasingly rely on Information Technology (IT) systems for essential business operations, including administration, teaching, learning and research. Applying information security to university IT systems is strategically important to maintaining overall business continuity in universities. However, the process of effectively implementing information security management in the university sector is challenging for security practitioners. University environments consist of a cultural mix of academic freedoms, student needs and compliance mandates. Consequently, unique and divergent demands are placed on securing and accessing university IT systems. This research undertook a qualitative based exploratory analysis of information security management in Australian universities. The aims and objectives of the research (represented as the research questions) were to determine: 1) What is the current status of information security management practices in the Australian university sector? 2) What are the key issues and influencing factors surrounding the effectiveness of information security management practices? 3) How could improvements in information security management be achieved? The findings from the research led to a comprehensive and insightful examination of the current status, issues and challenges facing information security practitioners in Australian universities. The research findings culminated in the development of a Security Practitioner's Management Model. An essential aim of the model is to assist security practitioners to successfully implement and progress information security in the Australian university environment. The research improves current understanding of information security issues and reinforces the pertinence of information security management as a strategically important business function for Australian universities.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Lane, Tim. « Information security management in Australian universities : an exploratory analysis ». Queensland University of Technology, 2007. http://eprints.qut.edu.au/16486/.

Texte intégral
Résumé :
Australian Universities increasingly rely on Information Technology (IT) systems for essential business operations, including administration, teaching, learning and research. Applying information security to university IT systems is strategically important to maintaining overall business continuity in universities. However, the process of effectively implementing information security management in the university sector is challenging for security practitioners. University environments consist of a cultural mix of academic freedoms, student needs and compliance mandates. Consequently, unique and divergent demands are placed on securing and accessing university IT systems. This research undertook a qualitative based exploratory analysis of information security management in Australian universities. The aims and objectives of the research (represented as the research questions) were to determine: 1) What is the current status of information security management practices in the Australian university sector? 2) What are the key issues and influencing factors surrounding the effectiveness of information security management practices? 3) How could improvements in information security management be achieved? The findings from the research led to a comprehensive and insightful examination of the current status, issues and challenges facing information security practitioners in Australian universities. The research findings culminated in the development of a Security Practitioner's Management Model. An essential aim of the model is to assist security practitioners to successfully implement and progress information security in the Australian university environment. The research improves current understanding of information security issues and reinforces the pertinence of information security management as a strategically important business function for Australian universities.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Souleiman, Isman Yahyeh. « Analyse de quelques problèmes de contact glissant ». Thesis, Perpignan, 2017. http://www.theses.fr/2017PERP0010/document.

Texte intégral
Résumé :
Les phénomènes de contact impliquant des corps déformables abondent dans l'industrie, notamment dans les structures mécaniques. En raison de leur complexité intrinsèque, les phénomènes de contact sont modélisés à l'aide de problèmes aux limites fortement non linéaires. De ce fait, la modélisation de ces phénomènes pose plusieurs difficultés mathématiques. Dans cette thèse, nous nous intéressons à la modélisation, l'analyse variationnelle et l'analyse numérique de problèmes de contact glissant intervenant en mécanique des solides, pour des matériaux élastiques, viscoélastiques et viscoplastiques. La première partie de cette thèse rappelle quelques résultats préliminaires, notamment des outils mathématiques et mécaniques nécessaires pour réaliser la suite de ce travail. La deuxième partie est consacrée à l'étude de quelques problèmes de contact glissant sous diverses conditions de contact et frottement. Pour chacun de ces problèmes, nous introduisons les formulations fortes et des formulations variationnelles. Ensuite, nous obtenons des résultats d'existence et d'unicité des solutions faibles, sous certaines hypothèses de petitesse, ainsi que des résultats de convergence. Enfin, nous proposons une approximation numérique de certains problèmes de contact à l'aide de schémas discrétisés. Pour ces schémas, nous obtenons des résultats d'estimation de l'erreur
Contact phenomena involving deformable bodies abound in industry, especially in mechanical structures. Due to their intrinsic complexity, contact phenomena are modelled with strongly nonlinear boundary problems. For this reason, the modelling of these phenomena gives rise to various mathematical difficulties. In this thesis, we are interested in the modelling, the variational analysis and the numerical analysis of problems of sliding contact in solid mechanics for elastic, viscoelastic and viscoplastic materials. The first part of this thesis concerns some preliminary results, in particular the mathematical and mechanical tools necessary to carry out the continuation of this work. The second part is devoted to the study of some problems of sliding contact under various conditions of contact and friction. For each of these problems, we introduce strong formulations and variational formulations. Then, we obtain results of existence and uniqueness of the weak solutions, under smallness assumptions, as well as results of convergence. Finally, we propose a numerical approximation of some contact problems based on the etudy of discretized schemes. For these schemes we obtain error estimates results
Styles APA, Harvard, Vancouver, ISO, etc.
25

Christian, Philip C. « Sales Tax Enforcement : An Empirical Analysis of Compliance Enforcement Methodologies and Pathologies ». FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/335.

Texte intégral
Résumé :
Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.
Styles APA, Harvard, Vancouver, ISO, etc.
26

LEAL, ANDRÉ LUIZ DE CASTRO. « SOFTWARE COMPLIANCE ANALYSIS BASED ON SOFTGOAL CATALOG : A MULTI-AGENTS SYSTEMS APPROACH ». PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2014. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=24299@1.

Texte intégral
Résumé :
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE SUPORTE À PÓS-GRADUAÇÃO DE INSTS. DE ENSINO
PROGRAMA DE EXCELENCIA ACADEMICA
A análise de requisitos não funcionais (RNF) é um desafio e vem sendo explorado na literatura científica. Tal iniciativa deve-se ao fato da existência do problema de se verificar o uso das operacionalizações desse tipo de requisito no software construído. Nessa tese apresenta-se um método, com técnicas e ferramentas de apoio, que analisam se um software está em conformidade com padrões de RNFs estabelecidos em catálogo como alternativa para o problema de análise de RNF. A estratégia adotada nessa tese utiliza agentes autônomos para análise de conformidade de software em relação a operacionalizações de RNF. Para isso, utiliza uma base de conhecimentos de padrões persistidos em um catálogo. Os resultados parciais são indicativos de que a proposta de solução é aplicável. A avaliação da validade dá-se por demonstração de que um método parcialmente automatizado é eficaz na identificação de conformidades. Um diferencial do trabalho apresentado é a ligação dos RNFs a sua efetiva implementação. Para demonstração da tese aplicou-se e customizou-se uma técnica de padrões de RNFs, baseados em orientação a metas, em estudos de caso de exemplos do cotidiano prático de software. Apresentamos também a construção de um framework de agentes, que operam sob notações XML para identificar conformidades de software em relação a um catálogo de RNF.
The analysis of non-functional requirements (NFR) is a challenge and has been explored in the literature. This initiative is due to the fact of the existence of the problem of analysis the use of the NFRs operationalization in software. In this thesis we present a method, with supporting tools and techniques, that checks, if a software complies with standards of non-functional requirements as described in a catalog, as an alternative to the NFR analysis problem. The strategy adopted in this thesis uses autonomous agents to check software compliance regarding the operationalization of an NFR, by using a knowledge base of patterns persisted in a catalog. Initial results show that the proposed solution is applicable. The evaluation of the validity is given by the demonstration that a partially automated method is effective in identifying compliance. This work differs form others by linking NFRs to their effective implementation. A method based on patterns NFRs was used in common software, as to show the application of the proposed strategy. An agent based framework, working with XML descriptions, for checking software compliance with respect to a NFR catalog was built.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Northrop, Debra L. (Debra Lynn). « Lead in drinking water : analysis of a compliance project for NTNC schools ». Thesis, Massachusetts Institute of Technology, 1990. http://hdl.handle.net/1721.1/69260.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Piper, Ian Ross. « Waveform analysis of intracranial pressure and craniospinal compliance : clinical and experimental studies ». Thesis, University of Edinburgh, 1990. http://hdl.handle.net/1842/19237.

