• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 6
  • 3
  • 1
  • 1
  • Tagged with
  • 21
  • 21
  • 7
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

"Livet bakom de manipulativa profetiorna" : En kvalitativ textanalys som skildrar maltutövandet i två amerikanskgrundade nyreligiösa rörelser / “Life behind the manipulative prophecies” : A qualitative text analysis depicting the exercise of power in two American founded new religious movements

Svensson, Joakim January 2020 (has links)
Just a few years after the end of WWII, the American author Lafayette Ronald Hubbard developed the new religious movement Scientology, which has evolved over the years into one of the largest new religious movements in the world. Two decades later, an American pastor’s son named David Berg, received a revelation from God, which led to the founding of the new religious movement The Family International, formerly known as God’s Children. Over the years there have been a number of defectors that wanted to change and turn their life around. But only a few managed to gather confidence to tell the rest of the world of the circumstances and living conditions in the new religious movement that have characterized major parts of their lives. The main purpose of this study was to elucidate how former members and defectors portrayed and experienced the explicit and implicit exercise of power in two, American founded, new religious movements. In addition, the study applied the Austrian psychologist Sigmund Freud’s theories in dynamic psychology and religion, in order to interpret the former members depictions, in relation to the attitudes expressed.  The didactic relevance of this study refers to the growth and the more frequent sight of new religious movements in our society. The society, primarily in the media, but also in scientific contexts, has associates these movements with the negative loaded word sect, which has led to appearance of difficulties in the education of religion. Therefore, contributes this study, based on a neutral and a non-evaluative perspective of new religious movements, to eliminate prejudices and create tolerance among all students. What emerged along the course of the study was that the explicit control and exercise of power was established in the charismatic attribute and, above all, the power holder’s ability to convince and persuade the members was one of the major parts in the power structure. The study also illustrates how the implicit exercise of power of the Scientology constantly revolved around money and The Family International around sex relations. In conclusion, the leaders explicit and implicit exercise of power integrates with each other and has its foundation in the charismatic leadership and the ability to convince and persuade its members. The conclusion also illustrates how the members adaption and submission to its leader was an unconscious act according to Freud’s theory, concerning defense mechanism.  As a result, the leaders achieved to manage the movements without resistance and questioning, and also got expression for their own manners.
12

Adversarial Attacks and Defense Mechanisms to Improve Robustness of Deep Temporal Point Processes

