Dissertations / Theses on the topic 'Offensive du'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Offensive du.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bommer, Felix. "Offensive Verletztenrechte im Strafprozess /." Bern : Stämpfli, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/50379712X.pdf.
Full textTruxal, Luke W. "The Failed Bombing Offensive: A Reexamination Of The Combined Bomber Offensive In 1943." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc103402/.
Full textKandakatla, Rajeshwari. "Identifying Offensive Videos on YouTube." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1484751212961772.
Full textLi, Minyan. "Tread along the line between edgy and offensive : a study of Chinese students' response toward offensive advertising." HKBU Institutional Repository, 2006. http://repository.hkbu.edu.hk/etd_ra/786.
Full textStaples, Zachary H. Michael Robert J. "Redefining attack : taking the offensive against networks /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FStaples.pdf.
Full textThesis advisor(s): Dan Moran, John Hiles, Rudy Darken. Includes bibliographical references (p. 134-138). Also available online.
Silva, Cleber Domingos Cunha da. "Education and medical ascetism: offensive from Nietzsche." Universidade Federal do CearÃ, 2010. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=5180.
Full textThe aim of this study is to demonstrate that as the doctor answers (responds) to the expectations of society in his task of promoting health, both he and those who are entrusted to him, develop a practice that I call medical asceticism. What the research tries to investigate is the pursuit of a healthy body as an ideal. The research was developed from the analysis of present speeches in platonic texts and its reflections in contemporary medical statements. The theoretical dialogue of the thesis emphasized the Nietzscheâs approach to the truth and moral. The arguments presented are divided in three books: 1- Medical Asceticism: a search of the truth as an ideal; 2- Medical scientific truth and moral and 3- Prognoses and prescriptions. Among the considerations pointed by the thesis, we checked the intersection between the practices of information and medical advisories and the search of a healthy life. The cult of the healthy life seems to be linked to the cult of the medical scientific truth and to the production of adjusted and submissive subjectivities. The medical ascetic ideal, observed in the production and consumption of truths appears like a demonstration of a game of forces, a will that Nietzsche called will to power.
O objetivo desse estudo à demonstrar que, na medida em que o mÃdico responde à expectativa da sociedade na sua tarefa de promover a saÃde, tanto ele como aqueles que lhe sÃo confiados desenvolvem uma prÃtica que denomino de ascetismo mÃdico. O que a pesquisa procura investigar à a busca do corpo saudÃvel como um ideal. A pesquisa se desenvolveu a partir da anÃlise de discursos presentes em textos platÃnicos e de suas ressonÃncias nos enunciados mÃdicos contemporÃneos. O diÃlogo teÃrico da tese privilegiou a abordagem nietzschiana sobre a verdade e a moral. Os argumentos apresentados estÃo divididos em trÃs livros: 1. Ascetismo mÃdico: a busca da verdade como ideal; 2. Verdade mÃdico-cientÃfica e moral e; 3. PrognÃsticos e prescriÃÃes. Entre as consideraÃÃes apontadas pela tese, verificamos o entrecruzamento entre as prÃticas de informaÃÃo e de aconselhamentos mÃdicos e a busca de uma vida saudÃvel. O culto à vida saudÃvel aparece ligado ao culto à verdade mÃdico-cientÃfica e à produÃÃo de subjetividades normalizadas e assujeitadas. O ideal ascÃtico mÃdico, verificado na produÃÃo e consumo de verdades, aparece como manifestaÃÃo de um jogo de forÃas, de uma vontade que Nietzsche denominou de Vontade de Poder.
Thomas, Daniel. "The Use of Force: Hard Offensive Counterterrorism." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1566914942650583.
Full textMichael, Robert J., and Zachary H. Staples. "Redefining attack: taking the offensive against networks." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1063.
Full textThis thesis done in cooperation with the MOVES Institute
The Information Age empowers individuals, and affords small groups an opportunity to attack states' interests with an increasing variety of tactics and great anonymity. Current strategies to prevail against these emerging threats are inherently defensive, relying on potential adversaries to commit mistakes and engage in detectable behavior. While defensive strategies are a critical component of a complete solution set, they cede initiative to the adversary. Moreover, reactive measures are not suited to quickly suppress adversary networks through force. To address this shortfall in strategic planning, the science of networks is rapidly making clear that natural systems built over time with preferential attachment form scale-free networks. These networks are naturally resilient to failure and random attack, but carry inherent vulnerabilities in their highly connected hubs. Taking the offensive against networks is therefore an exercise in discovering and attacking such hubs. To find these hub vulnerabilities in network adversaries, this thesis proposes a strategy called Stimulus Based Discovery, which leads to rapid network mapping and then systematically improves the accuracy and validity of this map while simultaneously degrading an adversary's network cohesion. Additionally, this thesis provides a model for experimenting with Stimulus Based Discovery in a Multi-Agent System.
