• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 89
  • 45
  • 19
  • 13
  • 12
  • 10
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 217
  • 35
  • 20
  • 18
  • 18
  • 15
  • 13
  • 13
  • 13
  • 13
  • 12
  • 12
  • 12
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Analysis and Enforcement of Properties in Software Systems

Wu, Meng 02 July 2019 (has links)
Due to the lack of effective techniques for detecting and mitigating property violations, existing approaches to ensure the safety and security of software systems are often labor intensive and error prone. Furthermore, they focus primarily on functional correctness of the software code while ignoring micro-architectural details of the underlying processor, such as cache and speculative execution, which may undermine their soundness guarantees. To fill the gap, I propose a set of new methods and tools for ensuring the safety and security of software systems. Broadly speaking, these methods and tools fall into three categories. The first category is concerned with static program analysis. Specifically, I develop a novel abstract interpretation framework that considers both speculative execution and a cache model, and guarantees to be sound for estimating the execution time of a program and detecting side-channel information leaks. The second category is concerned with static program transformation. The goal is to eliminate side channels by equalizing the number of CPU cycles and the number of cache misses along all program paths for all sensitive variables. The third category is concerned with runtime safety enforcement. Given a property that may be violated by a reactive system, the goal is to synthesize an enforcer, called the shield, to correct the erroneous behaviors of the system instantaneously, so that the property is always satisfied by the combined system. I develop techniques to make the shield practical by handling both burst error and real-valued signals. The proposed techniques have been implemented and evaluated on realistic applications to demonstrate their effectiveness and efficiency. / Doctor of Philosophy / It is important for everything around us to follow some rules to work correctly. That is the same for our software systems to follow the security and safety properties. Especially, softwares may leak information via unexpected ways, e.g. the program timing, which makes it more difficult to be detected or mitigated. For instance, if the execution time of a program is related to the sensitive value, the attacker may obtain information about the sensitive value. On the other side, due to the complexity of software, it is nearly impossible to fully test or verify them. However, the correctness of software systems at runtime is crucial for critical applications. While existing approaches to find or resolve properties violation problem are often labor intensive and error prone, in this dissertation, I first propose an automated tool for detecting and mitigating the security vulnerability through program timing. Programs processed by the tool are guaranteed to be time constant under any sensitive values. I have also taken the influence of speculative execution, which is the cause behind recent Spectre and Meltdown attack, into consideration for the first time. To enforce the correctness of programs at runtime, I introduce an extra component that can be attached to the original system to correct any violation if it happens, thus the entire system will still be correct. All proposed methods have been evaluated on a variety of real world applications. The results show that these methods are effective and efficient in practice.
102

En hypotesprövande studie om värdlandsstöd

Bengtsson, Alexander January 2024 (has links)
With the evolving geopolitical situation and Sweden´s recent NATO integration, the understanding of Host nation supports multifaceted role is increasingly vital. Previous research lacks a theory regarding host nation support. The purpose of this thesis is to seek a better understanding on host nation support and to initiate a theoretical framework on the subject. By employing a method of hypothetical deductive approach, the study analyzes identified factors such as deterrence, planning, transit, infrastructure, and civil support. The factors were identified from previous research and motivated with theories from military science and the authors reasoning. The theoretical framework has it´s grounds in the authors reasoning that deterrence is the purpose of host nation support and the other factors are contributory to it. The analysis centers on the cases Operation Desert Shield and Operation Desert Storm during the Gulf war. The result confirms various of the factors contribution to the deterrence in host nation support in the specific cases and that there are complementary factors involved also.
103

Blaming the victim : patriarchal anthropology and the legal culpability of female rape victims

Lawton, Amy 01 January 2007 (has links)
Discussions of rape inevitability tum to the actions of the victim. This thesis documents some of the ways that American law tends to blame rape victims for the crimes against them, rather than blame the perpetrators of rape. This study contends that such an anti-victim reaction arises because patriarchal anthropology, the philosophy of living which grows out of patriarchal theology, proclaims that women are not only sinful but the very cause of sin. The central focus of this thesis is American case law pertaining to rape, critiqued through the lens of patriarchal anthropology. The cultural bias against the victim extends into the heart of the American legal system. This study seeks to demonstrate that patriarchal anthropology and the normalization of rape culture has created a justice system in which blaming the victim is acceptable, and in which the state of mind, previous actions, or appearance of the victim are inappropriately considered when deciding the innocence or guilt of an alleged rapist.
104

Generování hydridu bismutu pro atomovou absorpční a fluorescenční spektrometrii. / Hydride generation of bismuth for atomic absorption and fluorescence spectrometry.

