• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 2
  • Tagged with
  • 10
  • 10
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Development of focal geometry with non-ideal samples

Prokopiou, D M 17 July 2015 (has links)
A novel geometry for powder X-ray diffraction (XRD), termed ‘focal construct geometry’ (FCG) is introduced and developed with both non-ideal samples and non-ideal sample conditions. FCG utilises an annular beam that has the unique feature of ‘focusing’ scattering maxima at single loci along a primary axis, hence offering diffraction data of enhanced intensity. This main advantage of FCG can be used within fields in need of rapid material identification, such as security screening in airports. A theoretical comparison between FCG and conventional transmission mode XRD showed that even though FCG suffers from broader diffraction peaks, an alternative approach to FCG data interpretation has the potential to provide narrower scattering maxima than conventional XRD. However, in order to employ this approach, discrimination between converging and diverging FCG scattering maxima is essential. Peak broadening was investigated by altering various aspects of FCG instrumentation components by either pencil beam XRD or FCG, indicating broad diffraction peaks independent of the beam geometry employed. Development of FCG resulted in the successful analysis of non-ideal samples, such as non-crystalline liquid samples, samples exhibiting preferred orientation and samples with large grain size, demonstrating advantages over conventional XRD. Furthermore, ideal samples (in terms of crystallinity, preferred orientation and grain size) were analysed by FCG under non-ideal conditions. This involved randomly orientating a single planar sample with respect to the primary axis, contrary to previous research that present FCG with a single planar sample normal to the primary axis. Sample rotation resulted in FCG scattering maxima with different xyz coordinates depending on the degree, axis and direction of rotation. Moreover, FCG analysis of multiple samples (normal to the primary axis) showed that as with all XRD arrangements, a priori knowledge of the samples’ position along the primary axis is required for effective data analysis. Investigation into the ability of FCG’s annular beam to act as a pre-sample coded aperture demonstrated an alternative method to interpret FCG images by recovering conventional XRD data. Additionally, two novel post-sample encoders (linear wire and Archimedean spiral) were considered. This enabled spatial discrimination of unknown samples along a primary axis and material identification for conventional XRD techniques. Combination of FCG with an absorbing edge post-sample encoder indicated discrimination between converging and diverging FCG scattering maxima. This ability can enable interpretation of single FCG images, as well as depth information of unknown samples within an inspection volume (e.g. airport luggage), hence enabling material identification. / © Cranfield University 2014
2

Development of focal geometry with non-ideal samples

Prokopiou, D. M. January 2015 (has links)
A novel geometry for powder X-ray diffraction (XRD), termed ‘focal construct geometry’ (FCG) is introduced and developed with both non-ideal samples and non-ideal sample conditions. FCG utilises an annular beam that has the unique feature of ‘focusing’ scattering maxima at single loci along a primary axis, hence offering diffraction data of enhanced intensity. This main advantage of FCG can be used within fields in need of rapid material identification, such as security screening in airports. A theoretical comparison between FCG and conventional transmission mode XRD showed that even though FCG suffers from broader diffraction peaks, an alternative approach to FCG data interpretation has the potential to provide narrower scattering maxima than conventional XRD. However, in order to employ this approach, discrimination between converging and diverging FCG scattering maxima is essential. Peak broadening was investigated by altering various aspects of FCG instrumentation components by either pencil beam XRD or FCG, indicating broad diffraction peaks independent of the beam geometry employed. Development of FCG resulted in the successful analysis of non-ideal samples, such as non-crystalline liquid samples, samples exhibiting preferred orientation and samples with large grain size, demonstrating advantages over conventional XRD. Furthermore, ideal samples (in terms of crystallinity, preferred orientation and grain size) were analysed by FCG under non-ideal conditions. This involved randomly orientating a single planar sample with respect to the primary axis, contrary to previous research that present FCG with a single planar sample normal to the primary axis. Sample rotation resulted in FCG scattering maxima with different xyz coordinates depending on the degree, axis and direction of rotation. Moreover, FCG analysis of multiple samples (normal to the primary axis) showed that as with all XRD arrangements, a priori knowledge of the samples’ position along the primary axis is required for effective data analysis. Investigation into the ability of FCG’s annular beam to act as a pre-sample coded aperture demonstrated an alternative method to interpret FCG images by recovering conventional XRD data. Additionally, two novel post-sample encoders (linear wire and Archimedean spiral) were considered. This enabled spatial discrimination of unknown samples along a primary axis and material identification for conventional XRD techniques. Combination of FCG with an absorbing edge post-sample encoder indicated discrimination between converging and diverging FCG scattering maxima. This ability can enable interpretation of single FCG images, as well as depth information of unknown samples within an inspection volume (e.g. airport luggage), hence enabling material identification.
3

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Yalcinkaya, Ramazan 08 1900 (has links)
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
4

Privacy Concerns Regarding the Use of Biometrics in Trusted Traveler Programs

Merlano, Shari 01 January 2016 (has links)
One of the objectives of the U.S. government is to balance the individual’s right to privacy and national security interests. Trusted Traveler programs create a risk-based security model where the traveling public is categorized into low or high risk. There are, however, some privacy concerns related to the acceptance of the use of biometric technology in the adoption of expedited security screening procedures in commercial airports. The theoretical construct of this case study of the TSA Pre-Check Program is based on Ajzen and Fischbein’s theory of reasoned action, specifically through Davis’ technology acceptance model. The purpose of this case study was to explore the perceptions of the traveling public regarding the protection of privacy and the use of biometric technologies. Data for this study included 325 social media postings, 50 privacy complaints reported to the Department of Homeland Security between 2009 and 2014, and publicly available data from the Government Accountability Office about expedited screening for the years 2011 – 2014. Data were coded into a priori themes and then subjected to a content analysis procedure. Findings indicate that the traveling public generally support expedited security screening and consent to waiving certain privacy rights in order to facilitate expedited screening. Complaints from travelers were also primarily related to wait times and secondary screening, and not privacy concerns. The positive social change implications stemming from this study include recommendations to the TSA to expand the Trusted Traveler programs such that the primary concern of the traveling public, reduction of wait time is balanced against privacy concerns about the collection of biometric data as part of a measured response to aviation security.
5

Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

Kenaudekar, Jayesh January 2022 (has links)
The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. ADS-Bprovides accurate aircraft localization via satellite navigation and efficient air traffic management, and also improves the safety of thousands of passengers travelling worldwide. While the benefits of ADS-B are well known, the fact that ADS-B is an open protocol introduces various exploitable security vulnerabilities. One practical threat is the ADS-B spoofing attack that targets the ground station, in which the ground-based attacker manipulates the International Civil Aviation Organization (ICAO) address (which is a unique identifierfor each aircraft) in the ADS-B forwarded messages to fake the appearance of non-existent aircraft or masquerade as a trusted aircraft. As a result, this type of attack can confuseand misguide the aircraft pilots or the air traffic control personnel and cause dangerous maneuvers. In this project, we intend to build a robust Intrusion Detection System (IDS) to detectanomalous behavior and classify attacks in an aircraft ADS-B protocol in real time duringair-ground communication. The IDS system we propose is a 3 stage deep learning framework built using Spatial Graph Convolution Networks and Deep auto-regressive generative model. In stage 1 we use a Graph convolution network architecture to classify the dataas attacked or normal in the entire airspace of an operating aircraft. In stage 2 we analyze the sequences of air-space states to identify anomalies using a generative Wavenet modeland simultaneously output feature under attack. Final stage consist of aircraft (ICAO) classification module based on unique RF transmitter signal characteristics of an aircraft. This allows the ground station operator to examine each incoming message based on the Phylayer features as well as message data field (such as, position, velocity, altitude) and flagsuspicious messages. The model is trained in a supervised fashion using federated learning where the data remains private to the data owner, i.e.: aircraft-ground station without data being explicitly sent to the cloud server. The server only receives the learned parameters for inference, there by training the entire model on the edge, thus preserving data-privacyand potential adversarial attacks. We aim to achieve a high precision real-time IDS system, with very low false alarm rate for real world deployment
6

The impact of the application of international air cargo security regulations in South Africa

Nevo, Eitan Manuel Damian January 2015 (has links)
Text in English / This research project, within the context of security risk management in general and aviation security in particular, aimed to explore the impact of the application of international and local air cargo security regulations on South Africa, with specific reference to the regulations of the International Civil Aviation Organisation (ICAO), as well as the European Union (EU) and the United States of America (USA). In South Africa, since the early 2000s, the South African Civil Aviation Authority (SACAA) has been the lead agency for dealing with and managing the needs for air cargo security. This oversight by SACAA culminated in 2009 with the promulgation of the SACAA Regulation commonly known as Part 108. Accordingly the primary research focus was on the impact Part 108 has had on the air cargo industry in South Africa. In addition, it compared the South African regulations with those of the USA and EU regulations; explored the compliance of the various roleplayers; sought to understand the enforcement of the regulations; and examined the effectiveness of the available security and screening methods. Furthermore, the research attempted to determine whether these regulations had any effect on preventing or deterring crime in the air cargo sector. / Criminology and Security Science / M. Tech. (Security Management)
7

Analyse de l'évolution de l'Administration canadienne de la sûreté du transport aérien

Chaparro, Natalia 08 1900 (has links)
La présente étude a analysé l’évolution de l’Administration Canadienne de la Sureté du Transport Aérien (ACSTA) depuis sa mise en place jusqu’aujourd’hui, ainsi que les acteurs individuels ou institutionnels impliqués dans ce processus. L’ACSTA gravite dans un champ organisationnel ‐ensemble d’organisations qui constituent un domaine reconnu de la vie institutionnelle (DiMaggio et Powell, 1983)-­ au sein duquel agissent différents acteurs qui ont influencé non seulement sa création, mais qui ont continué à jouer un rôle important tout au long de son évolution. Nous avons défini le champ de la sûreté aérienne et au sein de celui‐ci, nous avons analysé les mécanismes institutionnels, tout en identifiant et définissant le rôle des différents acteurs en présence. Il ressort de nos analyses que principalement deux types de contraintes institutionnelles (DiMaggio et Powell, 1983) ont influencé la création et le développement de l’ACSTA. Premièrement, mis à part les contraintes coercitives émanant de la règlementation internationale de l’Organisation de l’Aviation Civile Internationale, il apparait que d’autres contraintes du même type proviennent du gouvernement américain, par le biais de pressions visant à la mise en place de mesures sécuritaires, tant au moment de la création que tout le long de l’évolution de l’organisation. Il est à noter, cependant, le rôle du terrorisme et des tentatives d’attentat comme provocant de telles contraintes. Deuxièmement, nous avons identifié des contraintes du type normatif, c’est-à‐dire celles qui proviennent des valeurs, des normes et du bagage professionnel lié à la sécurité et à la sureté aérienne. Il apparait que les contraintes normatives agissent constamment alors que les contraintes coercitives surgissent ponctuellement tout au long de la période analysée. / This study analyzed the evolution of the Canadian Air Transport Security Administration (CATSA) since its creation up to today, as well as the individual and / or institutional actors implied in this process. CATSA gravitates in an organizational field ‐the group of organizations that constitute a recognized area of institutional life (DiMaggio and Powell, 1983)- in which different actors, who not only influenced its creation, continued to play an important role all along its evolution. We have defined the air transport security field and within, we have analyzed the institutional mechanisms while identifying and defining the role of the different actors. Our analysis suggests that mainly two types of institutional isomorphisms (DiMaggio and Powell, 1983) have influenced the creation and the evolution of CATSA. Besides the coercive constraints coming from the International Civil Aviation Organization’s international regulation, it appears that other similar pressures emanate from the government of the United States by the means of coercive isomorphism, aiming the establishment of security measures all along CATSA’s evolution. It should be noted, however, the role of terrorists and their attempts to attack, as the catalyst actors and events of such coercive isomorphism. Second of all, we have also identified normative pressures originating from the values and standards from the professional network, or branch, linked to air transport security. It appears that the normative pressures appear regularly, while the coercive pressures emerge punctually all along the analyzed time period.
8

Analyse de l'évolution de l'Administration canadienne de la sûreté du transport aérien

Chaparro, Natalia 08 1900 (has links)
La présente étude a analysé l’évolution de l’Administration Canadienne de la Sureté du Transport Aérien (ACSTA) depuis sa mise en place jusqu’aujourd’hui, ainsi que les acteurs individuels ou institutionnels impliqués dans ce processus. L’ACSTA gravite dans un champ organisationnel ‐ensemble d’organisations qui constituent un domaine reconnu de la vie institutionnelle (DiMaggio et Powell, 1983)-­ au sein duquel agissent différents acteurs qui ont influencé non seulement sa création, mais qui ont continué à jouer un rôle important tout au long de son évolution. Nous avons défini le champ de la sûreté aérienne et au sein de celui‐ci, nous avons analysé les mécanismes institutionnels, tout en identifiant et définissant le rôle des différents acteurs en présence. Il ressort de nos analyses que principalement deux types de contraintes institutionnelles (DiMaggio et Powell, 1983) ont influencé la création et le développement de l’ACSTA. Premièrement, mis à part les contraintes coercitives émanant de la règlementation internationale de l’Organisation de l’Aviation Civile Internationale, il apparait que d’autres contraintes du même type proviennent du gouvernement américain, par le biais de pressions visant à la mise en place de mesures sécuritaires, tant au moment de la création que tout le long de l’évolution de l’organisation. Il est à noter, cependant, le rôle du terrorisme et des tentatives d’attentat comme provocant de telles contraintes. Deuxièmement, nous avons identifié des contraintes du type normatif, c’est-à‐dire celles qui proviennent des valeurs, des normes et du bagage professionnel lié à la sécurité et à la sureté aérienne. Il apparait que les contraintes normatives agissent constamment alors que les contraintes coercitives surgissent ponctuellement tout au long de la période analysée. / This study analyzed the evolution of the Canadian Air Transport Security Administration (CATSA) since its creation up to today, as well as the individual and / or institutional actors implied in this process. CATSA gravitates in an organizational field ‐the group of organizations that constitute a recognized area of institutional life (DiMaggio and Powell, 1983)- in which different actors, who not only influenced its creation, continued to play an important role all along its evolution. We have defined the air transport security field and within, we have analyzed the institutional mechanisms while identifying and defining the role of the different actors. Our analysis suggests that mainly two types of institutional isomorphisms (DiMaggio and Powell, 1983) have influenced the creation and the evolution of CATSA. Besides the coercive constraints coming from the International Civil Aviation Organization’s international regulation, it appears that other similar pressures emanate from the government of the United States by the means of coercive isomorphism, aiming the establishment of security measures all along CATSA’s evolution. It should be noted, however, the role of terrorists and their attempts to attack, as the catalyst actors and events of such coercive isomorphism. Second of all, we have also identified normative pressures originating from the values and standards from the professional network, or branch, linked to air transport security. It appears that the normative pressures appear regularly, while the coercive pressures emerge punctually all along the analyzed time period.
9

The impact of the application of international air cargo security regulations in South Africa

Nevo, Eitan Manuel Damian January 2015 (has links)
Text in English / This research project, within the context of security risk management in general and aviation security in particular, aimed to explore the impact of the application of international and local air cargo security regulations on South Africa, with specific reference to the regulations of the International Civil Aviation Organisation (ICAO), as well as the European Union (EU) and the United States of America (USA). In South Africa, since the early 2000s, the South African Civil Aviation Authority (SACAA) has been the lead agency for dealing with and managing the needs for air cargo security. This oversight by SACAA culminated in 2009 with the promulgation of the SACAA Regulation commonly known as Part 108. Accordingly the primary research focus was on the impact Part 108 has had on the air cargo industry in South Africa. In addition, it compared the South African regulations with those of the USA and EU regulations; explored the compliance of the various roleplayers; sought to understand the enforcement of the regulations; and examined the effectiveness of the available security and screening methods. Furthermore, the research attempted to determine whether these regulations had any effect on preventing or deterring crime in the air cargo sector. / Criminology and Security Science / M. Tech. (Security Management)
10

Practicing the law of human dignity

Chatzipanagiotou, Matthildi 03 March 2016 (has links)
Die philosophischen Grundlagen der Meta-Dimension des Rechts auf Menschenwürde lösen eine Fragestellung aus, die die Grenzen der Disziplin des Rechts übertrifft: wie könnte das Transzendentale als ein Aspekt der Bedeutung von Menschenwürde dargestellt werden? Das Beharren auf der nicht-Bestimmung des Menschenbildes oder auf dem Begriff ‚Gott’ in der Präambel des Deutschen Grundgesetzes, wie es sich in der Deutschen Dogmatik widerspiegelt, gepaart mit dem Bestreben nach einer Fall-zu-Fall ad hoc Konkretisierung dessen, was Menschenwürde bedeutet, inspiriert diese Untersuchung von ‚etwas fehlt’ [‘something missing’]. In postmoderner Art und Weise beschreibt diese Geschichte das Gesetz der Menschenwürde als Trojanisches Pferd und bietet hermeneutische und literarische Grundlagen für eine affirmative Haltung gegenüber einer ''leeren'' Rede im juristischen Diskurs. Die Forschungsfrage erweckt und umkreist die polemisch verbrämten Begriffe von ‚Leere’ und ‚Black Box’: Warum erscheint der Rechtsbegriff der Menschenwürde ‚leer’? Oder wie ist er ‚leer’? Warum und wie ist er eine ‚Black Box’? Wie erscheinen Manifestationen des Konzepts abstrakt wie Universalien, aber im Einzelnen konkret? Die ontologischen, sprachlich-analytischen und phänomenologischen philosophischen Erkenntnisse, vorgestellt im ersten Kapitel, bilden die Linse, durch die fünf maßgebliche Fälle des Bundesverfassungsgerichtes – über Abtreibung, lebenslange Freiheitsstrafe, Transsexualität, staatliche Reaktion auf Terroranschläge und die Gewährleistung eines menschenwürdigen Existenzminimums – im zweiten Kapitel analysiert werden. Die philosophischen Quellen werden nicht als Momente im langen Verlauf der Menschenwürde in der Geschichte der Ideen eingeklammert. / The philosophical underpinnings of what may be called the meta-dimension of the law of human dignity trigger a question that surpasses the boundaries of the discipline of law: how could the transcendental as an aspect of human dignity meaning be portrayed? The insistence on non-determination of the Menschenbild [human image] or ‘God’ in the Preamble to the German Basic Law [Grundgesetz] reflected in German legal doctrine, paired with the commitment to case-by-case ad hoc concretization of what human dignity means inspire this story of ‘something missing’. In postmodern fashion, this story portrays the law of human dignity as a Trojan Horse and provides hermeneutic and literary foundations for an affirmative stance towards ‘emptiness’ talk in legal discourse. The research question rekindles and twists polemically framed ‘emptiness’ and ‘black box’ contentions: Why does the legal concept of human dignity appear ‘empty’? Or, how is it ‘empty’? Why and how is it a ‘black box’? How do manifestations of the concept appear abstract as universals and concrete as particulars? The ontological, linguistic-analytical, and phenomenological philosophical insights presented in Chapter One compose the lens through which five benchmark Bundesverfassungsgericht cases – on abortion, life imprisonment, transsexuals, state response to terrorist attacks, and the guarantee of a dignified subsistence minimum – are analyzed in Chapter Two. The philosophical sources are not bracketed as moments in the long course of human dignity in the history of ideas.

Page generated in 0.4574 seconds