• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 434
  • 94
  • 81
  • 59
  • 37
  • 36
  • 12
  • 8
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 974
  • 243
  • 179
  • 132
  • 110
  • 107
  • 102
  • 91
  • 87
  • 85
  • 78
  • 77
  • 76
  • 71
  • 69
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
311

A Research of Our Legal System of Counter-terrorism

Tasy, Shyang-Jong 13 August 2006 (has links)
After ¡§911 Attack¡¨ in 2001, every place in the world suffered destructive attack by terrorists one after another. It caused not only heavy casualties but also a shock to the international society. Religious fanaticism and technology misuse has made terror actions be serious threat to world stability and peace. United Nations Security Council not only critically condemned terror brutalities but also appealed to every member for urgent cooperation to prevent terrorist attack together and punish those who sponsor, plan, prepare for, and support terrorists; legislation sanction against terror actions has become the common consensus of the international society. Viewing the current achievements of countering terrorism, applying military strikes invariably still cannot completely solve this problem effectively. It must trace its source through knowing what problems happened in the society and how to make the most proper adjustment to cruxes of problems by means of double examination, ¡§Efficiency¡¨ and ¡§Rationality,¡¨ plus negotiation of every aspect of politics to enact the law, which conforms to principles of economy. There were a few actions of international terrorists in our country in the past, but we must have the attitude of playing the percentages and draft policies and complete laws in advance to response. At present, our country plans to finish the draft of ¡§Counter-terrorism Act,¡¨ providing the legal foundation of punishing terror actions and plan to set up a chartered counter-terrorism institute by the government to respond to significant terrorist attack. The research of our legal system of counter-terrorism is to discuss how to reach the balance between maintaining national security and protecting human rights by following the basic theory of administrative laws¡Ðprinciple, organization, authority, remedy, and supervision as the foundation of the thesis, and citing professor DENG, Syue-liang¡¦s academic quotation theory. In the light of every research structure, the research made correct description of crucial meaning of the system and explored the merits and demerits in the course of applying the legal system with objective explanation of its administrative measures and personal cognition, and brought up suggestions for follow-up researchers as reference.
312

Sulfate Resistance Of Blended Cements With Fly Ash And Natural Pozzolan

Duru, Kevser 01 September 2006 (has links) (PDF)
Numerous agents and mechanisms are known to affect the durability of a concrete structure during its service life. Examples include freezing and thawing, corrosion of reinforcing steel, alkali-aggregate reactions, sulfate attack, carbonation, and leaching by neutral or acidic ground waters. Among these, external sulfate attack was first identified in 1908, and led to the discovery of sulfate resistant Portland cement (SRPC). Besides SRPC, another way of coping with the problem of sulfate attack is the use of pozzolans either as an admixture to concrete or in the form of blended cements This study presents an investigation on the sulfate resistance of blended cements containing different amounts of natural pozzolan and/or low-lime fly ash compared to ordinary Portland cement and sulfate resistant Portland cement. Within the scope of this study, an ordinary Portland cement (OPC) and five different blended cements were produced with different proportions of clinker, natural pozzolan, low-lime fly ash and limestone. For comparison, a sulfate resistant Portland cement (SRPC) with a different clinker was also obtained. For each cement, two different mixtures with the water/cement (w/c) ratios of 0.485 and 0.560 were prepared in order to observe the effect of permeability controlled by water/cement ratio. The performance of cements was observed by exposing the prepared 25x25x285 mm prismatic mortar specimens to 5% Na2SO4 solution for 78 weeks and 50mm cubic specimens for 52 weeks. Relative deterioration of the specimens was determined by length, density and ultrasonic pulse velocity change, and strength examination at different ages. It was concluded that depending on the amount and effectiveness of the mineral additives, blended cements were considered to be effective for moderate or high sulfate environments. Moreover, the cement chemistry and w/c ratio of mortars were the two parameters affecting the performance of mortars against an attack. As a result of this experimental study it was found out that time to failure is decreasing with the increasing w/c ratio and the effect of w/c ratio was more important for low sulfate resistant cements with higher C3A amounts when compared to high sulfate resistant cements with lower C3A amounts.
313

On The Security Of Tiger Hash Function

Ozen, Onur 01 January 2008 (has links) (PDF)
Recent years have witnessed several real threats to the most widely used hash functions which are generally inspired from MD4, such as MD5, RIPEMD, SHA0 and SHA1. These extraordinary developments in cryptanalysis of hash functions brought the attention of the cryptology researchers to the alternative designs. Tiger is an important type of alternative hash functions and is proved to be secure so far as there is no known collision attack on the full (24 rounds) Tiger. It is designed by Biham and Anderson in 1995 to be very fast on modern computers. In two years some weaknesses have been found for Tiger-hash function. First, in FSE 006 Kelsey and Lucks found a collision for 16-17 rounds of Tiger and a pseudo-near-collision for 20 rounds. Then, Mendel et al extended this attack to find 19-round collision and 22-round pseudo-near-collision. Finally in 2007, Mendel and Rijmen found a pseudo-near-collision for the full Tiger. In this work, we modify the attack of Kelsey and Lucks slightly and present the exact values of the differences used in the attack. Moreover, there have been several cryptanalysis papers investigating the randomness properties of the designed hash functions under the encryption modes. In these papers, related-key boomerang and related-key rectangle attacks are performed on MD4,MD5, HAVAL and SHA. In this thesis, we introduce our 17,19 and 21-round related-key boomerang and rectangle distinguishers to the encryption mode of Tiger.
314

Basic Cryptanalysis Methods On Block Ciphers

Celik, Dilek 01 May 2010 (has links) (PDF)
Differential cryptanalysis and linear cryptanalysis are the first significant methods used to attack on block ciphers. These concepts compose the keystones for most of the attacks in recent years. Also, while designing a cipher, these attacks should be taken into consideration and the cipher should be created as secure against them. Although differential cryptanalysis and linear cryptanalysis are still important, they started to be inecient due to the improvements in the technology. So, these attacks are extended. For instance, higher order differential cryptanalysis, truncated differential cryptanalysis, generalized linear cryptanalysis, partitioning linear cryptanalysis, linear cryptanalysis using multiple linear approximations are introduced as the extended versions of these attacks. There exists significant applications of these extended attacks. Algebraic attack is a method of cryptanalysis that consists of obtaining a representation of the cipher as a system of equations and then, solving this system. Up to today, just a few attacks that are practically possible to mount are presented. However, due to the fact that algebraic cryptanalysis requires only a handful of known plaintexts to perform, it is a promising and significant attack. This thesis is a survey covering all the methods of attacks described above. Illustrations and summaries of some important papers including these cryptanalysis techniques are given.
315

Protein Domain Networks: Analysis Of Attack Tolerance Under Varied Circumstances

Oguz, Saziye Deniz 01 September 2010 (has links) (PDF)
Recently, there has been much interest in the resilience of complex networks to random failures and intentional attacks. The study of the network robustness is particularly important by several occasions. In one hand a higher degree of robustness to errors and attacks may be desired for maintaining the information flow in communication networks under attacks. On the other hand planning a very limited attack aimed at fragmenting a network by removal of minimum number of the most important nodes might have significant usage in drug design. Many real world networks were found to display scale free topology including WWW, the internet, social networks or regulatory gene and protein networks. In the recent studies it was shown that while these networks have a surprising error tolerance, their scale-free topology makes them fragile under intentional attack, leaving the scientists a challenge on how to improve the networks robustness against attacks. In this thesis, we studied the protein domain co-occurrence network of yeast which displays scale free topology generated with data from Biomart which links to Pfam database. Several networks obtained from protein domain co-occurrence network having exactly the same connectivity distribution were compared under attacks to investigate the assumption that the different networks with the same connectivity distribution do not need to have the same attack tolerances. In addition to this, we considered that the networks with the same connectivity distribution have higher attack tolerance as we organize the same resources in a better way. Then, we checked for the variations of attack tolerance of the networks with the same connectiviy distributions. Furthermore, we investigated whether there is an evolutionary mechanism for having networks with higher or lower attack tolerances for the same connectivity distribution. As a result of these investigations, the different networks with the same connectivity distribution do not have the same attack tolerances under attack. In addition to this, it was observed that the networks with the same connectivity distribution have higher attack tolerances as organizing the same resources in a better way which implies that there is an evolutionary mechanism for having networks with higher attack tolerance for the same connectivity distribution.
316

Adaptive Mesh Refinement and Simulations of Unsteady Delta-Wing Aerodynamics

Le Moigne, Yann January 2004 (has links)
<p>This thesis deals with Computational Fluid Dynamics (CFD)simulations of the flow around delta wings at high angles ofattack. These triangular wings, mainly used in militaryaircraft designs, experience the formation of two vortices ontheir lee-side at large angles of attack. The simulation ofthis vortical flow by solving the Navier-Stokes equations isthe subject of this thesis. The purpose of the work is toimprove the understanding of this flow and contribute to thedesign of such a wing by developing methods that enable moreaccurate and efficient CFD simulations.</p><p>Simulations of the formation, burst and disappearance of thevortices while the angle of attack is changing are presented.The structured flow solver NSMB has been used to get thetime-dependent solutions of the flow. Both viscous and inviscidresults of a 70°-swept delta wing pitching in anoscillatory motion are reported. The creation of the dynamiclift and the hysteresis observed in the history of theaerodynamic forces are well reproduced.</p><p>The second part of the thesis is focusing on automatic meshrefinement and its influence on simulations of the delta wingleading-edge vortices. All the simulations to assess the gridquality are inviscid computations performed with theunstructured flow solver EDGE. A first study reports on theeffects of refining thewake of the delta wing. A70°-swept delta wing at a Mach number of 0.2 and an angleof attack of 27° where vortex breakdown is present abovethe wing, is used as testcase. The results show a strongdependence on the refinement, particularly the vortex breakdownposition, which leads to the conclusion that the wake should berefined at least partly. Using this information, a grid for thewing in the wind tunnel is created in order to assess theinfluence of the tunnel walls. Three sensors for automatic meshrefinement of vortical flows are presented. Two are based onflow variables (production of entropy and ratio of totalpressures) while the third one requires an eigenvalue analysisof the tensor of the velocity gradients in order to capture theposition of the vortices in the flow. These three vortexsensors are successfully used for the simulation of the same70° delta wing at an angle of attack of 20°. Acomparison of the sensors reveals the more local property ofthe third one based on the eigenvalue analysis. This lattertechnique is applied to the simulation of the wake of a deltawing at an angle of attack of 20°. The simulations on ahighly refined mesh show that the vortex sheet shed from thetrailing-edge rolls up into a vortex that interacts with theleading-edge vortex. Finally the vortex-detection technique isused to refine the grid around a Saab Aerosystems UnmannedCombat Air Vehicle (UCAV) configuration and its flight dynamicscharacteristics are investigated.</p><p><b>Key words:</b>delta wing, high angle of attack, vortex,pitching, mesh refinement, UCAV, vortex sensor, tensor ofvelocity gradients.</p>
317

Visualizing Endpoint Security Technologies using Attack Trees

Pettersson, Stefan January 2008 (has links)
<p>Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memory, address randomization, system call interception and file integrity monitoring are described along with the attacks they are designed to defend against. The coverage of each countermeasure is then visualized with the help of attack trees. Attack trees are normally used for describing how systems can be attacked but here they instead serve the purpose of showing where in an attack a countermeasure takes effect. Using attack trees for this highlights a couple of important aspects of a security mechanism, such as how early in an attack it is effective and which variants of an attack it potentially defends against. This is done by the use of what we call defensive codes that describe how a defense mechanism counters a sub-goal in an attack. Unfortunately the whole process is not well formalized and depends on many uncertain factors.</p>
318

Evaluation of differences in depression, defensiveness, social support,and coping between acute and chronic CHD patients hospitalized for myocardial infarction or unstable angina [electronic resource] / by Ashley Ellen Owen.

Owen, Ashley Ellen. January 2003 (has links)
Includes vita. / Title from PDF of title page. / Document formatted into pages; contains 103 pages. / Thesis (Ph.D.)--University of South Florida, 2003. / Includes bibliographical references. / Text (Electronic thesis) in PDF format. / ABSTRACT: The goal of this study was to examine differences in the psychological characteristics of patients admitted to the hospital for acute or chronic Myocardial Infarction (MI) or Unstable Angina (UA). Depression, anger, anxiety, curiosity, defensiveness, social support, and coping were evaluated for 165 patients (86 MI and 79 UA), who were tested on the Cardiology Stepdown Ward of Tampa General Hospital. The following psychological measures were administered to these patients: the Beck Depression Inventory (BDI), the State-Trait Anger Expression Inventory (STAXI-2), the Rationality/Emotional Defensiveness (R/ED) Scale, the Adult Form of the Coping Responses Inventory (CRI-Adult), the Interpersonal Support Evaluation List (ISEL), the Illness Perception Questionnaire (IPQ), the State-Trait Personality Inventory (STPI), and the Structured Clinical Interview (SCID-I) for the DSM - IV. Significantly more chronic patients than acute patients met criteria for depression as measured by the SCID following admission to the hospital, and more UA than MI patients also met these criteria. However, no differences were found between the acute and chronic MI and UA patients two weeks prior to admission. Results of this study also indicated that chronic patients and UA patients reported a greater frequency of illness symptoms and tended to cope with their heart disease through avoidant strategies. Chronic patients endorsed higher levels of state and trait anger compared with acute patients, and UA patients were less likely to believe that their illness could be cured or controlled (Control of Cure) than MI patients. Based on the results of this study, it appears that avoidance coping may be an insufficient strategy for addressing negative emotions of chronic patients and UA patients. In addition, perceived lack of control over the success of treatment may be related to depression for UA patients. These findings have important implications for the development and implementation of interventions designed to address perceived control over treatment effectiveness and coping skills for negative emotions in the treatment and rehabilitation of cardiac patients. / System requirements: World Wide Web browser and PDF reader. / Mode of access: World Wide Web.
319

Time-critical targeting : predictive versus reactionary methods : an analysis for the future /

Marzolf, Gregory S. January 1900 (has links)
Thesis--School of Advanced Airpower Studies, AY 2001-2002. / "March 2004." Includes bibliographical references. Full text document available on public STINET.
320

Inhibitory synpatic transmission in striatal neurons after transient cerebral ischemia

Li, Yan. January 2009 (has links)
Thesis (Ph.D.)--Indiana University, 2009. / Title from screen (viewed on December 1, 2009). Department of Anatomy and Cell Biology, Indiana University-Purdue University Indianapolis (IUPUI). Advisor(s): Zao C. Xu, Feng C. Zhou, Charles R. Yang, Theodore R. Cummins. Includes vitae. Includes bibliographical references (leaves 115-135).

Page generated in 0.0843 seconds