To see the other types of publications on this topic, follow the link: Offensive du.

Dissertations / Theses on the topic 'Offensive du'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Offensive du.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bommer, Felix. "Offensive Verletztenrechte im Strafprozess /." Bern : Stämpfli, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/50379712X.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Truxal, Luke W. "The Failed Bombing Offensive: A Reexamination Of The Combined Bomber Offensive In 1943." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc103402/.

Full text
Abstract:
For decades nations have debated how to successfully employ air power. In 1943 the United States and Great Britain launched a massive strategic bombing campaign against Germany. The two sides agreed to a flawed plan due to the fundamental differences on bombing doctrine. As a result, the campaign was fraught with issues that remained largely unresolved in 1943. Without a clearly defined plan, the Allies were unable to determine which commands or targets received priority throughout the offensive. This ultimately led to a confused and unfocused campaign. High losses and inconclusive results derailed the American bombing effort. By November, the two sides agreed that the entire bombing offensive was either behind schedule or had failed entirely.
APA, Harvard, Vancouver, ISO, and other styles
3

Kandakatla, Rajeshwari. "Identifying Offensive Videos on YouTube." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1484751212961772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Minyan. "Tread along the line between edgy and offensive : a study of Chinese students' response toward offensive advertising." HKBU Institutional Repository, 2006. http://repository.hkbu.edu.hk/etd_ra/786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Staples, Zachary H. Michael Robert J. "Redefining attack : taking the offensive against networks /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FStaples.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2003. Thesis (M.S. in Computer Science and M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Dan Moran, John Hiles, Rudy Darken. Includes bibliographical references (p. 134-138). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Cleber Domingos Cunha da. "Education and medical ascetism: offensive from Nietzsche." Universidade Federal do CearÃ, 2010. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=5180.

Full text
Abstract:
nÃo hÃ
The aim of this study is to demonstrate that as the doctor answers (responds) to the expectations of society in his task of promoting health, both he and those who are entrusted to him, develop a practice that I call medical asceticism. What the research tries to investigate is the pursuit of a healthy body as an ideal. The research was developed from the analysis of present speeches in platonic texts and its reflections in contemporary medical statements. The theoretical dialogue of the thesis emphasized the Nietzscheâs approach to the truth and moral. The arguments presented are divided in three books: 1- Medical Asceticism: a search of the truth as an ideal; 2- Medical scientific truth and moral and 3- Prognoses and prescriptions. Among the considerations pointed by the thesis, we checked the intersection between the practices of information and medical advisories and the search of a healthy life. The cult of the healthy life seems to be linked to the cult of the medical scientific truth and to the production of adjusted and submissive subjectivities. The medical ascetic ideal, observed in the production and consumption of truths appears like a demonstration of a game of forces, a will that Nietzsche called will to power.
O objetivo desse estudo à demonstrar que, na medida em que o mÃdico responde à expectativa da sociedade na sua tarefa de promover a saÃde, tanto ele como aqueles que lhe sÃo confiados desenvolvem uma prÃtica que denomino de ascetismo mÃdico. O que a pesquisa procura investigar à a busca do corpo saudÃvel como um ideal. A pesquisa se desenvolveu a partir da anÃlise de discursos presentes em textos platÃnicos e de suas ressonÃncias nos enunciados mÃdicos contemporÃneos. O diÃlogo teÃrico da tese privilegiou a abordagem nietzschiana sobre a verdade e a moral. Os argumentos apresentados estÃo divididos em trÃs livros: 1. Ascetismo mÃdico: a busca da verdade como ideal; 2. Verdade mÃdico-cientÃfica e moral e; 3. PrognÃsticos e prescriÃÃes. Entre as consideraÃÃes apontadas pela tese, verificamos o entrecruzamento entre as prÃticas de informaÃÃo e de aconselhamentos mÃdicos e a busca de uma vida saudÃvel. O culto à vida saudÃvel aparece ligado ao culto à verdade mÃdico-cientÃfica e à produÃÃo de subjetividades normalizadas e assujeitadas. O ideal ascÃtico mÃdico, verificado na produÃÃo e consumo de verdades, aparece como manifestaÃÃo de um jogo de forÃas, de uma vontade que Nietzsche denominou de Vontade de Poder.
APA, Harvard, Vancouver, ISO, and other styles
7

Thomas, Daniel. "The Use of Force: Hard Offensive Counterterrorism." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1566914942650583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Michael, Robert J., and Zachary H. Staples. "Redefining attack: taking the offensive against networks." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1063.

Full text
Abstract:
Approved for public release; distribution is unlimited
This thesis done in cooperation with the MOVES Institute
The Information Age empowers individuals, and affords small groups an opportunity to attack states' interests with an increasing variety of tactics and great anonymity. Current strategies to prevail against these emerging threats are inherently defensive, relying on potential adversaries to commit mistakes and engage in detectable behavior. While defensive strategies are a critical component of a complete solution set, they cede initiative to the adversary. Moreover, reactive measures are not suited to quickly suppress adversary networks through force. To address this shortfall in strategic planning, the science of networks is rapidly making clear that natural systems built over time with preferential attachment form scale-free networks. These networks are naturally resilient to failure and random attack, but carry inherent vulnerabilities in their highly connected hubs. Taking the offensive against networks is therefore an exercise in discovering and attacking such hubs. To find these hub vulnerabilities in network adversaries, this thesis proposes a strategy called Stimulus Based Discovery, which leads to rapid network mapping and then systematically improves the accuracy and validity of this map while simultaneously degrading an adversary's network cohesion. Additionally, this thesis provides a model for experimenting with Stimulus Based Discovery in a Multi-Agent System.
Lieutenant, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
9

Krause, Jacob Allen. "Predicting Offensive Success in the National Football League." Thesis, The University of Arizona, 2012. http://hdl.handle.net/10150/271608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Harrah, Alan. "A goal-setting system for offensive football coaches." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-02022010-020135/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Full text
Abstract:
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and computers to see different information within the same PDF documents. This dissertation lastly describes some future work efforts, identifying some potential vulnerabilities in the automated enforcement of copyright protection for audio (particularly music) in online systems such as YouTube.
APA, Harvard, Vancouver, ISO, and other styles
12

Pàmies, Massip Marc. "Multilingual identification of offensive content in social media." Thesis, Linköpings universitet, Artificiell intelligens och integrerade datorsystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167381.

Full text
Abstract:
In today’s society there is a large number of social media users that are free to express their opinion on shared platforms. The socio-cultural differences between the people behind those accounts (in terms of ethnicity, gender, sexual orientation, religion, politics, . . . ) give rise to an important percentage of online discussions that make use of offensive language, which often affects in a negative way the psychological well-being of the victims. In order to address the problem, the endless stream of user-generated content engenders a need to find an accurate and scalable solution to detect offensive language using automated methods. This thesis explores different approaches to the offensiveness detection task focusing on five different languages: Arabic, Danish, English, Greek and Turkish. The results obtained using Support Vector Machines (SVM), Convolutional Neural Networks (CNN) and the Bidirectional Encoder Representations from Transformers (BERT) are compared, achieving state-of-the-art results with some of the methods tested. The effect of the embeddings used, the dataset size, the class imbalance percentage and the addition of sentiment features are studied and analysed, as well as the cross-lingual capabilities of pre-trained multilingual models.
APA, Harvard, Vancouver, ISO, and other styles
13

Al-Shamisi, Ahmed. "Active offensive cyber situational awareness : theory and practice." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/13427.

Full text
Abstract:
There is an increasing gap between the progress of technological systems and the successful exploitation of these systems through cyber-attack. Whilst the mechanism and scope of cyberspace is progressing with each passing day, risk factors and the ability to process the required amount of data from cyberspace efficiently are proving to be major obstacles to achieving desired outcomes from cyber operations. This, coupled with the dramatic increase in the numbers of cyber attackers, who are constantly producing new ways of attacking and paralysing cyber systems for political or financial gain, is a critical issue for countries that have linked their major infrastructures with Internet applications. The defensive methods currently applied to counter these evolving attacks are no longer sufficient, due to their preventive and reactive nature. This research has developed a new Active Situational Awareness theoretical model for Active Defence that aims to enhance the agility and quality of cyber situational awareness in organisations in order to counter cyber attacks. Situational Awareness (SA) is a crucial component in every organisation. It helps in the assessment of an immediate situation in relation to the environment. Current SA models adopt a reactive attitude, which responds to events and works in passive manner to any progressing enemy cyber attack. This creates a defensive mind-set and consequently influences the operator to process and utilise knowledge only within the concept of attack prevention. Thus, one can assume that operators will only gather certain knowledge after the occurrence of an attack, instead of actively searching for new intelligence to create new knowledge about the cyber attack before it takes place. This research study introduces a new approach that incorporates an Active Defence posture; namely, a ‘winning attitude’ that conforms to the military stratagems of Sun Tzu, where operators always engage attackers directly in order to create new knowledge in an agile manner by deploying active intelligence-gathering techniques to inform active defence postures in cyberspace. This also allows the system being protected to remain one step ahead of the attackers to ultimately defeat them and thwart any costly attacks. To back these statements, this study issued a survey to 200 cyber defence and security experts in order to collect data on their opinions concerning the current state of Active SA. Structural Equation Modelling (SEM) was then employed to analyse the data gathered from the survey. The results of the analysis revealed significant importance of Active Offensive Intelligence gathering in enhancing Cyber SA. The SEM showed there is a significant impact on SA Agility and Quality from Active Intelligence gathering activities. Further to this, the SEM results informed the design of the serious gaming environments utilised in this research to verify the SEM causality model. Also, the SEM informed the design of a SA assessment metric, where a behavioural anchor rating scale was used along with ground truth to measure participant SA performance. The results of this experiment revealed that there was 2 times better enhancement in cyber Situational awareness among those who did utilise active measures compared with participants who did not which mean almost double and this shows the importance of offensive intelligence gathering in enhancing cyber SA and speed up defender decision making and OODA loop. This research provided for the first time a novel theory for active cyber SA that is aligned with military doctrine. Also, a novel assessment framework and approaches for evaluating and quantifying cyber SA performance was developed in this research study. Finally, a serious gaming environment was developed for this research and used to evaluate the active SA theory which has an impact on training, techniques and practice Deception utilisation by Active groups revealed the importance of having deception capabilities as part of active tools that help operators to understand attackers’ intent and motive, and give operators more time to control the impact of cyber attacks. However, incorrect utilisation of deception capabilities during the experiment led operators to lose control over cyber attacks. Active defence is required for future cyber security. However, this trend towards the militarisation of cyberspace demands new or updated laws and regulations at an international level. Active intelligence methods define the principal capability at the core of the new active situational awareness model order in to deliver enhanced agility and quality in cyber SA.
APA, Harvard, Vancouver, ISO, and other styles
14

Miller, Romana. "The Soviet peace offensive: war by other means." Thesis, University of Reading, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577772.

Full text
Abstract:
Abstract At the end of the 20th century, the Soviet Union dissolved its Communist Empire and East and West Germany reunited. These dramatic events were preceded by Soviet consolidation of the world socialist and peace movements with assistance from the European Left, especially in West Germany. On the other side of the Iron Curtain, newly emerged independent peace groups, such as Charter 77, also played a significant role. In the process, West Germany realigned itself with the Soviet Union, diminishing the role of the United States and Great Britain in Europe. This shift was a direct result of the Soviet long-term peace offensive policy, which was originally devised by V. I. Lenin to defeat capitalism worldwide. The Soviet peace offensive sought the creation of a common security system, disarmament, and the withdrawal of U.S. troops and weapons from Europe. As soon as the communist facade disappeared and the image of the enemy faded, many Western policymakers and analysts stopped paying attention to the fact that Russia continued to pursue the same strategic objectives in Europe after the dissolution of the Soviet Union. Russia's long-term strategic and geopolitical interests remained the same. Could Russia, some twenty years later, be closer to fulfilling these goals?
APA, Harvard, Vancouver, ISO, and other styles
15

Stai, Björn Eivind. "Operasjonskunst med moderne offensive luftoperasjoner - noe mer enn målvalg?" Thesis, Försvarshögskolan, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1726.

Full text
Abstract:
Denne studien har hatt som mål å undersøke om vestlig offensiv luftmakt benytteroperasjonskunst i planlegging og gjennomføring av militære operasjoner, og omoperasjonskunst er nødvendig for effektiv utnyttelse av luftmakt? Hensikten har vært å seom det konsept som er valgt på felles (joint) nivå - operasjonskunst - også brukes avluftkomponenten. Som teoriforankring har studien benyttet en operasjonalisering avClausewitz sin teori om nødvendigheten av en balanse i ”treenigheten” mellom folket,feltherren og fyrsten, og metoden har innebært å studere problemet utifra tre uvahenigevariabler; teori, doktriner og praksis. Empiridelen omfatter dermed en studie av tekster frabåde operasjonskunstens utvikling, og såvel tidligere luftmaktsteoretikere som mermoderne teorier (Warden, Boyd og effekt baserte operasjoner). NATO og amerikanskefelles- og luftforsvarsdoktriner ble studert for å påvise eventuelle relasjoner til studiensspørsmål. Den praktiske bruk av moderne offensiv luftmakt ble undersøkt ved å studereluftkampanjen under operasjon Desert Storm i 1991, og noen av de trender som tegnet seg ioperasjon Iraqi Freedom i 2003.Studiens resultat viser at vestlig offensiv luftmakt i liten grad har kjent til og benyttetteoriene rundt begrepet operasjonskunst, og at dens konsepter har vært mye tuftet påluftspesifikk teori og doktrine. Videre konkluderer den med at noen av effektene avoperasjonskunst likevel kommer frem i praksis, og at trendene som Irakkrigen tegner tyderpå en større fokus på fellesoperasjoner også i luftmiljøet. Studien konkluderer til slutt medat luftmakten kan være best tjent med å ta til seg konseptet med operasjonskunst for å ståbest mulig rustet til å møte de forskjellige utfordringer i moderne krigføring.
This thesis examines two basic questions. Does Western airpower practice operationalart as a guiding principle of warfare, and is operational art necessary to achieve successin modern air warfare? The purpose was to study whether the use of offensive airpowerwas set on the conceptual basis of operational art, used at the joint level of warfare, or ifit was just a question of “targeting”. The study applied Clausewitz’ theory of a “trinity”between what is commonly represented as the people, the military, and the governmentas its theoretical base. To reflect the relative complexity of the study, it used a methodof examining the questions from three different angles; theory, doctrine andemployment of offensive airpower. Through the study of these subjects and use ofairpower in Operation Desert Storm (and to a limited degree during Operation IraqiFreedom), the focus and essence of airpower is highlighted. Airpower theorists havealways tried to put emphasis on the unique capabilities of the airplane and operations inthe third dimension. Strategic use of airpower, they have proclaimed, is the best use ofairpower, tactical use, and especially in support to land, is the least effective. Much inopposition to and in competition with the older Navy and Army, a separate mission forthe Air Force has been stressed.Modern airpower doctrine has in large followed suit. At the same time operational art isbeing introduced as the conceptual basis for first land- and then joint operations. The aircampaign(s) in this study gives insight into an airpower shaped both by theory and bydoctrine. Modern airpower was used with success in operations that in large focus onoverwhelming force and superior technology, but at the same time tried to achieve someof the leverage and synergy of the joint battlespace. The study concludes that westernoffensive airpower up to now did not practice operational art in warfare, and that itsconcepts largely were founded on airpower specific theory and doctrine. It alsoconcludes that the trends shown in Iraq 2003 indicate a change toward a more jointthinking in the airpower community. It also concludes that airpower would be bestsuited to meet the challenges of modern warfare by considering employing the conceptof operational art in joint operations.
Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 02-04
APA, Harvard, Vancouver, ISO, and other styles
16

Goodreau, Robin. "The use of vision during offensive ice hockey skills." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106535.

Full text
Abstract:
The purpose of this study was to determine if any differences in gaze characteristics existed between accurate and inaccurate shooting groups. A total of twelve subjects participated in this study; five of which were placed in the AS group (accurate) and seven in the IS group (inaccurate) post-hoc. The task required the subjects to receive a pass from an assistant, followed by the execution of a wrist shot at one of two targets on net. Each subject performed 90 total shots which included 60 shots with a time pressure condition and 30 shots without any time constraints. Passes were directed to either the forehand or backhand of the subject for the time pressure task, while during the task with no time pressure passes were only directed to the forehand. Each subject executed the protocol wearing an eye tracking system which identified their eye-line-of-gaze which was recorded at 60 Hz. The results indicated that for the forehand reception / time pressure condition the AS group gazed at the net and target (combined time) for a significantly longer (p < 0.049) duration (0.191 s ± 0.020) prior to the shot release, than the IS group (0.136 s ± 0.017). The backhand reception / time pressure condition yielded similar results regarding this gaze characteristic. The results of the forehand reception / time pressure condition also revealed that the AS group was able to shift their gaze from the puck (on the ice) to the net in a significantly shorter (p < 0.014) duration of time (0.157 s ± 0.023) than the IS group (0.238 s ± 0.019). When no time constraints were placed on the subjects, no significant differences in gaze characteristics were found between the two accuracy groups. However, the AS group was able to significantly improve (p< 0.042) their accuracy results in the no time pressure condition (M=57.3% to 70.7%) while the IS group (M=28.1% to 30.0%) was not able to do so. The results of the present study suggest that accurate shooters in ice hockey are able to transfer their gaze to the net in a significantly shorter duration of time which ultimately allows them to gaze at the net and target for a significantly longer duration of time in comparison to an inaccurate shooter. These factors in combination with the kinematics of the shooter may help to determine the accuracy of a shooter in ice hockey. Verifying if these same differences exist, or if there are any more discrepancies when a goaltender is present in the net may be the next step for future studies.
Le but de cette étude était de déterminer si des différences existaient entre des joueurs de hockey de précision différente au niveau des caractéristiques visuelles lors de tirs du poignet. Un total de douze sujets ont participé à cette étude; cinq ont été placés dans le groupe AS (précis) et sept dans le groupe IS (inexactes) post-hoc. La tâche des sujets consistait à recevoir une passe à partir d'un assistant, suivie par l'exécution d'un tir des poignets à l'une des deux cibles sur le filet. Chaque sujet a effectué 90 tirs au total, parmi ces derniers 60 étaient effectuer avec une limite de temps (pression) et 30 tirs sans aucune contrainte de temps. Chaque sujet a exécuté le protocole portant un modèle 501 Head Mounted Eye Tracker (Applied Science Laboratories, Bedford, MA) qui a permis d'identifier et d'enregistrer la ligne de vision, enregistré à 60 Hz. Les résultats indiquent que pour la condition sous pression, le groupe AS regardait la cible à atteindre pour une plus longue durée que le groupe IS avant la rondelle ne quitte le bâton. Les résultats ont également révélé que le groupe AS a été capable de déplacer leur regard de la rondelle (sur la glace) au filet plus rapidement. Quand aucune contrainte de temps n'était imposée aux sujets, aucune différence significative dans les caractéristiques des regards ont été trouvés entre les deux groupes de précision. Cependant, le groupe AS a été en mesure d'améliorer considérablement la précision de leurs résultats lors des lancers sans pression. Pour de futures études, il serait important de déterminer si ces mêmes différences existent, ou s'il ya des écarts plus grand lorsqu'un gardien de but se trouve devant le filet.
APA, Harvard, Vancouver, ISO, and other styles
17

Smith, Michael Ross. "Modeling the Performance of a Baseball Player's Offensive Production." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1189.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Smith, Tyler B. (Tyler Bradford). "Decision algorithms for Unmanned Underwater Vehicles during offensive operations." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/35081.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2006.
Includes bibliographical references (p. 115-117).
The field of research involving autonomous vehicles has expanded greatly over the past decade. This thesis addresses the case of a system of Unmanned Underwater Vehicles (UUVs) operating in littoral areas in an offensive capacity. A series of complementary algorithms were designed to collect information about an enemy vessell, and subsequently use this information to both select and move to a prefered intercept location that maximizes the opportunity to both re-acquire and destroy an enemy vessel. Additionally, within the context of a specifically designed simulation, key parameter changes were analyzed to determine their effectiveness to improve the system's performance as measured by four measures of effectiveness. A methodology was also designed to optimize the location of the engaging UUVs to maximize their effectiveness, and capitalize on the enemy movement within the operational area. Results are presented for both original locations and optimized locations, and initial findings provide insight into the effectiveness of the designed algorithms and statistical inference of these key parameter changes.
by Tyler B. Smith.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
19

Wardle, Madelyn. "Offensive Cyber Operations: An Examination of Their Revolutionary Capabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright1620995515559657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Prifti, Bledar. "Continuation in US Foreign Policy: An Offensive Realist Perspective." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5384.

Full text
Abstract:
This dissertation is a study of US foreign policy that aims at maintaining its regional hegemonic status and preventing the emergence of another regional hegemon by implementing the offshore balancing strategy. US intervention during the 2003 Iraq War, strained US-Iran relationship, and the establishment of the Islamic State of Iraq and the Levant (ISIL) in early 2014 compel a reevaluation of US foreign policy. Two major claims of this dissertation include: (1) US foreign policy is consistent with offensive realist theoretical claims; and (2) US foreign policy is characterized by continuity when it comes to issues related to America's strategic interests. Utilizing a case study and comparative case study methodology, this dissertation outlines the following findings. The first finding of this dissertation is that US foreign policy actions under the Bush Doctrine, which led to the 2003 Iraq War, were dictated by the anarchic status of the international system, the possession by Iraq of military capabilities that could harm or destroy America, fear from and suspicion of Iraq's intentions, the need to ensure survival in an anarchic system, and the need to maximize relative power vis-à-vis other states. All these factors led to three main pattern of behavior: fear, self-help, and power maximization. Because there was no other regional great power capable and willing to balance Iraq, the US was forced to rely on direct balancing by threatening Iraq to take military actions, creating an anti-Iraqi alliance, and maximizing its relative power by destroying Iraq's military capabilities. Second, US foreign policy under the Bush Doctrine was a continuation of the 20th century foreign policy. US foreign policy during the 20th century was dictated by three major patterns of behavior: fear, self-help, and power maximization. In realizing its foreign policy goals, the US had to rely on buck-passing and balancing strategies. Whenever there was no regional great power able and willing "to carry the buck", the US would rely on direct balancing by either threatening the aggressor, creating alliances with other regional states, or utilizing additional resources of its own. Four major presidential doctrines and related occurrences were utilized to test the claim: the Roosevelt Corollary, the Truman Doctrine, the Carter Doctrine, and the Reagan Doctrine. The last finding of this dissertation is that US foreign policy toward Iran constitutes continuity and is dictated by US need to maintain regional hegemony by acting as an offshore balancer. In addition, the US and Iran share mutual strategic interests in several occasions, and a strategic win or loss for one state is a win or loss for the other. Like that of the US, Iran's foreign policy is guided by rationality. The Iran-Contra affair, the Armenia-Azerbaijan conflict, and the Russia-Chechnya conflict support the claim that Iran's foreign policy is based on rationality instead of religious ideology as argued by many scholars. Also, the 2001 Afghanistan war, the 2003 Iraq war, and the establishment of the ISIL support the claim that the US and Iran share mutual strategic interests. Cooperation is often desirable and in some cases inevitable. Despite this strong claim, US-Iran relationship has its own limitations because neither the US nor Iran would accept a too powerful other that could establish absolute dominance in the region.
APA, Harvard, Vancouver, ISO, and other styles
21

Casula, Camilla. "Transfer Learning for Multilingual Offensive Language Detection with BERT." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412450.

Full text
Abstract:
The popularity of social media platforms has led to an increase in user-generated content being posted on the Internet. Users, masked behind what they perceive as anonymity, can express offensive and hateful thoughts on these platforms, creating a need to detect and filter abusive content. Since the amount of data available on the Internet is impossible to analyze manually, automatic tools are the most effective choice for detecting offensive and abusive messages. Academic research on the detection of offensive language on social media has been on the rise in recent years, with more and more shared tasks being organized on the topic. State-of-the-art deep-learning models such as BERT have achieved promising results on offensive language detection in English. However, multilingual offensive language detection systems, which focus on several languages at once, have remained underexplored until recently. In this thesis, we investigate whether transfer learning can be useful for improving the performance of a classifier for detecting offensive speech in Danish, Greek, Arabic, Turkish, German, and Italian. More specifically, we first experiment with using machine-translated data as input to a classifier. This allows us to evaluate whether machine translated data can help classification. We then experiment with fine-tuning multiple pre-trained BERT models at once. This parallel fine-tuning process, named multi-channel BERT (Sohn and Lee, 2019), allows us to exploit cross-lingual information with the goal of understanding its impact on the detection of offensive language. Both the use of machine translated data and the exploitation of cross-lingual information could help the task of detecting offensive language in cases in which there is little or no annotated data available, for example for low-resource languages. We find that using machine translated data, either exclusively or mixed with gold data, to train a classifier on the task can often improve its performance. Furthermore, we find that fine-tuning multiple BERT models in parallel can positively impact classification, although it can lead to robustness issues for some languages.
APA, Harvard, Vancouver, ISO, and other styles
22

Elam, Donald Emmett. "Attacking the infrastructure : exploring potential uses of offensive information warfare /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA311391.

Full text
Abstract:
Thesis (M.S. in Systems Technology [Command, Control and Communications (C3)]) Naval Postgraduate School, June 1996.
"June 1996." Thesis advisor(s): Dan C. Boger, Vicente Garcia. Includes bibliographical references (p. 177-184). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
23

Turner, Charles A. P. "American leadership and decision-making failures in the Tet Offensive /." Fort Leavenworth, Kan. : [U.S. Army Command and General Staff College], 2003. http://handle.dtic.mil/100.2/ADA416144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Clendening, Michael, James New, Alejandro Cuevas, Van Ngo, Amritpal Dhindsa, Amrish Patel, Dennis Hopkins, et al. "C4I architecture supporting conduct of defensive and offensive joint ASW." Monterey, California, 2008. http://hdl.handle.net/10945/6987.

Full text
Abstract:
The Anti-Submarine Warfare (ASW) community requires a fully operational Command, Control, Communications, Computers, and Intelligence (C4I) architecture to significantly reduce time from sensor detection to defensive weapons release. The United States Navy has established programs of record leveraging space, terrestrial, and maritime communications capabilities extending to fiscal year 2015. An ordered systems engineering process was performed to derive requirements and identify Joint ASW C4I Architecture strengths and weaknesses. This architecture is dependent upon the ASW community’s ability to leverage current and planned technologies impacting C4I areas including common operational tactical picture delivery, data transmission rate, time latency, and data fusion processes. Performance forecasts for identified alternatives were modeled and simulated based on a synthesized operational scenario using the EXTEND simulation tool, and life cycle cost estimates were produced for each alternative. Based on those outcomes, one of the several alternatives is recommended for implementation. In addition, it was discovered that programmed C4I capabilities lack an integrated fielding plan and do not properly align in FY2020. Furthermore, the ASW community must make process changes to enable cross-program manager collaboration supported by a single system architect to ensure robust architectures are fielded by 2020.
APA, Harvard, Vancouver, ISO, and other styles
25

Mozafari, Marzieh. "Hate speech and offensive language detection using transfer learning approaches." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS007.

Full text
Abstract:
Une des promesses des plateformes de réseaux sociaux (comme Twitter et Facebook) est de fournir un endroit sûr pour que les utilisateurs puissent partager leurs opinions et des informations. Cependant, l’augmentation des comportements abusifs, comme le harcèlement en ligne ou la présence de discours de haine, est bien réelle. Dans cette thèse, nous nous concentrons sur le discours de haine, l'un des phénomènes les plus préoccupants concernant les réseaux sociaux.Compte tenu de sa forte progression et de ses graves effets négatifs, les institutions, les plateformes de réseaux sociaux et les chercheurs ont tenté de réagir le plus rapidement possible. Les progrès récents des algorithmes de traitement automatique du langage naturel (NLP) et d'apprentissage automatique (ML) peuvent être adaptés pour développer des méthodes automatiques de détection des discours de haine dans ce domaine.Le but de cette thèse est d'étudier le problème du discours de haine et de la détection des propos injurieux dans les réseaux sociaux. Nous proposons différentes approches dans lesquelles nous adaptons des modèles avancés d'apprentissage par transfert (TL) et des techniques de NLP pour détecter automatiquement les discours de haine et les contenus injurieux, de manière monolingue et multilingue.La première contribution concerne uniquement la langue anglaise. Tout d'abord, nous analysons le contenu textuel généré par les utilisateurs en introduisant un nouveau cadre capable de catégoriser le contenu en termes de similarité basée sur différentes caractéristiques. En outre, en utilisant l'API Perspective de Google, nous mesurons et analysons la « toxicité » du contenu. Ensuite, nous proposons une approche TL pour l'identification des discours de haine en utilisant une combinaison du modèle non supervisé pré-entraîné BERT (Bidirectional Encoder Representations from Transformers) et de nouvelles stratégies supervisées de réglage fin. Enfin, nous étudions l'effet du biais involontaire dans notre modèle pré-entraîné BERT et proposons un nouveau mécanisme de généralisation dans les données d'entraînement en repondérant les échantillons puis en changeant les stratégies de réglage fin en termes de fonction de perte pour atténuer le biais racial propagé par le modèle. Pour évaluer les modèles proposés, nous utilisons deux datasets publics provenant de Twitter.Dans la deuxième contribution, nous considérons un cadre multilingue où nous nous concentrons sur les langues à faibles ressources dans lesquelles il n'y a pas ou peu de données annotées disponibles. Tout d'abord, nous présentons le premier corpus de langage injurieux en persan, composé de 6 000 messages de micro-blogs provenant de Twitter, afin d'étudier la détection du langage injurieux. Après avoir annoté le corpus, nous réalisons étudions les performances des modèles de langages pré-entraînés monolingues et multilingues basés sur des transformeurs (par exemple, ParsBERT, mBERT, XLM-R) dans la tâche en aval. De plus, nous proposons un modèle d'ensemble pour améliorer la performance de notre modèle. Enfin, nous étendons notre étude à un problème d'apprentissage multilingue de type " few-shot ", où nous disposons de quelques données annotées dans la langue cible, et nous adaptons une approche basée sur le méta-apprentissage pour traiter l'identification des discours de haine et du langage injurieux dans les langues à faibles ressources
The great promise of social media platforms (e.g., Twitter and Facebook) is to provide a safe place for users to communicate their opinions and share information. However, concerns are growing that they enable abusive behaviors, e.g., threatening or harassing other users, cyberbullying, hate speech, racial and sexual discrimination, as well. In this thesis, we focus on hate speech as one of the most concerning phenomenon in online social media.Given the high progression of online hate speech and its severe negative effects, institutions, social media platforms, and researchers have been trying to react as quickly as possible. The recent advancements in Natural Language Processing (NLP) and Machine Learning (ML) algorithms can be adapted to develop automatic methods for hate speech detection in this area.The aim of this thesis is to investigate the problem of hate speech and offensive language detection in social media, where we define hate speech as any communication criticizing a person or a group based on some characteristics, e.g., gender, sexual orientation, nationality, religion, race. We propose different approaches in which we adapt advanced Transfer Learning (TL) models and NLP techniques to detect hate speech and offensive content automatically, in a monolingual and multilingual fashion.In the first contribution, we only focus on English language. Firstly, we analyze user-generated textual content to gain a brief insight into the type of content by introducing a new framework being able to categorize contents in terms of topical similarity based on different features. Furthermore, using the Perspective API from Google, we measure and analyze the toxicity of the content. Secondly, we propose a TL approach for identification of hate speech by employing a combination of the unsupervised pre-trained model BERT (Bidirectional Encoder Representations from Transformers) and new supervised fine-tuning strategies. Finally, we investigate the effect of unintended bias in our pre-trained BERT based model and propose a new generalization mechanism in training data by reweighting samples and then changing the fine-tuning strategies in terms of the loss function to mitigate the racial bias propagated through the model. To evaluate the proposed models, we use two publicly available datasets from Twitter.In the second contribution, we consider a multilingual setting where we focus on low-resource languages in which there is no or few labeled data available. First, we present the first corpus of Persian offensive language consisting of 6k micro blog posts from Twitter to deal with offensive language detection in Persian as a low-resource language in this domain. After annotating the corpus, we perform extensive experiments to investigate the performance of transformer-based monolingual and multilingual pre-trained language models (e.g., ParsBERT, mBERT, XLM-R) in the downstream task. Furthermore, we propose an ensemble model to boost the performance of our model. Then, we expand our study into a cross-lingual few-shot learning problem, where we have a few labeled data in target language, and adapt a meta-learning based approach to address identification of hate speech and offensive language in low-resource languages
APA, Harvard, Vancouver, ISO, and other styles
26

Warwick, James. "THE EFFICACY OF COUNTER-PRESSING AS AN OFFENSIVE-DEFENSIVE PHILOSOPHY." Miami University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=miami1564743483963884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Basha, Lawrence O. "An examination of overt offensive military operations outside of combat zones." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FBasha.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis (Irregular Warfare) and M.A. in National Security Affairs (Stabilization and Reconstruction))--Naval Postgraduate School, December 2006.
Thesis Advisor(s): Peter J. Gustaitis, James Russell. "December 2006." Includes bibliographical references (p. 61-70). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
28

Cantelmo, Robert G. "Hegemonic ambition| Offensive Realist Prescriptions for Regional Hegemons in External Regio." Thesis, The George Washington University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10002419.

Full text
Abstract:

At the conclusion of the Cold War, many hoped the international system had finally escaped the harsh realities of geopolitics. Despite optimism about the emergence of an American-led unipolar system, some structural realists believed the abatement of geopolitics was a temporary phenomenon: a brief respite before a return to great power conflict. This gloomy worldview gave rise to the sub-school of offensive realism, which theorizes that states pursue relative power maximization to ensure survival and, ideally, regional hegemony. A relatively young school, offensive realism has primarily focused on the paths states take to pursue bids for regional hegemony. This study seeks to fill some of the gaps that exist in how great powers, having achieved regional hegemony, behave abroad. Support for this research is drawn from a review of existing literature on offensive realism and a case study on U.S. behavior following 1898.

APA, Harvard, Vancouver, ISO, and other styles
29

Cullen, Timothy M. "Lethality, legality, and reality : non-lethal weapons for offensive air support /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=a2337c60-326b-4da1-ba03-8aa903e963d9&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Griffin, Amy J. "Dually Involved Youth: Exploring Child Welfare Involvement, Maltreatment, and Offensive Severity." Thesis, Boston College, 2014. http://hdl.handle.net/2345/bc-ir:103618.

Full text
Abstract:
Thesis advisor: Ruth G. McRoy
Thesis advisor: Thomas M. Crea
Youth involved with both the child welfare and juvenile justice systems are referred to as dually involved youth. Children involved in the child welfare system are highly vulnerable for maladaptive outcomes, and in particular, engagement in delinquent behaviors. Those youth who criminally offend are likely to shift back and forth between the two systems, potentially increasing their vulnerability for poor outcomes. The theoretical bases for this study are derived from ecological systems and attachment theories, specifically the influence of trauma on attachment. The Massachusetts Department of Children and Families (DCF) and the Department of Youth Services (DYS) provided the data for this secondary analysis of the characteristics of dually involved youth and the factors related to offense severity for youth committed to DYS. The study explored: 1) the relationship of gender, race, and age of delinquency commitment to offense severity; 2) the influence of child welfare involvement (measured by total unique count of social workers, home removal, and out-of-home placement) to offense severity; 3) the influence of prior maltreatment to offense severity; and 4) the association of gender and race to the likelihood of dual involvement. Results indicated that while maltreatment was found to be significantly associated with more severe offenses, greater child welfare involvement was associated with less severe offenses. Additionally, the results indicated that female juvenile delinquents were significantly more likely to be dually involved. The issues of racial disproportionality within the juvenile justice and child welfare systems were examined. While results did not indicate statistical significance in determining the likelihood of dual involvement based on race, disproportionality in the juvenile justice system exists. Implications for policy changes included the following: 1) the need for gender specific programming, 2) an increased commitment to reducing disproportionality in the child welfare and juvenile justice systems, 3) increased focus on multisystem services to meet the needs of youth. Strategies for using kinship placements as an avenue to maintain familial connections are discussed. Additional research is needed to explore the influence of the interaction between gender and race, mental health and environment factors (e.g., poverty, neighborhood characteristics) on likelihood of dual involvement
Thesis (PhD) — Boston College, 2014
Submitted to: Boston College. Graduate School of Social Work
Discipline: Social Work
APA, Harvard, Vancouver, ISO, and other styles
31

Berglund, Nils. "Assessing defensive and offensive aspects of bacterial infection using computer simulations." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/387222/.

Full text
Abstract:
Bacterial infections pose a significant problem in the modern world. An alarming increase in multi-drug resistant bacteria has become a serious source of concern, with a steep rise in reported cases of sepsis and deaths related to bacterial infection. New drugs are necessary for the treatment and management of bacterial infection, including new broad spectrum antibiotics capable of killing multi-drug resistant bacteria as well as anti-septic drugs for the management of severe bacterial infections. This thesis investigates antimicrobial peptides, that have shown promise as antibiotics due to their broadspectrum range. They are of particular interest as they do not target specific proteins that can be easily altered through point mutations, but rather the bacterial membrane itself, making the emergence of resistance rarer. Understanding the structure-function relationship of these peptides could help design new antibiotics capable of killing resistant strains of bacteria. The other aspect investigated in this thesis is the function of immune receptors TLR4 and CD14, both part of the TLR4 signalling pathway. In sepsis, it is believed that over-activation of the TLR4 pathway contributes to the over-production of pro-inflammatory cytokines that lead to septic shock. Understanding the behavior of these receptors in different environments is important as the identification of potential drug targets could be beneficial to the development of immunomodulatory drugs and the prevention of septic shock. Overall this thesis covers both the offensive aspect of dealing with bacterial infections, eradicating bacteria, and the defensive aspect, understanding the innate immune system and modulating its activity to prevent sepsis associated death.
APA, Harvard, Vancouver, ISO, and other styles
32

Irfan, Orhan. "Offensive or Neoclassical Realism? How a Great Power Shapes Its Environment." Thesis, Uppsala universitet, Institutionen för informatik och media, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446418.

Full text
Abstract:
This thesis aims to shed light on the differences between offensive and a specific version of neoclassical realism on their expectations regarding how a great power shapes its environment. The neoclassical framework proposed in this work constitutes an independent variable captured by the polarity in the system, an intervening variable of state capacity, and a dependent variable of revisionist foreign policy. It is argued that along with multipolarity and bipolarity, there is a need to incorporate unipolarity in structural realist accounts. Analysed from this perspective, great powers feel high external pressure due to the nature of unipolarity, which diminishes the value of pure structural frameworks. In this respect, the incorporation of state-level factors provides more reliable analyses for explaining anxious great powers` strive for regional hegemony. As a result, neoclassical realism is better equipped to explain Russia`s revisionist foreign policy.
APA, Harvard, Vancouver, ISO, and other styles
33

Larsson, Forsberg Albin, and Theodor Olsson. "IoT Offensive Security Penetration Testing : Hacking a Smart Robot Vacuum Cleaner." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254233.

Full text
Abstract:
IoT devices can be found in almost any type of situation as the availability and viability of them has surged in the last decade with technological advancements. The purpose of this project is to investigate how secure these types of devices, in particular a robot vacuum cleaner, actually are if an ill intended actor tries to interfere with the device. Different methods used in the sphere of threat modeling and penetration testing were applied and tested with the result coming back positive. The robot vacuum cleaner was successfully compromised and the privacy of the owner could be violated applying the attacks used. The current way of thinking about privacy and security of IoT devices could therefore need to be reviewed.
APA, Harvard, Vancouver, ISO, and other styles
34

Dredger, John Anthony. "Offensive spending: tactics and procurement in the Habsburg military, 1866-1918." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/15684.

Full text
Abstract:
Doctor of Philosophy
Department of History
David Stone
This manuscript reveals the primary causes of Habsburg defeat both in 1866 and in 1914-1918. The choice of offensive strategy and tactics against an enemy possessing superior weaponry in the Austro-Prussian War and opponents with superior numbers and weapons in the First World War resulted in catastrophe. The inferiority of the Habsburg forces in both wars stemmed from imprudent spending decisions during peacetime rather than conservatism or parliamentary stinginess. The desire to restore the sunken prestige of Austria-Hungary and prove Habsburg great power status drove the military to waste money on an expensive fleet and choose offensive tactics to win great victories. This study shows the civil-military interaction in regard to funding and procurement decisions as well as the deep intellectual debates within the army, which refute the idea that the Habsburg military remained opposed to technology or progress.
APA, Harvard, Vancouver, ISO, and other styles
35

Pyne, Sean. "Quantifying the Trenches: Machine Learning Applied to NFL Offensive Lineman Valuation." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1686.

Full text
Abstract:
There are 32 teams in the National Football League all competing to be the best by creating the strongest roster possible. The problem of evaluating talent has created extreme competition between teams in the form of a rookie draft and a fiercely competitive veteran free agent market. The difficulty with player evaluation is due to the noise associated with measuring a particular player’s value. The intent of this paper is to create an algorithm for identifying the inefficiencies in pricing in these player markets. In particular, this paper focuses on the veteran free agent market for offensive linemen in the NFL. NFL offensive linemen are difficult to evaluate empirically because of the significant amount of noise present due to an inability to measure a lineman’s performance directly. The algorithm first uses a machine learning technique, k-means cluster analysis, to generate a comparative set of offensive lineman. Then using that set of comparable offensive linemen, the algorithm flags any lineman that vary significantly in earnings from their peers. It is in this fashion that the algorithm provides relative valuations for particular offensive lineman.
APA, Harvard, Vancouver, ISO, and other styles
36

Bechthold, Derek R. "The ghost in the machine, the creation of the Passchendaele offensive, 1917." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0006/MQ34876.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Gallas, Alexander. "Offensive completed : a neo-Poulantzasian analysis of the Thatcherite era, 1977-1999." Thesis, Lancaster University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539668.

Full text
Abstract:
I use a neo-Poulantzasian conceptual framework and argue that Thatcherite politics were specific in terms of how they addressed class relations. The Thatcherites marginalised working class militants and implemented a repressive form of trade union law by exploiting divisions in the trade union movement and the Labour Party. In addition, their privatisation of council houses and liberalisation of the mortgage and consumer credit markets tended to cover up inter-class divides and deepen intra-class divides. Accordingly, I see Thatcherism as a class political regime, that is, a relatively coherent ensemble of policies aimed at reproducing capitalist class domination. I contend that this was flanked by the emergence of an authoritarian neo-Ricardian regime in the areas of economic and state policy. The Thatcherites were committed to >free competition<, whilst also extending the state's repressive capacities. On the whole, they facilitated both an offensive of the power bloc and a neoliberal regime shift. As a result, class relations of forces shifted from an impasse to the dominance of capital. Thanks to the Thatcherites defeating their adversaries in the trade union movement, this shift became entrenched and their offensive became stabilised - something unprecedented in the post-war era. At the point of victory, however, divisions over strategy emerged among leading circles in the Conservative party. Consequently, they failed to respond to the transition from an offensive to a consolidating step of the power bloc. Thatcherism eroded and was eventually replaced by Blairism as the next class political regime, whilst authoritarian neo-Ricardianism remained.
APA, Harvard, Vancouver, ISO, and other styles
38

Buckner, Julian M. "Battle of the ‘Bulge’: A boutique offensive in M&A advisory." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/826.

Full text
Abstract:
This paper examines 878 mergers and acquisitions between 2003 and 2012 to investigate the impact of advisor choice on transaction performance. Differentiating between bulge bracket, boutique and mixed team advisors, this analysis uses cumulative abnormal announcement returns, purchase premiums, completion ratios, and deal durations as indicators of outcome. Using ordinary least squares and probit regressions an analysis of premium outcomes and target abnormal returns point to there being significant shareholder benefits to using boutique advisors. However, the use of boutiques significantly increases the length of the transaction, and appears to have no impact on the likelihood of a successful completion.
APA, Harvard, Vancouver, ISO, and other styles
39

Mansour, Opher. "Offensive images : censure and censorship in Rome under Clement VIII, 1592-1605." Thesis, Courtauld Institute of Art (University of London), 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Schwarzat, Sven, and Dörte Poelzig. "Ein Repetitorium für alle: Die Leipziger Examens-Offensive „LEO“ an der Juristenfakultät." Klemm+Oelschläger, 2020. https://ul.qucosa.de/id/qucosa%3A71181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Sund, Joakim. "Words and Meaning in Gaming : 'World of Warcraft' and 'Counterstrike Global Offensive'." Thesis, Högskolan Väst, Avd för utbildningsvetenskap och språk, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-14908.

Full text
Abstract:
Online gaming is a relatively modern phenomenon that is not older than 20 years. Most online players speak English in some form, either by talking or writing. The two games, 'World of Warcraft' and 'Counterstrike' have taken over the gaming-world and the gamers' language has found its way right into the dictionary. The aim of the study was to examine how meanings of language change or evolve in the context of online video game playing. In this study, two gameplay videos were transcribed and analysed both qualitatively and quantitatively. Gaming words were identified through calculating word frequency in terms of types and tokens, and these identified words were then analysed qualitatively. The result contains three categories: Contextual Meaning, New Meaning, and New Words. The concepts of Contextual, New meaning and New Words were compared to dictionary meanings to see whether new meanings were created in the context of the gaming world. Based on the result, the study suggests that game language can influence the overall usage of language in the future.
APA, Harvard, Vancouver, ISO, and other styles
42

Willatzen, Jeppe, and Edin Karakurt. "Competitive Level Design : A study on Counter-Strike: Global Offensive Level Design." Thesis, Uppsala universitet, Institutionen för speldesign, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-416170.

Full text
Abstract:
Counter-Strike: Global Offensive stands as one, if not the most popular competitive video game of all time. In fact, tens of millions are awarded at Esports tournaments – a testament to the game’s popularity. As such, game designers should seek to understand exactly why the Counter-Strike series is so popular. One critical element to any game like Counter-Strike is the level design. This study attempts to provide an analysis of competitive level design by looking at the differences between a highly popular Counter-Strike level, Dust2, and one that is considerably less popular, Cobblestone.  Level design has already been scrutinized heavily by game designers throughout the years, and this also applies to Counter-Strike. The trend has mainly been to analyze levels from a high-level perspective, however. We hope that our study will contribute to the existing knowledge from an exceedingly low-level perspective. The study relies on data acquired from the massive Counter-Strike statistics database HLTV.org which primarily consist of 2 heat-maps that display hotspots for “killer locations” on the levels’ Bombsites. These heat-maps have since been subjected to two formal analyses and a subsequent comparative analysis. The study found that the occurrence of several indicators of flawed level design are present in Cobblestone. These flaws contrast with the level design principles and guidelines laid out by experienced designers. As such, the study concludes that these flaws are the primary contributing factors to the drop in popularity for Cobblestone. However, the study also acknowledges the need for an expanded study comprising the entire levels and involving other types of data
APA, Harvard, Vancouver, ISO, and other styles
43

Kwan, Yiu-keung John, and 關耀強. "Odour control & legislation for the large offensive smell facilities in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31253416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kwan, Yiu-keung John. "Odour control & legislation for the large offensive smell facilities in Hong Kong /." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B17457324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ayad, Nihal Ismail Ahmed. "Can offensive advertising strategies survive the perceptions of the Millennial Muslims in Egypt?" Thesis, Cardiff Metropolitan University, 2017. http://hdl.handle.net/10369/9936.

Full text
Abstract:
This study explores what Millennial (Generation Y) Muslims in Egypt perceive as offensive in offensive advertising and the reasons behind their offence. It aims to define religiosity from their point of view and to investigate if it has an effect on their attitudes and purchase intentions/behaviours. Therefore, the study raised enquiries about key concepts such as the definition of offensive advertising, attitudes towards offensive advertising, religiosity and behaviours of Millennial Muslims in Egypt. The researcher explores the Millennial Muslims perceptions and attitudes towards offence, offensive advertising and religiosity through focus group discussions, oneto- one interviews and solicited diaries. The research design used in the study is an interpretivistic philosophy with an exploratory purpose, inductive approach and grounded theory strategy. The study revealed in-depth data concerning the Shababs’ profiles, characteristics, personalities, views on religion and religiosity and their attitudes towards offensive advertising. The research established that religiosity has no effect on the perceptions or behaviours of the Millennial Muslims in Egypt since parental influence has the greater effect even on their religiosity, which yielded two new behavioural models pertinent to the Millennial Muslims in Egypt. The Millennial Muslims in Egypt face depression caused by an identity crisis and an inferiority complex. This depression created a new behaviour in the Millennial Muslims in Egypt where offensive ads annoy/upset them but do not reach the severity of offending them. Consequently, a new list of offensive advertising themes/executions was created based on the Millennial Muslims perceptions of provocative ads. Finally, practical implications were given with ideas for future researchers.
APA, Harvard, Vancouver, ISO, and other styles
46

Johansson, Felicia. "September 11, 2001 - Why? : A qualitative case study with the purpose to study U.S. dominance and its enemy." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-107313.

Full text
Abstract:
On September 11, 2001 United States faced the most massive terrorist attack in the history, one that killed nearly 3000 people. A tragedy followed by enormous consequences considering the collapse of the World Trade Center, as two hijacked planes crashed into the twin towers in New York City, one plane crashed into Pentagon and another domestic scheduled passenger flight, that crashed into a field in Somerset County, Pennsylvania. This qualitative case study will examine whether the attacks on 9/11 was a backlash to U.S. political dominance globally. This study will also examine to what extent the policy making executed by the Bush administration post 9/11, was a demonstration of hegemony and political dominance based on offensive realism. The conclusion of this study was that to a large extent, the attacks on 9/11 was a backlash to U.S. political dominance and to a large extent the Bush administration's response to 9/11 can be defined as hegemony based on offensive realism.
APA, Harvard, Vancouver, ISO, and other styles
47

Mehmedi, Meki. "Processkartläggning : Fokus på offensiv kvalitetsutveckling." Thesis, Uppsala universitet, Institutionen för teknikvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353413.

Full text
Abstract:
Many organizations today work with offensive quality development to meet market and society changes in general. In the study, a dive company has been studied based on principles of offensive quality development. The company has a turnover of 80-90 million SEK and have 50 employees. The organization has just begun a change work to anchor quality in their businessmodel. The purpose of the study has been to map the organization's main processes and provide a basis for the continued improvement work. With the help of interviews, observations and workshops, a first draft of a process mapping has been carried out. The study has also used various improvement tools to analyze risks and causes of process mapping. Theories around the cornerstone model and PDSA cycle have been the basis for the structured completion of the survey on the organization.
Många organisationer arbetar idag med offensive kvalitetsutveckling för att möta förändringar på marknaden och samhället i stort. I studien har ett dykarföretag studerats utifrån principer från offensive kvalitetsutveckling. Företaget omsätter cirka 80–90 miljoner och har 50 anställda. Organisationen har precis påbörjat ett förändringsarbete för att förankra kvalitet i verksamheten. Syftet med studien har varit att kartlägga organisationens huvudprocesser samt ta fram ett underlag till det fortsatta förbättringsarbetet. Med hjälp av intervjuer, observationer och workshops har ett första utkast av en processkartläggning kunnat genomföras. Studien har också använt sig av olika förbättringsverktyg för att analysera risker och orsaker med processkartläggning. Teorier kring hörnstensmodellen och PDSA-cykeln har legat till grund för att strukturerat genomföra undersökningen på organisationen.
APA, Harvard, Vancouver, ISO, and other styles
48

Henningsson, Ida. "EU och Ryssland : En fallstudie över hur The Eastern Partnership har påverkat relationen mellan de två parterna." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-79942.

Full text
Abstract:
In recent decades, the EU has significantly expanded its presence and influence in many of the former Soviet states. This essay have examined how the relationship between the EU and Russia has change since The Eastern Partnership was introduced 2009 and the extent to which it can be seen as a contributing factor. The Eastern Partnership is a joint initiative involving the EU, its Member States and six Eastern European Partners. Among this six this essay has focued on Ukraine and its part in the relationship between EU and Russia. This essay have been a theory-consuming case study that analyzes and explains the EU and Russia`s actions concerning the EaP, with the help of Mearsheimer`s theory of offensive realism. The analysis showed that the relations between EU and Russia had changed and deteriorated. The Eastern Partnership has provoked Russia and has made them feel restricted in their sphere of power. There has been a conflict over the six countries, including Ukraine, between the EU and Russia.
APA, Harvard, Vancouver, ISO, and other styles
49

Admiral, Mark A. "The evolution of Russian offensive air warfare theory : from deep battle to aerospace war /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA272608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Buttle, John W. "The shift from defensive to offensive policing : CS spray and the use of force." Thesis, Bangor University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.417257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography