To see the other types of publications on this topic, follow the link: Defender Of The Crown.

Dissertations / Theses on the topic 'Defender Of The Crown'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Defender Of The Crown.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

McKenna, Janice Elizabeth. "Wave forces on caissons and breakwater crown walls." Thesis, Queen's University Belfast, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rock, Bonnie June. "Aphrodite : defender of cities." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1208980276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goldfarb, Neil. "The Storm Defender Consulting Project." Miami University Honors Theses / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1110918743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barkley, Timothy R. "An attacker-defender model for IP-based networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FBarkley.pdf.

Full text
Abstract:
Thesis (M.S. in Operations Analysis)--Naval Postgraduate School, March 2008.
Thesis Advisor(s): Alderson, David L. "March 2008." Description based on title screen as viewed on April 24, 2008. Includes bibliographical references (p. 59-60). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Laird, Jess. "Understanding Implicit Bias in Public Defender Social Workers." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/889.

Full text
Abstract:
Research has demonstrated that implicit bias is an inescapable part of the human experience that can have harmful repercussions. Its effects can be seen particularly in the criminal justice system where those of marginalized groups are disproportionately represented. Social workers in the public defender’s office representing indigent clients in the criminal justice system, implicit bias can negatively impact client outcomes or service access. This study sought to explore how these social workers understand implicit bias in their work and will be conducted using qualitative analysis through the use of interviews and document review. This research found that social workers in this setting identify in ways that are very different from their clients and view the resulting implicit bias as an important hurdle to overcome. Social workers reported that working with clients who are similar to them can increase rapport but also introduce issues of countertransference. When working with clients who are different from them, social workers found it most challenging to serve clients with worldviews they found personally offensive, such as homophobia or white supremacy. Social workers of more privileged identities found ways to leverage this advantage to best serve their clients. The participants in this study had mixed feelings on whether or not differences in identity between social workers and clients increase implicit bias or impact client outcomes. There are many larger factors that increase the risk of implicit bias, which participants feel can be mitigated with training and more diverse teams.
APA, Harvard, Vancouver, ISO, and other styles
6

Wagner, Dennis A. "The defender of the bond a principle of accountability /." Theological Research Exchange Network (TREN), 2005. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dixon, Cory A. "Assessing vulnerabilities in interdependent infrastructures using attacker-defender models." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5606.

Full text
Abstract:
Approved for public release; distribution is unlimited
Our economic and social welfare depend on certain "critical" infrastructures and key resources. Protecting these infrastructures is a challenge because they are complex, and as systems they are difficult to understand, predict and control. In addition, they do not operate in isolation, but are interdependent with other infrastructures. This presents a challenge for their modeling and analysis. Due to the complexity of modeling the operation of just a single infrastructure, most research to date has analyzed infrastructures in isolation. This thesis introduces a taxonomy of dependence relationships and incorporates these relationships into an attacker-defender model of interdependent infrastructure operation. We formulate and solve a sequence of models to illustrate how dependence relationships between infrastructures create vulnerabilities that are not apparent in single-infrastructure models, and we use the results to assess the consequences of disruptions to a system of infrastructures. We provide complete documentation for how to apply these techniques to real infrastructure problems and include a discussion of the necessary assumptions, as well as the pros and cons of our methods. Finally, we present examples of how to provide relevant, understandable results to help decision makers, such as where to make limited investments to increase resilience.
APA, Harvard, Vancouver, ISO, and other styles
8

Ross, Annie Elizabeth. "Wrongful Convictions as a Result of Public Defender Representation." Digital Commons @ East Tennessee State University, 2010. https://dc.etsu.edu/etd/1761.

Full text
Abstract:
Our criminal justice system works very hard to prevent criminals from harming other individuals; however, unfortunately mistakes happen. One wrongful conviction is one too many. There are multiple factors that can be assumed to be the cause of wrongful convictions. However, due to the lack of directly related research, the determents are not well established. The following research addresses wrongful convictions as a result of public defender representation. Through the process of theory construction, the research uses critical race theory and social disorganization theory to show the relationship between court appointed representation and wrongful convictions. A new theory is also established that is referred to as the partial load reduction theory. This theory establishes the relationship that exists between wrongful convictions and public defender representation and provides solutions as well as new avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
9

Welch, Teresa Lynn. "The Sources and Extent of Public Defender Occupational Stress." Thesis, Nova Southeastern University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10824847.

Full text
Abstract:

Utah public defenders (n = 96) completed a survey tool that provided data on their sources and extent of occupational stress. The data also indicated any differences in job-stressors scores, perceived stress scores, and occupational burnout scores when comparing public defenders by their demographic factors. Having too many cases is the most stressful of 35 job stressors and is moderately more stressful for female public defenders than for male public defenders, t(94) = –2.98, p = .004, d = .67. The most stressful of six job-stressor categories is structural/systemic, followed closely by prosecutors.

The PSS-10 indicated that a total of 74% of the Utah public defenders perceive themselves as having moderate or high perceived stress. In addition, female public defenders perceive themselves as experiencing more stress than do the male public defenders, t(94) = –3.53, p = .001, d = .80. ANOVA and Games-Howell post hoc indicated that public defenders aged 60 years or older experience minimally less perceived stress than do public defenders ages 30–39 and 50–59 years old, F(4,18.64) = 4.748, p = .008, η 2p = .104. The MBI-HSS indicated that Utah public defenders are experiencing moderate (inching towards higher) levels of occupational burnout. ANOVA and Tukey post hoc indicated that public defenders age 60 years or older experience minimally less emotional exhaustion than are public defenders ages 30–39 and 50–59 years old, F(4, 91) = 2.833, p = .029, η2 p = .111.

APA, Harvard, Vancouver, ISO, and other styles
10

Burguera, i. Puigserver Victòria Alba. "Els perills de la mar. Pirateria, captiveri i gestió del conflicte marítim a la Corona d’Aragó (1410-1458)." Doctoral thesis, Universitat de Barcelona, 2020. http://hdl.handle.net/10803/671849.

Full text
Abstract:
La tesi pretén delinear un quadre diversificat de la gestió dels perills de la mar, del conflicte marítim a la Corona d’Aragó entre 1410 i 1458. La cronologia comprèn un dels períodes de la seva màxima expansió en el Mediterrani: des del final del regnat de l’últim rei de la casa de Barcelona, Martí l’Humà, a la mort del segon rei de la dinastia Trastàmara, Alfons el Magnànim. La recerca s’emprèn a partir del punt de vista privilegiat de les tres principals ciutats marítimes de la Corona: Barcelona, València i Mallorca. L’estructura de la tesi s’articula en quatre grans blocs o capítols. El primer, de caràcter introductori, reconstrueix els orígens de la relació entre els diversos òrgans de poder i la guerra marítima: el paper del rei, a través del control dels armaments privats i de la seva pròpia flota, comandada per l’almirall; el de les ciutats marítimes i, successivament, el de la Diputació i el de les corporacions de mercaders. El segon capítol analitza les funcions i la composició de la flota reial i de les flotes ciutadanes. El tercer, versa sobre la guerra de cors privada: els seus objectius, la seva evolució durant les diverses conjuntures polítiques i els seus resultats. Finalment, el quart està dedicat a la captivitat com a conseqüència de la pirateria, específicament als mitjans de redempció lligats al binomi econòmic captura-rescat i al doble ús i rendibilitat de les captures humanes entre cristians i musulmans. La guerra de cors, la pirateria i la guerra marítima en general, com a parts d’un mateix prisma triangular, representaren activitats econòmiques fortament influenciades per les decisions polítiques i els ritmes de la diplomàcia internacional, que, com a conseqüència, comportaren importants repercussions socials. Els mecanismes ofensivo-defensius, les actituds i les respostes conjunturals identificades a les mars durant els regnats dels dos primers Trastàmara marcarien el precedent de futures actuacions en una època molt més convulsa en el camp marítim i naval, mentre que, a la vegada, serien exclusivament representatives d’una realitat política, administrativa i conceptual en vies de desaparició.
This PhD dissertation offers a diversified picture of the management of maritime threats and conflicts in the Crown of Aragon between 1410 and 1458. The chronology covers one of the periods of the Crown’s maximum expansion in the Mediterranean: from the end of the reign of Martin the Humane, the last king of the house of Barcelona, to the death of the second king of the house Trastámara, Alfonso the Magnanimous. My research undertakes the point of view of the three most important maritime cities of the Crown: Barcelona, Valencia and Majorca. The thesis is structured in four big chapters. The first one, by way of introduction, reconstructs the origins of the connections between different management authorities and the maritime war. It analyses the role of the king in controlling privateers and his own fleet, commanded by the admiral; the role of maritime cities, and, successively, that of the Diputació and merchant corporations. The second chapter analyzes the function and composition of the royal fleet and cities’ fleet. The third one deals with the privateering war and includes its objectives, its evolution through various political circumstances and its effects. Finally, the fourth part is dedicated to captivity as a consequence of piracy. This last chapter focuses on the ransoming means linked to the economic duality capture- rescue and on the double use and profitability of human captures between Christians and Muslims.
APA, Harvard, Vancouver, ISO, and other styles
11

