• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 18
  • 6
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Substance abuse

Cernozubov, Katarina January 1970 (has links)
Typescript. / Thesis (Ph. D.)--University of Hawaii, 1970. / Bibliography: leaves 77-88. / v, 88 l tables
2

Fixace na nasálním užití pervitinu / Nasal Fixation by Methamphetamine Users

VĚTROVSKÁ, Lucie January 2013 (has links)
The diploma thesis theme, which I have chosen, Addiction to the nasal use of pervitin, is based on my long-term interest in this subject.One of the factors that may be important in the study of any drug problem is the ritual. Rituals here may appear on several levels - it may contribute to the formation and maintenance of a dependency, in the application itself (creation of "lines" on the mirror, the use of identity cards, sniffing with a rolled banknote, etc.) and can take various forms (e.g., group or individual) (Holzbachova, 1999). For my thesis, I have chosen the method of qualitative research. The basic approach of qualitative research includes the grounded theory. The aim of the thesis is to analyze and describe the different aspects of ritual behavior of nasal drug users. The research question was to discover, which aspects of ritual occur in nasal drug users. As it is described in literature, all drug users ritualize the drug application to some extent. This represents stylized and routine behavior that occurs during drug use. There are situations, like the procurement of drugs, methods of taking, activities following the use of drugs and the ways to prevent the negative effects of drugs (Grund, 1993). During an interview, two of the interviewees said the word "ritual". Cyril considers it a ritual and the activities precede sniffing. These are activities associated with the hunt for the drug, the journey to the drug and the nervousness "before trip", which according to him is stronger than the feeling of drug application. Dana describes the application procedure as a ritual. However, she describes as ritualistic her behavior during the purchase of a sufficient supply of cigarettes for intoxication or when applying the drug on the toilet seat, wiping the toilet boards before the actual preparation of the drug for application. Although the other two interviewees did not use the word ritual in their answers directly, some ritualistic elements signaled a routine behavior in conducting the drugs process by them as well. In general, we assume that the thesis can contribute to the discussion about the ritual aspects of drug users. This work brings in new information about the rituals of nasal drug users. We anticipate publication in a professional periodical.
3

Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization.

Förderer, Steffen-Marc January 2012 (has links)
A proof of concept study into the working of network media capture and visualization through the use of Packet Capture in real-time. An application was developed that is able to capture tcp network packets; identify and display images in raw HTTP network traffic through the use of search, sort, error detection, timeout failsafe algorithms in real time. The application was designed for network administrators to visualize raw network media content together with its relevant network source \& address identifiers. Different approaches were tried and tested such as using Perl with GTK+ and Visual Studio C\# .Net. Furthermore two different types of image identification methods were used: raw magic string identification in pure tcp network traffic and HTTP Mime type identification. The latter being more accurate and faster. C# was seen as vastly superior in both speed of prototyping and final performance evaluation. The study presents a novel new way of monitoring networks on the basis of their media content through deep packet inspection
4

Kanyirninpa health, masculinity and wellbeing of desert Aboriginal men /

McCoy, Brian Francis. January 2004 (has links) (PDF)
Thesis (Ph.D.)--University of Melbourne, Centre for the Study of Health and Society,School of Population Health, Faculty of Medicine, Dentistry and Health Services, 2004. / Typescript (photocopy). "Submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy, July 2004". Includes bibliographical references (leaves 269-301).
5

Coordena??o de ritmos sens?rio-motores durante comportamento explorat?rio em ratos

Alves, Joseph Andrews Belo 17 August 2016 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2017-02-22T18:57:02Z No. of bitstreams: 1 JosephAndrewsBeloAlves_DISSERT.pdf: 2493249 bytes, checksum: 1b737b22d98e824d63c44e7fc7f94b62 (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2017-03-04T00:26:10Z (GMT) No. of bitstreams: 1 JosephAndrewsBeloAlves_DISSERT.pdf: 2493249 bytes, checksum: 1b737b22d98e824d63c44e7fc7f94b62 (MD5) / Made available in DSpace on 2017-03-04T00:26:10Z (GMT). No. of bitstreams: 1 JosephAndrewsBeloAlves_DISSERT.pdf: 2493249 bytes, checksum: 1b737b22d98e824d63c44e7fc7f94b62 (MD5) Previous issue date: 2016-08-17 / Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior (CAPES) / Ao explorar ativamente o ambiente, ratos exibem comportamentos sens?rio-motores r?tmicos com frequ?ncia na faixa teta (5-10 Hz). Dentre esses est?o o sniffing (respira??o ativa e r?pida), o whisking (movimento das vibrissas faciais) e as vocaliza??es ultrass?nicas. Estudos recentes mostraram formas de sincronicidades entre tais ritmos: a protra??o e retra??o das vibrissas est?o associadas em fase, respectivamente, ? inala??o e exala??o respirat?ria; a constri??o das cordas vocais necess?ria para a produ??o vocal, por sua vez, est? condicionada ? fase exalante do sniffing e de retra??o do whisking. Embora essas e outras observa??es indiquem uma intera??o entre ritmos e geradores de padr?es no tronco encef?lico aos quais s?o atribu?dos os movimentos orais, faciais e respirat?rios. Com o intuito de adquirir melhor compreens?o acerca das hierarquias concernentes aos circuitos neurais envolvidos em tais atividades, n?s gravamos simultaneamente o whisking, sniffing e as vocaliza??es em ratos durante livre explora??o social. Para este prop?sito, oito eletrodos foram inseridos cirurgicamente para a aquisi??o de sinais eletromiogr?ficos bilaterais dos m?sculos que controlam as vibrissas e uma c?nula foi implantada por meio de uma perfura??o no osso nasal para o registro do ciclo respirat?rio. Ap?s recupera??o e habitua??o, dois ratos (um implantado e outro de est?mulo) foram posicionados sobre duas plataformas separadas por uma fenda onde possibilitava a explora??o m?tua dos animais. Esses epis?dios foram filmados atrav?s de uma c?mera de alta velocidade (250 Hz) para a captura dos movimentos das vibrissas. As vocaliza??es ultrass?nicas foram detectadas por um microfone suspenso. N?s conduzimos an?lises de fase e frequ?ncia para validar os sinais registrados e caracterizar as a??es rec?procas entre esses ciclos em contextos sociais. Os resultados confirmaram que ambos o whisking e o sniffing ocorrem em turnos nas frequ?ncias teta durante explora??o social. Al?m disso, a esperada rela??o em anti-fase entre os sinais dos grupos musculares que controlam a protra??o e retra??o das vibrissas assim como a forte sincronia com o ciclo respirat?rio foram observadas. Interessantemente, nossos dados sugerem que esta sincronia ? imediatamente dissipada durante a emiss?o de vocaliza??es ultrass?nicas. Em vez disso, n?s presenciamos um novo comportamento de whisking, que consiste em retra??o e protra??o ativas e independentes do ciclo respirat?rio. / When actively exploring the environment, rats exhibit several rhythmic behaviors with frequencies in the theta range (5-10 Hz). These include sniffing (active fast respiration), whisking (movement of the facial vibrissae), and ultrasonic vocalizations. Synchronizations between each pair of these behaviors have been observed in recent studies: vibrissae protraction-retraction is linked to the inhalation-exhalation phase of breathing; constriction of the vocal folds for vocalization, in turn, is locked to the exhalation phase of sniffing; accordingly, vocalizations were observed to synchronize with the retraction phase of whisking. These and other observations point to an interaction of rhythm and pattern generators in the brainstem controlling the coordination of respiratory, oral and facial movements. To better understand the hierarchies among these circuits we simultaneously recorded sniffing, whisking and vocalizations from rats during free social exploration. For this purpose, eight electrodes were inserted surgically to acquire bilateral EMG signals from muscles controlling the protraction and retraction of the whiskers and a cannula was implanted through the nasal bone to record the respiratory cycle. After one week of recovery and habituation, two rats (one implanted and one naive) were placed across a gap where they could explore each other. These interactions were filmed with a high speed camera (250 Hz) to capture whisker movements and ultrasonic vocalizations were recorded from an overhanging microphone. We made frequency and phase analysis to validate the recorded signals and characterize the interplay between these sensorimotor rhythms. Results confirmed that both sniffing and whisking occur in bouts at theta frequencies during social exploration. Furthermore, we observed the expected anti-phase relationship between the EMGs from muscles controlling whisker protraction and retraction as well as their tight synchrony with the sniffing cycle. Interestingly, our data suggests that this synchrony is immediately lost during the emission of ultrasonic vocalizations. Instead, we observed a novel whisking behavior, consisting of active vibrissae protraction and retraction independent of the respiratory cycle.
6

Olfactory Cognition : The Case of Olfactory Imagery

Arshamian, Artin January 2013 (has links)
The capacity to form olfactory images has received less attention than the formation of visual and auditory images. The evidence in favor of such ability is also inconsistent. This thesis explored some of the characteristics of olfactory imagery through three empirical studies. Study I investigated the effects of blocking spontaneous sniffing during olfactory imagery. The results indicated that the prevention of spontaneous sniffing reduced olfactory but not visual imagery capacity. Study II studied the relation between olfactory awareness (as indexed by olfactory dreams, olfactory imagery, and olfactory interest) and olfactory functions (i.e., odor threshold, episodic odor memory, and odor identification). The main findings were that compared to low, high olfactory awareness was associated with better episodic odor memory and identification, but not with higher olfactory sensitivity. Study III investigated the neural correlates of odor evoked autobiographical memories (OEAMs) as (a) a function of cue modality (i.e., odors and their verbal referents), and (b) a function of memory remoteness. The results from Study III showed that OEAMs activated regions generally associated with autobiographical memory. In addition, verbally cued OEAMs were associated with activity linked to olfactory imagery. Odor cues activated the limbic and temporal polar regions more than verbal cues; a result that may explain the phenomenological differences found between the cued memories. Moreover, OEAMs from the first decade of life were associated with higher activity in the secondary olfactory cortex, whereas memories from young adulthood were related to areas linked to semantic memory processing. Taken together these studies favor the notion of a human capacity to form olfactory images.
7

Analysis of Internal RF Interferences in Mobile

Balkorkian, Sevag, Hao, Zhang January 2005 (has links)
<p>Nowadays, mobile phones have greater functionality; a camera, color LCD screen, wireless LAN, Bluetooth, IrDA and others. In the near future wider variety of new functionalities will be added, from high quality voice, high definition video to high data rate wireless channels. As consumer electronics integrate greater functionality and high operating frequencies, their emissions will exceed the specified limits, most of these emissions will be a result of the internal interferences in the mobile phone. Moreover higher operating frequencies will be required to improve the quality of these functionalities, something that will make it more difficult to control these interferences. Internal or external sources of electromagnetic interference can degrade the performance of sensitive analog/digital circuits inside the mobile phone. Moreover the electronic device must satisfy a host of global regulations that limit it’s susceptibility to these interferences, as well as the interference emitted by the device itself.</p><p>Therefore designing a new electronic device to perform new and exciting functions will not be a pleasant task if it can not meet certain specifications and function as required to adhere to certain global regulations.</p><p>This thesis project investigates the sources of interference inside a mobile phone; mainly the electromagnetic interferences and its effect on the radio transceiver focusing on the GSM receiver sensitivity. This report is a result of intensive research, an investigation of possible sources of interference, also actual measurements were performed; RSSI, OTA and sniffing measurements; to identify the physical sources of interferences, and their effect on the receiver sensitivity. Finally solutions were recommended and implemented to suppress the interferences due to different sources, mainly through filtering, shielding or proper grounding of signals and components/subsystems in the mobile phone.</p>
8

Design och implementering av en datorsäkerhetsdatabas – samt en behovsanalys därav

Lagergren, Tobias January 2010 (has links)
Denna rapport beskriver de behov vilka ligger tillgrund för att skapa en IT-säkerhetsdatabas. Rapporten tar även upp olika IT-säkerhetsproblem och för en diskussion om vad som är faran med dessa problem. Diskussionen förs inom två områden rörande IT-säkerhet.Det ena området är om IT-säkerhet i allmänhet och tar upp begreppet CIA. CIA står för de engelska begreppen Confidentiality, Integrity och Availability och på svenska, sekretess, integritet och tillgänglighet.Den andra delen handlar om lite mer specifika IT-säkerhetsproblem, som till exempel virus och sniffing.På uppdrag av FOI är en databas, vilken är avsedd för att lagra information rörande IT-säkerhet, skapad. Rapporten tar upp en del grundläggande databasteori och beskriver designen och implementationen av databasen. Även hur databasen fungerar beskrivs.Slutligen förs en diskussion om uppnådda resultat och om möjlig framtida utveckling av databasen. / This report describes the needs which are the basis for creating an IT security database.The report also discusses various IT security issues and a discussion of what are the dangers of these problems. The discussion conducted in two areas relating to IT security.The first part is about IT security in general and addresses the concept of the CIA. CIA stands for the English concepts of Confidentiality, Integrity and Availability. The terms in Swedish are sekretess, integritet and tillgänglighet.The second part deals with some more specific IT security problems, such as viruses and sniffing.On behalf of FOI a database is created, which is designed to store information relating to IT security. It outlines some basic database theory and describes the design and implementation of the database. Also the functions in the database are described.Finally a discussion over the results achieved and the possible future development of database is carried out.
9

Analysis of Internal RF Interferences in Mobile

Balkorkian, Sevag, Hao, Zhang January 2005 (has links)
Nowadays, mobile phones have greater functionality; a camera, color LCD screen, wireless LAN, Bluetooth, IrDA and others. In the near future wider variety of new functionalities will be added, from high quality voice, high definition video to high data rate wireless channels. As consumer electronics integrate greater functionality and high operating frequencies, their emissions will exceed the specified limits, most of these emissions will be a result of the internal interferences in the mobile phone. Moreover higher operating frequencies will be required to improve the quality of these functionalities, something that will make it more difficult to control these interferences. Internal or external sources of electromagnetic interference can degrade the performance of sensitive analog/digital circuits inside the mobile phone. Moreover the electronic device must satisfy a host of global regulations that limit it’s susceptibility to these interferences, as well as the interference emitted by the device itself. Therefore designing a new electronic device to perform new and exciting functions will not be a pleasant task if it can not meet certain specifications and function as required to adhere to certain global regulations. This thesis project investigates the sources of interference inside a mobile phone; mainly the electromagnetic interferences and its effect on the radio transceiver focusing on the GSM receiver sensitivity. This report is a result of intensive research, an investigation of possible sources of interference, also actual measurements were performed; RSSI, OTA and sniffing measurements; to identify the physical sources of interferences, and their effect on the receiver sensitivity. Finally solutions were recommended and implemented to suppress the interferences due to different sources, mainly through filtering, shielding or proper grounding of signals and components/subsystems in the mobile phone.
10

A cybersecurity audit of the Garmin Venu

Antal, Oliver January 2023 (has links)
The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. Previous work on the Garmin Venu watch gave room for relevant future work. This thesis aims to perform further evaluation of this smartwatch in unexplored areas. The work took inspiration from the relatively new “PatrIoT” penetration testing methodology, developed in-house at the Network and Systems Engineering lab, customized for penetration testing of Internet of Things devices. This project examined a broad surface on the watch including network traffic, data over USB connection, a few details in the watch’s update mechanism, probed for some memory attack mitigations, fuzz testing of some functions in the Software Development Kit’s Application Programming Interface, and some more. According to these investigations, the watch is perceived as safe. A deeper look into some investigations is left for future work. / Bärbara enheter har blivit en normal del av 21:a århundradet, men deras pålitlighet från ett personligt säkerhetssynvinkel är diskutabelt. Informationen som samlas in av dessa har stort potential för att orsaka personliga säkerhetsrisker och måste hanteras säkert. Tidigare utförda undersökningar av Garmin Venu-smartklockan lämnade utrymme för relevant framtida arbete. Det här examensarbetet siktar på att utföra ytterligare undersökningar av denna smartklocka. Arbetet tog inspiration av det relativt nya “PatrIoT” intrångstestmetodologin, internt utvecklad av personalen i avdelningen för nätverk och systemteknik, skräddarsydd för intrångstestning av Sakernas Internet-enheter. Det här projektet undersökte en bred attackyta på klockan, inkluderande datatrafik, data över USB-anslutning, några detaljer i klockans uppdateringsmekanism, undersökte närvaron av några mekanismer för minnesbaserade attacker, försök till störningsattacker i programvaruutvecklingssatsens applikationsprogrammeringsgränssnitt, med flera. Enligt dessa undersökningar uppfattas klockan vara säker. En djupare undersökning av dessa aspekter lämnas till framtida arbete.

Page generated in 0.0745 seconds