Texte intégral
Résumé :
Raised intracranial pressure (ICP > 20 mm Hg) occurs in at last thirty percent of severely head injured patients and is associated with a significant increase in the number of deaths and severely disabled survivors. A study of the ICP waveform may yield information of relevance to the management of raised ICP either as a predictor of raised ICP or of its underlying cause. An observational study in thirty severely head injured patients was carried out, where fifteen hundred ICP and blood pressure (BP) waveform samples were collected under microcomputer control and analysed through the use of spectral methods in a systems analysis aproach to quantifying pressure transmission across the cerebrovascular bed. The amplitude transfer functions, as a measure of cerebrovascular pressure transmission, were calculated for the first 4 cardiac harmonics from the ICP and BP spectra and were found to cluster into four classes: those with an overall flat amplitude transfer function (curve type 1), and those with an elevated low frequency response (curve type 2), those with an elevated high frequency response (curve type 3) and those exhibiting both an elevated low and an elevated high frequency response (curve type 4). Curve types 2 and 4 (elevated low frequency, elevated low frequency in combination with elevated high frequency) were most often associated with raised ICP (ICP > 20 mm Hg) whereas curve types 1 and 3 (flat, elevated high frequency) were most often associated with ICP less than 15 mm Hg. To aid in the interpretation of these clinically observed forms of cerebrovascular pressure transmission, an expermental investigation into the relationship between cerebrovascular resistance, craniospinal compliance and cerebrovascular pressure transmission was performed. Before such an experimental study could be performed, an improved method of measuring craniospinal compliance was needed. Existing measures of lumped craniospinal compliance such as the volume pressure response method (VPR) were considered too variable chiefly as a result of the sequence using an electronic square wave pressure generator to produce a small (0.05 ml), exact and reproducible transient volume increase into the CSF space. The new method was validated against the VPR method in physical and animal models, where it accurately followed compliance changes and demonstrated significantly less variation between measurements. The experimental studies were then performed in animal models of raised ICP, arterial hypercarbia and arterial hypertension, using the improved compliance technique. The data obtained from those studies were an aid to the interpretation of the four forms of cerebrovascular pressure transmission that were observed in the clinical studies. A flat amplitude transfer function (curve type 1) indicates equal transmission of all harmonics of the arterial pressure waveform through to the CSF space and was found in the experimental studies associated with ICP less than 15 mm Hg and with normal craniospinal compliance normal cerebrovascular resistance and a negative fundamental phase shift. This form of cerebrovascular pressure transmission may characterize a functionally normal cerebrovascular bed.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Crane, Nathan B. « Compliant centrifugal clutches : design, analysis, and testing / ». Diss., CLICK HERE for online access, 1999. http://contentdm.lib.byu.edu/ETD/image/etd223.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Adam, Paul Marcel. « Chronic nonadherence to therapeutic regimes : an in-depth analysis of male arthritis patients ». Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/27710.

