21 |
AWS Flap Detector: An Efficient way to detect Flapping Auto Scaling Groups on AWS CloudChandrasekar, Dhaarini 07 June 2016 (has links)
No description available.
|
22 |
Troubles dépressifs majeurs : approche méthodologique pour la modélisation médico-économique des stratégies de prévention des récidives par modèles de simulation à événements Discrets / Modelling the cost-effectiveness of prophylactic interventions in patients with recurrent major depressive disorders : a methodological approach with Discrete Event SimulationLe Lay, Agathe 16 December 2009 (has links)
Les troubles dépressifs représentent aujourd’hui l’une des causes de handicap et de mortalité précoce les plus fréquentes dans le monde. Les projections établies par l’Organisation Mondiale de la Sante à l’horizon 2020 prévoient qu’ils seront classés second, juste après les maladies cardiovasculaires. De nombreuses études ont montré l’efficacité des antidépresseurs dans la prévention des rechutes, cependant la situation semble moins claire s’agissant de la prévention des récidives. Un certain nombre de travaux de recherche ont été menés visant à évaluer l’impact médico-économique des stratégies thérapeutiques préventives, en recourant à la construction de modèles de simulation, ceux-ci permettant une représentation schématique de l’évolution de la pathologie au cours du temps. Cependant, afin d’être en mesure d’évaluer l’impact économique des stratégies de prévention des troubles dépressifs, un certain nombre de facteurs doivent être pris en considération dans l’élaboration du modèle représentatif de la pathologie. Nous montrons que l’intégration de l’ensemble des facteurs déterminants des récidives, tout en considérant un horizon temporel suffisamment large afin de capter les bénéfices thérapeutiques et (éventuellement) économiques sur le long terme, n’est pas sans poser problème. Nous montrons que les modèles disponibles dans la littérature sont seulement en mesure de proposer une forme partielle d’abstraction de la pathologie dépressive, généralement réduite à un ou deux facteurs de risque principaux, parmi lesquels l’observance du traitement, l’histoire médicale ou encore les caractéristiques sociodémographiques du patient. Nous proposons alors d’envisager les modèles de simulation à événements discrets en tant que réponse possible pour la représentation des facteurs de risque des troubles dépressifs récurrents, et détaillons les principes de la méthode. Nous tentons ensuite de développer un modèle ≪ princeps ≫ à partir de données épidémiologiques. Nous montrons alors que la flexibilité associée à ce type de modélisation permet de proposer un cadre d’analyse au plus près de la réalité de la pathologie dépressive / Depressive disorders represent today one of the most frequent causes of disability and premature death worldwide. Research on the natural history of depressive disorders has shown that it is indeed a chronic rather than an acute disease. Many studies have shown the effectiveness of antidepressants in preventing relapse; however, the situation seems less clear with regard to the prevention of recurrence. A number of research activities have been conducted to evaluate the pharmaco-economic impact of preventive strategies with the help of simulation models. These techniques represent a convenient tool enabling the schematic representation of disease progression over time. However, in order to be able to assess the economic impact of prevention strategies for depressive disorders, a number of factors must be taken into account when developing the model structure. We show that the integration of all determining factors, especially on a wide-enough time horizon in order to capture the therapeutic and possible economic benefits in the long term can be somewhat problematic. We show that the models available in the literature only present a partial framework aiming at depicting disease’s risk factors (medical history, treatment compliance or socio-demographic characteristics) and progression over time. We propose then to consider the use of discrete event simulation models as a possible tool for modelling recurrent depressive disorders, and we provide a detailed description of the principles of this methodology. We then try to develop a core model based on epidemiological evidence. We show that the flexibility associated with this type of modelling method can provide an analytical framework that depicts the characteristics of the depressive pathology in a more realistic fashion
|
23 |
(Ur)kunden har alltid rätt : En studie om plagiat och användandet av plagiatkontrollsystem vid ett svenskt lärosäte / The customer (Urkund) is always rightHedlund, Elin January 2019 (has links)
The purpose of this study was to better understand how the universities in Sweden work to prevent plagiarism, how they use plagiarism detection tools and what knowledge the students have or wish to have about plagiarism. This was studied through interviews with teachers and administration staff from one smaller university in Sweden together with a questionnaire for students attending any university in Sweden. The study shows that the information about plagiarism can be clearer from teachers according to the students, to prevent plagiarism as far as possible. It also shows that the university is already working to improve the information so that the students in a better way can understand, but it is hard to know how to give the information and what information that the students need. The examined university are using the system Urkund as a plagiarism detection tool and the study shows that teachers in general are satisfied with the system and how they use it. However, some teachers see an opportunity to use the detection tool in their teaching practises but need more knowledge of the system to do so efficiently. The students reportedly know what plagiarism means according to the study, but they do not have a deeper knowledge about it which they want from their universities, especially how the school is handling plagiarism cases and how the plagiarism detection tool works. The study concludes with recommendations for the universities to improve their work against plagiarism. / Syftet med denna studie var att ta reda på hur ett lärosäte i dagsläget arbetar för att motverka plagiat, hur man använder plagiatkontrollsystem och vad studenterna har för kunskap eller vilken information de känner att de saknar gällande plagiering. Detta undersöktes genom att intervjua lärare och förvaltningsanställda på en mindre högskola i Sverige och även genom en enkätundersökning som gick ut till studenter vid högre utbildning i hela Sverige. Studien visade att många studenter upplever att informationen från lärare och lärosätet kan bli tydligare för att i största möjliga mån undvika plagieringsfall. Den visar på att lärosätet redan jobbar för att förbättra informationen för studenterna men att det är svårt att veta vad som fungerar optimalt. Studien visar också på hur systemet Urkund används och i vilken grad. De allra flesta lärarna tycker att det är ett bra och användbartsystem och det känner sig bekväma med användandet, många kan också se en möjlighet till att använda systemet på ett mer pedagogiskt vis men behöver mer kunskap i hur det skulle kunna fungera. Studenterna anser sig veta vad plagiat innebär men en stor del tycker sig sakna mer djupgående information från sitt lärosäte för att få en bättre förståelse i främst förfarande vid upptäckt av plagiat och hur plagiatkontrollsystem fungerar. Slutligen ges rekommendationer till lärosäten för att kunna utveckla sitt arbete med att motverka plagiering och förbättra kommunikationen mellan lärare och studenter för att minimera plagiatfall.
|
24 |
Programy EU pro boj proti násilnému extremismu: Zkoumání rozdílů mezi teorií a praxí / EU-wide CVE Programmes: Exploring the Gap between Theory and PracticeKaishauri, Giorgi January 2021 (has links)
Author: Giorgi Kaishauri Study programme: International Security Studies Master's thesis: EU-wide CVE Programs: Exploring the Gap between Theory and Practice Abstract The aim of this research was to determine congruence between the EU-initiated P/CVE program, CT MORSE, and prominent theoretical and empirical insights present in the academic literature on P/CVE. This research presents an exploratory qualitative study which employs a deductive approach to explore a potential gap between counter-radicalization theory and counter- radicalization practice as observed in a major EU project. The data collected and analyzed in this research suggests a partial correlation between academic insights and project's activities. Three out of eight determinants of effective P/CVE strategy discussed in the literature - community engagement, community resilience, and the role of women, are fully accounted for by the project, while the other three - dialogue, identity formation, and personnel expertise are partially present in the form of their constituting elements. Individual resilience and inclusion of former radicals receive neither implicit, nor explicit focus in the project's undertakings across the globe. Moreover, the data suggests that existing congruence is not completely arbitrary, however, a substantially deeper...
|
25 |
The Role of Community Pharmacy in Addressing and Preventing Opioid Use DisorderHagemeier, Nicholas E. 01 January 2019 (has links)
No description available.
|
26 |
Protocol Development for Preventing Inadvertent Perioperative Hypothermia in Outpatient Surgical PatientsLower, James 21 March 2022 (has links)
No description available.
|
27 |
Konsten att främja närvaro och förebygga och åtgärda problematisk frånvaroSchmähl Bolmvall, Åsa January 2020 (has links)
The work in primary school, including promoting attendence, preventing absence and remedying problematic absence is formulated in laws and decrees, the regulatory documents of primary school as well as “policydocuments” on a municipaly level and the individual schools documents in form off action plans and routines. It is a very important work, but what is formulated does not always correspond to what is implemented.The purpose of the study is to analyze how the principal and the Student Health Team in grade 7-9 of primary school works with promoting all students attendence, preventing absence and remedying problematic absence. Two questions have been used.- The first question is about what the principal and the Student Health Team do in the concrete work with promoting all students attendence, preventing absence and remedying problematic absence.- The second question it is about what the principal and the Student Health Team do in the work with promoting attendence, preventing absence and remedying problematic absence, in accordance with the action documents such as plans and routines of the individual schools and the municipality.Previous research shows that it is mainly absence in relation to individual-related and social-related problems that is highlighted. Research on promoting attendance and what that work looks like in everyday school activities is not made visible to the same extent (Gren Landell, 2018).The theoretical starting point of the study is social constructionism. The social constructionism is also the starting point for the discourse theoretical approach and the discourse analysis. Three predetermined discourses have been used in the study and it ispromoting attendence, preventing absence and remedying problematic absence. The three predetermined discourses are defined in relation to the school's governing documents. The discourses stand in proportion to the responsibility and authority of the two sub-discourses, responsibility and power and talks and meetings, a collaboration. The theoretical starting point, which includes the three perspectives of special education: the category perspective, the quandary perspective, and the relational perspective has also been used.The chosen method is semistructured qualitative interwievs and anlysis of the schools documents in the form of action plan and routines. The results that are reported are basedon seven interwievs with principals, and seven groupinterwievs with representatives from the Student Health Team, along with eight differently documents.The most important results to emerge is that there is a difference between what the principals and the representatives of the Student Health Teams strives to accomplish, what they claim to be doing and what they actually are doing in the concrete school work. That means that the constructed thoughts, words and deeds do not correspond. The study shows that it is the work with promoting attendence that is desirable and that it visualizes a desirable reality. Meanwhile the study shows that it is the concrete work with preventing absence and remedying problematic absence that is given the most attention in school. The responsibility and authority of the two sub-discourses along with dialogue and meetings and a cooperative work stands in proportion to the overall discourses. It is surprising that what the principals and representatives construct largely corresponds with what the texts in the documents construct. There is a desire to work promotionally from the relational perspective, simultaneously, it is the preventional work in accordance with the categorical perspective that is given the most attention.
|
28 |
Preventing Violent Unrest: Student Protest at the University of Toledo, 1965-1972Deters, Matthew J. 15 June 2010 (has links)
No description available.
|
29 |
Cyber-security protection techniques to mitigate memory errors exploitationMarco Gisbert, Héctor 04 November 2016 (has links)
Tesis por compendio / [EN] Practical experience in software engineering has demonstrated that the goal of
building totally fault-free software systems, although desirable, is impossible
to achieve. Therefore, it is necessary to incorporate mitigation techniques in
the deployed software, in order to reduce the impact of latent faults.
This thesis makes contributions to three memory corruption mitigation
techniques: the stack smashing protector (SSP), address space layout
randomisation (ASLR) and automatic software diversification.
The SSP is a very effective protection technique used against stack buffer
overflows, but it is prone to brute force attacks, particularly the dangerous
byte-for-byte attack. A novel modification, named RenewSSP, has been proposed
which eliminates brute force attacks, can be used in a completely transparent
way with existing software and has negligible overheads. There are two
different kinds of application for which RenewSSP is especially beneficial:
networking servers (tested in Apache) and application launchers (tested on
Android).
ASLR is a generic concept with multiple designs and implementations. In this
thesis, the two most relevant ASLR implementations of Linux have been analysed
(Vanilla Linux and PaX patch), and several weaknesses have been found. Taking
into account technological improvements in execution support (compilers and
libraries), a new ASLR design has been proposed, named ASLR-NG, which
maximises entropy, effectively addresses the fragmentation issue and removes a
number of identified weaknesses. Furthermore, ASLR-NG is transparent to
applications, in that it preserves binary code compatibility and does not add
overheads. ASLR-NG has been implemented as a patch to the Linux kernel 4.1.
Software diversification is a technique that covers a wide range of faults,
including memory errors. The main problem is how to create variants,
i.e. programs which have identical behaviours on normal inputs but
where faults manifest differently. A novel form of automatic variant
generation has been proposed, using multiple cross-compiler suites and
processor emulators.
One of the main goals of this thesis is to create applicable results.
Therefore, I have placed particular emphasis on the development of real
prototypes in parallel with the theoretical study. The results of this thesis
are directly applicable to real systems; in fact, some of the results have
already been included in real-world products. / [ES] La creación de software supone uno de los retos más complejos para el
ser humano ya que requiere un alto grado de abstracción. Aunque se ha
avanzado mucho en las metodologías para la prevención de los fallos
software, es patente que el software resultante dista mucho de ser
confiable, y debemos asumir que el software que se produce no está
libre de fallos. Dada la imposibilidad de diseñar o implementar
sistemas libres de fallos, es necesario incorporar técnicas de
mitigación de errores para mejorar la seguridad.
La presente tesis realiza aportaciones en tres de las principales
técnicas de mitigación de errores de corrupción de memoria: Stack
Smashing Protector (SSP), Address Space Layout Randomisation (ASLR) y
Automatic Software Diversification.
SSP es una técnica de protección muy efectiva contra
ataques de desbordamiento de buffer en pila, pero es sensible a ataques de
fuerza bruta, en particular al peligroso ataque denominado byte-for-byte.
Se ha propuesto una novedosa modificación del SSP, llamada RenewSSP,
la cual elimina los ataques de fuerza bruta. Puede ser usada
de manera completamente transparente con los programas existentes sin
introducir sobrecarga. El RenewSSP es especialmente beneficioso en dos áreas de
aplicación: Servidores de red (probado en Apache) y
lanzadores de aplicaciones eficientes (probado en Android).
ASLR es un concepto genérico, del cual hay multitud de diseños e
implementaciones. Se han analizado las dos implementaciones más
relevantes de Linux (Vanilla Linux y PaX patch), encontrándose en
ambas tanto debilidades como elementos mejorables. Teniendo en cuenta
las mejoras tecnológicas en el soporte a la ejecución (compiladores y
librerías), se ha propuesto un nuevo diseño del ASLR, llamado
ASLR-NG, el cual: maximiza la entropía, soluciona el problema de la
fragmentación y elimina las debilidades encontradas. Al igual que la
solución propuesta para el SSP, la nueva propuesta de ASLR es
transparente para las aplicaciones y compatible a nivel
binario sin introducir sobrecarga. ASLR-NG ha sido implementado como
un parche del núcleo de Linux para la versión 4.1.
La diversificación software es una técnica que cubre una amplia gama
de fallos, incluidos los errores de memoria. La principal dificultad
para aplicar esta técnica radica en la generación de las
"variantes", que son programas que tienen un comportamiento idéntico
entre ellos ante entradas normales, pero tienen un comportamiento
diferenciado en presencia de entradas anormales. Se ha propuesto una
novedosa forma de generar variantes de forma automática a partir de un
mismo código fuente, empleando la emulación de sistemas.
Una de las máximas de esta investigación ha sido la aplicabilidad de
los resultados, por lo que se ha hecho especial hincapié en el
desarrollo de prototipos sobre sistemas reales a la par que se llevaba
a cabo el estudio teórico. Como resultado, las propuestas de esta
tesis son directamente aplicables a sistemas reales, algunas de ellas
ya están siendo explotadas en la práctica. / [CA] La creació de programari suposa un dels reptes més complexos per al ser humà ja
que requerix un alt grau d'abstracció. Encara que s'ha avançat molt en les
metodologies per a la prevenció de les fallades de programari, és palès que el
programari resultant dista molt de ser confiable, i hem d'assumir que el
programari que es produïx no està lliure de fallades. Donada la impossibilitat
de dissenyar o implementar sistemes lliures de fallades, és necessari
incorporar tècniques de mitigació d'errors per a millorar la seguretat.
La present tesi realitza aportacions en tres de les principals tècniques de
mitigació d'errors de corrupció de memòria: Stack Smashing Protector (SSP),
Address Space Layout Randomisation (ASLR) i Automatic Software
Diversification.
SSP és una tècnica de protecció molt efectiva contra atacs de desbordament de
buffer en pila, però és sensible a atacs de força bruta, en particular al
perillós atac denominat byte-for-byte.
S'ha proposat una nova modificació del SSP, RenewSSP, la qual elimina els atacs
de força bruta. Pot ser usada de manera completament transparent amb els
programes existents sense introduir sobrecàrrega. El RenewSSP és especialment
beneficiós en dos àrees d'aplicació: servidors de xarxa (provat en Apache) i
llançadors d'aplicacions eficients (provat en Android).
ASLR és un concepte genèric, del qual hi ha multitud de dissenys i
implementacions. S'han analitzat les dos implementacions més rellevants de
Linux (Vanilla Linux i PaX patch), trobant-se en ambdues tant debilitats com
elements millorables. Tenint en compte les millores tecnològiques en el suport
a l'execució (compiladors i llibreries), s'ha proposat un nou disseny de
l'ASLR: ASLR-NG, el qual, maximitza l'entropia, soluciona el problema de
la fragmentació i elimina les debilitats trobades. Igual que la solució
proposada per al SSP, la nova proposta d'ASLR és transparent per a les
aplicacions i compatible a nivell binari sense introduir sobrecàrrega. ASLR-NG
ha sigut implementat com un pedaç del nucli de Linux per a la versió 4.1.
La diversificació de programari és una tècnica que cobrix una àmplia gamma de
fa\-llades, inclosos els errors de memòria. La principal dificultat per a aplicar
esta tècnica radica en la generació de les "variants", que són programes que
tenen un comportament idèntic entre ells davant d'entrades normals, però tenen
un comportament diferenciat en presència d'entrades anormals. S'ha proposat una
nova forma de generar variants de forma automàtica a partir d'un mateix codi
font, emprant l'emulació de sistemes.
Una de les màximes d'esta investigació ha sigut l'aplicabilitat dels resultats,
per la qual cosa s'ha fet especial insistència en el desenrotllament de
prototips sobre sistemes reals al mateix temps que es duia a terme l'estudi
teòric. Com a resultat, les propostes d'esta tesi són directament aplicables
a sistemes reals, algunes d'elles ja estan sent explotades en la pràctica. / Marco Gisbert, H. (2015). Cyber-security protection techniques to mitigate memory errors exploitation [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/57806 / Compendio
|
30 |
The South African regulatory framework relating to illegal trade in rhino horn / Neil James de WetDe Wet, Neil James January 2015 (has links)
The purpose of this study is to determine whether the current South African regulatory framework related to the illegal trade in wildlife, provides the means to regulate the illegal trade in rhino horn effectively. In an effort to combat and eradicate the illegal trade in wild species and parts therein, South Africa has enacted numerous laws and it has ratified various international conservation Conventions. However, with more than 800 rhinos having been killed in 2013 alone, it is doubtful whether these laws and conventions are adequate.
The first chapter is an introductory chapter summarising the latest statistics on rhinos fatalities as a result of poaching, an estimate on their numbers as well giving a brief overview of what laws and conventions will be discussed in this study. In the second chapter the historical development of the trade in rhino horn is dissected, who the culprits are and the reason why rhinos are poached for their horn. The third chapter analyses international conventions that have been adopted by South Africa, including conventions such as the Convention on International Trade in Enangered Species, the Convention on Biological Diversity and agreements such as the General Agreement on Tariffs and Trade. The fourth chapter will focus more on the regional contributions which the African Union and Southern African Developing Community have made in an effort to combat the illegal trade in endangered species and their products such as rhino. The fifth and final chapter discusses South African legislation which comprises of the National Environmental Management Act, National Environmental Management Biodiversity Act, National Environmental Management Protected Areas Act and the Criminal Procedure Act so as to determine what influence it has had in the effort to regulate the illegal trade in rhino horn.
The conclusion that can be drawn from this study is that the South African regulatory framework on paper is indeed adequate enough to regulate and even eradicate the illegal trade in rhino horn. The reason, however, for it’s currently failure is attributable to a lack of enforcement of these measures as a result of a lack of provisions holding entities accountable. / LLM (Import and Export Law), North-West University, Potchefstroom Campus, 2015
|
Page generated in 0.0836 seconds