• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 19
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Substance abuse

Cernozubov, Katarina January 1970 (has links)
Typescript. / Thesis (Ph. D.)--University of Hawaii, 1970. / Bibliography: leaves 77-88. / v, 88 l tables
2

Fixace na nasálním užití pervitinu / Nasal Fixation by Methamphetamine Users

VĚTROVSKÁ, Lucie January 2013 (has links)
The diploma thesis theme, which I have chosen, Addiction to the nasal use of pervitin, is based on my long-term interest in this subject.One of the factors that may be important in the study of any drug problem is the ritual. Rituals here may appear on several levels - it may contribute to the formation and maintenance of a dependency, in the application itself (creation of "lines" on the mirror, the use of identity cards, sniffing with a rolled banknote, etc.) and can take various forms (e.g., group or individual) (Holzbachova, 1999). For my thesis, I have chosen the method of qualitative research. The basic approach of qualitative research includes the grounded theory. The aim of the thesis is to analyze and describe the different aspects of ritual behavior of nasal drug users. The research question was to discover, which aspects of ritual occur in nasal drug users. As it is described in literature, all drug users ritualize the drug application to some extent. This represents stylized and routine behavior that occurs during drug use. There are situations, like the procurement of drugs, methods of taking, activities following the use of drugs and the ways to prevent the negative effects of drugs (Grund, 1993). During an interview, two of the interviewees said the word "ritual". Cyril considers it a ritual and the activities precede sniffing. These are activities associated with the hunt for the drug, the journey to the drug and the nervousness "before trip", which according to him is stronger than the feeling of drug application. Dana describes the application procedure as a ritual. However, she describes as ritualistic her behavior during the purchase of a sufficient supply of cigarettes for intoxication or when applying the drug on the toilet seat, wiping the toilet boards before the actual preparation of the drug for application. Although the other two interviewees did not use the word ritual in their answers directly, some ritualistic elements signaled a routine behavior in conducting the drugs process by them as well. In general, we assume that the thesis can contribute to the discussion about the ritual aspects of drug users. This work brings in new information about the rituals of nasal drug users. We anticipate publication in a professional periodical.
3

Övervakning och analys av blåtandstrafik för att säkerställa integritet och säkerhet / Montioring and analysis of Bluetooth traffic to ensure integrity and security

Sulehria, Ibrahim, Haddad, Noor January 2024 (has links)
I dagens samhälle används Bluetooth Low Energy (BLE) alltmer, särskilt inom IoT-enheter (Internet of Things). Detta ökar behovet av säker kommunikation och att identifiera samt åtgärda potentiella sårbarheter. Problemet som denna studie adresserar är risken för passiv avlyssning och säkerhetsbrister i BLE-kommunikation, vilket kan leda till datamissbruk och integritetsintrång. Detta arbete fokuserar på att undersöka säkerheten inom BLE-signalering och presenterar även en praktisk laboration för att öka kunskapsnivån inom analys och hantering av blåtandstrafik. Säkerhetsbrister utvärderas genom att analysera trafiken mellan BLE-enheter, med specifik fokus på passiv avlyssning och de potentiella riskerna med detta. Genom praktiska experiment med tre olika blåtandsenheter, inklusive smarta LED-lister och ett smart hopprep, undersöktes hur signaleringsdata kan extraheras och missbrukas. Resultaten visar att även om nyare versioner av blåtand tillhandahåller förbättrade säkerhetsmekanismer, utnyttjas dessa inte alltid korrekt i produkter med lägre säkerhetskrav. Arbetet ger insikter i hur befintliga säkerhetsmekanismer kan förbättras och betonar vikten av kontinuerliga säkerhetsuppdateringar från tillverkare. / Today, Bluetooth Low Energy (BLE) is increasingly used, particularly in IoT devices (Internet of Things). This increase raises the need for secure communication and identifying as well as addressing potential vulnerabilities. The problem addressed by this study is the risk of passive eavesdropping and security flaws in BLE communication, which can lead to data misuse and privacy breaches. This work focuses on examining the security of BLE signaling and also presents a practical lab to enhance knowledge in analyzing and managing Bluetooth traffic. Security vulnerabilities are evaluated by analyzing the traffic between BLE devices, with a specific focus on passive eavesdropping and its potential risks. Through practical experiments with three different Bluetooth devices, including smart LED strips and a smart jump rope, the study investigated how signaling data can be extracted and misused. The results show that although newer versions of Bluetooth provide improved security mechanisms, these are not always correctly implemented in products with lower security requirements. The study provides insights into how existing security mechanisms can be improved and emphasizes the importance of continuous security updates from manufacturers.
4

Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization.

Förderer, Steffen-Marc January 2012 (has links)
A proof of concept study into the working of network media capture and visualization through the use of Packet Capture in real-time. An application was developed that is able to capture tcp network packets; identify and display images in raw HTTP network traffic through the use of search, sort, error detection, timeout failsafe algorithms in real time. The application was designed for network administrators to visualize raw network media content together with its relevant network source \& address identifiers. Different approaches were tried and tested such as using Perl with GTK+ and Visual Studio C\# .Net. Furthermore two different types of image identification methods were used: raw magic string identification in pure tcp network traffic and HTTP Mime type identification. The latter being more accurate and faster. C# was seen as vastly superior in both speed of prototyping and final performance evaluation. The study presents a novel new way of monitoring networks on the basis of their media content through deep packet inspection
5

Kanyirninpa health, masculinity and wellbeing of desert Aboriginal men /

McCoy, Brian Francis. January 2004 (has links) (PDF)
Thesis (Ph.D.)--University of Melbourne, Centre for the Study of Health and Society,School of Population Health, Faculty of Medicine, Dentistry and Health Services, 2004. / Typescript (photocopy). "Submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy, July 2004". Includes bibliographical references (leaves 269-301).
6

Coordena??o de ritmos sens?rio-motores durante comportamento explorat?rio em ratos

Alves, Joseph Andrews Belo 17 August 2016 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2017-02-22T18:57:02Z No. of bitstreams: 1 JosephAndrewsBeloAlves_DISSERT.pdf: 2493249 bytes, checksum: 1b737b22d98e824d63c44e7fc7f94b62 (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2017-03-04T00:26:10Z (GMT) No. of bitstreams: 1 JosephAndrewsBeloAlves_DISSERT.pdf: 2493249 bytes, checksum: 1b737b22d98e824d63c44e7fc7f94b62 (MD5) / Made available in DSpace on 2017-03-04T00:26:10Z (GMT). No. of bitstreams: 1 JosephAndrewsBeloAlves_DISSERT.pdf: 2493249 bytes, checksum: 1b737b22d98e824d63c44e7fc7f94b62 (MD5) Previous issue date: 2016-08-17 / Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior (CAPES) / Ao explorar ativamente o ambiente, ratos exibem comportamentos sens?rio-motores r?tmicos com frequ?ncia na faixa teta (5-10 Hz). Dentre esses est?o o sniffing (respira??o ativa e r?pida), o whisking (movimento das vibrissas faciais) e as vocaliza??es ultrass?nicas. Estudos recentes mostraram formas de sincronicidades entre tais ritmos: a protra??o e retra??o das vibrissas est?o associadas em fase, respectivamente, ? inala??o e exala??o respirat?ria; a constri??o das cordas vocais necess?ria para a produ??o vocal, por sua vez, est? condicionada ? fase exalante do sniffing e de retra??o do whisking. Embora essas e outras observa??es indiquem uma intera??o entre ritmos e geradores de padr?es no tronco encef?lico aos quais s?o atribu?dos os movimentos orais, faciais e respirat?rios. Com o intuito de adquirir melhor compreens?o acerca das hierarquias concernentes aos circuitos neurais envolvidos em tais atividades, n?s gravamos simultaneamente o whisking, sniffing e as vocaliza??es em ratos durante livre explora??o social. Para este prop?sito, oito eletrodos foram inseridos cirurgicamente para a aquisi??o de sinais eletromiogr?ficos bilaterais dos m?sculos que controlam as vibrissas e uma c?nula foi implantada por meio de uma perfura??o no osso nasal para o registro do ciclo respirat?rio. Ap?s recupera??o e habitua??o, dois ratos (um implantado e outro de est?mulo) foram posicionados sobre duas plataformas separadas por uma fenda onde possibilitava a explora??o m?tua dos animais. Esses epis?dios foram filmados atrav?s de uma c?mera de alta velocidade (250 Hz) para a captura dos movimentos das vibrissas. As vocaliza??es ultrass?nicas foram detectadas por um microfone suspenso. N?s conduzimos an?lises de fase e frequ?ncia para validar os sinais registrados e caracterizar as a??es rec?procas entre esses ciclos em contextos sociais. Os resultados confirmaram que ambos o whisking e o sniffing ocorrem em turnos nas frequ?ncias teta durante explora??o social. Al?m disso, a esperada rela??o em anti-fase entre os sinais dos grupos musculares que controlam a protra??o e retra??o das vibrissas assim como a forte sincronia com o ciclo respirat?rio foram observadas. Interessantemente, nossos dados sugerem que esta sincronia ? imediatamente dissipada durante a emiss?o de vocaliza??es ultrass?nicas. Em vez disso, n?s presenciamos um novo comportamento de whisking, que consiste em retra??o e protra??o ativas e independentes do ciclo respirat?rio. / When actively exploring the environment, rats exhibit several rhythmic behaviors with frequencies in the theta range (5-10 Hz). These include sniffing (active fast respiration), whisking (movement of the facial vibrissae), and ultrasonic vocalizations. Synchronizations between each pair of these behaviors have been observed in recent studies: vibrissae protraction-retraction is linked to the inhalation-exhalation phase of breathing; constriction of the vocal folds for vocalization, in turn, is locked to the exhalation phase of sniffing; accordingly, vocalizations were observed to synchronize with the retraction phase of whisking. These and other observations point to an interaction of rhythm and pattern generators in the brainstem controlling the coordination of respiratory, oral and facial movements. To better understand the hierarchies among these circuits we simultaneously recorded sniffing, whisking and vocalizations from rats during free social exploration. For this purpose, eight electrodes were inserted surgically to acquire bilateral EMG signals from muscles controlling the protraction and retraction of the whiskers and a cannula was implanted through the nasal bone to record the respiratory cycle. After one week of recovery and habituation, two rats (one implanted and one naive) were placed across a gap where they could explore each other. These interactions were filmed with a high speed camera (250 Hz) to capture whisker movements and ultrasonic vocalizations were recorded from an overhanging microphone. We made frequency and phase analysis to validate the recorded signals and characterize the interplay between these sensorimotor rhythms. Results confirmed that both sniffing and whisking occur in bouts at theta frequencies during social exploration. Furthermore, we observed the expected anti-phase relationship between the EMGs from muscles controlling whisker protraction and retraction as well as their tight synchrony with the sniffing cycle. Interestingly, our data suggests that this synchrony is immediately lost during the emission of ultrasonic vocalizations. Instead, we observed a novel whisking behavior, consisting of active vibrissae protraction and retraction independent of the respiratory cycle.
7