Khorshidi, Samira 08 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Temporal point processes (TPP) are mathematical approaches for modeling asynchronous event sequences by considering the temporal dependency of each event on past events and its instantaneous rate. Temporal point processes can model various problems, from earthquake aftershocks, trade orders, gang violence, and reported crime patterns, to network analysis, infectious disease transmissions, and virus spread forecasting. In each of these cases, the entity’s behavior with the corresponding information is noted over time as an asynchronous event sequence, and the analysis is done using temporal point processes, which provides a means to define the generative mechanism of the sequence of events and ultimately predict events and investigate causality. Among point processes, Hawkes process as a stochastic point process is able to model a wide range of contagious and self-exciting patterns. One of Hawkes process’s well-known applications is predicting the evolution of viral processes on networks, which is an important problem in biology, the social sciences, and the study of the Internet. In existing works, mean-field analysis based upon degree distribution is used to predict viral spreading across networks of different types. However, it has been shown that degree distribution alone fails to predict the behavior of viruses on some real-world networks. Recent attempts have been made to use assortativity to address this shortcoming. This thesis illustrates how the evolution of such a viral process is sensitive to the underlying network’s structure. In Chapter 3 , we show that adding assortativity does not fully explain the variance in the spread of viruses for a number of real-world networks. We propose using the graphlet frequency distribution combined with assortativity to explain variations in the evolution of viral processes across networks with identical degree distribution. Using a data-driven approach, by coupling predictive modeling with viral process simulation on real-world networks, we show that simple regression models based on graphlet frequency distribution can explain over 95% of the variance in virality on networks with the same degree distribution but different network topologies. Our results highlight the importance of graphlets and identify a small collection of graphlets that may have the most significant influence over the viral processes on a network. Due to the flexibility and expressiveness of deep learning techniques, several neural network-based approaches have recently shown promise for modeling point process intensities. However, there is a lack of research on the possible adversarial attacks and the robustness of such models regarding adversarial attacks and natural shocks to systems. Furthermore, while neural point processes may outperform simpler parametric models on in-sample tests, how these models perform when encountering adversarial examples or sharp non-stationary trends remains unknown. In Chapter 4 , we propose several white-box and black-box adversarial attacks against deep temporal point processes. Additionally, we investigate the transferability of whitebox adversarial attacks against point processes modeled by deep neural networks, which are considered a more elevated risk. Extensive experiments confirm that neural point processes are vulnerable to adversarial attacks. Such a vulnerability is illustrated both in terms of predictive metrics and the effect of attacks on the underlying point process’s parameters. Expressly, adversarial attacks successfully transform the temporal Hawkes process regime from sub-critical to into a super-critical and manipulate the modeled parameters that is considered a risk against parametric modeling approaches. Additionally, we evaluate the vulnerability and performance of these models in the presence of non-stationary abrupt changes, using the crimes and Covid-19 pandemic dataset as an example. Considering the security vulnerability of deep-learning models, including deep temporal point processes, to adversarial attacks, it is essential to ensure the robustness of the deployed algorithms that is despite the success of deep learning techniques in modeling temporal point processes. In Chapter 5 , we study the robustness of deep temporal point processes against several proposed adversarial attacks from the adversarial defense viewpoint. Specifically, we investigate the effectiveness of adversarial training using universal adversarial samples in improving the robustness of the deep point processes. Additionally, we propose a general point process domain-adopted (GPDA) regularization, which is strictly applicable to temporal point processes, to reduce the effect of adversarial attacks and acquire an empirically robust model. In this approach, unlike other computationally expensive approaches, there is no need for additional back-propagation in the training step, and no further network isrequired. Ultimately, we propose an adversarial detection framework that has been trained in the Generative Adversarial Network (GAN) manner and solely on clean training data. Finally, in Chapter 6 , we discuss implications of the research and future research directions.
13

Estratégias para tratamento de ataques de negação de serviço na camada de aplicação em redes IP

Dantas, Yuri Gil 14 July 2015 (has links)
Submitted by Viviane Lima da Cunha (viviane@biblioteca.ufpb.br) on 2016-02-15T12:15:56Z No. of bitstreams: 1 arquivototal.pdf: 3158533 bytes, checksum: 99b0075b0671ec0e3c4fdda3a82a360f (MD5) / Made available in DSpace on 2016-02-15T12:15:56Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 3158533 bytes, checksum: 99b0075b0671ec0e3c4fdda3a82a360f (MD5) Previous issue date: 2015-07-14 / Distributed Denial of Service (DDoS) attacks remain among the most dangerous and noticeable attacks on the Internet. Differently from previous attacks, many recent DDoS attacks have not been carried out over the Transport Layer, but over the Application Layer. The main difference is that in the latter, an attacker can target a particular application of the server, while leaving the others applications still available, thus generating less traffic and being harder to detected. Such attacks are possible by exploiting application layer protocols used by the target application. This work proposes a novel defense, called SeVen, for Application Layer DDoS attacks (ADDoS) based on the Adaptive Selective Verification (ASV) defense used for Transport Layer DDoS attacks. We used two approches to validate the SeVen: 1) Simulation: The entire defense mechanism was formalized in Maude tool and simulated using the statistical model checker (PVeStA). 2) Real scenario experiments: Analysis of efficiency SeVen, implemented in C++, in a real experiment on the network. We investigate the resilience for mitigating three attacks using the HTTP protocol: HTTPPOST, Slowloris, and HTTP-GET. The defence is effective, with high levels of availability, for all three types of attacks, despite having different attack profiles, and even for a relatively large number of attackers. / Ataques de Negação de Serviço Distribuídos (Distributed Denial of Service - DDoS) estão entre os ataques mais perigosos na Internet. As abordagens desses ataques vêm mudando nos últimos anos, ou seja, os ataques DDoS mais recentes não têm sido realizados na camada de transporte e sim na camada de aplicação. A principal diferença é que, nesse último, um atacante pode direcionar o ataque para uma aplicação específica do servidor, gerando menos tráfego na rede e tornando-se mais difícil de detectar. Tais ataques exploram algumas peculiaridades nos protocolos utilizados na camada de aplicação. Este trabalho propõe SeVen, um mecanismo de defesa probabilístico para mitigar ataques DDoS na camada de aplicação, baseada em Adaptive Selective Verification (ASV), um mecanismo de defesa para ataques DDoS na camada de transporte. Foram utilizadas duas abordagens para validar o SeVen: 1) Simulação: Todo o mecanismo de defesa foi formalizado na ferramenta computacional, baseada em lógica de reescrita, chamada Maude e simulado usando um modelo estatístico (PVeStA). 2) Experimentos na rede: Análise da eficiência do SeVen, implementado em C++, em um experimento real na rede. Em particular, foram investigados três ataques direcionados ao Protocolo HTTP: GET FLOOD, Slowloris e o POST. Nesses ataques, apesar de terem perfis diferentes, o SeVen obteve um elevado índice de disponibilidade.
14

O mau cheiro sobre as bases da sustentação psíquica

Bonomi, Tomás Moraes Abreu 11 September 2015 (has links)
Made available in DSpace on 2016-04-28T20:39:10Z (GMT). No. of bitstreams: 1 Tomas Moraes Abreu Bonomi.pdf: 828021 bytes, checksum: 232f76283f8526bbf7cdd8c07714021f (MD5) Previous issue date: 2015-09-11 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / The present work, inserted in the fundamental psychopathology field of study, is based on a clinical situation. The patient demands analysis because all her love relationships failed which caused intense suffering. After a few sessions the patient says she knows why her relationships come to an end: She stinks. The stench becomes a recurring theme during her analysis both in her speech as in her dreams, memories, fantasies, hallucinations and also in the transfer with the analyst. A clinical hypothesis is formulated in the terms of the stench being a defense mechanism. As theoretical foundation the following psychoanalytical concepts will be used: symptom, narcissism, defense mechanism, hallucinations, anxiety, femininity among others. Finally, are mapped different functions of the stench in the psychic dynamism and therefore discusses his role as psychic support base / O presente trabalho, inserido no campo de estudo da Psicopatologia Fundamental, tem como base a narrativa de um atendimento clínico. A paciente em questão procura análise, pois todos seus relacionamentos amorosos fracassavam, o que lhe causava intenso sofrimento. Passadas algumas sessões, a paciente diz que sabe o porquê dos seus fracassos nas relações: ela fede. O mau cheiro passa a ser tema recorrente durante sua análise, tanto em seu discurso manifesto como em sonhos, lembranças, fantasias, alucinações e também na transferência. A partir desses elementos é formulada uma hipótese clínica de que o mau cheiro se insere na economia psíquica da paciente como um mecanismo de defesa. Como fundamentação teórica são utilizados os conceitos psicanalíticos de sintoma, narcisismo, mecanismo de defesa, alucinação, angústia, feminilidade, entre outros. Por fim, são mapeadas diferentes funções do cheiro no dinamismo psíquico e, assim, discute-se sua função como base de sustentação psíquica
15

Fundamental Efforts to Develop Novel Biotechnological Approaches in Pest Management Applications against Coleoptera: Transcriptomic Exploration of the Chemical Defense Mechanism in the Red Flour Beetle, Tribolium castaneum