Texte intégral
Résumé :
Chronic nonadherence is the complete lack of adherence on the part of a patient to at least one aspect of their therapeutic regime for extended periods of time. Chronic nonadherence is similar to other forms of nonadherence in that it is a phenomena which is dangerous for patients, frustrating for practitioners, and costly to the health care system. However, unlike other forms of nonadherence, very little is known about this subject. In order to determine factors related to chronic nonadherence to a home exercise program, 15 male arthritis patients of varying ages underwent an in-depth structured interview. Eight of these patients were identified by the Arthritis Society as being chronic, treatment nonadherents. The other seven patients were randomly chosen from among the population of male arthritis patients in order to provide a comparison to the chronic nonadherent population. Ten variables were examined in this study in the hopes of determining factors related to chronic nonadherence. These variables were as follows: demographics, The Health Beliefs Model, patient's explanatory model, nature of the illness, satisfaction with practitioner attributes, shared responsibility, overall satisfaction, attitudes of significant others, use of unorthodox treatments, and problems with the home exercise program. Data analysis failed to produce any statistically significant findings, however the study did point to some interesting associations. One finding from this study is that nonadherence seems to be related to patient's Health Beliefs Models. Based on this finding the study then goes on to recommend an appropriate intervention which can be used by practitioners to enhance patient adherence. A second finding from this study is that a small number of the chronic nonadherent group were actually adherent to their home exercise programs. Several explanations have been provided as to how these patients might have been falsely labelled as chronic nonadherents.
Arts, Faculty of
Social Work, School of
Graduate
Styles APA, Harvard, Vancouver, ISO, etc.
31

Lan, Chao-Chieh. « Computational Models for Design and Analysis of Compliant Mechanisms ». Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/14076.

Texte intégral
Résumé :
We consider here a class of mechanisms consisting of one or more compliant members, the manipulation of which relies on the deflection of those members. Compared with traditional rigid-body mechanisms, compliant mechanisms have the advantages of no relative moving parts and thus involve no wear, backlash, noises and lubrication. Motivated by the need in food processing industry, this paper presents the Global Coordinate Model (GCM) and the generalized shooting method (GSM) as a numerical solver for analyzing compliant mechanisms consisting of members that may be initially straight or curved. As the name suggests, the advantage of global coordinate model is that all the members share the same reference frame, and hence, greatly simplifies the formulation for multi-link and multi-axis compliant mechanisms. The GCM presents a systematic procedure with forward/inverse models for analyzing generic compliant mechanisms. Dynamic and static examples will be given and verified experimentally. We also develop the Generalized Shooting Method (GSM) to efficiently solve the equations given by the GCM. Unlike FD or FE methods that rely on fine discretization of beam members to improve its accuracy, the generalized SM that treats the boundary value problem (BVP) as an initial value problem can achieve higher-order accuracy relatively easily. Using the GCM, we also presents a formulation based on the Nonlinear Constrained Optimization (NCO) techniques to analyze contact problems of compliant grippers. For a planar problem it essentially reduces the domain of discretization by one dimension. Hence it requires simpler formulation and is computationally more efficient than other methods such as finite element analysis. An immediate application for this research is the automated live-bird transfer system developed at Georgia Tech. Success to this development is the design of compliant mechanisms that can accommodate different sizes of birds without damage to them. The feature to be monolithic also makes complaint mechanisms attracting in harsh environments such as food processing plants. Compliant mechanisms can also be easily miniaturized and show great promise in microelectromechanical systems (MEMS). It is expected that the model presented here will have a wide spectrum of applications and will effectively facilitate the process of design and optimization of compliant mechanisms.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Seereeram, Videsh Ramjas. « Compliant shell mechanisms ». Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610867.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Hofmann, Eva, Erich Kirchler, Christine Bock et Martin Voracek. « Tax compliance across sociodemographic categories : Meta-analyses of survey studies in 111 countries ». Elsevier, 2017. http://dx.doi.org/10.1016/j.joep.2017.06.005.

Texte intégral
Résumé :
Tax compliance varies across sociodemographic categories. However, research on the relationships between compliance and age, sex, education as well as income level shows inconsistent results, both regarding the direction of the relationship and its size. The current meta-analyses target to merge findings in survey studies on age, sex, education, and income and estimate the strength of the impact on compliance by taking into account geographical regions. In four meta-analyses, comprising 459 samples (N = 614,286) from 111 countries published between 1958 and 2012, average estimated effect sizes were small, ranging from r = 0.12 for the relationship between compliance and age, r = 0.06 for sex, r = -0.02 for education to r = -0.04 for income. These effects are more pronounced in Western countries. It thus appears sociodemographic characteristics have little impact on compliance, but nevertheless should be controlled for in tax research.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Setyadi, Agus. « The accounting regulatory compliance of Indonesian firms' annual reports ». Thesis, Curtin University, 2009. http://hdl.handle.net/20.500.11937/624.

Texte intégral
Résumé :
This study examines accounting compliance using an agency theory framework through an analysis of 220 non-financial Indonesian listed companies’ 2006 annual reports. The level of regulatory compliance is measured using a 29 item index derived from the specific requirements of the Indonesian accounting standards (PSAK) on inventory, fixed assets, and depreciation. The key dependent variable is the aggregate compliance (IARCagg) with further sub-analysis conducted on measurement and disclosure rules and each individual standard.The findings reveal that only 60.61% of accounting regulation rules are followed by Indonesian companies. Measurement rules demonstrate higher compliance than disclosure. Depreciation rules have very high compliance with inventory and fixed assets much lower. Consistently, historical cost topics are far better addressed than fair market value themes.Regression analysis demonstrates that size of firm and return on assets are statistically significant predictors of IARC. Bigger and more profitable companies have far higher compliance with accounting rules. This is consistent with prior accounting compliance studies (Nichols and Street, 2007). Of special interest are the findings that corporate governance and ownership structure do not appear to explain accounting regulatory compliance in an Indonesian context.Given the almost 40% non-compliance rate there is a clear need for the Indonesian regulatory bodies to better enforce companies’ compliance with the rules. Improved enforcement of compliance with accounting standards could decrease agency costs and increase stakeholders’ confidence in Indonesian companies.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Beshara, Maha. « Energy flows in structures with compliant nonconservative couplings ». Thesis, University of Oxford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360211.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Matsuka, Tamami. « An analysis of the effect of electronic filing on individual income tax compliance ». CONNECT TO ELECTRONIC THESIS, 2007. http://dspace.wrlc.org/handle/1961/4262.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Valdes, Francisco Javier. « Manufacturing compliance analysis for architectural design : a knowledge-aided feature-based modeling framework ». Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54973.

Texte intégral
Résumé :
Given that achieving nominal (all dimensions are theoretically perfect) geometry is challenging during building construction, understanding and anticipating sources of geometric variation through tolerances modeling and allocation is critical. However, existing building modeling environments lack the ability to support coordinated, incremental and systematic specification of manufacturing and construction requirements. This issue becomes evident when adding multi-material systems produced off site by different vendors during building erection. Current practices to improve this situation include costly and time-consuming operations that challenge the relationship among the stakeholders of a project. As one means to overcome this issue, this research proposes the development of a knowledge-aided modeling framework that integrates a parametric CAD tool with a system modeling application to assess variability in building construction. The CAD tool provides robust geometric modeling capabilities, while System Modeling allows for the specification of feature-based manufacturing requirements aligned with construction standards and construction processes know-how. The system facilitates the identification of conflicting interactions between tolerances and manufacturing specifications of building material systems. The expected contributions of this project are the representation of manufacturing knowledge and tolerances interaction across off-site building subsystems to identify conflicting manufacturing requirements and minimize costly construction errors. The proposed approach will store and allocate manufacturing knowledge as Model-Based Systems Engineering (MBSE) design specifications for both single and multiple material systems. Also, as new techniques in building design and construction are beginning to overlap with engineering methods and standards (e.g. in-factory prefabrication), this project seeks to create collaborative scenarios between MBSE and Building Information Modeling (BIM) based on parametric, simultaneous, software integration to reduce human-to-data translation errors, improving model consistency among domains. Important sub-stages of this project include the comprehensive review of modeling and allocation of tolerances and geometric deviations in design, construction and engineering; an approach for model integration among System Engineering models, mathematical engines and BIM (CAD) models; and finally, a demonstration computational implementation of a System-level tolerances modeling and allocation approach.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Supriyadi, Mohammad Wangsit. « Beyond deterrence : An empirical and experimental analysis of tax compliance behaviour in Indonesia ». Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/114093/1/Mohammad%20Wangsit_Supriyadi_Thesis.pdf.

Texte intégral
Résumé :
This thesis takes a behavioural approach to tax compliance in three studies. It extends existing knowledge on factors influencing compliance behavior by employing various methodologies namely survey analysis, quasi-experiment and field experiment. The last two studies were conducted in Indonesia which provided a non-developed countries context which has been lack in previous literature. One of this thesis' novel contributions to the literature is the application of repeated behavioural interventions in the field experiment. Overall, the thesis is also hoped to provide better empirical data for policy makers to design strategies to increase tax compliance.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Siswantoro, Hari. « Automated Analysis and Synthesis for the Compliance of Privacy and Other Legal Provisions ». Doctoral thesis, Università degli studi di Trento, 2018. https://hdl.handle.net/11572/368988.

Texte intégral
Résumé :
Enforcing legal compliance into software systems is a non-trivial task that requires an interdisciplinary approach. This thesis presents a new methodology for legal compliance checking against European legal provisions, namely the EU Data Protection Directive, the EU General Data Protection Regulation and the revised EU Payment Services Directive. We propose two types of compliance checking mechanisms that should be exploited at design-time or run-time. The former is based on security policy analysis of access control policies. The later is built on top of an approach to synthesizing run-time monitors for workflow-driven applications. Our contributions include a comprehensive methodology for legal compliance checking, the formalization of the regulations and the prototype tool of the implemented compliance methodology.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Rozkydalová, Dana. « Vyvolané náklady zdanění ». Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193292.

Texte intégral
Résumé :
This master's thesis defines theoretical range of compliance costs of taxation. Focus is placed on psychological costs of tax compliance. In the thesis are defined measuring methods of compliance costs of taxation and then are presented the results of realized studies. Theoretical part also contains general information about the determination of selective sample. Practical part contains the analysis of psychological costs of tax compliance which was based on results of the questionnaire survey.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Ebbers, Gabriele K. « A comparative analysis of regulatory strategies in accounting and their impact on corporate compliance ». Thesis, Bangor University, 1998. https://research.bangor.ac.uk/portal/en/theses/a-comparative-analysis-of-regulatory-strategies-in-accounting-and-their-impact-on-corporate-compliance(c9fce03d-7a85-4018-8fed-b1f93db4dccc).html.

Texte intégral
Résumé :
This thesis analyses whether compliance behaviour in financial reporting may be influenced by differences in regulatory sources and in the design of the regulations themselves. A logistic binomial model is -used to describe the relative odds of full compliance rather than regulatory avoidance by way of partial or creative compliance. The analysis is based on the accounting policies adopted by internationally listed companies registered in Europe where, despite the harmonising impact of the European company law directives, regulatory strategies in accounting continue to be diverse.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Kamath, Jean-François Ajit. « Numerical analysis of a redundant compliant spatial mechanism ». [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0011832.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Messick, Janice. « Determinants of Compliance to Iron Supplementation During Pregnancy in Rural Bangladesh : Secondary Data Analysis of the MINIMat Trial ». Thesis, Uppsala universitet, Internationell mödra- och barnhälsovård (IMCH), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-256641.