Kolrosová, Marta January 2019 (has links)
This master's thesis deals with the optimization of conditions of chemical hydride generation (HG) of bismuth, its atomization and detection by atomic absorption spectrometry (AAS) and atomic fluorescence spectrometry (AFS). Two types of atomizers were used for atomization of volatile species, a miniature diffusion flame for AAS as well as for AFS and a flame-in-gas-shield atomizer for AFS. At first, the parameters of HG in a flow injection mode were optimized - the concentration of hydrochloric acid, the concentration of sodium borohydride and the volume of the reaction coil. Subsequently, the atomization conditions were optimized using both atomizers. The parameters optimized were hydrogen fraction, total gas flow rate and observation height. Due to the more complicated construction of the FIGS atomizer, more parameters were studied, such as the oxygen flow rate through the capillary and the flow rate of shielding argon required for shielding the free atoms. A special part of the thesis dealt with the optimization of the optical path of the atomic fluorescence spectrometer, the selection of an interference filter and the optimization of a power supply of an electrodeless discharge lamp. It was found that under optimum conditions of generation, atomization and detection excellent detection limits...
105

Molntjänster i kommuner: en studie om rättsliga och informationssäkerhetsmässiga aspekter kring arbetet med molntjänster / Cloud computing in municipalities: a study of legal and information security aspects around the work with cloud computing

Farah, Hamza Hayd, Aden, Ayan Ali January 2020 (has links)
I samband med digitaliseringens framfart hanteras, lagras samt används information av allatyper av verksamheter. Den ökade digitaliseringen av samhället har bidragit till en förhöjdefterfrågan av innovativa teknologier såsom molntjänster. Molntjänster är en populär teknik vilken erbjuder skalbara IT-lösningar på begäran över internet och vilken har signifikanta fördelar när det gäller kostnadsreducering och säker IT-drift. Trots de positiva aspekterna med molntjänster uppkommer nya rättsliga och säkerhetsmässiga problem vilka inte tidigare existerat i den traditionella IT-infrastrukturen, såsom datalokalisering samt säkerhet och integritet av information. Syftet med detta arbete är att analysera samt undersöka legala och säkerhetsmässiga åtgärder som de undersökta kommunerna vidtar vid hantering av information i molnet. Studien genomfördes i form av en kvalitativ studie, där sju semistrukturerade intervjuer utfördes. Resultatet tyder på att de undersökta kommunernas val av molntjänstleverantör beror på flertal aspekter såsom den geografiska placeringen av data samt säkerhet på information i molntjänsten. Vidare visar resultatet att kommunerna genomför åtgärder såsom att utbilda sina medarbetare samt klassificera information som kommer att lagras i molnet. / Information is handled, processed, stored, and used by all types of businesses as a result of progress in digitalization. The increased digitalization of society has contributed to an increased demand for innovative technologies such as cloud computing. Cloud computing is a popular technology that offers scalable IT solutions on demand over the Internet, and which has major advantages regarding cost reduction and secure IT operations. Despite the positive aspects of cloud computing, new legal and security issues are emerging which have not previously existed in the traditional IT infrastructure, such as data localization and the security and integrity of information. The purpose of this work is to analyze and investigate legal and security measures that the surveyed municipalities take when handling information in the cloud. The study was conducted in the form of a qualitative study, in which seven semi-structured interviews were conducted. The results indicate that the surveyed municipalities' choice of cloud computing provider depends on several aspects such as the geographical location of data and security of information in cloud computing. Furthermore, the results show that the municipalities implement measures such as training their employees and classifying information that will be stored in the cloud.
106

Mapping drainage of the rootless shield volcano at Dimmuborgir, northern Iceland

Gustafsson, Jacob January 2016 (has links)
Dimmuborgir is thought to be a former rootless shield volcano, which was fed with lava from a nearby crater row, 2170 ± 38 calendar years before present. In this study, the orientation of striations on the sides of lava channels, collapse structures and lava pillars were measured to find out how the enigmatic ~2 km by 2 km volcanic structure at Dimmuborgir was drained. During one week of field work 149 striations were found and measured, with respect to their dip angle, dip direction and elevation. Their locations were recorded with a GPS (Global Positioning System) receiver. The orientations of the striations were visualized on Google Earth satellite images and on images from a Digital Terrain Model (DTM) of Dimmuborgir. Resulting visualizations show that Dimmuborgir was drained radially and in multiple stages. It is concluded that Dimmuborgir was drained towards the west, the northeast and the southeast. The drainage towards the west was channeled. The drainage towards the northeast and the southeast was radially inwards, towards the collapsed parts of Dimmuborgir.
107

Interactions lithosphère – asthénosphère et mouvements verticaux : le cas du massif du Hoggar / Lithosphere - asthenosphere interactions and vertical movements : the Hoggar mountains case

Rougier, Sylvain 14 December 2012 (has links)
La topographie de l’Afrique du Nord est marquée en domaine intraplaque par des bombements topographiques importants, associés à du magmatisme cénozoïque. Le Bouclier Touareg, un de ces bombements, est constitué d’un socle précambrien structuré à l’orogénèse panafricaine et culminant à plus de 2400 m d’altitude. Les séries paléozoïques affleurent actuellement sous forme de cuestas autour de ce bombement topographique. Localement, des témoins sédimentaires d’âge présumé crétacé, en discordance sur le socle précambrien, traduisent l’affleurement de celui-ci au Mésozoïque. Le volcanisme cénozoïque, qui se met également en place sur le socle, est actif entre 35 Ma et aujourd’hui. Afin de mieux contraindre l’évolution du Bouclier Touareg durant le Phanérozoïque, nous avons mené deux études : des travaux de modélisation géophysique, et une étude de thermochronologie basse température. L’étude géophysique a consisté en la modélisation de quatre profils longue distance permettant d’imager la structure lithosphérique. Nous avons montré que le bombement du Hoggar est actuellement soutenu par un important amincissement lithosphérique. En outre, nous avons estimé que sans cet amincissement, la topographie serait négative : le bassin ainsi reconstitué avant amincissement de la lithosphère aurait permis le dépôt d’une couverture sédimentaire d’épaisseur plurikilométrique. L’étude de thermochronologie basse température s’est portée sur deux méthodes : les analyses de traces de fission sur apatite, et les analyses (U-Th)/He sur apatite. Les analyses (U-Th)/He ont montré que le socle du Bouclier Touareg, avant d’avoir subi une importante exhumation à l’Eocène Supérieur, étant enseveli sous une couverture sédimentaire et chauffé à approximativement ~80°C. Les analyses de traces de fission ont permis de préciser que cette phase de chauffe, probablement sous couverture sédimentaire, du Bouclier Touareg a eu lieu entre 100 et 50 Ma. Ainsi, le bombement du Hoggar constituait probablement un bassin sédimentaire de grande dimension au cours du Crétacé supérieur/Paléocène. Ces résultats nous ont permis de discuter des mécanismes géodynamiques possiblement actifs durant le Cénozoïque. Nous proposons que le bombement actuel du Bouclier Touareg, ainsi que son magmatisme, soient liés à des perturbations thermiques des parties superficielles de l’asthénosphère. Ces perturbations seraient induites par d’importantes variations d’épaisseur de la lithosphère saharienne, et pourraient expliquer la présence d’autres bombements en Afrique du Nord. / The North-African intraplate topography is underlined by massive topographic swells associated with Cenozoic volcanism. The Tuareg Shield, which is one of these swells, consists of Precambrian basement which has been structured by the Pan-African orogeny and reaches currently an altitude of 2400 m. The Paleozoic sedimentary series are outcropping as important cuestas surrounding the topographic swell. Locally, some Mesozoic sedimentary remnants, lying unconformably over the basement, testify of its exposure during the Mesozoic. The Cenozoic volcanism, which is also taking place on the basement, shows ages from 35 Ma to Quaternary. In order to improve the knowledge of the Phanerozoic evolution of the Tuareg Shield, we performed two separated studies: geophysical modelling works, and a low temperature thermochronology study. The geophysical study consisted of the modelling of four long-distance profiles allowing imaging the lithospheric structure. We have shown that the Tuareg Shield swell is currently sustained by a strong lithospheric thinning. Moreover, we have estimated that without this thinning, the topography would be negative and that such basin, prior to thinning, would have allowed the deposition of a plurikilometric sedimentary cover. The low temperature thermochronological study has focused on two methods: apatite fission-track analysis, and apatite (U-Th)/He analysis. The latter shown that the Tuareg Shield, before an important Late Eocene exhumation, was buried under a sedimentary cover and heated at ~80°C. The fission-track analyses have shown that this heating stage of the Tuareg Shield, related to burying, occurred from 100 and 50 Ma. Thus, the Tuareg Shield was probably a wide scale sedimentary basin during the Upper Cretaceous – Paleocene. These results allowed us to discuss the geodynamic mechanisms potentially active during the Cenozoic. We proposed that the current doming of the Tuareg Shield, as well as its volcanism, were related to thermal perturbations of the shallower levels of the asthenosphere. These instabilities would have been generated by strong Saharan lithospheric thickness variations, and could explain the presence of others swells in North Africa.
108

Paleoevolution of Pore Fluids in Glaciated Geologic Settings

Normani, Stefano Delfino January 2009 (has links)
Nuclear power generation is being regarded as a solution to ever increasing demand for electricity, and concerns over global warming and climate change due to the use of fossil fuels. Although nuclear power generation is considered to be reliable, economical, clean, and safe, the wastes produced from the nuclear fuel cycle are not, and can remain hazardous for hundreds of thousands of years. An international consensus has developed over the past several decades that deep geologic disposal of low, intermediate, and high level radioactive wastes is the best option to protect the biosphere. In this thesis, both regional scale and sub-regional scale models are created to simulate groundwater flow and transport for a representative Canadian Shield setting, honouring site-specific topography and surface water features. Sub-surface characteristics and properties are derived from numerous geoscience studies. In addition, a regional scale model is developed, centred on the Bruce Nuclear Power Development (BNPD) site near Tiverton, Ontario, and located within the Michigan Basin. Ontario Power Generation (OPG) has proposed a Deep Geologic Repository (DGR) for low & intermediate level waste (L&ILW) at the BNPD site. Paleoclimate simulations using various combinations of parameters are performed for both the Canadian Shield Sub-Regional model, and the Michigan Basin Regional model. Fracture zone permeability is a very important parameter when modelling crystalline rock settings. Migration of a unit tracer representing glacial recharge water can occur to depth in fractures of high permeability. Representative rock compressibility values are necessary as compressibilities are used to calculate storage coefficients, and the one-dimensional loading efficiency; these affect the subsurface propagation of elevated pore pressures due to glacial loading at surface. Coupled density-dependent flow and transport in paleoclimate simulations affects deep flow systems and provides a measure of flow stability, as well as increasing the mean life expectancy at depth. Finally, hydromechanical coupling is a very important mechanism for reducing vertical hydraulic gradients during a glaciation event when a hydraulic boundary condition equal to the pressure at the base of an ice-sheet is applied at ground surface. Pore water velocities are reduced, thereby retarding migration of surface waters into the subsurface environment.
109

Paleoevolution of Pore Fluids in Glaciated Geologic Settings

Normani, Stefano Delfino January 2009 (has links)
Nuclear power generation is being regarded as a solution to ever increasing demand for electricity, and concerns over global warming and climate change due to the use of fossil fuels. Although nuclear power generation is considered to be reliable, economical, clean, and safe, the wastes produced from the nuclear fuel cycle are not, and can remain hazardous for hundreds of thousands of years. An international consensus has developed over the past several decades that deep geologic disposal of low, intermediate, and high level radioactive wastes is the best option to protect the biosphere. In this thesis, both regional scale and sub-regional scale models are created to simulate groundwater flow and transport for a representative Canadian Shield setting, honouring site-specific topography and surface water features. Sub-surface characteristics and properties are derived from numerous geoscience studies. In addition, a regional scale model is developed, centred on the Bruce Nuclear Power Development (BNPD) site near Tiverton, Ontario, and located within the Michigan Basin. Ontario Power Generation (OPG) has proposed a Deep Geologic Repository (DGR) for low & intermediate level waste (L&ILW) at the BNPD site. Paleoclimate simulations using various combinations of parameters are performed for both the Canadian Shield Sub-Regional model, and the Michigan Basin Regional model. Fracture zone permeability is a very important parameter when modelling crystalline rock settings. Migration of a unit tracer representing glacial recharge water can occur to depth in fractures of high permeability. Representative rock compressibility values are necessary as compressibilities are used to calculate storage coefficients, and the one-dimensional loading efficiency; these affect the subsurface propagation of elevated pore pressures due to glacial loading at surface. Coupled density-dependent flow and transport in paleoclimate simulations affects deep flow systems and provides a measure of flow stability, as well as increasing the mean life expectancy at depth. Finally, hydromechanical coupling is a very important mechanism for reducing vertical hydraulic gradients during a glaciation event when a hydraulic boundary condition equal to the pressure at the base of an ice-sheet is applied at ground surface. Pore water velocities are reduced, thereby retarding migration of surface waters into the subsurface environment.
110

Interactions between Chaoborus spp. and Mysis relicta and their impact on pelagic crustacean zooplankton in mesocosms at the Experimental Lakes Area

Seckar, Dalila 13 April 2009 (has links)
The objectives of this study were: 1) to compare and contrast the effects of variations in natural densities of two common freshwater predators of crustacean zooplankton, Chaoborus spp. and Mysis relicta; and 2) to determine whether the combined impacts of these predators together differed from their effects when alone. In deep (>10m) mesocosms, additions of Chaoborus and Mysis at natural densities did not result in large changes in zooplankton abundances, lengths, or biomass. Significant decreases in abundance were observed only for Bosmina longirostris and Daphnia spp. In small (~20L) enclosures, higher predator densities caused zooplankton declines over three days. Strong interactive effects between Chaoborus and Mysis were not detected in either the large or small enclosures. This suggests that the combined effects of these two predators can be predicted from their effects determined in isolation.

Page generated in 0.0586 seconds