• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 715
  • 456
  • 115
  • 86
  • 75
  • 62
  • 39
  • 28
  • 28
  • 27
  • 9
  • 8
  • 8
  • 7
  • 7
  • Tagged with
  • 2018
  • 363
  • 315
  • 257
  • 228
  • 220
  • 188
  • 183
  • 174
  • 165
  • 155
  • 144
  • 138
  • 128
  • 126
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

A Psychoanalytical Reading of Emily Brontë's Wuthering Heights : An Analysis of the Defense Mechanisms of Some Characters

Abdul Kareem, Ala'a January 2011 (has links)
This essay presents a portrayal of Heathcliff, Catherine and Isabella from a psychoanalytical perspective with regard to four defense mechanisms; namely, repression, denial, sublimation and projection in order to see how these defense mechanisms have affected the characters’ decisions and behaviour, and led them to their destinations in life. It will include three major sections: repression in characters, denial in characters, and sublimation and projection in characters. These terms will be more clearly defined and explained in the subsequent sections.
192

Iron and reactive oxygen in wheat-pathogen interactions

Greenshields, David Lewis 31 July 2007 (has links)
Iron is an essential component of various proteins and pigments for both plants and pathogenic fungi. However, redox cycling between the ferric and ferrous forms of iron can also catalyse the production of dangerous free radicals and iron homeostasis is therefore tightly regulated. During pathogen attack, plants quickly produce large amounts of reactive oxygen species at the site of attempted pathogen ingress. This so-called oxidative burst has received considerable attention, but no single enzyme has been shown to account for the phenomenon. Using inductively coupled plasma mass spectrometry and histochemistry, I show that iron is secreted to the apoplast of the diploid wheat <i>Triticum monococcum</i> during attack by the powdery mildew fungus <i>Blumeria graminis</i> f.sp. <i>tritici</i>. This iron accumulates at cell wall appositions synthesised de novo beneath sites of pathogen attack. I further show, using histochemistry and pharmaceutical inhibitors, that this apoplastic iron accumulation is required for production of H2O2 in the oxidative burst. To understand the impact of this massive change in iron homeostasis on gene transcription, I employ a 187 gene targeted macroarray platform and establish that iron overload induces the expression of iron homeostasis-related genes and defence-related genes through iron itself and iron-mediated H2O2 production, respectively. To illustrate how the plant is able to withstand the negative effects of its own oxidative defences, I characterise a novel quinone redox cycle, and show that simultaneous induction of a protective quinone reductase isoform and downregulation of reactive oxygen-producing quinone reductase isoform prevents the spread of reactive oxygen during pathogen attack. Finally, in an effort to understand the impact of iron on fungal pathogenicity, I investigate iron uptake in the head blight pathogen, <i>Fusarium graminearum</i>. Fungi use at least two separate systems to take up iron, one based on enzymatic iron reduction and the other based on the synthesis and secretion of small iron chelators termed siderophores. Using mutants disrupted in either of two modes of iron uptake, I establish that siderophore production is essential for full F. graminearum virulence on wheat. This thesis exposes iron as an important component of both plant defence and fungal virulence.
193

Can defense mechanisms aid in our differentiation of borderline and antisocial personalities?

Presniak, Michelle D 03 September 2008 (has links)
Goal: The aim of the current studies was to evaluate the ability of individual defenses to differentiate Antisocial (APD) and Borderline (BPD) personalities. Because multiple defense measures were utilized, Study 1 was dedicated to evaluating the convergent validity between the measures used: Defense Style Questionnaire (DSQ), Defense-Q, and Defense Mechanism Manual (DMM). Studies 2, 3, and 4, then evaluated the ability of the defenses to differentiate APD and BPD groups. Method: In Study 1, participants completed all defense measures and correlations were conducted between the individual defenses. In Studies 2, 3, and 4, groups of nonclinical participants were divided into APD and BPD groups based on scores from the Personality Assessment Inventory. They also completed the DSQ (Studies 2, 3, & 4), the Defense-Q (Study 3), and/or the DMM (Study 4).The groups were then examined for differences on defenses using MANOVA and DFA analyses. Results: Results from Study 1 revealed no significant correlations between the measures for any of the individual defenses. In Studies 2, 3, and 4, DSQ and Defense-Q results revealed that defenses were able to differentiate the APD and BPD groups, but the DMM results did not replicate these findings. Univariate analyses showed that many defenses differed between the groups (e.g., Acting Out, Denial, and Turning Against Self), while others showed no differences (e.g., Idealization). Conclusion: The results were discussed in relation to previous theory and research. The findings provided support for many theoretical expectations. For example, the results supported: Kernberg (1984) who posited both groups would use primitive defenses (e.g., Splitting, Denial); Perry and Cooper (1986) who posited BPD groups would internalize negative views towards the self; and Gacono and Meloy (1988) who believed Denial was characteristic of APD. Overall, the results suggested that APD and BPD groups demonstrated differences in defense use.
194

Cognitive Authentication and Cooperative Defense Scheme for Wireless Network Environments

Yu, Chen-Ming 24 August 2010 (has links)
Wireless networks are becoming more and more popular. In current wireless network environments, mobile users can use multiple wireless network interfaces built in their mobile devices to roam around the mobile networks. They can scan the wireless spectrums and utilize the network resources extremely, and they can roam into nearby wireless networks due to the mobility capabilities of the powerful mobile devices. Before connecting to an access point, an authentication process is necessary. There are many interactive wireless authentication protocols which have been proposed in the literature. Under the wireless networks, handover is an important property for a mobile user to change her/his position. However, the existing interactive wireless authentication protocols may cause unstable connection. This is because that a mobile user may perform failed authentications with some nearby invalid access points and thus she/he cannot finish handover in time. Hence, we would like to design a mechanism for a mobile user to determine the validity of access points before the interactive authentication, and the mobile user can choose a valid one when making handover. In our proposed scheme, the mobile user can just scan and receive authentication messages from access points without interactions with them while she/he can determine which one of them is valid. We call this cognitive authentication. Besides, we also propose cooperative defense which allows mobile users to exchange their received authentication messages for detecting illegal access points. Finally, we provide security proofs for our proposed scheme.
195

Relief of the army - Morakot example

Chuang, chia-yin 04 July 2011 (has links)
In recent years, frequent global disasters such as Typhoon Morakot Republic of China 98 years with the 2011 earthquake in northeastern Japan, these disasters have caused the destruction of large-scale and large-scale, often the government or private relief organizations generally can not load capacity , to compensate for inadequate relief efficiency can be deployed quickly, efficiently support the government's disaster relief units and discipline, national army, police, the main consumer unit, and police units to maintain social order based, such as the main use for disaster relief, more not suitable, so the domestic disaster relief units, non-military, none other than the consumer unit, while the main army to fight, and its legitimacy in the context of this study, in the case of national disaster and emergency rescue shows that the military action in emergency relief and response play a very important role. Both discipline and efficiency not only for the organization, and disaster prevention and emergency response is to rescue the most important time, my country is satisfied that the military after the disaster since Typhoon Morakot one of the central task, while the military situation of disaster relief to the value created out of nothing. However, the national security and domestic disaster prevention organizations have not effectively integrated in the mechanism are also required to solve the problem, when disaster strikes, often severely affected by different levels of the efficiency of disaster relief. Therefore, this research study focused on the motive. The collate and analyze the U.S., Japan and the Chinese military system and the prevention of military, fire and victims of views, some suggestions are as follows: First, refer to the Japanese military relief and rescue regulations of the military situation for me complete relief laws; II to this new security and Taipei and Taichung million concentric drill, for example, development of military active duty, reserve and local governments have to develop mutual support of the relief plan with the annual military exercise, the norm of the exercise; Third, investment needs and national defense disaster training, raises the cost effectiveness of investment in national defense and disaster relief of the legitimacy of the military; Fourth, prevention must be added back to the mobilization and training facilities to meet the current social change. Need to continue to promote the future "sense of urgency of national defense establishment," "a complete disaster laws and regulations", "Construction of National Defense of the security system," the consensus. Basis should be established in future, committed to sophisticated, the forward-looking, overall, the reference approach the major advanced countries, to measure state conditions, a set of conditions for me really disaster prevention system in order to achieve "peace maintaining an army less military forces during the war and more "of the goal to meet the future needs of national defense, military disaster relief mission to reach.
196

