• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 2
  • 1
  • 1
  • Tagged with
  • 16
  • 16
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A robust methodology to evaluate aircraft survivability enhancement due to combined signature reduction and onboard electronic attack.

Flachsbart, Brian M. January 1997 (has links)
Thesis (M.S. in Aeronautical Engineering) Naval Postgraduate School, June 1997. / Thesis advisor, Robert E. Ball. AD-A329 367. Includes bibliographical references (p. 52-53).
2

Aircraft carrier anti-air self defense system design and analysis

Deligne, William J. 30 March 2010 (has links)
see document / Master of Science
3

Mechanistic studies of Fusobacterium genetic and defense systems

Umana Torres, Ariana 07 December 2020 (has links)
Fusobacterium are Gram-negative anaerobic bacteria that colonize a variety of eukaryotes including cattle and humans. In humans, Fusobacterium coordinates the central architecture of the oral biofilm by expressing an abundance of outer membrane adhesins that mediate bridging between early and late colonizing bacteria. While Fusobacterium are mostly considered commensal microorganisms, they can also become an opportunistic pathogen that spreads throughout the human body and promote the development of oral and extra-oral infections and diseases including colorectal cancer. Importantly for this work, many Fusobacterium species and strains are recalcitrant to genetic manipulation, the majority of which has led to hindrance in the study of their biology, molecular mechanisms, and pathogenesis. The genetic intractability of Fusobacterium is an obstacle for the development of future treatments for diseases associated with these anaerobic bacteria. Therefore, the creation of tools to enhance genome editing in target species is crucial to understand the molecular mechanisms driving Fusobacterium infections. This dissertation exploits innate and adaptive defense systems present in Fusobacterium for their use as molecular tools for genome editing. Accordingly, we first investigated restriction-modification systems with a focus on the role of DNA methyltransferases and endonucleases in host defense and genetic recalcitrance in several strains of Fusobacterium through bioinformatic and biochemical approaches. Altogether, over 15 DNA methyltransferases were characterized. Most notably, we identified and characterized two type II DNA methyltransferases that are capable of methylating plasmid DNA by treating with purified enzymes in-vitro and coexpression approaches in Escherichia coli strains, enabling an statiscally improved transformation efficiency via electroporation in F. nucleatum. Also contained in this dissertation is the first detailed description of CRISPR-Cas adaptive immunity systems present in Fusobacterium strains. Most of the discovered CRISPR-Cas systems in Fusobacterium belong to Class 1 systems. Nonetheless we identified Type II-A and Type VI-C Class 2 systems. The discovery of Cas9 and Cas13c effectors respectively from these systems will be crucial in the development of a new generation of genome-editing tools in Fusobacterium. The studies included in this dissertation provide the framework for overcoming Fusobacterium genetic recalcitrance by the implementation of host mimicking techniques. By utilizing restriction-modification system enzymes and the adaptive immunity CRISPR-Cas systems, we will gain a better understanding of how Fusobacterium modulates infections and diseases, and ultimately explore the potential of novel therapeutic treatments. / Doctor of Philosophy / The oral cavity has one of the most diverse and largest microbial populations, where microorganisms are capable of colonizing hard surfaces of the teeth and the soft tissues of the oral mucosa. A fundamental member of the oral microbiome is Fusobacterium, a Gram-negative bacterium which coordinates the oral biofilm formation by interacting with other microorganisms. In recent studies, Fusobacterium has been associated with oral and extra-oral infections and diseases including periodontitis, preterm birth, Lemiere syndrome, inflammatory bowel disease and colorectal cancer. Importantly, many Fusobacterium species and strains are challenging to study due to their inability to uptake exogenous DNA and lack of genetic tools, which has hindered the study of their biology, molecular mechanisms and pathogenesis. The challenges in the genetic manipulation of Fusobacterium present a significant obstacle for the development of future treatments for diseases associated with these bacteria. Therefore, the creation of tools to expand bacterial transformation of exogenous DNA and genome editing to more than just one Fusobacterium species is crucial to understand how Fusobacterium is causing these infections. This dissertation explores the presence and utilization of defense systems, which defend bacteria from phage attack, as an alternative to improve Fusobacterium genetics. Accordingly, we first studied a set of over 15 enzymes that recognize a specific DNA pattern and add a methyl group (DNA methyltransferases) to specific nucleotides in several strains of Fusobacterium. We discovered that two of these enzymes improve Fusobacterium's ability of importing and genomically incorporating exogenous DNA after an electric discharge permeabilizes the bacterial membrane. Furthermore, for the first time we have described the composition of CRISPR-Cas bacterial defense systems, that detect invading DNA from viruses and provide protection to Fusobacterium strains. These systems have previously been successfully used as genetic tools to achieve genome editing. Thus, their further characterization is warranted to create novel molecular tools in Fusobacterium. Altogether, these discoveries will lead to a better comprehension of Fusobacterium biology in infections and diseases, while exploring novel therapeutic strategies.
4

Quo vadis NATO? Collective defense, collective security, and the Euro-Atlantic realm in the second decade of the 21st century /

Kavaker, Vahap. January 2006 (has links) (PDF)
Thesis (M.A. in Security Studies (Defense Decision-Making and Planning))--Naval Postgraduate School, March 2006. / Thesis Advisor(s): Donald Abenheim. "March 2006." Includes bibliographical references (p.73-80). Also available online.
5

Design of reliable and secure devices by algebraic manipulation codes

Ge, Shizun January 2012 (has links)
Thesis (M.Sc.Eng.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you. / In this thesis, we firstly present the secure multipliers protected by the AMD codes, and demonstrate that the fault masking probabilities are not worse than the results based on the theoretical analysis of error masking probabilities, if the attacker injects faults at outputs of the inside logic gates of the protected devices. Single-errorcorrecting, double-error-detecting (SEC-DED) codes are widely used for the design of errors, thus they are not suitable for memories used in cryptographic devices. Algebraic Manipulation Detection (AMD) codes provide strong protection against fault injection attacks. But traditional AMD codes can not be used for correcting errors. In this thesis, we also present the constructions of the strongly secure algebraic manipulation correction (AMC) codes. The estimation for a probability for miscorrection of multiple errors is given. Hardware implementations of strongly secure SEC-DED memories based on the proposed codes are presented. Comparison with other codes which have been used for SEC-DED memories with security or weak security are given in terms of numbers of undetected errors, sizes of security kernels and miscorrection probabilities as well as latency, area and power consumption for encoders and decoders. An error handling method to distinguish between random errors and fault injection attacks is presented as well. The proposed code can be applied to most secure-critical memories in cryptographic devices. As far as we know, this is the only efficient approach to provide both high reliability for single and double random errors, and high security for strong fault attack when an attacker has a control of both on the messages (outputs of the memories) and the errors. / 2031-01-01
6

Defense co-production collaborative national defense /

Richardson, Robert R. January 1900 (has links)
Thesis (M.A.)--Naval Postgraduate School, 2005. / Title from title screen (viewed Apr. 16, 2008). Cites June 2003 GAO report GAO-03-695, "Contractors provide vital services to deployed forces but are not adequately addressed in DoD plans." "June 2005." The original document contains color images. "ADA435597"--URL. Includes bibliographical references (p. 91-96). Also issued in paper format.
7

Time waits for no program : schedule growth in technology development and systems acquisition of major U.S. defense weapons programs 1948-2009

Beach, Fred Charles, 1959- 05 October 2010 (has links)
This work set out to determine the cause or causes of the significant growth in the time required to develop and field new technology in major weapon system programs in the U.S. Department of Defense that has occurred over the last sixty years. The effort revolved around the analysis of twenty-one case studies of major technology development and acquisition programs (seven each from the early, late, and post Cold War periods, respectively). Primary causal factors are identified and discussed as well as recommendations to remedy or mitigate them. / text
8

Blueprints For The Future Comparing National Security Space Architectures /

Daehnick, Christian C. 23 March 1998 (has links)
Thesis (M.M.A.S.)--School of Advanced Airpower Studies, 1995. / Cover page date: [1995]. Vita. Includes bibliographical references.
9

Aktuální otázky nutné obrany a krajní nouze / Self-defense and Necessity: Current Issues

Fridrich, Daniel January 2020 (has links)
1 Self-defense and Necessity: Current Issues Abstract This diploma thesis concerns the institutions of self-defense and necessity as circumstances excluding unlawfulness, and current issues related to them. Both institutions entail the possibility of individuals to act in order to protect their interests, as protected by criminal law. These interests can be individual or society-wide. Such conduct may be considered a criminal act, however, upon meeting statutory conditions, the unlawfulness of such conduct is excluded entirely. Therefore, it will not be a criminal act and the individual cannot be punished, neither under criminal law, nor legal rules of other legal areas. The aim of this thesis is to focus on current aspects of these institutions. Furthermore, the thesis explores whether the institutions' conditions are appropriately set for individuals acting within them and whether the legislation gives courts sufficient room for assessing specific situations. The resulting finding is that both institutions are effective at reacting to a large number of situations, including those that have only recently started emerging. The institutions' conditions are set in an accommodating manner, and allow the courts a wide margin of discretion. The first chapter defines the circumstances excluding unlawfulness in...
10

Imagining Arms : Rationality and the Sociotechnical Imaginary of Swedish Defense Requirements Engineering

Welsh, John January 2023 (has links)
Despite significant efforts at improving requirements engineering in the development of military systems, defense procurement is still plagued by expensive, well-publicized failures. Central to requirements engineering is the concept of rationality – more reason is assumed to eventually ‘solve’ the problem of defense requirements engineering. This thesis suggests that rationality, instead of being an objective standard, might be part of a socially constructed framework for action. Leaning on Science and Technology Studies for a theoretical framework, it is suggested that rationality and irrationality is part of a larger sociotechnical imaginary which outlines desirable outcomes, actions, and values in military systems development. This thesis presents an interview study of requirements analysts in the Swedish defense sector to outline if and how rationality relates to the narrative of this potential imaginary. The results indicate that a Swedish defense requirements engineering imaginary consists of a rationality/irrationality dichotomy which sets the stage for action in a state of chaos, and that the narrative associated with that imaginary enables the

Page generated in 0.0649 seconds