To see the other types of publications on this topic, follow the link: Access strategies.

Dissertations / Theses on the topic 'Access strategies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Access strategies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tang, Weizhi, and 湯偉之. "Self-access language learning : attitudes and learning strategies." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/209688.

Full text
Abstract:
The attitudes and learning strategies of 100 language learners who are also users of Self-Access Centers (SACs) in a theoretical context of Self-Access Language Learning (SALL). Though questionnaire survey, the present study discovered several significant correlations between learner’s attitudes towards SALL and their language learning strategies. It also established a profile of SALL center users in their attitudes and learning strategies from an comparative view based on their previous SALL experiences. The results showed that leaners who are more ready for Self-Access tend to use affective strategies. Memory strategies are practiced more often among leaners who prefer learn grammar without teachers and have more speaking activities in class, also who are relatively more self-aware of their own learning objectives. Cognitive strategies are widely used by leaners who prefer leaning grammar by themselves, also those who are more confident to solve problems by themselves. There is a stronger intention of control over content selection for leaners who had SALL experiences, especially in utilizing non-staffing SALL resources at SACs.
published_or_final_version
Education
Master
Master of Education
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Tae-Young. "User-activity aware strategies for mobile information access." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22595.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Raghupathy Sivakumar; Committee Member: Chuanyi Ji; Committee Member: George Riley; Committee Member: Magnus Egerstedt; Committee Member: Umakishore Ramachandran.
APA, Harvard, Vancouver, ISO, and other styles
3

Salehi, Nobandegani Ardavan. "Spectrum sensing and access strategies for Markovian primary users." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106567.

Full text
Abstract:
As a large portion of currently assigned spectrum is under utilized [1], the concept of cognitive radio is put forward as a promising solution to enhance the utilization of the available spectrum resources. Spectrum sensing, as a sole means for the Secondary User (SU) to gain awareness regarding his surrounding radio activities, is a cornerstone of the cognitive radio concept. In this thesis, the problem of spectrum sensing for the case of a single SU in the presence of an un-slotted Primary User (PU) whose channel usage pattern is modelled by a Continuous-Time Markov Chain (CTMC) is being studied and two sensing schemes, namely, Steady-State Occupancy Probability Approach (SS-OPA) and Bayesian Recursive Method (BRM) are discussed. As it takes the SU some time to process the observations he makes for the purpose of spectrum sensing, the issue of Sensing Delay (SD) is also addressed and the required modications have been applied on our proposed sensing scheme, BRM, so as to obtain an SD-aware sensing scheme. As soon as the SU nds the channel free, it gains access to it and start transmitting for a length of time which we refer to as a SU's transmission period. The problem of SU's transmission period optimization is being considered and two schemes are proposed as to strike a balance between maximizing the SU's spectrum utilization and the PU's protection against interference induced by the SU. The two SU's channel access strategies are developed so as to incorporate the effect of sensing error in their operation; henceforth the impractical assumption of perfect sensing has been dropped. Last but not least, the problem of uncertainty regarding the CTMC's parameters is studied and a sensing scheme, namely, Sequential Restricted-Minimax (SRM) scheme has been proposed so as to minimize, at each sensing instant, the worst-case cost incurred by the sensing rule. This study is motivated by the fact that the parameters involved in the PU's CTMC are not known a-priori and have to be replaces by imperfect estimates.
Étant donné qu'une portion importante du spectre assigné est actuellement sous-utilisée [1],le concept de radio cognitive apparait comme une solution prometteuse dans l'enrichissement de l'utilisation du spectre disponible. La détection du spectre, en tant que sole moyen pour l'utilisateur secondaire (SU) de reconnaitre des activités radio environnantes est un des piliers du concept radio cognitive. Cette Thése étudie le probléme de la detéction du spectre dans le cas d'un unique US en présence d'un utilisateur primaire (PU) sans crenéau temporel un-slotted et dont la modélisation de l'utilisation de chaine est acquise par une chaine de temps continu de Markov (CTMC). Ceci est analysé à partir de deux schémas, la methodé de probabilité d'occupation l'état stationnaire (SS-OPA) et la méthode récursive bayésienne (BRM). Puisque le SU requiert d'un certain temps an de traiter les observations qu'il fait pour détecter le spectre, le problème du retardement de la détection (dit probleme SD) fera aussi l'objet de cette étude. De même, les modications requises ont été appliquées dans le schéma BRM proposé afin d'obtenir un schéma de détection sensible au SD. Dés que le SU trouve une chaine de libre il en gagne l'accs et commence à émettre pour une période de temps que l'on appellera période de transmission du SU. Le problème de l'optimisation du période de transmission du SU est aussi considérée et deux schémas sont proposés an d'atteindre un équilibre entre la maximisation de l'utilisation du spectre par le SU et la protection du PU contre l'interfrence induite par le SU. Toutes les deux stratégies d'accs de chaine ont été développées dans le but d'incorporer l'effet de détection d'erreur dans leur opération; dès lors, on abandonne hypothèse ctive, de la détection parfaite. Enfin, le problème d'incertitude en relation aux paramètres du CTMC a été étudié et on a proposé le restreint-minimax squentiel (SRM) comme schéma de minimisation à chaque instant de détection où le cout du pire scenario est engagé par la règle de détection. Cet étude est motivée par le fait que les paramètres impliqués dans le CTMC du PU ne sont pas connus apriori et doivent être remplacés par des estimations imparfaites.
APA, Harvard, Vancouver, ISO, and other styles
4

Owusu, Atta Boateng. "Financial Strategies of Small Businesses to Gain Access to Capital." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3912.

Full text
Abstract:
In the United States, total small business outstanding loans declined by 2.5 % in 2013, compared to a 10.4% increase in 2012. Scholars and business practitioners have indicated that small business entrepreneurs experience constraints in accessing capital to grow their businesses. Many small firm owners lack the financial strategies for gaining access to capital to sustain their businesses. Building on system functionality theory, the purpose of this exploratory multiple case study was to explore the financial strategies among 3 purposefully-selected small business owners in Washington DC metro area who successfully overcame the financial constraints. Six themes emerged from the thematic analysis of interview data: credit cards, family and friends, own financing, bank financing, crowdfunding, and government grants and loans. These small firm owners preferred to use their own financing or to borrow from family and friends rather than lending from the banks because of borrowing constraints. Some of the lending limitations included high-interest rates, lack of collateral, provision of a robust business plan, and availability of good financial records. The findings from this study may contribute to social change by providing business owners with more knowledge on financial strategies to use in accessing capital to sustain their businesses. With the improvement in business profitability, business owners will contribute to the economic growth of the local community through the provision of employment opportunities and social amenities.
APA, Harvard, Vancouver, ISO, and other styles
5

Mohammed, Bello Lawal. "Intelligent RACH access strategies for M2M traffic over cellular networks." Thesis, University of York, 2015. http://etheses.whiterose.ac.uk/9497/.

Full text
Abstract:
This thesis investigates the coexistence of Machine-to-Machine (M2M) and Human-to-Human (H2H) based traffic sharing the Random Access Channel (RACH) of an existing cellular network and introduced a Q-learning as a mean of supporting the M2M traffic. The learning enables an intelligent slot selection strategy in order to avoid collisions amongst the M2M users during the RACH contest. It is also applied so that no central entity is involved in the slot selection process, to avoid tampering with the existing network standards. The thesis also introduces a novel back-off scheme for RACH access which provides separate frames for M2M and conventional cellular (H2H) retransmissions and is capable of dynamically adapting the frame size in order to maximise channel throughput. A Frame ALOHA for a Q-learning RACH access scheme is developed to realise collision- free RACH access between the H2H and M2M user groups. The scheme introduces a separate frame for H2H and M2M to use in both the first attempt and retransmissions. In addition analytical models are developed to examine the interaction of H2H and M2M traffic on the RACH channel, and to evaluate the throughput performance of both slotted ALOHA and Q-learning based access schemes. In general it is shown that Q-learning can be effectively applied for M2M traffic, significantly increasing the throughput capability of the channel with respect to conventional slotted ALOHA access. Dynamic adaptation of the back-off frames is shown to offer further improvements relative to a fixed frame scheme. Also the FA-QL-RACH scheme offers better performance than the QL-RACH and FB-QL-RACH scheme.
APA, Harvard, Vancouver, ISO, and other styles
6

Yanikömero‘glu, Halim. "Multi-antenna systems and interconnection strategies for CDMA wireless access networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0007/NQ41536.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Harmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.

Full text
Abstract:
Cloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secure access methods to protect data on the cloud infrastructure. The population for this study was cloud security managers employed by 2 medium size businesses in the Atlanta, Georgia metropolitan area and that have strategies to implement secure access methods to protect data on the cloud infrastructure. The technology acceptance model was used as the conceptual framework for the study. Data were collected from semi-structured interviews of 7 security managers and review of 21 archived documents that reflected security strategies from past security issues that occurred. Data analysis was performed using methodological triangulation and resulted in the identification of three major themes: implementing security policies, implementing strong authentication methods, and implementing strong access control methods. The findings from this research may contribute to positive social by decreasing customers' concerns regarding personal information that is stored on the cloud being compromised.
APA, Harvard, Vancouver, ISO, and other styles
8

KAKARAPARTHI, RAVIKIRAN. "ON PACKET SCHEDULING STRATEGIES FOR AD HOC NETWORKS." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin979934161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tombaz, Sibel. "Towards Green Wireless Access Networks : Main Tradeoffs, Deployment Strategies and Measurement Methodologies." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104328.

Full text
Abstract:
Wireless access networks today consume 0.5 percent of the global energy. Rapidly growing demand for capacity will further increase the energy consumption. Thus, improving energy efficiency has a great importance not only for environmental awareness but also to lower the operational cost of network operators. However, current networks which are optimized based on non-energy related objectives introduce challenges towards green wireless access networks. In this thesis we investigate the solutions at the deployment level and handle energy efficiency assessment issues in wireless access networks. The precise characterization of the power consumption of the whole network has a crucial importance in order to obtain consistent conclusions from any proposed solution at the network level. For this purpose, we propose a novel power consumption model  considering  the impact of backhaul for two established technologies, i.e., fiber and microwave, which is often ignored in the literature. We show that there is a tradeoff between the power saved by using low power base stations and the excess power that has to be spent for backhauling their traffic which therefore needs to carefully be included into energy efficiency analysis. Furthermore, among the solutions that are analyzed, fiber-based backhaul solution is identified to outperform microwave regardless of the considered topology. The proposed model is then used to gain a general insight regarding the important design parameters and their possible impact on energy- and cost oriented network design. To this end, we present a  high-level framework to see the main tradeoffs between energy, infrastructure cost, spectrum and show that future high-capacity systems are increasingly limited by infrastructure and energy costs where spectrum has a strong positive impact on both. We then investigate different network deployment strategies to improve the energy efficiency where we focus on the impact of various base station types, cell size, power consumption parameters and the capacity demand. We propose a refined power consumption model where the parameters are determined in accordance with cell size. We show that network densification can only be justified when capacity expansion is anticipated and over-provisioning of the network is not plausible for greener network. The improvement through heterogeneous networks is indicated to be highly related to the traffic demand where up to 30% improvement is feasible for high area throughput targets. Furthermore, we consider the problem of energy efficiency assessment at the network level in order to allow operators to know their current status and quantify the potential energy savings of different solutions to establish future strategies. We propose elaborate metric forms that can characterize the efficiency and a methodology that indicate how to perform a reliable and accurate measurement considering the complexity of wireless networks. We show the weakness of the current metrics reporting the "effectiveness" and how these might indicate disputable improvement directions unless they are properly revised. This illustrates the need for a standardized network level energy efficiency evaluation methodology towards green wireless access.

QC 20121109


Energy-efficient wireless networking (eWIN)
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmed, Saleh. "Strategies to Access Business Loans for Small and Medium Enterprises in Jordan." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7907.

Full text
Abstract:
Abstract Business financing is crucial to the development and performance of small and medium enterprises (SME) in developing countries. Obtaining loans by SMEs in Jordan is vital for creating employment, reducing poverty ratio, and augmenting SMEs growth. The purpose of this qualitative multiple case study was to discover strategies SME owners use to access credit. The population comprised of 3 SME owners in Jordan who successfully accessed credit. The conceptual frameworks for this study were the social capital theory and the pecking order theory. Data were gathered using semistructured interviews and companies' archived records. Data were analyzed using thematic analysis; three themes emerged to include sources of finance, education and skills, and social networking. The implications for positive social change include the potential to help SME leaders develop strategies to stabilize and grow their businesses. Business growth can create jobs and decrease poverty in Jordan.
APA, Harvard, Vancouver, ISO, and other styles
11

Garcia-Alis, Daniel. "On adaptive MMSE receiver strategies for TD-CDMA." Thesis, University of Strathclyde, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hornery, Daniel University of Ballarat. "A comprehensive profile of elite tennis and strategies to enhance match play performance." University of Ballarat, 2006. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12799.

Full text
Abstract:
"This dissertation illustrates an interdisciplinary sport science approach to further understand the interaction between physiology and performance in tennis. An integral theme throughout the experimental phases was the emphasis on obtaining information from actual competitive scenarios or settings that simulated a match environment. [...] This study extended the work of similar investigations through the multifaceted methods in which performance was quantified. Overall the thesis provides unique insight into the physiological demands of professional tournament tennis and the constraints these impose on performance. Furthermore, evidence was accrued to support some of the common preparatory and in-match behaviours used by players to enhance performance."
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
13

Hornery, Daniel. "A comprehensive profile of elite tennis and strategies to enhance match play performance." University of Ballarat, 2006. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14634.

Full text
Abstract:
"This dissertation illustrates an interdisciplinary sport science approach to further understand the interaction between physiology and performance in tennis. An integral theme throughout the experimental phases was the emphasis on obtaining information from actual competitive scenarios or settings that simulated a match environment. [...] This study extended the work of similar investigations through the multifaceted methods in which performance was quantified. Overall the thesis provides unique insight into the physiological demands of professional tournament tennis and the constraints these impose on performance. Furthermore, evidence was accrued to support some of the common preparatory and in-match behaviours used by players to enhance performance."
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
14

Morris, Linda E. "Strategies and tactics to access intuition: a look at the moment of solution." Diss., Virginia Tech, 1990. http://hdl.handle.net/10919/39198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rissler, Patrick S. "Food availability in rural Kansas: coping strategies for people living in low access food areas." Thesis, Kansas State University, 2015. http://hdl.handle.net/2097/18925.

Full text
Abstract:
Master of Arts
Department of Sociology, Anthropology, and Social Work
Gerad Middendorf
In the last 70 years, there has been a decline in population of rural Kansas. For example Gove, KS, the county seat of Gove County has seen a population decline of 355% from 284 in 1940 to 80 residents in the 2010 US Census (US Census). Along with general population decline in rural areas, is decline the overall number of farms, while the average farm size has increased (Kansas Dept. of Agriculture). The decline of the population of rural communities has caused the erosion of basic infrastructure, leaving many communities lacking access to basic services. One of the crucial components of the rural infrastructure is the rural grocery store. Since 2007, in Kansas communities with populations under 2,500 people, 82 grocery stores have closed. On average, rural Kansans now drive over 10 miles each direction to obtain their groceries. Proctor (2013) describes how the loss of a grocery store can affect a community: “Rural grocery stores are part of the economic engine that sustains rural communities," “they are a significant source of local taxes, powering the creation and maintenance of civic services and amenities. They provide essential, stable jobs – butchers, cashiers, managers, and stockers – at a time when we are desperate for employment opportunities.” The objectives of this study are to describe the food desert conditions of three rural communities in Kansas, to understand the trends regarding rural grocery stores, and to better understand the issues of access to healthy foods faced by people living in these areas.
APA, Harvard, Vancouver, ISO, and other styles
16

Mwangi, Nungari. "The power to flourish : unearthing the roots of Kenyan flower producers' market access strategies." Thesis, University of Cambridge, 2019. https://www.repository.cam.ac.uk/handle/1810/289438.

Full text
Abstract:
Powering Kenya's agricultural economy, the Kenyan flower industry is prided as an example of successful African integration into global agricultural trade. Export markets are bifurcated due to a marked shift from the Dutch flower auctions and an increase in trade within 'direct markets' which includes supermarkets and florists. While flower production is dominated by a few vertically integrated, large scale flower farms (>100 ha), mid-scale (20-80 hectares) and small-scale (>0.25 hectares) flower farms which are the focus of the thesis, face a unique set of challenges in terms of navigating access to the more stable direct markets. The overall narrative is that even in a buyer-driven market, Kenyan cut flower producers at the mid and small scale have agency, and they exercise their bargaining power for favourable export access by diversification and differentiation in strategies and networks. Two meta-narratives framing the sector coalesce around the development angle which showcases contestations around labour and environmental abuses and the political economy angle focusing on governance structures and power relations of production. This thesis goes deeper than these meta narratives by introducing micro-level, relational perspectives using the GPN framework, and asks what strategies Kenyan mid and small scale cut flower producers employ to navigate the shifts in export markets as producers diversify from the Dutch auctions towards supermarkets. My findings identify diversification as the common factor in mid and small scale producers' strategies for securing a range of lucrative export markets. Producers' enhance their bargaining power to access diverse markets through adaptable production, relationally through collective action, and in the regulatory sphere by circumvention, compliance or contestation for more favourable 'rules of the game'. Going beyond labour and environmental analyses, the thesis uniquely analyses the knowledge economy originating from the cut flower sector as an undertheorized aspect of its development impact.
APA, Harvard, Vancouver, ISO, and other styles
17

CORDEIRO, CARLOS DE MORAIS. "MEDIUM ACCESS CONTROL PROTOCOLS AND ROUTING STRATEGIES FOR WIRELESS LOCAL AND PERSONAL AREA NETWORKS." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1070579302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Garcia, Garcia Núria 1958. "Radio Resource Management strategies based hopfield neural networks." Doctoral thesis, Universitat Pompeu Fabra, 2009. http://hdl.handle.net/10803/7556.

Full text
Abstract:
Esta tesis doctoral se enmarca en la temática de Gestion de Recursos Radioelectricos en los sistemas de comunicaciones móviles, 3G, B3G y 4G. Como es ampliamente conocido los recursos radios son escasos, particularmente en los sistemas de comunicaciones móviles celulares, y en consecuencia es de uso obligado una gestión eficiente de los mismos. Desde un punto de vista práctico si bien estos sistemas se basan en el uso de tecnologías de acceso radio estandarizada, no es este el caso para los algoritmos subyacentes a la gestión de los recursos radio, de manera que siempre son posibles nuevas realizaciones de los mismos que resulten más convenientes en el marco del estándar en cuestión. Es en esta dirección hacia donde apunta la realización de esta tesis doctoral, y entiendo que lo consigue con éxito al introducir nuevas estrategias de Gestion de los Recursos Radio en el marco de las estrategias de múltiple acceso CDMA en los sistemas 3G, TDMA/CDMA en los sistemas B3G y OFDMA en los sistemas 4G. Esta tesis, tras identificar los gestores más usuales de gestión de recursos radio y una breve descripción de los mismos, introduce una descripción básicamente autocontenida de los aspectos más relevantes de los sistemas de acceso múltiple WCDMA y OFDMA. En este sentido se detallan mecanismos de su funcionamiento que con posterioridad serán utilizados en la definición y especificación de los algoritmos de gestión de recursos propiamente dichos. Con posterioridad se hace un breve recorrido sobre lo que son las redes neuronales , para finalizar en una exposición más detallada de las Redes Neuronales de Hopfield que serán el hilo conductor de los trabajos de esta tesis. En particular se describen las ecuaciones que caracterizan estas redes como sistemas dinámicos y se establecen sus condiciones de convergencia a través de los teoremas de estabilidad Lyapunov y la definición de la función Energía.De la conjunción de las particularidades de los sistemas de acceso WCDMA, TDMA y OFDMA y de las redes neuronales de Hopfield se van desarrollando una serie de algoritmos que operan en escenarios unicelulares y que entiendo novedosos y que a continuación enumeran brevemente.Admisión en un sistema WCDMA , enlace ascendente, mediante una gestión optimizada de las distintas velocidades de transmisión asignadas a los usuarios que comparten el acceso y que se les permite distintos perfiles. Aspectos relativos a la robustez del algoritmo, y en particular a su convergencia son también detallados. Se suponen restricciones de carga de la red máxima, repartición del espectro justa y potencia máxima disponible en los terminales móviles. Se suponen un servicio en tiempo real con velocidades variables. La probabilidad de bloqueo se usa para exhibir las prestaciones del algoritmo.Gestión de las velocidades de los usuarios ya admitidos en un sistema WCDMA,enlace ascendente, con objeto de garantizarles una definida probabilidad de satisfacción superior a un determinado valor y que está basada en las velocidades reales de transmisión asignadas. Se supone también un servicio en tiempo real con velocidades variables y las mismas restricciones que en Admisión. Gestión de las velocidades de los usuarios ya admitidos en un sistema WCDMA, enlace descendente, con objeto de garantizarles un máximo retardo en la entrega de paquetes. Se suponen restricciones de repartición del espectro justa y potencia máxima disponible en la estación de base. Se supone un servicio interactivo basado en un modelo de tráfico para servicios www. Se introduce también un algoritmo de referencia a efectos comparativos. La probabilidad de pérdida es el parámetro usado para valorar las prestaciones del algoritmo.Gestión combinada de servicios en tiempo real e interactivos en sistemas WCDMA, enlace descendente. Incorpora parte de los algoritmos anteriormente enunciados y se mantienen los mismos modelos de tráfico y las mismas restricciones. Se han usado en esta caso las probabilidades de satisfacción y de pérdida para capturar el la velocidad de transmisión agregada y retardo respectivamente Algoritmo de Gestión común de recursos radio para un escenario B3G donde un usuario puede ser servido por más de un acceso. En este caso se han usado WCDMA y TDMA. Algoritmos de Gestión de las velocidades de los usuarios ya admitidos en un sistema OFDMA, enlace descendente, con objeto de garantizarles un máximo retardo en la entrega de paquetes.La tesis apunta también hacia prometedoras futuras líneas de investigación que pretenden explotar la base de la metodología desarrollada en esta tesis y que consisten en escenarios celulares centralizadas para pasar después a distribuidas en entornos multicelulares y en particular para los sistemas OFDMA , base de los accesos en 4G.
APA, Harvard, Vancouver, ISO, and other styles
19

Gelabert, Doran Xavier. "Contribution to radio resource and spectrum management strategies in wireless access networks: a markov modeling approach." Doctoral thesis, Universitat Politècnica de Catalunya, 2010. http://hdl.handle.net/10803/77909.

Full text
Abstract:
Las redes inal´ambricas actuales exhiben caracter´ısticas heterog´eneas de acceso m´ultiple mediante el despliegue, la coexistencia y la cooperaci´on de varias Tecnolog ´ıas de Acceso Radio (RAT2). En este escenario, la prestaci´on de servicios multimedia garantizando una cierta calidad de servicio (QoS3) es obligatoria. El objetivo global de las redes heterog´eneas de acceso inal´ambrico consiste en sustentar la realizaci´on del concepto ABC (del ingl´es Always Best Connected), en el que un usuario est´a siempre conectado a la RAT que mejor satisface sus necesidades de servicio en cualquier momento, en cualquier lugar, de cualquier modo. En este sentido, las estrat´egias de gesti´on de recursos radio comunes [del ingl´es, Common Radio Resource Management (CRRM)] se dise˜nan para proporcionar una utilizaci´on eficiente de los recursos radio y de espectro radioel´ectrico dentro de la red heterog´enea, ofreciendo un mejor rendimiento en comparaci´on con la realizaci´on independiente de RRM en cada RAT. Adem´as, los recursos de espectro asignados a cada una de las RATs deben ser utilizado de manera eficiente, ya que se trata de un recurso escaso y costoso. En este sentido, conceptos y metodolog´ıas de radio cognitiva (del ingl´es Cognitive Radio o CR) se han aplicado a la gesti´on del espectro, permitiendo una compartici´on dinamico-oportunista del mismo. En estos casos, el espectro sujeto a licencia se abre hacia el acceso de usuarios sin licencia siempre que no perjudiquen y que el funcionamiento libre de interferencias est´e garantizado. Esta tesis analiza estrategias de gesti´on de recursos radio y de espectro para ofrecer un uso mayor y eficiente de los escasos recursos radio y de espectro con el objetivo final de aumentar al m´aximo la capacidad de usuario, garantizando los requerimientos de QoS. En concreto, estas tesis se centra primero en como seleccionar una RAT al inicio de una llamada/sesi´on (en adelante, selecci´on inicial de RAT) en una red de acceso heterog´enea. Un modelo de Markov ha sido desarrollado para definir la asignaci´on de m´ultiples servicios (multi-servicio) en m´ultiples RATs (multi-acceso). En este marco, varias pol´ıticas de selecci´on de RAT son propuestas y evaluadas, gen´ericamente clasific´andose en pol´ıticas basadas en servicio (SB4) y basadas en balanceo de carga (LB5). Adem´as, el rendimiento de las pol´ıticas de selecci´on de RATs en escenarios de acceso limitado debido a la deficiente cobertura radio, la falta de disponibilidad de terminales multi-modo y la incompatibilidad entre RAT y servicios tambi´en es evaluada. Principios espec´ıficos para la asignaci´on de servicios a RATs ser´an provistos en los escenarios antes mencionados con el objetivo general de aumentar la capacidad de usuarios, garantizando los requisitos m´ınimos de calidad de servicio. Finalmente, la congesti´on en el acceso radio tambi´en se trata en este escenario multi-acceso/multi-servicio y el impacto de la selecci´on de RAT evaluado. Los principios para la asignaci´on inicial de RAT con tal de evitar la congesti´on radio ser´an tambi´en proporcionados. En segundo lugar, esta tesis investiga sobre la forma de maximizar el uso eficiente del espectro sujeto a licencia (o licenciado) por medio del acceso din´amicooportunista de espectro a usuarios sin licencia. En este sentido, se concibe un modelo de Markov para captar el problema del uso compartido de espectro entre usuarios con y sin licencia. Un modelo basado en sensado de espectro se propone con el fin de detectar porciones de espectro no utilizados (en ingl´es white spaces) que pueden ser usados por los usuarios sin licencia mientras este siga libre. En este marco, los beneficios obtenidos de la compartici´on del espectro son investigados y las ventajas que implican evaluadas. En concreto, se eval´ua el rendimiento obtenido al ajustar el punto de funcionamiento (en ingl´es operating point ) del mecanismo de sensado, el cual determina los errores de no-detecci´on y falsa-alarma. Por otra parte, sistemas de canalizaci´on de espectro fijos versus adaptativos ser´an propuestos y analizados bajo dos disciplinas de servicio diferentes, cuya duraci´on (o tiempo de permanencia en el sistema) esta basada en tiempo y en contenido respectivamente.
Current wireless networks exhibit heterogeneous multi-access features by means of the coexisting and cooperative deployment of several Radio Access Technologies (RATs). In this scenario, the provision of multimedia services with ensured Quality of Service (QoS) is mandatory. The overall goal of heterogeneous wireless access networks is to enable the realization of the Always Best Connected concept in which a user is seamlessly connected to the RAT best suiting its service requirements anytime, anywhere, anyhow. In this sense, Common Radio Resource Management (CRRM) strategies are devoted to provide an efficient utilization of radio resources within the heterogeneous network offering improved performances as opposed to performing stand-alone RRM in each RAT. In addition, allocated spectrum resources to each RAT must be efficiently utilized since it is a scarce and expensive resource. In this respect, cognitive radio concepts and methodologies have been applied to spectrum management by enabling dynamic/opportunistic spectrum sharing. In these scenarios, licensed spectrum is opened towards unlicensed access provided a non-harmful operation is guaranteed. This dissertation discusses both radio resource and spectrum management strategies to provide an utmost and efficient use of scarce radio/spectrum resources with the overall goal of maximizing user capacity while guaranteeing QoS constraints.Specifically, the thesis is first focused on how to select an appropriate RAT upon call/session initiation (henceforth, initial RAT selection) in a heterogeneous access network. A Markovian framework is developed to such extent supporting the allocation of multiple service-type users (multi-service) on multiple RATs (multi-access). Under this framework, several RAT selection policies are proposed and evaluated, broadly categorized into service-based (SB) and load-balancing (LB). In addition, the performance of RAT selection policies in access-limited scenarios due to poor radio coverage, non multi-mode terminal availability and RAT-service incompatibility is also evaluated. Specific guiding principles for the allocation of services on several RATs are provided in the abovementioned scenarios with the overall goal of increasing user capacity while guaranteeing minimum QoS requirements. Finally, radio access congestion is also addressed in this multi-access/multi-service scenario and the impact RAT selection assessed. Suitable allocation principles avoiding congestion are also provided.Secondly, this dissertation investigates on how to efficiently maximize the use of licensed spectrum by means of dynamic/opportunistic unlicensed spectrum access. Hereof, a Markovian framework is also devised to capture the problem of licensed spectrum sharing towards unlicensed users. A sensing-based spectrum awareness model is proposed in order to detect unused spectrum (so-called white spaces) which may be accessed by unlicensed users while remaining unused. Under this framework, the benefits of spectrum sharing are investigated and the involved gains assessed. Specifically, the sensing-throughput tradeoff and the adjustment of the sensing mechanism’s operating point, which tradeoffs missed-detection and false-alarm errors, is evaluated. Moreover, fixed vs. adaptive spectrum channelization schemes are proposed and analyzed under two different service disciplines considering time-based and volume-based content delivery.
APA, Harvard, Vancouver, ISO, and other styles
20

Mami, Mohamed Nadjib [Verfasser]. "Strategies for a Semantified Uniform Access to Large and Heterogeneous Data Sources / Mohamed Nadjib Mami." Bonn : Universitäts- und Landesbibliothek Bonn, 2021. http://d-nb.info/1229989129/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Spaulding, Randall S. "Access, opportunity, and choice : developing financial aid packaging strategies to facilitiate choice in higher education /." Thesis, Connect to this title online; UW restricted, 2003. http://hdl.handle.net/1773/7891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wong, Wai Yee Peter. "Design and performance evaluation of access methods and heuristic techniques for implementing document ranking strategies /." The Ohio State University, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=osu14877581782358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Aragaw, Zereay. "Mainstreaming sustainable energy access in the development planning proccess of Ethiopia." Thesis, KTH, Energi och klimatstudier, ECS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103470.

Full text
Abstract:
For least developing countries with large rural population living in severe poverty such as Ethiopia, access to modern and sustainable energy services is a real challenge. Dealing with the lack of modern energy services at local level and the needs for economic development at national level is a major challenge in the policy and decision making process. This particular study takes the case of Ethiopia to investigate the existing challenges and future prospects of mainstreaming sustainable energy access into the country’s development planning process, and the consequences for international development financiers, national policy makers, private actors and local energy planners and experts. The roles and approaches of various developmental agencies are reviewed based on the effectiveness and sustainability of cooperation models with governmental institutions. To this end, this study establishes an understanding of institutional, financial and policy elements related to both state and non-state actors. Accordingly, readiness of the rural energy sector to adopt sector–perspective and national development approaches to mainstream sustainable energy access is investigated. The thesis emphasizes the need for all stakeholders to cooperate and take advantage of local potentials and external opportunities in light of the new momentum for sustainable energy access in the global agenda.
APA, Harvard, Vancouver, ISO, and other styles
24

Humphrey, Keith Bonhard. "Institutional Positioning in Growth States: Influencers and Strategies of Enrollment Managers at Public Research Universities." Diss., Tucson, Ariz. : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1355%5F1%5Fm.pdf&type=application/pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Figueroa-Armijos, Maria A. Valdivia Corinne B. "Strategies to develop market access in the Bolivian highlands two case studies for Chuño and Tunta /." Diss., Columbia, Mo. : University of Missouri--Columbia, 2009. http://hdl.handle.net/10355/6456.

Full text
Abstract:
Title from PDF of title page (University of Missouri--Columbia, viewed on Feb 17, 2010). The entire thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file; a non-technical public abstract appears in the public.pdf file. Thesis advisor: Dr. Corinne Valdivia. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
26

Sosah, Victor K. (Victor Kofi). "Emerging economies access to capital and risk management strategies : a case study of Ashanti Goldfields Corporation." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Zobel, Gosia. "Beef feedlot cattle use individual feeding strategies to gain access to feed in a competitive environment." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/32281.

Full text
Abstract:
Cattle are social animals and frequently interact with other members of their social group, especially when access to food is limited. Despite considerable interest in the social behavior of cattle, no research has focused on assessing the relationship between competition and the feeding behavior of individual feedlot cattle housed in small groups. Forty-five British crossbred feedlot heifers (520.5 ± 32 kg BW) were used to determine how successful competitive interactions impacted an individual's ability to consume and gain access to feed in a competitive feeding environment. Heifers were randomly assigned to 3 pens of 15 animals. Pens were fitted with two radio frequency equipped feed tubs that monitored individual dry matter intake and bunk attendance duration. Cattle were fed a total mixed ration once daily consisting of barley silage, concentrate and mineral supplement at 0900, 1200 and 1500 and had ad libitum access to both feed and water. All competitive interactions at and around the feed tubs were monitored continuously from 0900 to 2200 on three separate days. Animals were considered successful if they either gained access to feed, or if they were already eating, they maintained their position. There was a positive relationship between the number of successful interactions displayed and dry matter intake (R² = 0.26, P = 0.0003), bunk attendance duration, (R² 0.45, P < 0.0001) and bunk attendance frequency (R² = 0.49, P < 0.0001). The strength of these relationships varied dramatically throughout the day and was strongest in the first hour after feed delivery between 0900 and 1000. Large variation between individuals suggests that different animals develop individual feeding strategies in competitive environments. Animals used competition, varied eating rate, and shifted feeding times to access feed. Although this study suggests that the success of an animal in competitive interactions at the feedbunk plays a role in its ability to access and consume feed, individual behavioral differences also play a significant role.
Land and Food Systems, Faculty of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
28

North, Monica Lynn. "Strategies to change organizational culture : using intragroup variations in perceptions of access to privilege to understand the effects of diversity strategies on intergroup attitutdes." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/11880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Trebouet, Florian (Allen. "MALE REPRODUCTIVE STRATEGIES IN WILD NORTHERN PIG-TAILED MACAQUES (MACACA LEONINA): TESTING THE PRIORITY-OF-ACCESS MODEL." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/dissertations/1765.

Full text
Abstract:
Among multi-male, multi-female primate groups, males engage in direct contest competition for access to mates. The priority-of-access model (PoA model) generally predicts that male reproductive success increases with male dominance rank, but the strength of this relationship is expected to decrease with increasing female reproductive synchrony, particularly in seasonally breeding primates. Genetic paternity studies support the model’s predictions, having found a positive relationship between male dominance rank and reproductive success. However, in addition to dominance status and female reproductive synchrony, a number of proximate factors also impact males’ ability to sire offspring, which have not been considered in studies of male reproductive strategies.By integrating behavioral, genetic, morphological, and hormonal analysis as more direct measures of reproductive success in individual males, this dissertation investigated the relationship between male dominance rank and reproductive success and including the proximate factors affecting this relationship in wild northern pig-tailed macaques (Macaca leonina). The main objectives of this study are: 1) to identify the relationships between male dominance rank, male mating success, and male reproductive success, and assess to what extent female synchrony affects these relationships; 2) to identify the proximate factors that may reduce the reproductive success of the top-ranking male and assess variation in male mating tactics related to dominance rank and migration status (i.e., resident males vs. extra-group males); and 3) to evaluate the function of males’ red ornaments that may be used to signal male dominance status (male-male competition) to attract females (female mate choice) or both. The study was conducted at Khao Yai National Park, northeastern Thailand. Systematic data collection on CH group occurred from September 2015-June 2017. The group composition was recorded daily as well as births, deaths, individual emigrations and immigrations, females’ parity status, and the presence of extra-group males (EGMs). Sociosexual data and male-female interactions (i.e., copulations, ejaculatory copulations, consortships, grooming, female proceptive behaviors and receptive behaviors) were recorded during females’ receptive periods. To assess male reproductive success, genetic paternity analyses were conducted on fecal DNA samples collected from 18 adult and subadult males, 22 adult females, and 25 juveniles and infants. To measure red skin coloration of males, hindquarter images were collected non-invasively for seven adult males. From those images, skin color and luminance were computationally quantified to assess variation in male anogenital reflectance. Lastly, fecal samples were collected from nine adult males to assess monthly levels of fecal testosterone by microtitreplate enzyme immunoassay. The distribution of births and matings suggested that northern pig-tailed macaques, at least in this group, are best categorized as moderate seasonal breeders. Indeed, 33-67% of births occurred within a three-month period. Copulation data revealed a positive relationship between male dominance rank and mating success, supporting the predictions of the PoA model. However, the distribution of male reproductive success indicated that: 1) high-ranking males controlled a proportion of paternity much lower than predicted by the PoA model; 2) middle-ranking males controlled a proportion of paternity higher than predicted by the model; and 3) EGMs, not considered in the PoA model, controlled a surprisingly large proportion of paternity despite a low observed mating success. When females were simultaneously receptive, lower-ranking and subadult males engaged in opportunistic and surreptitious copulation and avoided direct competition with higher-ranking males, and most females approached and mated with EGMs out of the resident adult males’ sight. However, one EGM also mated in full sight of resident adult males. This is the first study to report mating and successful paternity by EGMs in a moderately seasonally breeding species.Four male mating tactics were identified: 1) the top-ranking resident male tactic, in which the male competes for the alpha male position to control priority of access to receptive females through long consortships and copulations; 2) the lower-ranking resident male tactic, in which the male copulates opportunistically and surreptitiously out of sight of higher-ranking males mostly during the mating peak; 3) the subordinate EGM tactic, in which the male lives semi-solitarily and copulates opportunistically and surreptitiously, mostly during the mating peaks; and 4) the super-dominant EGM tactic, in which the EGM copulates irrespective of the presence of other males and in full sight of even the highest-ranking resident male. In addition, I found support for female mate choice. Darker and redder males had more mating partners, received more female proceptive behaviors, and were engaged in more consortships and grooming with receptive females. Furthermore, males became redder and darker as female reproductive synchrony increased. Together, these results suggest that male red ornaments exhibited in the male’s anogenital area is attractive to females. Furthermore, behavioral evidence of female mate choice towards EGMs was found. This dissertation provides a comprehensive picture of the complex male mating tactics of northern pig-tailed macaques. To achieve reproductive success, males engage in a diversity of mating tactics, strongly influenced by male dominance rank and the degree of female reproductive synchrony. However, mate-guarding costs, surreptitious copulations by lower-ranking males and EGMs, and female mate choice, need to be included in an extended version of the PoA model to provide stronger predictions of the distribution of male reproductive success in primates.
APA, Harvard, Vancouver, ISO, and other styles
30

Sheppard, Linda Maria Christina. "Exploring strategies for improving access to everyday action routines in people with dementia of the Alzheimer type." Thesis, University of Sussex, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.400389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hasna, Fadia Shawqi Ali. "Strategies to widen access to family planning in the Arab world : a case study of Zarqa, Jordan." Thesis, London School of Hygiene and Tropical Medicine (University of London), 2002. http://researchonline.lshtm.ac.uk/682253/.

Full text
Abstract:
This thesis identifies the constraints to FP utilisation at the policy, service, community and household levels based on the perspectives of policy makers, providers of services, and men and women in different communities of Jordan. It contributes strategies to widen access to FP that are transferable to other countries of the Middle East and the developing world. The policy environment is analysed to assess whether it encourages or deters FP utilisation. The National Population Strategy is highlighted. Improving co-ordination between the different policy players is a major challenge faced in its implementation. FP utilisation is portrayed in four clinics using different models of provision. Service statistics, clinic observations, in-depth interviews, focus and natural group discussions are used to compare the degree of access to FP. Strengthening co- ordination mechanisms between the service providers is an important strategy to increase FP utilisation. The findings suggest that FP decisions are mostly influenced by men who remain concerned, to a varying degree, with the permissibility of FP utilisation in Islam. A culturally competent strategy proposed to increase utilisation is to communicate to men that FP is permissible in Islam. Religious men are proposed vehicles for implementing this communication strategy, basing their discourse on socio-cultural tradition, namely Islamic jurisprudence. The thesis has three sections introduction, findings and conclusions. Chapter One explores the literature. Chapter Two reviews the Jordanian setting. Chapter Three sets out the methods used in this research. Chapter Four examines the policy environment and policy makers' perspectives. Chapters Five to Eight explore the models of service provision concluding with an evaluation of the strengths and weaknesses of the different models. Chapter Nine elaborates on the community's perspectives. Chapter Ten is the concluding chapter that sets out strategies to widen access to FP, by utilising the socio-cultural context of the region.
APA, Harvard, Vancouver, ISO, and other styles
32

Van, der Merwe David Jacobus. "The use of partitioning strategies in local access telecommunication network problems and other applications / D.J. van der Merwe." Thesis, North-West University, 2007. http://hdl.handle.net/10394/1887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Bonder, Emma. "Får jag vara med? : Tillträdesstrategier och uteslutningsstrategier i förskoleklassens fria lek." Thesis, Karlstads universitet, Institutionen för pedagogiska studier (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71114.

Full text
Abstract:
Abstract The purpose of this study is to provide knowledge about how children in a preschool class use access strategies and exclusion strategies in the free play. Also why children exclude each other during play. The questions of the study are: What access strategies do children in preschool class use during the free play? What exclusion strategies do children in preschool class use during the free play? Why do children exclude each other during play? To investigate this, I have been non-participating observer in a preschool class. I have used the fifteen access strategies of William Corsaro (1979) and Tellgren's (2004) eight exclusion strategies. The result of the study shows that the preschool class children often use verbal access strategies together with nonverbal strategies. And that those strategies together are more successful than to only use the non-verbal access strategies. The results also indicate that the children's exclusion strategies take place more discreet and inside the play. The children exclude each other to protect their established communities or play groups. The children at the top of the hierarchy are the ones who determines which ones should be included and excluded. My conclusion is that children are skilled users of play strategies and they learn from each other what access strategies are working and what exclusion strategies are being accepted by other children and by the teachers.
APA, Harvard, Vancouver, ISO, and other styles
34

Khelifi-Touhami, Rahmouna. "An examination of the factors affecting women's access to land and implications for livelihood strategies in north-western Syria." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ55685.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kannan, Arumugam. "Communication Strategies for Single-User and Multiuser Slow Fading Channels." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19850.

Full text
Abstract:
Technological progress in the field of wireless communications over the past few years has only been matched by the increasing demand for sophisticated services at lower costs. A significant breakthrough was achieved in the design of efficient wireless communication systems with the advent of the diversity concept. Spatial diversity exploits the availability of multiple spatial paths between the transmitter and receiver by placing antenna arrays at either end. In addition to improving the reliability of communication by creating redundant copies of the transmitted information at the receiver, wireless transceivers with multiple antennas exploit the spatial degrees of freedom to multiplex multiple streams of data and achieve significant gains in spectral efficiencies. In this thesis, we design spatial diversity techniques for slow-fading wireless channels. There are two parts to this thesis: In Part I we propose spatial diversity techniques for point-to-point single-user wireless systems, while in Part II we propose multiuser cooperative diversity techniques for multiuser wireless communication systems. In the first part, we propose a set of new wireless communication techniques for multiple-input, multiple-output (MIMO) channels over Rayleigh slow-fading wireless channels. We introduce MIMO transceivers that achieve high data rates and low error rates using a class of MIMO systems known as layered space-time (ST) architectures, which use low complexity, suboptimal decoders such as successive cancellation (SC) decoders. We propose a set of improved layered space-time architectures and show that it is possible to achieve near-optimal error performance over MIMO channels while requiring just SC decoding at the receiver. We show that these architectures achieve high rate and diversity gains. We also show that some of the proposed layered space-time architectures could find applications in multiple-access communications as low-complexity solutions for achieving near-optimum performance. In the second part of this thesis, we propose novel techniques for cooperative communication between terminals in multiuser wireless communication systems. Cooperative communication is a concept where neighboring terminals share their antennas and signal processing resources to create a virtual transmit array . In addition to transmitting their own information, users in a cooperative communication system listen to transmission from other users and relay this information to the destination, thus creating multiple paths between transmitter and receiver. This form of diversity, known as cooperative diversity, helps improve the overall reliability of all the users in a network. We start with a simple three node multiple-access system where two users are communicating with a common destination. We propose new high-rate cooperation strategies which achieve the full diversity gain offered by the cooperative channel for this simple system. We propose a new framework to address the tradeoff between cooperation and independent transmission over a multiple access channel and determine the conditions under which each idea is better than the other. Finally, we propose a high rate cooperation protocol which achieves the maximum diversity over a multiple access system with an arbitrary number of users and achieves high rates which scale favorably as the number of users increases.
APA, Harvard, Vancouver, ISO, and other styles
36

Smith, Peter George. "Competitive Strategies of Minority-Owned Small Businesses." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6499.

Full text
Abstract:
Leaders of minority-owned businesses earn less revenue on average than their nonminority counterparts, even when both sets of leaders operate in the same industries. Among the factors leading to this earnings discrepancy is the lack of access that leaders of minority-owned businesses have to high-revenue opportunities. The purpose of this multiple case study was to explore the strategies that some leaders of minority-owned small businesses use to compete for contracts in high-revenue industries. The study population comprised 3 owners of minority-owned small marketing consultancy firms headquartered in the Southeastern United States. Teece and Pisano’s dynamic capabilities view served as the conceptual framework for this study. Data were collected through semistructured interviews and the review of company documents. The data analysis process included member checking to ensure credibility of the interpretation of the information gathered during the interviews, and methodological triangulation of the data sources to establish data validity. Four themes emerged from the analysis: positioning and targeting, capabilities and competencies, pricing and returns, and relevancy and longevity. The themes are critical success factors for competing for contracts in high-revenue industries and may be beneficial to the leaders of minority-owned small businesses in seeking contracts in similar or parallel industries. Leaders who apply the study findings may earn incremental revenues to effect positive social change through additional job creation and community development activities, benefiting local economies and residents.
APA, Harvard, Vancouver, ISO, and other styles
37

Kpentey, Bennet. "Small Business Merger and Acquisition Strategies for Raising Capital in Emerging Economies." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6447.

Full text
Abstract:
About 70% of mergers and acquisitions (M&As) involving small and medium-sized enterprises (SMEs) in emerging economies fail because the strategies employed do not integrate all the critical success elements, leaving SMEs without the needed capital to take advantage of strategic and market opportunities. The purpose of this multiple case study was to explore the M&A strategies SME owners in Ghana employed to raise capital. Seth's value creation theory was the conceptual framework adopted for this study. The population consisted of 5 SME owners in Ghana who had successfully raised financial resources through inbound M&As within the past 10 years. Data were collected through semistructured interviews and review of corporate annual reports and M&A documents. The data were organized and analyzed using Yin's 5-step data analysis and cross-case synthesis techniques to identify patterns and emergent themes. The 6 themes that emerged from the analysis were value creation, control and autonomy, entrepreneurial quality, leadership, trustworthiness, and effective negotiation. SME owners can integrate entrepreneurial quality and effective negotiations to achieve successful closure of M&A deals. The findings of this study might facilitate SME access to capital for expansion and growth that will contribute to positive social change through job creation and increased youth employment in emerging economies.
APA, Harvard, Vancouver, ISO, and other styles
38

Lipkins, Lisa. "Strategies Used by African American Women to Secure Financial Capital to Start New Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7936.

Full text
Abstract:
Women-owned businesses continue to drive economic growth in the United States. However, some African American businesswomen lack strategies to obtain capital to start their business. Strategies to obtain funds for a startup is vital to African American women seeking to start and sustain their businesses. Guided by entrepreneurial theory, the purpose of this qualitative multiple case study was to explore strategies African American women use to secure financial capital to start new businesses. The participants included 6 African American women business owners in Atlanta, Georgia, with successful experience in utilizing strategies to secure financial capital to start new businesses. Data were collected from semistructured interviews and company documents. Yin's 5-step analysis was used to analyze the data. The main themes were challenges of being an African American business woman, motivating factors leading to business ownership, and overcoming bank financing challenges. The implications for positive social change may include addressing the disparity of social, human, and financial capital to start new businesses among African American women.
APA, Harvard, Vancouver, ISO, and other styles
39

Feibelman, Susan L. "Becoming visible| Necessary strategies of action utilized by female educators to gain access to formal leadership roles in independent school settings." Thesis, University of Pennsylvania, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3592285.

Full text
Abstract:

Similar to staffing patterns in public school systems, the majority of faculty employed in the 1,174 National Association of Independent Schools (NAIS) member schools are women, suggesting that school leadership pipelines are filled with female faculty, along with middle- and senior-level administrators who demonstrate daily their executive leadership capacity. Yet women remain unable to achieve access to head of school leadership positions at a rate equal to their male colleagues. Utilizing qualitative research methods and the lens of post-structuralist feminist theory, this phenomenological study examines the gendered nature of leadership roles in independent schools and the ways this cultural phenomenon informs the strategies used by African American and White women seeking mentor-protégé relationships, networks of support, and sponsorship from "recognized" independent school leaders. Utilizing a feminist framework to examine the cultural context that informs women's leadership preparation (Olesen, 1994, 2003), semi-structured interviews were conducted with 16 participants whose lived experience as independent school leaders and/or as executive search consultants for independent schools illuminated points of tension between settled and unsettled periods in the lives of aspiring women leaders and explored the strategies of action (Swindler, 1986) used to negotiate points of discursive disjunction (Chase, 1995, 2003). This study contributes to the present discourse regarding the role gender plays in the normalization of independent school leadership, proposes questions for further inquiry, and suggests strategies of action for independent school communities, trustees, and professional organizations to use when crafting policy, planning leadership training/development, and succession planning that addresses gender disproportionality.

APA, Harvard, Vancouver, ISO, and other styles
40

Matla, Moratwa Tsholofelo Hope. "The contribution of food access strategies to dietary diversity of farm worker households on Oranje farm in the Fouriesburg district (RSA)." Diss., Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-06132008-140330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Di, Vito Lorraine. "Institutional configurations and access to critical resources : a comparative study of the innovation strategies of British and Dutch dedicated biotechnology firms." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509947.

Full text
Abstract:
This PhD research is framed in the comparative capitalism literature and investigates how entrepreneurs in the pharmaceutical biotechnology industry acquire financial resources and management expertise from their national institutional frameworks. Institutional theory generally claims that given the variety of national institutional frameworks firms adopt strategies that complement the inherent institutional advantages of their respective institutional environments. Many studies confirm that particular institutional frameworks encourage specific innovation patterns (Almeida and Kogut, 1999; Casper 2007; Casper and Murray, 2005; Casper and Whitley, 2004; Saxenian, 1994; Whitley, 1999); however much less attention has been given to understanding the affects that individual firms have on changing and recombining institutional advantages to create alternative paths (Crouch, 2005). The perceived success of the US biotech industry, and especially the Silicon Valley model (Casper, 2007; Saxenian, 1994) has stood out as an example to other nations and provided a blueprint to jumpstart an industry. Yet, the question that continues to be raised is: can national economies that have fundamentally different institutional environments orchestrate the Silicon Valley model through policy? What happens to firms and institutions when policy initiatives encourage innovation strategies that are incoherent with their national systems? And what kinds of adjustments do firms make to compensate for the shortcomings in the system? Focusing on British and Dutch dedicated biotechnology firms (OBFs), this research offers insight into several aspects of (pharmaceutical) biotechnology entrepreneurship. First, the idea of a 'purely' radical biotechnology industry is challenged and 'typical' business models are identified distinguishing between the level of uncertainty in these business models and the level of appropriability risk. The findings show that there are varying levels of technological uncertainty in DBF business models and that firms in institutional contexts that constrain access to critical resources use these models as a 'growth path' from relatively low-risk strategies to relatively high-risk strategies. The main fmdings show that there is a relationship between the type of business model and the type of fmancing path followed. In addition, the type of financing path followed is contingent on the capabilities and experience of the founding management team. For example, British DBFs that originated from industry environments and had highly experienced founding management teams and executive board members bypassed venture capital and raised external financing through public equity exclusively. In contrast, the Dutch cases show how firms, faced with constraints in the financial and labour systems, create alternative paths in order to follow high-risk innovation strategies. In terms of financial resources, Dutch DBFs use international sources to secure financing. In terms of managerial expertise, Dutch founders struggle to acquire the appropriate managerial expertise due to the lack of a robust social network that facilitates the movement of labour. Dutch founders, therefore, rely primarily on their own skills to fulfil various roles of a management team for a much longer time than their British counterparts.
APA, Harvard, Vancouver, ISO, and other styles
42

Fields, Zenobia L. "Using Public Policy to Promote Community Economic Development." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/9891.

Full text
Abstract:
This study is being conducted in the interest of discovering changes that can be made in transportation and workforce policy to promote economic development. These changes will revolve around the amalgamation of place-based and people-based strategies with an emphasis on investment in people. The people-based strategies will relate to transportation policy, while place-based strategies will pertain to workforce policy. The following research questions will be answered: What people-based policy changes need to occur through collaborative efforts to foster environments in urban areas that synthesize upward mobility through workforce development? What are the advantages of place-based and people-based strategies? How can transportation policy like Job Access and Reverse Commute grant programs, a people-based strategy, be changed to produce greater outcomes? What lessons can be learned from products of workforce development policy such as one-stop centers, a place-based strategy, in terms of performance? To answer these questions, the investigation uses case studies of Job Access and Reverse Commute grant and one-stop center programs, with the intent of deriving a framework for interagency coordination strategies. The case studies include the Northern Jersey Transportation, the Baltimore Metropolitan Regional Transportation and the Portland, Oregon Tri-Met Plans. In addition, one-stop centers within the same three regions were examined for potential connections. A comparative analysis of all the case studies will be performed focusing on six major components in order to propose a policy framework that includes federal influence, governance structure, mechanism to connecting with the marker, feedback mechanisms, incremental career step provisions, and accountability systems.
Master of Urban and Regional Planning
APA, Harvard, Vancouver, ISO, and other styles
43

Gorbaty, Emily. "Development of an efficient off-grid pumping system and evaporation reduction strategies to increase access to irrigation for smallholder farmers in India." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85225.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2013.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 216-223).
Due to the unavailability of electricity, about 85% of groundwater irrigation in eastern India employs fuel-powered surface pumps, which can have system efficiencies as low as 5%. As fuel prices continue to rise, impoverished smallholder farmers cannot afford the operation costs of their systems and, as a result, irrigate less land. This research aimed to develop a more efficient off-grid system that eliminates suction head while continuing to utilize a fuel engine on the surface. Design requirements included increased discharge, increased efficiency, portability, maintainability, availability of replacement parts, and affordability. Flow rates and efficiencies of Indian pumps at varying pressure heads were tested to establish baseline performance and test the hypothesis that removing suction lift reduces operation costs. It was found that eliminating suction head can decrease operation costs up to 44% for the farmers. Fuel-driven system options investigated include flexible shafts and telescoping shafts to transmit power from a surface engine to a submersible pump, fluid machinery such as semi-open hydraulic systems, jet pumps, compressed air motors, and air lifts, and off-grid electricity generation employing a household backup generator or automotive alternator. However, none of these alternatives met all the design requirements. Instead, a hybrid motorized-manual rope pump was prototyped and tested on a well in Ruitola, Jharkhand. Although this system does not meet all the design requirements, it has the added benefit of providing domestic water supply. The prototype discharged an average of 155.4 L/min in motorized mode and 17.2 L/min for men and 13.3 L/min for women in manual mode. The rope pump received positive feedback from the users and thus could be taken forward with several modifications to improve performance. To increase the available water resources, evaporation reduction strategies to limit water loss from farm tanks were explored. The strategies employed waste materials and included covering a water surface with waste PET bottles and floats comprised of PET waste bottles and old saris. While waste bottles proved promising in a preliminary test, data in a larger experiment has thus far proved inconclusive and further testing is needed.
by Emily Gorbaty.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
44

Thorley, Lisa. "Holding on : gender relations, food security and women's options and strategies for maintaining access to land in the Acholi region of Uganda." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/12743.

Full text
Abstract:
This research is based on fieldwork that was carried out in the post-conflict villages of Adunu and Kom in the Acholi region of northern Uganda. It argues that a woman’s maintained access to customary land within these villages is determined not only by her sex and by provisions within Acholi customary law, but also by her marital and parental status as framed by patriarchal ideologies and power relations. It shows that if women wish to retain and hold on to land that is socially (and sometimes, legally) meant to be ‘theirs’, they must be prepared constantly to bargain and negotiate with either their husband, their husband’s lineage or their own natal clan. They must also conform to gendered norms concerning female behaviour, especially those that pertain to their sexuality and reproductive abilities. It is by adopting such strategies and, often, by making concessions, that they will be able to, in most cases, maintain access to land, particularly if land is in abundance. The thesis also shows that women’s food security is contingent on the gendered relations that they have and maintain with male family members and also on factors that are external, be these climate change or their ability to farm effectively. By looking at the relevance of gender relations in land access and food security, through a gender awareness lens and a feminist ethnography, this thesis provides a nuanced understanding of how women maintain access to customary land and how they can achieve food security, albeit within a male dominated system.
APA, Harvard, Vancouver, ISO, and other styles
45

Thorley, Lisa. "Holding on: gender relations, food security and women’s options and strategies for maintaining access to land in the Acholi region of Uganda." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/12743.

Full text
Abstract:
This research is based on fieldwork that was carried out in the post-conflict villages of Adunu and Kom in the Acholi region of northern Uganda. It argues that a woman’s maintained access to customary land within these villages is determined not only by her sex and by provisions within Acholi customary law, but also by her marital and parental status as framed by patriarchal ideologies and power relations. It shows that if women wish to retain and hold on to land that is socially (and sometimes, legally) meant to be ‘theirs’, they must be prepared constantly to bargain and negotiate with either their husband, their husband’s lineage or their own natal clan. They must also conform to gendered norms concerning female behaviour, especially those that pertain to their sexuality and reproductive abilities. It is by adopting such strategies and, often, by making concessions, that they will be able to, in most cases, maintain access to land, particularly if land is in abundance. The thesis also shows that women’s food security is contingent on the gendered relations that they have and maintain with male family members and also on factors that are external, be these climate change or their ability to farm effectively. By looking at the relevance of gender relations in land access and food security, through a gender awareness lens and a feminist ethnography, this thesis provides a nuanced understanding of how women maintain access to customary land and how they can achieve food security, albeit within a male dominated system.
APA, Harvard, Vancouver, ISO, and other styles
46

Oo, The Nu Sandar. "Dive into the Hunger Pool: Exploring Students’ Experiences, Coping Strategies, and Suggestions Related to Elements of Food Security at the University of Kentucky." UKnowledge, 2019. https://uknowledge.uky.edu/foodsci_etds/68.

Full text
Abstract:
Background: College food insecurity (CFI) is a prevalent social justice and public health issue in the U.S. with the prevalence ranging between 15-59%. Though numerous quantitative studies were first conducted in the past decade, little qualitative research was conducted to assess CFI. Objective: To explore and deeply understand the contexts of CFI at a land-grant university in Kentucky. Methods: This qualitative study used a validated food insecurity survey tool and hour-long focus groups that were audio recorded and transcribed. Three theoretical models were combined into an adapted model and utilized for the thematic analysis. Results: Thirty-three students participated in one of eight different focus groups. Among participants, 72.7% were female, 81.9% were undergraduate students, and 63.6% were food insecure. Access-related themes included transportation, time-related issues, awareness of resources, coping strategies and suggestions for improvements; availability-related themes consisted of city- and campus-wide availability of food choices and coping strategies; utilization-related themes constituted dietary needs and coping strategies; and stability-related themes involved disrupted element(s) of food security and their effects on well-being and academics. Conclusion: All elements of food security need to be fulfilled to achieve a sustainable food security. For future CFI studies, the use of theoretical framework(s) is recommended.
APA, Harvard, Vancouver, ISO, and other styles
47

Wilson, Patricia Lynn. "Educational strategies meet the needs of Juvenile offenders." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Roshamre, Ingela. "Barns samlärande i förskolan." Thesis, Karlstads universitet, Institutionen för pedagogiska studier, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-66948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bocian, James Brian. "Parental Involvement in the Digital Age: Examining Parental Access to Student Web Portals in Grades 7-12." University of Findlay / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=findlay1472765461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Dilag, Bayani C. "Access issues associated with U.S. Military presence in Thailand and the Philippines /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDilag.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2005. Thesis (M.S. in)--Naval Postgraduate School, March 2005.
Thesis Advisor(s): Aurel S. Croissant. Thesis Advisor(s). Includes bibliographical references (p. 83-101). Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography