Dissertations / Theses on the topic 'Techniques of neutralization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 dissertations / theses for your research on the topic 'Techniques of neutralization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gruber, Verena, and Bodo B. Schlegelmilch. "How Techniques of Neutralization Legitimize Norm- and Attitude-Inconsistent Consumer Behavior." Springer, 2013. http://epub.wu.ac.at/4025/1/gruber.pdf.
Full textRozenbeek, David Jan. "Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279557.
Full textPopulariteten av att flyga drönare ökar stadigt i och med att drönartekniken blir mer tillgänglig och an- vändbart för allmänheten. Men användningen av drönare leder också till problem när till exempel flyg- platser har varit tvungna att stänga av på grund av drönar observationer. Det har blivit tydligt att ett anti-drönarsystem måste vara på plats för att neutralisera inkräktande drönare. Men att neutralisera en drönare är inte en enkel uppgift, risken för att orsaka sido-skador på personer, byggander eller objekt; eller störa andra radiosystem måste beaktas starkt när man utformar ett anti-drönarsystem. I detta examensarbete valdes en uppsättning konsumentdrönare ut baserat på marknadens popularitet. Genom att studera de trådlösa kommunikationslänkarna för de valda drönarna identifierades en uppsättning av drönar-neutraliseringsmetoder. För varje neutraliseringsmetod valdes en uppsättning av störnings- och spoofing-tekniker ut från aktuell forskning. Teknikerna användes i praktiken genom att utsätta drönarna för teknikerna i en serie drönar-beteendeexperiment. Resultaten användes sedan för att utvärdera teknikerna i fyra utvärderingskriterier baserade på att undvika sido-skador, mildra radiostörningar, identifieringsbehov och hantering av flera inkräktande drönare. Utvärderingen sammanfattades sedan för att diskutera lämpliga drönar-neutraliseringsmetoder och störnings- spoofing-tekniker. Resultaten visade att det finns neutraliseringsmetoder som potentiellt kan undvika att orsaka sido- skador eller radio-störningar för vissa typer av drönare. En full-bands störningsteknik visade sig vara bäst presterande baserat på utvärderingskriterierna, men var också den teknik som teoretiskt inducerade mest radiostörningar. Dessutom visades det att drönare som flyger i navigeringsläge endast kan neutraliseras med hjälp av en GNSS-störnings- eller spoofing metoder. Att använda en GPS-spoofing metod visade sig också vara svår att implementera i praktiken.
Hankerson, Mario Bernard. "Athletic Participation: A Test of Learning and Neutralization Theories." [Johnson City, Tenn. : East Tennessee State University], 2002. http://etd-submit.etsu.edu/etd/theses/available/etd-1028102-000629/unrestricted/HankersonM111802b.pdf.
Full textBarnes, Collin Z. "AN INVESTIGATION INTO THE TECHNIQUES OF NEUTRALIZATION THEORY AND THEIR EFFECTS ON COMPULSIVE CONSUMPTION BEHAVIOR." MSSTATE, 2008. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10312007-134110/.
Full textArvidson, Cody Jean. "The Anatomy of Academic Dishonesty: Cognitive Development, Self-Concept, Neutralization Techniques, and Attitudes Toward Cheating." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4641/.
Full textSuper, Mathew Anthony. "Why you might steal from Jay-Z an examination of filesharing using techniques of neutralization theory /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textFarrow, Melissa Ann. "Cytoplasmic Localization of HIV-1 Vif Is Necessary for Apobec3G Neutralization and Viral Replication: A Dissertation." eScholarship@UMMS, 2005. https://escholarship.umassmed.edu/gsbs_diss/75.
Full textMaadarani, Mariah. "Inside the Black Box of Jail: Barriers to Change at the Ottawa-Carleton Detention Centre." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/41541.
Full textLundgren, Sørli Vanja. "In a Man´s World : Tolkninger av lovbrudd gjort i langtransportens yrkeskontekst." Doctoral thesis, Stockholm University, Department of Criminology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-520.
Full textCriminological studies have shown that economical and/or occupational crimes are committed within all examined trades and occupations. This is also a fact in the gendered occupational context the Norwegian and Swedish long-distance trucking trade constitutes. This dissertation sets out to determine, by qualitative in-depth interviews with 24 interviewees and field observations, what certain gaining occupational and economical crimes mean to trade actors and how to interpret the meaning criminologically. A hermeneutical orientation constitutes the methodological and epistemological basis of the interpretation.
Analysis of the material shows two central consistent patterns in the interpretations made by interviewees and other trade actors:
1) The actors´ explanations of why law violations are committed. These are influenced by the actors´ view of how wide the specific violations are spread and influence the violation’s acceptability.
2) The actors´ normative evaluation of the law violations. The actors construct normative distinctions between normal, acceptable and unacceptable actions. The distinction is influenced by how the law violations are explained and how widespread they are considered to be.
The first pattern; actors interpretation of why law violations are committed, corresponds with explanations in established criminological theories. The actors’ explanations are discussed as techniques of neutralisation. However, explanations of cause of actions are established also in the discourse of trade-actors who do not violate laws, and a deeper interpretation is called for. A discussion about law violations, based on interviewees discourse, as caused by criminogenic structures are developed. The actors identify the structures as criminogenic and this discourse of coersive structures implies conservation of law violations as part of normality. An interpretation of why several but not all individuals violate laws even if the law violations considers to be normal and acceptable, is developed in terms of differential association.
However, solely use of established theoretical perspectives is not a sufficient interpretation of the law violations; the perspective of interpretation indicated by the second pattern will then be lost. Why is law violations considered both normal and deviant? This dissertation applies a gender-theoretical perspective and argues that actors constitute masculinity through acceptable law violations and that masculinity and normality are correlated. A cultural discourse of borders between normality and deviance is conserved and processed, and the actors discourses of law violations as without victims and as a necessity to continue as truckers, are central in the normalization of normative borders.
Overall, Jeffrey Scott. "Rationalizing Ethically Questionable Intentions: An Investigation of Marketing Practices in the USA." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6337.
Full textReam, Victoria R. "Big Energy, Environmental Crimes, and Sustainability: An Analysis of How Corporations Frame Environmental Issues amid Criminal Prosecutions." Ohio University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1492768049963644.
Full textAbraham, Jonatan. "Assessing the threats against rural Sweden : An exploration of crimes against Swedish farmers related to animal production." Thesis, KTH, Urbana och regionala studier, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278518.
Full textBjörklund, Rosario. "La traducción de los culturemas : Dificultades y soluciones en la traducción del sueco al español del estudio: "La imagen de Suecia en los medios de comunicación después de Stieg Larsson y Millennium"." Thesis, Linnéuniversitetet, Institutionen för språk (SPR), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46265.
Full textSwartz, Erik. "Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44967.
Full textAku, Anizizo. "Role of Middle Managers in Mitigating Employee Cyberloafing in the Workplace." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3967.
Full textSalah, Adham M. S. "Investigation of Integrated Decoupling Methods for MIMO Antenna Systems. Design, Modelling and Implementation of MIMO Antenna Systems for Different Spectrum Applications with High Port-to-Port Isolation Using Different Decoupling Techniques." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18427.
Full textHigher Committee for Education Development in Iraq (HCED)
Nykänen, K. (Kari). "Tietoturvakoulutuksen vaikuttavuuden arviointi yksilön ja organisaation tietoturvakäyttäytymiseen." Doctoral thesis, Oulun yliopisto, 2011. http://urn.fi/urn:isbn:9789514295713.
Full textTiivistelmä Tietoturva on keskeinen tekijä yrityksen kokonaisturvallisuuden ja liiketoiminnan tarpeiden tukemisessa, johon henkilökunnan tietoturvakäyttäytyminen vaikuttaa hyvin merkittävästi. Yksilön tietoturvakäyttäytymistä ja tietoturvapolitiikan ja -ohjeistuksien noudattamista on tutkittu empiirisesti vahvojen teoreettisten taustojen pohjalta. Tutkimustulokset ovat osoittaneet, että yksilön normeista ja ohjeistuksista poikkeava käyttäytyminen on vahvasti sidoksissa henkilökohtaisiin tapoihin, joita puolustellaan ja selitetään erilaisilla syillä. Tietoturvakoulutuksen vaikuttavuutta yksilön ja organisaation tietoturvakäyttäytymiseen on tutkittu empiirisesti hyvin vähän. Työhön liittymättömän Internetin käytön kontekstissa tehtyjä tutkimuksia on vain muutamia, ja niissä on selvitetty käytön motivaatiota ja käyttäjien profilointia. Tietoturvakoulutuksen vaikutusta yksilön työhön liittymättömän Internet-käyttäytymisen muuttamiseen ei ole aikaisemmin tieteellisesti tutkittu. Tässä väitöskirjassa tutkitaan tätä ajankohtaista kansainvälisen tutkijayhteisön tiedostamaa ongelmaa. Tutkimus suoritetaan noudattaen toimintatutkimusmallia kahdessa vaiheessa, joista toisessa sovelletaan kokeellista tutkimusmenetelmää. Pitkittäistutkimuksen ensimmäisessä vaiheessa tutkitaan organisaation tietoturvakäyttäytymistä ja -toimintaa. Tämän perusteella suunnitellaan koulutusmenetelmä, jonka avulla pyritään ratkaisemaan organisaation tietoturvatoiminnan keskeiset ongelmat ja parantamaan yksilön tietoturvatietoisuutta. Toisessa vaiheessa koulutusmenetelmää kehitetään ja laajennetaan koko organisaation henkilökunnan tasolle, minkä tavoitteena on muuttaa yksilön työhön liittymätöntä Internet-käyttäytymistä. Tutkimuksessa sovelletaan kriminologiaan pohjautuvaa neutralisoimisteoriaa ja sosiaalipsykologian tapateoriaa, joiden avulla pyritään selittämään yksilön työhön liittymätöntä Internet-käyttäytymistä. Tietoturvakoulutuksen laadinnassa sovelletaan oppimisen psykologiaa, sosiokonstruktiivista oppimisnäkemystä ja muutos-johtamista. Tutkimustulokset tarjoavat uutta tietoa siitä, mitä tulee huomioida laadittaessa organisaation tietoturvakoulutusta ja miten huolellisesti laaditun koulutuksen avulla voidaan muuttaa yksilön työhön liittymätöntä Internet-käyttäytymistä. Koulutuksen avulla pyritään vaikuttamaan yksilön syvälle juurtuneisiin tapoihin, käyttäytymiseen ja vastuunottamiseen omasta toiminnasta
Forde, Hugh Anthony. "Evaluation of a stress inoculation training program at an Ohio male correctional institution." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1117557647.
Full textTitle from first page of PDF file. Document formatted into pages; contains ix, 129 p.; also includes graphics. Includes bibliographical references (p. 120-129). Available online via OhioLINK's ETD Center
Roebuck, Benjamin S. "Exclusion and Resilience: Exploring the Decision-Making Processes of Young People Who Are Homeless." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30710.
Full textSchoultz, Isabel. "Controlling the Swedish state : Studies on formal and informal bodies of control." Doctoral thesis, Stockholms universitet, Kriminologiska institutionen, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-110050.
Full textAt the time of the doctoral defense, the following paper was unpublished and had a status as follows: Paper 4: Manuscript.
Huang, Hui-Lin, and 黃惠玲. "Techniques of Neutralization for White-collar Criminals." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/47791962875866931512.
Full text國立臺北大學
犯罪學研究所
95
By definition, white -collar criminals have higher socio-economic status than blue-collar criminals. Criminals with high SES tend to commit financial related crimes which are in nature different from violent crimes such as murder, burglary, robbery and so on. White collar criminals often “creatively”steal money from the public or government without any intention of using physical force. There is a public perception that such crimes are victimless, have low visibility, and are indeed harmless. The present study investigates the techniques of neutralization that white collar criminals employ when they commit their crimes. Five well known financial crimes committed by shareholders, professionals and managers were selected in the study. All resulted in guilty verdicts at district courts. Using Sykes and Matza’s idea of “techniques of neutralization”, the study collected the indictment and trial documents for these five cases and analyzed how the processes were employed in court. The results indicated that other than the five techniques mentioned in Sykes and Matza’s work, there are two more techniques often used by these ‘white-collar’professionals, namely, seeking to enhance profits for the company (a ‘worthy’ motive) and also the idea of simply‘professional judgment’ at that moment. Further suggestions are discussed in this study.
Chang, Chia-Yi, and 張嘉益. "A Study on Tourist Harassment Perspective from the Techniques of Neutralization." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/90688802882729551926.
Full text高雄餐旅學院
旅遊管理研究所
98
Visitors may receive pushing up price, promote by force, even the negative experience of buying the faulty goods of street peddler, driver, guide or locals while travelling. This kind of harassing phenomenon, not only influences travel quality but also threaten the image of the tourist city at the same time. From a perspective of Neutralization, it is caused by influence of the external social environment, and harassment source does not think the damage that one''s own behavior causes is damaging. Tourist harassment source does not make a self-criticism, but blaming the person punishing him instead. This research gathering all tourist harassment phenomenons in Taiwan together, i.e. the speech harassment, the body harassment and harassment with the freedom will. According to the techniques of neutralization, one would rationalize his/her behavior by subsequent seven points of view: denial of responsibility, denial of injury, denial of the victim, condemnation of the condemners, appeal to higher loyalties, claim to entitlement and everyone else is doing it. This research emphasizes that what causes the service providers in tourism industry become source of tourist harassment. By exploring of tourist harassment, we shall stop this kind of phenomenon, Also, educating the tourism service staff members, resident and all the other interested parties, in order to raise the quality level, generate more economic incomes, encourage better social interactions, and even realize the vision of environmental, social and economic sustainability.
Jui-Min, Chen, and 陳瑞旻. "A Study on the use of Neutralization Techniques by Drunk Driving Offenders." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5e65ry.
Full text國立中正大學
犯罪防治研究所
106
This research aims to explore the behaviors of repeated offenders of driving under the influence of alcohol (DUI offenders) through the Neutralization Theory. The study makes an attempt to interpret how DUI offenders utilize the techniques of neutralization and compare the differences in their tendency to neutralize their behaviors and the techniques of neutralization they used in different situations, such as with/without victims and numbers of times arrested for DUI. Further study also analyzed the differences among DUI offenders in the tendency to neutralize their behaviors under different background variables, levels of knowledge in the laws, psychological attributes and types of dependency. In recent years, incidents associated with drunk driving have been frequently reported and many of these perpetrators were repeated offenders. Although the government enforced the “three strike clause”, reinforced DUI patrol and surveillance and organized a series of DUI seminars, expecting to achieve effective prevention through policies, law enforcement and consultation, the effectiveness of these measures is still yet to be verified. In view of which, this research makes an attempt to explore the behaviors of DUI offenders, using the Neutralization Theory to analyze whether repeated offenders have the tendency to neutralize and rationalize their behaviors through the neutralization techniques. Results of this research will provide suggestions and recommendations to the competent authority for future policymaking on DUI prevention. This research developed its studies from the five dimensions proposed by Sykes & Matza (1957) in the Neutralization Theory (denial of responsibility, denial of injury, denial of the victim, condemnation of the condemners and appeal to higher loyalties), the defense of necessity (Minor, 1981;Maruna & Copes, 2005) and the claim of normalcy (Coleman, 1985). Study subjects were sampled from the detained DUI offenders and those mandated to participate in DUI seminars through purposive sampling. A control group was also sampled from the general public. The studies found significant differences between the DUI and control groups, and people who are older and have lower level of education show higher tendency to neutralize their behaviors. Further analysis found statistical significance in “agreeing with the laws” and “understanding of the laws”. DUI offenders who responded with higher level of agreement with the laws or understanding of the laws have lower tendency to neutralize their behaviors. Furthermore, DUI offenders who have 2 to 3 records have higher tendency to neutralize their behaviors than the first-time offenders. This result indicates that offenders who have committed the offense two or more times tend to “permit” themselves of such conducts through neutralization. Among the repeated offenders, those who have 4 or more records use “denial of injury” and “denial of the victim” techniques more often than offenders with 2 to 3 records. This indicates that repeated DUI offenders tend to defend themselves by saying, “There is no crime, since no one is hurt (denial of injury)” or “I didn’t mean to drive after drinking. I have no choice (denial of responsibility).” Based on the results, our recommendation for future DUI prevention policy is to start relevant education from young. Once the correct concept is instilled in the cognitive development of all citizens, they will be able to judge their own conducts and carry out safe and law-binding behaviors. Our recommendations for correction of DUI behaviors include the following: 1. Design counseling courses to reinforce DUI offenders’ sense of legal conformity and understanding of the punishments for DUI offenses. 2. Plan in-depth counseling strategies for repeat DUI offenders, emphasizing their responsibilities and the safety concerns associated with drunk driving. 3. Increase the number of the mandated DUI prevention courses, highlighting the danger and responsibilities involved in DUI to achieve the change of perception and behavior.
Fukukawa, Kyoko, M.-M. Zaharie, and A.-I. Romonti-Maniu. "Neutralization techniques as a moderating mechanism: ethically questionable behavior in the Romanian consumer context." 2018. http://hdl.handle.net/10454/16561.
Full textBased on an empirical investigation in the context of Romania, this paper identifies a moderating role of neutralization techniques within ethically questionable consumer behavior. The quantitative study is based upon a synthesized model of Theory of Planned Behavior incorporating the factor of perceived unfairness and neutralization techniques. Significantly, neutralization techniques are shown to have a negative, but definite impact on the action to behave unethically. This leads to their consideration as a process of thinking, rather than as static judgement. As such, neutralization techniques are conceptually distinctive to the other factors. The paper analyses the results specific to the Romanian context, but noting implications for an understanding of the morality of markets with similar historical, political and economic conditions. Overall, the findings offer a more nuanced reading of consumer behavior. The paper places moral flexibility in terms of a specific cultural context, but also reveals how neutralization techniques can moderate ethically questionable behaviors beyond matters of self-interest, which in turn has implications for how companies can consider their responsibilities in relation to their customers.
Schneider, Hendrik. "Cognitive dissonance as a prevention strategy: considerations on the prospects of neutralizing the techniques of neutralization." 2017. https://ul.qucosa.de/id/qucosa%3A16207.
Full textKO, I.-WEN, and 柯意雯. "The Techniques of Neutralization and the Violation of the “Fair Use” of Copyright Law among School Teachers." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/16117533595169656997.
Full text國立臺北大學
犯罪學研究所
104
Among the various high school teaching methods, the most popular one among teachers is to play audio and video media in the classroom. However, teachers often overlook the possible violation of the Copyright Law, particularly the “fair use” article, when they do so. Previous literature regarding "fair use" of copyright law mainly focuses on the comparative experiences across countries, with very little discussion about the main users or the “norms” of the users. Nor has previous research explored the motivation of such users. A questionnaire was designed by the author based on two constructs: the extent of awareness of illegality of such acts and the techniques of neutralization to analyze the reasoning school teachers employ when they played unauthorized audio or video in classroom. 300 Taipei City and New Taipei City Junior High School Teachers were sampled. Main findings are (1) Teaching subject was significantly associated with unawareness of their illegal acts, neutralization techniques and actual violations of copy right among teachers; (2) the more highly educated teachers are, the more neutralization, and more engagement in infringing copyright in classroom; (3) there are significant relationships between unawareness of illegality, the techniques of neutralization and actual engagement in infringing copyright; and finally (4) the higher unawareness of illegality, the higher neutralization techniques teachers are, furthermore, neutralization, particularly is significant for the “appeal to higher loyalties” as a mediator between unawareness of illegality and the actual violation of copyright among teachers. This study recommends prevention measures for schools and teachers, including enhancing the legal knowledge of school teachers. On the other hand, the study also calls for a re-thinking of the balance of copyright law and the wider public interest. Without rich resources and budgets, schools and teachers cannot possibly afford to buy the copyrights of all video and audio for teaching. This study argues that there should a sufficient flexibility in law to allow teachers to use them in a “fair” way and for the sake of education. Keywords:copyright law, “fair use” article, unawareness of illegal acts, the Techniques of Neutralization
WANG, YING-YA, and 王盈雅. "The Relations among the Evaluation of the Benefits of Delinquency, Techniques of Neutralization, Deviant Peer Associations, and Junior High School Students' Delinquency." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/22247314255996894355.
Full text南華大學
應用社會學系教育社會學碩士班
105
The main purpose of this study was to investigate the relationship among the relationship among the evaluation of the benefits of delinquency, techniques of neutralization, deviant peer associations, and junior high school students’ de-linquency. Self-report questionnaire was used to collect data. The sample in this study consisted of 869 students from 12 junior high schools in Chiayi City, Yunlin County, and Chiayi County. The statistical methods of this study included descriptive statistics, correlation analysis, and regression analysis. The results of this study were summarized as follows: (1) The psychological benefits of delinquency had significant impacts on delinquency; (2) The techniques of neutralization such as denial of victim, condemnation of condemner, and appeal to higher loyalties were related to delinquency; (3) Deviant peer associations had positive impacts on delinquency. Finally, the detailed results and suggestions for further research and implementation were discussed.
Gordon, Shanlea. "FEAR AND LOATHING IN THE HOOKUP CULTURE: A STUDY OF FEMALE ENGAGEMENT IN NON-RELATIONAL SEX ON A UNIVERSITY CAMPUS." Thesis, 2013. http://hdl.handle.net/1974/8136.
Full textThesis (Master, Sociology) -- Queen's University, 2013-07-31 19:46:46.027
Chiu, Ren-Geng, and 邱稔耕. "Design of Power Amplifiers Using Transformer Coupling And Neutralization Capacitor Technique." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5441050%22.&searchmode=basic.
Full text國立中興大學
電機工程學系所
107
This thesis aims to explore the design of power amplifiers using transformer coupling. The implemented chip uses the TSMC 90nm CMOS and 40nm CMOS process technology support provided by the TSRI. In the design of the power amplifier part is designed with power combination technology, the content contains the principle introduction, circuit and component design, simulation analysis, wafer measurement, results discussion. Firstly, the development of the RF circuit and the derivation of the relevant formula of the power amplifier are introduced. Then, the parameters used in this paper are introduced, and finally the various structures of the power amplifier are analyzed. Power amplifier design uses transformer-coupled structure for power dividing and combining, which also includes impedance matching function, which analyzes the principle, circuit structure, simulation, measurement and summary of the designed circuit. The circuit design structure of this paper is similar, one is the power amplifier designed in the W band, and the other is to increase the frequency design to the D band. Both circuit designs utilize the characteristics of the differential circuit plus the neutralization capacitor to increase stability, and there is no risk of oscillation during measurement and simulation. Finally, the research results of each chapter are summarized, and the problems found are discussed and improved, and the future research is improved.
Marzudi, W. N. N. W., Z. Z. Abidin, S. Z. M. Muji, Y. Ma, and Raed A. Abd-Alhameed. "Minimization of Mutual Coupling Using Neutralization Line Technique for 2.4 GHz Wireless Applications." 2015. http://hdl.handle.net/10454/9195.
Full textThis paper presented a planar printed multiple-input-multiple-output (MIMO) antenna with a dimension of 100 x 45 mm2. It composed of two crescent shaped radiators placed symmetrically with respect to the ground plane. Neutralization line applied to suppress mutual coupling. The proposed antenna examined both theoretically and experimentally, which achieves an impedance bandwidth of 18.67% (over 2.04-2.46 GHz) with a reflection coefficient < -10 dB and mutual coupling minimization of < -20 dB. An evaluation of MIMO antennas is presented, with analysis of correlation coefficient, total active reflection coefficient (TARC), capacity loss and channel capacity. These characteristics indicate that the proposed antenna suitable for some wireless applications.
Marzudi, W. N. N. W., Z. Z. Abidin, S. Z. M. Muji, Ma Yue, and Raed A. Abd-Alhameed. "Minimization of Mutual Coupling Using Neutralization Line Technique for 2.4 GHz Wireless Applications." 2014. http://hdl.handle.net/10454/8467.
Full textThis paper presented a planar printed multiple-input-multiple-output (MIMO) antenna with a dimension of 100 x 45 mm2. It composed of two crescent shaped radiators placed symmetrically with respect to the ground plane. Neutralization line applied to suppress mutual coupling. The proposed antenna examined both theoretically and experimentally, which achieves an impedance bandwidth of 18.67% (over 2.04-2.46 GHz) with a reflection coefficient < -10 dB and mutual coupling minimization of < -20 dB. An evaluation of MIMO antennas is presented, with analysis of correlation coefficient, total active reflection coefficient (TARC), capacity loss and channel capacity. These characteristics indicate that the proposed antenna suitable for some wireless applications.
Junqueira, Gabriel Marson. "A prevenção da corrupção na administração pública (contributos criminológicos, do corporate compliance e public compliance)." Master's thesis, 2018. http://hdl.handle.net/10316/85801.
Full textCurrently, some studies already propose that the public compliance incorporates the lessons learnt in the context of the corporate compliance, which has developed most in recent decades. At the same time, as the compliance was incorporated in the universe of criminal law, in the direction of the principles of a “global science of the criminal law”, it seems to be useful checking the contributions which can be provided by criminology in order to its improvement. The aim is to check which contributions for the public compliance improvement can be provided by criminology and by the corporate compliance, specially outlining guidelines for the improvement of the prevention of bribery in the public administration. White-collar crime theory, situational crime prevention perspective and techniques of neutralization are analysed. The corporate compliance is subsequently examined in its essential aspects and elements (compliance-culture, institutionalization, gap analysis, compliance programme and internal investigation procedure). Some guidelines for the improvement of public compliance are outlined at the end. The contributions provided by criminology has primarily focused on the compliance-culture, the gap analysis and the compliance programme. It was possible to notice a greater weight of the corporate compliance contributions in public compliance institutionalization, in internal investigation procedures and in the incentives for the adoption by the public sector of an effective system to prevention and detection of irregularities. A better definition of these incentives, in the frame of public compliance, deserves, however, a deep approach.
Atualmente, alguns autores já propõem que o public compliance – entendido, numa primeira aproximação, como conjunto sistemático de medidas tendentes a garantir que todos os agentes públicos ajam, no âmbito da Administração Pública, em conformidade com o ordenamento jurídico-penal – assimile lições aprendidas, nas últimas décadas, no âmbito do corporate compliance, por ter este se desenvolvido mais no período. Ao mesmo tempo, como o compliance foi integrado ao universo penal, na perspectiva de uma “ciência conjunta do direito penal”, parece natural a verificação de contribuições que podem ser prestadas pela criminologia para seu aprimoramento. O objetivo, aqui, é examinar algumas contribuições para o aprimoramento do public compliance que podem ser extraídas da criminologia e do corporate compliance, com a expectativa de esboçar, em seguida, diretrizes para o aperfeiçoamento da prevenção da corrupção na Administração Pública. São analisadas as teorias do crime de colarinho branco, da prevenção situacional do delito e das técnicas de neutralização da culpa. O corporate compliance, na sequência, é examinado, em seus aspectos e elementos essenciais (cultura de compliance, institucionalização, análise de riscos, programa de compliance e procedimento de investigação interna). Algumas diretrizes para o aperfeiçoamento do public compliance são, ao final, esboçadas. As contribuições prestadas pela criminologia centraram-se sobretudo na implantação de uma cultura de compliance, na análise de riscos e na organização do programa de compliance. Foi possível notar um peso maior das contribuições do corporate compliance na institucionalização do public compliance, no desenho de procedimentos de investigação interna e nos estímulos para a adoção, pelo setor público, de um sistema eficaz de prevenção e detecção de delitos. Uma melhor definição de tais estímulos, no marco do public compliance, merece, todavia, futuro aprofundamento.