Olfactory Cognition : The Case of Olfactory Imagery

Arshamian, Artin January 2013 (has links)
The capacity to form olfactory images has received less attention than the formation of visual and auditory images. The evidence in favor of such ability is also inconsistent. This thesis explored some of the characteristics of olfactory imagery through three empirical studies. Study I investigated the effects of blocking spontaneous sniffing during olfactory imagery. The results indicated that the prevention of spontaneous sniffing reduced olfactory but not visual imagery capacity. Study II studied the relation between olfactory awareness (as indexed by olfactory dreams, olfactory imagery, and olfactory interest) and olfactory functions (i.e., odor threshold, episodic odor memory, and odor identification). The main findings were that compared to low, high olfactory awareness was associated with better episodic odor memory and identification, but not with higher olfactory sensitivity. Study III investigated the neural correlates of odor evoked autobiographical memories (OEAMs) as (a) a function of cue modality (i.e., odors and their verbal referents), and (b) a function of memory remoteness. The results from Study III showed that OEAMs activated regions generally associated with autobiographical memory. In addition, verbally cued OEAMs were associated with activity linked to olfactory imagery. Odor cues activated the limbic and temporal polar regions more than verbal cues; a result that may explain the phenomenological differences found between the cued memories. Moreover, OEAMs from the first decade of life were associated with higher activity in the secondary olfactory cortex, whereas memories from young adulthood were related to areas linked to semantic memory processing. Taken together these studies favor the notion of a human capacity to form olfactory images.
8

Analysis of Internal RF Interferences in Mobile

Balkorkian, Sevag, Hao, Zhang January 2005 (has links)
<p>Nowadays, mobile phones have greater functionality; a camera, color LCD screen, wireless LAN, Bluetooth, IrDA and others. In the near future wider variety of new functionalities will be added, from high quality voice, high definition video to high data rate wireless channels. As consumer electronics integrate greater functionality and high operating frequencies, their emissions will exceed the specified limits, most of these emissions will be a result of the internal interferences in the mobile phone. Moreover higher operating frequencies will be required to improve the quality of these functionalities, something that will make it more difficult to control these interferences. Internal or external sources of electromagnetic interference can degrade the performance of sensitive analog/digital circuits inside the mobile phone. Moreover the electronic device must satisfy a host of global regulations that limit it’s susceptibility to these interferences, as well as the interference emitted by the device itself.</p><p>Therefore designing a new electronic device to perform new and exciting functions will not be a pleasant task if it can not meet certain specifications and function as required to adhere to certain global regulations.</p><p>This thesis project investigates the sources of interference inside a mobile phone; mainly the electromagnetic interferences and its effect on the radio transceiver focusing on the GSM receiver sensitivity. This report is a result of intensive research, an investigation of possible sources of interference, also actual measurements were performed; RSSI, OTA and sniffing measurements; to identify the physical sources of interferences, and their effect on the receiver sensitivity. Finally solutions were recommended and implemented to suppress the interferences due to different sources, mainly through filtering, shielding or proper grounding of signals and components/subsystems in the mobile phone.</p>
9

Design och implementering av en datorsäkerhetsdatabas – samt en behovsanalys därav

Lagergren, Tobias January 2010 (has links)
Denna rapport beskriver de behov vilka ligger tillgrund för att skapa en IT-säkerhetsdatabas. Rapporten tar även upp olika IT-säkerhetsproblem och för en diskussion om vad som är faran med dessa problem. Diskussionen förs inom två områden rörande IT-säkerhet.Det ena området är om IT-säkerhet i allmänhet och tar upp begreppet CIA. CIA står för de engelska begreppen Confidentiality, Integrity och Availability och på svenska, sekretess, integritet och tillgänglighet.Den andra delen handlar om lite mer specifika IT-säkerhetsproblem, som till exempel virus och sniffing.På uppdrag av FOI är en databas, vilken är avsedd för att lagra information rörande IT-säkerhet, skapad. Rapporten tar upp en del grundläggande databasteori och beskriver designen och implementationen av databasen. Även hur databasen fungerar beskrivs.Slutligen förs en diskussion om uppnådda resultat och om möjlig framtida utveckling av databasen. / This report describes the needs which are the basis for creating an IT security database.The report also discusses various IT security issues and a discussion of what are the dangers of these problems. The discussion conducted in two areas relating to IT security.The first part is about IT security in general and addresses the concept of the CIA. CIA stands for the English concepts of Confidentiality, Integrity and Availability. The terms in Swedish are sekretess, integritet and tillgänglighet.The second part deals with some more specific IT security problems, such as viruses and sniffing.On behalf of FOI a database is created, which is designed to store information relating to IT security. It outlines some basic database theory and describes the design and implementation of the database. Also the functions in the database are described.Finally a discussion over the results achieved and the possible future development of database is carried out.
10

Analysis of Internal RF Interferences in Mobile

Balkorkian, Sevag, Hao, Zhang January 2005 (has links)
Nowadays, mobile phones have greater functionality; a camera, color LCD screen, wireless LAN, Bluetooth, IrDA and others. In the near future wider variety of new functionalities will be added, from high quality voice, high definition video to high data rate wireless channels. As consumer electronics integrate greater functionality and high operating frequencies, their emissions will exceed the specified limits, most of these emissions will be a result of the internal interferences in the mobile phone. Moreover higher operating frequencies will be required to improve the quality of these functionalities, something that will make it more difficult to control these interferences. Internal or external sources of electromagnetic interference can degrade the performance of sensitive analog/digital circuits inside the mobile phone. Moreover the electronic device must satisfy a host of global regulations that limit it’s susceptibility to these interferences, as well as the interference emitted by the device itself. Therefore designing a new electronic device to perform new and exciting functions will not be a pleasant task if it can not meet certain specifications and function as required to adhere to certain global regulations. This thesis project investigates the sources of interference inside a mobile phone; mainly the electromagnetic interferences and its effect on the radio transceiver focusing on the GSM receiver sensitivity. This report is a result of intensive research, an investigation of possible sources of interference, also actual measurements were performed; RSSI, OTA and sniffing measurements; to identify the physical sources of interferences, and their effect on the receiver sensitivity. Finally solutions were recommended and implemented to suppress the interferences due to different sources, mainly through filtering, shielding or proper grounding of signals and components/subsystems in the mobile phone.

Page generated in 0.0429 seconds