Texte intégral
Résumé :
Background: Although efforts to reduce iron deficiency during pregnancy have been made, programmes often struggle with their participants’ compliance and effectiveness is low. Nevertheless, there is only little information about determinants of compliance. The aim of this thesis is to investigate which factors contribute to women’s compliance to iron supplementation during pregnancy in rural Bangladesh. Methods: Secondary analysis of data collected within a randomized trial in Matlab, Bangladesh (MINIMat trial). 4436 pregnant women were assigned to six micronutrient supplementation groups. Questionnaires were administered and anthropometric measurements were taken. Compliance was measured using the eDEM® counting device which recorded every time a pill bottle was opened. Results: In linear regression maternal age, socio economic status (SES) and education showed a positive association with compliance (p<0.001). Parity showed a negative association (p=0.045). Knowledge of effects of iron supplementation and perception of importance of iron supplementation were not significantly associated with compliance. Experiencing positive effects of iron supplementation was related to higher compliance to iron supplementation, while experiencing nausea was related to lower compliance to iron supplementation (p<0.001). Dislike of the tablets (p<0.001) and other reasons that were not specifically mentioned (p=0.015) were significantly associated with a decrease in compliance. Conclusion: Pregnant women’s compliance to iron supplementation was determined by different factors. Educating women about anaemia, iron deficiency and iron supplementation should not be the only strategy to achieve high compliance. Development of supplements that cause fewer side effects should be considered and more research investigating determinants of compliance should be performed.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Sim, Kyu-Ho. « Rotordynamic and thermal analyses of compliant flexure pivot tilting pad gas bearings ». Thesis, [College Station, Tex. : Texas A&M University, 2007. http://hdl.handle.net/1969.1/ETD-TAMU-1575.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Marchiolo, Eryn M. « An Analysis of Georgia Schools’ Compliance and Implementation of Federally Mandated School Wellness Policies ». Digital Archive @ GSU, 2008. http://digitalarchive.gsu.edu/iph_theses/20.

Texte intégral
Résumé :
Our nation’s youth face health challenges today that are drastically different from the health problems of youth in generations past. The drastic rise in childhood obesity rates prompted the 108th Congress to look for an innovative solution to the problem, mandating that each school district receiving federal funding for Free and Reduced Lunch must create and adopt a local wellness policy. This study examines whether relationships exist between Georgia’s school districts’ wellness policies and specific demographic characteristics of the district. Dependent variables include compliance, phase of implementation, and presence of a school health council. This study conducted univariate analysis using chi square and odds ratio coupled with binary logistic regression. Analysis shows that percent of minority students, as an independent variable, is significantly associated with compliance with the Child Nutrition and WIC Reauthorization Act.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Hayakawa, Yoshikazu, Yuta Yoshimatsu et Akira Nakashima. « Analysis and Synthesis of Stable Grasp by Multi-Fingered Robot Hand with Compliance Control ». IEEE, 2010. http://hdl.handle.net/2237/14465.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Almusharraf, Ahlam. « DIVERGENCE IN STAKEHOLDER PERCEPTIONS OF SECURITY POLICIES : A REPGRID ANALYSIS FOR NORM-RULE COMPLIANCE ». VCU Scholars Compass, 2016. http://scholarscompass.vcu.edu/etd/4346.

Texte intégral
Résumé :
Many organizations have a problem with synchronizing individual values regarding information security with expectations set by the relevant security policy. Such discordance leads to failure in compliance or simply subversion of existing or imposed controls. The problem of the mismatch in understanding the security policies amongst individuals in an organization has devastating effect on security of the organization. Different individuals hold different understanding and knowledge about IS security, which is reflected on IS security policies design and practice (Vaast, 2007). Albrecthsen and Hovdena (2009) argue that users and managers practice IS security differently because they have different rationalities. This difference in rationalities may reflect the mismatch between the security policies and individuals’ values. In this research, we argue that occurrence of security breach can change individuals’ values in light of security policy of organization. These changes in the values can be reflected on the compliance between individuals’ norms and security rules and standards. Indeed, organizations need to guarantee the compliance between security policy and values of their employees. Thus, they can alleviate or prevent violations of security of organization. However, it is difficult to find a common method that all organizations can adopt to guarantee the synch between security rules and individuals’ norms. The main aim of this research is to investigate how people perceive information security policy and how their perceptions change in response to security breaches. Besides, this research aims to investigate the relationship between individuals’ values and security policy. Thus, organizations can have the intended level of compliance between individual norms and security rules and standards. With the aid of the Repertory Grid technique, this research examines how a security breach shapes people’s values with respect to security policy of an organization. To conduct the argument, this research offers an assessment mechanism that aids the organization to evaluate employees’ values in regard to security policy. Based on that evaluation, the organization can develop a proper mechanism to guarantee compliance between individuals’ norms and security rules. The results of this research show that employees in an organization hold different perceptions regarding the security policy. These perceptions change in response to security incident. This change in perceptions dose not necessarily result in better compliance with the security policy. Factors like the type of breach and people’s experience can affect the amount of change in the perceptions. Contributions, implications, and directions for future research of this study will be discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Ramadan, Ahmad. « Modélisation et analyse de quelques problèmes de contact avec compliance normale et contrainte unilatérale ». Thesis, Perpignan, 2014. http://www.theses.fr/2014PERP1207.

Texte intégral
Résumé :
Les phénomènes de contact entre des corps déformables ou entre un corps déformable et une fondation rigide sont des phénomènes omniprésents dans la vie courante. Ces phénomènes peuvent faire appel à des modèles mathématiques sophistiqués qui sont représentés par des systèmes d’équations aux dérivées partielles avec des conditions aux limites décrivant des processus de contact (avec ou sans frottement) complexes. Cependant, la théorie mathématique des problèmes de contact est un domaine d’études très large où de nombreux problèmes restent à investiguer. Le champ d’études de cette thèse concerne aussi bien l’élaboration de nouveaux modèles de contact et frottement que l’analyse mathématique et la résolution numérique des problèmes considérés. Dans ces travaux, notre objectif est d’apporter une contribution à cette théorie mathématique des problèmes de contact. En d’autres termes, l’objet de notre travail de thèse est d’étudier théoriquement et numériquement quelques problèmes de contact entre un corps déformable et une fondation rigide en utilisant plusieurs lois originales de comportement et de contact avec et sans frottement
Phenomena of contact between deformable bodies or between a deformable body and a rigid foundation abound in everyday life. These phenomena may involve sophisticated mathematical models represented by systems of partial differential equations with boundary conditions describing complex contact processes (with or without friction). However, the mathematical theory of contact problems is a broad field of study where many issues remain to be investigated. The field studies of this thesis concerns, the development of new models of contact and friction as well as the mathematical analysis and numerical solution of the problems considered. In this work, our goal is to make a contribution to this mathematical theory of contact problems. In other words, the purpose of our thesis is to study theoretically and numerically some problems of contact between a deformable body and a rigid foundation using several original constitutive and contact laws with and without friction
Styles APA, Harvard, Vancouver, ISO, etc.
49

Marchiolo, Eryn M. « An analysis of Georgia schools' compliance and implementation of federally mandated school wellness policies ». unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-07242007-162449/.

Texte intégral
Résumé :
Thesis (M.P.H.)--Georgia State University, 2007.
Title from file title page. Michael Eriksen, committee chair; Robin Tanner, Rodney Lyn, committee members. Electronic text (88 p. : col. ill.) : digital, PDF file. Description based on contents viewed Oct. 9, 2008. Includes bibliographical references (p. 81-83).
Styles APA, Harvard, Vancouver, ISO, etc.
50

Sallaku, Redlon <1994&gt. « Privacy and Protecting Privacy : Using Static Analysis for legal compliance. General Data Protection Regulation ». Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.

Texte intégral
Résumé :
The main purpose of the thesis is to study Privacy and how protecting Privacy, including the new regulation framework proposed by EU the GDPR, investigating how static analysis could help GDPR enforcement, and develop a new static analysis prototype to fulfill this task in practice. GDPR (General Data Protection Regulation) is a recent European regulation to harmonize and enforce data privacy laws across Europe, to protect and empower all EU citizens data privacy, and to reshape the way organizations deal with sensitive data. This regulation has been enforced starting from May 2018. While it is already clear that there is no unique solution to deal with the whole spectrum of GDPR, it is still unclear how static analysis might help enterprises to fulfill the constraints imposed by this regulation.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie