• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 1
  • Tagged with
  • 18
  • 14
  • 9
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A Rhetoric of Betrayal: Military Sexual Trauma and the Reported Experiences of Operation Enduring Freedom and Operation Iraqi Freedom Women Veterans

Aktepy, Sarah Louise 01 April 2010 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / The primary objective of this pilot study was to understand the military experiences of OEF/OIF women veterans. Seven women veterans described accounts of sexual harassment and sexual assault, also known in the Veteran Health Administration (VHA) context as Military Sexual Trauma (MST). The prevalence and dialogue of MST both explicitly and implicitly throughout all the interviews justified examining MST on its own. As an alternative to tracking new cases of MST, this thesis provides an examination of the rhetoric of betrayal and suggests that objective knowledge of MST does not exist apart from such social conditions and one’s interpretations of them. Betrayal emerged as the way in which women veterans understood and made meaning of their MST experiences during the claims-making process. Women veterans incorporated strategies to manage the sexual harassment and sexual assault they experienced while in the military environment, since reporting MST was actively discouraged. Findings from this study suggest that the way we approach and understand MST as a social problem needs to be reconsidered and further examined.
12

EFFECTS OF PRE-DEPLOYMENT MENTAL HEALTH ON AEROMEDICAL EVACUATION MENTAL HEALTH STATUS DURING OPERATION ENDURING FREEDOM/OPERATION IRAQI FREEDOM (OEF/OIF)

Hekler, Amber R. January 2019 (has links)
No description available.
13

A Conceptualization of Treatment Stigma in Returning Veterans

Flick, Jason B. 30 September 2011 (has links)
No description available.
14

The Wisdom of Vulnerability: A Post-Structural Feminist Exploration of Healing in the Aftermath of War

Thompson, Marie 23 September 2010 (has links)
No description available.
15

The Reintegration Myth: An Interpretive Phenomenological Inquiry into the Reentry Experiences of Air Force Reservists Returning from Afghanistan

French, Brent 29 May 2012 (has links)
No description available.
16

Treatment Matching in PTSD: A Confirmatory Factor Analysis Based On Therapeutic Mechanisms of Action

Trachik, Benjamin 01 January 2015 (has links)
The current study takes an initial step toward deriving a method for empirically based, theory-driven treatment matching in a military population suffering from PTSD. Along with the more overt symptoms of PTSD (e.g., persistent hyperarousal), secondary cognitive symptoms have also been shown to be significantly associated with avoidance and intrusive symptoms, as well as contribute to functional impairment. Based on the factor analytic and treatment literature for PTSD, it appears that there are two central mechanisms associated with beneficial therapeutic change that underlies both CPT and PE treatments (i.e., habituation, changes in cognitions). Additionally, different traumatic events and peritraumatic responses may be associated with unique symptom profiles and may necessitate targeted treatment. The present study proposes a novel approach to treatment matching based on the factor structure of PTSD and underlying mechanisms of treatment response. More broadly, this paper provides evidence for a broader understanding of peritraumatic responses and the potential implications of these responses for symptom profiles and illness trajectories.
17

Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices

Abu-Mahfouz, Adnan Mohammed 08 June 2005 (has links)
Data security will play a central role in the design of future IT systems. The PC has been a major driver of the digital economy. Recently, there has been a shift towards IT applications realized as embedded systems, because they have proved to be good solutions for many applications, especially those which require data processing in real time. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Most of these embedded applications will be wireless, which makes the communication channel vulnerable. The implementation of cryptographic systems presents several requirements and challenges. For example, the performance of algorithms is often crucial, and guaranteeing security is a formidable challenge. One needs encryption algorithms to run at the transmission rates of the communication links at speeds that are achieved through custom hardware devices. Public-key cryptosystems such as RSA, DSA and DSS have traditionally been used to accomplish secure communication via insecure channels. Elliptic curves are the basis for a relatively new class of public-key schemes. It is predicted that elliptic curve cryptosystems (ECCs) will replace many existing schemes in the near future. The main reason for the attractiveness of ECC is the fact that significantly smaller parameters can be used in ECC than in other competitive system, but with equivalent levels of security. The benefits of having smaller key size include faster computations, and reduction in processing power, storage space and bandwidth. This makes ECC ideal for constrained environments where resources such as power, processing time and memory are limited. The implementation of ECC requires several choices, such as the type of the underlying finite field, algorithms for implementing the finite field arithmetic, the type of the elliptic curve, algorithms for implementing the elliptic curve group operation, and elliptic curve protocols. Many of these selections may have a major impact on overall performance. In this dissertation a finite field from a special class called the Optimal Extension Field (OEF) is chosen as the underlying finite field of implementing ECC. OEFs utilize the fast integer arithmetic available on modern microcontrollers to produce very efficient results without resorting to multiprecision operations or arithmetic using polynomials of large degree. This dissertation discusses the theoretical and implementation issues associated with the development of this finite field in a low end embedded system. It also presents various improvement techniques for OEF arithmetic. The main objectives of this dissertation are to --Implement the functions required to perform the finite field arithmetic operations. -- Implement the functions required to generate an elliptic curve and to embed data on that elliptic curve. -- Implement the functions required to perform the elliptic curve group operation. All of these functions constitute a library that could be used to implement any elliptic curve cryptosystem. In this dissertation this library is implemented in an 8-bit AVR Atmel microcontroller. / Dissertation (MEng (Computer Engineering))--University of Pretoria, 2006. / Electrical, Electronic and Computer Engineering / unrestricted
18

Resilience Factors Affecting the Readjustment of National Guard Soldiers Returning From Deployment

Tackett, D. Patricia 07 March 2011 (has links)
No description available.

Page generated in 0.0293 seconds