Spelling suggestions: "subject:"preservation."" "subject:"reservation.""
491 |
An optimality-theoretic analysis of scandinavian object shift and remnant VP-topicalisationVikner, Sten, Engels, Eva January 2006 (has links)
Holmberg (1997, 1999) assumes that Holmberg's generalisation (HG) is derivational, prohibiting Object Shift (OS) across an intervening non-adverbial element at any point in the derivation. Counterexamples to this hypothesis are given in Fox & Pesetsky (2005) which show that remnant VP-topicalisations are possible in Scandinavian as long as the VP-internal order relations are maintained. Extending the empirical basis concerning remnant VP-topicalisations, we argue that HG and the restrictions on object stranding result from the same, more general condition on order preservation. Considering this condition to be violable and to interact with various constraints on movement in an Optimality-theoretic fashion, we suggest an account for various
asymmetries in the interaction between remnant VP-topicalisations and both OS and other movement operations (especially subject raising) as to their order preserving characteristics and stranding abilities.
|
492 |
Analysis and implementation of a positivity preserving numerical method for an HIV model.Wyngaardt, Jo-Anne. January 2007 (has links)
<p><font face="CMR12">
<p align="left">This thesis deals with analysis and implementation of a positivity preserving numerical method for a vaccination model for the transmission dynamics of two HIVsubtypesnin a given community. The continuous model is analyzed for stability and equilibria. The qualitative information thus obtained is used while designing numerical method(s). Three numerical methods, namely, Implicit Finite Difference Method (IFDM), Non-standard Finite Difference Method (NSFDM) and the Runge-Kutta method of order four (RK4), are designed and implemented. Extensive numerical simulation are carried out to justify theoretical outcomes.</p>
</font></p>
|
493 |
Healing the Wounds: Commemorations, Myths, and the Restoration of Leningrad's Imperial Heritage, 1941-1950Maddox, Steven 20 January 2009 (has links)
This dissertation is a study of Leningrad during World War II and the period of postwar restoration (1941-1950). Leningrad was besieged by the Germans for nearly nine-hundred days. As hundreds of thousands of people died from bombings, shelling, cold, and starvation, local authorities surprisingly instituted measures to ensure that the city’s historic monuments be safeguarded from destruction. When Leningrad was liberated in January 1944, a concerted effort was put into place to breath life into these damaged and destroyed monuments and to heal the wounds inflicted on the city. Instead of using the damage to modernize the city, Leningrad and Soviet authorities opted to privilege the country’s tsarist heritage. In the postwar period, municipal authorities proclaimed that restored monuments commemorate the determination and heroism shown by the people of Leningrad during the war. The memory of the blockade, it was argued, was a “red thread” that must run through and be inscribed in all restoration works.
Although this dissertation is a local study of war and postwar restoration, it speaks to broader trends within the Soviet Union before, during, and after World War II. I argue that the care shown for Leningrad’s imperial monuments was the result of an ideological shift that began in the mid-1930s away from iconoclasm toward rehabilitating and respecting certain events and characters from the past. With international tensions rising in the 1930s, this turn to the past acted as a unifying force that had a tremendous influence on the patriotism shown during the war with the Nazis. In the postwar period, as the Soviet state began to redefine its image based on the myth of war and the country’s tsarist heritage, this patriotism was further promoted, resulting in a flurry of work throughout the Soviet Union to restore the vessels of the country’s past. Like many other modernizing states, the Soviet Union looked to its past to create a united and patriotic citizenry.