Lieutenant, United States Navy
Krause, Jacob Allen. "Predicting Offensive Success in the National Football League." Thesis, The University of Arizona, 2012. http://hdl.handle.net/10150/271608.
Full textHarrah, Alan. "A goal-setting system for offensive football coaches." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-02022010-020135/.
Full textMarkwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Full textPàmies, Massip Marc. "Multilingual identification of offensive content in social media." Thesis, Linköpings universitet, Artificiell intelligens och integrerade datorsystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167381.
Full textAl-Shamisi, Ahmed. "Active offensive cyber situational awareness : theory and practice." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/13427.
Full textMiller, Romana. "The Soviet peace offensive: war by other means." Thesis, University of Reading, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577772.
Full textStai, Björn Eivind. "Operasjonskunst med moderne offensive luftoperasjoner - noe mer enn målvalg?" Thesis, Försvarshögskolan, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1726.
Full textThis thesis examines two basic questions. Does Western airpower practice operationalart as a guiding principle of warfare, and is operational art necessary to achieve successin modern air warfare? The purpose was to study whether the use of offensive airpowerwas set on the conceptual basis of operational art, used at the joint level of warfare, or ifit was just a question of “targeting”. The study applied Clausewitz’ theory of a “trinity”between what is commonly represented as the people, the military, and the governmentas its theoretical base. To reflect the relative complexity of the study, it used a methodof examining the questions from three different angles; theory, doctrine andemployment of offensive airpower. Through the study of these subjects and use ofairpower in Operation Desert Storm (and to a limited degree during Operation IraqiFreedom), the focus and essence of airpower is highlighted. Airpower theorists havealways tried to put emphasis on the unique capabilities of the airplane and operations inthe third dimension. Strategic use of airpower, they have proclaimed, is the best use ofairpower, tactical use, and especially in support to land, is the least effective. Much inopposition to and in competition with the older Navy and Army, a separate mission forthe Air Force has been stressed.Modern airpower doctrine has in large followed suit. At the same time operational art isbeing introduced as the conceptual basis for first land- and then joint operations. The aircampaign(s) in this study gives insight into an airpower shaped both by theory and bydoctrine. Modern airpower was used with success in operations that in large focus onoverwhelming force and superior technology, but at the same time tried to achieve someof the leverage and synergy of the joint battlespace. The study concludes that westernoffensive airpower up to now did not practice operational art in warfare, and that itsconcepts largely were founded on airpower specific theory and doctrine. It alsoconcludes that the trends shown in Iraq 2003 indicate a change toward a more jointthinking in the airpower community. It also concludes that airpower would be bestsuited to meet the challenges of modern warfare by considering employing the conceptof operational art in joint operations.
Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 02-04
Goodreau, Robin. "The use of vision during offensive ice hockey skills." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106535.
Full textLe but de cette étude était de déterminer si des différences existaient entre des joueurs de hockey de précision différente au niveau des caractéristiques visuelles lors de tirs du poignet. Un total de douze sujets ont participé à cette étude; cinq ont été placés dans le groupe AS (précis) et sept dans le groupe IS (inexactes) post-hoc. La tâche des sujets consistait à recevoir une passe à partir d'un assistant, suivie par l'exécution d'un tir des poignets à l'une des deux cibles sur le filet. Chaque sujet a effectué 90 tirs au total, parmi ces derniers 60 étaient effectuer avec une limite de temps (pression) et 30 tirs sans aucune contrainte de temps. Chaque sujet a exécuté le protocole portant un modèle 501 Head Mounted Eye Tracker (Applied Science Laboratories, Bedford, MA) qui a permis d'identifier et d'enregistrer la ligne de vision, enregistré à 60 Hz. Les résultats indiquent que pour la condition sous pression, le groupe AS regardait la cible à atteindre pour une plus longue durée que le groupe IS avant la rondelle ne quitte le bâton. Les résultats ont également révélé que le groupe AS a été capable de déplacer leur regard de la rondelle (sur la glace) au filet plus rapidement. Quand aucune contrainte de temps n'était imposée aux sujets, aucune différence significative dans les caractéristiques des regards ont été trouvés entre les deux groupes de précision. Cependant, le groupe AS a été en mesure d'améliorer considérablement la précision de leurs résultats lors des lancers sans pression. Pour de futures études, il serait important de déterminer si ces mêmes différences existent, ou s'il ya des écarts plus grand lorsqu'un gardien de but se trouve devant le filet.
Smith, Michael Ross. "Modeling the Performance of a Baseball Player's Offensive Production." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1189.pdf.
Full textSmith, Tyler B. (Tyler Bradford). "Decision algorithms for Unmanned Underwater Vehicles during offensive operations." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/35081.
Full textIncludes bibliographical references (p. 115-117).
The field of research involving autonomous vehicles has expanded greatly over the past decade. This thesis addresses the case of a system of Unmanned Underwater Vehicles (UUVs) operating in littoral areas in an offensive capacity. A series of complementary algorithms were designed to collect information about an enemy vessell, and subsequently use this information to both select and move to a prefered intercept location that maximizes the opportunity to both re-acquire and destroy an enemy vessel. Additionally, within the context of a specifically designed simulation, key parameter changes were analyzed to determine their effectiveness to improve the system's performance as measured by four measures of effectiveness. A methodology was also designed to optimize the location of the engaging UUVs to maximize their effectiveness, and capitalize on the enemy movement within the operational area. Results are presented for both original locations and optimized locations, and initial findings provide insight into the effectiveness of the designed algorithms and statistical inference of these key parameter changes.
by Tyler B. Smith.
S.M.
Wardle, Madelyn. "Offensive Cyber Operations: An Examination of Their Revolutionary Capabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright1620995515559657.
Full textPrifti, Bledar. "Continuation in US Foreign Policy: An Offensive Realist Perspective." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5384.
Full textCasula, Camilla. "Transfer Learning for Multilingual Offensive Language Detection with BERT." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412450.
Full textElam, Donald Emmett. "Attacking the infrastructure : exploring potential uses of offensive information warfare /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA311391.
Full text"June 1996." Thesis advisor(s): Dan C. Boger, Vicente Garcia. Includes bibliographical references (p. 177-184). Also available online.
Turner, Charles A. P. "American leadership and decision-making failures in the Tet Offensive /." Fort Leavenworth, Kan. : [U.S. Army Command and General Staff College], 2003. http://handle.dtic.mil/100.2/ADA416144.
Full textClendening, Michael, James New, Alejandro Cuevas, Van Ngo, Amritpal Dhindsa, Amrish Patel, Dennis Hopkins, et al. "C4I architecture supporting conduct of defensive and offensive joint ASW." Monterey, California, 2008. http://hdl.handle.net/10945/6987.
Full textMozafari, Marzieh. "Hate speech and offensive language detection using transfer learning approaches." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS007.
Full textThe great promise of social media platforms (e.g., Twitter and Facebook) is to provide a safe place for users to communicate their opinions and share information. However, concerns are growing that they enable abusive behaviors, e.g., threatening or harassing other users, cyberbullying, hate speech, racial and sexual discrimination, as well. In this thesis, we focus on hate speech as one of the most concerning phenomenon in online social media.Given the high progression of online hate speech and its severe negative effects, institutions, social media platforms, and researchers have been trying to react as quickly as possible. The recent advancements in Natural Language Processing (NLP) and Machine Learning (ML) algorithms can be adapted to develop automatic methods for hate speech detection in this area.The aim of this thesis is to investigate the problem of hate speech and offensive language detection in social media, where we define hate speech as any communication criticizing a person or a group based on some characteristics, e.g., gender, sexual orientation, nationality, religion, race. We propose different approaches in which we adapt advanced Transfer Learning (TL) models and NLP techniques to detect hate speech and offensive content automatically, in a monolingual and multilingual fashion.In the first contribution, we only focus on English language. Firstly, we analyze user-generated textual content to gain a brief insight into the type of content by introducing a new framework being able to categorize contents in terms of topical similarity based on different features. Furthermore, using the Perspective API from Google, we measure and analyze the toxicity of the content. Secondly, we propose a TL approach for identification of hate speech by employing a combination of the unsupervised pre-trained model BERT (Bidirectional Encoder Representations from Transformers) and new supervised fine-tuning strategies. Finally, we investigate the effect of unintended bias in our pre-trained BERT based model and propose a new generalization mechanism in training data by reweighting samples and then changing the fine-tuning strategies in terms of the loss function to mitigate the racial bias propagated through the model. To evaluate the proposed models, we use two publicly available datasets from Twitter.In the second contribution, we consider a multilingual setting where we focus on low-resource languages in which there is no or few labeled data available. First, we present the first corpus of Persian offensive language consisting of 6k micro blog posts from Twitter to deal with offensive language detection in Persian as a low-resource language in this domain. After annotating the corpus, we perform extensive experiments to investigate the performance of transformer-based monolingual and multilingual pre-trained language models (e.g., ParsBERT, mBERT, XLM-R) in the downstream task. Furthermore, we propose an ensemble model to boost the performance of our model. Then, we expand our study into a cross-lingual few-shot learning problem, where we have a few labeled data in target language, and adapt a meta-learning based approach to address identification of hate speech and offensive language in low-resource languages
Warwick, James. "THE EFFICACY OF COUNTER-PRESSING AS AN OFFENSIVE-DEFENSIVE PHILOSOPHY." Miami University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=miami1564743483963884.
Full textBasha, Lawrence O. "An examination of overt offensive military operations outside of combat zones." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FBasha.pdf.
Full textThesis Advisor(s): Peter J. Gustaitis, James Russell. "December 2006." Includes bibliographical references (p. 61-70). Also available in print.
Cantelmo, Robert G. "Hegemonic ambition| Offensive Realist Prescriptions for Regional Hegemons in External Regio." Thesis, The George Washington University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10002419.
Full textAt the conclusion of the Cold War, many hoped the international system had finally escaped the harsh realities of geopolitics. Despite optimism about the emergence of an American-led unipolar system, some structural realists believed the abatement of geopolitics was a temporary phenomenon: a brief respite before a return to great power conflict. This gloomy worldview gave rise to the sub-school of offensive realism, which theorizes that states pursue relative power maximization to ensure survival and, ideally, regional hegemony. A relatively young school, offensive realism has primarily focused on the paths states take to pursue bids for regional hegemony. This study seeks to fill some of the gaps that exist in how great powers, having achieved regional hegemony, behave abroad. Support for this research is drawn from a review of existing literature on offensive realism and a case study on U.S. behavior following 1898.
Cullen, Timothy M. "Lethality, legality, and reality : non-lethal weapons for offensive air support /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=a2337c60-326b-4da1-ba03-8aa903e963d9&rs=PublishedSearch.
Full textGriffin, Amy J. "Dually Involved Youth: Exploring Child Welfare Involvement, Maltreatment, and Offensive Severity." Thesis, Boston College, 2014. http://hdl.handle.net/2345/bc-ir:103618.
Full textThesis advisor: Thomas M. Crea
Youth involved with both the child welfare and juvenile justice systems are referred to as dually involved youth. Children involved in the child welfare system are highly vulnerable for maladaptive outcomes, and in particular, engagement in delinquent behaviors. Those youth who criminally offend are likely to shift back and forth between the two systems, potentially increasing their vulnerability for poor outcomes. The theoretical bases for this study are derived from ecological systems and attachment theories, specifically the influence of trauma on attachment. The Massachusetts Department of Children and Families (DCF) and the Department of Youth Services (DYS) provided the data for this secondary analysis of the characteristics of dually involved youth and the factors related to offense severity for youth committed to DYS. The study explored: 1) the relationship of gender, race, and age of delinquency commitment to offense severity; 2) the influence of child welfare involvement (measured by total unique count of social workers, home removal, and out-of-home placement) to offense severity; 3) the influence of prior maltreatment to offense severity; and 4) the association of gender and race to the likelihood of dual involvement. Results indicated that while maltreatment was found to be significantly associated with more severe offenses, greater child welfare involvement was associated with less severe offenses. Additionally, the results indicated that female juvenile delinquents were significantly more likely to be dually involved. The issues of racial disproportionality within the juvenile justice and child welfare systems were examined. While results did not indicate statistical significance in determining the likelihood of dual involvement based on race, disproportionality in the juvenile justice system exists. Implications for policy changes included the following: 1) the need for gender specific programming, 2) an increased commitment to reducing disproportionality in the child welfare and juvenile justice systems, 3) increased focus on multisystem services to meet the needs of youth. Strategies for using kinship placements as an avenue to maintain familial connections are discussed. Additional research is needed to explore the influence of the interaction between gender and race, mental health and environment factors (e.g., poverty, neighborhood characteristics) on likelihood of dual involvement
Thesis (PhD) — Boston College, 2014
Submitted to: Boston College. Graduate School of Social Work
Discipline: Social Work
Berglund, Nils. "Assessing defensive and offensive aspects of bacterial infection using computer simulations." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/387222/.
Full textIrfan, Orhan. "Offensive or Neoclassical Realism? How a Great Power Shapes Its Environment." Thesis, Uppsala universitet, Institutionen för informatik och media, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446418.
Full textLarsson, Forsberg Albin, and Theodor Olsson. "IoT Offensive Security Penetration Testing : Hacking a Smart Robot Vacuum Cleaner." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254233.
Full textDredger, John Anthony. "Offensive spending: tactics and procurement in the Habsburg military, 1866-1918." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/15684.
Full textDepartment of History
David Stone
This manuscript reveals the primary causes of Habsburg defeat both in 1866 and in 1914-1918. The choice of offensive strategy and tactics against an enemy possessing superior weaponry in the Austro-Prussian War and opponents with superior numbers and weapons in the First World War resulted in catastrophe. The inferiority of the Habsburg forces in both wars stemmed from imprudent spending decisions during peacetime rather than conservatism or parliamentary stinginess. The desire to restore the sunken prestige of Austria-Hungary and prove Habsburg great power status drove the military to waste money on an expensive fleet and choose offensive tactics to win great victories. This study shows the civil-military interaction in regard to funding and procurement decisions as well as the deep intellectual debates within the army, which refute the idea that the Habsburg military remained opposed to technology or progress.
Pyne, Sean. "Quantifying the Trenches: Machine Learning Applied to NFL Offensive Lineman Valuation." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1686.
Full textBechthold, Derek R. "The ghost in the machine, the creation of the Passchendaele offensive, 1917." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0006/MQ34876.pdf.
Full textGallas, Alexander. "Offensive completed : a neo-Poulantzasian analysis of the Thatcherite era, 1977-1999." Thesis, Lancaster University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539668.
Full textBuckner, Julian M. "Battle of the ‘Bulge’: A boutique offensive in M&A advisory." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/826.
Full textMansour, Opher. "Offensive images : censure and censorship in Rome under Clement VIII, 1592-1605." Thesis, Courtauld Institute of Art (University of London), 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408674.
Full textSchwarzat, Sven, and Dörte Poelzig. "Ein Repetitorium für alle: Die Leipziger Examens-Offensive „LEO“ an der Juristenfakultät." Klemm+Oelschläger, 2020. https://ul.qucosa.de/id/qucosa%3A71181.
Full textSund, Joakim. "Words and Meaning in Gaming : 'World of Warcraft' and 'Counterstrike Global Offensive'." Thesis, Högskolan Väst, Avd för utbildningsvetenskap och språk, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-14908.
Full textWillatzen, Jeppe, and Edin Karakurt. "Competitive Level Design : A study on Counter-Strike: Global Offensive Level Design." Thesis, Uppsala universitet, Institutionen för speldesign, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-416170.
Full textKwan, Yiu-keung John, and 關耀強. "Odour control & legislation for the large offensive smell facilities in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31253416.
Full textKwan, Yiu-keung John. "Odour control & legislation for the large offensive smell facilities in Hong Kong /." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B17457324.
Full textAyad, Nihal Ismail Ahmed. "Can offensive advertising strategies survive the perceptions of the Millennial Muslims in Egypt?" Thesis, Cardiff Metropolitan University, 2017. http://hdl.handle.net/10369/9936.
Full textJohansson, Felicia. "September 11, 2001 - Why? : A qualitative case study with the purpose to study U.S. dominance and its enemy." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-107313.
Full textMehmedi, Meki. "Processkartläggning : Fokus på offensiv kvalitetsutveckling." Thesis, Uppsala universitet, Institutionen för teknikvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353413.
Full textMånga organisationer arbetar idag med offensive kvalitetsutveckling för att möta förändringar på marknaden och samhället i stort. I studien har ett dykarföretag studerats utifrån principer från offensive kvalitetsutveckling. Företaget omsätter cirka 80–90 miljoner och har 50 anställda. Organisationen har precis påbörjat ett förändringsarbete för att förankra kvalitet i verksamheten. Syftet med studien har varit att kartlägga organisationens huvudprocesser samt ta fram ett underlag till det fortsatta förbättringsarbetet. Med hjälp av intervjuer, observationer och workshops har ett första utkast av en processkartläggning kunnat genomföras. Studien har också använt sig av olika förbättringsverktyg för att analysera risker och orsaker med processkartläggning. Teorier kring hörnstensmodellen och PDSA-cykeln har legat till grund för att strukturerat genomföra undersökningen på organisationen.
Henningsson, Ida. "EU och Ryssland : En fallstudie över hur The Eastern Partnership har påverkat relationen mellan de två parterna." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-79942.
Full textAdmiral, Mark A. "The evolution of Russian offensive air warfare theory : from deep battle to aerospace war /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA272608.
Full textButtle, John W. "The shift from defensive to offensive policing : CS spray and the use of force." Thesis, Bangor University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.417257.
Full text