To see the other types of publications on this topic, follow the link: Lack of State Protection.

Dissertations / Theses on the topic 'Lack of State Protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Lack of State Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

PASSOS, SIMONE MARÇAL BRASIL DOS. "WOMEN MOTHERS WHO ARE CRACK USERS: STORIES OF LACK OF SOCIAL PROTECTION." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27337@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO<br>COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>PROGRAMA DE SUPORTE À PÓS-GRADUAÇÃO DE INSTS. DE ENSINO<br>O presente estudo se baseia nas histórias de vida de mulheres/mães usuárias de crack, que tiveram seus filhos(as) numa maternidade pública e, que após avaliação de profissionais, foram consideradas sem condições de cuidarem sozinhas de seus bebês. Por medida de proteção à criança em situação de risco social, os casos sofreram intervenção do Judiciário, alguns deles com a suspensão do poder familiar. O que motivou realizar este estudo foi o desejo de identificar na história de vida dessas mulheres um cenário de múltiplas violações de direitos que lhes acometem muito antes do nascimento do bebê. São histórias atravessadas pela pobreza e por diversos episódios de violência. A drogadição se apresenta como um fator de desagregação familiar e de maus tratos contra a própria mulher. Conforme relatos das próprias mulheres, o interesse pela droga surge, a princípio, por curiosidade e influência de amigos; depois, acontece por necessidade e dependência. Nas entrevistas realizadas com três mulheres/mães foi possível perceber a ausência de uma série de ações políticas capazes de prevenir esse quadro de vulnerabilidade, ratificadas pelo depoimento dos profissionais envolvidos neste estudo. Buscou-se, então, encontrar nos seus depoimentos a presença ou não das ações de cuidado, pelo viés público, capazes de garantir a qualidade de vida de pessoas seguramente consideradas cidadãs por um instrumento legal, como a Constituição Federal de 1988. Nessa discussão, apresenta-se uma análise da proteção social brasileira conjugada com a política sobre as drogas, a fim de auxiliar nas reflexões sobre o esfacelamento do direito a uma vida digna que, posteriormente, torna os indivíduos culpados pelos seus próprios descaminhos.<br>This study is based on the life stories of women/mothers who are addicted to crack and had their babies delivered at a public hospital. These women, having been assessed by professionals, were considered unfit to raise their children on their own. As a protective measure for the child in risky situation, these cases were mediated by the judiciary. In some cases, the family power was suspended. The motivation for this project was the attempt to identify the life-stories I came across in working behind each one of these women. These is a scenario of multiple violations of civil rights through which they endured long before the child is born. These stories are also drenched in violence and poverty. Drug addiction is presented as one on the agents of family break up and women abuse and, as such, leads up to the impossibility of motherhood. As many of them testify, drug use begins as a consequence of curiosity. Later on it becomes a necessity and addiction. While interviewing three of these women/mothers, we could notice the absence of policies and services capable of preventing this state of vulnerability. All that was confirmed by the professionals involved in this study. Therefore, we tried to find in their testimonies the presence or absence of care they received carethrough public policies domain. Measures that couldassure quality of life for all those who are indeed by law considered citizens by legal instrument, as it is stated in the Federal Constitution of 1988. In this project, we included an analysis of the Brazilian social protection system combined with existing drug policies. Our goal is to try to understand the breakdown in their rights to a life worth-living that consequently find those individuals guilty of their own misfortune. We also discussed the role of a women historically, in a time when they are expected to care and protect. However, whether it is caused by desire, lack of care or protection, the women we refer to in this study cannot perform those duties that are socially designed for her.
APA, Harvard, Vancouver, ISO, and other styles
2

Andrade, Rodrigo Augusto Silva de. "Creditor's protection and bank loans: lack of competition hampers bankruptcy reform's effects." reponame:Repositório Institucional do FGV, 2015. http://hdl.handle.net/10438/14090.

Full text
Abstract:
Submitted by Rodrigo de Andrade (rodrigo.andrade@bcb.gov.br) on 2015-09-23T15:12:37Z No. of bitstreams: 1 EESPTeseRASdeAndrade.pdf: 1266696 bytes, checksum: 1b719b6fe0e4fb6ec5f537e62599baab (MD5)<br>Rejected by Suzinei Teles Garcia Garcia (suzinei.garcia@fgv.br), reason: Boa tarde Rodrigo, Por favor, tirar o acento da palavra Getulio. Obrigada. Suzi 3799-7876 on 2015-09-23T17:38:24Z (GMT)<br>Submitted by Rodrigo de Andrade (rodrigo.andrade@bcb.gov.br) on 2015-09-23T18:04:47Z No. of bitstreams: 1 EESPTeseRASdeAndrade.pdf: 1265756 bytes, checksum: 82c4e08660eaa9502491828c36fba380 (MD5)<br>Approved for entry into archive by Suzinei Teles Garcia Garcia (suzinei.garcia@fgv.br) on 2015-09-23T18:09:06Z (GMT) No. of bitstreams: 1 EESPTeseRASdeAndrade.pdf: 1265756 bytes, checksum: 82c4e08660eaa9502491828c36fba380 (MD5)<br>Made available in DSpace on 2015-09-23T18:21:02Z (GMT). No. of bitstreams: 1 EESPTeseRASdeAndrade.pdf: 1265756 bytes, checksum: 82c4e08660eaa9502491828c36fba380 (MD5) Previous issue date: 2015-08-25<br>This dissertation investigates how credit institutions’ market power limits the effects of creditor protection rules on the interest rate and the spread of bank loans. We use the Brazilian Bankruptcy Reform of June/2005 (BBR) as a legal event affecting the institutional environment of the Brazilian credit market. The law augments creditor protection and aims to improve the access of firms to the credit market and to reduce the cost of borrowing. Either access to credit or the credit cost are also determined by bank industry competition and the market power of suppliers of credit. We derive a simple economic model to study the effect of market power interacting with cost of lending. Using an accounting and operations dataset from July/2004 to December/2007 provided by the Brazilian Central Bank, we estimate that the lack of competition in the bank lending industry hinders the potential reducing effect of the BBR on the interest rate of corporate loans by approximately 30% and on the spread by approximately 23%. We also find no statistical evidence that the BBR affected the concentration level of the Brazilian credit market. We present a brief report on bankruptcy reforms around the world, the changes in the Brazilian legislation and on some recent related articles in our introductory chapter. The second chapter presents the economic model and the testable hypothesis on how the lack of competition in the lending market limits the effects of improved creditor protection. In this chapter, we introduce our empirical strategy using a differences-in-differences model and we estimate the limiting effect of market power on the BBR’s potential to reduce interest rates and on the spread of bank loans. We use the BBR as an exogenous event that affects collateralized corporate loans (treatment group) but that does not affect clean consumer loans (control group) to identify these effects, using different concentration measures. In Chapter 3, we propose a two-stage empirical strategy to handle the H–Statistics proposed by Panzar and Rosse as a measure of market competition. We estimate the limiting effects of the lack of competition in replacing the concentration statistics by the H–Statistics. Chapter 4 presents a structural break test of the concentration index and checks if the BBR affects the dynamic evolution of the concentration index.<br>Esta dissertação investiga como o poder de mercado de instituições de crédito limita os efeitos de medidas de proteção ao credor sobre os juros de operações de crédito. Fazemos uso da Reforma na Lei de Falência Brasileira de Junho/2005 (RLF) como evento que afetou o ambiente institucional no mercado de crédito. A Lei elevou a proteção ao credor objetivando melhorar o acesso das empresas ao mercado de crédito e reduzir custos de financiamento. Tanto acesso ao crédito, quanto custos dos empréstimos são, também, determinados pela competição na indústria e pelo poder de mercado dos ofertantes. Derivamos um modelo econômico simplificado, a fim de estudarmos os efeitos da interação do poder de mercado com os custos dos empréstimos. Usando uma base de dados contábeis e de operações de crédito de Julho/2004 a Dezembro/2007, fornecida pelo Banco Central do Brasil, estimamos que a falta de competição na indústria de crédito limita em aproximadamente 30% o efeito redutor potencial da RLF sobre juros e em 23% sobre spreads. Não encontramos evidências estatísticas que a RLF afetou o nível de concentração no mercado de crédito no Brasil. Apresentamos um breve relato sobre as reformas na legislação falimentar em alguns países, as mudanças na legislação brasileira e alguns artigos recentes relacionados no capitulo introdutório. O segundo capítulo apresenta o modelo econômico e as hipóteses testáveis sobre como a falta de competição no mercado de crédito limita os efeitos da elevação da proteção ao credor. Neste capítulo, introduzimos nossa estratégia empírica usando o modelo de diferenças-em-diferenças e estimamos o efeito limitador do poder de mercado sobre o potencial da RLF em reduzir juros e spreads. Usamos a RLF como um evento exógeno que afeta empréstimos corporativos colateralizados (grupo de tratamento), mas não afeta empréstimos a consumidores (grupo de controle) com diferentes medidas de concentração. No Capítulo 3, propomos uma estratégia empírica em dois estágios, a fim de usarmos a Estatística-H proposta por Panzar e Rosse como medida de poder de mercado. Estimamos o efeito limitador da ausência de competição sobre a taxa de juros e sobre o spread, substituindo os índices de concentração pela Estatística-H. O Capítulo 4 apresenta uma análise de séries temporais do índice de concentração e testa se a RFB afetou a concentração.
APA, Harvard, Vancouver, ISO, and other styles
3

Wells, Verlinda. "THE LACK OF DIVERSITY ON THE BENCH IN FLORIDA'S STATE COURTS." Master's thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3795.

Full text
Abstract:
Diversity in the judiciary is essential to ensure impartiality, public confidence, and the perception that all members of society are represented on the bench. Minorities and women are significantly underrepresented as judges in Florida in proportion to their numbers in the general population. Because we live in an increasingly global world, diversity is best described when people of different races, colors, ethnicity and genders work to develop a mutual respect for each other. It was important to use diversity in this research because it required recognition, understanding, and acceptance of the special contribution that each member of a group can make. The documentation review method was used to measure the data collected in this research. The advantages for using this method were first, to obtain comprehensive and historical information that already exists and secondly, to obtain data which demonstrates few biases about the information. I used correlation as a non-experimental, description method because the variables are not directly manipulated, as they would be if used in an experimental method. This method of research is really more of a mathematical technique for summarizing data. This study was designed to determine the degree and direction of relationship between two or more variables or measures of behavior. Diversity in 2004 judicial appointments is a high priority in Florida's present administration. Their goal is to have a judicial system composed of judges who reflect the people they serve. Since judges have so much influence over the lives of people of the state, it is important that all Floridians perceive the judiciary legitimate. Having a diverse judiciary serves the goal. The Bush/Jennings team appointed; 1) the first African American woman, Judge Peggy Quince to the Florida Supreme Court (with the agreement of Governor Lawton Chiles); 2) minorities to 53 judicial positions including the first Hispanic Supreme Court Justice Raoul Cantero to the Supreme Court; 3) 26 African American, 26 Hispanics, 1 other); 4) women to 66 judicial position; and, 5) the first Haitian-American judge, Judge Fred Seraphin to the Miami Dade County Court. The judicial system has an obligation to provide equal opportunity to the extent that females, minorities, and people of color have the temperament, the legal educational background, the skills, and the abilities necessary to sit on Florida's bench. The legal profession also has an obligation to encourage more minorities and women to consider a career in law. The governor's most recent selections indicate that he is serious about improving diversity on the Florida bench.<br>M.A.<br>Department of Political Science<br>Arts and Sciences<br>Political Science
APA, Harvard, Vancouver, ISO, and other styles
4

Råman, Jari. "Regulating secure software development : analysing the potential regulatory solutions for the lack of security in software /." Rovaniemi : University of Lapland, 2006. http://www.loc.gov/catdir/toc/fy0803/2006499062.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mullen, Patrick Carleton University Dissertation International Affairs. "State interests and the Arctic environmental protection strategy." Ottawa, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ciger, Meltem Ineli. "Temporary protection in international law and state practice." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.687195.

Full text
Abstract:
Contemporary armed conflicts, especially civil wars, create massive displacements. Well defined and effective protection mechanisms are necessary to make sure the displaced persons receive adequate protection and states receiving the influx are able to cope with the pressure. Not all persons displaced by an armed conflict can be protected within the Convention Relating to the Status of Refugees, but states have an obligation under customary international law to provide refuge to persons fleeing persecution, torture and immediate harm to their life and physical integrity. This thesis demonstrates that temporary protection can provide a viable framework to respond to large scale influx of persons fleeing armed conflict that will cover the protection gaps in the 1951 Convention and the state obligation to provide refuge. Temporary protection is not new and it has been used in the past by states in response to mass population movements. However, the legal basis of temporary protection is not clear. There is no structured legal framework regulating temporary protection at an international level and there are very few legal instruments providing states with guidance on how to introduce and implement a temporary protection regime. Addressing these issues, this thesis clarifies the legal basis for temporary protection, identifies the elements of a viable temporary regime and makes a comprehensive analysis of different temporary protection practices. Building on these assessments, this thesis offers guidance on how to introduce and implement a temporary protection regime which operates within the boundaries of international law and human rights without compromising the elements that make it a practical and efficient framework to cope with mass influx situations. By following the proposed guidance, states can introduce and implement a practical and efficient protection regime that ensures the fundamental human rights and freedoms of persons fleeing armed conflict.
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Xiaofei. "International protection of civil rights versus state sovereignty." Thesis, University of Ottawa (Canada), 1993. http://hdl.handle.net/10393/6603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ntwoku, Stephane Ntuomou. "Dynamic transformer protection a novel approach using state estimation." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45879.

Full text
Abstract:
Transformers are very important parts of any electrical network, and their size increase so does their price. Protecting these important devices is a daunting task due to the wide variety of operating conditions. This thesis develops a new protection scheme based on state estimation.The foundation upon which our protection scheme is built is the modeling of the single phase transformer system of equations. The transformer equations are composed of polynomial and differential equations and this system of equations involving the transformer's electrical quantities are modeled into a system of equations such that highest degree of each of the system's equations is quadratic―in a process named Quadratization and then integrated using a technique called Quadratic integration to give a set of algebraic companion equations that can be solved numerically to determine the health of the transformer.
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Nasseri, Hilal Abdullah Salim. "Protection of micro-grids dominated by solid state converters." Thesis, University of Bath, 2006. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.437607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cui, Yinan. "Dynamic State Estimation Assisted Power System Monitoring and Protection." Diss., North Dakota State University, 2016. http://hdl.handle.net/10365/25851.

Full text
Abstract:
The advent of phasor measurement units (PMUs) has unlocked several novel methods to monitor, control, and protect bulk electric power systems. This thesis introduces the concept of ?Dynamic State Estimation? (DSE), aided by PMUs, for wide-area monitoring and protection of power systems. Unlike traditional State Estimation where algebraic variables are estimated from system measurements, DSE refers to a process to estimate the dynamic states associated with synchronous generators. This thesis first establishes the viability of using particle filtering as a technique to perform DSE in power systems. The utility of DSE for protection and wide-area monitoring are then shown as potential novel applications. The work is presented as a collection of several journal and conference papers. In the first paper, we present a particle filtering approach to dynamically estimate the states of a synchronous generator in a multi-machine setting considering the excitation and prime mover control systems. The second paper proposes an improved out-of-step detection method for generators by means of angular difference. The generator's rotor angle is estimated with a particle filter-based dynamic state estimator and the angular separation is then calculated by combining the raw local phasor measurements with this estimate. The third paper introduces a particle filter-based dual estimation method for tracking the dynamic states of a synchronous generator. It considers the situation where the field voltage measurements are not readily available. The particle filter is modified to treat the field voltage as an unknown input which is sequentially estimated along with the other dynamic states. The fourth paper proposes a novel framework for event detection based on energy functions. The key idea is that any event in the system will leave a signature in WAMS data-sets. It is shown that signatures for four broad classes of disturbance events are buried in the components that constitute the energy function for the system. This establishes a direct correspondence (or mapping) between an event and certain component(s) of the energy function. The last paper considers the dynamic latency effect when the measurements and estimated dynamics are transmitted from remote ends to a centralized location through the networks.<br>National Science Foundation, NSF (Award #1544621)
APA, Harvard, Vancouver, ISO, and other styles
11

Mogende, Emmanuel. "Africa's ‘miracle state'? the intersection of political leaders and non-state actors in the greening of Botswana through wildlife." Doctoral thesis, Faculty of Science, 2020. http://hdl.handle.net/11427/32814.

Full text
Abstract:
The premise of the thesis is that attention to the processes that produce the green state opens up avenues for analysing African states from the perspective of the green state. This study engages the theory of the green state within the African context to understand the complex processes that enabled the greening of the state in Botswana. I draw on the example of wildlife conservation policies and practices in post-independence Botswana to argue that the greening of the state entails processes by which the state interacts with non-state actors to enact environmental reforms over a long period of time. Such interaction maybe initiated by the state or by non-state actors who are determined to pursue an environmental agenda or to implement environmental strategies through organs of the state. To account for the processes that enable the greening of Botswana, the study employed an interpretive approach that is dependent on qualitative data. The study primarily draws from archival research and key informant interviews with academics, environmental consultants, representatives of civil society, relevant government departments and ministries, the private sector in Botswana's tourism, and an interview with former President Ian Khama. To understand the greening processes, the thesis analysed the qualitative data between 1966 and 2018. These historical periods cover the presidency of Seretse Khama (1966 – 1980), Ketumile Masire (1980 – 1998), Festus Mogae (1998 – 2008) and Ian Khama (2008 – 2018). The four key findings of the study are that, first, the collaboration between authorities in Botswana and international agencies and actors enabled the greening of Botswana. These agencies and actors, financed environmental related programmes, facilitated the development of green institutions, and influenced the country's conservation policies. Second, the study demonstrates that political leadership is instrumental in the greening of Botswana. The four presidencies paid attention to environmental protection though there were variations in each presidency. The presidency of Ian Khama stands out as an important period in greening of the state as he strengthened the greening process by realigning the wildlife economy with political power. Third, the study found that the greening process necessitates the internal restructuring of the state through the establishment of green institutions, which serve to realign state activities with the green agenda. Fourth and lastly, the study reveals that the greening of the state in Botswana is accompanied by negative state-citizen relations in the wildlife sector. These relations played out through the marginalization of the local people in the ecotourism enterprise within the context of community-based natural resource management initiative.
APA, Harvard, Vancouver, ISO, and other styles
12

Marka, Madhavi. "Object-based unequal error protection." Thesis, Mississippi State : Mississippi State University, 2002. http://library.msstate.edu/etd/show.asp?etd=etd-06242002-152555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Amann, Nicholas Paul. "Adaptive overcurrent protection scheme for shipboard power systems." Master's thesis, Mississippi State : Mississippi State University, 2004. http://library.msstate.edu/etd/show.asp?etd=etd-06282004-140248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Berti, Federica. "Protection of the muscle stem cell state from premature differentiation." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/protection-of-the-muscle-stem-cell-state-from-premature-differentiation(6886509a-35fa-43b1-8971-7cb2dcaa7da3).html.

Full text
Abstract:
The extraordinary capacity of regeneration exists in just certain species and tissue types. Invertebrates, the cells that regenerate tissues are called stem cells. During adulthood, damaged muscle tissue regenerates through Satellite stem cells that re-enter the cell cycle from a quiescent state, giving rise to new muscle tissue. During development, newly forming organisms build tissues through proliferating stem cells that renew the stem cell pool whilst generating myogenic stem cells which will eventually differentiate into muscle cells. For many years the Myogenic Regulatory Factors (Mrf) genes have been considered to be the main genes driving this proliferation in adult and fetal stages. Mrf genes have been shown to be capable of inducing non-myogenic cells to enter the myogenic lineage in vitro, but their role and capabilities in vivo have been less well characterised. Here we show, using the developing chicken model, that Mrf genes and related genes are not capable of prematurely upregulating terminal muscle differentiation before HH20. MyoD and other combinations of gene misexpression were however shown to be capable of inducing Myosin upregulation between HH20 and HH24 indicating the existence of a time-frame dependent protection of premature development. These results indicate that the Mrf genes have a reduced proficiency for inducing differentiation in vivo compared with in vitro likely due to the presence of currently unidentified additional factors. Our results demonstrate that the current understanding of the signals and cues of muscle stem cell differentiation are still insufficient to exploit the regenerative capabilities of muscle tissues towards regenerative therapies. The possible additional factors required for muscle stem cell differentiation are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
15

Bothwell, Heather MacGregor. "Gaining State Response on Global Environmental Problem-Solving: Developing A State-centric Approach." PDXScholar, 1995. https://pdxscholar.library.pdx.edu/open_access_etds/4978.

Full text
Abstract:
This study focuses on identifying the conditions which encourage or discourage international cooperation with regard to environmental problem-solving. In particular, the divergence between two key international relations theories, Environmentalism and Realism, will be examined in hopes of forging a rapprochement and stimulating research for a comprehensive theoretical approach to global environmental problem-solving. It is hypothesized that a state-centric political system is both a reality and an effective structure for environmental problem-solving, therefore an examination of state participation and the motivators and inhibitors affecting state response on certain environmental issues is conducted. In particular, this study hypothesizes that uncertainty can act as an inhibitor, and without the introduction of motivators can prevent states from participating in environmental problem-solving. A conceptual model of state courses of action is utilized to illustrate the potential of state participation and the development of a state-centric approach.
APA, Harvard, Vancouver, ISO, and other styles
16

Gruebel, Marilyn. "International environmental agreements and state cooperation the Stratospheric Ozone Protection Treaty /." Albuquerque : University of New Mexico, 2007. http://proquest.umi.com/pqdweb?did=1379574421&sid=2&Fmt=2&clientId=78006&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Fermaud, Laetitia. "La protection de l'enfant en droit public." Thesis, Montpellier 1, 2011. http://www.theses.fr/2011MON10069.

Full text
Abstract:
L'implication des instances publiques dans le champ de la protection de l'enfance est ancienne, les pouvoirs publics ayant très tôt saisi l'importance et la nécessité d'intervenir auprès de ces administrés qui, tant en raison de leur immaturité physique que psychique, s'avéraient particulièrement vulnérables. Pourtant, le droit public de la protection de l'enfant constitue un domaine de recherche encore confidentiel, l'approche civiliste étant en la matière largement privilégiée. La présente étude, consacrée à la protection de l'enfant en droit public, aura donc pour ambition de mettre à jour un champ spécifique de l'action publique entièrement dédié à la satisfaction de l'intérêt de l'enfant. Souvent décriée, la notion s'impose néanmoins comme la clef de voûte du dispositif de protection des mineurs qui, sous son influence, évolue de façon saisissante dans le sens d'une individualisation de la réponse publique<br>The implication of public institutions in the field of child protection is not new, the State has understood very early the importance and the need to attend to this category of citizens, members of which are highly vulnerable both physically and mentally. However, the research area of child protection in public law remains undisclosed, with a strong bias towards a civil-law type of approach The ambition of this study fully dedicated to child protection in public law, is to update the specific field of public action entirely devoted to satisfying children's welfare. Often criticized, the notion has sprung up as the heart of the system for protecting minors which, under its influence, is evolving startlingly towards an individualization of the public response
APA, Harvard, Vancouver, ISO, and other styles
18

Donnelly, Timothy S. "What's My Lane? Identifying the State Government Role in Critical Infrastructure Protection." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6787.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>What constitutes an effective Critical Infrastructure and Key Resources (CIKR) protection program for Massachusetts This study evaluates existing literature regarding CIKR to extrapolate an infrastructure protection role for Massachusetts. By reviewing historical events and government strategies regarding infrastructure protection, Chapters I and II will provide scope and context for issues surrounding critical infrastructure. Chapter III reviews the roles of the Department of Homeland Security and the Department of Defense, possibly the two most influential organizations tasked to support the federal infrastructure protection initiative. Chapter IV analyzes the private-sector role in infrastructure protection as articulated in federal strategies, academic research, federally directed studies, and professional journals. The National Infrastructure Protection Plans framework for managing the risk to CIKR will be used as a guide in Chapter V to evaluate the infrastructure protection strategies of Arizona, Virginia, and Washington. Finally, Chapter VI recommends that Massachusetts develop a state infrastructure assurance program vice a Critical Infrastructure Protection Program. Concepts such as reframing the critical infrastructure debate, creating infrastructure public/private partnerships and information sharing processes to build trust among the entities invested in ensuring the delivery of infrastructure services are recommended for inclusion in a state infrastructure assurance strategy and subsequent infrastructure assurance program.
APA, Harvard, Vancouver, ISO, and other styles
19

Al-Saeed, Mansour. "The legal protection of private foreign investment in the state of Kuwait." Thesis, University of Aberdeen, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272267.

Full text
Abstract:
Chapter III is dedicated to the discussion of the regulation of foreign investment under the Kuwaiti Commercial Laws (KCLs) concerning foreign investment, forms and legal procedures for establishing such investment in Kuwait and the appropriate legal forms for establishing private foreign investment in Kuwait are also examined. In addition, the incentives that are offered to foreign investors, according to KCLs and double taxation treaties, to which Kuwait is a party in Kuwait territory, are examined here. Chapter IV is devoted to discussing the scope and standards of protection of private foreign investment under international law, in addition to Kuwaiti domestic law. The substantive provisions on the protection of foreign investment through bilateral and multilateral investment agreements, to which Kuwait is also a party, is focused on in this Chapter. Non-commercial risk is considered the most unpredictable risk which may affect foreign investment in the host country and thus, foreign investors usually seek to insure their investments against non-commercial risk under a guarantee scheme to which the host country is a party. Because of the fact that Kuwait is a contracting party to the Inter-Arab Investment Guarantee Corporation of 1974, and the Convention on the Multilateral Investment Guarantee Agency of 1985, the most important provisions of these schemes are discussed in Chapter V. In addition, since the Kuwait government and United States have acceded to the 1989 Agreement on Investment Guarantees, which provides guarantee for American private investments in Kuwait against non-commercial risks by Overseas Private Investment Corporation (OPIC), close attention will be provided to this scheme in this Chapter. Since the availability of effective, independent, impartial and appropriate mechanisms in resolving investment disputes is considered to be a fundamental guarantee for the protection of foreign investment, the mechanisms for the settlement of disputes arising out of, or in connection with, foreign investment in Kuwait are highlighted in Chapter VI. The general conclusions and evaluations of the study are aired in Chapter VII.
APA, Harvard, Vancouver, ISO, and other styles
20

Mmusinyane, Boitumelo Obert. "Africa's environmental protection challenge : social responsibility and liability of non-state actors." Diss., University of Pretoria, 2003. http://hdl.handle.net/2263/1068.

Full text
Abstract:
"In Africa non-state actors (NSAs) are causing an alarming concern with the destruction of the environment and indigenous communities in the name of development; such environmental degradation leaves indigenous or economically marginalized groups in an unsatisfactory environment to their health, standard of living and basic necessitites of life and the land for future development. In most instances, the host country does not get good value from the vast amount of resource extraction. In other words, this kind of investment does not benefit the affected people; rather, it transfers a country's resources outside. In the end the poor pays for the lust of the rich. In some cases, African governments are simply not interested in the impact of the activities of NSAs on the people as they personally benefit from their presence due to corruption. As a result, it is correct to note that 'the local partners (African governments)' are selling indigenous communities on for their personal gain. In spite of the fact that some of these African countries have strong environmental laws in operation, they are often unwilling to force NSAs to comply with environmental rights and labour standards since they badly need the investment and capital that NSAs bring into their economies. Some of these NSAs pressurise national governments and even threaten them with lawsuits to open their doors for them. Others completely close down and relocate in order to blackmail the governments to follow through on the permits after exploration had started. Globalisation and an increase in international trade have joined with the growth of the human rights movement. These dual trends have cast an increasing attention on the role that NSAs play in environmental rights violation throughout the Sub-Saharan African region. The criitical issue in this period of globalisation, and which is also a challenge to it, is the liability and social responsibility of NSAs in times of violation of enviornmental rights, since today they figure prominently within the human rights field. Most of their activities are not in accordance with national or international environmental standards. While NSAs enjoy sovereign immunity within local jurisdictions, primary responsibility lies with states, which in most cases, are held liable for wrongful acts committed by NSAs, since they are regarded as the ultimate guardian of the welfare of their populations. As state authority declines, NSAs play a direct and indirect role in a wide range of environmental human rights violations, and this has now led to a point where there is a need to attach more concrete obligations to them. The thesis provides a framework with which th NSAs can be held directly and indirectly accountable for their role in fuelling the instability in the Sub-Saharan African region. The purpose of the thesis is to determine the approaches or guidelines that can be followed in order to ensure that NSAs behave appropriately in host states in realisation of the right to development by preserving the harmonious environment that local communities are entitled to. The creation of a viable and sustainable environment for everyone is of paramount importance in today's society." -- Introduction.<br>Thesis (LLM (Human Rights and Democratisation in Africa)) -- University of Pretoria, 2003.<br>http://www.chr.up.ac.za/academic_pro/llm1/dissertations.html<br>Centre for Human Rights<br>LLM
APA, Harvard, Vancouver, ISO, and other styles
21

Lee, Yong Hee. "A comprehensive protection scheme for distribution systems." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53070.

Full text
Abstract:
The objective of the research is to formulate and demonstrate protection schemes for radial and loop systems, an active distribution system, and a microgrid. The schemes are composed of a) A new loop scheme by utilizing voltage, current, and time (VIT) reclosers and sectionalizers and b) A new protection scheme, the dynamic state estimation-based protection, for active distribution systems and microgrids. The first part of the research explores the closing onto a fault during the conventional loop sectionalizing scheme and provides a VIT scheme that can solve the problem. The immediate benefit of the VIT schemes is a reduction of the nuisance trips because of the fault closing onto a fault. Moreover, the number of protection zones is increased by the application of the VIT sectionalizers. This thesis demonstrates the VIT protection scheme for a traditional distribution system and presents numerical experiments using various test scenarios with various fault locations. The simulation results verify that the protection scheme successfully performs the automatic load transfer scheme for a loop system. The second part of the research identifies the increased number of protection issues according to the installation of distributed generations (DGs) and provides solution to the problem. To solve the issue, a new fault detection scheme, dynamic state estimation-based protection scheme, is illustrated in this thesis based on synchronized measurements. The method uses dynamic state estimation, based on the dynamic model of the component that accurately reflects the nonlinear characteristics of the component. Numerical experiments show that the protection of active distribution systems and microgrids is feasible in real time.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Yujie. "Model-based design of a protection scheme for shipboard power systems." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-09292008-124423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Li, Ying, and 李颖. "The dynamics between the local state, the community and environmental NGOs in China: a state-in-society approach." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47032923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Amarasuriya, Harini Nireka. "Guardians of childhood : state, class and morality in a Sri Lankan bureaucracy." Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/5881.

Full text
Abstract:
This thesis explores the everyday practices, relationships and interactions in a Probation Unit of the Department of Probation and Child Care Services in the Central Province in Sri Lanka. Using multi-sited ethnography and the ethnographer’s own experiences in this sector it examines how frontline workers at the Probation Unit engage and draw upon international and national development discourse, ideas and theories of children and childhood to engage with colleagues and clients. This thesis takes as its analytical starting point that state agencies are sites where global development discourse meets local practices. Simultaneously, they are sites where ideas and practices of nationalism, class, morality and professional identity are produced and reproduced. State sector employment is an important source of social mobility, gaining respectability and constructing a middle class identity. Thus, maintaining the ‘in-between’ position in relation to the upper and lower classes is an especially anxiety-ridden and challenging process for state bureaucrats. This shapes the particular characteristics of their nationalism, morality and professional identity and influences the way in which they translate policies and engage with institutional and bureaucratic procedures. This thesis examines this process in detail and illustrates its translocal nature. More explicitly it looks at the ways in which development discourse and practice is transformed by the forms of sociality that it engenders. The ethnography illustrates that this process allows for development policies and interventions to be co-opted in particular ways that articulate ideas and practices of nationalism, class, morality and professional identity. Through this cooption, the outcomes of development policies and interventions are transformed in unanticipated ways. The broader social and political process that transforms development policies and practices remains only partially visible to development projects and programmes. The complexity and in particular the historicity of social and political contexts remains outside development project logic and timelines. To understand the relationship between policy and practice or to evaluate development outcomes is meaningless if development is conceptualised as something that stands apart from society. What is most useful to understand, and indeed revealing, is how actors make meaning of development policies and programmes as part of everyday practices in historically situated social and political contexts. The thesis concludes that theorising, analysing or even critiquing development’s transformative potential is misleading as it fails to recognise that what is being transformed is development itself.
APA, Harvard, Vancouver, ISO, and other styles
25

Johansson, Emil. "Tamper Protection for Cryptographic Hardware : A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys." Thesis, Linköpings universitet, Informationskodning, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166083.

Full text
Abstract:
This master's thesis was conducted at Sectra Communications AB, where the aim of the thesis was to investigate the state of the art of physical hardware tampering attacks and corresponding protections and mitigations, and finally combining this to a protection model that conforms to the FIPS 140-2 standard. The methods used to investigate and evaluate the different attacks were literature searching, looking for articles presenting different attacks that have been used against real targets, and attacks that there are no records of being attempted on a real target, but are theoretically possible. After this, an attack tree was constructed, which then developed into a flowchart. The flowchart describes and visualizes how the different attacks could take place. A qualitative risk analysis was conducted to be able to evaluate and classify the different attacks. This showed the attacks that would most likely have the greatest impact on a cryptographic communications device if used in an attack on the device, and also which of these attacks one must prioritize to protect the device against. The attacks that were regarded to have the highest impact on a cryptographic communication device were memory freezing attacks, and radiation imprinting attacks. After this, a protection model was developed. This was done by placing protection and mitigation in the attack flowchart, showing how one could stop the different attacks. To then investigate the different protections, an evaluation process was conducted. An evaluation process was conducted to investigate the different protections by comparing their attributes to the requirements of the FIPS 140-2 standard. This evaluation process than resulted in a combined protection model that covers the requirements of the FIPS 140-2 standard. This thesis concludes that there are many different protections available, and to be able to create solutions that protect the intended system one must perform a deep attack vector analysis. Thus, finding the weaknesses, and vulnerabilities one must protect.
APA, Harvard, Vancouver, ISO, and other styles
26

Engelmann, Sabrina. "Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-172869.

Full text
Abstract:
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI. We show for the MISO WTC that in the fast fading scenario the Beamforming Vector (BV) can be optimized such that the ergodic secrecy rate is maximized with regard to the degree of channel knowledge. Further we show that the ergodic secrecy rate can be significantly increased by usage of Artificial Noise (AN), if applied in a smart way. This means that the degree of channel knowledge on the link to the eavesdropper influences the portion of power that is spent for AN at the transmitter as well as the direction, in which the AN signal is sent. In addition, we apply the same beamforming and protection strategies to the slow fading scenario and find that these techniques also reduce the secrecy outage probability. For the two-hop relay WTC, we introduce Information Leakage Neutralization (IN) as a new protection strategy. If applied to a system model, where the transmitter has full CSI, the instantaneous secrecy rate performs almost as well as the instantaneous capacity of the peaceful system without an eavesdropper. The IN protected scheme outperforms the AN protected approach and performs much better than any beamforming scheme without additional protection mechanism. Another positive aspect of the IN protected scheme in the case of full CSI is that conventional channel codes can be applied instead of wiretap codes. For the case of partial CSI, where the transmitter has only an outdated estimate on the channel between relay and the eavesdropper, we show that the IN protected scheme can also be applied. Here, it strongly depends on the channel realizations and the delay of the estimate, whether the IN or the AN protection scheme should be applied<br>In dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind. Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren. Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte
APA, Harvard, Vancouver, ISO, and other styles
27

Lazem, Ali. "The treatment of tax in investor-state arbitration of expropriation and national treatment protection." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8758.

Full text
Abstract:
This thesis examines the treatment of tax in investor-state arbitration of expropriation and national treatment protection. The root of the study is the special characterisation of tax in the sovereignty of the state and the consequent sensitivity of states to have their tax policies being the subject of private adjudication. Tax has in the past been characterised as a non-arbitrable matter, but that is true only if states have purposefully deemed them so under the international investment treaties that they are party to. Tax is generally arbitrable under the expropriation provisions of international investment treaties, but states are seldom found liable for tax expropriation. National treatment, on the other hand, is generally not arbitrable under international investment treaties, but when an investment treaty permits the arbitration of alleged national treatment tax violations, violations are affirmed in more cases than not. The reason behind the comparable success rates is the difficulty in proving the existence of expropriation by taxation whereas national treatment tax violations are comparatively easier to substantiate. This thesis establishes what constitutes a tax expropriation, and how the success rate of claims for national treatment tax violations justifies the general exclusion of the application of national treatment protection to tax matters for sovereignty retention. In order to achieve the foregoing, this thesis examines sovereignty and the sovereign power to tax; the relinquishment of tax sovereignty under international investment treaties; the arbitrability of tax and the reasoning behind the reluctance of states to submit tax disputes to arbitration; the capability of tax to be expropriatory; the fundamentals of the expropriation standard under customary international law and international investment treaties and how they are applied by arbitral tribunals in tax expropriation claims; and the fundamentals of the national treatment protection and how they are applied by arbitral tribunals in claims for national treatment tax violations.
APA, Harvard, Vancouver, ISO, and other styles
28

Pennell, Jennifer Lyn. "State Cooperation on Regulatory Policies for Transboundary Environmental Issues." PDXScholar, 1995. https://pdxscholar.library.pdx.edu/open_access_etds/4937.

Full text
Abstract:
This research analyzes three contributing factors, perception, knowledge, and affordability, in order to estimate the likelihood of state cooperation on effective regulatory policies for transboundary environmental problems. The correlative hypothesis in this research postulates that states are more likely to support environmental regulatory policies when the issue is perceived by policymakers as serious, substantiated by a high level of knowledge, and affordable for the state. Regulatory policies for transboundary environmental issues require policymakers to act in foresight, employ precautionary measures, and cooperate. Cooperation implies that states will coordinate their policies and eschew their dominant strategy of independent decision making. However, this research contends that states decide to cooperate because they perceive the strategic interaction to be beneficial. Thus, the theory of cooperation in this research is consistent with realist assumptions of rational egoism.
APA, Harvard, Vancouver, ISO, and other styles
29

Peplow, Stephen. "What causes a cabinet to change its mind? the British farmer and the state 1818-2004." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/895.

Full text
Abstract:
The two centuries from 1818 to 2004 cover profound social and economic changes in what was, for much of the period, the most powerful country in the world. Britain led the way in moving capital and labour out of agriculture and into newer industries, such as coal-mining, textiles and transportation. The changes were accompanied by deep institutional changes, especially in the franchise. The rate of change is remarkable: within seventy years Britain was almost completely democratic, in contrast to the 'rotten boroughs' and virtual feudalism of the pre- 1832 unreformed Parliaments. The changes are mirrored in the role given to agriculture within society, and in particular the amount and type of economic rent transferred from the consumer and the taxpayer to the farmer. This thesis uses two centuries of data and 'survival analysis' statistical techniques to show that Olson's celebrated theory of collective action can be substantiated in a dynamic context. I show that as the share of farmers in the workforce diminishes, and their relative wealth shrinks, the probability of the Cabinet increasing protection grows. The reverse is also the case, showing that the Cabinet responds positively to pressures from a group whose utility was diminishing.
APA, Harvard, Vancouver, ISO, and other styles
30

Farantatos, Evangelos. "A predictive out-of-step protection scheme based on PMU enabled distributed dynamic state estimation." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45863.

Full text
Abstract:
Recent widespread blackouts have indicated the need for more efficient and accurate power system monitoring, control and protection tools. Power system state estimation, which is the major tool that is used nowadays for providing the real-time model of the system, has significant biases resulting mainly from the complexity and geographic spread and separation of an electric power system. Synchrophasor technology is a promising technology that has numerous advantages compared to conventional metering devices. PMUs provide synchronized measurements, where synchronization is achieved via a GPS clock which provides the synchronizing signal with accuracy of 1 μsec. As a result, the computed phasors have a common reference (UTC time) and can be used in local computations, thus distributing the state estimation process. The first part of the work presents a PMU enabled dynamic state estimator (DSE) that can capture with high fidelity the dynamics of the system and extract in real time the dynamic model of the system. The described DSE is performed in a decentralized way, on the substation level based on local measurements which are globally valid. The substation based DSE uses data from relays, PMUs, meters, FDRs etc in the substation only, thus avoiding all issues associated with transmission of data and associated time latencies. This approach enables very fast DSE update rate which can go up to more than 60 executions per second. The distributed state estimation architecture that synchrophasor technology enables, along with the fast sampling rate and the accuracy of the measurements that PMUs provide, enable the computation of the real-time dynamic model of the system and the development of numerous power system applications for more efficient control and protection of the system. In the second part of the work, a transient stability monitoring scheme is presented that utilizes the information given by the dynamic state estimation and enables real-time monitoring of the transient swings of the system and characterizes the stability of the system in real time. In particular, the real-time dynamic model of the system, as given by the DSE, is utilized to evaluate the system's energy function based on Lyapunov's direct method and extract stability properties from the energy function. The two major components of the scheme are a) the calculation of the center of oscillations of the system and b) the derivation of an equivalent, reduced sized model which is used for the calculation of the potential and kinetic energy of the system based on which the stability of the system is determined. Finally, as an application of the transient stability monitoring scheme, an energy based out-of-step protection scheme is proposed. The energy of the generator is continuously monitored and if it exceeds a predefined threshold then instability is asserted and a trip signal can be sent to the generator. The major advantage of the scheme is that the out-of-step condition is predicted before its occurrence and therefore relays can act much faster than today's technology. The scheme is compared to presently available state of the art out-of-step protection schemes in order to verify its superiority.
APA, Harvard, Vancouver, ISO, and other styles
31

Huang, He. "On the Protection of Link State Routing and Discovery of PKI Certificate Chains in MANET." NCSU, 2005. http://www.lib.ncsu.edu/theses/available/etd-07182005-123535/.

Full text
Abstract:
The growing awareness of the network vulnerability draws much attention to security from both the academic community and industrial society. Security is no longer a luxury but an independent and indispensable service to the current Internet. While various security mechanisms such as cryptographic and intrusion detection techniques have been proposed, designed, and even deployed in the field, the newly exposed network vulnerabilities and the emerging network technologies create new security challenges which make the existing security solutions either inefficient or insufficient. My Ph D research focuses on the efficient protection on link state routing and the self-organizing and self-dependent hierarchical public key certificate management in the emerging mobile ad hoc networks. The contributions of this thesis include two parts. In the first part, a cost reduced secure link state routing protocol with the capability of detecting disruptive links is proposed to efficiently protect the routing control messages (e.g., LSA) and trace the faulty intermediate routers; then a confidence extended routing mechanism enhanced with secure virtual links is designed to increase network reachability through selectively including the uncertain routers in packet relaying and further continuously monitoring the behaviors of those selected uncertain routers. A theoretical security analysis and an experimental evaluation are conducted to prove the feasibility and advantages of this new design under various rates of false alarms. In the second part, an approach is presented to discover the optimal PKI certificate path even without help from centralized certificate entities in the non-centralized and infrastructureless mobile ad hoc network and a secured and distributed certificate-chain searching protocol is developed to collect the needed certificates on the fly in the mobile ad hoc network.
APA, Harvard, Vancouver, ISO, and other styles
32

Henckels, Caroline Julia Sonja. "Balancing investment protection and regulatory autonomy : proportionality and standards of review in investor-state arbitration." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rejanovinschi, Talledo Moisés. "Consumer protection and State proposal in private self-regulation and administrative procedures: an initial approach." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/122805.

Full text
Abstract:
Are State proposals on private self-regulation and administrative procedures on consumption adequate? The present papper analyzes the challenges of its application, providing a final reflection on the complaints in social networks.<br>¿Son adecuadas las propuestas Estatales sobre autorregulación privada y procedimientos administrativos en materia de consumo? El presente artículo analiza los retos de su aplicación brindando una reflexión final acerca de los reclamos en redes sociales.
APA, Harvard, Vancouver, ISO, and other styles
34

Cunningham, Laura Lynn. "Federal, state, and local government interactions in the administration of wetland protection measures in Virginia." Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/43838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ellinas, Mikela. "The securitisation of information with reference to South Africa's Protection of State Information Bill 2010." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/60356.

Full text
Abstract:
The aim of this study is to analyse whether or not information has been securitised in South Africa. The degree of possible securitisation is assessed to determine the consequences of this securitised situation for the information-security nexus in South Africa. This premise is based primarily on the introduction of the Protection of State Information Bill, 2010 (hereinafter the Bill) which forms the case study. The Bill is posited by the state as a contribution to the country's information society and an enhancement of security-law to allow the State to combat threats in the Information Age. However, the Bill has received fierce criticism as a detractor to the democratic project of South Africa. The analysis of the paper is grounded in the framework of Securitisation Theory, derived from Critical Security Studies within the field of Security Studies. This theory explores the consideration of an issue or entity, as a security subject, ultimately removing the issue or entity from the public-political discourse. Accordingly, the study concludes that a partial securitisation of information has occurred in South Africa, but with justifiable defence and necessary cause. In spite of the often pejorative perspective of a securitised environment, this outcome is not necessarily detrimental to the democratic project. Not only does the proposed security law enhance the security of the country to facilitate the pursuit of national interests, it allows the state to compete more effectively and aggressively with its counterparts in the international milieu in the Information Age.<br>Mini Dissertation (M Security Studies)--University of Pretoria, 2016.<br>Political Sciences<br>M Security Studies<br>Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
36

Jasson, Da Costa Wendy Avril. "The impact of the protection of state information bill on media freedom in South Africa." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014619.

Full text
Abstract:
This thesis considers the impact which the Protection of State Information Bill will have on media freedom in South Africa. During apartheid, draconian laws prevented the media from reporting freely, and newspapers as well as the broadcast media were heavily censored. When the country became a democracy in 1994, the political grip on the media faded, and a new era of press freedom began. However, the Protection of State Information Bill is seen as a direct threat to that freedom. The Bill, also known as the Secrecy Bill, will classify state-related information and censor the media who make public or are found to be in possession of, classified information. For journalists this means that the way in which they report and what they report will be severely restricted. The Bill will also impact on the willingness of whistleblowers to come to the fore. This study looks at the importance of a free press, at how the Secrecy Bill evolved, and how opposition parties and civil society set about opposing it. It will examine democracy and its relationship with a free press, and do a policy analysis of the Bill. It will also look at how civil society organisations came together to oppose the Bill, and some of the changes which came about as a result of this opposition.
APA, Harvard, Vancouver, ISO, and other styles
37

Van, der Klashorst Etienne. "The reliability based design of composite beams for the fire limit state." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ajoku-Christopher, Onyenachi Ada. "Factors influencing the lack of dyslexia awareness and its impact on inclusive learning in selected primary schools in Owerri West Local Government Area, Imo state, Nigeria." Thesis, University of Greenwich, 2012. http://gala.gre.ac.uk/8956/.

Full text
Abstract:
This regional research was carried out in Owerri the capital of Imo State, one of the 36 states in Nigeria with the aim of investigating and identifying factors that are responsible for the lack of dyslexia awareness in the area. The study focused particularly on selected primary schools in Owerri West Local Government Area. The study is located in the context of contemporary discourse on dyslexia awareness in Owerri West. Primary source evidence and first hand information which were gathered through discussions and interviews with respondents confirms the status of originality on the findings of the research. Research carried out on database where nothing was found on dyslexia awareness in Owerri West is also evidence of originality of this study. The research sheds light on the effects the lack of dyslexia awareness has on teaching and learning in primary schools in Owerri West and in doing so draws attention to issues raised around the marginalisation of individuals with unidentified specific learning difficulties. A triangulation of qualitative data collection methods was employed to explore and understand disability beliefs, experiences, attitudes, behaviour and interactions with regards to the impact these have on inclusive practices. The findings from these studies were then analysed drawing on a range of disability models including the social model of dyslexia, the social, medical and moral models of disability, as well as social construction theory. This enabled the creation of a more explicit understanding of disability issues as it concerns the society investigated. The overall research findings, especially those derived from the interviews, highlight that factors affecting the lack of dyslexia awareness are located in the society’s predominant understanding of disability, the cultural perceptions of disability based on historical practices, incomprehensive disability definition featuring in policy and the lack of awareness of the nature and dimensions of invisible/hidden disabilities like dyslexia in national disability policy. Based on these findings the study concludes that ideologies around disability and inclusion are more geared towards the medical and moral models of disability. Furthermore, it concludes that the lack of an extensive understanding of disability and disability rights, which are very much features of a social model construct of disability, has impacted negatively on inclusive practices and perceived understanding of who is deemed educable. Following this, a number of recommendations were made including the need for robust teacher training programmes which will raise the awareness and understanding of dyslexia and in so doing improve the learning experiences of children with dyslexia.
APA, Harvard, Vancouver, ISO, and other styles
39

Genovese, Ann L. "The law, the state, and protection of the person : domestic violence in South Australia, 1981-1992 /." Title page, contents and preface only, 1992. http://web4.library.adelaide.edu.au/theses/09AR/09arg335.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Simon, Michael D. "Solid-state high power radio frequency directed energy systems in support of USMC force protection operations." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45944.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Service members are often vulnerable conducting entry control point operations in support of force or critical infrastructure protection. Historical evidence and tests from emerging technology suggest that solid-state high power radio frequency directed energy systems emit enough power to disrupt vehicle electronic systems without costly collateral damage to people or property. This thesis builds on previous research toward adding non-lethal tools, in the form of directed energy systems, for service members to utilize as part of entry control points. A combination of literature review, limited modelling, and field experimentation is used to explore whether directed energy is a viable, non-lethal tool for USMC entry control points. After detailed descriptions of force protection, directed energy, and a thorough system of systems analysis of the contemporary operating environment, this thesis offers an example of an entry control point augmented with a high-power radio frequency array. Further, this research recommends exploration of additional uses for this type of directed energy including counter-piracy and electronic ambush operations that utilize ground, air, and sea-based platforms.
APA, Harvard, Vancouver, ISO, and other styles
41

Zearfoss, Nancy N. "The structure of state utility commissions and protection of the captive ratepayer : is there a connection?" Connect to resource, 1997. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1261324544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Miller, Katherine. "Dating violence, protection orders, and gender inequality: A cross-state analysis of policy formulation and implementation." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587417069813169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bastin, Lucas. "State responsibility for omissions : establishing a breach of the full protection and security obligation by omissions." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:9e027b10-b749-4e56-a663-d58682aea06e.

Full text
Abstract:
The full protection and security obligation traditionally requires a State to exercise due diligence to prevent physical damage from being inflicted on foreign investments within its territory, and to provide a means of redress for aggrieved foreign investors. Recently, tribunals have expanded this application of the obligation such that States are obliged to exercise due diligence to afford legal or regulatory protection to foreign investments. Establishing a breach of the obligation involves establishing a State’s responsibility for its omissions. The law of State responsibility has nuances in respect of establishing a breach of non-absolute positive obligations, such as this one. Evidence of the State's knowledge of the need to act, and of its capacity to act, provide the basis on which a breach of the obligation may be established. Causation is also an element of the proof of a breach, and is to be established by reference to an adequate counter-factual. The standard to which one must establish a breach is contested – as between an objective and subjective standard, or a hybrid – albeit an objective standard of due diligence is preferable. In this context, recent tribunals have fashioned diagnostics for determining a breach of the obligation which invoke concepts of legitimate expectations, and reasonableness and rationality. Using these diagnostics means that the objective standard of proof is satisfied when an investor’s legitimate expectations are frustrated by the conduct of the State, or when the State fails to act reasonably and in order to achieve rational public policy goals. These diagnostics offer a useful and workable development in the articulation of the standard of proof in relation to a breach of the full protection and security obligation.
APA, Harvard, Vancouver, ISO, and other styles
44

Essic, Jefferson Forrest. "Applications of geographic information systems for growth management planning and water quality protection in the coastal region of North Carolina." Raleigh, NC : North Carolina State University, 1997. http://www.lib.ncsu.edu/etd/public/etd-2732139098580/ETD.PDF.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Baral, Bishwas. "Directional Comparison Bus Protection Using Superimposed Partial Operating Current Characteristics." ScholarWorks@UNO, 2019. https://scholarworks.uno.edu/td/2584.

Full text
Abstract:
Various directional comparison bus protection methods including widely used superimposed directional element method need to have both voltages and currents from all feeders connected to the zone of protection to find the direction of current for detecting a bus fault or a line fault. The purpose of the thesis is to present a new technique for directional comparison bus protection to discriminate a bus fault from line fault and normal condition. The new technique, which is implementing superimposed directional element method to modify partial operating current characteristics (POC) method to superimposed POC (SPOC) method, does not use voltages from feeders, hence capacitor voltage transformers (CVTs) are no longer needed in the zone of protection. The proposed technique was implemented in 4-bus and IEEE 14-bus test system and was tested using different fault cases including CT saturation and high impedance fault. The proposed technique, SPOC method was compared with POC method with both methods implemented in same test systems and tested with same fault cases. The results show that the proposed technique is successful to detect bus faults with high accuracy and high speed.
APA, Harvard, Vancouver, ISO, and other styles
46

Hamilton, Hymiar. "An impact study of DC protection techniques for shipboard power systems." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-07062007-144823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gärtner, Tanya, and Magnus Obermann. "The Role of the 'Coordinating State' in the Protection of the Underwater Cultural Heritage: An analysis of the cooperative jurisdictional regime of the UNESCO Convention for the Protection of the Underwater Cultural Heritage (2001) including relevant state practice." Beiträge des UNESCO-Lehrstuhls für Internationale Beziehungen, 2020. https://tud.qucosa.de/id/qucosa%3A70871.

Full text
Abstract:
The article at hand concerns itself with evaluating the impact the State Cooperation System has had on how underwater cultural heritage is dealt with in international waters. A total of six researched cases, including the infamous Titanic and the currently controversial San José, attest that the notion of the Coordinating State has yet to deliver a higher standard of protection for cultural assets underwater. Also, generic ramifications caused by the superficial configuration of the treaty, such as disregarding private stakeholders and elements of bureaucracy, are identified. The discontent with cooperative jurisdictional provisions seems to be omnipresent. This affirms the need for reforming the Convention itself, even in consideration of the sixth Meeting of State Parties’ Draft Ratification and Implementation Strategy. In order to provide a workable proposal for reform, the authors acknowledge the potential role model effect of existing systems of shared jurisdiction. In conclusion, it is suggested to upgrade the convention’s Scientific and Technical Advisory Body (STAB) and assign it the identification of underwater cultural heritage, notifying state parties with a verifiable link to the heritage site as well as taking emergency measures. This is consistent with missions the STAB has already deployed to assist state parties on-site and preliminary deliberations to strengthen the support and funding of the STAB in the aforementioned Draft Ratification and Implementation Strategy.
APA, Harvard, Vancouver, ISO, and other styles
48

Regmi, Dev Raj. "STATE OF ART TECHNIQUES FOR CONTROL AND PROTECTION OF DER INVERTERS UNDER ISLANDED AND GRID CONNECTED CONDITIONS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2706.

Full text
Abstract:
Microgrid technology and its application is being widely used in the power system for different advantages compared to conventional power plants. Since inverter have pivotal role in converting DC power from renewable sources to power grid, this thesis fundamentally focuses on correct modeling, design, control and protection of three-phase inverters either in islanded condition or grid-connected. Islanding occurs when part of the electric power system is isolated from the main power grid. Islanding occurs mainly in preplanned manner or in emergency cases. The planned islanding is done for maintenance of the grid. In general scenario, interconnecting any conventional generator to the power network will create parallel path. This parallel path leads to decrease in net impedance and fault current increases. But the case is different in case of Inverter interfaced system where the fault current level is quite low.For control and protection, different methods have been adopted. This thesis broadly explains on two control methods which are hysteresis and Pulse width modulation techniques. In addition, this project explores on harmonic injection type protection. Using MATLAB/Simulink for analysis, hysteresis and Pulse width modulation technique are modelled for obtaining desired level of current. Hysteresis is simple, provides stability, very fast response and good accuracy. Hysteresis method is based on variable switching frequency and uses dq Park transformation for controlling actual current within the lower and upper hysteresis band. The Pulse width modulation method uses a fixed frequency concept and generates pulses using PWM generator.
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Yafei. "La protection des travailleurs en Chine." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1099/document.

Full text
Abstract:
L'économie chinoise a connu une croissance économique importante depuis 30 ans, mais celle-ci n'a pas bénéficié aux travailleurs chinois, qui supportent toujours des conditions de travail très éprouvantes, avec un niveau de protection très insuffisant. Pourquoi les travailleurs chinois ne profitent-ils pas de ce développement économique ? Les causes sont multiples : outre le facteur démographique, la recherche prioritaire des intérêts économiques constitue la raison principale. Pourquoi faut-il améliorer la protection des travailleurs en Chine ? Et par quels moyens cette amélioration peut-elle se produire ? La thèse montre, d'une part, l'évolution et les mouvements de la classe ouvrière dans l'histoire chinoise, en comparant sa situation avant et après 1949, et les raisons, historiques et politiques, qui ont conduit le gouvernement chinois à négliger la protection des travailleurs, bien que ces derniers aient bénéficié d'une place privilégiée dans le système communiste. D'autre part, sont envisagés les moyens, politiques et législatifs, pour initier l'amélioration de cette protection. Pour cela, une réforme politique serait la solution radicale, impliquant une démocratisation à long terme et mettant l'accent sur la protection des droits de l'homme, et sur les droits des travailleurs en particulier Ce qui suppose notamment que soit garantie l'indépendance des syndicats. La protection des travailleurs est donc indissociable de la construction de l'Etat de Droit<br>Chinese economy has made significant progress for more than thirty years, but the Chinese laborers still benefit very little from the economic growth, who have to endure difficult working conditions with insufficient working protection. Why can the Chinese laborers not profit from the economic development? The pursuit for the economic interests as the highest priority is the main cause in addition to a large population. Why must the laborers' working protection be improved? By what means can this working protection be improved? This paper describes the history of the development of Chinese working class and workers' movement, especially the difference between before and after 1949 and analyzes the reasons why the Chinese government ignored the workers' protection from the point of history and politics, even the working class has preferential position in the Communist system. On the other, it analyzes the ways to improving the laborers' protection from the political and judicial points of view. In the long term, the political reform is the fundamental approach, which means the democracy and the protection of human rights, especially protecting the legitimate rights and interests of workers, which requires guaranteeing the independence of trade unions. The protection of workers' rights cannot be separated from the realization of a state under the rule of law as well
APA, Harvard, Vancouver, ISO, and other styles
50

Meana, Richard William Piper. "Approximate Sub-Graph Isomorphism For Watermarking Finite State Machine Hardware." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4728.

Full text
Abstract:
We present a method of mitigating theft of sequential circuit Intellectual Property hardware designs through means of watermarking. Hardware watermarking can be performed by selectively embedding a watermark in the state encoding of the Finite State Machine. This form of watermarking can be achieved by matching a directed graph representation of the watermark with a sub-graph in state transition graph representation of the FSM. We experiment with three approaches: a brute force method that provides a proof of concept, a greedy algorithm that provides excellent runtime with a drawback of sub-optimal results, and finally a simulated annealing method that provides near optimal solutions with runtimes that meet our performance goals. The simulated annealing approach when applied on a ten benchmarks chosen from IWLS 93 benchmark suite, provides watermarking results with edge overhead of less than 6% on average with runtimes not exceeding five minutes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!