To see the other types of publications on this topic, follow the link: And Proposed link protection.

Dissertations / Theses on the topic 'And Proposed link protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'And Proposed link protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Anderson, Elyse M. "Exploring Maya ritual fauna caves and the proposed link with contemporary hunting ceremonialism /." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Joseph, Kathryne M. "The missing link archaeological resource protection in Charleston, South Carolina /." Connect to this title online, 2007. http://etd.lib.clemson.edu/documents/1181668891/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haynes, Elizabeth. "The Whitehead Link on the Cubic Lattice." TopSCHOLAR®, 2007. http://digitalcommons.wku.edu/theses/421.

Full text
Abstract:
The cubic lattice is a graph in Â3 where the vertices are points with integer coordinates and edges are unit length line segments parallel to the x-, y-, or z-axis. A step is a line segment that connects one vertex to a neighboring vertex one unit away in the x-, y-, or z-direction. This thesis will show that the Whitehead Link needs at least 34 steps to be embedded on the cubic lattice.
APA, Harvard, Vancouver, ISO, and other styles
4

Heydenrych, Reuben. "Environmental evaluation of proposed alternative roads to the Mohale dam." Master's thesis, University of Cape Town, 1993. http://hdl.handle.net/11427/15957.

Full text
Abstract:
Bibliography: p. 109-111.<br>This is an academic report submitted in partial fulfilment of the degree Master of Environmental Science. It is written to demonstrate the competence of the writer in undertaking work in the field of Environmental Impact Assessment. The main purpose of the report is the comparative evaluation of two proposed alternative roads, the "Western Access Route" (WAR) and the "Least Cost Alternative Route" (LCAR). Since this is an academic report, it will not be used as a decision-making document and it will not be submitted to the proponent of the alternative roads.
APA, Harvard, Vancouver, ISO, and other styles
5

Griffiths, Kristin Lisa. "Understanding the link between interleukin 17 and vaccine-induced protection in tuberculosis." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:3d7f5e42-59b8-4fda-a1a8-6a764ea219df.

Full text
Abstract:
Tuberculosis (TB), caused by infection with Mycobacterium tuberculosis (M.tb), remains a global health problem and although BCG offers some protection against childhood disseminated disease and other mycobacterial infections, its efficacy against pulmonary TB varies between 0 and 80%. Modified Vaccinia virus Ankara expressing antigen 85A (MVA85A) is a novel TB vaccine designed to boost mycobacterium-specific CD4+ T cell response primed by BCG. MVA85A induces strong interferon (IFN)-&gamma; responses, a cytokine known to be essential for protection following M.tb infection. A strong IFN-&gamma; response is not a correlate of protection and in terms of the adaptive response, interleukin (IL)-17 is emerging as an important cytokine following vaccination as it is thought to help boost IFN-&gamma; production by CD4+ T cells. This thesis shows that MVA85A induces IL-17 in PBMC and whole blood of human BCG – MVA85A vaccinees. This is replicated in mice receiving BCG – MVA85A intranasally. The administration of cholera toxin (CT) with BCG enhances IL-17 and confers improved protection following M.tb challenge, which is partially dependent on IL-17 and on the mucosal route of administration. Since CT is not a suitable adjuvant in humans, an alternative IL-17-inducing pathway was investigated. In human BCG – MVA85A-vaccinated volunteers, blocking the hydrolysing ability of the CD39, an apyrase responsible for hydrolysing pro-inflammatory ATP, enhances IL-17 production. Challenge of BCG – MVA85A-vaccinated CD39-/- mice with M.tb slightly improved the protective capacity of the vaccine, suggesting that a pathway dependent on ATP-driven inflammation may be a target for improving the immunogenicity of a vaccine against M.tb disease. Overall, this thesis has confirmed the important role of IL-17 in vaccine-induced protection against TB disease and identifies a possible target pathway for improvement of a novel vaccine.
APA, Harvard, Vancouver, ISO, and other styles
6

Hagen, Anniken. "Engineering Geological Assessments of a Tunnel for the Proposed High Speed Railway Link Between Oslo and Bergen." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for geologi og bergteknikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20098.

Full text
Abstract:
Today, the larger cities in Norway are linked with railways, but the rail transport system is in need of an upgrade in order to compete with other means of transport. Long journey times associated with the Norwegian railway is one of the main factors contributing to that most people prefer travelling by air when travelling longer distances. Thus, a great potential exists for high-speed railway lines between the major cities of Southern Norway, which will reduce journey times significantly.On February 19, 2010, in a mandate from the Ministry of Transport and Communications, the Norwegian National Rail Administration was asked to study the possibilities of constructing high-speed railway lines in Southern Norway. One of the assessment&apos;s main conclusion is that development costs for the alternative routes are substantial and vary considerably depending on the proportion of tunnels on the respective lines. This is especially relevant for the link between Oslo and Bergen which will have to cross large mountainous areas. With strict requirements regarding inclination and stiffness of alignment, there will be numerous long ($&gt;$ 5 km) to very long ($&gt;$10 km) and partly deep tunnels along this particular route.In addition to large investment cost, challenges related to long and deep tunnels are considerable. Important aspects which needs to be considered are related to construction works, geology, environment and operation. Geology plays an important role since adverse and especially unforseen geological conditions may influence construction time and costs. In Southern Norway, the rock mass mainly consists of crystalline basement rocks of good quality. However, rock mass in faults and weakness zones found within the basement rocks have reduced quality. Cambro-Silurian sedimentary rocks also exist, which generally have lower strength and higher deformability than the basement rocks.This thesis focuses on one long tunnel proposed for the high-speed railway link between Oslo and Bergen. The tunnel will be about 40 km long, has a maximum overburden of 900 m and crosses under the Hardangerj{o}kulen glacier. The thesis evaluates engineering geological conditions of the tunnel and the most crucial aspects of tunnel stability problems are covered. Theoretical aspects of main factors influencing on tunnel stability are evaluated, including water inflow, potential swelling, faults and weakness zones and stress induced problems. Water inflow, tunnel squeezing and spalling are analysed and predicted by analytical and empirical approaches. Numerical modelling is used for analysing brittle failure in the rock mass. Special challenges related to long and deep tunnels are also emphasized. Based on findings in the stability assessment, construction costs and construction time for the tunnel are estimated. This includes estimates for both conventional and TBM tunnelling methods.It is concluded that the tunnel will face different geological challenges such as 1) spalling in massive brittle basement rocks, 2) tunnel squeezing in weak phyllite and 3) considerable water inflow under high pressure in fractured rock and weakness zones, which most likely will influence on the stability during tunnel excavation. Using conventional excavation methods, estimated construction time for one tunnel tube is 9.5 years. On the other hand, using TBM, estimated construction time is 4.9 years. Total costs for both main tunnel tubes are estimated to be 9.9 and 10.7 billion NOK for conventional and TBM excavation methods, respectively.
APA, Harvard, Vancouver, ISO, and other styles
7

Troskie, Hercules Johannes. "Research into specific numerical protection maloperations / Hercules Johannes Troskie." Thesis, North-West University, 2012. http://hdl.handle.net/10394/8454.

Full text
Abstract:
High voltage transmission system availability and system security are key performance criteria for electricity utilities worldwide. System disturbances need to be cleared quickly and accurately in order to minimise the impact of faults and to facilitate speedy system restoration. In this context, the South African utility, Eskom has maintained a process of refreshing protective relaying technology as older equipment becomes obsolete and is no longer capable of meeting the utility’s requirements. The difficulties which a process of equipment renewal presents the organisation with include the risk of incorrectly applying the newer technologies within the complex electrical network. The application of new technology is affected by the complexities of the newer technology with respect to the older, more familiar technologies. Some of the difficulties can be addressed with revised commissioning procedures or the use of modern test equipment. Enhanced relay algorithms and settings calculation methodologies can however not be simplified. Protective relay maloperations cannot always be completely avoided and when they do occur, these must be investigated and addressed to prevent future recurrences. The research covered by this dissertation focuses on a number of protective relay maloperations on transmission lines using impedance protection algorithms. The research undertaken identifies the previously unidentified causes of the maloperations and describes a relay settings solution for improving the accuracy of the protective relays. The methodology that was followed in the research covers the following aspects: • Identification and highlighting of some of the protection relay maloperations that occurred during system faults, • Review of the fundamental principles involved in system fault analysis, • Comprehensive study of the theory involved in the calculation of an overhead line conductor self and mutual-inductance, as well as the calculation of the positive, negative and zero sequence impedances of an overhead line, • Brief evaluation of the effect of load impedance on relay measurements and the impact on fault clearing operation, • Analysis of the theoretical operation of various numerical relays during singlephase- to-earth faults in radial and meshed (complex) network conditions, • Mathematical calculations using typical Newton-Raphson methods to study the impact of resistive single-phase-to-earth faults on the voltage and current measurements at the relaying position with the exclusion of the capacitive components between conductors and conductors and earth, • Comparison and evaluation of mathematical calculations and system studies using network simulation software which included all steady state network parameters, • Review and analysis of actual system faults that had been previously analysed without definitive conclusion. The faults were re-analysed in an attempt to correlate findings with the hypothesis of the research, • Comparison of the performance of protective relay impedance charactersitics using positive sequence domain versus loop domain analysis techniques. This study concluded that significant benefits can be achieved by analysing system faults and relay operation using loop quantities in primary impedance values as opposed to positive sequence or apparent impedance quantities in secondary values. The inherent differences between the positive or apparent impedance characteristics of the relays are nullified when considered in the loop impedance domain, provided that the relays reach settings were calculated correctly. The study also showed that load current cannot be ignored when calculating settings as it has significant impact on the actual impedance measured during fault conditions. It is therefore crucial that when relays from different manufacturers are being used to protect the same circuit that the differences between the relays and the subsequent measurements are clearly understood and compensated for. Finally relay setting changes have been proposed for implementation based on the findings of this research. The combination of the theory, network simulations and secondary injections performed on the relays all correlate and therefore validate the research. It is left for the utility and or users of these relays to evaluate the results of this research and implement the necessary changes as applicable.<br>Thesis (MSc (Electrical Engineering))--North-West University, Potchefstroom Campus, 2012
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Syed Arif Ullah. "The impacts of series compensated EHV lines on distance protection, and a proposed new mitigation solution." Thesis, KTH, Elektroteknisk teori och konstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209916.

Full text
Abstract:
Series compensation is extensively applied to the transmission lines to increase the power transfer capability of transmission lines, reduce transmission losses, improve voltage profiles, and improve power oscillation damping and transient stability of power systems. But it modifies the apparent impedance of the transmission lines during fault conditions and might cause the distance protection of transmission lines to encounter directional discrimination issues and reach problems. The non-linear characteristic of metal oxide varistor in series compensation model creates further complexity to the fault analysis and might affects the performance of conventional distance protection scheme. The distance protection issues in the series compensated lines need to be addressed for the reliable and sustainable operation of power system.The directional discrimination issues related to current inversion and voltage inversion phenomenon, and reach problems related to sub-synchronous oscillation phenomenon are addressed in this thesis report. This report aims to analyse the impacts of series compensation on the performance of conventional distance relays, and proposes a new protection solution to mitigate the shortcomings of distance relays in the series compensated lines. The proposed new protection solution includes: new tripping characteristic of quadrilateral distance relays to cope with the steady-state reach problems due to current or voltage inversion, and a new high-pass filtering technique to handle the transient reach problems due to SSO.The proposed new protection algorithm is developed in MATLAB. The performance of new protection algorithm is evaluated by simulating a 500 kV two-source power system with a 200 km series compensated line in EMTDC/ PSCAD (Manitoba Hydro). The proposed new protection solution is found to be beneficial.<br>Seriekompensation tillämpas i stor utsträckning på överföringsledningarna för att öka överföringsförmågan hos överföringsledningar, minska överföringsförluster, förbättra spänningsprofiler och förbättra effektdämpning och övergående stabilitet hos elsystem. Men det ändrar transmissionslinjernas uppenbara impedans under felförhållanden och kan orsaka att distansskydd för överföringsledningarna stöter på diskrimineringsproblem och uppnår problem. Den icke-linjära egenskapen hos metalloxidvaristor i seriekompensationsmodell skapar ytterligare komplexitet för felanalysen och kan påverka prestandan hos konventionella distansskyddssystem. Distansskydd problemen i seriekompenserade linjer måste lösas för en pålitlig och hållbar drift av elsystemet. De riktningsdiskrimineringsproblem som är relaterade till det aktuella inversions- och spänningsinversionsfenomenet och uppnår problem relaterade till subsynkron oscillationsfenomen tas upp i denna avhandlingsrapport. Denna rapport syftar till att analysera effekterna av seriekompensation för prestanda hos konventionella distansreläer och föreslår en ny skyddslösning för att mildra bristerna i distansreläerna i seriekompenserade linjer. Den föreslagna nya skyddslösningen innefattar: Ny utlösningskaraktäristik för fyrsidig distansreläer för att klara avståndet med stillastående / räckvidden på grund av ström- eller spänningsinversion och en ny högpassfiltreringsteknik för hantering av övergående över- Nå problem på grund av SSO. Den föreslagna nya skyddsalgoritmen har utvecklats i MATLAB. Utförandet av den nya skyddsalgoritmen utvärderas genom simulering av ett 500 kV två-källa kraftverk med en 200 km serie kompenserad linje i EMTDC / PSCAD (Manitoba Hydro). Den föreslagna nya skyddslösningen har visat sig vara fördelaktig.
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, He. "On the Protection of Link State Routing and Discovery of PKI Certificate Chains in MANET." NCSU, 2005. http://www.lib.ncsu.edu/theses/available/etd-07182005-123535/.