|
494 |
Responding to and Recovering from a Body-related Threat: An Application of Social Self-Preservation TheoryLamarche, Larkin 17 December 2012 (has links)
Social self-preservation theory (SSPT) suggests that when faced with social-evaluative threat, a set of psychological and physiological responses are elicited concurrently (Dickerson, Gruenewald, & Kemeny, 2004; Kemeny, Gruenewald, & Dickerson, 2004). A series of studies examined the applicability of SSPT to the examination of social-evaluative body-related threats. In the first study, interviews were conducted to identify and describe uncomfortable body-related situations, and typical responses to such situations. Findings provided preliminary evidence of the applicability of SSPT to everyday body-related threats of young adult women – the threats, context of those threats, and responses to such threats were consistent with SSPT. The second study examined psychobiological responses to, and recovery from, a social-evaluative body-related threat. Findings from this study showed that the social-evaluative body-related threat elicited a psychobiological response consistent with SSPT; women in the threat group reported higher social physique anxiety and had higher cortisol following the threat. The third study sought to extend the applicability of SSPT to examine the psychobiological responses to, and recovery from, an anticipated social-evaluative body-related threat. In addition, the potential moderating effect of appearance investment on responses to a threat was examined. Findings from this study showed that women in the threat group reported higher shame and social physique anxiety after anticipating a social-evaluative body-related threat than following a quiet rest period for women in the control group. Results also indicated that both groups showed an index of decrease for cortisol, with the control group showing a significantly greater overall decrease than the threat group. Appearance investment did not moderate cortisol responses to a threat. Findings from the third study provide partial support for SSPT’s applicability to the anticipation of a social-evaluative body-related threat. Together findings from all three studies provide converging evidence for the use of SSPT in understanding the psychobiology of body image.
|
495 |
Looking Back: An Examination of Family ArchivesBentley, James E, III 07 May 2011 (has links)
With digital technology now dominating the film and photography industry, analog resources are becoming scarce. Simultaneously, memories preserved through personal family archives also are in danger of deterioration. Time, heat and humidity can cause film to decay just as the passage of time and the erosion of memory allows their contents to fade. In Looking Back, my family film and photography archives are exhumed and collectively examined by myself and my family. Reflecting upon this massive accumulation of imagery and their attached memories seems an endless task. However, as expressed in Looking Back, the greater the effort to bring conclusive memories to the surface, the more impossible the task proves to be, and larger questions about the significance of family history result.
|
496 |
Healing the Wounds: Commemorations, Myths, and the Restoration of Leningrad's Imperial Heritage, 1941-1950Maddox, Steven 20 January 2009 (has links)
This dissertation is a study of Leningrad during World War II and the period of postwar restoration (1941-1950). Leningrad was besieged by the Germans for nearly nine-hundred days. As hundreds of thousands of people died from bombings, shelling, cold, and starvation, local authorities surprisingly instituted measures to ensure that the city’s historic monuments be safeguarded from destruction. When Leningrad was liberated in January 1944, a concerted effort was put into place to breath life into these damaged and destroyed monuments and to heal the wounds inflicted on the city. Instead of using the damage to modernize the city, Leningrad and Soviet authorities opted to privilege the country’s tsarist heritage. In the postwar period, municipal authorities proclaimed that restored monuments commemorate the determination and heroism shown by the people of Leningrad during the war. The memory of the blockade, it was argued, was a “red thread” that must run through and be inscribed in all restoration works.
Although this dissertation is a local study of war and postwar restoration, it speaks to broader trends within the Soviet Union before, during, and after World War II. I argue that the care shown for Leningrad’s imperial monuments was the result of an ideological shift that began in the mid-1930s away from iconoclasm toward rehabilitating and respecting certain events and characters from the past. With international tensions rising in the 1930s, this turn to the past acted as a unifying force that had a tremendous influence on the patriotism shown during the war with the Nazis. In the postwar period, as the Soviet state began to redefine its image based on the myth of war and the country’s tsarist heritage, this patriotism was further promoted, resulting in a flurry of work throughout the Soviet Union to restore the vessels of the country’s past. Like many other modernizing states, the Soviet Union looked to its past to create a united and patriotic citizenry.
|
497 |
Group Preferences for Rural Amenities and Farmland Preservation in the Niagara Fruit BeltPrins, Peter Gideon January 2005 (has links)
During the production of agricultural commodities, an agricultural landscape is simultaneously being produced. In many regions, agriculture is no longer valued for just the production of food and fibre but also for the social, cultural and environmental amenities associated with the landscape. The paradigm of multifunctional agriculture has become concerned with the joint production of agricultural products and these rural amenities. The loss of agricultural land especially in areas around the urban-rural fringe has greatly affected the demand for these rural amenities. In response, governments and volunteer organizations have developed programs to preserve farmland. The Niagara Region is home to some of the best fruit growing land in Canada but has a long history of fighting to maintain its farmland. Drawing from the multifunctional paradigm, this study analyzes the preference for different rural amenities and farmland preservation in this unique region. Survey and interviews conducted with both the non-farm population and farmers indicated that demand exists for maintaining rural amenities and for farmland preservation. Consideration of these preferences will enhance the development of farmland preservation in the Niagara Fruit Belt.
|
498 |
Secure and Privacy-Preserving Vehicular CommunicationsLin, Xiaodong January 2008 (has links)
Road safety has been drawing increasing attention in the public, and has been subject to extensive efforts from both industry and academia in mitigating the impact of traffic accidents. Recent
advances in wireless technology promise new approaches to facilitating road safety and traffic management, where each vehicle
(or referred to as On-board unit (OBU)) is allowed to communicate with each other as well as with Roadside units (RSUs), which are located in some critical sections of the road, such as a traffic light, an intersection, and a stop sign. With the OBUs and RSUs, a self-organized network, called Vehicular Ad Hoc Network (VANET), can
thus be formed. Unfortunately, VANETs have faced various security threats and privacy concerns, which would jeopardize the public
safety and become the main barrier to the acceptance of such a new technology. Hence, addressing security and privacy issues is a
prerequisite for a market-ready VANET. Although many studies have recently addressed a significant amount of efforts in solving the related problems, few of the studies has taken the scalability
issues into consideration. When the traffic density is getting large, a vehicle may become unable to verify the authenticity of the messages sent by its neighbors in a timely manner, which may result
in message loss so that public safety may be at risk. Communication overhead is another issue that has not been well addressed in previously reported studies. Many efforts have been made in recent
years in achieving efficient broadcast source authentication and data integrity by using fast symmetric cryptography. However, the dynamic nature of VANETs makes it very challenging in the applicability of these symmetric cryptography-based protocols.
In this research, we propose a novel Secure and Efficient RSU-aided Privacy Preservation Protocol, called SERP^3, in order to achieve efficient secure and privacy-preserving Inter-Vehicle
Communications (IVCs). With the commitments of one-way key chains distributed to vehicles by RSUs, a vehicle can effectively
authenticate any received message from vehicles nearby even in the presence of frequent change of its neighborship. Compared with previously reported public key infrastructure (PKI)-based packet
authentication protocols for security and privacy, the proposed protocol not only retains the security and privacy preservation properties, but also has less packet loss ratio and lower communication overhead, especially when the road traffic is heavy. Therefore, the protocol solves the scalability and communication overhead issues, while maintaining acceptable packet latency. However, RSU may not exist in some situations, for example, in the early stage deployment phase of VANET, where unfortunately, SERP^3 is not suitable. Thus, we propose a complementary Efficient and Cooperative Message Validation Protocol, called ECMVP, where each vehicle
probabilistically validates a certain percentage of its received messages based on its own computing capacity and then reports any invalid messages detected by it.
Since the ultimate goal of designing VANET is to develop vehicle safety/non-safety related applications to improve road safety and facilitate traffic management, two vehicle applications are further proposed in the research to exploit the advantages of vehicular communications. First, a novel vehicle safety application for achieving a secure road traffic control system in VANETs is developed. The proposed application helps circumvent vehicles safely
and securely through the areas in any abnormal situation, such as a car crash scene, while ensuring the security and privacy of the drivers from various threats. It not only enhances traveler safety but also minimizes capacity restrictions due to any unusual situation. Second, the dissertation investigates a novel mobile payment system for highway toll collection by way of vehicular communications, which addresses all the issues in the currently existing toll collection technologies.
|
499 |
Network Coding based Information Security in Multi-hop Wireless NetworksFan, Yanfei January 2010 (has links)
Multi-hop Wireless Networks (MWNs) represent a class of networks where messages are forwarded through multiple hops of wireless transmission. Applications of this newly emerging communication paradigm include asset monitoring wireless sensor networks (WSNs), command communication mobile ad hoc networks (MANETs), community- or campus-wide wireless mesh networks (WMNs), etc.
Information security is one of the major barriers to the wide-scale deployment of MWNs but has received little attention so far. On the one hand, due to the open wireless channels and multi-hop wireless transmissions, MWNs are vulnerable to various information security threats such as eavesdropping, data injection/modification, node compromising, traffic analysis, and flow tracing. On the other hand, the characteristics of MWNs including the vulnerability of intermediate network nodes, multi-path packet forwarding, and limited computing capability and storage capacity make the existing information security schemes designed for the conventional wired networks or single-hop wireless networks unsuitable for MWNs. Therefore, newly designed schemes are highly desired to meet the stringent security and performance requirements for the information security of MWNs.
In this research, we focus on three fundamental information security issues in MWNs: efficient privacy preservation for source anonymity, which is critical to the information security of MWNs; the traffic explosion issue, which targets at preventing denial of service (DoS) and enhancing system availability; and the cooperative peer-to-peer information exchange issue, which is critical to quickly achieve maximum data availability if the base station is temporarily unavailable or the service of the base station is intermittent. We have made the following three major contributions.
Firstly, we identify the severe threats of traffic analysis/flow tracing attacks to the information security in network coding enabled MWNs. To prevent these attacks and achieve source anonymity in MWNs, we propose a network coding based privacy-preserving scheme. The unique “mixing” feature of network coding is exploited in the proposed scheme to confuse adversaries from conducting advanced privacy attacks, such as time correlation, size correlation, and message content correlation. With homomorphic encryption functions, the proposed scheme can achieve both privacy preservation and data confidentiality, which are two critical information security requirements.
Secondly, to prevent traffic explosion and at the same time achieve source unobservability in MWNs, we propose a network coding based privacy-preserving scheme, called SUNC (Source Unobservability using Network Coding). Network coding is utilized in the scheme to automatically absorb dummy messages at intermediate network nodes, and thus, traffic explosion induced denial of service (DoS) can be naturally prevented to ensure the system availability. In addition to ensuring system availability and achieving source unobservability, SUNC can also thwart internal adversaries.
Thirdly, to enhance the data availability when a base station is temporarily unavailable or the service of the base station is intermittent, we propose a cooperative peer-to-peer information exchange scheme based on network coding. The proposed scheme can quickly accomplish optimal information exchange in terms of throughput and transmission delay.
For each research issue, detailed simulation results in terms of computational overhead, transmission efficiency, and communication overhead, are given to demonstrate the efficacy and efficiency of the proposed solutions.
|
500 |
Vad är ett E-Arkiv? : En fallstudie på E-Arkiv StockholmBäckström, Pontus January 2012 (has links)
The aim of this thesis in Archival Science was to explore the concept of electronic archives and the challenges that might be encountered when attempting to move archives into a new digital age, as well as having a closer look at the term e-archive itself. Another aim was to explore how the OAIS reference model works in practice.To explore these questions I decided to do a case study on E-Arkiv Stockholm, a functioning e-archive. I decided to do a study on several documents that were created throughout the project, these included documents related to the planning of the archive, as well as the final report. My reason for this method was that these docu-ments came straight from reality and would give a clear and unbiased view of the project and it’s many aspects.Examination of the documents showed that the OAIS reference model and its concepts had been the foun-dation of much of the planning. Thoughts and planning on the matter of digital preservation are also based in the model, with a focus on migration and conversion of digital material as a means to ensure it’s lasting existence, as well as keeping a close eye on the technical development of both hardware and software. I also reached the con-clusion that the concept and term e-archive is not so much about re-inventing archival policies and theory as it is about keeping true to already existing practices in a new digital environment. With a special focus on preserva-tion, as digital preservation might, both now and in the future, prove to be much more of a challenge then the preservation of more traditional media.This is a one-year masters thesis in archival science.
|
Page generated in 0.1067 seconds