• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 158
  • 30
  • 17
  • 17
  • 12
  • 11
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 309
  • 123
  • 54
  • 46
  • 43
  • 36
  • 34
  • 33
  • 32
  • 31
  • 31
  • 29
  • 26
  • 26
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Crítica e afirmação da vida em Nietzsche: sobre os "sins" e "nãos" de Zaratustra / Criticism and affirmation of life in Nietzsche: on the "yeses" and "noes" of Zarathustra

Oliveira, Leonardo Araújo [UNESP] 22 September 2016 (has links)
Submitted by LEONARDO ARAUJO DE OLIVEIRA null (leovash5@gmail.com) on 2016-11-18T01:39:39Z No. of bitstreams: 1 texto dissertação.correta.pdf: 914553 bytes, checksum: 5d74079a7d9b8d479e75e946b4784611 (MD5) / Approved for entry into archive by Felipe Augusto Arakaki (arakaki@reitoria.unesp.br) on 2016-11-21T18:44:26Z (GMT) No. of bitstreams: 1 oliveira_la_me_mar.pdf: 914553 bytes, checksum: 5d74079a7d9b8d479e75e946b4784611 (MD5) / Made available in DSpace on 2016-11-21T18:44:26Z (GMT). No. of bitstreams: 1 oliveira_la_me_mar.pdf: 914553 bytes, checksum: 5d74079a7d9b8d479e75e946b4784611 (MD5) Previous issue date: 2016-09-22 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / A presente dissertação tem como objetivo avaliar a relação de um tema que, em uma primeira aproximação, tem sua força em um procedimento negativo – a crítica –, com uma ideia que parece ser constituída de uma potência integralmente positiva – a afirmação da vida. Entre as obras de Nietzsche, Assim falou Zaratustra ganhará destaque. Esse texto comporta, de maneira muito marcante, as ideias de negação e de afirmação. Os significantes “não” e “sim” são recorrentes durante o texto, assim como as noções de destruição e criação, que, como veremos, estão relacionadas à negação e à afirmação. Os conceitos de vontade de poder e de eterno retorno serão ressaltados no desenvolvimento do texto, devido a sua ligação direta com o tema da afirmação da vida. Contudo, mostraremos que esses últimos também podem ser lidos como conceitos críticos. Além disso, evidenciaremos que a crítica vai além do registro negativo, bem como que a afirmação nietzschiana incorpora tipos de negação. / The present thesis has as objective to assess the relationship on a subject that, in a first glance, has its strength in a negative procedure – the criticism –, with an idea that seems to be constituted by an entirely positive potency – the affirmation of life. Among Nietzsche's works, Thus spoke Zarathustra will stand out. This text holds, in a very remarkable way, the ideas of denial and affirmation. The significants "no" and "yes" are recurrent throughout the text, as well as the notions of destruction and creation, which, as we shall see, are related to denial and affirmation. The concepts of will of power and eternal return will be emphasized during the development of the text, due to its direct connection with the affirmation of life theme. However, we will show that these latest can also be read as critical concepts. Moreover, we will show that criticism goes beyond the negative registry, and as well that the nietzschean affirmation embodies types of denial.
52

DDoS : -Vad är det och går det att skydda sig?

Eriksson, Tomas, Joelsson, Hans January 2006 (has links)
This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks. / Detta arbete upplyser om hur allvarligt fenomenet Distributed Denial of Service (DDoS) är. Företag utan ett väl fungerande säkerhetstänkande kan råka riktigt illa ut vid en DDoS-attack. Vi kommer att berätta om problemet och ta upp tidigare attacker samt förslag på åtgärder för att öka säkerheten för både privatpersoner och företag. Vi kommer att utgå från tidigare Case om DDoS och intervjua säkerhetsföretag för att kunna framställa en skyddsstrategi. Därmed hoppas vi att vår uppsats kommer att vara till hjälp för företag som står inför valet att öka säkerheten mot Distributed Denial of Service.
53

Denial of Service on SIP VoIP infrastructures using DNS flooding

Zhang, Ge January 2007 (has links)
A simple yet effective Denial of Service (DoS) attack on SIP servers is to flood the server with requests addressed at irresolvable domain names. In this paper we evaluate different possibilities to mitigate these effects and show that over-provisioning is not sufficient to handle such attacks. As a more effective approach we present a solution called the DNS Attack Detection and Prevention (DADP) scheme based on the usage of a non-blocking DNS cache. Based on various measurements conducted over the Internet we investigate the efficiency of the DADP scheme and compare its performance with different caching strategies applied. / nickchang918@hotmail.com
54

Určování otcovství / Determination of paternity

Jiroutová, Michaela January 2015 (has links)
The reason why I chose the issue of determination of paternity as a topic of my thesis is the fact that most of us will meet with this institute during our lifetime. The aim of this thesis is to analyze and describe the institute of determination of paternity, especially in the view of the applicable legislation. The thesis is composed of eight chapters. Chapter One deals with family and parenthood and defines the basic terms, sucha as the biological, social and legal parenthood. Chapter Two is subdivided into two parts and focuses on the legislation of paternity. Part One describes the historical development of parenthood, part Two briefly describes the source of law witch contains the current legislation. The next chapter concerns the determination of maternity, which is closely connected to the institute of paternity. Chapter Three, apart from the applicable legislation, also includes a subchapter about hidden birth and a subchapter that documents surrogacy. The following chapter already concentrates on the current Czech legislation of determination of paternity, which is included in the civil code. This chapter consists of six parts that closely describe various possibilities of determination of paternity in the Czech republic. I particularly focus on the assumption of paternity that there is a...
55

Určování otcovství / Determination of Paternity

Joštic Mrlinová, Barbora January 2017 (has links)
With the estabilishment of paternity sooner or later encountered almost every one of us. Although the paternity law and estabilishment of paternity is already known from the times of ancient Rome, it remains a relevant and contentious topic. The aim of this thesis is to comprehensively explore and explain the establishment and denial of paternity in the Czech legal system. The thesis is divided into eight chapters. The first chapter deals with the conceptualization of family and parenthood. It is necessary, because the current Civil Code contains these concepts. However, it does not define them. To further develop the thesis, it is therefore crucial to specify, what exactly those concepts mean within the Czech legal system. The first part of this chapter examines in detail the concept of family, in the second part is dealt with parenthood. In this context, it is illuminated exclusively legal parenthood and disputes between legal, biological and social parenthood. The second chapter focuses on the history of establishment and denial of parentage from the time of ancient Rome, through the period of General Civil Code (1811), the Law on the Right to Family (1949) to the Law on Family (1963). The second chapter is also divided into two sections, namely the historical development and establishing...
56

Attribution and denial in socially desirable responding

Reid, Douglas Baird January 1988 (has links)
Paulhus's (1984) Balanced Inventory of Desirable Responding (BIDR) contains scales designed to assess the two major components of socially desirable responding. The Self-Deception Scale (SDS) assesses the tendency to give favorably biased but honestly-held self-descriptions; the Impression Management Scale (IMS) assesses the tendency to give deliberately favorable self-descriptions. Research by Millham (1974) and Roth, Snyder and Pace (1986) has distinguished two tactics of desirable responding: (a) attribution: the claiming of positive attributes, and (b) denial: the rejection of negative attributes. This thesis presents three studies designed to evaluate the relative importance of these two distinctions in the BIDR. The first study, a factor analysis of 130 cases, demonstrated that both the content (self-deception vs. impression-management) and tactic (attribution vs. denial) were important in determining responses to the BIDR. The IMS items, including both attribution and denial, formed one factor. The attribution SDS items fell on a second factor. Surprisingly, the denial SDS items fell closer to the IMS factor. Rosenberg's Self-Esteem scale was most highly correlated with the attribution SDS items. Study 2 was a similar factor analysis of the data from a much larger dataset (N = 670). The factor pattern was identical to that in Study 1. Moreover, the SDS attribution items again predicted adjustment, including high self-esteem, low social anxiety and low empathic distress. Study 3 (N = 137) was designed to determine whether the critical difference between the attribution and denial items depends on: (a) whether the item refers to positive or negative attributes, or (b) whether the statement as a whole is favorable or unfavorable. To test these competing hypotheses, 20 negations were written, one for each of the 20 original assertions on the SDS. Results showed that items referring to positive characteristics (I am a saint; I am not a saint) formed a distinct factor from items referring to negative characteristics (I am a sinner; I am not a sinner). Simple negations (I am not a sinner) fell on the same factor as their corresponding assertions (I am a sinner) but at the opposite pole. Finally, the correlations with various personality measures were consistent with Studies 1 and 2. These results clarify the distinction between attribution and denial components. The distinction is not simply one of keying direction, that is, whether the statement as a whole is desirable or undesirable. Rather, the critical factor is whether the item content refers to a positive or negative characteristic. This distinction is critical in measuring self-deception, but not impression management. / Arts, Faculty of / Psychology, Department of / Graduate
57

Students’ Quantifications, Interpretations, and Negations of Complex Mathematical Statements from Calculus

January 2020 (has links)
abstract: This study investigates several students’ interpretations and meanings for negations of various mathematical statements with quantifiers, and how their meanings for quantified variables impact their interpretations and denials of these quantified statements. Eight students participated in three separate exploratory teaching interviews and were selected from Transition-to-Proof and advanced mathematics courses beyond Transition-to-Proof. In the first interview, students were asked to interpret mathematical statements from Calculus contexts and provide justifications and refutations for why these statements are true or false in particular situations. In the second interview, students were asked to negate the same set of mathematical statements. Both sets of interviews were analyzed to determine students’ meanings for the quantified variables in the statements, and then these meanings were used to determine how students’ quantifications influenced their interpretations, denials, and evaluations for the quantified statements. In the final interview, students were also be asked to interpret and negation statements from different mathematical contexts. All three interviews were used to determine what meanings comprised students’ interpretations and denials for the given statements. Additionally, students’ interpretations and negations across different statements in the interviews were analyzed and then compared within students and across students to determine if there were differences in student denials across different moments. / Dissertation/Thesis / Doctoral Dissertation Mathematics Education 2020
58

Are leader-prototypical African Americans distrusted by their ingroup? The role of identity denial

Cho, Thomas January 2017 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Black representation in American business leadership ranks is not proportionate to America’s demographics. Previous research into this issue has mostly focused on the relationship between majority racial group and minority racial groups. However, research in identity denial and backlash shows that ingroup members may also play a negative role in undermining leadership efforts. African Americans may react negatively to a Black business leader because of the mismatch between negative stereotypes of African Americans and the positive prototype of a leader. The current study hypothesizes that resembling a business leader as an African American leads to negative reaction from other African Americans in the form of lowered trust, lowered endorsement as leader, and lowered intention to engage in organizational citizenship behavior. The current study also hypothesizes that participant’s ingroup identification level will act as a moderator, and that perceived racial identification will act as a mediator. To test the hypotheses, participants recruited from Amazon Mechanical Turk were randomly assigned to either the strong match to leader prototype condition, weak match condition, or control condition in which no information about leader prototype was provided. The results revealed a simple main effect in which strongly matching the leader prototype led to lower levels of the outcome variables. The current study brings attention to an area of research that should be further explored and suggests that organizations should create interventions to counteract this negative ingroup effect.
59

Melting Poles, Polio, and Moral Perceptions of Scientists: Humanization and Trust of Scientists in Moral Dilemmas Predicts Science Acceptance

Sosa, Nicholas 13 June 2019 (has links)
No description available.
60

Data-driven Estimation of Low-Power Long-Range Signal Parameters by an Unauthenticated Agent using Software Radio

Keshabhoina, Tarun Rao 28 August 2023 (has links)
Many large-scale distributed Multi-Agent Systems (MAS) exchange information over low- power communication networks. In such scenarios, agents communicate intermittently with each other, often with limited power and over unlicensed spectrum bands that are susceptible to interference, eavesdropping, and Denial-of-Service (DoS) attacks. In this work, we consider a popular low-power, long-range communication protocol known as LoRa. Despite LoRa's high tolerance for noise and interference, it was found vulnerable to interference from particular chirp-type signals. State-of-the-art signal jamming techniques that exploit this property require the knowledge of two sensitive parameters - Bandwidth (BW) and Spreading Factor (SF). However, such information is available only to authenticated parties on the network and not to an eavesdropping adversary. We expose LoRa's vulnerability to DoS attacks by designing an intelligent jammer that surpasses the need for prior knowledge of these parameters. Exploiting a structural pattern in LoRa signals, we propose a Neural Network (NN) implementation for jointly inferring the two parameters by eavesdropping. Through simulation and experimentation, we analyze the detection vulnerability of LoRa for each combination of these parameters at various Signal to Noise Ratio (SNR) values. This work also presents a Radio Frequency (RF) dataset of LoRa signals, which is used to validate our inference model through experimentation. / Master of Science / When many independent devices (or agents) work together in a large system, they often need to communicate with each other. They do so using low-powered networks and often in an intermittent manner. These networks operate on unlicensed radio frequencies, which are open to interference, unwanted snooping, and 'denial-of-service' attacks that could shut down communication. In our study, we focus on a popular low-power, long-distance communication protocol called LoRa. Despite being designed to handle interference and noise well, related literature revealed that LoRa is vulnerable to a specific type of interference caused by 'chirp' signals. Current techniques to jam these signals and disrupt communication require the knowledge of two important factors - bandwidth and spreading factor. Normally, only authorized parties in the network would know these details, not any outsiders looking to interfere. However, we exploit LoRa's vulnerability without knowing these two parameters. By identifying a pattern in LoRa signals, we designed an artificial intelligence model that can determine these two parameters just by listening in. We then ran simulations and conducted experiments to understand how susceptible LoRa is to being detected under various levels of signal strength and noise. We also prepared a dataset of LoRa signals and used this data to confirm the effectiveness of our model.

Page generated in 0.0694 seconds