Park, Stuart R. "Homoleptic crown cabenes." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488554.

Full text
Abstract:
Despite the resurgence of research on N-heterocyclic carbene ligands there has been a dearth of multi-dentate macrocyclic ligands of this class reported. Herein we report the synthesis and characterisation of a tetradentate macrocyclic ligand.
APA, Harvard, Vancouver, ISO, and other styles
12

Hurter, Jade. "Python Crown Girl." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hendricksen, Andrew D. "The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37637.

Full text
Abstract:
Approved for public release; distribution is unlimited
The need for submarines to execute communications at speed and depth (CSD) is a vital link in our nations and our allies defense network. A promising method to do this without limiting the inherent stealth and advantage of submarines is to utilize Deep Seaweb, an underwater acoustic communication network. The challenge is to be able to optimally employ such a network in a constantly changing environment. In particular, our goal is to develop a network that is resilient to a given number of adversary attacks that can disable individual nodes. To this end, we build and solve a defender-attacker-defender (DAD) optimization model that provides the optimal location of repeater nodes that maintains as much of the function of the network as possible, even after a worst-case attack. We analyze four initial basic network configurations and compare the resulting optimum node placements when the network is not subject to attack, when the network is subject to two attacks, and when the flow of each network configuration is completely blocked by attacks.
APA, Harvard, Vancouver, ISO, and other styles
14

Page, Wesley G. "Bark Beetle-Induced Changes to Crown Fuel Flammability and Crown Fire Potential." DigitalCommons@USU, 2014. https://digitalcommons.usu.edu/etd/2081.

Full text
Abstract:
Recent outbreaks of mountain pine beetle (Dendroctonus ponderosae Hopkins) in lodgepole pine (Pinus contorta Dougl. ex Loud. var. latifolia Engelm.) forests and spruce beetle (Dendroctonus rufipennis Kirby) in Engelmann spruce (Picea engelmannii Parry ex Engelm.) forests have affected vast areas across western North America. The highlevels of tree mortality associated with these outbreaks have raised concerns amongst fire managers and wildland firefighters about the effects of the tree mortality on fire behavior, particularly crown fire behavior, as crown fires hinder the ability of firefighters to conduct safe and effective fire suppression operations. Current information regarding crown fire dynamics in recently attacked forests is limited to results obtained from simulations employing either inappropriate and/or unvalidated fire behavior models based on inadequate descriptions of crown fuel flammability. The purpose of this research was to measure and characterize the changes in crown fuel flammability caused y recent bark beetle attack and to describe the implications of these changes on crown fire potential in affected forests. Results indicated that bark beetle attack causes a significant decline in moisture content and change in chemical composition in lodgepole pine and Engelmann spruce tree foliage, which substantially increases foliage flammability. Additionally, it was found that conventional models used to predict the moisture content of fine, dead surface fuels were inappropriate for predicting the moisture content of foliage on mountain pine beetle-attacked lodgepole pine trees during the red stage. Therefore, calibrated operational models and models based on diffusion theory were developed and evaluated that could accurately predict hourly fluctuations in moisture content. The implications of these changes on crown fire potential are dependent upon a host of site specific factors including outbreak duration, severity, and the specific stand characteristics. Based on our results, we believe that current fire behavior models, including popular semi-empirical and physics-based models, are currently inadequate for accurately predicting crown fire potential in forests recently attacked by bark beetles. In order to make significant progress in our understanding of crown fire potential in recently attacked forests, a substantial effort to document wildfire behavior in the field and/or to conduct experimental fires is needed.
APA, Harvard, Vancouver, ISO, and other styles
15

Babie, Paul Theodore. "Crown land in Australia." Thesis, University of Oxford, 2001. https://ora.ox.ac.uk/objects/uuid:7e3678b3-a274-468c-bbc0-ef348bb51a00.

Full text
Abstract:
Property theory has long explored the meaning and content of private property. Similarly, one finds no shortage of analysis of common or communitarian property. In the theoretical literature, however, one finds very little writing about public property, a third, very significant, type of property. This lack of attention is not due to a lack of examples; on the contrary, examples abound. This thesis offers a theoretical analysis of one such example: Crown land in Australia. Crown land is a largely forgotten and therefore under-analysed aspect of Australian real property law. This lack of analysis has produced significant confusion in recent judicial developments concerning Australian common law native title. In order to alleviate the potential for confusion, this thesis fills a long-standing gap in the literature of Australian real property law. In order to fill this gap and to provide a much-needed analytical account, it is necessary to make use of working definitions of private, public and communitarian property. This thesis provides each. First, using JW Hams' Property and Justice, it constructs a working definition of private property. From that, by way of contrast, a working definition of public property is offered. Finally, by way of contrast to both private and public property, a working definition of communitarian property is also developed. Armed with working definitions of private, public and communitarian property, the thesis provides an analytical account of Crown land in Australia. It describes Crown land as the quasi-ownership use-privileges and control-powers which the Crown, by virtue of its prerogative power over land, enjoys in Australian land. The Crown enjoys differently packaged bundles of such privileges and powers over many different sorts of land, such as those which have never been allocated for any use, specific natural resources such as minerals or petroleum, those over which Australia's Aboriginal peoples enjoy native title, and even those over which private persons hold freehold estates or statutory leases. All such lands, due to the Crown's quasi-ownership privileges and powers therein, can be called Crown land, which embraces a continuum of locations, each defined by a unique package of such privileges and powers over the relevant type of land. The thesis calls this the Crown land continuum, which, in its totality, is a working example of public property.
APA, Harvard, Vancouver, ISO, and other styles
16

Luo, Yi. "DECISION MAKING UNDER UNCERTAINTY IN DYNAMIC MULTI-STAGE ATTACKER-DEFENDER GAMES." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/204331.

Full text
Abstract:
This dissertation presents efficient, on-line, convergent methods to find defense strategies against attacks in dynamic multi-stage attacker-defender games including adaptive learning. This effort culminated in four papers submitted to high quality journals and a book and they are partially published. The first paper presents a novel fictitious play approach to describe the interactions between the attackers and network administrator along a dynamic game. Multi-objective optimization methodology is used to predict the attacker's best actions at each decision node. The administrator also keeps track of the attacker's actions and updates his knowledge on the attacker's behavior and objectives after each detected attack, and uses this information to update the prediction of the attacker's future actions to find its best response strategies. The second paper proposes a Dynamic game tree based Fictitious Play (DFP) approach to describe the repeated interactive decision processes of the players. Each player considers all possibilities in future interactions with their uncertainties, which are based on learning the opponent's decision process (including risk attitude, objectives). Instead of searching the entire game tree, appropriate future time horizons are dynamically selected for both players. The administrator keeps tracking the opponent's actions, predicts the probabilities of future possible attacks, and then chooses its best moves. The third paper introduces an optimization model to maximize the deterministic equivalent of the random payoff function of a computer network administrator in defending the system against random attacks. By introducing new variables the transformed objective function becomes concave. A special optimization algorithm is developed which requires the computation of the unique solution of a single variable monotonic equation. The fourth paper, which is an invited book chapter, proposes a discrete-time stochastic control model to capture the process of finding the best current move of the defender. The defender's payoffs at each stage of the game depend on the attacker's and the defender's accumulative efforts and are considered random variables due to their uncertainty. Their certain equivalents can be approximated based on their first and second moments which is chosen as the cost functions of the dynamic system. An on-line, convergent, Scenarios based Proactive Defense (SPD) algorithm is developed based on Differential Dynamic Programming (DDP) to solve the associated optimal control problem.
APA, Harvard, Vancouver, ISO, and other styles
17

Kuin, Lawton Theresa H. N. "Defender of faith : is there an Anglican theology of religious pluralism?" Thesis, University of Bristol, 2011. http://hdl.handle.net/1983/6d659f45-d79e-4eae-a3c7-d9bf18856341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Möllberg, Casper, and Gustav Westerlund. "Analys av säkerhetslösningarna Cisco Secure Endpoint och Microsoft Defender for Endpoint." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54608.

Full text
Abstract:
Rapporten behandlar ett examensarbete som handlar om moderna lösningar för säkerhet på slutpunkter. Microsoft Defender for Endpoint och Cisco Secure Endpoint är två relativt nya lösningar jämfört med tidigare programvaror för säkerhet på slutpunkter och det har inte utförts mycket forskning om dem. De är molnbaserade och använder sig av bland annat maskininlärning kombinerat med data som skickas från slutpunkter för att upptäcka hot. På uppdrag av ATEA Eskilstuna undersöktes och analyserades dessa två säkerhetslösningar under examensarbetet med syftet att utvärdera resursanvändningen av dem samt att analysera och jämföra hur de upptäcker och motverkar hot. För att utvärdera dessa punkter har mätningar utförts med hjälp av Windows Performance Monitor och simulerade virus som exekverades på en bärbar dator med Windows 10 som operativsystem för att se hur säkerhetslösningarna hanterar dessa hot. Resultatet tyder på att Microsoft Defender for Endpoint skickar och tar emot mer data och påverkar processorn mer, men använder mindre minne jämfört med Cisco Secure Endpoint på slutpunkten. Cisco Secure Endpoint förändrar inte användning av skickad och mottagen data avsevärt och påverkar processorn mindre, men har en procentuellt högre användning av minne jämfört med Microsoft Defender for Endpoint. Däremot har båda resultaten spikar i graferna som gör mätningarna svårare att tolka.
This report presents a thesis about modern endpoint security solutions. Microsoft Defender for Endpoint and Cisco Secure Endpoint are two relatively new solutions compared to previous endpoint security software and only a few, if any, surveys have been published about them. The solutions are cloud-based and use machine learning combined with communication between the cloud and endpoint to find and prevent threats. The two security solutions were examined and analysed at the request of ATEA Eskilstuna with the purpose of analysing how they discover and prevent threats and evaluating resource usage. To evaluate these points, measurements were performed using Windows Performance Monitor. Simulated threats were executed on a laptop using the operating system Windows 10 to analyse how the solutions handled threats. The result suggests that Microsoft Defender for Endpoint sends and receives more data and uses more of the processor compared to Cisco Secure Endpoint. Microsoft’s security solution seemed to have little effect on the endpoint’s memory. For Cisco Secure Endpoint the result suggests that the solution had little effect on sent and received data and processor usage, but seemed to require more memory on the endpoint. However due to spikes during the measurements the results were difficult to interpret.
APA, Harvard, Vancouver, ISO, and other styles
19

Lowe, John Francis. "Baldwin I of Jerusalem: Defender of the Latin Kingdom of Jerusalem." PDXScholar, 2013. https://pdxscholar.library.pdx.edu/open_access_etds/1029.

Full text
Abstract:
The reign of King Baldwin I (1100-1118) has thus far received little noteworthy attention by historians as the important pivotal period following the First Crusade conquest of Jerusalem in 1099. The two decades of his rule marked the extension of Latin conquests in the east, most notably by the conquest of the important coastal cities of Arsulf, Acre, Caesarea, Beirut and Sidon. These vital ports for the early Latin Kingdom of Jerusalem provided outlets to the sea for commerce, as well as safe harbors for incoming assistance from the west. Further, Baldwin led in the establishment of strong secular control over ecclesiastical authorities, and provided a model of administration for subsequent monarchs to follow until the loss of the kingdom in 1187. Baldwin's contributions to these developments are presented here in a bibliographical framework to illustrate both his important place in crusader historiography, as well as to gauge the significance of his memory in contemporary literature as a second Joshua archetype. The conquest of Jerusalem and the decades that followed were extraordinarily perilous for the western "colonial" transplants, and thus a Biblical precedent was sought as an explanation to the success of the crusaders. This thesis argues that Fulcher of Chartres, the chaplain and primary contemporary biographer of Baldwin I, saw a parallel with the Biblical figure of Joshua as beneficial to posterity. By the establishment of Baldwin's memory in such a context, Fulcher of Chartres encouraged further western support for the Latin Kingdom, and reveals the important trials that faced Jerusalem's first Latin king.
APA, Harvard, Vancouver, ISO, and other styles
20

English, Jacob T. "A Defender-Aware Attacking Guidance Policy for the TAD Differential Game." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou160579737158944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

McGladdery, Christine Anne. "Crown-magnate relations, 1437-1460." Thesis, University of St Andrews, 1988. http://hdl.handle.net/10023/2619.

Full text
Abstract:
This thesis examines the relations between James II and those magnates who were active in politics during his reign, which lasted from 1437-1460. The Black Douglas family were of particular importance during both the minority and the personal rule of James II and their rise to prominence, conflict with the king, and ultimate downfall is studied with particular reference to their bases of power and support. The attitude of the king to the higher, and, where appropriate, lesser nobility is considered, and the thesis traces the development of the political community from the beginning of the reign, when the ranks of the higher nobility were severely depleted, to the state of the realm and its leaders at the time of the king's death in 1460. The major conflict with the Black Douglases is examined through official records and chronicle references and the various stages in the development of the contest are outlined and assessed. The attitude of the other members of the political community to the Crown/Douglas conflict is studied, and the king's methods of courting support, particularly through patronage, are traced. The attacks launched by the king on certain members of the nobility or, in the case of the Livingston faction, royal office holders, are considered, as are his efforts to build up the position of certain families and replenish the ranks of the nobility by creating certain earldoms and lordships of parliament. The rise of honorific dignities, i. e, the bestowal of titles which did not necessarily include the granting of any new land, is discussed, and the king's relationship with the three estates gathered in Parliament or General Council is assessed. The view of the reign of James II which appears in modern histories is traced through from contemporary sources with particular reference to the histories written in the sixteenth century which have provided much of the material, including errors and distortions, which have formed recent assessments.
APA, Harvard, Vancouver, ISO, and other styles
22

Sutton, Liam Richard. "Studies on functionalised crown thioethers." Thesis, University of Nottingham, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Nearchou, Antony. "Zeolites fit for a crown." Thesis, University of Bath, 2019. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.767594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nilsson, Christine. "Article 7 TEU : A Human Rights Defender or a Political Blind Alley?" Thesis, Uppsala universitet, Juridiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-200435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pronk, Cornelis. "F.M. Ten Hoor defender of secession principles against Abraham Kuyper's doleantie views /." Theological Research Exchange Network (TREN), 1987. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Stanton, Mariana Alves. "Respostas a herbivoria em Asclepias curassavica (Apocynaceae: Asclepiadoideae) : defender, crescer ou reproduzir." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/316370.

Full text
Abstract:
Orientador: Jose Roberto Trigo
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-08-12T18:54:20Z (GMT). No. of bitstreams: 1 Stanton_MarianaAlves_M.pdf: 682844 bytes, checksum: 36b7ed46fcdc82eacc95256aae48e173 (MD5) Previous issue date: 2008
Resumo: A produção de defesas contra a herbivoria é essencial para o sucesso reprodutivo das plantas, no entanto pode ser custosa. Esses custos resultam da redução de investimento em outras partes do metabolismo, como o crescimento e a reprodução. Nesse estudo, usamos Asclepias curassavica (Apocynaceae: Asclepiadoideae) como modelo para avaliar como uma planta divide seus recursos entre crescimento, reprodução e defesas. A. curassavica é uma planta anual que possui cardenolidas como defesas. Para verificar como esta responde a herbivoria, simulamos a mesma através de dano artificial (DA) e medimos crescimento (biomassa de folhas e raízes) e reprodução (número de flores, frutos e sementes e biomassa de sementes) em um experimento em longo prazo. Em um experimento em curto prazo, medimos a produção de defesas (concentração de cardenolidas), para avaliar se estas podem estar interferindo no crescimento e reprodução desta espécie. Correlacionamos também, em uma população natural, a concentração de cardenolidas com a percentagem de herbivoria foliar. O hormônio jasmonato de metila (JM) é usado para induzir compostos do metabolismo secundário em plantas, sem o custo adicional da remoção de tecido fotossinteticamente ativo causada por dano artificial ou natural. Usamos esse composto em ambos os desenhos experimentais acima ao invés de remoção da área foliar para avaliar se havia indução de cardenolidas e seu efeito sobre o crescimento e reprodução de A. curassavica. Nossos resultados demonstraram uma redução significativa do número total de frutos, sementes e da massa final de raízes em plantas com tratamento de DA em longo prazo. O crescimento do tratamento DA não diferiu do controle, sugerindo crescimento compensatório das folhas à custa do investimento em raízes e em reprodução. Os custos reprodutivos e de crescimento de raízes detectados no experimento de longo prazo podem resultar da diminuição da capacidade fotossintética em plantas danificadas e investimento simultâneo em crescimento compensatório das folhas. No experimento de curto prazo, não houve alteração da razão de indução de cardenolidas sugerindo que o dano artificial não induz defesas nessa espécie. A ausência de correlação entre cardenolidas e porcentagem de dano natural em plantas coletadas em campo pode sugerir dois cenários excludentes: 1. a indução de cardenolidas não seria importante para a defesa de A. curassavica, ou 2. a ausência de correlação, associada a baixa percentagem de herbivoria implicaria em uma defesa constitutiva eficaz contra herbívoros. O tratamento com JM a longo prazo também mostrou uma tendência à redução do crescimento de raízes e redução significativa da biomassa e porcentagem de germinação de sementes. Nas plantas tratadas com JM a curto prazo, houve um aumento significativo de cardenolidas tardio (384 h após tratamento) sugerindo que estas podem contribuir para a redução de aptidão observada no experimento de longo prazo e que existem custos da produção das mesmas. Dano artificial leva à diminuição da aptidão, através de desvio de investimento em raízes para o crescimento compensatório das folhas. No caso do jasmonato, não houve perda de massa fotossinteticamente ativa (folhas) e a redução do crescimento de raízes pode ser resultado de um efeito direto do tratamento de JM ou indireto causado pela indução de outras partes do metabolismo (p.ex. metabolismo secundário) causada por esse fitohormônio. Experimentos futuros devem comparar os presentes resultados com dano real por um dos herbívoros especialistas para avaliar a eficácia do dano artificial em induzir cardenolidas e o papel dessa indução sobre outras partes do metabolismo da mesma
Abstract: Although the investment in defensive traits against herbivory is essential to the reproductive success of plants, it may be costly. These costs result from reduced investment in other metabolic functions such as growth and reproduction. In the present study, we used the milkweed Asclepias curassavica (Apocynaceae: Asclepiadoideae) as a model to study how a plant divides its resources between growth, reproduction and defense. A. curassavica is an annual weed that uses cardenolides as defenses against herbivory. To evaluate how Asclepias curassavica responds to herbivores, we simulated herbivory by artificial damage (AD) and measured growth (leaf and root biomass) and reproduction (number of flowers, fruit and seeds and seed biomass) in a long term experiment. We also measured defensive traits (cardenolide concentration) in a short term experiment to verify whether there is an investment in defense that may interfere with growth and reproduction. We also correlated cardenolide concentration in a natural population with percent leaf damage. As the plant hormone, methyl jasmonate (MJ) is commonly used to induce secondary metabolism in plants without the additional costs of tissue removal, we used this compound in the same experimental designs instead of AD. Our results from the long term AD treatment showed a significant decrease in final root biomass and in total fruit set and seed number. Plants from the AD treatment did not differ from controls in leaf growth, suggesting that there was a compensatory growth in the former at the expense of root growth. The reproductive and growth costs detected in this experiment may result from reduced photosynthetic capacity in damaged plants and concomitant compensatory leaf growth. In the short term, we found no induction of cardenolides compared to controls, suggesting that artificial damage does not induce defenses. The lack of correlation between cardenolides and percentage leaf damage in plants collected from a natural population suggest two self-excluding scenarios: 1. the induction of cardenolides is not important for the defense of A. curassavica, or 2. the lack of correlation, coupled with low herbivore damage, suggests that this plant has an efficient constitutive defense against herbivores. The long term MJ treatment showed a trend in reduced root biomass and significantly reduced seed biomass and percentage germination. In the short term MJ treatment we found a significant increase in cardenolide concentration (after 384 h) suggesting that the production of these defenses is costly and this may have contributed to observed costs in the long term experiment. Apparently, the artificial damage treatment leads to reduced fitness through reduced root growth which is a consequence of compensatory leaf growth. In the methyl jasmonate treatment, there was no removal of photosythetically active tissue (leaves) and the reduced root growth may be a direct effect of this phytohormone or an indirect effect caused by the induction of other metabolic pathways (such as secondary metabolism) caused by this hormone. Future experiments should compare the present results with natural damage by specialist herbivores to evaluate the efficiency of artificial damage in inducing cardenolides and the role of the induction of these substances on other metabolic functions
Mestrado
Mestre em Ecologia
APA, Harvard, Vancouver, ISO, and other styles
27

Phillips, Matthew. "Church, crown and complaint : petitions from bishops to the English crown in the fourteenth century." Thesis, University of Nottingham, 2013. http://eprints.nottingham.ac.uk/13805/.

Full text
Abstract:
This thesis explores the interaction of bishops with both the English crown and members of late medieval society more generally by focusing on petitions and the supplicatory strategies adopted by bishops in their endeavours to secure legal remedy. Aside from revealing that bishops were often indistinguishable from lay petitioners in terms of the content of their petitions, with many of their complaints arising from their role as great landlords and tenants-in-chief rather than relating to the exercise of episcopal office, this research has also demonstrated that distinct supplicatory cultures separated the clergy from the laity. Notably, whereas petitions from lay supplicants often incorporated crown-alignment rhetoric into their petitions, thereby mirroring the language of ‘common profit’ found in common petitions, petitions from bishops reflected the supplicatory character of the clerical gravamina and presented requests for the exclusive interest of the church. As such, petitions from bishops, alongside the clerical gravamina, encapsulated a set of values, manifest through the use of language and rhetoric, which sought to assert the institutional independence of the church. Yet, despite being part of a supplicatory culture which sought to defend church autonomy and ecclesiastical jurisdictional integrity, the petitionary system in England sapped the supplicatory strength of the clergy and reduced their ability to defend their autonomy in the face of royal demands.
APA, Harvard, Vancouver, ISO, and other styles
28

VILARDI, LEONARDO OSTWALD. "FUNCTIONAL REPRESENTATION AND PUBLIC DEFENDER S OFFICE: A STUDY OF THE PUBLIC CIVIL ACTIONS PROPOSED BY THE PUBLIC DEFENDER S OFFICES OF MINAS GERAIS, RIO DE JANEIRO AND SÃO PAULO." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2017. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=32675@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE SUPORTE À PÓS-GRADUAÇÃO DE INSTS. DE ENSINO
A Constituição da República de 1988 consolidou uma ampla gama de direitos fundamentais, juntamente com uma arquitetura institucional que buscou dar concretude a esses direitos, através de instrumentos jurídicos processuais que legitimaram a propositura de demandas sobre direitos difusos e coletivos, fortalecendo o poder judiciário e a representação funcional. Destaca-se nessa arquitetura o papel das Ações Civis Públicas (ACPs), com a legitimação da sociedade civil para realizar a propositura de tal ação. Entretanto, junto à sociedade instituiu-se outro ator capaz de mobilizar tais instrumentos em defesa da sociedade e dos princípios democráticos, o Ministério Público (MP). Neste cenário, é que a Defensoria Pública, instituição inicialmente integrante do poder executivo e com atribuição de representar em juízo parcelas subalternas da população, conseguiu adquirir autonomia funcional e administrativa. A mobilização da Defensoria promoveu desdobramentos no âmbito interno e externo de tal instituição. No âmbito externo, destaca-se a possibilidade de propor Ação Civil Pública. Dessa forma, a questão-problema que se coloca para a pesquisa é: Como a Defensoria Pública vem exercendo a prerrogativa de tutelar direitos difusos e coletivos? Frente a isso, assume-se como objetivo geral mapear todas as ACPs propostas pelas Defensorias Públicas de Minas Gerias (DPMG), Rio de Janeiro (DPRJ) e São Paulo (DPESP) nos últimos 5 anos. Desdobram-se como objetivos específicos: mapear as ACPs propostas nos últimos cincos anos nos estados pesquisados; descrever a evolução institucional dos órgão estudados; compreender a opção da CF/88 pelo acesso à justiça pela mão do estado; e realizar uma análise crítica do conceito de representação funcional. Tal caminho possibilitou uma reflexão crítica acerca da expansão da representação funcional e da judiciliazação em nosso país que, até o momento, não conheceu limites.
The Republican Constitution of 1988 consolidated a wide range of fundamental rights, alongside an institutional architecture which aimed to materialize such rights, through judicial process instruments that legitimized the proposal of demands regarding diffuse and collective rights, strengthening the judicial power and the functional representation. Within this architecture, the role of the Public Civil Actions (ACPs, in Portuguese) can be highlighted, with the legitimacy of civil society to realize such proposed action. However, within society it was instituted another actor capable of mobilizing such instruments in defense of society and democratic principles, the Public Ministry (MP, in Portuguese). In this scenario, the Public Defense, an institution that at first was part of the executive branch with the task of representing in court the lower classes of population, managed to gain functional and administrative autonomy. The mobilization of the Public Defense promoted outcomes within and outside such institution. In the external realm, we highlight the possibility of proposing a Public Civilian Action. Therefore, the guiding question of this research is: How has the Public Defense been exercising the prerogative of tutelage of diffuse and collective rights? As such, we take as a main goal to map all the ACPs proposed by the Public Defense of Minas Gerais (DPMG, in Portuguese), Rio de Janeiro (DPRJ) and São Paulo (DPSP) in the last 5 years. The specific goals unfold in: mapping the ACPs proposed in the last five years in the researched states; describing the institutional evolution of the studied organs; comprehending the option made by the Constitution of 1988 of access to justice by the hand of the state; and conducting a critical analysis of the concept of functional representation. Such path made it possible to reflect critically regarding the expansion of functional representation as well as about the judicialization of our country, which has known to boundaries so far.
APA, Harvard, Vancouver, ISO, and other styles
29

Peterson, John A. "Warren Stone Snow, a man in between : the bibliography of a Mormon defender /." Diss., CLICK HERE for online access, 1985. http://patriot.lib.byu.edu/u?/MTNZ,10570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Peterson, John A. "Warren Stone Snow, A Man in Between: The Biography of a Mormon Defender." BYU ScholarsArchive, 1985. https://scholarsarchive.byu.edu/etd/5042.

Full text
Abstract:
Warren Stone Snow was an early convert to the LDS church who during the Church's first four decades was often involved in defensive roles as Mormonism encountered various conflicts on the American frontier. While he protected the lives of Joseph Smith and Brigham Young and defended Illinois Saints from houseburning mobs and took a leading role in the Battle of Nauvoo, his greatest defensive contributions took place after the Mormons settled in Utah. As commander of the Sanpete Military District, he was one of the leading figures in Mormon defensive efforts during the Utah War in 1857 and later as brigadier general in the Nauvoo Legion he was the single most important Mormon military leader during Utah's longest and most intense Indian War, the Black Hawk War of 1865-1867. This thesis is a biography of Snow's life during his protecting years and examines his background and character as well as his motivations and defensive activities.
APA, Harvard, Vancouver, ISO, and other styles
31

Gaspar, Luis Miguel Guerreiro Galla. "The Crown Jewel gold skarn deposit." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Dissertations/Summer2005/l%5Fgaspar%5F072805.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Brash, Benjamin. "Distortions of Press Quenched Crown Wheels." Thesis, KTH, Materialvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170022.

Full text
Abstract:
Scania has experienced difficulties with large variations of the slope of the back plane after press quenching of case hardened crown wheels of especially type R780 Steg supplied from ingot cast material. This leads to that a large number of crown wheels has to be remeasured and sorted according to back slope which is time consuming for operators. Also, after sorting of the crown wheels, hard machining has to be adjusted according to the different slopes of the back plane of the crown wheels. In some cases, it also leads to scrapping of the crown wheels.This master’s thesis was divided in two parts. The aim of the first part was to confirm that the crown wheel type and casting technique that exhibits the largest variations in slope of the back plane is the R780 Steg originating from ingot cast material. The crown wheel types that were compared were the R780 Steg, R780 Slät and R885 Slät. Crown wheels manufactured from ingot cast material and from continuous cast material were compared. Hence, 6 combinations were examined. The slope of the back plane was measured with the measuring probe FARO after press quenching. The slope of the crown wheels was found to depend on both casting technique and the geometry of the crown wheel. The results confirmed that the crown wheel type and supplier combination that by far yields the largest variations in slope of the back plane is the R780 Steg supplied by Steel Plant A who uses the ingot casting technique. For this combination the variation exceeds 0,1 mm. All other combinations of crown wheels and suppliers yield acceptable variations.The second part of this master’s thesis was composed of determining if segregations in the cast ingot are the cause of the variations in slope of the back plane of the crown wheel type R780 Steg. This was done by measuring if there is a correlation between the slope of the back plane of the crown wheel after press quenching, the chemical composition and the original position of the crown wheel in the ingot. As in the first part of the study, the distortion was measured by the measuring probe FARO. The samples were sent to Degerfors Laboratorium for chemical analysis. Analyses of C, S and N were made by using combustion analyses. For As, P, B and Al optic spectrometry (spark) was used. All other elements were analysed by x-ray fluorescence. Segregations were found to be present and in combination with the geometry of R780 Steg to be the cause of the large variations in slope of the crown wheels.The results of this thesis show that, for the crown wheel type R780 Steg, Scania should not use suppliers that employ the ingot casting technique. Instead, only suppliers using the continuous casting technique should be used. However, for the other crown wheel types ingot or continuously cast material can be used.
APA, Harvard, Vancouver, ISO, and other styles
33

Collie, Luke E. "Lithium transport in crown ether polymers." Thesis, Durham University, 1995. http://etheses.dur.ac.uk/5196/.

Full text
Abstract:
A series of 12-, 13-, and 14-membered crown ether rings bearing polymerisable side-chains has been synthesised. The crown ethers were attached to a methacrylate or acrylate polymerisable group either via a short link (Ring-CH(_2)-O-Polymer) or via a spacer group. Both hydrocarbon and ethylene oxide spacer groups were used, giving structures of the form (Ring-CH(_2)-O-(CH(_2))(_6)-O-Polymer) and (Ring-CH(_2)-O-((CH(_2)CH(_2))(_2)O)-Polymer). The ethylene oxide chain can potentially bind to a Li(^+) dopant ion. The relative Li(+) binding affinity of 12-, 13-, and 14-membered mono- and disubstituted crown ethers has been assessed by variable temperature (^13)c and (^7)Li NMR. The crown ether bearing monomers were polymerised using standard free-radical polymerisation methods to yield amorphous materials whose glass transition temperature (T(_g)) was controlled principally by the nature of the spacer group. On doping with lithium triflate (LiCF(_3)SO(_3)), the polymers exhibit high ionic conductivity. The conductivity was primarily dependent on polymer T(_g), but was also found to be higher for 12-crown-4 based systems than for 13-crown-4 and 14-crown-4 based analogues. This behaviour was consistent with the results of the NMR studies, which showed that Li(^+) exchange occurs more readily between 12-crown-4 rings than 13- or 14-crown-4 rings. The NMR studies also showed that 12-crown-4 systems have a higher tendency to form 2:1 (ring : Li(^+)) complexes. Within a polymer matrix, the presence of 2:1 complexes allows Li(^+) migration via an association-disassociation mechanism, avoiding the high energy intermediate state of a free or weakly bound Li(^+) ion. The greater encapsulation provided by 2:1 complexation may also aid in ion pair separation.
APA, Harvard, Vancouver, ISO, and other styles
34

Owens, K. A. "Polycyclic crown ethers incorporating cyclophane units." Thesis, University of Liverpool, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Wilson, Mark James. "Activity relationships for aromatic crown ethers." Thesis, University of Strathclyde, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.249872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sides, Jonathan Drapala. "Low Frequency Modeling and Experimental Validation of Passive Noise Attenuation in Ear Defenders." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/10072.

Full text
Abstract:
Circumaural ear cups have been used for decades as an effective way of protecting users from high noise fields. Over the decades, a number of researchers dedicated their time to understanding the dynamics that govern the attenuation of hearing protectors. This thesis duplicates some of this work with newer technology and better data processing ability. In addition to revitalizing the accepted knowledge of hearing protector technology, this thesis is the first documented effort to show how the previously ignored air leak, known to exist between the ear cup and the head, has a profound effect on the low and mid frequency attenuation of a circumaural hearing defender. Past research focused on the mechanical vibration of the cup on the seal as the main source of noise within the ear cup. This mechanical vibration, known as the piston resonance exists, and affected noise attenuation within the ear cup. A reasonably sized air leak of 160 e-7 m2 however, overwhelmed the piston resonance. An air leak of this size was shown to degrade noise attenuation by over 50 dB at 40Hz and 30 dB at 200 Hz when compared to a no-leak case. Further testing also suggested that the air leak has the ability to continue adding energy into the cup up to 3000 Hz.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
37

Werner, Aaron John. "Defender of divine revelation Timothy Dwight's arguments for the Bible's authenticity and divine inspiration /." Louisville, KY : Southern Baptist Theological Seminary, 2007. http://dx.doi.org/10.2986/tren.115-0001.

Full text
Abstract:
Thesis (Ph.D.)--Southern Baptist Theological Seminary, 2007.
Includes vita. This dissertation examines Timothy Dwight's (1752-1817) arguments for the Bible's authenticity with the purpose of determining if his arguments are theologically orthodox, logically sound, and factually accurate. Chapter 1 introduces this dissertation's thesis, research problem, methodology, and its limitations. Attention is given to Timothy Dwight's theological milieu and the reasons he felt compelled to defend the Bible's authenticity in a Christian nation. Chapter 2 examines Dwight's arguments for the necessity of special revelation. He thought that readers would not find his arguments for the Bible's authenticity compelling unless they first were convinced that a revelation is necessary. Hence, according to Dwight, his entire case depends on the validity of this particular argument. After outlining Dwight's defense, this chapter attempts determine if it is theologically orthodox, logically sound, and factually accurate. Chapter 3 presents Dwight's arguments for the authenticity of the Old Testament. After outlining his contention, this chapter scrutinizes its content to determine if it is theologically orthodox, logically sound, and factually accurate. Chapter 4 presents Dwight's argument for the authenticity of the New Testament. After outlining his line of reasoning, this chapter analyzes its content to determine if it is theologically orthodox, logically sound, and factually accurate. Chapter 5 summarizes this dissertation, which concludes that Dwight's arguments for the Bible's authenticity are theologically orthodox, factually accurate, and--with a few exceptions--logically sound. This chapter also suggests areas for future research. Description based on Print version record. Includes bibliographical references (leaves 288-298).
APA, Harvard, Vancouver, ISO, and other styles
38

Smith, Madeleine. "Dissecting the dark defender : approaching vigilantism in American history, society and culture through Dexter." Thesis, University of Hull, 2015. http://hydra.hull.ac.uk/resources/hull:13605.

Full text
Abstract:
[From the introduction]: Vigilantism. Its act or mere mention can have a polarising effect, provoking fear or excitement, disapproval or endorsement, and even imitation in the American public. Vigilantism features regularly in American history, news reports and popular culture references alike, a subtle yet pervasive feature of American life. It is also often highly political, prompting contemporary debates amongst critics and politicians into issues such as self- defence and gun laws, rising crime and social breakdown, and suggests a tendency of the American people to employ or resort to violence. Such debates are not new, however, with outspoken critics on each side of the argument. Ted Robert Gurr, for instance, writing from a conservative perspective, argues that recorded crime rates in America have been inconsistent and are artificially inflated. He states that such claims are exaggerated and have supported a wider perception of American society as being an overtly violent one (1989: pp.21-54). Although Gurr aims to challenge the perception of violence as being generally high in America, he wrote his initial essay for a government report into violence during the 1970s, suggesting a potentially biased perspective. Such an approach ignores the significance of particularly persistent forms of violence in American society, like vigilantism. In contrast, and writing specifically in relation to the often overlooked prevalence of vigilantism in American life, Arnold Madison argues that vigilantism is a persistent feature of American history that will continue to efface American society until the nation’s proclivity to employ violence in such a manner is confronted (1973: p.214). Such opposing outlooks and approaches make clear that vigilantism is a controversial issue that causes extreme responses on both sides of the political spectrum. More so, it can often encompass or be related to other complex social issues, such as anarchism, terrorism and even euthanasia. This highlights the problem of classification surrounding the topic and suggests its applicability to many often conflicting and controversial aspects of modern life. As such, vigilantism is not often recognised as an entity worthy of discussion in its own right, and is often shied away from completely. This thesis will demonstrate how Dexter (Cr. Jeff Lindsay and James Manos Jr, Showtime Networks, US, 2006-2013) is a highly pertinent text through which in-depth, nuanced and wide-ranging discussions of vigilantism are possible, and can inform future subsequent research on the topic.
APA, Harvard, Vancouver, ISO, and other styles
39

Rotman, Leonard Ian. "Duty, the honour of the Crown, and uberrima fides, fiduciary doctrine and the crown-native relationship in Canada." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1993. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/MQ39228.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Fahlgren, Anna. "Defence capabilities of human intestinal epithelial cells." Doctoral thesis, Umeå : Univ, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Agenter, Michael Kelly. "Influence of tooth crown size on malocclusion." View the abstract Download the full-text PDF version (on campus access only), 2008. http://etd.utmem.edu/ABSTRACTS/2008-001-Agenter-index.html.

Full text
Abstract:
Thesis (M.S. )--University of Tennessee Health Science Center, 2008.
Title from title page screen (viewed on March 4, 2008 ). Research advisor: Edward Harris, Ph.D. Document formatted into pages (xvii, 192 p. : ill.). Vita. Abstract. Includes bibliographical references (p. 155-166).
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Yingping. "Crown structure, radiation absorption, photosynthesis and transpiration." Thesis, University of Edinburgh, 1988. http://webex.lib.ed.ac.uk/homes/wang88.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Moreira, navarro Luis. "Supramolecular crown ether containing donor-acceptor ensembles." Thesis, Strasbourg, 2013. http://www.theses.fr/2013STRAF060.

Full text
Abstract:
Afin d'obtenir une meilleure compréhension de l'étape clé du système photosynthétique (la formation d’un état à charges séparées), une nouvelle famille de systèmes donneur-accepteur supramoléculaires a été préparée.Nous avons notamment acquis une meilleure compréhension de la nature des interactions π-π entre le C60 et les porphyrines (résultant d'un processus régi principalement par des forces de van der Waals) et de l'affinité des éthers couronnes vis-à-vis des fullerènes (résultant d'une combinaison entre interactions π-π, n-π et CH-π). Les propriétés supramoléculaires des dimères de porphyrines ont été aussi explorées, prouvant leur communication électronique à travers leurs sous-unités. Finalement, la coopérativité chélate d'un de nos systèmes a été évaluée par la molarité efficace
In order to gain a better understanding of the key step of the photosynthetic system (formation of a charged separated stated), a series of new supramolecular crown ether containing donnor-aceptor ensembles have been obtained.Notably we have gained further insight in the nature of π-π stacking between C60 and porphyrins (arising from a process mainly governed by van der Waals forces) and the affinity of crown ethers towards fullerenes(arising from an interplay of π-π, n-π and CH-π interactions). The properties of porphyrin arrays have been explored, evidencing the electronic communication through subunits. Finally, the chelate cooperativity of one our systems has also been assessed through the effective molarity
APA, Harvard, Vancouver, ISO, and other styles
44

Rodenhouse, Randall Alan. "Liquid crystal polymers containing crown ether ligands." Case Western Reserve University School of Graduate Studies / OhioLINK, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=case1055364243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mäsiarová, Jana. "Exchange Rate Modelling - Parities and Czech Crown." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17469.

Full text
Abstract:
The paper analyses validity of main exchange rate theories in case of the Czech crown. Investigated relationships comprise purchasing power parity, interest rate parity and real interest monetary model. Technical part of the analysis involves cointegration, namely Johansen's method based on vector autoregressive models. Two currency pairs are in the focus: CZK/EUR and CZK/USD. Empirical calculations did not prove the absolute validity of the theories but pointed out to other factors of exchange rate, such as convergence process, impacts on inflation targeting decisions, non-monetarist determinants and the recent financial crisis.
APA, Harvard, Vancouver, ISO, and other styles
46

Denike, John Kane Carleton University Dissertation Chemistry. "The synthesis and complexation of bis-crown ethers and polymers bearing pendant crown ethers and the study of molecular motion of crown ethers in solids using solid state 2H NMR." Ottawa, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Carbaugh, Eric Douglas. "A comparison of crown attributes for six genotypes on Pinus taeda as affected by site and management intensity." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/56963.

Full text
Abstract:
This study was designed to investigate the development of the crown architecture of six genotypes of loblolly pine across a variety of growing conditions, and also to investigate the stability of the crown ideotype for these genotypes over a range of site and silvicultural management regimes. The objectives were to determine whether the crown dimensions that determine the crown ideotype of four clones, a mass-control-pollinated family, and an open-pollinated family of Pinus taeda L. are consistent within their respective genotypes, and to determine whether those same crown dimensions and genotypes follow consistent patterns even when established on different sites with contrasting qualities and different silvicultural regimes. The study was conducted on a 5-year-old plantation with an initial spacing of 1,235 trees per hectare. The plots had not reached crown closure, which provided the opportunity to assess the crown characteristics of individual trees of each genotype and how they developed over in a variety of growing conditions, without the interactions of other individuals. The study was a split-split plot design with the whole plot divided between two sites of contrasting quality; one site established in the Virginia Piedmont and a second site established in the North Carolina Coastal Plain. The sub plots were divided between high and low intensity silviculture. The sub-sub plots were divided among the six genotypes of loblolly pine. Seventeen tree and crown characteristics were measured, and means were compared using analysis of variance and Tukey's HSD test. We hypothesized that the branch and crown attributes would follow consistent patterns among these genotypes on the two sites and between the two silvicultural regimes. The results generally confirm these hypotheses. When the genotypes were compared, interactions only occurred with total branches, internode length, total foliage mass, and total leaf area. Tree height, diameter at breast height (dbh), stem volume, and crown volume averaged 4.8 m, 7.5 cm, 0.03 m3, and 7.1 m3, respectively at the site in Virginia, compared to values of 4.1 m, 6.2 cm, 0.02 m3, and 4.9 m3 at the site in North Carolina. Tree height, dbh, stem volume, branch diameter, branch length, and crown volume averaged 4.7 m, 7.5 cm, 0.03 m3, 1.3 cm, 90.3 cm, and 7.3 m3, respectively under high intensity silviculture compared to values of 4.3 m, 6.2 cm, 0.02 m3, 1.1 cm, 68.7 cm, and 4.7 m3 under low intensity silviculture. There were differences among the genotypes in branch diameter, branch length, and crown volume, with the branch diameter of clones 1 and 3 averaging 1.2 cm compared to an average of 1.3 cm for clones 2 and 4. Branch length for clone 1 averaged 72.4 cm and clone 3 averaged 77.0 cm, while branch length for clone 2 averaged 83.3 cm and clone 4 averaged 86.7 cm. Crown volume for clone 1 averaged 4.9 m3 and clone 3 averaged 6.3 m3, while clone 2 averaged 7.1 m3 and clone 4 averaged 7.2 m3. These differences conform to the crown ideotype for these clones, where clones 1 and 3 were considered narrow crowned and clones 2 and 4 were considered broad crowned. The branch diameter and branch length of the open pollinated family (OP) was similar in size to the broad crowned clones (1.3 cm and 84 cm, respectively), while the branch diameter and branch length of the mass control pollinated (MCP) family was smaller than the narrow crowned clones (1.1 cm and 71.2 cm, respectively). Crown volume for the OP family was intermediate between the clonal ideotypes, averaging 5.9 m3, while the MCP family had the smallest crown volume, averaging 4.7 m3. A single-degree-of-freedom ANOVA comparing the two clonal ideotypes yielded similar results. There were interactions with branch diameter, total branches, internode length, and total leaf area, but the broad crown ideotype was larger in every measured parameter than the narrow crown ideotype. The lack of interactions and the general conformity to crown ideotype in this study indicated stability among these genotypes across this variety of growing conditions.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
48

Peng, Peng. "A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/96401.

Full text
Abstract:
Phishing has been a big concern due to its active roles in recent data breaches and state- sponsored attacks. While existing works have extensively analyzed phishing websites and detection methods, there is still a limited understanding of the data flow of the phishing process. In this thesis, we perform an empirical measurement to draw a clear picture of the data flow of phishing from both attacker and defender perspectives. First, from attackers' perspective, we want to know how attackers collect the sensitive information stolen from victims throughout the end-to-end phishing attack process. So we collected more than 179,000 real-world phishing URLs. Then we build a measurement tool to feed fake credentials to live phishing sites and monitor how the credential information is shared with the phishing server and potentially third-party collectors on the client side. Besides, we also obtain phishing kits to analyze how credentials are sent to attackers and third-parties on the server side. Then, from defenders' perspective, online scan engines such as VirusTotal are heavily used by phishing defenders to label phishing URLs, however, the data flow behind phishing detection by those scan engines is still unclear. So we build our own phishing websites, submit them to VirusTotal for scanning, to understand how VirusTotal works and the quality of its labels. Our study reveals the key mechanisms for information sharing during phishing attacks and the need for developing more rigorous methodologies to assess and make use of the labels obtained from VirusTotal.
Master of Science
Phishing attack is the fraudulent attempt to lure the target users to give away sensitive information such as usernames, passwords and credit card details. Cybercriminals usually build phishing websites (mimicking a trustworthy entity), and trick users to reveal important credentials. However, the data flow of phishing process is still unclear. From attackers' per- spective, we want to know how attackers collect the sensitive information stolen by phishing websites. On the other hand, from defenders' perspective, we are trying to figure out how online scan engines (e.g., VirusTotal) detect phishing URLs and how reliable their detection results are. In this thesis, we perform an empirical measurement to help answer the two questions above. By monitoring and analyzing a large number of real-world phishing websites, we draw a clear picture of the credential sharing process during phishing attacks. Also, by building our own phishing websites and submitting to VirusTotal for scanning, we find that more rigorous methodologies to use VirusTotal labels are desperately needed.
APA, Harvard, Vancouver, ISO, and other styles
49

Sliesarieva, Anna. "The Defender vs. the Censor: CDA Analysis of 2017 Russian Web-Source Ban in Ukraine." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414735.

Full text
Abstract:
With the new challenges of the digital world associated with disinformation, data breaches, and cybercrimes (Cadwalladr & Graham-Harrison, 2018; Connolly et al., 2016; Shipley & Bowker, 2013) many countries nowadays discuss approaches to Internet regulation. In Ukraine, which faced propaganda tactics employed by Russia as a part of the Ukrainian-Russian conflict (Yurkova, 2018), the need for information security in recent years became a major challenge. In 2017, authorities of Ukraine addressed the challenge by introducing sanctions to the most-used Russian web-platforms, including social networks Vkontakte and Odnoklassniki, search engine Yandex, and many other services. This study analyzed the discourse that was formed around the decision. The work incorporates the model of critical discourse analysis by Fairclough (1995a) and framing analysis by Pan & Kosicki (1993). This qualitative study analyzed materials from Ukrainian online media, TV stories, user comments, and political speeches from 16th-17th May 2017 – the dates when the decision on blocking of Russian web-sources was announced to the Ukrainian public. The research answers the questions about the dominant discourses in society regarding the approach of the authorities to Internet regulation, the main arguments and counter-arguments, and media framing. The results show that the discussion was locked in a trap of two dominant discourses of freedom of speech and national security, whereas alternative measures to restrictions were not represented on the public agenda.
APA, Harvard, Vancouver, ISO, and other styles
50

Shin, Eunkyung. "Predictors of Bystander and Defender Behaviors in Bullying: Maternal Reactions to Child Emotion and Empathy in the United States and South Korea." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98789.

Full text
Abstract:
The increase in bullying and its detrimental impacts threaten children's healthy development across the world; however, little research has examined multi-factors related to bullying. Guided by ecological theory, this study examined ecological factors that related to children's bystander and defender behavior when they witness bullying. Considering the role of culture and maternal emotion socialization in children's socio-emotional development, cultural differences in the relation of maternal emotion socialization on children's reactions to bullying through their empathy were investigated. Children (10-12 years old) and their mothers in the United States (n=165) and South Korea (n=158) participated in an online survey. Mothers completed the Coping with Children's Negative Emotions to assess maternal unsupportive and supportive reactions to their children's emotions. Children reported on their empathy (i.e., personal distress and empathic concern) using the Interpersonal Reactivity Index and on their bystander/defender behaviors using the Types of the Conformity Groups in Bullying. For bystander behavior, mothers' unsupportive reactions were significantly correlated with children's bystander behavior through empathic concern in both cultures. Personal distress mediated the relation of maternal unsupportive reactions to bystander behavior only in the American sample. For defender behavior, American mothers' supportive reactions directly predicted defender behavior whereas the effect of Korean mothers' supportive reactions on defender behavior was mediated by empathic concern. More personal distress was related to more defender behavior in the American sample while less personal distress was related to more defender behavior in the Korean sample. Results of this study supported cultural differences in the relation of maternal emotion socialization to children's reaction to bullying. American children were more likely to help the victim when their mothers supported their negative emotions. For Korean children, mothers' supportive reactions were related to their prosocial behavior through their empathic concern. However, in both cultures, children's empathic concern was a significant mediator in the relation between maternal unsupportive reactions and bystander behavior. This finding may provide educational guidance to bullying intervention programs across cultures.
Doctor of Philosophy
More than one out of five students in the United States and more than one out of ten students in South Korea experience bullying. The detrimental effects of bullying can affect not only victims and bullies but also classmates who witness the bullying. I examined factors that related to bystander behavior (ignoring or staying away from bullying) and defender behavior (helping the victim or actively endeavoring to stop bullying) in bullying to help in efforts to stop bullying. Because positive emotional experiences with mothers can help children develop empathy and empathy tends to elicit helping behavior, I examined how mothers' reactions to their children's negative emotions were related to children's bystander behavior and defender behavior through their empathic abilities. However, research and theories on bullying has been predominantly focused on Western populations. My study addressed this gap, examining cultural differences in the relations between the United States and South Korea to bring attention to the role of culture in parents' emotional socialization and children's development. Results from this study will help schools and communities to provide culturally sensitive bullying intervention programs with parents. Children (10-12 years old) and their mothers in the United States (n=165) and South Korea (n=158) participated in an online survey. Mothers were asked about ways that they react to their children's negative emotions. Mothers' unsupportive reactions refer to minimization, distress and punitive reactions when their children express negative emotions. Mothers' supportive reactions mean maternal comforting, acknowledgement, and encouragement of children's negative emotions. In the online survey, children reported on their empathy and reactions when they witness bullying. Cultural differences in the relations were confirmed. American children were more likely to help the victim when their mothers supported their negative emotions. For Korean children, mothers' supportive reactions were related to their defender behavior through their empathic concern. However, in both countries, the more mothers displayed supportive reactions, the more children reported empathic concern; children's empathic concern was an important bridge between maternal unsupportive reactions and bystander behavior.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography