• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 67
  • 50
  • 26
  • 19
  • 9
  • 8
  • 8
  • 8
  • 7
  • 5
  • 5
  • 2
  • Tagged with
  • 240
  • 47
  • 32
  • 31
  • 30
  • 29
  • 20
  • 20
  • 20
  • 19
  • 19
  • 16
  • 15
  • 13
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Ordningsvakter på Möllevångstorget : En studie om ordningsvakter som förebyggande åtgärd / Security guards on Möllevångstorget : A study on security guards as prevention

Johnsson, Caroline, Ado, Kriv January 2021 (has links)
Studien har ett tvådelat syfte. Först ämnar studien undersöka utifrån vilka förutsättningar det tagits beslut om att implementera kommunala ordningsvakter att patrullera på och kring Möllevångstorget i Malmö, vidare att undersöka vilka mål och förväntningar involverade aktörer har på insatsen. Syftet är också att undersöka upplevelsen av ordningsstörningar och trygghet och slutligen uppfattning om ordningsvakter bland personer som besöker Möllevångstorget. För att uppnå studiens första syfte genomfördes semistrukturerade intervjuer med nyckelinformanter, urvalet bestod av sju personer. För att uppnå det andra syftet genomfördes i första hand strukturerade intervjuer med personer som vistades på platsen, i andra hand erbjöds de en webbenkät. 42 personer deltog på en strukturerad intervju och 18 personer besvarade webbenkäten. Det framkom genom de semistrukturerade intervjuerna att narkotikaförsäljning och otrygghet är ett stort problem i området. Målet är framför allt att tryggheten ska öka i samband med LOV§3-insatsen. Det önskades också att det finns en väl fungerande samverkan mellan aktörer som kan bidra till att brottsligheten och otryggheten minskar, att inte enbart förlita sig på att ordningsvakter löser alla problem. Resultatet från de strukturerade intervjuerna/webbenkäten visar att klotter och öppen drogförsäljning är de ordningsstörningar som upplevs förekomma mest frekvent. Tryggheten på platsen förefaller vara relativt hög med viss variation vad gäller tidpunkt, då oro att utsättas för brott är högre under kvällstid. Slutligen visar studien att förtroende kan vara av betydelse för hur effektiva ordningsvakter uppfattas vara. / The study has a twofold purpose, the first is to investigate the conditions on which decisions have been made to implement municipal security guards to patrol around and on Möllevångstorget in Malmö. Furthermore, the study aims to investigate goals and expectations the involved actors have on the current operation. The purpose of the study is also to investigate the experience of disorder and fear of crime and lastly the perception regarding security guards, among people who visits Möllevångstorget. To achieve the first purpose of the study, semi-structured interviews were conducted with key informants, the sample consisted of seven people. To achieve the second purpose of the study, primarily structured interviews were conducted and secondly a web survey was offered. 42 people participated in a structured interview and 18 people answered the web survey. What emerged from the semi-structured interviews indicates that drug sales and fear of crime is a common issue in the area. Furthermore, the main goal is for the security to increase in connection with the LOV§3 operation. It was also desired that there is a well-functioning collaboration between actors that can contribute to reducing crime and fear of crime, and not to rely solely on security guards solving all problems. The results from the structured interviews/ web survey indicate that graffiti and open drug sales are disorders that are perceived to occur most frequently. The fear of crime in the area appears to be relatively low with certain variations in terms of time, as fear about being exposed to crime is higher in the evening. Finally, the study shows that trust can be important for how effective security guards are perceived to be.
182

IRGC and Iranian Soft and Hard Power Influence Within the Middle East

Urbina, Daryl F 01 January 2018 (has links)
The IRGC, or the Iranian Revolutionary Guard Corps, and Iran have utilized soft power to increase their influence within the Middle East. By using military superiority; ideological influence; and trade, both the Iran and the IRGC established dependency between themselves and patron states. Of these patron states, the research focuses on Iraq; Syria; and Yemen, and how Iran and the IRGC affect them through soft power. This research suggests that Iran and the IRGC is using the disability of the aforementioned states to increase their own influence by making them dependent on Iranian military supplies; cultural indoctrination to align with Iranian ideology; and economic dependent on Iran. As Iran's influence grows within these states, its power in the Middle East grows and becomes a security risk for Saudi Arabia; Israel; and any other regime that does not have its interests align with the Iranian regime.
183

Identification of Plant SUN Domain-Interacting Tail Proteins and Analysis of Their Function in Nuclear Positioning

Zhou, Xiao January 2013 (has links)
No description available.
184

BENCH-TOP VALIDATION OF INTELLIGENT MOUTH GUARD

Aksu, Alper 08 August 2013 (has links)
No description available.
185

Personal Property

Lindsay, Carolyn M. 03 September 2013 (has links)
No description available.
186

Microtubule arrays and cell divisions of stomatal development in Arabidopsis

Lucas, Jessica Regan 16 July 2007 (has links)
No description available.
187

Defeating Critical Threats to Cloud User Data in Trusted Execution Environments

Adil Ahmad (13150140) 26 July 2022 (has links)
<p>In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it remains challenging to guarantee the security of our data. This is because a cloud machine’s system software—critical components like the operating system and hypervisor that can access and thus leak user data—is subject to attacks by numerous other tenants and cloud administrators. Trusted execution environments (TEEs) like Intel SGX promise to alter this landscape by leveraging a trusted CPU to create execution contexts (or enclaves) where data cannot be directly accessed by system software. Unfortunately, the protection provided by TEEs cannot guarantee complete data security. In particular, our data remains unprotected if a third-party service (e.g., Yelp) running inside an enclave is adversarial. Moreover, data can be indirectly leaked from the enclave using traditional memory side-channels.</p> <p><br></p> <p>This dissertation takes a significant stride towards strong user data protection in cloud machines using TEEs by defeating the critical threats of adversarial cloud services and memory side-channels. To defeat these threats, we systematically explore both software and hardware designs. In general, we designed software solutions to avoid costly hardware changes and present faster hardware alternatives.</p> <p><br></p> <p>We designed 4 solutions for this dissertation. Our Chancel system prevents data leaks from adversarial services by restricting data access capabilities through robust and efficient compiler-enforced software sandboxing. Moreover, our Obliviate and Obfuscuro systems leverage strong cryptographic randomization and prevent information leakage through memory side-channels. We also propose minimal CPU extensions to Intel SGX called Reparo that directly close the threat of memory side-channels efficiently. Importantly, each designed solution provides principled protection by addressing the underlying root-cause of a problem, instead of enabling partial mitigation.</p> <p><br></p> <p>Finally, in addition to the stride made by our work, future research thrust is required to make TEEs ubiquitous for cloud usage. We propose several such research directions to pursue the essential goal of strong user data protection in cloud machines.</p>
188

A Study of Mitigation Methods for Speculative Cache Side Channel Attacks

Mosquera Ferrandiz, Fernando 05 1900 (has links)
Side channels give attackers the opportunity to reveal private information without accessing it directly. In this study, several novel approaches are presented to mitigate cache side channel attacks including Spectre attack and its variants, resulting in several contributions. CHASM shows the information leakage in several new cache mapping schemes, where different cache address mappings may provide higher or lower protection against cache side channel attacks. GuardCache creates a noisy cache side-channel, making it more difficult for the attacker to determine if an access is a hit or miss (which is the basis for most side channel attacks). SecurityCloak is a framework that encompasses GuardCache with SafeLoadOnMiss whereby cache load misses during speculative execution are delayed until the speculation is resolved, thus preventing attacks that rely on accessing data in during (mis) speculated executions. To search for a compromise between security and performance, it is recommended not always to use protections such as SecurityCloak protections, but also to activate the protection only while executing critical sections of code or on-demand when an attack is detected (or suspected). Our experimental results show a high degree of obfuscation (and prevention of side channels) with a minimal impact on the performance.
189

Soldier Boys of Texas: The Seventh Texas Infantry in World War I

Ball, Gregory W. 08 1900 (has links)
This study first offers a political, social, and economic overview of Texas during the first two decades of the twentieth century, including reaction in the Lone Star state to the declaration of war against Germany in April, 1917; the fear of saboteurs and foreign-born citizens; and the debate on raising a wartime army through a draft or by volunteerism. Then, focusing in-depth on northwest Texas, the study examines the Texas National Guard unit recruited there, the Seventh Texas Infantry Regiment. Using primarily the selective service registration cards of a sample of 1,096 members of the regiment, this study presents a portrait of the officers and enlisted soldiers of the Seventh Texas based on age, occupation, marital status, dependents and other criteria, something that has not been done in studies of World War I soldiers. Next, the regiment's training at Camp Bowie, near Fort Worth, Texas, is described, including the combining of the Seventh Texas with the First Oklahoma Infantry to form the 142nd Infantry Regiment of the Thirty-Sixth Division. After traveling to France and undergoing nearly two months of training, the regiment was assigned to the French Fourth Army in the Champagne region and went into combat for the first time. The study examines the combat experiences of these soldiers from northwest Texas and how they described and expressed their experiences to their families and friends after the armistice of November 11, 1918. The study concludes with an examination of how the local communities of northwest Texas celebrated the armistice, and how they welcomed home their "soldier boys" in the summer of 1919. This study also charts the changing nature of the Armistice Day celebrations and veteran reunions in Texas as time passed, as well as the later lives of some of the officers and men who served with the regiment.
190

Att minnas och att hedra det förflutna : Minnesmärken och Monument över Finska inbördeskriget 1918 / To remember and honor the past : Memorials and Monument dedicated to the Finnish civil war 1918

Wilhelmsson, Thea January 2020 (has links)
This essay looks at memorials and monuments raised in Finland dedicated to the civil war 1918 from both the red and the white side. The earliest memorials are from 1918 and the newest one from 1964. The difference between the two sides and the change over time is looked at through a few chosen monuments and memorials analyzed using semiotics and reception aesthetics. The use of symbols is extensive throughout the period, but the form they take, as well as their connotation, change over time, depending on the political context they are created in. They are created with different aims.

Page generated in 0.0363 seconds