To see the other types of publications on this topic, follow the link: Threat modelling.

Dissertations / Theses on the topic 'Threat modelling'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Threat modelling.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Svensson, Carl. "Threat modelling of historical attacks with CySeMoL." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476.

Full text
Abstract:
This report investigates the modelling power of the Cyber Security Modelling Language, CySeMoL by looking at three documented cyber attacks and attempting to model the respective systems in which they occurred. By doing this, strengths and weaknesses of the model are investigated and proposals for improvements to the CySeMoL model are explored.<br>Denna rapport undersöker modellingsförmågan hos Cyber Security Modelling Language, CySeMoL genom att titta på tre dokumenterade IT-angrepp och försöka modellera systemen som respektive attack skedde i. Genom att göra detta undersöks styrkor och svagh
APA, Harvard, Vancouver, ISO, and other styles
2

Geng, Ningyao. "azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284501.

Full text
Abstract:
When assessing network systems, security has always been one of the priorities.Cyber threat modelling is one of the most suitable methods. From a startingpoint to each valuable asset, the simulation can enable the users to explore certainsecurity weaknesses alongside the attack path. In the end, the time to compromiseshows the security level of the whole system.In principle, most cyber threat models can be built and simulated by attack graphswhere each point in the graph can stand for a certain asset in the network system.However, different systems have different infrastructures and implementa
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Virdi Amandeep. "AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Full text
Abstract:
Attack simulations provide a viable means to test the cyber security of a system. The simulations trace the steps taken by the attacker to compromise sensitive assets within the system. In addition to this, they can also estimate the time taken by the attacker for the same, measuring from the initial step up to the final. One common approach to implement such simulations is the use of attack graph, which trace the various dependencies of every step and their connection to one another in a formal way. To further facilitate attack simulations and to reduce the effort of creating new attack graph
APA, Harvard, Vancouver, ISO, and other styles
4

Skobalj, Nedo. "Validating vehicleLang for Domain-specific Threat Modelling of In-vehicle Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249601.

Full text
Abstract:
Due to technological developments, vehicles have gone from mechanically controlled machines to software controlled, connected machines. Increased reliance on software to operate and wireless connections to external services have exposed vehicles to a new threat, cyber attacks. Because of this threat, development of new tools has been required to improve and ease the process of securing vehicles against attacks. One such tool is vehicleLang, a probabilistic threat modelling and attack simulation language specifically designed for the automotive domain. However, vehicleLang has been developed ba
APA, Harvard, Vancouver, ISO, and other styles
5

Jefford-Baker, Jonathan. "ALCOL : Probabilistic Threat Modelling of the Amazon Elastic Container Service Domain." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261421.

Full text
Abstract:
Cloud computing is becoming an increasingly popular computation model for IT-infrastructures which has changed the notion of computing resources. Another concept that has become popular is containers which provides the capability to run applications isolated from each other while sharing the host’s operating system kernel. These two concepts have been combined to run containerised environments in the cloud, a cloud service type which has become popular among customers. The increased deployment of IT-infrastructures built on cloud environments running containers results in an increased exposure
APA, Harvard, Vancouver, ISO, and other styles
6

Syed, Romilla. "DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3906.

Full text
Abstract:
This dissertation examines the identity threats perceived by individuals and organizations in Online Social Networks (OSNs). The research constitutes two major studies. Using the concepts of Value Focused Thinking and the related methodology of Multiple Objectives Decision Analysis, the first research study develops the qualitative and quantitative value models to explain the social identity threats perceived by individuals in Online Social Networks. The qualitative value model defines value hierarchy i.e. the fundamental objectives to prevent social identity threats and taxonomy of user respo
APA, Harvard, Vancouver, ISO, and other styles
7

Fagade, Tesleem. "A multi-domain approach for security compliance, insider threat modelling and risk management." Thesis, University of Bristol, 2018. http://hdl.handle.net/1983/c7461605-6493-4413-8835-65847df90a57.

Full text
Abstract:
Information security is fundamentally concerned with the confidentiality, integrity and availability of information assets at all times. However, given the ubiquitous nature of information systems and organisations’ growing reliance on large-scale interconnected networks;, it means that the prevalence and impact of cyber-attacks will continue to rise. The problem of cybersecurity risks management in corporate organisations is non-trivial, hence, constructing tools that truly satisfy the holistic management of information security is difficult and not readily available. The work described in th
APA, Harvard, Vancouver, ISO, and other styles
8

Greenwood, David. "Socio-technical analysis of system-of-systems using responsibility modelling." Thesis, University of St Andrews, 2012. http://hdl.handle.net/10023/3176.

Full text
Abstract:
Society is challenging systems engineers by demanding increasingly complex and integrated IT systems (Northrop et al., 2006; RAE, 2004) e.g. integrated enterprise resource planning systems, integrated healthcare systems and business critical services provisioned using cloud based resources. These types of IT system are often systems-of-systems (SoS). That is to say they are composed of multiple systems that are operated and managed by independent parties and are distributed across multiple organisational boundaries, geographies or legal jurisdictions (Maier, 1998). SoS are notorious for becomi
APA, Harvard, Vancouver, ISO, and other styles
9

van, der Schoot Willem. "Validating vehicleLang, a domain-specific threat modelling language, from an attacker and industry perspective." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284244.

Full text
Abstract:
Today’s vehicles are incredibly complex devices with vast networks of integratedelectronics and connectivity. This has led to improved safety, fuel efficiencyand comfort. However, with more electronics and connectivity comesan ever-increasing attack surface for adversaries to exploit. To help vehicle designersbetter understand the security risks and therefore reduce them, threatmodelling can be utilised. vehicleLang is a threat modelling language explicitlycreated for vehicles to model and simulate attacks to produce probabilisticattack graphs. An accompanying tool to vehicleLang called securi
APA, Harvard, Vancouver, ISO, and other styles
10

Godakanda, Menaka L. "Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2023. https://ro.ecu.edu.au/theses/2653.

Full text
Abstract:
Modern technology has proliferated into just about every aspect of life while improving the quality of life. For instance, IoT technology has significantly improved over traditional systems, providing easy life, time-saving, financial saving, and security aspects. However, security weaknesses associated with IoT technology can pose a significant threat to the human factor. For instance, smart doorbells can make household life easier, save time, save money, and provide surveillance security. Nevertheless, the security weaknesses in smart doorbells could be exposed to a criminal and pose a dange
APA, Harvard, Vancouver, ISO, and other styles
11

Twongyirwe, Ronald. "Forests under threat? : changes in land use and forest cover in rural western Uganda." Thesis, University of Cambridge, 2015. https://www.repository.cam.ac.uk/handle/1810/252713.

Full text
Abstract:
Deforestation and land use change are widespread in western Uganda. However, the spatial patterns and time-series of change and the reasons why it is occurring remain to be fully investigated. In this work a combination of satellite imagery and social surveys is used to quantify forest gains and loss over the last three decades in the region close to Lake Albert, whilst also providing an account of possible drivers of change. This area proves to be interesting as it covers regions with both formally protected areas (gazetted regions) and un-protected forest, the latter being largely under priv
APA, Harvard, Vancouver, ISO, and other styles
12

Lapáček, Vladimír. "Bezpečnost při vývoji softwaru." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72471.

Full text
Abstract:
The topic of the thesis is issue of security during the application development. The main emphasis is being placed on web applications. The goal is to define a framework for managing the life cycle of applications to meet the security minimum. The objectives of the work are achieved by study of available resources and their subsequent analysis. The target audiences are software developers interested in learning more about how to create secure applications. The work describes the areas that are crucial for security of applications. Work contains security standards which we can use for defining
APA, Harvard, Vancouver, ISO, and other styles
13

Gkaniatsou, Andriana Evgenia. "Analysis of low-level implementations of cryptographic protocols." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/29613.

Full text
Abstract:
This thesis examines the vulnerabilities due to low-level implementation deficiencies of otherwise secure communication protocols in smart-cards. Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for implementing confidential operations, such as authentication, key management, encryption and decryption for financial, communication, security and data management purposes. The self-containment of smart-cards makes them resistant to attacks as they do not depend on potentially vulnerable external resources. As such, smart-cards are often incorporated in
APA, Harvard, Vancouver, ISO, and other styles
14

Ioannou, Christina. "Facing social threats in adolescents with autism spectrum disorders." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE073/document.

Full text
Abstract:
Les troubles du spectre de l’autisme (TSA) sont caractérisés par des difficultés persistantes dans les domaines de la communication et des interactions sociales. Les individus atteints de TSA ont notamment des difficultés à décoder les émotions d’autrui et il est souvent suggéré qu’un déficit général du traitement des visages émotionnels est à l’origine de ces difficultés. Cependant, les résultats de la littérature sont incohérents et soulignent l'importance de facteurs méthodologiques qui pourraient influencer la performance des personnes TSA. Deux théories actuelles sont pertinentes au regar
APA, Harvard, Vancouver, ISO, and other styles
15

Borg, Alexander, and Carl Aston Francke. "IoT Pentesting: Obtaining the Firmware of a Smart Lock." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279543.

Full text
Abstract:
Consumer Internet of Things (IoT) has become increasingly popular over the past years and continues to grow with virtual assistants, wearable devices and smart home appliances. Within the consumer IoT market, smart locks have gained popularity. Smart locks offer the consumers a convenient way of handling keys and access to their home. Enabling your front door to be controlled over the internet however, introduces new possibilities for an adversary to brake in. Therefore, the integrity and authenticity of the product must be ensured. This thesis covers a security assessment of a smart lock, foc
APA, Harvard, Vancouver, ISO, and other styles
16

Cameron, Booth Louis, and Matay Mayrany. "IoT Penetration Testing: Hacking an Electric Scooter." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254613.

Full text
Abstract:
The industry of the Internet of Things (IoT) is a burgeoning market. A wide variety of devices now come equipped with the ability to digitally communicate to a wider network and modern electric scooters are one such example of this trend towards a more connected society. With scooter ride-share companies continually expanding in urban areas worldwide these devices are posing a greater attack surface for hackers to take advantage of. In this report we utilize threat modelling to analyse the potential vulnerabilities in a popular electric scooter. Through penetration testing we demonstrate the e
APA, Harvard, Vancouver, ISO, and other styles
17

Galal, Daria, and Martin Tillberg. "Security Test of iZettle's Reader 2 : A card terminal for safe payments?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913.

Full text
Abstract:
Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. The implementation is divided into three phases: prestudy and threat modelling, penetration testing and evaluation and conclusion of the security. The threat model
APA, Harvard, Vancouver, ISO, and other styles
18

Rubbestad, Gustav, and William Söderqvist. "Hacking a Wi-Fi based drone." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299887.

Full text
Abstract:
Unmanned Aerial Vehicles, often called drones or abbreviated as UAVs, have been popularised and used by civilians for recreational use since the early 2000s. A majority of the entry- level commercial drones on the market are based on a WiFi connection with a controller, usually a smart phone. This makes them vulnerable to various WiFi attacks, which are evaluated and tested in this thesis, specifically on the Ryze Tello drone. Several threats were identified through threat modelling, in which a set of them was selected for penetration testing. This is done in order to answer the research quest
APA, Harvard, Vancouver, ISO, and other styles
19

DI, BELLA PAOLO. "MODELLING & SIMULATION HYBRID WARFARE Researches, Models and Tools for Hybrid Warfare and Population Simulation." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1008565.

Full text
Abstract:
The Hybrid Warfare phenomena, which is the subject of the current research, has been framed by the work of Professor Agostino Bruzzone (University of Genoa) and Professor Erdal Cayirci (University of Stavanger), that in June 2016 created in order to inquiry the subject a dedicated Exploratory Team, which was endorsed by NATO Modelling &amp; Simulation Group (a panel of the NATO Science &amp; Technology organization) and established with the participation as well of the author. The author brought his personal contribution within the ET43 by introducing meaningful insights coming from the lectu
APA, Harvard, Vancouver, ISO, and other styles
20

Gripenstedt, Daniel, and Joakim Öberg. "A security analysis in a life science environment : a case study." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299357.

Full text
Abstract:
The cyber-threat against life-science is much larger today than just a couple of years back. Companies within the field have valuable information from example R&amp; Din pharmaceuticals, biotech, personal data of vulnerable patients or medical devices and that is something attackers are very much aware of. Lab equipment have generally been disconnected from the internet to protect their data even more but the benefits a company would gain in diagnostics and support could outweigh it. In this paper a fictional environment with lab instruments, control units and databases is set up based on a re
APA, Harvard, Vancouver, ISO, and other styles
21

Vasnier, Kilian. "Evaluation de situations multi-agents à partir d’observations partielles et hétérogènes." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC207.

Full text
Abstract:
Dans cette thèse, nous considérons le problème d’évaluation de situations dans le cadre plus spécifique des situations de crise. Dans le cadre de ces situations de crise, nous nous intéressons plus particulièrement au problème de l’évaluation de la menace dans un environnement topologique formalisé sous forme de graphe.Les systèmes d’évaluation de situations proposent actuellement une récupération souvent passive de l’information et sont confrontés à deux problématiques majeures : l’hétérogénéité des informations décrivant l’environnement qui amène à un problème de représentation de la connais
APA, Harvard, Vancouver, ISO, and other styles
22

Parsonson, Louis. "Modelling angiogenesis in three dimensions." Thesis, University of Nottingham, 2015. http://eprints.nottingham.ac.uk/29075/.

Full text
Abstract:
The process through which new blood vessels are formed within the body is known as angiogenesis. An essential part of our survival, it has also been implicated more recently in many diseases both in terms of induced growth, and abnormal vascular structure. Angiogenesis is characterized as two processes, the development of a vascular network during embryonic growth and the production of new blood vessels. This work focuses on the latter, and seeks to develop a robust, three-dimensional model for simulating blood vessel growth and the attendant processes of blood flow and mass transfer within th
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Chengyuan. "Turboelectric Distributed Propulsion System Modelling." Thesis, Cranfield University, 2013. http://dspace.lib.cranfield.ac.uk/handle/1826/8408.

Full text
Abstract:
The Blended-Wing-Body is a conceptual aircraft design with rear-mounted, over wing engines. Turboelectric distributed propulsion system with boundary layer ingestion has been considered for this aircraft. It uses electricity to transmit power from the core turbine to the fans, therefore dramatically increases bypass ratio to reduce fuel consumption and noise. This dissertation presents methods on designing the TeDP system, evaluating effects of boundary layer ingestion, modelling engine performances, and estimating weights of the electric components. The method is first applied to model a turb
APA, Harvard, Vancouver, ISO, and other styles
24

Krasnovyd, Vanessa. "The importance of 3D modelling." Thesis, Дніпровський національний університет залізничного транспорту імені академіка В. Лазаряна, 2019. https://er.knutd.edu.ua/handle/123456789/14701.

Full text
Abstract:
The work deals with 3D modelling as the technique which is used to create a 3D representation of any surface or object. The 3D modelling process creates a digital object that is capable of becoming fully animated, making it an important process for special effects and character animation.<br>У роботі розглядається 3D-моделювання як техніка, яка використовується для створення 3D-зображення будь-якої поверхні чи об'єкта. Процес 3D-моделювання створює цифровий об’єкт, який здатний стати повністю анімованим, що робить його важливим процесом для спеціальних ефектів та анімації персонажів.<br>Работа
APA, Harvard, Vancouver, ISO, and other styles
25

Riley, Dominic John. "Applications of numerical modelling to thrust tectonics." Thesis, University of Southampton, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nguyen, Viet Hoang. "Three essays in exchange rate modelling." Thesis, University of Leeds, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.531609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ledezma, Rosalía Diana Díaz. "Three studies in credit risk modelling." Thesis, City University London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.397858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jaganathan, R. "Modelling of three phase catalytic reactors." Thesis(Ph.D.), CSIR-National Chemical Laboratory, Pune, 1987. http://dspace.ncl.res.in:8080/xmlui/handle/20.500.12252/3284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Shepherd, James Robert. "Modelling ocean circulation with large-scale semi-geostrophic equations." Thesis, Imperial College London, 1999. http://hdl.handle.net/10044/1/51559.

Full text
Abstract:
The Large-scale Semi-Geostrophic Equations (LSGE, Salmon[73]) are three-dimensional equations valid for an ocean with a rigid lid and length scales much greater than the internal deformation radius (about 40km). In this thesis I reduce the LSGE to a pair of two-dimensional equations via the ansatz that the temperature is independent of the vertical co-ordinate. I refer to these as the Depth-Independent-Temperature (DIT) equations. Whilst this is regarded as a paradigm for the entire ocean, the reduction is similar in spirit to that utilised by many authors for modelling the mixed layer of the
APA, Harvard, Vancouver, ISO, and other styles
30

Kopciuk, Karen. "Modelling Issues in Three-state Progressive Processes." Thesis, University of Waterloo, 2001. http://hdl.handle.net/10012/1114.

Full text
Abstract:
This dissertation focuses on several issues pertaining to three-state progressive stochastic processes. Casting survival data within a three-state framework is an effective way to incorporate intermediate events into an analysis. These events can yield valuable insights into treatment interventions and the natural history of a process, especially when the right censoring is heavy. Exploiting the uni-directional nature of these processes allows for more effective modelling of the types of incomplete data commonly encountered in practice, as well as time-dependent explanatory variables and
APA, Harvard, Vancouver, ISO, and other styles
31

Kay, Gillian Evelyn. "Three-dimensional modelling of metal evaporated tape." Thesis, University of Central Lancashire, 1999. http://clok.uclan.ac.uk/20078/.

Full text
Abstract:
As developments in magnetic recording increase, the demands for high density recording media continue to rise. One particular medium developed towards meeting these needs is the commercially successftil metal evaporated (ME) tape. To provide a deeper understanding of the magnetic processes occurring in recording media, theoretical studies are carried out to complement experimental observations. Therefore, this thesis is concerned with developing a micromagnetic model to simulate the magnetic behaviour of ME tape. ME tape consists of bundles of granular columns which are tilted towards the film
APA, Harvard, Vancouver, ISO, and other styles
32

Cachola, Danny G. "Modelling and animating three-dimensional articulate figures." Thesis, University of British Columbia, 1986. http://hdl.handle.net/2429/25851.

Full text
Abstract:
This thesis describes an animation extension to a high-level graphical programming language which provides constructs for the definition, manipulation, and external representation of three-dimensional articulate figures and and their associated movements. The extension permits the definition of models consisting of segments and joints and the specification of each model's motion at a high level of abstraction. The relationship of the extension with respect to the host language is discussed and a general description of the animation language's design and implementation is given. The modelling a
APA, Harvard, Vancouver, ISO, and other styles
33

Piri, Mohammad. "Pore scale modelling of three-phase flow." Thesis, Imperial College London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.407699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Burrows, Justin. "Vector modelling three-dimensional engineering surface topography." Thesis, Brunel University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.286805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tung, D.-K. "A knowledge-based three-dimensional modelling system." Thesis, Swansea University, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.639269.

Full text
Abstract:
As manufacturers strive towards high-quality production, automated industrial inspection is a potent resource in the design of cost-effective systems which can ensure that products meet all their design specifications. However, in reality, only in well-controlled applications are economically usable systems being taken into daily use. Where such systems are being used, they are seen to be primarily addressing 2-dimensional inspection problems. This is not surprising, given the highly complex problems which must be dealt with in practical, real-world environments. However, there is an urgent ne
APA, Harvard, Vancouver, ISO, and other styles
36

Faraz, A. "Three dimensional force modelling for milling operations." Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.381031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Haidekker, Andras. "Radiation modelling in complex three dimensional enclosures." Thèse, Chicoutimi : Université du Québec à Chicoutimi, 1991. http://theses.uqac.ca.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Peter. "Three essays on modelling household labour supply." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/12325.

Full text
Abstract:
Labour supply modelling is one of the most prevalent research topics in the economic literature, and the employment implications are among the most persistent characteristics of public policy evaluation. This dissertation examines the employment responses of Australian households by developing economic models believed to better capture the employment behaviour of three important demographic subgroups, namely, partnered parents (married or de facto), single mothers and unemployed individuals. For each subgroup, a substantive empirical analysis is developed with the key focus on evaluating their
APA, Harvard, Vancouver, ISO, and other styles
39

Kleinermann, Frederic. "Three dimensional modelling of Electrical Impedance Tomography." Thesis, University of Salford, 2000. http://usir.salford.ac.uk/43047/.

Full text
Abstract:
Electrical Impedance Tomography (ElT) is an emerging imaging technique with applications in the medical field and in the field of industrial process tomography (lPT). Until recently, data acquisition and image reconstruction schemes have been constructed with the assumption that the object being imaged is two-dimensional. In recent years, some research groups have started to address the third dimensional aspects of ElT by both building three dimensional enabled data acquisition systems and solving the three dimensional Forward Problem numerically since this allows the possibility of modelling
APA, Harvard, Vancouver, ISO, and other styles
40

Fanone, Enzo. "Three Essays on Modelling of Electricity Markets." Doctoral thesis, Università degli studi di Trieste, 2012. http://hdl.handle.net/10077/7424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Pikoulas, Christos. "A local grid refinement technique for fluid flow predictions in 3-D." Thesis, Imperial College London, 1995. http://hdl.handle.net/10044/1/8095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ragozin, Konstantin. "Thrust Performance and Heat Load Modelling of Pulse Detonation Engines." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-82438.

Full text
Abstract:
Pulse Detonation Engines (PDEs) are propulsion systems that use repeated detonations to generate thrust. Currently in early stages of development, PDEs have been theorised to have advantages over current deflagration based engines. Air-breathing PDEs could attain higher specific impulse values and operate at higher Mach numbers than today's air-breathing engines, while Pulse Detonation Rocket Engines (PDREs) could become a lighter, cheaper, and more reliable alternative to traditional rocket engines. There are still however, many technological hurdles to overcome before PDEs can be developed i
APA, Harvard, Vancouver, ISO, and other styles
43

Bateman, William John Douglas. "A numerical investigation of three dimensional extreme water waves." Thesis, Imperial College London, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Giacomini, Enrico. "DESIGN, MODELLING AND CONTROL OF A THRUST BASED UAV." Thesis, Luleå tekniska universitet, Rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-87214.

Full text
Abstract:
The current year, 2021, started with the landing of the Perseverance mission and the flight of the first drone on Mars, marking an important event in the history of space exploration. The exploration of new environments would be easier and characterised by the absence of various obstacles if implementing a larger use of drones. This thesis project represents a first attempt to design a space UAV based on thrusters, in order to permit its use also in vacuum: the purpose is to demon- strate the possibility to use and control this new space technology after selecting the adequate components. List
APA, Harvard, Vancouver, ISO, and other styles
45

Barnett, Nicholas David. "Measurement and modelling of three dimensional scapulohumeral kinematics." Thesis, University of Newcastle upon Tyne, 1996. http://hdl.handle.net/10443/3588.

Full text
Abstract:
The term scapulohumeral rhythm is commonly used to describe the two dimensional rotation of the scapula accompanying motion of the arm. Despite the development of a variety of measurement techniques, including radiography, goniometry and three dimensional digitisation, the complete three dimensional kinematics of the scapula have never been presented. Nor have the effects of arm motions outside elevation in the coronal, sagittal or scapula planes been considered. Employing the Isotrak®" electromagnetic measurement system, this study has developed and validated a new method to simultaneously me
APA, Harvard, Vancouver, ISO, and other styles
46

Sides, Edmund John. "Modelling three-dimensional geological discontinuities for mineral evaluation." Thesis, Imperial College London, 1992. http://hdl.handle.net/10044/1/8809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Zhengqiu. "Nonlinear modelling of three phase multi limb transformers." Thesis, London South Bank University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.245156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hodgetts, David. "Three dimensional numerical modelling of continental lithosphere deformation." Thesis, Keele University, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.295800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hanlon, Michael Richard. "Molecular modelling and biophysical characterisation of three proteins." Thesis, Birkbeck (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ghosh, Tushar Kanti. "Three dimensional modelling and optimisation of multistage collectors." Thesis, Lancaster University, 2002. http://eprints.lancs.ac.uk/76623/.

Full text
Abstract:
Multistage collectors are commonly used in travelling wave tubes (TWTs), klystrons, gyrotrons and inductive output tubes (IOTs). A dc beam transfers some of its energy to the input RF wave during its travel through the interaction circuit. The purpose of a collector is to recover most of the remaining dc power from the spent beam and thereby increase both the collector and the overall efficiency. Secondary electrons play a detrimental role in collector performance. Use of the asymmetric collector geometries and application of a magnetic field in the collector region have proved to be effective
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!