Dissertations / Theses on the topic 'Defender Of The Crown'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Defender Of The Crown.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
McKenna, Janice Elizabeth. "Wave forces on caissons and breakwater crown walls." Thesis, Queen's University Belfast, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263464.
Full textRock, Bonnie June. "Aphrodite : defender of cities." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1208980276.
Full textGoldfarb, Neil. "The Storm Defender Consulting Project." Miami University Honors Theses / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1110918743.
Full textBarkley, Timothy R. "An attacker-defender model for IP-based networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FBarkley.pdf.
Full textThesis Advisor(s): Alderson, David L. "March 2008." Description based on title screen as viewed on April 24, 2008. Includes bibliographical references (p. 59-60). Also available in print.
Laird, Jess. "Understanding Implicit Bias in Public Defender Social Workers." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/889.
Full textWagner, Dennis A. "The defender of the bond a principle of accountability /." Theological Research Exchange Network (TREN), 2005. http://www.tren.com.
Full textDixon, Cory A. "Assessing vulnerabilities in interdependent infrastructures using attacker-defender models." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5606.
Full textOur economic and social welfare depend on certain "critical" infrastructures and key resources. Protecting these infrastructures is a challenge because they are complex, and as systems they are difficult to understand, predict and control. In addition, they do not operate in isolation, but are interdependent with other infrastructures. This presents a challenge for their modeling and analysis. Due to the complexity of modeling the operation of just a single infrastructure, most research to date has analyzed infrastructures in isolation. This thesis introduces a taxonomy of dependence relationships and incorporates these relationships into an attacker-defender model of interdependent infrastructure operation. We formulate and solve a sequence of models to illustrate how dependence relationships between infrastructures create vulnerabilities that are not apparent in single-infrastructure models, and we use the results to assess the consequences of disruptions to a system of infrastructures. We provide complete documentation for how to apply these techniques to real infrastructure problems and include a discussion of the necessary assumptions, as well as the pros and cons of our methods. Finally, we present examples of how to provide relevant, understandable results to help decision makers, such as where to make limited investments to increase resilience.
Ross, Annie Elizabeth. "Wrongful Convictions as a Result of Public Defender Representation." Digital Commons @ East Tennessee State University, 2010. https://dc.etsu.edu/etd/1761.
Full textWelch, Teresa Lynn. "The Sources and Extent of Public Defender Occupational Stress." Thesis, Nova Southeastern University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10824847.
Full textUtah public defenders (n = 96) completed a survey tool that provided data on their sources and extent of occupational stress. The data also indicated any differences in job-stressors scores, perceived stress scores, and occupational burnout scores when comparing public defenders by their demographic factors. Having too many cases is the most stressful of 35 job stressors and is moderately more stressful for female public defenders than for male public defenders, t(94) = –2.98, p = .004, d = .67. The most stressful of six job-stressor categories is structural/systemic, followed closely by prosecutors.
The PSS-10 indicated that a total of 74% of the Utah public defenders perceive themselves as having moderate or high perceived stress. In addition, female public defenders perceive themselves as experiencing more stress than do the male public defenders, t(94) = –3.53, p = .001, d = .80. ANOVA and Games-Howell post hoc indicated that public defenders aged 60 years or older experience minimally less perceived stress than do public defenders ages 30–39 and 50–59 years old, F(4,18.64) = 4.748, p = .008, η 2p = .104. The MBI-HSS indicated that Utah public defenders are experiencing moderate (inching towards higher) levels of occupational burnout. ANOVA and Tukey post hoc indicated that public defenders age 60 years or older experience minimally less emotional exhaustion than are public defenders ages 30–39 and 50–59 years old, F(4, 91) = 2.833, p = .029, η2 p = .111.
Burguera, i. Puigserver Victòria Alba. "Els perills de la mar. Pirateria, captiveri i gestió del conflicte marítim a la Corona d’Aragó (1410-1458)." Doctoral thesis, Universitat de Barcelona, 2020. http://hdl.handle.net/10803/671849.
Full textThis PhD dissertation offers a diversified picture of the management of maritime threats and conflicts in the Crown of Aragon between 1410 and 1458. The chronology covers one of the periods of the Crown’s maximum expansion in the Mediterranean: from the end of the reign of Martin the Humane, the last king of the house of Barcelona, to the death of the second king of the house Trastámara, Alfonso the Magnanimous. My research undertakes the point of view of the three most important maritime cities of the Crown: Barcelona, Valencia and Majorca. The thesis is structured in four big chapters. The first one, by way of introduction, reconstructs the origins of the connections between different management authorities and the maritime war. It analyses the role of the king in controlling privateers and his own fleet, commanded by the admiral; the role of maritime cities, and, successively, that of the Diputació and merchant corporations. The second chapter analyzes the function and composition of the royal fleet and cities’ fleet. The third one deals with the privateering war and includes its objectives, its evolution through various political circumstances and its effects. Finally, the fourth part is dedicated to captivity as a consequence of piracy. This last chapter focuses on the ransoming means linked to the economic duality capture- rescue and on the double use and profitability of human captures between Christians and Muslims.
Park, Stuart R. "Homoleptic crown cabenes." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488554.
Full textHurter, Jade. "Python Crown Girl." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2156.
Full textHendricksen, Andrew D. "The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37637.
Full textThe need for submarines to execute communications at speed and depth (CSD) is a vital link in our nations and our allies defense network. A promising method to do this without limiting the inherent stealth and advantage of submarines is to utilize Deep Seaweb, an underwater acoustic communication network. The challenge is to be able to optimally employ such a network in a constantly changing environment. In particular, our goal is to develop a network that is resilient to a given number of adversary attacks that can disable individual nodes. To this end, we build and solve a defender-attacker-defender (DAD) optimization model that provides the optimal location of repeater nodes that maintains as much of the function of the network as possible, even after a worst-case attack. We analyze four initial basic network configurations and compare the resulting optimum node placements when the network is not subject to attack, when the network is subject to two attacks, and when the flow of each network configuration is completely blocked by attacks.
Page, Wesley G. "Bark Beetle-Induced Changes to Crown Fuel Flammability and Crown Fire Potential." DigitalCommons@USU, 2014. https://digitalcommons.usu.edu/etd/2081.
Full textBabie, Paul Theodore. "Crown land in Australia." Thesis, University of Oxford, 2001. https://ora.ox.ac.uk/objects/uuid:7e3678b3-a274-468c-bbc0-ef348bb51a00.
Full textLuo, Yi. "DECISION MAKING UNDER UNCERTAINTY IN DYNAMIC MULTI-STAGE ATTACKER-DEFENDER GAMES." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/204331.
Full textKuin, Lawton Theresa H. N. "Defender of faith : is there an Anglican theology of religious pluralism?" Thesis, University of Bristol, 2011. http://hdl.handle.net/1983/6d659f45-d79e-4eae-a3c7-d9bf18856341.
Full textMöllberg, Casper, and Gustav Westerlund. "Analys av säkerhetslösningarna Cisco Secure Endpoint och Microsoft Defender for Endpoint." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54608.
Full textThis report presents a thesis about modern endpoint security solutions. Microsoft Defender for Endpoint and Cisco Secure Endpoint are two relatively new solutions compared to previous endpoint security software and only a few, if any, surveys have been published about them. The solutions are cloud-based and use machine learning combined with communication between the cloud and endpoint to find and prevent threats. The two security solutions were examined and analysed at the request of ATEA Eskilstuna with the purpose of analysing how they discover and prevent threats and evaluating resource usage. To evaluate these points, measurements were performed using Windows Performance Monitor. Simulated threats were executed on a laptop using the operating system Windows 10 to analyse how the solutions handled threats. The result suggests that Microsoft Defender for Endpoint sends and receives more data and uses more of the processor compared to Cisco Secure Endpoint. Microsoft’s security solution seemed to have little effect on the endpoint’s memory. For Cisco Secure Endpoint the result suggests that the solution had little effect on sent and received data and processor usage, but seemed to require more memory on the endpoint. However due to spikes during the measurements the results were difficult to interpret.
Lowe, John Francis. "Baldwin I of Jerusalem: Defender of the Latin Kingdom of Jerusalem." PDXScholar, 2013. https://pdxscholar.library.pdx.edu/open_access_etds/1029.
Full textEnglish, Jacob T. "A Defender-Aware Attacking Guidance Policy for the TAD Differential Game." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou160579737158944.
Full textMcGladdery, Christine Anne. "Crown-magnate relations, 1437-1460." Thesis, University of St Andrews, 1988. http://hdl.handle.net/10023/2619.
Full textSutton, Liam Richard. "Studies on functionalised crown thioethers." Thesis, University of Nottingham, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285639.
Full textNearchou, Antony. "Zeolites fit for a crown." Thesis, University of Bath, 2019. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.767594.
Full textNilsson, Christine. "Article 7 TEU : A Human Rights Defender or a Political Blind Alley?" Thesis, Uppsala universitet, Juridiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-200435.
Full textPronk, Cornelis. "F.M. Ten Hoor defender of secession principles against Abraham Kuyper's doleantie views /." Theological Research Exchange Network (TREN), 1987. http://www.tren.com.
Full textStanton, Mariana Alves. "Respostas a herbivoria em Asclepias curassavica (Apocynaceae: Asclepiadoideae) : defender, crescer ou reproduzir." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/316370.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-08-12T18:54:20Z (GMT). No. of bitstreams: 1 Stanton_MarianaAlves_M.pdf: 682844 bytes, checksum: 36b7ed46fcdc82eacc95256aae48e173 (MD5) Previous issue date: 2008
Resumo: A produção de defesas contra a herbivoria é essencial para o sucesso reprodutivo das plantas, no entanto pode ser custosa. Esses custos resultam da redução de investimento em outras partes do metabolismo, como o crescimento e a reprodução. Nesse estudo, usamos Asclepias curassavica (Apocynaceae: Asclepiadoideae) como modelo para avaliar como uma planta divide seus recursos entre crescimento, reprodução e defesas. A. curassavica é uma planta anual que possui cardenolidas como defesas. Para verificar como esta responde a herbivoria, simulamos a mesma através de dano artificial (DA) e medimos crescimento (biomassa de folhas e raízes) e reprodução (número de flores, frutos e sementes e biomassa de sementes) em um experimento em longo prazo. Em um experimento em curto prazo, medimos a produção de defesas (concentração de cardenolidas), para avaliar se estas podem estar interferindo no crescimento e reprodução desta espécie. Correlacionamos também, em uma população natural, a concentração de cardenolidas com a percentagem de herbivoria foliar. O hormônio jasmonato de metila (JM) é usado para induzir compostos do metabolismo secundário em plantas, sem o custo adicional da remoção de tecido fotossinteticamente ativo causada por dano artificial ou natural. Usamos esse composto em ambos os desenhos experimentais acima ao invés de remoção da área foliar para avaliar se havia indução de cardenolidas e seu efeito sobre o crescimento e reprodução de A. curassavica. Nossos resultados demonstraram uma redução significativa do número total de frutos, sementes e da massa final de raízes em plantas com tratamento de DA em longo prazo. O crescimento do tratamento DA não diferiu do controle, sugerindo crescimento compensatório das folhas à custa do investimento em raízes e em reprodução. Os custos reprodutivos e de crescimento de raízes detectados no experimento de longo prazo podem resultar da diminuição da capacidade fotossintética em plantas danificadas e investimento simultâneo em crescimento compensatório das folhas. No experimento de curto prazo, não houve alteração da razão de indução de cardenolidas sugerindo que o dano artificial não induz defesas nessa espécie. A ausência de correlação entre cardenolidas e porcentagem de dano natural em plantas coletadas em campo pode sugerir dois cenários excludentes: 1. a indução de cardenolidas não seria importante para a defesa de A. curassavica, ou 2. a ausência de correlação, associada a baixa percentagem de herbivoria implicaria em uma defesa constitutiva eficaz contra herbívoros. O tratamento com JM a longo prazo também mostrou uma tendência à redução do crescimento de raízes e redução significativa da biomassa e porcentagem de germinação de sementes. Nas plantas tratadas com JM a curto prazo, houve um aumento significativo de cardenolidas tardio (384 h após tratamento) sugerindo que estas podem contribuir para a redução de aptidão observada no experimento de longo prazo e que existem custos da produção das mesmas. Dano artificial leva à diminuição da aptidão, através de desvio de investimento em raízes para o crescimento compensatório das folhas. No caso do jasmonato, não houve perda de massa fotossinteticamente ativa (folhas) e a redução do crescimento de raízes pode ser resultado de um efeito direto do tratamento de JM ou indireto causado pela indução de outras partes do metabolismo (p.ex. metabolismo secundário) causada por esse fitohormônio. Experimentos futuros devem comparar os presentes resultados com dano real por um dos herbívoros especialistas para avaliar a eficácia do dano artificial em induzir cardenolidas e o papel dessa indução sobre outras partes do metabolismo da mesma
Abstract: Although the investment in defensive traits against herbivory is essential to the reproductive success of plants, it may be costly. These costs result from reduced investment in other metabolic functions such as growth and reproduction. In the present study, we used the milkweed Asclepias curassavica (Apocynaceae: Asclepiadoideae) as a model to study how a plant divides its resources between growth, reproduction and defense. A. curassavica is an annual weed that uses cardenolides as defenses against herbivory. To evaluate how Asclepias curassavica responds to herbivores, we simulated herbivory by artificial damage (AD) and measured growth (leaf and root biomass) and reproduction (number of flowers, fruit and seeds and seed biomass) in a long term experiment. We also measured defensive traits (cardenolide concentration) in a short term experiment to verify whether there is an investment in defense that may interfere with growth and reproduction. We also correlated cardenolide concentration in a natural population with percent leaf damage. As the plant hormone, methyl jasmonate (MJ) is commonly used to induce secondary metabolism in plants without the additional costs of tissue removal, we used this compound in the same experimental designs instead of AD. Our results from the long term AD treatment showed a significant decrease in final root biomass and in total fruit set and seed number. Plants from the AD treatment did not differ from controls in leaf growth, suggesting that there was a compensatory growth in the former at the expense of root growth. The reproductive and growth costs detected in this experiment may result from reduced photosynthetic capacity in damaged plants and concomitant compensatory leaf growth. In the short term, we found no induction of cardenolides compared to controls, suggesting that artificial damage does not induce defenses. The lack of correlation between cardenolides and percentage leaf damage in plants collected from a natural population suggest two self-excluding scenarios: 1. the induction of cardenolides is not important for the defense of A. curassavica, or 2. the lack of correlation, coupled with low herbivore damage, suggests that this plant has an efficient constitutive defense against herbivores. The long term MJ treatment showed a trend in reduced root biomass and significantly reduced seed biomass and percentage germination. In the short term MJ treatment we found a significant increase in cardenolide concentration (after 384 h) suggesting that the production of these defenses is costly and this may have contributed to observed costs in the long term experiment. Apparently, the artificial damage treatment leads to reduced fitness through reduced root growth which is a consequence of compensatory leaf growth. In the methyl jasmonate treatment, there was no removal of photosythetically active tissue (leaves) and the reduced root growth may be a direct effect of this phytohormone or an indirect effect caused by the induction of other metabolic pathways (such as secondary metabolism) caused by this hormone. Future experiments should compare the present results with natural damage by specialist herbivores to evaluate the efficiency of artificial damage in inducing cardenolides and the role of the induction of these substances on other metabolic functions
Mestrado
Mestre em Ecologia
Phillips, Matthew. "Church, crown and complaint : petitions from bishops to the English crown in the fourteenth century." Thesis, University of Nottingham, 2013. http://eprints.nottingham.ac.uk/13805/.
Full textVILARDI, LEONARDO OSTWALD. "FUNCTIONAL REPRESENTATION AND PUBLIC DEFENDER S OFFICE: A STUDY OF THE PUBLIC CIVIL ACTIONS PROPOSED BY THE PUBLIC DEFENDER S OFFICES OF MINAS GERAIS, RIO DE JANEIRO AND SÃO PAULO." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2017. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=32675@1.
Full textCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE SUPORTE À PÓS-GRADUAÇÃO DE INSTS. DE ENSINO
A Constituição da República de 1988 consolidou uma ampla gama de direitos fundamentais, juntamente com uma arquitetura institucional que buscou dar concretude a esses direitos, através de instrumentos jurídicos processuais que legitimaram a propositura de demandas sobre direitos difusos e coletivos, fortalecendo o poder judiciário e a representação funcional. Destaca-se nessa arquitetura o papel das Ações Civis Públicas (ACPs), com a legitimação da sociedade civil para realizar a propositura de tal ação. Entretanto, junto à sociedade instituiu-se outro ator capaz de mobilizar tais instrumentos em defesa da sociedade e dos princípios democráticos, o Ministério Público (MP). Neste cenário, é que a Defensoria Pública, instituição inicialmente integrante do poder executivo e com atribuição de representar em juízo parcelas subalternas da população, conseguiu adquirir autonomia funcional e administrativa. A mobilização da Defensoria promoveu desdobramentos no âmbito interno e externo de tal instituição. No âmbito externo, destaca-se a possibilidade de propor Ação Civil Pública. Dessa forma, a questão-problema que se coloca para a pesquisa é: Como a Defensoria Pública vem exercendo a prerrogativa de tutelar direitos difusos e coletivos? Frente a isso, assume-se como objetivo geral mapear todas as ACPs propostas pelas Defensorias Públicas de Minas Gerias (DPMG), Rio de Janeiro (DPRJ) e São Paulo (DPESP) nos últimos 5 anos. Desdobram-se como objetivos específicos: mapear as ACPs propostas nos últimos cincos anos nos estados pesquisados; descrever a evolução institucional dos órgão estudados; compreender a opção da CF/88 pelo acesso à justiça pela mão do estado; e realizar uma análise crítica do conceito de representação funcional. Tal caminho possibilitou uma reflexão crítica acerca da expansão da representação funcional e da judiciliazação em nosso país que, até o momento, não conheceu limites.
The Republican Constitution of 1988 consolidated a wide range of fundamental rights, alongside an institutional architecture which aimed to materialize such rights, through judicial process instruments that legitimized the proposal of demands regarding diffuse and collective rights, strengthening the judicial power and the functional representation. Within this architecture, the role of the Public Civil Actions (ACPs, in Portuguese) can be highlighted, with the legitimacy of civil society to realize such proposed action. However, within society it was instituted another actor capable of mobilizing such instruments in defense of society and democratic principles, the Public Ministry (MP, in Portuguese). In this scenario, the Public Defense, an institution that at first was part of the executive branch with the task of representing in court the lower classes of population, managed to gain functional and administrative autonomy. The mobilization of the Public Defense promoted outcomes within and outside such institution. In the external realm, we highlight the possibility of proposing a Public Civilian Action. Therefore, the guiding question of this research is: How has the Public Defense been exercising the prerogative of tutelage of diffuse and collective rights? As such, we take as a main goal to map all the ACPs proposed by the Public Defense of Minas Gerais (DPMG, in Portuguese), Rio de Janeiro (DPRJ) and São Paulo (DPSP) in the last 5 years. The specific goals unfold in: mapping the ACPs proposed in the last five years in the researched states; describing the institutional evolution of the studied organs; comprehending the option made by the Constitution of 1988 of access to justice by the hand of the state; and conducting a critical analysis of the concept of functional representation. Such path made it possible to reflect critically regarding the expansion of functional representation as well as about the judicialization of our country, which has known to boundaries so far.
Peterson, John A. "Warren Stone Snow, a man in between : the bibliography of a Mormon defender /." Diss., CLICK HERE for online access, 1985. http://patriot.lib.byu.edu/u?/MTNZ,10570.
Full textPeterson, John A. "Warren Stone Snow, A Man in Between: The Biography of a Mormon Defender." BYU ScholarsArchive, 1985. https://scholarsarchive.byu.edu/etd/5042.
Full textGaspar, Luis Miguel Guerreiro Galla. "The Crown Jewel gold skarn deposit." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Dissertations/Summer2005/l%5Fgaspar%5F072805.pdf.
Full textBrash, Benjamin. "Distortions of Press Quenched Crown Wheels." Thesis, KTH, Materialvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170022.
Full textCollie, Luke E. "Lithium transport in crown ether polymers." Thesis, Durham University, 1995. http://etheses.dur.ac.uk/5196/.
Full textOwens, K. A. "Polycyclic crown ethers incorporating cyclophane units." Thesis, University of Liverpool, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370864.
Full textWilson, Mark James. "Activity relationships for aromatic crown ethers." Thesis, University of Strathclyde, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.249872.
Full textSides, Jonathan Drapala. "Low Frequency Modeling and Experimental Validation of Passive Noise Attenuation in Ear Defenders." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/10072.
Full textMaster of Science
Werner, Aaron John. "Defender of divine revelation Timothy Dwight's arguments for the Bible's authenticity and divine inspiration /." Louisville, KY : Southern Baptist Theological Seminary, 2007. http://dx.doi.org/10.2986/tren.115-0001.
Full textIncludes vita. This dissertation examines Timothy Dwight's (1752-1817) arguments for the Bible's authenticity with the purpose of determining if his arguments are theologically orthodox, logically sound, and factually accurate. Chapter 1 introduces this dissertation's thesis, research problem, methodology, and its limitations. Attention is given to Timothy Dwight's theological milieu and the reasons he felt compelled to defend the Bible's authenticity in a Christian nation. Chapter 2 examines Dwight's arguments for the necessity of special revelation. He thought that readers would not find his arguments for the Bible's authenticity compelling unless they first were convinced that a revelation is necessary. Hence, according to Dwight, his entire case depends on the validity of this particular argument. After outlining Dwight's defense, this chapter attempts determine if it is theologically orthodox, logically sound, and factually accurate. Chapter 3 presents Dwight's arguments for the authenticity of the Old Testament. After outlining his contention, this chapter scrutinizes its content to determine if it is theologically orthodox, logically sound, and factually accurate. Chapter 4 presents Dwight's argument for the authenticity of the New Testament. After outlining his line of reasoning, this chapter analyzes its content to determine if it is theologically orthodox, logically sound, and factually accurate. Chapter 5 summarizes this dissertation, which concludes that Dwight's arguments for the Bible's authenticity are theologically orthodox, factually accurate, and--with a few exceptions--logically sound. This chapter also suggests areas for future research. Description based on Print version record. Includes bibliographical references (leaves 288-298).
Smith, Madeleine. "Dissecting the dark defender : approaching vigilantism in American history, society and culture through Dexter." Thesis, University of Hull, 2015. http://hydra.hull.ac.uk/resources/hull:13605.
Full textRotman, Leonard Ian. "Duty, the honour of the Crown, and uberrima fides, fiduciary doctrine and the crown-native relationship in Canada." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1993. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/MQ39228.pdf.
Full textFahlgren, Anna. "Defence capabilities of human intestinal epithelial cells." Doctoral thesis, Umeå : Univ, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-151.
Full textAgenter, Michael Kelly. "Influence of tooth crown size on malocclusion." View the abstract Download the full-text PDF version (on campus access only), 2008. http://etd.utmem.edu/ABSTRACTS/2008-001-Agenter-index.html.
Full textTitle from title page screen (viewed on March 4, 2008 ). Research advisor: Edward Harris, Ph.D. Document formatted into pages (xvii, 192 p. : ill.). Vita. Abstract. Includes bibliographical references (p. 155-166).
Wang, Yingping. "Crown structure, radiation absorption, photosynthesis and transpiration." Thesis, University of Edinburgh, 1988. http://webex.lib.ed.ac.uk/homes/wang88.html.
Full textMoreira, navarro Luis. "Supramolecular crown ether containing donor-acceptor ensembles." Thesis, Strasbourg, 2013. http://www.theses.fr/2013STRAF060.
Full textIn order to gain a better understanding of the key step of the photosynthetic system (formation of a charged separated stated), a series of new supramolecular crown ether containing donnor-aceptor ensembles have been obtained.Notably we have gained further insight in the nature of π-π stacking between C60 and porphyrins (arising from a process mainly governed by van der Waals forces) and the affinity of crown ethers towards fullerenes(arising from an interplay of π-π, n-π and CH-π interactions). The properties of porphyrin arrays have been explored, evidencing the electronic communication through subunits. Finally, the chelate cooperativity of one our systems has also been assessed through the effective molarity
Rodenhouse, Randall Alan. "Liquid crystal polymers containing crown ether ligands." Case Western Reserve University School of Graduate Studies / OhioLINK, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=case1055364243.
Full textMäsiarová, Jana. "Exchange Rate Modelling - Parities and Czech Crown." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17469.
Full textDenike, John Kane Carleton University Dissertation Chemistry. "The synthesis and complexation of bis-crown ethers and polymers bearing pendant crown ethers and the study of molecular motion of crown ethers in solids using solid state 2H NMR." Ottawa, 1992.
Find full textCarbaugh, Eric Douglas. "A comparison of crown attributes for six genotypes on Pinus taeda as affected by site and management intensity." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/56963.
Full textMaster of Science
Peng, Peng. "A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/96401.
Full textMaster of Science
Phishing attack is the fraudulent attempt to lure the target users to give away sensitive information such as usernames, passwords and credit card details. Cybercriminals usually build phishing websites (mimicking a trustworthy entity), and trick users to reveal important credentials. However, the data flow of phishing process is still unclear. From attackers' per- spective, we want to know how attackers collect the sensitive information stolen by phishing websites. On the other hand, from defenders' perspective, we are trying to figure out how online scan engines (e.g., VirusTotal) detect phishing URLs and how reliable their detection results are. In this thesis, we perform an empirical measurement to help answer the two questions above. By monitoring and analyzing a large number of real-world phishing websites, we draw a clear picture of the credential sharing process during phishing attacks. Also, by building our own phishing websites and submitting to VirusTotal for scanning, we find that more rigorous methodologies to use VirusTotal labels are desperately needed.
Sliesarieva, Anna. "The Defender vs. the Censor: CDA Analysis of 2017 Russian Web-Source Ban in Ukraine." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414735.
Full textShin, Eunkyung. "Predictors of Bystander and Defender Behaviors in Bullying: Maternal Reactions to Child Emotion and Empathy in the United States and South Korea." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98789.
Full textDoctor of Philosophy
More than one out of five students in the United States and more than one out of ten students in South Korea experience bullying. The detrimental effects of bullying can affect not only victims and bullies but also classmates who witness the bullying. I examined factors that related to bystander behavior (ignoring or staying away from bullying) and defender behavior (helping the victim or actively endeavoring to stop bullying) in bullying to help in efforts to stop bullying. Because positive emotional experiences with mothers can help children develop empathy and empathy tends to elicit helping behavior, I examined how mothers' reactions to their children's negative emotions were related to children's bystander behavior and defender behavior through their empathic abilities. However, research and theories on bullying has been predominantly focused on Western populations. My study addressed this gap, examining cultural differences in the relations between the United States and South Korea to bring attention to the role of culture in parents' emotional socialization and children's development. Results from this study will help schools and communities to provide culturally sensitive bullying intervention programs with parents. Children (10-12 years old) and their mothers in the United States (n=165) and South Korea (n=158) participated in an online survey. Mothers were asked about ways that they react to their children's negative emotions. Mothers' unsupportive reactions refer to minimization, distress and punitive reactions when their children express negative emotions. Mothers' supportive reactions mean maternal comforting, acknowledgement, and encouragement of children's negative emotions. In the online survey, children reported on their empathy and reactions when they witness bullying. Cultural differences in the relations were confirmed. American children were more likely to help the victim when their mothers supported their negative emotions. For Korean children, mothers' supportive reactions were related to their defender behavior through their empathic concern. However, in both countries, the more mothers displayed supportive reactions, the more children reported empathic concern; children's empathic concern was an important bridge between maternal unsupportive reactions and bystander behavior.