Full text
Abstract:
The growing awareness of the network vulnerability draws much attention to security from both the academic community and industrial society. Security is no longer a luxury but an independent and indispensable service to the current Internet. While various security mechanisms such as cryptographic and intrusion detection techniques have been proposed, designed, and even deployed in the field, the newly exposed network vulnerabilities and the emerging network technologies create new security challenges which make the existing security solutions either inefficient or insufficient. My Ph D research focuses on the efficient protection on link state routing and the self-organizing and self-dependent hierarchical public key certificate management in the emerging mobile ad hoc networks. The contributions of this thesis include two parts. In the first part, a cost reduced secure link state routing protocol with the capability of detecting disruptive links is proposed to efficiently protect the routing control messages (e.g., LSA) and trace the faulty intermediate routers; then a confidence extended routing mechanism enhanced with secure virtual links is designed to increase network reachability through selectively including the uncertain routers in packet relaying and further continuously monitoring the behaviors of those selected uncertain routers. A theoretical security analysis and an experimental evaluation are conducted to prove the feasibility and advantages of this new design under various rates of false alarms. In the second part, an approach is presented to discover the optimal PKI certificate path even without help from centralized certificate entities in the non-centralized and infrastructureless mobile ad hoc network and a secured and distributed certificate-chain searching protocol is developed to collect the needed certificates on the fly in the mobile ad hoc network.
APA, Harvard, Vancouver, ISO, and other styles
10

Solanke, Oluwatosin Modupe. "Proposed amendments for consideration in the review of the copyright and trademarks protection for the digital environment in Nigeria." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13037.

Full text
Abstract:
Includes bibliographical references.<br>This thesis considers the manner in which Nigerian intellectual property law regulates the digital environment. The main question it asks is whether existing intellectual property law adequately balances and protects the rights of rightholders and users in the digital environment.
APA, Harvard, Vancouver, ISO, and other styles
11

Gezer, Dogan. "A Proposed Rule For The Interconnection Of Distributed Generation And Its Economic Justification." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611242/index.pdf.

Full text
Abstract:
Distributed generation (DG) is electricity generation by small generating units, which are interconnected at distribution level with capacity less than 50 MW. Environmental concerns and the idea of using cheap and domestic renewable resources increased the popularity of DG following the developments in equipment technology. In Turkey, interconnection of DG is realized through the distribution busbars of 154/36 kV substation. The interconnection of DG at 36 kV feeders is not allowed by distribution system authority. This thesis proposes an interconnection rule which includes technical analyses to be conducted before the permission of interconnection of DG at 36 kV feeders. Moreover, the protection functions and operational requirements needed for the proper and safe operation of distribution system in presence of DG are introduced. A sample distribution system with relevant parameters is used for the simulation studies in Digsilent software. In order to determine the operational reserve requirement against the variations in wind generation, a statistical method including Weibull distribution, standard deviation and monthly average wind speeds is used. Convenience of hydropower plants&rsquo<br>response for being backup generation against the fluctuations in wind generation is analyzed by a mid-term dynamic model of the power system. A secondary control mechanism for the integration of wind power is suggested. Finally, an economic comparison between the interconnection alternatives of hydropower and photovoltaic power plants at the distribution busbar of the 154/36 kV substation and the 36 kV feeder is done by present worth analysis using the up to date power plant costs and incentives.
APA, Harvard, Vancouver, ISO, and other styles
12

Duze, Fezekile. "Modelling toll impacts using congested highway assignment software – a case study of the proposed N2 - R72 link road in east London, South Africa." Master's thesis, Faculty of Engineering and the Built Environment, 2021. http://hdl.handle.net/11427/33657.

Full text
Abstract:
Traffic congestion has become a growing burden on society. Various approaches to model transportation do not scale efficiently due to its complex nature. The estimate of the locality and quantity of traffic that passes through, leaves or enters a study area are arrived at by assumption. There could be an increase in congestion if investments in infrastructure are done based on inaccurate transport modelling. Furthermore, outside the study area, the effects of changes in infrastructure are unknown. Hence, it is necessary to model transportation networks at a larger scale than previously required. Governments all over the world are faced with continual challenges of providing infrastructures with basic amenities to their citizens. In every financial year, government budgets are always overstretched, which leaves very little for infrastructure maintenance, especially in less developed countries such as South Africa. Tolling road is one option to overcome this challenge. This thesis, therefore, studies toll road modelling options for the proposed N2-R72 link road in East London, South Africa. The proposed N2/R72 Link Road is approximately eight kilometres long and includes a longspan bridge across the Buffalo River as well as a number of interchanges/intersections within an urban environment. Tolling in urban areas is not uncommon in South Africa and is typically associated with mainline plazas supported by several ramp plazas. The strategy presumably for the N2/R72 Link Road involves a mainline plaza constructed on the N2/R72 Link Road just before or after the Buffalo River Bridge. Traffic will be attracted from the existing roads depending on the benefits and toll on the proposed link. The research problem addressed in this thesis arose from the fact that TomTom Traffic Index in South Africa identified East London as the third most congested city in South Africa. The morning and evening commuters experience a massive increase in travel times. Globally, it has been shown that congestion level does not necessarily get reduced as a result of an increase in road capacity. At the same time, there is a need for a possible of diversion to the proposed link road, which can be a choice of a road user's willingness to pay toll fees. The challenge that arises is that diversions can result in gains and losses in terms of revenue for toll agencies if travellers' chose alternative, lower class, existing routes. Now, based on the above the Buffalo City Metropolitan Municipality (BCMM) approached SANRAL to construct a new link with a bridge. In order to finance that (with the benefit of managing traffic as well) the idea is to toll the new link. Knowing that the road user preferences are different. especially there is a need to understand the impact of tolling on traffic flows in the area. The main research question is What the impact of tolling is on the use of the upgraded link knowing that there is heterogeneity amongst users in terms of sensitivity to user costs for transport? The effect of tolling on the proposed N2-R72 link roads is being tested using the congested highway assignment software called SATURN. The way the problem is although preferably VISSUM as a ‘proper' micro model in that they model on a real-time, behavioural level. EMME models on a macro level and could have been used to accommodate all four steps in conventional models. It is tricky to use SATURN on a meso and micro level, as the micro level can distort the trip assignment if only a small (but key) part of the network is simulated (i.e. the assignment results in trips diverting around the simulation by using the buffer network). SATURN as employed in this study can operate at the meso level (buffer networks) with the junction simulation component operating at the micro level (somewhat). This report cautions against confusing the concepts of micro, meso and macro traffic models. In order to understand how the transport network may react to the proposed changes, a modelling approach is proposed. To achieve this, a traffic model was developed to represent the existing situation. This model provides the benchmark against which any proposal will be compared. This study will compare results between the existing and proposed situation in order for an informed decision can be taken on whether to proceed with the proposal based on the impact it will have on the existing network. In transport planning, various transport models are used to forecast impacts and evaluate options. This study investigates and reports on the impact of tolling should SANRAL construct a new road linking two national roads knowing that there is heterogeneity amongst users in terms of sensitivity to user costs for transport. To undertake this study a congested highway assignment model will be used based on a known case study and available old model. The literature review illustrates that with a growth of Public-Private Partnership (PPP) projects, toll roads would increase incessantly. Route choice by users is greatly influenced by toll and can sometimes also have effects on trip departure time and choice of mode. To model toll roads, users' willingness to pay (WTP) or Value of Time (VOT) has an important role, and generally, worker's wages is considered to be equivalent to VOT. This study also acknowledges that there is a distinguished difference between urban toll schemes and congestion pricing. The GFIP e-toll scheme is not congestion pricing, but rather a way to generate revenues for road upgrading and network expansion. It is not meant to suppress trip demand; in fact, it has the opposite effect when upgrades are made, and the network is expanded. The “user-pay” principle is viewed as a traffic demand measure, not as a means by which to raise funds for road building. The obvious questions are: What is the “user-pays” principle? How is the amount that the user must pay determined? Congestion pricing is meant to reduce congestion by suppressing demand. The objectives of congestion pricing are to reduce congestion, to reduce the environmental impact of vehicles by reducing harmful exhaust emission, and to improve the space for public and Non-Motorised Transport (NMT) modes. Revenue from congestion pricing should be used for public transport provision and not upgrading and/or building new roads. The results of the model analysis show that, since traffic growth on toll roads is increasing somewhere in the range of 2% and 6%, the impact on income cannot be negative. There is, notwithstanding, a risk of heightening maintenance charges if heavy vehicles continue to increase at an expense twice that of light vehicles. While not a single verification utilized in sight in the literature that toll roads in South Africa are looking to alleviate clog, it very well may be presumed that growth of light vehicle (Class 1) exacerbate congestion. It is the research candidate's view that research on the perception of Value of Time (VOT) by road-user needs to be found and on toll diversion, being able to classify and predict future traffic and volumes will be essential for the national roads agency and other provincial road authorities on roads they are in control for.
APA, Harvard, Vancouver, ISO, and other styles
13

KHALAFALLA, MUBARAK SIRELKHATIM. "FROST TOLERANCE STUDIES ON JOJOBA-SIMMONDSIA CHINENSIS (LINK) SCHNEIDER: CLONAL VARIATION, COMPOSITIONAL RELATIONSHIP AND EFFECT OF CULTURAL PRACTICES (ARIZONA)." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184072.

Full text
Abstract:
In 1984 and 1985 visual differences in frost damage were observed among 40 jojoba clones growing in a field in Tucson, Arizona. More detailed data were collected on the clone with the least damage (Clone-1) and the one with the most damage (Clone-2). On 10-ten terminal branch samples, Clone-1 showed an average of 12% leaf damage compared to 35% for Clone-2. Leaf freezing under controlled conditions on a monthly schedule showed that leaves of Clone-1 consistently froze at a lower temperature than Clone-2. Also, a second exotherm occurred in 50% of the samples for Clone-1 whereas a second exotherm occurred in only 15% of the samples of Clone-2. Soil moisture content and plant water potential were measured biweekly. Neither seemed to relate to the differences in freezing tolerance of the two clones. Total nonstructural carbohydrates (TNC), total soluble sugars, sucrose and proline were determined monthly. Accumulation patterns of TNC were similar for the two clones, however, Clone-1 generally accumulated more soluble sugars, sucrose and proline which might have contributed to its freezing tolerance. Growth measurements were recorded monthly to determine whether differences occurred between the two clones. Growth of both clones peaked in the spring, showed minor peaks in summer and ceased in winter. Under greenhouse conditions, pot grown cuttings from Clone-1 and Clone-2 were given zero, six or 12 gm of Osmocote fertilizer and watered at 35 or 70% field capacity to determine the effect of irrigation and fertilization on leaf freezing point. Fertilization significantly increased leaf concentrations of N and P and produced more growth. In the greenhouse study, no differences were found in leaf freezing point due to clones, irrigation or fertilization treatment. Leaves of Clone-1 froze at a higher temperature compared to field grown plants.
APA, Harvard, Vancouver, ISO, and other styles
14

Whiteside, Willis. "An investigation into the problems associated with providing personal respiratory protection in healthcare and the development of a proposed design solution." Thesis, Georgia Institute of Technology, 1995. http://hdl.handle.net/1853/22990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Abiiro, Gilbert Abotisem. "Universal financial protection through national health insurance : a stakeholder analysis of the proposed one-time premium payment (OTPP) policy in Ghana." Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/9993.

Full text
Abstract:
Extending coverage to the informal sector is a key challenge to achieving universal coverage through contributory health insurance schemes. Ghana introduced a mandatory National Health Insurance scheme in 2004 to provide financial protection for both the formal and informal sectors through a combination of taxes and annual premium payments. As part of its election campaign in 2008, the current government (then in opposition) promised to make the payment of premium "one-time". This has been a very controversial policy issue in Ghana.
APA, Harvard, Vancouver, ISO, and other styles
16

Meißner, Christian. "Entwicklung von dynamischen Bibliotheken (DLL) für Mathcad : Effizienzsteigerung, Quellcodeschutz, Codeportierung." Universitätsbibliothek Chemnitz, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200900826.

Full text
Abstract:
Ein Vorteil von Mathcad<sup>®</sup> ist das übersichtliche Arbeitsblatt. Mathematische Gleichungen werden nicht als verwirrende Kette von Buchstaben und Zahlen dargestellt, sondern in eindeutiger mathematischer Notation. Die Gleichungen werden standardmäßig nach der Eingabe auf Plausibilität geprüft. Viele Funktionen - auch komplexe Lösungsalgorithmen - werden bereits mitgeliefert. Weiterhin können formatierte Textfelder für eine gute Dokumentation genutzt werden, z.B. für Berechnungsnachweise. Daher kann das Arbeitsblatt in sehr kurzer Zeit entwickelt werden und ist für neue Anwender leicht nachzuvollziehen. Jedoch wird jeder Vorteil durch einen Nachteil erkauft. So liegen eine geringere Rechengeschwindigkeit, eingeschränkter Codeschutz und nur wenige Möglichkeiten zur Kommunikation mit anderen Programmen vor. Diese Nachteile können durch dynamische Bibliotheken verringert werden. Dieser Artikel stellt die Vorteile der DLL-Programmierung für Mathcad<sup>®</sup> dar und zeigt einige Beispiele zur Erhöhung der Rechengeschwindigkeit, zum Quellcodeschutz und zur Codeportierung<br>One advantage of Mathcad<sup>®</sup> is the well arranged worksheet. Mathematic equations are not displayed in confusing chains of characters but in clear mathematical notation. The equations normaly are checked of plausibility including units after writing. Many functions - even complex solving algorithms - are already defined. Furthermore formatted comments lead to a good documentation, e.g. for calculation reports. Hence the calculation sheets are developed in a very short time and they are easy to comprehend for new users. However every advantage is bought by a disadvantage. Therefore there is a less calculation speed, limited possibilities for code protection and only few possibilities of communication with other programs. These disadvantages can be removed by using dynamic link libraries (DLL's). This article gives an introduction of programming DLL's in Mathcad<sup>®</sup> and shows some examples to increase calculation efficiency, code protection and code transfer
APA, Harvard, Vancouver, ISO, and other styles
17

Yahiaoui, Guglielmo. "Adolescence, de l'insertion de l'individu à l'inscription du sujet : passage en protection de l'enfance." Thesis, Toulouse 2, 2018. http://www.theses.fr/2018TOU20033/document.

Full text
Abstract:
Psychologue(s) clinicien(s), confrontés aux solutions inventées par les sujets pour trouver à se loger dans le lien social à l’adolescence, force est de constater l’existence de pannes au moment de ce franchissement. La prééminence du discours résultant du mariage de la technoscience et du marché pourrait en être la cause. Ces ravages postmodernes s’expriment particulièrement dans le champ de l’enfance en danger. La prise en compte de la parole semble impossible dans ces institutions gagnées elles aussi par l’illusion de l’immédiat au détriment de la subjectivité. L’adolescent ne serait plus en danger mais réduit à ses troubles de conduites dangereuses ou déviantes. La protection de l’enfance pourrait-elle redevenir une adresse, le lieu d’une clinique opérante? Cette pratique, à l’opposé de toute orthopédie, viserait la rectification subjective, comme définie par Lacan. Les effets de cette clinique ne surviendraient qu’à la condition d’une écoute singulière orientée par la psychanalyse. Tel est ce que cette recherche s’efforce de démontrer à partir de la clinique d’adolescents accueillis « en protection de l’enfance »<br>Clinical psychologist(s), we are dealing with the solutions invented by those in adolescence to find to find accommodation in the social link. Force is to note breakdowns at that crossing time. The preeminence of consequences from marriage of technoscience and market could be the cause. These postmodern ravages are particularly expressed in the field of child welfare system. Taking into account of speaking seems impossible in these institutions also won by the illusion of the immediacy at the expense of subjectivity. Teenager would no longer be in danger but reduced to his dangerous or deviant conduct disorders. Could the child welfare system become an address again, a place of an operating clinic? This practice, contrary to any orthopedic, would seek subjective rectification, as defined by Lacan. Effects of this clinic occur only under the condition of a singular listening driven by psychoanalysis. This is what this research tries to demonstrate from the clinic of teenagers welcomed in child welfare system
APA, Harvard, Vancouver, ISO, and other styles
18

Yıldız, Melih Burak. "EU’s Proposed AI Regulation in the context of Fundamental Rights : Analysing the Swedish approach through the lens of the principles of good administration." Thesis, Södertörns högskola, Juridik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-46517.

Full text
Abstract:
AI has become one of the most powerful drivers of social change, transforming economies, impacting politics and wars, and reshaping how citizens live and interact. Nevertheless, the implementation of AI can have adverse effects on peoples’ lives. This dissertation first examines the relationship between artificial intelligence and public law, mainly in two domains, administrative law and criminal law. It also provides a clear insight into the potential impact of AI applications on fundamental rights in the legal context of the European Union. Four selected fundamental rights, Human Dignity, Data Protection and Right to Privacy, Equality and Non-discrimination, and Access to Justice, are examined. The dissertation further explores the European Commission's new proposed AI regulation, which was proposed in April 2021. The proposal aims to put forward a risk- based approach for a harmonized EU legislation by considering the ethical and human sides and without unnecessarily restricting the development of AI technologies. The study focuses on examples from Sweden throughout the study and lastly, examines the Swedish approach in the context of the principles of good administration.
APA, Harvard, Vancouver, ISO, and other styles
19

Zari, Oualid. "Machine learning and privacy protection : Attacks and defenses." Electronic Thesis or Diss., Sorbonne université, 2025. http://www.theses.fr/2025SORUS027.

Full text
Abstract:
L'adoption croissante d'algorithmes d'apprentissage automatique dans des domaines sensibles à la protection de la vie privée a révolutionné l'analyse des données dans de nombreux domaines. Ces algorithmes, notamment les réseaux neuronaux profonds, l'analyse en composantes principales (PCA) et les réseaux neuronaux graphiques (GNN), traitent de grandes quantités de données pour en extraire des informations utiles et précieuses. L'intégration de ces techniques dans des applications critiques traitant des informations sensibles, comme des dossiers médicaux ou des données des réseaux sociaux, a permis des avancées significatives dans l'analyse des données et les capacités de prédiction. Cependant, à mesure que ces modèles de ML deviennent plus répandus, ils exposent involontairement des vulnérabilités qui peuvent compromettre la vie privée des individus par le biais de divers vecteurs d'attaque. Cette thèse aborde les défis critiques en matière de protection de la vie privée posés par les systèmes modernes de ML, en se concentrant particulièrement sur les attaques par inférence d'appartenance (MIA) et les attaques par inférence de lien (LIA). Nous proposons de nouvelles méthodologies d'attaque et des mesures défensives correspondantes qui améliorent notre compréhension des vulnérabilités en matière de protection de la vie privée tout en fournissant des solutions pratiques pour la protection de la vie privée. Nous visons à concevoir ces solutions tout en maintenant un équilibre prudent entre la protection de la vie privée et l'utilité du modèle, en particulier pour les applications de ML du monde réel. Dans notre première contribution, nous présentons une nouvelle attaque MIA contre le PCA, où un adversaire peut déterminer si un échantillon spécifique a été utilisé dans le calcul des composantes principales. Nous démontrons que cette attaque atteint des taux de réussite élevés, en particulier lorsque le nombre d'échantillons utilisés par le PCA est relativement faible. Pour contrer cette vulnérabilité, nous étudions différentes approches de mise en œuvre de mécanismes différentiels de protection de la vie privée (DP) dans le PCA, en analysant leur efficacité en matière de protection contre les MIAs tout en préservant l'utilité des données. Nous fournissons des preuves empiriques complètes montrant les compromis entre les garanties de confidentialité et la performance du modèle. Dans notre deuxième contribution, nous présentons une nouvelle attaque d'inférence de liens (LIA), à savoir l'attaque Node Injection Link Stealing (NILS) contre les GNN, qui démontre comment un adversaire peut exploiter la nature dynamique des GNNs en injectant des nœuds malveillants pour déduire des informations sur les arêtes. Nous évaluons cette attaque en fonction d'une nouvelle notion de confidentialité différentielle dédiée aux structures de graphes et proposons des stratégies de défense dédiées. Enfin, notre troisième contribution se concentre sur le cadre distribué, c'est-à-dire l'apprentissage vertical fédéré des graphes (VFGL), et nous développons une attaque LIA basée sur le gradient qui révèle comment les informations sur le gradient dans le FL peuvent laisser échapper des détails sur la structure des graphes. Comme pour NILS, cette attaque est également évaluée sur différents ensembles de données et architectures de modèles, et des stratégies défensives spécifiques basées sur des mécanismes DP sont proposées<br>The increasing adoption of machine learning (ML) algorithms in privacy-sensitive domains has revolutionized data analysis across numerous fields. These algorithms, including Deep Neural Networks (DNN) as well as Principal Component Analysis (PCA) and Graph Neural Networks (GNNs), process vast amounts of data to extract valuable insights. The integration of these techniques into critical applications handling sensitive information, from healthcare records to social network data, has led to significant advances in data analysis and prediction capabilities. However, as these ML models become more prevalent, they inadvertently expose vulnerabilities that can compromise individual privacy through various attack vectors. This thesis addresses the critical privacy challenges posed by modern ML systems, focusing particularly on membership inference attacks (MIA) and link inference attacks (LIA). We propose novel attack methodologies and corresponding defensive measures that enhance our understanding of privacy vulnerabilities while providing practical solutions for privacy preservation. We aim to design these solutions while maintaining a careful balance between privacy protection and model utility, specifically for real-world ML applications. In our first contribution, we present a novel MIA against PCA, where an adversary can determine whether a specific data sample was used in computing the principal components. We demonstrate that this attack achieves high success rates, particularly when the number of samples used by PCA is relatively small. To counter this vulnerability, we investigate different approaches to implementing differential privacy mechanisms in PCA, analyzing their effectiveness in protecting against MIAs while preserving data utility. We provide comprehensive empirical evidence showing the trade-offs between privacy guarantees and model performance. In our second contribution, we introduce a new link inference attack, namely, the Node Injection Link Stealing (NILS) attack against GNNs that demonstrates how an adversary can exploit the dynamic nature of GNNs by injecting malicious nodes to infer edge information. We evaluate this attack according to a new differential privacy notion dedicated to graph structures and further propose dedicated defense strategies. Finally, our third contribution focuses on the distributed setting, i.e., Vertical Federated Graph Learning (VFGL) and we develop a gradient-based LIA which reveals how gradient information in FL settings can leak graph structure details. Similarly to NILS, this attack is also evaluated across various datasets and model architectures and dedicated defensive strategies based on differential privacy mechanisms are proposed
APA, Harvard, Vancouver, ISO, and other styles
20

Huang, Hui. "L'impact de l'usage sur l'étendue de la protection des marques : étude de droit comparé Chine - Union européenne." Thesis, Strasbourg, 2018. http://www.theses.fr/2018STRAA001.

Full text
Abstract:
La thèse vise à définir le rôle de l'usage non seulement dans l'obtention du droit de marque par l'enregistrement, mais aussi, d'examiner le rôle de l'usage dans l'étendue de la protection des marques. Cet examen conduira donc à faire une distinction entre, d'une part, l’usage de la marque par le titulaire lui-même, ce qui concerne donc l’existence du droit de marque (première partie), et d'autre part, l'usage de la marque par des tiers, ce qui concerne l'exercice du droit de marque (deuxième partie). La première partie sera elle-même divisée en deux titres. Dans le premier titre, on examinera le rôle de l’usage sur l’existence du droit de marque, dans le deuxième titre, on examinera comment démontrer les effets de l’usage. La deuxième partie, sera, elle aussi, divisée en deux titres : le premier titre est consacré à l'usage qui provoque la confusion entre les signes, autrement dit la contrefaçon au sens strict, et le second titre est consacrée à l'usage qui entraîne un lien entre les signes, et constitue la contrefaçon au sens large<br>The thesis aims at defining the role of the use not only in obtaining the right of mark by the registration, but also, to examine the role of the use in the scope of the protection of the marks.This examination will therefore lead to a distinction between, on the one hand, the use of the mark by the proprietor himself, which therefore concerns the existence of the trademark right (part one), and, on the other hand, the use of the mark by third parties, concerning the exercise of the trademark right (part two). The first part will be divided into two titles. In the first title, we will examine the role of the use on the existence of the right of mark, in the second title, we will examine how to demonstrate the effects of the use. The second part, will also be divided into two titles: the first title is devoted to the use that causes the confusion between the signs,in other words the infringement in the strict sense, and the second title is dedicated to the use which causes a link between signs, and constitutes infringement in the broad sense
APA, Harvard, Vancouver, ISO, and other styles
21

Sharma, Ameeth. "Performance comparison of two dynamic shared-path protection algorithms for WDM optical mesh networks." Diss., Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-01262009-141918/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Montagne, Camille. "Lien familial et droit pénal." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAD010/document.

Full text
Abstract:
Confronter le lien familial au droit pénal peut sembler paradoxal. La contradiction s'efface cependant devant le caractère inéluctable et nécessaire de cette rencontre. L'étude de l'impact spécifique de la présence du lien de famille sur les règles répressives s'inscrit dans une perspective pluridisciplinaire et propose de mettre en présence deux objets dont les frontières évoluent constamment. À travers une double perspective d'observation et de prospection, cette recherche propose d'analyser le phénomène actuel de mutation de la protection pénale de la famille et de découvrir les principes qui lui sont propres, dans le but de mieux le saisir et de pouvoir en réorienter les applications futures. L'examen révèle l'existence d'un désintérêt répressif global à l'encontre du lien familial à l'endroit où sa prise en compte constitue un atout fondamental pour l'édification et la mise en œuvre cohérente des règles pénales. Cette étude propose d'analyser l'arsenal répressif existant et se donne pour objectif l'édification théorique d'une classification inédite des infractions familiales. La réalisation d'une typologie fonctionnelle de l'infraction familiale en droit pénal permet de pouvoir lui attribuer un outil de traitement procédural adapté à ses spécificités et d'aboutir à la mise en œuvre d'une politique pénale familiale spécifique. Cette ambition questionne la réalité du lien familial pénal et appelle, d'une part, à réinsérer le droit pénal dans le lien familial au stade de la classification des infractions familiales, et, d'autre part, à intégrer le lien familial dans le droit pénal au stade du traitement des infractions familiales<br>Studying the family link from a criminal law perspective may seem paradoxical at first sight. Yet this is not the case since the confrontation between these two concepts is as ineluctable as is it necessary. The examination of the impacts of the family link on the repressive rules falls within a multidisciplinary approach and sheds light on two conceptions, whose limits are constantly changing. The purpose of this study is to analyse the current phenomenon of transformation in the criminal protection of families through observation and research; and to break down the principles governing it, so as to better grasp the situation and to give a new orientation towards future implementations. The study reveals the existence of an overall disinterest of the repressive field in the family link precisely where its consideration is a fundamental criterion in the construction and consistent implementation of criminal rules. The purpose of this research is to analyse the existing body of repressive laws and regulations currently in use as well as to establish an unprecedented classification of family offenses. The creation of a functional typology of family offenses in criminal law will make it possible to provide tailored legal tools to deal with this dilemma and to implement a specific criminal policy regarding the family. This endeavour challenges the very existence of the family link in criminal justice and demands not only that it be reintegrated into criminal law at the initial stage of classifying family offenses, but also that it be subsequently taken into consideration when dealing with these offenses
APA, Harvard, Vancouver, ISO, and other styles
23

Yalciner, Irmak. "Visual Representation In Industrial Design Registration: A Proposed Guideline For Turkey Based On Legal Texts And Guidelines From Eight Different Jurisdictions, And Interviews With Turkish Patent Institute Examiners." Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614935/index.pdf.

Full text
Abstract:
Visual representation is the most important element of a design registration in terms of scope of protection. This study examines national, regional and international design registration systems in terms of legal texts and guidelines related to visual representation, investigates problematic issues concerning the features and qualities of visual representation in industrial design registration applications in Turkey through the interviews conducted with the Turkish Patent Institute examiners, and proposes a guideline for Turkey which would assist applicants and attorneys in preparing visual representations.
APA, Harvard, Vancouver, ISO, and other styles
24

Domingos, Leandro Gomes. "Proposta de zoneamento ambiental visando a prote??o dos recursos h?dricos de uma bacia hidrogr?fica." Universidade Federal do Rio Grande do Norte, 2011. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15987.

Full text
Abstract:
Made available in DSpace on 2014-12-17T15:03:29Z (GMT). No. of bitstreams: 1 LeandroGD_DISSERT_capa_ate_pag133.pdf: 6716580 bytes, checksum: 9476462cb57b9fdec724012a32494896 (MD5) Previous issue date: 2011-12-02<br>One of the most important natural resources for sustaining human life, water, has been losing the basic requirements of quality and quantity sufficient enough to attend the population due to water contamination'problems, often caused by human beings themselves. Because of this, the sources of this resource are often located in remote places of the natural environment to ensure the quality of the water. However, when urban expansion began to occupy these areas, which were once regarded as distant, environmental pollution problems began to occur due to occupation of the land without planning. Based on this occurrence, this study aims to propose environmental zoning for the Maxaranguape river watershed in order to protect its water resources. This is important because this river can serve as a source of supply for the metropolitan area of Natal, the capital of Rio Grande do Norte. In accordance to this proposition, the model of natural soil loss vulnerability (CREPANI et al., 2001), the model of aquifer pollution vulnerability (FOSTER et al., 2006), and the legal incompatibility map (CREPANI et al., 2001) were used to delimit the zones. All this was done with Geographic Information System (GIS) and also created a geographic database update of the basin. The results of the first model mentioned indicated that 63.67% of the basin was classified as moderately stable / vulnerable, 35.66% as moderately vulnerable, and 0.67% as vulnerable. The areas with high vulnerability degree correspond with sand dunes and river channels areas. The second model indicated that 2.84% of the basin has low vulnerability, 70.27%) has median vulnerability, and 26.76% and 0.13% has high vulnerability and extreme vulnerability, respectively. The areas with the highest vulnerability values also refer to part of the sand dunes and river channels besides other areas such as Pureza urban area. The legal incompatibility map indicated that the basin has 85.02 km2 of Permanent Protection Area (PPA) and 14.62% of this area has some incongruity of use. Based on these results it was possible to draw three main zones: Protection and Sustainable Use Zone (PSUZ), Protection and Environmental Restoration Zone (PERZ) and Environmental Control Zone, which are divided into A, B and C. The PSUZ refer to the coastal areas of the basin, where the sand dunes are located. These sites should be areas of environmental protection and of sustainable urban expansion. The ZPRA refer to river channels, which are in high need of rehabilitation. The third zone corresponds to the rest of the basin which should have, in general, the mapping of possible sources of contamination for further control on the use and occupation of the river<br>Um dos recursos naturais mais importantes para a sustenta??o da vida humana, a ?gua vem perdendo os requisitos b?sicos de qualidade e quantidade suficientes para atender a popula??o devido aos problemas de contamina??o h?drica causados, muitas vezes, pelos pr?prios seres humanos. Todavia, as fontes desses recursos h?dricos geralmente est?o localizadas em lugares distantes, onde as condi??es naturais do meio ambiente ainda asseguram a qualidade dos recursos. Por?m, quando a expans?o urbana come?a a atingir essas ?reas, antigamente tidas como distantes, problemas de polui??o ambiental s?o gerados devido ? ocupa??o do solo feita de forma n?o planejada. Com base nisso, este estudo objetiva propor um zoneamento ambiental da bacia hidrogr?fica do rio Maxaranguape, visando a prote??o de seus recursos h?dricos, uma vez que eles poder?o servir como fonte de abastecimento ? regi?o metropolitana de Natal, capital do Estado do Rio Grande do Norte. Dessa forma, utilizaram-se os resultados obtidos nos modelos de vulnerabilidade ? perda natural do solo (CREPANI et al., 2001) e de vulnerabilidade do aqu?fero ? contamina??o (FOSTER et al., 2006), juntos com a carta de incompatibilidade legal (CREPANI et al., 2001) para realiza??o do zoneamento ambiental. Tudo isso foi feito em Sistema de Informa??o Geogr?fica (SIG) e ainda foi criado um banco de dados geogr?ficos atualizados da bacia. Os resultados do primeiro modelo citado indicaram que 63,67% da bacia foram classificados como medianamente est?veis/vulner?veis, 35,66% como moderadamente vulner?veis e 0,67% como vulner?vel. As ?reas pertencentes ?s classes mais vulner?veis correspondem principalmente ?s ?reas de dunas e dos canais fluviais. O segundo modelo indicou que 2,84% da bacia possuem vulnerabilidade baixa, 70,27% vulnerabilidade m?dia, 26,76% vulnerabilidade alta e 0,13% vulnerabilidade extrema. As ?reas com os mais altos valores de vulnerabilidade correspondem tamb?m ? parte de dunas e dos canais fluviais, al?m de outras ?reas como a zona urbana da cidade de Pureza. A carta de incompatibilidade legal indicou que a bacia possui 85,02 km2 de ?rea de Preserva??o Permanente (APP), sendo que 14,62% dessa ?rea possuem alguma incongru?ncia de uso. Com base nesses resultados, foi poss?vel tra?ar tr?s zonas principais: Zona de Prote??o e Uso Sustent?vel (ZPUS), Zona de Prote??o e Recupera??o Ambiental (ZPRA) e Zona de Controle Ambiental, que foi dividida em A, B e C (ZCAA, ZCAB, ZCAC). A ZPUS refere-se ?s ?reas mais pr?ximas do litoral da bacia, onde tamb?m ficam as dunas, e aconselhou-se que sejam criados locais de prote??o ambiental e de expans?o urbana sustent?vel. A ZPRA corresponde aos canais fluviais e foi recomendada a recupera??o dessas ?reas. A terceira zona corresponde ao restante da bacia e recomendou-se, no geral, o mapeamento detalhado das poss?veis fontes de contamina??o para posterior controle no uso e na ocupa??o do solo
APA, Harvard, Vancouver, ISO, and other styles
25

AHMAD, NURIE AHMAD. "Contribution a l'etude de la croissance et de la toxinogenese du genre fusarium (link) sur mais apres recolte." Nantes, 1986. http://www.theses.fr/1986NANT2036.

Full text
Abstract:
La premiere partie des travaux a porte sur la mise au point des methodes permettant le dosage de cinq toxines du groupe des trichothecenes. Les methodes mises au point concernent les toxines responsables de contaminations naturelles; t2-toxine, ht2-toxine, t2-tetraol, diacetoxyscirpenol, deoxynivalenol. L'etude de modalites des biosyntheses de ces toxines a ete precedee de differents essais preliminaires: une trentaine de souches, appartenant a une dizaine d'especes fusariennes frequentes sur mais en france, ont ete examinees pour leur aptitude a la synthese des trichothecenes. Deux especes caracteristiques (f. Lateritium et f. Sporotrichioides) ont ete retenues et etudiees en detail
APA, Harvard, Vancouver, ISO, and other styles
26

Ozakturk, Meliksah. "Power electronic systems design co-ordination for doubly-fed induction generator wind turbines." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/power-electronic-systems-design-coordination-for-doublyfed-induction-generator-wind-turbines(ebe4de00-07ad-4b06-8b8d-79be291804e7).html.

Full text
Abstract:
Wind turbine modelling using doubly-fed induction generators is a well-known subject. However, studies have tended to focus on optimising the components of the system rather than considering the interaction between the components. This research examines the interaction of the control methods for a doubly-fed induction generator (DFIG) in a wind turbine application integrating them with the crowbar protection control and DC-link brake control to make the best use of the converter. The controls of the rotor-side and the grid-side converters of the DFIG model are both well established and have been shown to work. Typically the crowbar protection is designed in order to protect the rotor-side converter and the power electronic components of the DFIG system from high currents occurring in the rotor due to the faults. The DC-link brake-overvoltage protection is also designed to prevent the overcharging of the DC-link capacitor placed between the rotor-side converter and the grid-side converter. In order to show that these protection schemes work and with thought can co-ordinate with each other, tests consisting of a number of balanced three-, two- and one-phase voltage sags are applied to the network voltage. The main contributions of this thesis are establishing operational tuning and design limits for the controllers and system subassemblies. This is to minimise the electrical subsystem interaction while maintaining adequate performance, and have an improved DC-link control. This work also includes a full electrical system study of the wind turbine and an essential literature review on significant references in the field of the DFIG wind turbine system modelling, control and protection. Specifically this research project makes a number of novel contributions to the literature: enhanced DC voltage control including operating point sensitivity analysis and dynamic stiffness assessment, sensitivity and robustness analyses of the power loop control and control loop segmentation by appropriately tuning the controller loops.
APA, Harvard, Vancouver, ISO, and other styles
27

Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088.

Full text
Abstract:
Cette thèse vise à comprendre le risque de fuite d’informations personnelles sur un réseau social. Nous étudions les violations potentielles de la vie privée, concevons des attaques, prouvons leur faisabilité et analysons leur précision. Cette approche nous aide à identifier l’origine des menaces et constitue un premier pas vers la conception de contre-mesures efficaces. Nous avons d’abord introduit une mesure de sensibilité des sujets à travers une enquête par questionnaire. Puis, nous avons conçu des attaques de divulgation (avec certitude) des liens d’amitié et des liens d’appartenance aux groupes sur “Facebook”. Ces attaques permettent de découvrir le réseau local d’une cible en utilisant uniquement des requêtes légitimes. Nous avons également conçu une technique d’échantillonnage pour collecter rapidement des données utiles autour d’une cible. Les données collectées sont ensuite représentées par des graphes et utilisées pour effectuer des inférences d’attributs (avec incertitude). Pour augmenter la précision des attaques, nous avons conçu des algorithmes de nettoyage. Ces algorithmes quantifient la corrélation entre les sujets, sélectionnent les plus pertinents et permettent de gérer la rareté (sparsity) des données. Enfin, nous avons utilisé un réseau de neurones pour classer les données et déduire les valeurs secrètes d’un attribut sensible d’une cible donnée avec une précision élevée mesurée par AUC sur des données réelles. Les algorithmes proposés dans ce travail sont inclus dans un système appelé SONSAI qui aide les utilisateurs finaux à contrôler la collecte d’informations sur leur vie privée<br>In this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
APA, Harvard, Vancouver, ISO, and other styles
28

Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.

Full text
Abstract:
Cette thèse vise à comprendre le risque de fuite d’informations personnelles sur un réseau social. Nous étudions les violations potentielles de la vie privée, concevons des attaques, prouvons leur faisabilité et analysons leur précision. Cette approche nous aide à identifier l’origine des menaces et constitue un premier pas vers la conception de contre-mesures efficaces. Nous avons d’abord introduit une mesure de sensibilité des sujets à travers une enquête par questionnaire. Puis, nous avons conçu des attaques de divulgation (avec certitude) des liens d’amitié et des liens d’appartenance aux groupes sur “Facebook”. Ces attaques permettent de découvrir le réseau local d’une cible en utilisant uniquement des requêtes légitimes. Nous avons également conçu une technique d’échantillonnage pour collecter rapidement des données utiles autour d’une cible. Les données collectées sont ensuite représentées par des graphes et utilisées pour effectuer des inférences d’attributs (avec incertitude). Pour augmenter la précision des attaques, nous avons conçu des algorithmes de nettoyage. Ces algorithmes quantifient la corrélation entre les sujets, sélectionnent les plus pertinents et permettent de gérer la rareté (sparsity) des données. Enfin, nous avons utilisé un réseau de neurones pour classer les données et déduire les valeurs secrètes d’un attribut sensible d’une cible donnée avec une précision élevée mesurée par AUC sur des données réelles. Les algorithmes proposés dans ce travail sont inclus dans un système appelé SONSAI qui aide les utilisateurs finaux à contrôler la collecte d’informations sur leur vie privée<br>In this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
APA, Harvard, Vancouver, ISO, and other styles
29

Sprenger, Michael. "Untersuchung des Dreipunkt – Neutral Point Clamped – Stromrichters mit Spannungszwischenkreis (3L-NPC-VSC) für Niederspannungswindkraftanwendungen." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-172806.

Full text
Abstract:
Das Ziel der Arbeit war die Untersuchung eines neuartigen Phasenbausteins mit der Topologie des Dreipunkt – Neutral Point Clamped – Stromrichters mit Spannungszwischenkreis (3L-NPC-VSC) für Windkraftanwendungen. Wichtige Anforderungen an den Phasenbaustein und daraus resultierende Herausforderungen, sowie Lösungen für ausgewählte Teilprobleme werden präsentiert. Um die Vorteile des 3L-NPC-VSC für Hersteller von Windkraftanlagen zugänglich zu machen, ist es sinnvoll, einen neuartigen Phasenbaustein zu entwickeln. Der Phasenbaustein soll einfach in Systeme zu integrieren sein, in denen gegenwärtig Zweipunktstromrichter (2L-VSC) zum Einsatz kommen. Da sich Modulation, Zwischenkreisbalancierung und Kurzschlussschutz vom 2L-VSC unterscheiden, soll der Phasenbaustein diese Herausforderungen eigenständig bewältigen. Die Arbeit beschreibt die Konzeption eines solchen Phasenbausteins und behandelt insbesondere die Modulation, die Zwischenkreisbalancierung und den Kurzschlussschutz des 3L-NPC-VSC. Ein Vergleich verschiedener Modulationsverfahren wurde durchgeführt und die am besten geeigneten Verfahren für die Implementation in den Phasenbaustein ausgewählt. Eine Anforderung war, dass dieser Signale einer übergeordneten Regelung verarbeiten kann, welche für einen 2L-VSC berechnet wurden. Ein Überblick der Zwischenkreisbalancierungsverfahren zeigte, dass nahezu alle den Nachteil einer zusätzlich benötigten Strommessung haben. Die Untersuchung einer neuen an der Professur Leistungselektronik der TU Dresden entwickelten Methode ohne den Bedarf der Strommessung zeigte, dass diese anwendbar ist. Der Algorithmus wurde simuliert, implementiert und experimentell getestet und zeigte gute Resultate. Die Aufgabe eines komplett unabhängigen Kurzschlussschutzes war die schwierigste. Alle möglichen Fehler innerhalb eines Moduls wurden analysiert und kategorisiert. Einige Fehlertypen können innerhalb einer Phase behandelt werden. Entsprechende Algorithmen wurden entwickelt und getestet. Allerdings gibt es Fehlertypen, die nicht durch die Steuerung einer einzelnen Phase behandelt werden können. Eine schnelle Kommunikation zwischen den drei Phasen des Konverters wäre notwendig. Alternativ könnte eine übergeordnete Steuerung diese Fehler behandeln. Zum Schluss wurde ein Demonstrator des Phasenbausteins aufgebaut und experimentell untersucht. Einige Messergebnisse werden gezeigt, um die Funktion zu verifizieren.
APA, Harvard, Vancouver, ISO, and other styles
30

Aloupi, Niki. "Le rattachement des engins à l'Etat en droit international public (navires, aéronefs, objets spatiaux)." Thesis, Paris 2, 2011. http://www.theses.fr/2011PA020022/document.

Full text
Abstract:
Contrairement aux autres biens meubles, les navires, les aéronefs et les objets spatiaux affectés à la navigation internationale sont rattachés à un Etat. Le lien de droit public établi entre ces engins et l’Etat est communément appelé « nationalité ». Mais ce terme n’exprime pas à leur propos une institution à tous égards identique à la nationalité des personnes. Le rattachement examiné ne repose en effet pas sur des éléments de fait (naissance, ascendance etc.), mais uniquement sur un acte administratif interne, l’immatriculation. L’étude de la pratique, notamment des conventions internationales et des législations nationales, montre clairement que – contrairement à ce qu’on soutient souvent – il n’y a pas lieu de subordonner ce rattachement à un lien effectif. Ce qui importe, compte tenu notamment du fait que ces engins évoluent dans des espaces soustraits à toute compétence territoriale, est d’identifier l’Etat qui est seul compétent à l’égard de l’« ensemble organisé » formé par le véhicule, les personnes et la cargaison à bord, et qui est responsable de ses activités. Le droit international interdit dès lors la double immatriculation, mais il laisse aux Etats le pouvoir discrétionnaire de déterminer les conditions d’attribution de leur « nationalité », sans subordonner l’opposabilité internationale de celle-ci à quelque autre exigence que ce soit. Le danger est toutefois que cela favorise un certain laxisme de l’Etat d’immatriculation, ce qui exposerait au risque que des dommages graves soient causés aux personnes impliquées dans les activités de ces engins et – surtout – aux tiers. Mais ce sont les obligations internationales imposées et les droits corrélatifs reconnus dans le chef de l’Etat d’immatriculation qui sont déterminants à cet égard et non quelque mystérieuse « effectivité » du rattachement. Autrement dit, s’il n’est pas nécessaire d’imposer à l’Etat d’immatriculation des conditions internationales limitant sa liberté dans l’attribution de sa « nationalité » aux engins, il est indispensable d’exiger que celui-ci respecte ses obligations, c’est-à-dire exerce effectivement son contrôle et sa juridiction. Cette constatation se vérifie quel que soit l’engin en cause. Le rattachement créé par l’immatriculation constitue donc une institution "sui generis", commune aux navires, aéronefs et objets spatiaux et dont le régime juridique est encadré par le droit international<br>Unlike any other movable property, ships, aircraft and space objects that are engaged in international navigation are linked to a State. The legal connection established between these craft/vessels and the State is commonly referred to as “nationality”. However, in this case the term does not represent an institution identical in all respects to the nationality of persons. With regard to vessels, the legal connection to a State is not based on factual elements (such as birth, descent etc.), but merely on the internal administrative act of registration. The study of State practice, notably international conventions and national laws, clearly shows that – contrary to what is often argued – there is no need to make this connection dependent on a pre-existing effective link. What matters most, given that these craft navigate in international space beyond the territorial jurisdiction of sovereign States, is to identify the State that holds sole jurisdiction over said “organized entity” consisting of the vehicle, the persons and the cargo on board and that is responsible for its activities. Public international law therefore prohibits dual registration, but leaves States free to determine the conditions under which they will confer their “nationality”, without imposing any other requirement for the opposability of this legal bond to third States. The danger is that this situation encourages laxity on the part of the States of registry and therefore creates the potential for serious damage incurred by persons involved in these vessels’ activities and – mostly – by third persons. In this regard, it is the international obligations and corresponding rights of the States of registry which are critical, and not a mysterious “effectiveness” of the legal bond. In other words, it is not necessary to impose on the State of registry any international conditions which would limit its freedom with regard to the conferral of its “nationality” upon vessels. It is however indispensable to require that said State complies with its obligations, meaning that it has to effectively exercise its jurisdiction and control over those craft. This statement holds true regardless of the craft concerned. The legal bond created by the registration therefore constitutes a "sui generis" institution, common to ships, aircraft and space objects, and whose legal regime is governed by international law
APA, Harvard, Vancouver, ISO, and other styles
31

Nguyen, Huu-Hiep. "Social Graph Anonymization." Electronic Thesis or Diss., Université de Lorraine, 2016. http://www.theses.fr/2016LORR0168.

Full text
Abstract:
La vie privée est une préoccupation des utilisateurs des réseaux sociaux. Les réseaux sociaux sont une source de données précieuses pour des analyses scientifiques ou commerciales. Cette thèse aborde trois problèmes de confidentialité des réseaux sociaux: l'anonymisation de graphes sociaux, la détection de communautés privées et l'échange de liens privés. Nous abordons le problème d'anonymisation de graphes via la sémantique de l'incertitude et l'intimité différentielle. Pour la première, nous proposons un modèle général appelé Uncertain Adjacency Matrix (UAM) qui préserve dans le graphe anonymisé les degrés des nœuds du graphe non-anonymisé. Nous analysons deux schémas proposés récemment et montrons leur adaptation dans notre modèle. Nous aussi présentons notre approche dite MaxVar. Pour la technique d'intimité différentielle, le problème devient difficile en raison de l'énorme espace des graphes anonymisés possibles. Un grand nombre de systèmes existants ne permettent pas de relâcher le budget contrôlant la vie privée, ni de déterminer sa borne supérieure. Dans notre approche nous pouvons calculer cette borne. Nous introduisons le nouveau schéma Top-m-Filter de complexité linéaire et améliorons la technique récente EdgeFlip. L'évaluation de ces algorithmes sur une large gamme de graphes donne un panorama de l'état de l'art. Nous présentons le problème original de la détection de la communauté dans le cadre de l'intimité différentielle. Nous analysons les défis majeurs du problème et nous proposons quelques approches pour les aborder sous deux angles: par perturbation d'entrée (schéma LouvainDP) et par perturbation d'algorithme (schéma ModDivisive)<br>Privacy is a serious concern of users in daily usage of social networks. Social networks are a valuable data source for large-scale studies on social organization and evolution and are usually published in anonymized forms. This thesis addresses three privacy problems of social networks: graph anonymization, private community detection and private link exchange. First, we tackle the problem of graph anonymization via uncertainty semantics and differential privacy. As for uncertainty semantics, we propose a general obfuscation model called Uncertain Adjacency Matrix (UAM) that keep expected node degrees equal to those in the unanonymized graph. We analyze two recently proposed schemes and show their fitting into the model. We also present our scheme Maximum Variance (MaxVar) to fill the gap between them. Using differential privacy, the problem is very challenging because of the huge output space of noisy graphs. A large body of existing schemes on differentially private release of graphs are not consistent with increasing privacy budgets as well as do not clarify the upper bounds of privacy budgets. In this thesis, such a bound is provided. We introduce the new linear scheme Top-m-Filter (TmF) and improve the existing technique EdgeFlip. Thorough comparative evaluation on a wide range of graphs provides a panorama of the state-of-the-art's performance as well as validates our proposed schemes. Second, we present the problem of community detection under differential privacy. We analyze the major challenges behind the problem and propose several schemes to tackle them from two perspectives: input perturbation (LouvainDP) and algorithm perturbation (ModDivisive)
APA, Harvard, Vancouver, ISO, and other styles
32

Nguyen, Huu-Hiep. "Social Graph Anonymization." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0168/document.

Full text
Abstract:
La vie privée est une préoccupation des utilisateurs des réseaux sociaux. Les réseaux sociaux sont une source de données précieuses pour des analyses scientifiques ou commerciales. Cette thèse aborde trois problèmes de confidentialité des réseaux sociaux: l'anonymisation de graphes sociaux, la détection de communautés privées et l'échange de liens privés. Nous abordons le problème d'anonymisation de graphes via la sémantique de l'incertitude et l'intimité différentielle. Pour la première, nous proposons un modèle général appelé Uncertain Adjacency Matrix (UAM) qui préserve dans le graphe anonymisé les degrés des nœuds du graphe non-anonymisé. Nous analysons deux schémas proposés récemment et montrons leur adaptation dans notre modèle. Nous aussi présentons notre approche dite MaxVar. Pour la technique d'intimité différentielle, le problème devient difficile en raison de l'énorme espace des graphes anonymisés possibles. Un grand nombre de systèmes existants ne permettent pas de relâcher le budget contrôlant la vie privée, ni de déterminer sa borne supérieure. Dans notre approche nous pouvons calculer cette borne. Nous introduisons le nouveau schéma Top-m-Filter de complexité linéaire et améliorons la technique récente EdgeFlip. L'évaluation de ces algorithmes sur une large gamme de graphes donne un panorama de l'état de l'art. Nous présentons le problème original de la détection de la communauté dans le cadre de l'intimité différentielle. Nous analysons les défis majeurs du problème et nous proposons quelques approches pour les aborder sous deux angles: par perturbation d'entrée (schéma LouvainDP) et par perturbation d'algorithme (schéma ModDivisive)<br>Privacy is a serious concern of users in daily usage of social networks. Social networks are a valuable data source for large-scale studies on social organization and evolution and are usually published in anonymized forms. This thesis addresses three privacy problems of social networks: graph anonymization, private community detection and private link exchange. First, we tackle the problem of graph anonymization via uncertainty semantics and differential privacy. As for uncertainty semantics, we propose a general obfuscation model called Uncertain Adjacency Matrix (UAM) that keep expected node degrees equal to those in the unanonymized graph. We analyze two recently proposed schemes and show their fitting into the model. We also present our scheme Maximum Variance (MaxVar) to fill the gap between them. Using differential privacy, the problem is very challenging because of the huge output space of noisy graphs. A large body of existing schemes on differentially private release of graphs are not consistent with increasing privacy budgets as well as do not clarify the upper bounds of privacy budgets. In this thesis, such a bound is provided. We introduce the new linear scheme Top-m-Filter (TmF) and improve the existing technique EdgeFlip. Thorough comparative evaluation on a wide range of graphs provides a panorama of the state-of-the-art's performance as well as validates our proposed schemes. Second, we present the problem of community detection under differential privacy. We analyze the major challenges behind the problem and propose several schemes to tackle them from two perspectives: input perturbation (LouvainDP) and algorithm perturbation (ModDivisive)
APA, Harvard, Vancouver, ISO, and other styles
33

Tahmasbi, Soheil. "Finite element modelling of chain‐link drapery for rockfall protection." Thesis, 2020. http://hdl.handle.net/1959.13/1417011.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)<br>Rockfall represents a significant threat to human life and to infrastructures along many road and railway transport networks. Rockfall drapery systems are effective low maintenance protection systems that can be used to mitigate rockfall risk. Drapery systems have been around for more than fifty years but limited research has been conducted on their performance and dynamic response upon impact. The experimental testing of drapery systems typically incurs very high cost and significant technical constraints, all of which can be reduced by resorting to numerical simulations. However, the intricate modelling techniques required to capture the realistic responses of such systems leads to computationally expensive numerical models. Such high computational costs make it impractical to utilise complex modelling techniques to simulate the response of large systems, such as draperies. When this research project started, there was no published comprehensive dataset, either experimental or numerical, on the dynamic response of drapery systems made of chain-link meshes, and their ability to control the trajectory of falling rocks. The two objectives of the research presented in this thesis were to develop a computationally efficient chain-link mesh model and to acquire new knowledge on the dynamic response of the drapery systems made of chain-link meshes. The first part of this research focused on developing a computationally efficient three-dimensional FE model. This model is based on a hybrid approach where the drapery mesh is modelled using two different finite element formulations. In the zone of impact, where plastic deformations occur, the exact architecture of chain-link wires is modelled using beam elements, while homogenised shell surfaces are used far from the impact where the mesh mostly experiences elastic deformation (peripheral zones). Elastic constitutive relationships are implemented for all shell elements, while plasticity and ductile damage constitutive behaviour is assigned to all wires in the impact zone. Such a hybrid approach leads to considerable computational saving by reducing the number of degrees of freedom of the model and thereby the size of its corresponding global equation (dynamic equilibrium equation). The hybrid model was calibrated and validated against the results of experimental drop tests on 4.2 m per 4.2 m chain-link meshes. The hybrid model resulted in an almost 50% and 70% reduction in the CPU time for small (4.2 m by 4.2 m mesh panel) and large mesh sizes (12.3 m by 4.2 m mesh panel), compared to a model without shell elements. The second part of this PhD research deals with the implementation of the hybrid mesh model into a full-scale model of a drapery system with the objective being to investigate the dynamic response of draperies. Two different models were used for this study: a simplified one and a realistic one. The simplified model consisted of a vertically hanging drapery mesh impacted by EOTA blocks coming at different impact velocities and angles. The idea of this model was to provide preliminary information on the possible interaction mechanisms between the mesh and the block. This model was also used to assess whether it is possible to predict the occurrence of mesh failure for a given block size and set of impact conditions without accounting for the slope. The realistic model included a drapery mesh resting on a rock slope with an irregular surface geometry where the block, positioned at the top of the slope, was released and fell between the mesh and the rock slope. The model was applied to a real case slope scenario to assess its capability to capture a rockfall behind a drapery mesh, after which the performance of the system was investigated by a comprehensive simulation program. Two block shapes, four block sizes and five chain-link meshes were used in the simulations. The analyses were conducted in terms of block trajectory, block residual energy, dissipation mechanisms and anchor load. The simplified model showed that the mesh can reverse the rotation of blocks upon impact and that the weight of the mesh relative to the weight of the block is an important parameter of the mesh/block interaction. The heavier the mesh, the less it displaces upon impact, for a given set of boundary conditions. Although the simplified model revealed some fundamental interaction mechanisms, it showed its limits when it comes to predicting the occurrence of mesh failure. Indeed, the occurrence of mesh failure is not only dependant on mesh properties and boundary conditions, but also on mesh/slope interaction and slope geometry (because it affects block trajectory and hence mesh impact). The simulations were successfully run on the full-scale drapery systems using the hybrid approach for a specific slope, producing the first comprehensive database of block trajectory, block energy evolution, drapery performance and development of anchor loads upon rockfall behind a drapery mesh. Using a rough slope surface in the model showed that a small change in block trajectory induced by the mesh could result in a large change in trajectory after a rebound off the slope, depending on where the block impacts the slope. It is best to run simulations to try to capture all possible changes in trajectory and, hence, loading to the mesh. Small blocks were found to bounce back and forth between the block and the mesh, while large blocks tended to slide against the mesh with a lesser number of impacts on the slope. Increasing the relative weight of mesh against block was found to result in more impacts of the block upon the slope, which can lead to more energy dissipation but a higher chance of orthogonal impact with the mesh, which increases loading. The simulations reveal the ability of meshes to reverse the rotation of blocks, especially for small blocks, which can contribute to reducing the block energy. It was observed that the occurrence of mesh failure depends greatly on the boundary conditions (including the top anchors, bottom rope, slope geometry, and mesh weight relative to the block weight) and impact conditions (which is a function of block trajectory, and is highly variable). In addition, rotational energy can be problematic for mesh failure when blocks have sharp edges. Finally, there seems to be an optimal mesh size for a given block size, whereby the mesh is light enough to displace upon impact in order to partly absorb the impact energy, but also strong enough to resist the impact.
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Li-Ying, and 王儷穎. "Survivable Mapping of Logical Topology in WDM Networks by Link Protection." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/54913137028675418215.

Full text
Abstract:
碩士<br>靜宜大學<br>資訊工程學系<br>99<br>In IP-over-WDM networks, a logical IP network has to be routed on top of a physical optical fiber network. To make this routing (mapping) survivable is an important challenge. A mapping is called survivable if no single physical link failure can disconnect the logical topology. In this paper we present SMLP, a survivable mapping algorithm by link protection. We show that our simple algorithm can produce better results than current state-of-the-art algorithm.
APA, Harvard, Vancouver, ISO, and other styles
35

Jinfu, Lee, and 李京釜. "Graph Augmented Protection Algorithms for Multicast Sessions against Single Link Failures." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/05486954069436829067.

Full text
Abstract:
碩士<br>大葉大學<br>資訊工程學系碩士班<br>98<br>Abstract In this thesis, we study the problem of enhancing the survivability of the multicast tree in a network when a single link failure occurs. Due to the incremental demand for multicast in networks, how to enhance the survivability against link/node failures becomes an important issue. Current research on this topic often used edge-disjoint path-pairs to construct a survivable multicast tree. This approach may lead to the increase the length of primary transmission paths and then transmission delays. Therefore, in this thesis, we try to improve the survivability for an already built multicast tree. In other words, for a best suitable multicast tree, we will try to add as few links as possible to make this tree 2-edge-connected an then against single link failure. According to different link-adding strategies, we get two heuristic algorithms: the first one is Low Cost Survivable Multicast (LCSM), which gives a near-optimal solution; the other one is called Fast Discovery Survivable Multicast (FDSM), which is faster but need more links than LCSM. Key Words: multicast, survivable, 2-edge-connected
APA, Harvard, Vancouver, ISO, and other styles
36

Roets, Wilna. "Terrain suitability analysis for the proposed rapid-rail link between Pretoria, Johannesburg and Johannesburg International Airport." Thesis, 2009. http://hdl.handle.net/10210/2014.

Full text
Abstract:
M.A.<br>The proposal to build the Gautrain rapid-rail link between Pretoria, Johannesburg and Johannesburg International Airport was approved in June 2000 by the Gauteng Provincial Government. It was noted that this particular development could have serious environmental implications for the area involved. The aim of this research is therefore to identify the most suitable terrain in order to optimise the rail route alignment with minimal environmental impact. This will be accomplished by undertaking a terrain suitability analysis. The different high-speed railway types are discussed and their impact on the environment is considered, culminating in an evaluation of the background and status of the proposed Gautrain rapid-rail link. The different approaches to terrain evaluation are discussed in order to draw conclusions relative to the methodology used in this research. Subsequently the activity approach as described by Mitchell (1991) and Hugo et al (1997) was chosen as the methodology to use for this research and the terrain within the study area was classified according to its suitability for the development of the Gautrain rapid-rail link. A Geographic Information System (GIS) was utilised to aid in the terrain suitability analysis. As a result of the analysis an optimised route is proposed and compared to the rail routes already proposed for the Gautrain rapid-rail link. It is imperative that a terrain suitability analysis should form part of the preliminary phase of any environmental management cycle as portrayed in Fuggle & Rabie (1998), in order to identify suitable terrain for the development in question; the rapid-rail link route should be no exception.
APA, Harvard, Vancouver, ISO, and other styles
37

Ning, Po-Heng, and 甯柏衡. "A SIEPON DDF Link-protection for Bus-connected based PON System Architecture." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/a7ne9u.

Full text
Abstract:
碩士<br>元智大學<br>資訊工程學系<br>104<br>Ethernet passive optical network (EPON) is one of the convenient application for the next generation network. It can use from Fiber-To-The-Home (FTTH), FTTB (building) and FTTO (office). Thus, it’s important to keep the protection on device link, otherwise it will cause a great loss for both network operators and customers. Therefore, in this paper, we propose Bus-connected architecture to protect and recovery Drop Distribution Fiber (DDF) link faults or transceiver failure at the ONU(s) in EPON system. In the proposed architecture, when fault occurs, the ONU will switch the working line to the protection line and sends the essential alarm event to the backup ONU then to the OLT via Bus-connected architecture. For this reason, when failure occurs, the ONU can still transmit and receive data through the backup ONU. Simulation results show that our proposed architecture can maintain quality of service (Qos) performance in terms of mean packet delay, system throughput, packet loss and EF jitter.
APA, Harvard, Vancouver, ISO, and other styles
38

Bonera, Lorenzo. "Mandatory Disclosure and the CSA Proposed Legislation for Securitized Products." Thesis, 2012. http://hdl.handle.net/1807/33345.

Full text
Abstract:
One of the main factors that spurred the 2008 financial crisis was the trading of securitized products without a clear understanding of the risks that those products bore. I argue that an appropriate regime of mandatory disclosure is the primary instrument regulators should refer to in order to correct the informational asymmetries that are present in the market for securities products. Subsequently, I take into consideration the CSA proposed legislation for the mandatory disclosure of securitized products and analyze its main components under the light of the principles of investor protection and market efficiency. I find that the new legislation should be welcome by market operators because it is a good balancing effort between the necessity to protect the investors and fostering the efficiency of the market.
APA, Harvard, Vancouver, ISO, and other styles
39

Haneef, Raeesa. "Class actions : a proposed procedure in terms of the Consumer Protection Act 68 of 2008." Thesis, 2013. http://hdl.handle.net/10413/10918.

Full text
Abstract:
Due to length and time constraints, this dissertation will briefly examine and provide an overview of the current method that courts have adopted in bringing a class action in Southern Africa and internationally. Specific focus will be on the Unites States of America, Australia and the Canadian province of Ontario. Challenges of bringing a class action will also be discussed, with a view of ascertaining the most appropriate or well-suited method of bringing a class action under the Consumer Protection Act 68 of 2008. The main issue that will be analysed will be the certification process. The key question to be answered is which approach or procedure, in dealing with the certification requirements under various jurisdictions, should South Africa adopt or incorporate into, class action procedure legislation? In chapter one I will introduce the concept of a class action as it is a relatively new concept found in South African consumer legislation. Different definitions of a class action will be discussed in context of particular statutes. I will define and highlight the purposes of a class action in South Africa and show why there is firstly, a need for such a procedure and secondly why there is a need for such procedure to be codified into legislation. In chapter two I will discuss certain important aspects of class actions. The purpose of this is to identify the main features of a class action. Ultimately, the purpose will be to discuss whether or not these features should be included in South African class actions. Chapter three will commence with the comparative perspective portion of this paper. The legislation adopted by the United States, will be discussed in chapter three followed by a discussion of the Ontario legislation in chapter four and the Australian legislation in chapter 5. The approaches that these jurisdictions have taken in respect of a class action procedure serve as a basis upon which a class action procedure for South Africa will be recommended. Chapter six will provide conclusions that have been drawn through analysis of the foreign jurisdictions’ class action procedures which will reflect the best and worst elements of a class action procedure. This is significant in determining what type of class action procedure would be best suited to South Africa. Chapter seven will highlight the current South African approach to class actions through an examination of case law and a Report by the South African Law Commission. This chapter will also analyse the short-comings in the South African approach through a critique of case law. In chapter eight of this paper I will propose an approach that South Africa should adopt with regard to a class action procedure that is best suited to South Africa’s social climate. Finally, I will conclude with a summation of the arguments presented in this paper in chapter nine.<br>Thesis (LL.M)-University of KwaZulu-Natal, Durban, 2013.
APA, Harvard, Vancouver, ISO, and other styles
40

XIAO, BO-XIAN, and 蕭博先. "A Monitoring Cycle-based Fast Link Failure Protection Scheme for Fibbing Controlled IP Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/83fvyc.

Full text
Abstract:
碩士<br>國立中正大學<br>通訊工程研究所<br>107<br>Fibbing is a new network technology which enables flexible routing in IP networks. In a Fibbing network, the network controller cleverly broadcasts OSPF Link State Advertisements (LSAs) into the network to generate some fake nodes. Those fake nodes change the topology viewed by the routers so as to steer traffic in the network. As a result, the shortest path routing constraint in IP networks is relaxed. Although Fibbing networks own the capability of flexible routing, how to achieve fast failure recovery is not well addressed. Conventionally an IP network running OSPF takes a long time to converge after a failure occurs. To speed up failover, IETF has proposed Loop-Free Alternative (LFA) IP fast reroute (IPFRR). However, we discover that LFA is not compatible with Fibbing. Directly applying LFA would result in traffic loops in a Fibbing network. In this work, we propose a novel monitoring cycle-based approach for fast failure recovery. By examining the liveness of the monitoring cycles, the system controller can promptly identify the failure link followed by performing traffic reroute. Due to the routing constraint, any monitoring cycle in an IP network has to be a simple cycle. We prove that any Fibbing network with connectivity degree larger than or equal to 2-vertex and 3-edge (2V-3E) connectivity is eligible for deploying monitoring cycles to detect any single link failure. An algorithm for placing those monitoring cycles is proposed in this work. To evaluate the performance of the proposed approach, we have carried out a physical testbed network. The experimental results show that the proposed system can recover from any single link failure within 50 msec. The simulation uses GNS3 to simulate a larger topology to test whether the system can detect the fault link in a larger topology.
APA, Harvard, Vancouver, ISO, and other styles
41

McEwan, Alexandra Broughton. "The concept of violence: a proposed framework for the study of animal protection law and policy." Phd thesis, 2016. http://hdl.handle.net/1885/112649.

Full text
Abstract:
This thesis provides a critical framework and a set of methodological tools for analysing animal protection law and policy issues. These tools support the generation of law reform strategies that are responsive to the social and economic conditions of the 21st century. The thesis adopts Australia’s animal protection regime as a case example. Within this field of legal discourse, animal protection is defined according to an operative opposition between ‘animal cruelty’ and ‘animal welfare’. While, as discrete concepts, animal cruelty and animal welfare (hereafter cruelty-welfare) may be important and useful, the cruelty-welfare opposition not only structures the field, but underlies a classificatory dynamic by which the relations of power that maintain the status quo are reproduced. Such circumstances constitute what French sociologist and anthropologist Pierre Bourdieu refers to as ‘symbolic violence’. The recognition of these dynamics, and the apparent intractability of the status quo, suggests that a new analytical pathway is needed. It is against this background that the thesis tests whether violence offers a useful alternative frame of analysis. The response to the thesis question is developed using a cross-disciplinary method that combines legal analysis with aspects of political philosophy and anthropological theory. It develops and applies a method within a framework by which animal protection law is understood in terms of symbolic violence. It adopts Bourdieu’s method for the analysis of a ‘field’ and his concept of ‘habitus’ and combines these methodological tools with political philosopher Giorgio Agamben’s notion of the anthropological machine. It also draws on Alan Norrie’s arguments about legal individualism under the influence of neoliberalism. Australia’s animal protection regime is reconfigured as a Bourdieusian field. The analysis of habitus is informed by a notion of interdependence based on Agamben’s anthropological machine. It is via this unique combination of Bourdieu’s analytical tools and Agamben’s notion of the anthropological machine, along with insights about legal individualism drawn from Alan Norrie’s work, that the concept of violence is extended beyond its use by other animal protection legal theorists. The methodology supports the generation of law reform strategies and provides fresh insights as to why effective law reform in the area of animal protection law is so difficult. The notion of the anthropological machine is used to reconfigure the classificatory dynamics that take place at the human-animal boundary, within animal protection as an area of criminal law. It focuses on the necessity test that lies at the heart of the offence of animal cruelty, and how the classificatory dynamics that underlie the cruelty-welfare opposition have implications not only for animal cruelty defendants but for other marginalised participants within this field. It is in this vein that, in its deployment of the concept of violence, the thesis situates the interests of animals and humans within the animal protection field as interdependent, rather than parallel, realms of inquiry. Construing Agamben in this way facilitates the extension of Bourdieu’s concept of field to the circumstances of animal use in the 21st century. The methodology outlined above is tested in three case studies, presented as a triptych: 1. Whistleblowing in the interests of animal protection within the pork industry; 2. A critique of Queensland’s new ‘serious animal cruelty’ offence; and 3. The potential and limits of law reform relating to animal use industries in Australia, using the greyhound racing industry as a case example.
APA, Harvard, Vancouver, ISO, and other styles
42

WENG, CHIA-WEI, and 翁加偉. "Organization Impact of the Personal Information Protection Act and a Proposed Solution – the Case of University “S”." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/nkzn44.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊管理學系在職專班<br>102<br>The official announcement and implementation of the “Personal Information Protection Act” has propelled the privacy protection issue in Taiwan into a new era. Recently, frequent occurrence of information security leaks and data privacy violation events has awakened public awareness concerning this issue. Personal information leakage is likely to happen under circumstances without comprehensive information security protection mechanisms and personal information protection measures in place. Especially after the implementation of the “Personal Information Protection Act,” personal information leakage incidents will not only impact the image of the organization but also result in legal liabilities and severe damage compensation. Having already acquired information security management ISO 27001 annual certification through a third party, University “S” is covered with a comprehensive information security protection base. However, the university is still faced with the impact of “Personal Information Protection Act” and the related requests from the Ministry of Education. It must further examine the existing information security system from the viewpoint of personal information protection to reduce the legal impact and strengthen security measures to protect personal information. This study aims to provide a solution for the university facing such a problem. First, a review of relevant literature concerning the “Personal information Protection Act,” information security, and protection of personal information is conducted. Second, it seeks to understand the current status of the university through examining the information security measures and information assets. Third, it analyzes the legal impact and issues faced by the university in accordance with the “Personal Information Protection Act,” Personal Information Protection Act Enforcement Rules, and the use of personal information life cycle. Finally, based on the Personal Information Protection Act and Information Security Management System (ISMS) implemented by the school, this study also adopts the BS 10012 Personal Information Management System (PIMS) and PDCA viewpoints, it proposes a set of actions in response to the impact of the Personal Information Protection Act. Detail implementation steps are also outlined. We adopt the top-down improvement method to improve personal information protection in depth and breadth, reduce the risk of violating Personal Information Protection Act, and achieve the purpose of protecting personal information by expanding the existing security system of the university.
APA, Harvard, Vancouver, ISO, and other styles
43

Crozier, G. "Riparian protection and community attitudes to a proposed linear park and recreational trail along Sandy Bay Rivulet." Thesis, 2007. https://eprints.utas.edu.au/6017/1/Crozier.pdf.

Full text
Abstract:
This thesis investigates community response to a draft proposal of a linear park and recreational trail in the middle section of the Sandy Bay Rivulet, and reviews the associated planning structures and processes involved in riparian zone management and open space planning. Two hundred and sixty surveys were letter dropped to local residents outlining the proposed Sandy Bay Rivulet linear park and asking for their opinion. Seventy-two survey responses were received (28%). The research indicated that 85% of the residents support the proposed Sandy Bay Linear Park, 8% were against it and 7% were unsure. The community survey also yielded a number of recommendations. These reflect local resident's perception to land use, public access and general management of the Sandy Bay Rivulet. In reviewing the legislation, planning and management framework of the riparian zone along the Sandy Bay Rivulet it was found that the management of the rivulet is chiefly under the local Hobart Planning Scheme 1982, and in light of the Hobart Open Space Landscape Strategy, 1994 and the Hobart Open Space Study, 1997- volumes 1 & 2. In most cases riparian setbacks are 1 0 m from the top of the bank. There is a general trend to widening and strengthening of the riparian zone over time, particularly with zoned bushland areas. Management by Hobart City Council is still often through development control rather than ownership. The Tasmanian Resource Planning and Development System was outlined together with State Environmental Best Practice Guidelines for managing riparian vegetation. Several management themes were covered including: a review of past reports, plans and studies, private land conservation and water management. Recently the importance of riparian reserves has received further development through .the focus on issues of water management and biodiversity conservation. The need to have adequate protection of riparian land is increasingly considered as best management practice. This may include urban, rural, and protected areas landscapes, and often involving the upper catchment The potential to utilize waterside reserves as part of recreational open space networks; continues to evolve in landscape design and planning.
APA, Harvard, Vancouver, ISO, and other styles
44

Santos, Bárbara Magalhães. "Proposed solution for the non-performing loans in the portuguese banking system." Master's thesis, 2018. http://hdl.handle.net/10362/36543.

Full text
Abstract:
This paper aims to propose a solution for the current problem of Non-Performing Loans (NPLs) in the Portuguese banking system. The analysis starts with an overview of the theoretical responses to an overall NPL problem. This is followed by a description of the relevant events in the last decade within the Portuguese banking system and of the solution currently being studied by the Portuguese government. The paper concludes that the solution has severe flaws, and proposes an alternative solution that consists on a centralized asset management company.
APA, Harvard, Vancouver, ISO, and other styles
45

Abdullahi, Abdirahman. "Investigation of immune quiescence: assessing the role of regulatory T cells and their link with IRF-1 in HIV-exposed sero-negative individuals." 2017. http://hdl.handle.net/1993/31977.

Full text
Abstract:
Recent research of a cohort of HIV exposed sero-negative (HESN) female commercial sex workers in Nairobi has revealed an Immune Quiescent phenotype; characterized by reduced T cell activation and higher regulatory T cells (Tregs) in peripheral blood. HESN women also express lower levels of interferon regulatory factor-1 (IRF-1), a critical regulator known to negatively impact Treg development in mice. In this study, we analyzed the functional capacity of Tregs by an in vitro depletion assay and measured functionality by flow cytometry. Data showed Tregs suppressed CD4+ and CD8+ proliferation responses. We characterized the link between Tregs and IRF-1 in HESN and observed an inverse correlation between IRF-1 expression and Treg proportions. We also established reduced expression of IRF-1 in Tregs of healthy donors by flow cytometry. In a separate study, flow cytometric analysis of high-risk sex-workers revealed that CTLA-4 expression in memory CD4+cells, not Treg frequency, was associated with HIV seroconversion.<br>February 2017
APA, Harvard, Vancouver, ISO, and other styles
46

CRUZ, Ana Elizabeth. "The future of liability of suppliers of services in the EC in light of the Commission's withdrawal of its proposed directive : harmonisation or regulatory competition?" Doctoral thesis, 1996. http://hdl.handle.net/1814/5491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Řandová, Štěpánka. "Enviromentální migranti." Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-330349.

Full text
Abstract:
in English - Environmental migrants The purpose of my thesis is to analyse both the status quo as well as the possible evolution of the policy framework of the environmental migration. The thesis is composed of five chapters, each of them dealing with different aspects of environmental migration. Chapter one is introductory and describes an overview of the historical content of environmental migration. Environmental migration is not a new phenomenon. Natural and human-made environmental disasters have caused migration of people in the past and continue to do so. This chapter addresses the linkage between environment and migration, which led to the elaboration of a typology of environmental migration. Chapter two characterises the most frequently used definitions of environmental migrants. Environmental migration has been the subject of lively debate in recent years but there is still no internationally agreed definition of environmental migrant. Chapter three examines relevant current legislation concerned to environmental migration. It discusses refugee law, statelessness, humanitarian law and human rights law. The current legal framework for dealing with the issues surrounding environmental migration is underdeveloped. Chapter four concentrates on possible proposed protection regimes. This...
APA, Harvard, Vancouver, ISO, and other styles
48

CHANG, YU-TAN, and 張又丹. "A Comparative Legal Study on the Proposed Amendment of Taiwan Personal Data Protection Act – Using Hong Kong Personal Data (Privacy) Ordinance as Example." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/7ej672.

Full text
Abstract:
碩士<br>東吳大學<br>法律學系<br>105<br>With the exploration and popularization of the internet and communications technology, our life became convenient and efficient. On the other hand, it also brings lots of problems of privacy protection, and leaks of personal data are frequently reported. Because of the change of the times, the transfer of personal data is not only in a country or a specific area; it can be extended to the whole world. Therefore, the exploration of the law for personal data protection is getting particularly important. And it also raises people's concerns and disputes for this issue. From the Personal Data Protection Act in Taiwan of view, the Computer-Processed Personal Data Protection Law was formulated in 1995 but is not completed and becomes outdated. Until 2012, it’s changed to Personal Data Protection Act. However, the laws have to be modified and updated with the changes of society. The legislature in Taiwan always takes reference of the practice in other developed countries or neighboring countries to formulate laws. In order to foster the development of personal data protection laws in Taiwan, I took Hong Kong as a comparison and provide my humble opinion for amendments of Personal Data Protection Laws in the future in this research report. First of all, the first chapter is to explain the research motivation and purpose; and the next part is a brief describe of the historical development of personal data protection laws in Taiwan. The third chapter is concluding the introduction of the development of Privacy Commissioner for Personal Data (PCPD) in Hong Kong, explanation of the function of Office of the Privacy Commissioner for Personal Data, and the way that PCPD protect personal data. In chapter four, I had listed several differences of personal data protection laws between Taiwan and Hong Kong. Through the differences in former chapter, I would like to review the weak parts of Taiwan’s personal data protection laws that need to be improved, and put some of my own views in the last chapter. Key words: Personal Data Protection Act, Personal Data Ordinance, cross-border data flow, direct marketing
APA, Harvard, Vancouver, ISO, and other styles
49

Bennie, Andrew. "The relation between environmental protection and 'development' : a case study of the social dynamics iinvolved in the proposed mining at Xolobeni, Wild Coast." Thesis, 2010. http://hdl.handle.net/10539/8875.

Full text
Abstract:
This research report analyses the social dynamics involved in a proposed project to mine the sand dunes along a 22km stretch of the Wild Coast for titanium products, named the Xolobeni Heavy Minerals Sands Project. The proposal has been presented by a small Australian mining company, Mineral Commodities (MRC), and its local subsidiary, Transworld Energy and Minerals Resources (TEM), and would directly impact an area of the Wild Coast known as Mgungundlovu, situated in the Amadiba Tribal Administrative Area. It has become a highly contested process, with the affected communities ultimately rejecting the proposal. The report aims to analyse these social dynamics through the frame of ‘development’ and its relation to environmental protection. It argues that participation is central in ‘development’ and that in this case study, such participation is crucial in highlighting the centrality of subsistence livelihoods, based on local natural resources, to the people of Mgungundlovu. That is, ‘development’ options should be based on the recognition of the importance of local livelihoods in this instance, and not on their destruction for ‘development’ to occur. The report begins with a discussion of the notion of ‘development’ and adopts a critical view of it that acknowledges its socially, historically, and discursively constructed nature. It also adopts a skeptical view of ‘sustainable development’, which largely fails to analyse power relations and social inequality. It therefore proposes the discourse of environmental justice as a more suitable alternative to analysing the relationship between power, participation and ‘development’. The report presents two case studies in order to provide a comparison with the case of Xolobeni, and it then describes the local social context. Given this context, it then moves on to analyse the extent to which the environmental management regime in South Africa allowed for participation by the affected communities. Following this, it analyses the roles played by the various social actors in terms of participation, power, environment and ‘development’. The research finds that participation in ‘development’ by the affected communities was minimal, and that the process was instead driven by particular interests and broader discourses of the relation between environmental protection and ‘development’ that position the environment in opposition to ‘development’ and prioritise economic growth over the local social, cultural and environmental context. The degree of control exercised by the affected residents over the dynamics surrounding the proposed mining have therefore been minimal, and have instead been driven by institutions of the market and state, disconnected from local needs. This in turn highlights the role of power in ‘development’.
APA, Harvard, Vancouver, ISO, and other styles
50

Chinudomsub, Kittisak. "Analysis and proposed revision of the radiation protection and waste management programs as described in the Oregon State University TRIGA research reactor safety analysis report." Thesis, 1999. http://hdl.handle.net/1957/33385.

Full text
Abstract:
The Safety Analysis Report (SAR) of the Oregon State University TRIGA Research Reactor (OSTR) was prepared and used as a safety baseline for the reactor's operation since 1968. Although, in general, revision of the Safety Analysis Report of a research reactor is not a regulation requirement, it should be revised from time to time to include changes to the facility or procedures or update to current regulatory standards. The ANS 15.21 workgroup developed a draft standard format and content for safety analysis reports for research reactors. An area of this guidance, which was selected for this work's revision of OSTR-SAR, is the radiation protection program and waste management chapter. The Health Physics program of the facility was observed. The radiological data were obtained from the annual reports for more than 10 years of operation. The related data, such as meteorological data, were obtained and prepared for the analysis processes. The current federal regulation limits and recommendations were used as the references for dose assessments. The results show the OSTR has a sufficient radiation protection program not only for the facility's workers, but also for the general public, and the program is in full compliance with the federal regulations. The dose estimation shows that the workers and general public can not receive and have not received doses in excess of regulatory limits from the normal operation of the OSTR.<br>Graduation date: 2000
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!