An Exploration of Organizational Defense Phenomenon in Introducing an Information System

Wu, Tze-Hao 21 July 2004 (has links)
Information system introduction is an organizational learning process, in which organizational members learn how to introduce information system into an enterprise. While learning, however, individuals always act defensively ¡XModel I theories-in-use, and the defensive behaviors usually bring counterproductive or unintended consequences or limited learning (Argyris, 1978, 1985, 1990, 1999). Similarly, in the process of introducing information system, the organizational members' defensive behaviors will make information system cannot completely meet the business needs or cause schedule delay. In this research, we conduct a case study to explore the defensive phenomenon during the process of introducing information system. Based on theories of action and literature about organizational defense (Salaway, 1984, 1987; Wastell, 1999; Henfridsson & Soderholm, 2000), we investigate the defensive phenomenon and generalized it into ten stories. The analyzing results show that users, MIS staff, and top managers all have defensive behaviors in introducing information system and thus cause negative effect. Therefore, this research suggests the organizational members move from Model I to Model II orientation and practice to introduce information system more effectively.
197

An Lnvestigation on the Lnovations of ROC Military Service

Lin, Kuang-Chi 15 June 2005 (has links)
The purpose of this study is to explore the innovation of military service, and to find a system which not only meet the requirement of military establishment but defend the national security. The research adopts the comparative method and the document analysis method to analyze and compare the profile and characteristics of the service systems in the United States, Israel, Britain, and Germany. This study is expected to meet the needs of the armed forces for the future service system by applying the result. The results argue that the innovation of military service is the trend. Therefore, it is recommended that Taiwan take the mixed volunteer system, i.e., volunteer first, conscription aided, to maintain certain Taiwan military force in preventing the invasion from the mainland China. Thus, professional forces should be established, the quota of technology substitute service should be increased, and researchers should be cultivated, thus substantially promoting national defense forces. In addition, to comply with the principles of sexual equality and justice, and to meet the requirements of national defense, increasing the female service is also an important consideration and worthy of further studies for the future military service.
198

the Foreign Policy of Koizumi¡G2001-2006

Shie, Ming-da 30 June 2007 (has links)
Five and half years in office, the former Japan Prime Minister, Junichiro Koizumi, has led Japan to progress toward a wholly new direction contrast to previous Japan. Domestically, financial, fiscal and administrative reforms were Koizumi regime¡¦s primary concerns and also the core stage of Koizumi¡¦s political performance, and those reforms did somewhat improve Japan¡¦s lasting stagnant economic condition at all. Concerning of the legacy of Koizumi¡¦s foreign policy, as been regarded as a fledgling in foreign affairs at the beginning, Koizumi at last shaped the current Japan to be confident as a major power in north east Asia and more capable of facing the north Korea¡¦s threats and China¡¦s various challenges. Moreover, Koizumi made his efforts and did upgrade the Japan-U.S. military alliance de facto. In region international affairs, Koizumi also contributed to push the economic and trading integration in east Aisa. On the global level, Koizumi¡¦s Japan egaged in not only finance but also manpower contribution to the international society and eagerly did a lot to look for a leading political role in world politics than ever. Undoubtedly, the U.S. 911 attacks occurred in 2001 is the crucial agenda regarding the outcomes of Koizumi¡¦s foreign policy and surely the turning point within the context of Koizumi¡¦s foreign policy. Therefore, this paper would like to investigate¡§what things have been done in the Japan¡¦s foreign policies as Koizumi in office¡H¡¨within the following four periods,¡§Foreign Policy Review Era,¡¨¡§U.S.-first Policy Era,¡¨¡§International Consultation Era,¡¨and¡§Post-Koizumi Era.¡¨After the overall context of Koizumi¡¦s foreign policies has been well realized, this paper will discuss the profound effects and impacts cuased by those outcomes of Koizumi¡¦s foreign policy toward the three aspects of Japan domestic politics, Asia region, and the international system.
199

Investigating insect molecular responses to two plant defense proteins and characterizing a novel insecticidal protein from Arabidopsis

Liu, Yilin 25 April 2007 (has links)
The molecular interaction between plants and insects is dynamic and multifaceted. We are interested in understanding the molecular mechanism that insects utilize to overcome plant defense proteins, as well as discovering novel plant insecticidal proteins. Three projects were developed. First, we evaluated the effects of soybean cysteine protease inhibitor (soyacystatin N, scN) on the growth and development in southern corn rootworm. Both subtractive suppressed hybridization (SSH) and cDNA microarray analyses were used to uncover the changes of gene expression profiles in southern corn rootworm under the scN challenge. The counterdefense-related genes were identified, suggesting that southern corn rootworm deployed several regulatory mechanisms to overcome the dietary scN. Second, to identify and confirm insecticidal properties of vegetative storage protein 2 in Arabidopsis (AtVSP2), the gene was cloned and expressed in E.coli. This protein showed acid phosphatase activity. Feeding assay indicated that AtVSP increased the mortality and delayed the development of two coleopteran and one dipteran insects. Third, to identify the molecular mechanism of this novel insecticidal protein, P element mutagenesis was utilized to generate AtVSP resistant mutants (VRs). Two balanced VR mutants and their revertants were generated, and can be used to further characterize the genetic loci of P element inserted in the mutants.
200

none

Rong, Liang-Sun 20 July 2009 (has links)
In recent years, research has shown that the issue of security is an essential indicator for public well-being. Along with the advance of science and technology, the application of monitor, which includes the field of crime investigation and prevention, has become more and more importance. Furthermore, the location of monitor is also involved with personal privacy. As a result, it is necessary to prove which one is better for explanation of sense of happiness. Based on the Maslow theory of needs, this study explores the relationship between Kaohsiung resident needs and the installation of monitor in terms of quantitative research methods. For the variable of installation demand, it adopts the way of self-questionnaire mining dimensions including security, social, respect, self-actualization and cognitive needs. After validity analysis, the positive cognitive demand had three factors along with seven independent variables, the reliability above 0.7. Dependent variable of the installation of monitor was adapted from Chinese version of Hu Yan (2000). In this study, the version of SPSS 12.0 software was used for statistical analysis along with Likert scale scores. The higher score of scale is, the more sense of happiness does. After practical analysis, it was found that the people with installed monitor will have higher degree of feeling and safety, not to mention the sense of happiness. They feel that they live in the protection of life and have a sense of accomplishment more than the other events of middle level. In terms of age, work, marriage, positive cognitive and living environment, there is significant difference among them. However, there is no significant difference between monitor alliance and happiness. The study assumed that there are some significant positive correlations among the aspects of safety, community, respect and self-actualization, and it shows that it is necessary to install the street monitor. However, for the aspects of privacy violation as well as stalk information leakage, it was significantly lower degree of positive correlation, indicating the doubtful attitude of public for installation monitor. Therefore, the study infers there might be some impact on personal privacy, so it is necessary to set up stricter management practices on the use of information to alleviate people¡¦s concerns and to prevent people from human rights with law. Within this study, it explains the overall sense of happiness for 72.1%. Maslow's theory is closely linked with the public safety protection measures in life, and it is a practical application. As a result, it proposed the follow-up researchers to delve into the effect of monitor, especially on crime prevention.

Page generated in 0.0389 seconds