Dissertations / Theses on the topic 'WFP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'WFP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kim, Christina Sujin, and Javed Singha. "WFP supply chain capacity in Ethiopia : an analysis of its sufficiency, constraints & impact." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61178.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 66-67).
The WFP's transport of food aid to Ethiopia's landlocked population is constrained by supply chain bottlenecks at the port, and limited availability of trucks for inland transport. How can the WFP supply chain be optimized to effectively operate within the given constraints? First, we assess Ethiopia's current food transport capacity - a critical factor for the WFP's ability to deliver humanitarian food aid. Specifically, we review the current and forecasted movement of goods, gather and analyze information on transport capacity versus demand, and address the impact of government policies and regulations on the road transport sector. As a result, our research helps the WFP in analyzing quantitative and qualitative factors used in selecting routes and mitigating port bottleneck issues. The results of our study may be used by the WFP and other humanitarian organizations which aid distressed populations.
by Christina Sujin Kim and Javed Singha.
M.Eng.in Logistics
Krkoš, Radko. "Tvorba síťového ovladače pro rodinu operačních systémů Windows." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219334.
Full textRADULY, EVA. "A critical discourse analysis of Twitter messages of three international humanitarian organisations about Refugees - UNHCR, UNICEF, WFP." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21547.
Full textSufran, Mansor. "COMPARISON OF STRENGTH, DUCTILITY AND STIFFNESS OF FREE FLANGE AND WELDED FLANGE PLATE CONNECTION." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2632.
Full textMalaver, Gina, and Colin Regnier. "Structuring strategic decisions through the analytic hierarchy process : a case study in the selection of warehouse location for WFP in Ethiopia." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53539.
Full textIncludes bibliographical references (leaves 96-99).
Humanitarian logistic organizations struggle to make strategic and tactical decisions due to their lack of resources, the unpredictability of humanitarian events and the lack of readily available information; the existing tools that assist optimal decision making require large amounts of precise information. As a consequence of all these challenges, most of the work in humanitarian logistics concentrates on the operational level that can only offer short term benefits. Alternatively, optimal strategic decisions maximize the resources of humanitarian organizations making them more flexible and effective in the long term; this directly impacts the ability to help the millions of people in need. This thesis presents a model that assists the largest humanitarian organization in the world, The World Food Programme, to make optimal strategic decisions. The model uses the Analytic Hierarchy Process, a multiple attribute decision tool that provides structure to decisions where there is limited availability of quantitative information. This methodology uses a framework that determines and prioritizes multiple criteria by using qualitative data and it scores each alternative based on these criteria. The optimal alternative will be the one that has the highest weighted score. This model solves the challenges that The World Food Programme, as any other humanitarian organization face when making complex strategic decisions. The model, not only works with easily acquired information but, it is also flexible in order to consider the ever-changing dynamics in the humanitarian field.
(cont.) The application of this model focuses on the optimization of warehouse locations for the World Food Programme in the Somali region of Ethiopia. However, this model can easily be scaled in order to be used in any other decision making process in the humanitarian field.
by Gina Malaver [and] Colin Regnier.
M.Eng.in Logistics
Molapo, Seipati Petronella. "Community vulnerability to food insecurity : a case study of World Food Programme (WFP) Food Aid Programme in the southern lowlands of Lesotho." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2342.
Full textChronic food insecurity continues to be a major problem for rural poor households in Lesotho. This condition is caused by a number of factors including poverty, landlessness, and extreme land degradation, reduced remittances due to retrenchments from South African mines, closures of some of textile industries, the effects of HIV/AIDS and a significant decline in farming practices due to erratic weather patterns and conditions. All these factors have led to an increase in vulnerability levels. This is magnified by the rapid erosion of traditional coping mechanisms, a situation that has consequently left communities unable to respond to any form of disaster. The primary aim of this research was to investigate the community vulnerability to food insecurity in the Southern Lowlands and review the World Food Programme (WFP) food aid programme in the same area. The research addressed the questions such as the causes of food insecurity in the Southern Lowlands; and social protection initiatives that are being implemented by WFP to address food insecurity. The research revealed that WFP has been distributing food aid to the vulnerable households in the Southern Lowlands since 2002. These households belong to categories such as households hosting orphans and vulnerable children, chronically ill persons and physically disabled persons; female-headed households; elderly-headed households; child-headed households; and expectant and nursing mothers. In addition to these categories, WFP implemented food for work activities in which vulnerable households with able-bodied persons worked in to receive food aid. The research found evidence of chronic livelihood failure in the Southern Lowlands. This failure renders it increasingly difficult for households vulnerable to food insecurity to develop and maintain sustainable livelihoods. In particular, the research revealed that, a large proportion of households (53%) are at risk of food insecurity in the Southern Lowlands; the majority of vulnerable households did not hold any cereal stocks remaining from the immediate post harvest period; chronic illness, unemployment and erratic weather patterns are causes of food insecurity in the Southern Lowlands. As means of coping strategies, most households adopt various strategies such as switching expenditure patterns; reducing number of meals per day; kingship support; selling of livestock; and searching for casual labour opportunities. Food aid has improved the livelihoods and quality of life of the beneficiaries especially the chronically ill people. While some food for work activities such as building of toilets and water taps have been very helpful, others such as tree planting were not embraced by some of the beneficiaries and finally food aid promotes dependency among its beneficiaries and nursing mothers intentionally starve their children in order to stay in the programme. The two significant challenges in the distribution of food aid were found to be food pipeline break and the beneficiary selection criteria. The findings therefore generate the conclusion that although there seems to be an improvement in food access by households benefiting from the food aid programme, there is no evidence that those households will continue to access food in the absence of food aid. In essence, the absence of social food security foundation, executed in tandem with food aid interventionist measures, does not realistically augur well for the future. This conclusion comes from the finding that food for work activities which are more likely to generate income for the vulnerable households are not sustainable because the discussions further revealed that these activities have been imposed on the beneficiaries, without the coownership corollary that partners the communities with food aid agencies such as WFP. It is therefore recommended that development agents should not determine the developmental projects/programmes within the communities. The process should be interactive and should not be done in isolation but in mutual social learning and capacity building process as both parties (development agents and the beneficiaries) learn from each other and manage to develop a reciprocal relationship and partnership that will eventually reap sustainable outcome. It is therefore concluded that, the food aid programmes failed to offer sustainable social safety nets to the beneficiaries. The research hypothesis that there is no clear exit strategy in the implementation of the food security interventions and that there are no sustainability and continuity measures that were put into place by WFP remains valid.
Skjöldevald, Maja. "Small scale farmers’ access to and participation in markets : The case of the P4P program in western Kenya." Thesis, Stockholms universitet, Kulturgeografiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-77185.
Full textSandberg, Richard. "A survey of optimization methods for solving the inverse shortest path routing problem." Thesis, Linköpings universitet, Optimeringslära, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-59536.
Full textThe routing of traffic in IP networks is often done with a set of weights that determinewhich way the traffic will go (shortest path routing). The problem here is todetermine if there exists a set of weights for a desired routing pattern. This thesis willinvestigate the performance of a number of different models and solvers for solvingthis type of problem which is usually called the inverse shortest path routing (ISPR)problem. The models tested are the same as described in [1]. The different solversused are mainly the linear CPLEX solvers but also a few multi commodity networksolvers. The tests showed that there is a big performance difference between the models andsolvers and that the cycle bases model solved with the CPLEX dualopt solver wasthe fastest overall.
Silva, Zoraia Moura da. "Estudo de caso:sociabilidade entre os beneficiados pelo Programa de Alimentação do Trabalhador em uma empresa no município Rio Grande da Serra." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/6/6135/tde-26102012-110920/.
Full textINTRODUCTION: The act of eating is complex and it is influenced by many factors. The Worker Food Program (WFP) was established by the 6321 Act on 4/14/1976. Considering the importance of sociability when eating, it is feasible to say that studies examining sociability in Public Policies which concern eating are important for the design of the programs. OBJECTIVES: To determine if there is a relation between eating at work and socializing among the beneficiaries of a company that is part of the WFP in the selfmanagement mode. METHODS: We conducted an explanatory case study in a company registered at the WFP in the form of self-management, located in the Rio Grande da Serra County. As an instrument for data collection, we chose to do document analyses, open interviews with the dietitians as well as structured interviews with the workers. RESULTS AND DISCUSSION: The analysis of the data was performed by screening of the results. 294 workers agreed to participate in the interviews, making up 54 per cent of a total of 543 workers in that factory. The job positions were overwhelmingly operational in nature, including machine operator (64.3 per cent ) and press operator (10.1 per cent ). Their duties require physical strength and this reflected in the participant gender: 234 were men (79.6 per cent ) and 60 were women (20.4 per cent ). The largest age groups for men (56.6 per cent ) was of young adults (19-29 years of age). 56 per cent thought the meals which were served at work were very good and 40 per cent thought they were only good. 52 per cent of respondents reported spending just 15 to 30 minutes in the cafeteria, 44.9 per cent up to 15 minutes and only 3.1 per cent spent between 30 minutes and 1 hour in the cafeteria. These findings are particularly worrisome because they indicates that the workers did not stay very long in the cafeteria, which may reveal a poor meal schedule choice by the companies, which would consequently make it impossible to establish deeper relationships with co-workers . When asked who they shared their meal time with, 85.7 per cent said they shared it with peers that worked in the same sector, 9.2 per cent said they shared it with people from other sectors, 3.1 per cent said they spent it alone. 48 per cent of the respondents reported having a very good relationship with their coworkers, 50 per cent reported a only good relationship. When asked about what they thought of the cafeteria: 44.90 per cent thought it was only good and 22,45 per cent thought it was very good, for different reasons: because the environment was good to relax and rest (29.9 per cent ) because it was clean and wholesome (23.9 per cent ), because the food was good and healthy (11.8 per cent ). Those who disliked the cafeteria claimed it was due to: unbearable noise (1.5 per cent ), unpleasant odors (1.5 per cent ) and lack of a television (1.5 per cent ). CONCLUSION: The results of interviews and document analyses showed that the WFP in a specific company may have contributed to greater sociability among the beneficiaries
Garcés, Valenzuela Manuel Antonio. "Análisis Técnico de la Huella Hídrica como Indicador de Sustentabilidad del Uso del Agua en la Producción del Concentrado de Cobre en División El Teniente de Codelco." Tesis, Universidad de Chile, 2011. http://www.repositorio.uchile.cl/handle/2250/104068.
Full textAli, Elham. "Malnutrition Through Constructivism: How International Organizations Succeed in Sustaining Nutrition Interventions in Kenya." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/cmc_theses/1201.
Full textHulstrom, Brittany Lee, Kara Beaudet, and Lindsey Erlick. "The WIP Program." Thesis, The University of Arizona, 2011. http://hdl.handle.net/10150/144532.
Full textGaidys, Vytautas. "Mobiliosios komercijos agentai WAP paslaugose." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2011~D_20140627_165624-98471.
Full textMain problem – there is a lot of work done which studies agent technology. But taken in comparison, there is much less real software created using this technology. Not obvious use of agent technology leads to a little or even no attention from business. Furthermore, not clear situation in agent platforms market reduces it drastically. Work objective – analysis of agent technology use in mobile commerce context. Solved problems: - Qualitative and quantative analysis of agent platforms. - Creation of mobile commerce system model. - Model implementation. Conclusion. With creation of mobile commerce system prototype, which uses agent technology, it is shown that agent technology is viable and this technology should not be rejected to early. Created system prototype can be used in practise. One can benefit from using it.
Müller, Thomas. "Shell-Prompt auf dem WAP-Handy." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100526.
Full textKajén, Sarah, and Katarina Sturesson. "Intensivläsning : En interventionsstudie med WIP-intensivprogram." Thesis, Linnéuniversitetet, Institutionen för pedagogik och lärande (PEL), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78538.
Full textLienig, Uwe. "Industrielle Forschungsprojekte initiieren - Die Projektwerkstatt der WFS." Fraunhofer-Institut für Verfahrenstechnik und Verpackung IVV, 2018. https://slub.qucosa.de/id/qucosa%3A31785.
Full textYoung-On, Harold. "FMS performance versus WIP under different scheduling rules." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-12162009-020059/.
Full textGuo, Shin-Ming. "WIP and control mechanisms of tandem queueing systems /." The Ohio State University, 1992. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487779914827133.
Full textSantos, Arlindo. "Adaptação de conteúdos Web para o ambiente WAP." Master's thesis, Universidade do Porto, Faculdade de Engenharia, 2002. http://hdl.handle.net/10198/1336.
Full textGonzalez, V. "Uncertainty management in repetitive building projects using WIP buffers." Thesis, University of Auckland, 2008. http://hdl.handle.net/2292/18893.
Full textRoediger, Stephan. "WAP, i-Mode und die Rolle von XHTML Basic." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100495.
Full textLomvall, Thomas, and Sara Klinthammar. "Wardriving : WEP, WPA och WPS inom och mellan städer." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18923.
Full textLarsson, Marie. "En jämförelse mellan versionerna 1.2 och 2.0 av WAP." Thesis, University West, Department of Technology, Mathematics and Computer Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-652.
Full textAsplund, Fredrik. "Parsing of X.509 certificates in a WAP environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1455.
Full textThis master thesis consists of three parts. The first part contains a summary of what is needed to understand a X.509 parser that I have created, a discussion concerning the technical problems I encountered during the programming of this parser and a discussion concerning the final version of the parser. The second part concerns a comparison I made between the X.509 parser I created and a X.509 parser created"automatically"by a compiler. I tested static memory, allocation of memory during runtime and utilization of the CPU for both my parser (MP) and the parser that had a basic structure constructed by a compiler (OAP). I discuss changes in the parsers involved to make the comparison fair to OAP, the results from the tests and when circumstances such as time and non-standard content in the project make one way of constructing a X.509 parser better than the other way. The last part concerns a WTLS parser (a simpler kind of X.509 parser), which I created.
Javed, Omar Saleem. "A comparison of WAP development in C# and Java." [Johnson City, Tenn. : East Tennessee State University], 2001. http://etd-submit.etsu.edu/etd/theses/available/etd-1102101-124311/restricted/javedo120401.pdf.
Full textITO, ADRIANA SOARES. "WIP INVENTORY MANAGEMENT: CASE STUDY IN AN OIL COMPANY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2018. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=35725@1.
Full textHigh inventory costs is a problem faced by many Brazilian companies. Reducing these costs can be very beneficial. This reduction needs a careful analysis so as not to bring undesirable consequences, including unit downtime or reduced market share. The goal of this dissertation is to propose an intermediate stock management framework. The proposal is based on a systematic literature review followed by a case study with interviews and participant observation. An analysis of the intermediate stocks management in an oil and gas company is produced. A comparison between the current practices of the company and the proposed framework was carried out. Recommendations and a roadmap on how to implement this framework are offered. Agility in managing intermediate stocks and inventory reduction are pointed as contribution of this study. The main recommendations of this study for the company are related to ABC inventory classification, lean principles and tools, simulation, modelling and value stream mapping. Recommendations for future studies include quantitative techniques for mathematical modeling of inventories and simulations.
Schmitz, Richard Salvalaggio. "Monitoramento remoto de informações de pacientes via protocolo wap." Florianópolis, SC, 2003. http://repositorio.ufsc.br/xmlui/handle/123456789/85171.
Full textMade available in DSpace on 2012-10-20T16:01:34Z (GMT). No. of bitstreams: 1 200024.pdf: 1930110 bytes, checksum: 11f2d01ce864e3bc8c24fa854caf297c (MD5)
Saidi, Soraya. "Etude d'un locus de gènes WAP-RAMP3 de porc." Paris 11, 2008. http://www.theses.fr/2008PA11T036.
Full textIzhaq, Farhaj. "Functional characterization of WIP transcription factors in Arabidopsis thaliana." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112063.
Full textSex determination in plants is a process that results the development of either male or female flower on the same or different individuals. This mechanism enhances the cross pollination and raises the genetic variability. It can be influenced by endogenous (genetic or hormonal) and/or external environmental factors. In melon, gene A arrests the stamen development in the female flowers and gene G arrests the development of carpel in the male flowers hence these two genes control the sex determination mechanism in melon. Gene A encodes 1-aminocyclopropane-1-carboxylic acid synthase (ACS), an enzyme which is involved in the ethylene biosynthesis pathway. Gene G encodes a C2H2 zinc finger proteins that belongs to WIP family of transcription factors. In Arabidopsis thaliana, there are six WIP genes and very little is known about their molecular function. TT1/AtWIP1 is involved in the accumulation of PA in the seed endothelium. NTT/AtWIP2 is involved in the development of transmitting tract in the carpel. In this thesis, we tried to highlight the molecular function of the WIP genes. Here we show that WIP genes from different species partially restore the yellow seed coat color phenotype of tt1-3 mutant and upregulate the late flavonoid biosynthetic genes. The functional complementation of tt1-3 mutants by WIPs from Cucumis melo and Physcomitrella patens indicates that WIP genes have the same global function but differ on the spatio-temporal level. Second conserved motif in the N-terminus of TT1 protein was found to be essential for its proper function as alanine scanning of N2 motif of TT1 decreased the accumulation of PAs in the seed endothelium. TT1 disturbed the development of petals, stamens and carpels in flower when ectopically expressed under AP3 and CRC promoter. TT1 was expressed in the lateral roots under the promoter of SOLITARY ROOT (SLR/IAA14) and in the stipules under the promoter of GLABROUS1 (GL1). TT1 was able to inhibit the development of the lateral roots and leaf trichomes. In this study, we found that TT1 can act as organ inhibitor when ectopically expressed. Our study will help us to understand the organ arrest during sex determination mechanism and will evoke new dimensions for further explanations of this process
Larsson, Robin, and Martin Davik. "WP-Edit." Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-17044.
Full textThie, Dietrich. "Schlanker Surfen - Mobil ins Internet mit WAP, WML und Co." Universitätsbibliothek Chemnitz, 2000. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200000066.
Full textLööf, Robert. "Framtagning av Drag&Drop klassbibliotek för WPF-baserat användargränssnitt." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-19422.
Full textGustafsson, Björn. "En grafisk webläsarkomponent med hjälp av WPF i Visual Studio." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-95348.
Full textLindström, Alexander, and Emil Ringensjö. "Implementation av timingbaserat fightingspel till Kinect i C# och WPF." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96929.
Full textSantiso, Quiñones Gustavo. "Octahedral versus trigonal prismatic rearrangements in MoF6 and WF6 derivatives." [S.l.] : [s.n.], 2005. http://www.diss.fu-berlin.de/2005/11/index.html.
Full textJohansson, Robert, Mikael Bäck, and Robert Forsman. "Wap usage In Sweden : Could i-mode be an option?" Thesis, Jönköping University, JIBS, Business Informatics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-580.
Full textMobiltelefonianvändningen har sedan början av 2000-talet haft en stark tillväxt och till-sammans med utvecklade tekniker ifrån Internet uppstod förutsättningar för en ny marknad – mobilt Internet. Europa, Nord Amerika och Japan ledde utvecklingen. Europa och Nord Amerika utvecklade Wireless Application Protocol (WAP) medan ett japanskt företag NTT DoCoMos utvecklade ett eget system – i-mode – som dominerar den japanska marknaden idag. Detta medan WAP-användningen ej blev den succé man hade hoppats på och användningen av WAP är ej speciellt hög idag, trots att de flesta mobiltelefoner i Sverige har stöd för WAP.
Syftet med denna rapport är att förklara utifrån ett användarperspektiv varför WAP-användningen är låg i Sverige samt hur i-mode kunde lyckas så väl på den japanska mark-naden. Rapporten syftar också till att undersöka befintliga mobilanvändares behov angående mobilt Internet och upptäcka ifall i-mode möter dessa behov. En jämförelse skall också ske av hur WAP och i-mode har marknadsförts. Resultatet skall förklara varför majoriteten av svenska mobilanvändare ej använder WAP.
Forskningen inledes med en litteraturstudie. Med denna litteraturstudie som stöd så valde vi att genomföra en enkätundersökning för att upptäcka den utvalda populationens behov och användninsgrad av mobilt Internet. Utfallen från enkätundersökningen analyserades tillsammans med teorier och det tillsammans skapade resultatet.
• Människor i Sverige tenderar till att använda internet hemma istället.
• WAP-användning är dyrt och långsamt idag.
• Kunskapen om WAP bland det svenska folket är dålig.
• Med vår forskning som utgångspunkt så finns det inget behov för mobilt Internet.
Det låga användandet av mobilt Internet förklaras främst med att de svenska användarna utnyttjar tillgången av Internet hemma. Detta ser inte vi som en egentlig orsak utan mer som ett resultat av de brister som mobilt Internet uppvisar. Större delen av dessa behov klarar ej en i-mode implementation i Sverige av att tillfredsställa i dagsläget. Därför ser vi ej i-mode som ett alternativ idag. Däremot anser vi att om i-mode kan marknadsföra sig som i Japan – som ett komplett system med unika funktioner – istället för en komprimerad ver-sion av internet, så kan i-mode vara ett fullvärdigt alternativ då tekniken redan finns för en implementation i Sverige.
Since the beginning of the 21st century mobile phone usage has had a big growth. Together with developed techniques from the Internet conditions for a new market emerged – mobile Internet. Europe, North America and Japan took the lead in this development. Europe and North America developed Wireless Application Protocol (WAP) whilst a Japanese company, NTT DoCoMo, developed their own standard – i-mode – which is dominating the Japanese market today. WAP on the other hand was not a success at all and the usage is still low today in Sweden, even though almost all mobile phones support WAP.
The purpose of this thesis is to, from a user perspective, explain why the WAP usage is so low in Sweden and also explain how i-mode became such a success on the Japanese market. In the thesis we will research mobile phone users needs regarding mobile Internet, and if those needs can be applied to i-mode functionality. We will also compare WAP and i-mode marketing. The result will then explain why the majority of Swedish mobile phone owners do not use WAP.
We started out with a literature study, which became the base of our chosen method; a survey. Thus to discover the chosen populations’ needs, demands and degree of usage of mobile Internet. A result was created from the survey data and theories.
• People in Sweden tend to use Internet at home instead.
• WAP usage today is expensive and has slow bandwidth.
• The knowledge about WAP is poor among the Swedish population.
• There is no need for mobile Internet in Sweden according to our research.
The low mobile Internet usage can mainly be explained with that people in Sweden rather use Internet at home. We are convinced that this is not the main reason though, since this result emerged because of WAPs faults and weaknesses. The majority of these demands can not be satisfied by an i-mode implementation. That is why we do not see i-mode as an alternative to WAP in Sweden. Although if i-mode could use another approach in their marketing they may succeed – like a stand-alone system with unique functions. Using this approach instead of marketing the service as a light version of the Internet, as we see today in WAP.
Coley, Andrea L. "Minimizing WIP over a Rolling Horizon in a Job Shop." NCSU, 2003. http://www.lib.ncsu.edu/theses/available/etd-12162002-212521/.
Full textRoque, Damien. "Modulations multiporteuses WCP-OFDM : évaluation des performances en environnement radiomobile." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00789990.
Full textKlischat, Susanne Martina. "WAP-Services für die Hochschule der Medien: Erreichbarkeitsauskunft und Verzeichnisdienst." [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11675530.
Full textBayse, Emmanuel. "Méthodologie de test passif par invariants : application au protocole WAP." Evry, Institut national des télécommunications, 2006. http://www.theses.fr/2006TELE0004.
Full textConformance testing became an essential activity in the life cycle of development of the communication systems. The purpose of this test is to guarantee that the finished product corresponds well to the specification of reference. The methodology used consists of an automated generation of conformance test suite from the specification that are applied on the implementation under test. The answers of the system are compared to those expected according to the test sequence. These methods known as active suppose that they can always interact with the implementation under test. However, this technique is not always possible in the systems of protocols in layer. Moreover, the control of the inputs emitted by the tester to stimulate the implementation limits the detection of certain errors which can occur in a hostile environment. Finally, the testing step can be costly as it monopolizes the system for a long time. In this thesis, we propose a none intrusive passive approach to perform conformance testing of communication protocols. Our passive testing method evaluates the behavior of the implementation in its real environment through an analysis of the real execution traces. This stepwise approach is divided in two steps. First, functional properties of the system are expressed by experts and/or testers by means of invariants. These properties are then checked against the specification (i. E. A Finite State Machine) of the system in order to ensure the validity of these properties. We have de_ned algorithms that conduct backward or forward search in the FSM. The second step consists of the checking of the properties on real execution traces of the implementation under test by pattern matching techniques. We extend the applicability of the proposed method for the conformance testing to the interoperability testing. We improve the expressiveness of our invariants by introducing the concept of the contextual signatures which other a framework adapted to consider the data part given in the invariants expression, the type of property defined, and other concepts such as the states. In this thesis, we provided a test tool that we designed to experiment and automate our passive testing methodology
Malikebu, Charles. "The socio-economic bearing of donor aid suspension in Malawi between 2007 and 2011 : a case study of the World Food Programme (WFP) school meals programme in Chiradzulu District." Thesis, 2014.
Find full textRoss, D. A. "Making a meal of it: the World Food Programme and legitimacy in global politics." 2008. http://repository.unimelb.edu.au/10187/3542.
Full textIn particular, the regime’s development and success has been closely related to both a congruence between the US domestic feed-the-hungry norm and the regime’s international feed-the-hungry norm, and a process of divergence between those norms. It is this normative interplay that has enabled US power to be deployed and constrained in a manner resulting in high levels of legitimacy for the WFP. While in many respects this has limited WFP’s capacity to do more with the problem of global hunger than merely ameliorate it, the nature of the problem is much bigger than the capacities of any single operational agency of the United Nations.
Lin, Yu-teng, and 林郁騰. "WAP Gateway." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/85630732889011135675.
Full textTseng, Chien-Hao, and 曾健豪. "WAP Mobile Banking System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/66475697797412832662.
Full text世新大學
資訊管理學研究所(含碩專班)
95
The constant innovation of action science and technology, in order to pursue the convenience, demands of the electronic-transactions are more and more too, the implementation of the mobile banking has been accepted by the people gradually, though the question of the security has existed all the time, in order to ask the convenience, many people would like to apply for the mobile banking, admit at mobile inputting account number and password finish the financial transaction. Promote Citizen Digital Certificate and bank to withdraw deposit from the government after the magnetic stripe card changes the chip financial card, begin someone and apply for the chip financial card of the bank with using the card reading machine, transfer the bank with the inquiry into balance of the account in websites of network bank. Under the bankers association of the republic of china and finacial information service company promote in a more cost-effective manner, various kinds of chip financial card read card machine let the people accept gradually already, web ATM (Automated Teller Machine) prevail. But the push in the action bank of Taiwan, stay in STK ( SIM Tool Kit) Action bank way, with the introduction of the new wireless communication standard, this research hopes to propose a new WAP ( Wireless Application Protocol) Action bank way,adopt mould group WIM(WAP Identity Module) as the foundation with WAP 2.0 standard, WPKI(Wireless Application Protocol Public Key Infrastructure)safe mechanism and action user's end, design a set of WAP action banking systems with security, as the reference which bank promotes of the future action.
Cheng, Chia-Ming, and 鄭家明. "Enhance WEP Protocol with HMAC." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/21269852911572626022.
Full text國立交通大學
網路工程研究所
96
The mobility offered by wireless networks enables users to have the access to related network resources if they are within served area of access points. Owing to the convenience of wireless networks, the population of it users are getting more and more. In addition, network security is always a vital issue for either the Ethernet or wireless networks. This paper presented an optimized solution to eliminate the security holes of WEP (Wired Equivalent Privacy) which includes the plaintext transmission of IV, vulnerable to replay attacks and the reliability problem. As compared with WPA (Wi-Fi Protected Access) which complies.
Long, Chi-Mao, and 龍其貿. "Study on WAP Based Document." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/60193921591652414569.
Full textWeng, Chia-Cheng, and 翁嘉誠. "Security Service with WAP 2.0." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/09055751941346850493.
Full text樹德科技大學
資訊管理研究所
93
Although all the telecommunications incorporations of Taiwan supply with WAP service, the market research reveals that the service about WAP are not convenient to consumers, especially the transmission speed, the expenses and the service contents which are the chief reasons that consumers wouldn’t like to use WAP service. Finding out the reason is that WAP 1.x standard has a lot of defects. The influence of the defects on the network security causes a lot of application service cannot be popular. Thus on August 2001 WAP Forum set up the standard of WAP 2.0 that it connected WAP 2.0, agreement of Internet TCP and HTTP syntax, which raised transmission speed, reduced the development expenses and enhance the service security. The purpose of the studying is that makes security application service of WAP 2.0, which develops the application service of WAP 2.0 on cellphone to get security transactions with SSL and CA(Certification Authority), then the consumers will find one more transaction way except credit card and cash card.
Chang, Yu-Jen, and 章余任. "A WAP-based e-Life." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/57556751715938577036.
Full text元智大學
資訊工程研究所
88
The explosion of wireless phones has changed how people communicate with others. Now, the Web-enabled devices provide a new method to use the Internet. In a recent study about wireless Internet versus wired, it predicts that more people will access the Web via a wireless device than by a PC. Therefore, there is a new network communication protocol called “Wireless Application Protocol (WAP)” has been developed. It is an open, global specification that empowers mobile users with wireless devices to easily access and interact with information and telephony services instantly. In this thesis, we have developed and implemented a WAP-based e-Life application services. Our system essentially consists of Intelligent Personal Assistant, Real-Time Information Services, Location-bound Services, Personal Financial Management, and Mobile Office. The issues related to the design of these modules are also discussed.
Falé, Miguel Amorim. "Improving vulnerability detection of wap." Master's thesis, 2017. http://hdl.handle.net/10451/31603.
Full textAs aplicações web apresentam um nível de sofisticação que foi gradualmente melhorado no decorrer de duas décadas. Em particular, estas aplicações evoluíram de simples aglomerados de documentos hipermédia, para sistemas altamente complexos e extensíveis, desempenhando um papel fundamental no acesso a uma miríade de serviços. No entanto, esta evolução manifesta-se também pela procura e desenvolvimento de aplicações avançadas em prazos restritos, um fenómeno que é desencadeado pela competitividade agressiva e dinamismo próprios da Web moderna. Esta mudança de paradigma leva muitos programadores a seguir atalhos no desenvolvimento de aplicações, tal como o uso de linguagens de programação populares (ex. PHP), a integração de bibliotecas e extensões de origem dúbia, e a negligência para com os bons padrões de desenvolvimento de software. Infelizmente, tais práticas encontram-se frequentemente associadas à ocorrência de vulnerabilidades no código fonte destas aplicações, que comprometem a segurança das mesmas. A gravidade deste problema induz assim uma urgência crescente no que toca ao desenvolvimento de aplicações seguras. Contudo, o sucesso das medidas de segurança depende tanto dos conhecimentos de quem as elabora, bem como da correta utilização das linguagens de programação. ´E por isso que uma longa história de trabalho em segurança de aplicações web tem vindo a acompanhar tal evolução. As ferramentas de análise estática de código são utilizadas para detetarem vulnerabilidades nos programas de forma automática. Por excelência, estas ferramentas são as mais utilizadas por conseguirem uma maior cobertura do código analisado, poderem ser utilizadas durante o ciclo de desenvolvimento de aplicações e por não necessitarem de executar o código da aplicação. Porém, a qualidade da análise realizada por estas ferramentas na deteção de vulnerabilidades assenta na correta codificação do conhecimento sobre as vulnerabilidades a detetar e implementação das técnicas de análise estática de código, tal como a análise de comprometimento. Isso significa que, por um lado, estas ferramentas apenas procuram vulnerabilidades no código fonte para as quais foram codificadas, sendo incapazes de encontrar os restantes tipos de vulnerabilidades. Por outro lado, podem gerar falsos positivos (falsas vulnerabilidades) e falsos negativos (vulnerabilidades não detetadas) devido à não completude das técnicas de análise estática nelas implantadas. O principal objetivo desta dissertação assenta no melhoramento das capacidades de deteção de vulnerabilidades presentes na ferramenta Web Application Protection (WAP) para análise de código PHP. A concretização deste objetivo pressupõe três passos. O primeiro passo consiste, numa primeira instancia, no estudo das vulnerabilidades de validação de input de aplicações web e das formas como são detetadas por análise estática de código. Seguidamente, no levantamento de falhas de implementação num conjunto de ferramentas de análise estática de código fonte em PHP e em particular na WAP. É importante perceber que falhas estão presentes nas ferramentas atuais e de que forma se correlacionam com os falsos positivos e negativos gerados nas análises. Para efetuar este levantamento, é necessário executar cada ferramenta em estudo e comparar os resultados de ferramentas diferentes, utilizando como alvo de análise os mesmos artefactos de software em PHP. ´E de igual importância analisar o código manualmente, pelo que constituía única forma de detetar falsos negativos e confirmar falsos positivos simultaneamente presentes em todas as ferramentas. As ferramentas são aplicadas no processamento de código fonte PHP encontrado em pacotes de software da plataforma WordPress. O segundo passo consiste no estudo de um dos problemas identificados. O problema selecionado para o efeito assenta na identificação e resolução de dependências circulares no código fonte, as quais podem prejudicar a qualidade da análise, provocando até a paragem inesperada da ferramenta. As dependências circulares são oriundas da inclusão recursiva de código contido em ficheiros (ex. ficheiro a inclui ficheiro b e ficheiro b inclui ficheiro a). Inicialmente, é feito um levantamento das capacidades de inclusão disponíveis na linguagem PHP com base na documentação oficial. Seguidamente, são definidos e avaliados casos de estudo que utilizam estas capacidades de modo a produzir dependências circulares. Observam-se os respetivos comportamentos das ferramentas no processamento destes casos. Simultaneamente, é feita uma ponte com o comportamento demonstrado pelo PHP Zend, pois fornece um contexto prático que serve para completar as ambiguidades identificadas na documentação oficial. O terceiro passo consiste na resolução do problema das dependências circulares na ferramenta WAP. Apresentamos propostas de resolução do problema das dependências circulares, passando pela identificação de ficheiros raiz, caminhos de inclusão e causadores de ciclo dado um conjunto aleatório de ficheiros PHP. Este passo culmina no desenvolvimento de dois algoritmos que detetam e resolvem ciclos num projeto PHP, respetivamente. Oferecemos uma avaliação experimental das melhorias implementadas na ferramenta WAP, com base em pacotes de software da plataforma WordPress. Por um lado, a avaliação pretende verificar a capacidade de deteção de ciclos e vulnerabilidades por parte da versão melhorada da WAP. Por outro, permite a confirmação dos comportamentos identificados no segundo passo, bem como a identificação de novos problemas, relacionados com falhas de implementação das ferramentas Pixy, RIPS e phpSAFE. A nova versão da ferramenta WAP (WAP++) permitiu identificar e resolver 16 de pendências circulares e detetar 6 vulnerabilidades adicionais além das 885 vulnerabilidades detetadas pela versão original. Para além disso, a ferramenta WAP++ não apresenta nem os comportamentos erróneos da versão original, nem os comportamentos erróneos observados nas outras ferramentas de análise estática. Em contraste, a versão original da ferramenta WAP não identifica quaisquer dependências circulares.
For over two decades, the web has been evolving from a simple set of hypermedia documents to a complex ecosystem of web applications that are supported by various frameworks. This paradigm shift has been promoting a series of practices that lead to an increasing number of vulnerabilities, which can compromise the security of web applications. One of the main contributing factors lies in vulnerable source code, written in unsafe languages such as PHP. In order to mitigate the problem, a large research effort on web application security has occurred over the past years. Source code static analysis tools perform the task of finding program vulnerabilities in an automated fashion. These tools offer superior code coverage, easier integration into the application development cycle, and do not require the actual code to be executed. They instead perform source code analysis, looking for potential bugs while inspecting the program code. However, the analysis performed by these tools depends on their knowledge of the classes of vulnerabilities and the implementation of analysis techniques, such as taint analysis. This means that, on one hand, the tools only search for vulnerabilities in the source code that they hold knowledge of, being unable to find other kinds of problems. On the other hand, the tools may generate false positives and false negatives, due to the limitations and incompleteness of implemented analysis techniques. One of such tools is the Web Application Protection (WAP). The main objective of this dissertation is to identify problems with WAP and improve its vulnerability detection capabilities, when processing open source PHP code. Four static analysis tools - WAP, Pixy, phpSAFE and RIPS - are evaluated against a set of WordPress plugins that are known to be vulnerable, in order to collect examples of incorrect processing of the tools which lead, for instance, to false negatives. Additionally, we define and evaluate several use cases for a common found limitation, which consists in the identification and circumvention of circular dependencies (i.e., recursive inclusion of code) in the source code. If circular dependencies are not treated correctly, they may lead to unexpected tool behaviors and incorrect analyses. These assessments help reflecting upon new solutions to address WAP’s shortcomings. A new version of WAP is implemented, and evaluated with the same original WordPress plugins. This dissertation offers the following contributions. A list of vulnerabilities is compiled through manual analysis of the plugins, in a format that allows comparison between the chosen tools, and the identification of common false negatives. An enhanced version of WAP is implemented, with improved detection capabilities that reduce both false positives and false negatives. Two evaluations concerning WAP and a set of WordPress plugins are present, comparing the results before and after the enhancements, respectively.
杜瑩美. "= WIP management model for wafer fabrication." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/08508837493100434898.
Full text