Li, Jianwei 24 January 2013 (has links)
No description available.
16

Borderline psychopathology and the defense mechanism test

Sundbom, Elisabet January 1992 (has links)
The main purpose of the present studies has been to develop the Defense Mechanism Test (DM1) for clinical assessment of severe psychopathology with the focus on the concept of Borderline Personality Organization (BPO) according to Kemberg. By relating the DMT and the Structural Interview to each other, the concurrent validity of the concept of Personality Organization (PO) for psychiatric inpatients has been investigated. Two different assessment approaches have been used for this purpose. One has been to take a theoretical perspective as the starting-point for the classification of PO by means of the DMT. The other has been a purely empirical approach designed to discern natural and discriminating patterns of DMT distortions for different diagnostic groups. A dialogue is also in progress between DMT and current research on the Rorschach test in order to increase understanding of borderline phenomena and pathology. The overall results support Kemberg's idea that borderline patients are characterized by specific intrapsychic constellations different from those of both psychotic and neurotic patients. Both the DMT and the Structural Interview provide reliable and consistent judgements of PO. Patients with the syndrome diagnosis Borderline Personality Disorder exhibit different perceptual distortions from patients suffering from other personality disorders. The classic borderline theory is a one-dimensional developmental model, where BPO constitutes a stable intermediate form between neurosis and psychosis. The present results suggest that a two-dimensional model might be more powerful. Hence, the level of self- and object representations and reality orientation might be considered both from a developmental gad an affective perspective across varying forms of pathology. Kemberg suggests that borderline and psychotic patients share a common defensive constellation, centered around splitting, organizing self- and object representations. This view did not find support. The defensive pattem of the BPO patients is significantly different from the PPO defensive pattern. The BPO patients form their self- and object images affectively and thus the self- and object representations would seem to influence the defensive organization and not the other way around. The results have implications for the procedure and the interpretation of the DMT e.g. one and the same DMT picture can discern different kinds of personality; reactions other than the operationalized defense categories in the DMT manual can be valid predictors of PO; some of the DMT defenses described in the manual have to be reconceptualized such as isolation, repression and to some degree denial. Multivariate models are powerful tools for the integration of reactions to DMT into diagnostic patterns. / <p>Diss. (sammanfattning) Umeå : Umeå universitet, 1992, härtill 4 uppsatser.</p> / digitalisering@umu
17

Rôle de la Dynamique Membranaire dans la Mise en Place des Mécanismes de Défense chez le Tabac

Stanislas, Thomas 13 May 2011 (has links)
La cryptogéine, une protéine sécrétée par l’oomycète Phytophthora cryptogea, provoque la mise en place de mécanismes de défense chez le tabac, mobilisant au cours des étapes précoces de la signalisation associée, des protéines localisées dans la membrane plasmique (MP). Une fraction membranaire résistante à la solubilisation par les détergents (DIM pour Detergent Insoluble Membrane), enrichie en stérols et en sphingolipides avait été purifiée à partir de la MP de tabac : cette fraction contenait plusieurs protéines impliquées dans la cascade de signalisation induite par la cryptogéine. Chez l’animal, l’association dynamique de protéines à des microdomaines riches en stérols et sphingolipides en réponse à un stress biotique joue un rôle essentiel dans la régulation de la signalisation cellulaire. L’objectif de ce travail était de tester l’hypothèse qu’un tel phénomène puisse se produire dans notre modèle d’étude. La comparaison du protéome de fractions DIMs, purifiées à partir de cellules traitées ou non pendant 5 minutes à la cryptogéine a été réalisée à l’aide d’un marquage isotopique (15N ou 14N) et d’une approche de protéomique quantitative. Le premier résultat est que l’abondance de la majorité des protéines n’est pas modifiée dans les DIMs en réponse à la cryptogéine. Une seule protéine est enrichie dans les DIMs, une isoforme de 14-3-3, tandis que quatre dynamines (DRPs pour Dynamin Related Proteins), impliquées dans le trafic vésiculaire, sont exclues des DIMs en réponse à la cryptogéine. L’étude d’une des dynamines identifiées, DRP1A, a été menée. Nous avons caractérisé les différents gènes codant DRP1A dans le génome du tabac, puis utilisé une approche ARN antisens pour altérer l’expression de cette protéine et nous avons étudié sa localisation subcellulaire à l’aide d’anticorps spécifiques et en observant en microscopie confocale cette protéine fusionnée à la GFP. Cette approche a permis de confirmer la présence de DRP1A dans la fraction DIMs et la diminution transitoire de son association à cette fraction en réponse à la cryptogéine, suite à une dissociation de la fraction membranaire. Ces travaux constituent la première mise en évidence d’une association/dissociation dynamique de protéines aux DIMs de plantes en réponse à un stimulus biologique / Cryptogein, a protein secreted by the oomycete Phytophthora cryptogea, induces defense mechanisms in tobacco. Several proteins involved in the associated signaling pathway were identified and localized on the plasma membrane (PM). A fraction resistant to solubilization by detergent named DIMs for Detergent Insoluble Membranes, enriched in sterols an sphigolipids had been isolated from tobacco PM. It was proved to contain proteins previously identified as actors of the signaling cascade triggered by cryptogein. In animal cells, the dynamic association of proteins to sterol and sphingolipid rich microdomains under the influence of a biological stimulus plays an essential role in the regulation of cellular signaling. The purpose of this work was to test the hypothesis that such a phenomenon might occur in our model. The comparison using isotopic labeling (15N or 14N) and quantitative proteomics, of the composition of DIMs extracted from tobacco cells treated or not by cryptogein, revealed that, although the association to DIMs of most proteins remained unchanged, five proteins had their relative abundance modified after 5 minutes of treatment. One of these was a signaling protein (a 14-3-3 protein) and the four others were related to cell trafficking (4 DRPs, Dynamin Related Proteins). We characterized the DRP1A gene family in tobacco, and set up an antisens RNA antisense to down-regulate the expression of this protein. We studied the intracellular localization of DRP1 using specific antibodies and a GFP fusion. The results confirmed the presence of DRP1 in DIMs and its depletion from this fraction upon cryptogein treatment, through a dissociation from the PM. This is the first evidence of a dynamic association/dissociation of proteins to microdomains in plants upon a biological stimulus
18

When Escapism Becomes Neurotic : A Psychoanalytic Reading of Defense Mechanisms Employed in The Picture of Dorian Gray as a Medium to Escape Reality

Andreas, Santesson Papadopoulos January 2021 (has links)
Using psychoanalysis as a theoretical framework, this essay examines the subject of escapism in The Picture of Dorian Gray by Oscar Wilde. Defense mechanisms of the ego, first thought of by Sigmund Freud, allow for a clearer understanding of what takes place during the plot. By taking the author’s background into account, along with clues in the plot of the novel, a more realistic reading of the novel is made possible instead of a supernatural take. A psychoanalytic perspective allows the essay to explore why and how the protagonist chooses to escape in the novel. The main focus of the analysis is how the protagonist of the novel carries the theme of escapism with increased intensity as the plot progresses. The essay considers why and how Dorian chooses to escape reality and utilizes the theoretical framework for two defense mechanisms used as an aid during escapist activities. Dorian progressively uses the defense mechanisms known as repression and rationalization to support his escapist behavior and protect his ego from anxiety derived from internal and external conflicts.
19

Thick Love : A Psychoanalytical Study of Mother-Daughter Relationships in Toni Morrison’s Beloved

Hashim, Khuteibe January 2021 (has links)
This study employs psychoanalytical theories to explore how the conscious, unconscious, and subconscious workings of the mind, combined with a search for identity, are presented and dealt with in Toni Morrison’s novel Beloved (1987). It is done through a close reading and in-depth textual analysis of thematic concerns raised in the work. Previous research has primarily relied on some specific aspects of psychoanalytic theory and applied it to Beloved. The theoretical framework provides a rationale for this paper to research two events in particular that highlight the mother-daughter relationships between Sethe and her Ma’am and between Sethe and her daughter Beloved. These relationships are consequently analyzed by employing psychoanalytical concepts offered by Freud, Lacan and Kristeva. By utilizing psychoanalytical criticism, the characters’ conscious and unconscious motives and feelings are revealed and explained, as well as the meanings and the undercurrents that lie underneath the text’s consciousness. The results suggest that Sethe murdered her daughter Beloved to keep her from becoming a slave and enduring the dreadful and traumatic consequences of slavery, which was similar to what Sethe went through when she was abandoned by her Ma'am. Sethe’s childhood psychological principles and trauma shaped her identity as a mother as she witnessed her mother abandoning her at a young age by being tortured and killed. The events around Sethe’s mother’s death and the fact that Sethe never identifies her mother’s dead body, scar Sethe for life and instill in Sethe a sense of “lack” and an abnormal feeling of maternal love where she is ready to kill her children to save them from the horror of slavery.
20

A Study on Behaviors of Machine Learning-Powered Intrusion Detection Systems under Normal and Adversarial Settings

Pujari, Medha Rani 15 June 2023 (has links)
No description available.

Page generated in 0.061 seconds