Academic literature on the topic 'Truant (Boat)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Truant (Boat).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Truant (Boat)"

1

Szurlej*, Christina. "Free to Learn? Education in Australia’s Offshore Immigration Detention Centres." Articles, March 2, 2018, 37–81. http://dx.doi.org/10.7202/1043658ar.

Full text
Abstract:
Children seeking asylum are among the most vulnerable groups in the world. Arriving in a country of refuge should be synonymous with safety; this is not so in Australia. Unaccompanied children arriving by boat are automatically transferred to and detained in the Regional Processing Centre on the Republic of Nauru with no one to advocate on their behalf of their rights and best interests, including their right to an adequate education. Trapped on the small island and uncertain of their futures, children overwhelmingly expressed despair and helplessness, many turning to self-harm. In 2015, the Australian government awarded the contract for education to Broadspectrum, formerly known as Transfield Services Ltd. – a company implicated in the abuse and neglect of children. Since then, truancy rates have increased due to fears for safety, poor structural conditions in schools, and lack of qualified teachers. Failing to provide access to education thwarts the life chances of youth who are already severely disadvantaged and contravenes Australia’s international human rights obligations.
APA, Harvard, Vancouver, ISO, and other styles
2

Reale, Michelle. ""We Never Thought It Would Be Like This": Refugees' Experiences in Sicily." Qualitative Report, January 20, 2015. http://dx.doi.org/10.46743/2160-3715/2015.1823.

Full text
Abstract:
The arrival of refugees by boat to Sicily is not, perhaps, significant in numbers, but from a humanitarian point of view it is a crisis in the truest sense of the word. Refugees that arrive in port cities are more susceptible to trafficking due to their extra vulnerability and impaired emotional and physical states. The three main preoccupations refugees are: the arduous and often deadly journey, their treatment upon arrival, and rebuilding their lives in a society that does not want them. They often wonder if what they encounter in Sicily is in some ways worse than the place they left. These refugees are both from refugee camps and refugee centers where I spent time and engaged the, predominantly men, in small conversation(s) that led to in-depth interviewing. These poems represent the journey not as a choice, but a destiny of sorts. Poetic inquiry allows me to represent my data in a variety of ways, and to avoid trying to say everything all at once in any one particular piece. These poems show the refugees’ social, mental and physical battles upon arrival. My intention is to pluck them from the masses and let their humanity and their particular experiences shine forth.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Truant (Boat)"

1

Stephens, Scott McDonald. "An Urban Camp for Boat Building." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/9886.

Full text
Abstract:
At the age of eighteen, when I was approaching the end of my apprenticeship as a cabinetmaker, I made my first self designed piece of furniture. The master cabinetmaker or the client determined the form of most of the furniture made in our shop, and I seldom liked it. I did not even like the wood we used for the best pieces: walnut. I chose light colored ash for my bed and cupboard, and I made them so they looked good on all sides, with the same wood and the same careful work back and front. I disregarded the usual practice of expanding less time and care on the back because no one ever sees it anyway. At long last I was able to round off the edges only slightly without being corrected, running the sandpaper swiftly and lightly over the edges to soften their sharpness without losing the elegance and fineness of the lines. I barely touched the corners where the three edges met. I fitted the door of the cupboard into the frame at the front with a maximum of precision so that it closed almost hermetically, with a gentle frictional resistance and a barely audible sound of escaping air. It felt good working on this cupboard. Making the precisely fitting joints and exact shapes to form a whole, a complete object that corresponds to my inner vision, triggering in me a sense of intense concentration, and the finished piece of furniture added freshness to my environment. Peter Zumthor Thinking Architecture
Master of Architecture
APA, Harvard, Vancouver, ISO, and other styles
2

Nouri, Divina. "Boat insurance from the customer’s perspective : - A study on what aspects private policyholders value most in Swedish insurance companies." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45500.

Full text
Abstract:
People play a major role in the marketing of services, due to the fact services are intangible, and customers look for ways to determine the quality of services. Since services differ from physical goods, service providers need to understand how they affect their organizations. Furthermore, the criterion for satisfaction is different and the customer participates in the process, hence the interest to study this more thoroughly.
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Galby, Mohamed, and Madani Arezou. "Hardware Root of Trust for Linux Based Edge Gateway." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-18846.

Full text
Abstract:
Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. Many researches and studies have been conducted to alleviate such a problem. One of the solutions can be achieved by building a root of trust based on a hardware module such as Trusted Platform Module (TPM) or software like Trusted Execution Environment (TEE). In this work, we provide a solution to the problem by enabling Hardware Root of Trust (HRoT) using TPM on a product from HMS Industrial Network AB known as GWen board, a Linux-based embedded system, used as gateway to connect IoT devices. We describe a method that uses the processor of the GWen (i.e. Zynq-7020 FPGA SoC) to enable secure boot. Besides, we provide a method to enable the TPM chip mounted on the GWen (i.e. SLB 9670 TPM 2.0) using TPM Software Stack TSS 2.0. We demonstrated, in detail, various use-cases using the TPM on GWen including cryptographic keys generation, secure key storage and key usage for different cryptographic operations. Furthermore, we conducted an analysis to the adopted solution by inspecting the latency of TPM commands on the GWen gateway. According to the high restrictions of TPM 2.0 specifications and based on our results, adding the TPM 2.0 to the IoT gateway GWen will enhance the security of its Linux distribution and will makes it possible to securely identify and authenticate the gateway on the network based on its secret keys that are stored securely inside its TPM.
APA, Harvard, Vancouver, ISO, and other styles
4

Helgsten, Möller Mira, and Jessica Samuelsson. "'Långt bort, men ändå så nära' : En kvalitativ studie om det virtuella ledarskapet." Thesis, Linnéuniversitetet, Institutionen för organisation och entreprenörskap (OE), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105589.

Full text
Abstract:
Purpose: The purpose of the study is to make a survey of virtual leadership. Theresults are expected to serve as a tool for leaders that switch into virtualleadership.Method: A qualitative study with a deductive method approach. The primarysources of data collection are produced through semi-structuredinterviews.Conclusion: The study has resulted in that in order to achieve successful virtualleadership, the virtual distance must be reduced, that is, the feeling that weare separated from each other. To reduce a perceived virtual distance,functional tools such as communication and division of responsibilities arerequired. Through these tools, an increased trust and belonging will beachieved, which reduces the virtual distance. Based on the situation andthe individual, the collaboration between the various tools has not alwaysbeen important, but instead finding a balance where the leader becomesaware of what is most applicable.
APA, Harvard, Vancouver, ISO, and other styles
5

Markanovic, Michel, and Simeon Persson. "Trusted memory acquisition using UEFI." Thesis, Blekinge Tekniska Högskola, Institutionen för kreativa teknologier, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3582.

Full text
Abstract:
Context. For computer forensic investigations, the necessity of unmodified data content is of vital essence. The solution presented in this paper is based on a trusted chain of execution, that ensures that only authorized software can run. In the study, the proposed application operates in an UEFI environment where it has a direct access to physical memory, which can be extracted and stored on a secondary storage medium for further analysis. Objectives. The aim is to perform this task while being sheltered from influence from a potentially contaminated operating system. Methods. By identifying key components and establishing the foundation for a trusted environment where the memory imaging tool can, unhindered, operate and produce a reliable result Results. Three distinct states where trust can be determined has been identified and a method for entering and traversing them is presented. Conclusions. Tools that does not follow the trusted model might be subjected to subversion, thus they might be considered inadequate when performing memory extraction for forensic purposes.
APA, Harvard, Vancouver, ISO, and other styles
6

Filho, Joaquim José de Barros Dias. "Princípio e cláusula geral da boa-fé objetiva e suas aplicações no sistema processual civil brasileiro." Universidade Católica de Pernambuco, 2011. http://www.unicap.br/tede//tde_busca/arquivo.php?codArquivo=591.

Full text
Abstract:
A presente pesquisa aborda as alterações ocorridas no modo sobre o qual se desenvolve o processo civil brasileiro, na perspectiva de superar os estigmas de uma jurisdição omissa e recheada de concepções privatistas e enveredar pelo caminho que se orienta por uma concepção de ser o processo um mecanismo apto a dar mais efetividade ao direito e à promoção da justiça, quando realizado em sintonia com os valores constitucionais. Trabalha-se sob o paradigma da superação da visão individualista do direito processual e da elevação de sua expressão social, atento às disposições do Estado Constitucional, a partir do marco teórico do formalismovalorativo, a ser realizado por meio de uma legislação menos casuística e atrelada aos princípios fundamentais, que permitem a construção de um processo cooperativo, desenvolvido a partir do princípio do contraditório e da observância a padrões de boa-fé estabelecidos objetivamente
Sem Abstract
APA, Harvard, Vancouver, ISO, and other styles
7

Dias, Filho Joaquim José de Barros. "Princípio e cláusula geral da boa-fé objetiva e suas aplicações no sistema processual civil brasileiro." Universidade Católica de Pernambuco, 2011. http://tede2.unicap.br:8080/handle/tede/469.

Full text
Abstract:
Made available in DSpace on 2017-06-01T18:18:09Z (GMT). No. of bitstreams: 1 dicertacao_joaquim_jose.pdf: 970043 bytes, checksum: e40a5131fe40e22d4611350b80746f88 (MD5) Previous issue date: 2011-05-18
Sem Abstract
A presente pesquisa aborda as alterações ocorridas no modo sobre o qual se desenvolve o processo civil brasileiro, na perspectiva de superar os estigmas de uma jurisdição omissa e recheada de concepções privatistas e enveredar pelo caminho que se orienta por uma concepção de ser o processo um mecanismo apto a dar mais efetividade ao direito e à promoção da justiça, quando realizado em sintonia com os valores constitucionais. Trabalha-se sob o paradigma da superação da visão individualista do direito processual e da elevação de sua expressão social, atento às disposições do Estado Constitucional, a partir do marco teórico do formalismovalorativo, a ser realizado por meio de uma legislação menos casuística e atrelada aos princípios fundamentais, que permitem a construção de um processo cooperativo, desenvolvido a partir do princípio do contraditório e da observância a padrões de boa-fé estabelecidos objetivamente
APA, Harvard, Vancouver, ISO, and other styles
8

Paula, Luiza Checchia Stuart Cunha de. "Suppressio e surrectio: natureza, efeitos, aplicabilidade e análise comparativa com figuras jurídicas correlatas." Pontifícia Universidade Católica de São Paulo, 2015. https://tede2.pucsp.br/handle/handle/6693.

Full text
Abstract:
Made available in DSpace on 2016-04-26T20:23:28Z (GMT). No. of bitstreams: 1 Luiza Checchia Stuart Cunha de Paula.pdf: 1173260 bytes, checksum: cd16a38a9525ac6e116854c97c357b49 (MD5) Previous issue date: 2015-02-11
The paper analyzes the institutes of surrectio and suppressio, differentiating them from related figures, demonstrating its practical applicability and discussing questions on the topic. First of all, it analyzes the principles of good faith and trust, whose understanding it is deemed essential to the understanding of the topic. Examines the objective good faith focused on sealing the contradictory behavior, and in the famous theory of proper actions. Traces a historical context of the suppression of contradictory behavior, showing the evolution of the need to protect trust as the foundation of existence of a legal relationship. Studies the origin of the concepts of suppressio and surrectio, conceptualizes institutes and characterized their assumptions of existence and of the appropriateness of its assumptions. Discusses the concept and the applicability of other figures arising from the principle that prohibits the contradictory behavior and their chances of appropriateness, bringing its implementation in doctrine and jurisprudence. Studies the effects of suppressio and surrectio and the distinction of the practical application in relation to prescription, estoppel, novation and similar institutes. Shows the current scenario of the use of these figures by the operators of Brazilian law, as well as other institutes, based on analysis of relevant judgments by Brazilian Courts
O trabalho analisa os institutos da surrectio e suppressio diferenciando-os de figuras correlatas, demonstrando sua aplicabilidade prática e discutindo questionamentos sobre o tema. Aborda de início os princípios da boa-fé e da confiança, cujo entendimento se julga essencial para a compreensão do tema. Examina a boa-fé objetiva com foco na vedação ao comportamento contraditório e na teoria dos atos próprios. Traça um contexto histórico da boa-fé, mostrando a evolução da necessidade de proteção à confiança como fundamento de existência da relação jurídica. Estuda a origem dos conceitos da suppressio e da surrectio, conceitua os institutos e caracteriza seus pressupostos de existência e suas hipóteses de cabimento. Discute o conceito e a aplicabilidade de outras figuras decorrentes do princípio que veda o comportamento contraditório e suas hipóteses de cabimento, trazendo sua previsão e aplicação na doutrina e jurisprudência. Trata dos efeitos da suppressio e da surrectio com base na distinção de aplicação prática em relação aos institutos da prescrição, decadência, preclusão lógica, novação e renúncia tácita. Mostra o atual cenário da utilização de referidas figuras pelos operadores do direito brasileiro, assim como dos demais institutos mencionados, com base em análise de acórdãos relevantes prolatados por nossos Tribunais
APA, Harvard, Vancouver, ISO, and other styles
9

Aguirre, João Ricardo Brandão. "Responsabilidade por informações, conselhos ou recomendações nas relações entre particulares." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/2/2131/tde-02082011-115409/.

Full text
Abstract:
A evolução das relações sociais, o acelerado avanço tecnológico e a dinâmica das relações comerciais fizeram com que o conhecimento e a informação se tornassem bens de inegável valor em um mundo globalizado e em constante transformação. Como conseqüência, a informação constitui instrumento essencial para o desenvolvimento das relações humanas, e sua transmissão pauta-se, em regra, pela confiança depositada nos diversos interlocutores. No entanto a troca de informações pode acarretar a quebra dessa confiança, causando danos à pessoa ou ao patrimônio e dando origem à obrigação de repará-los. O presente trabalho, desenvolvido a partir de compilação doutrinária e jurisprudencial, objetiva proceder à análise e discussão da responsabilidade daqueles que dão informações, conselhos ou recomendações a outrem, em especial no que tange às relações entre particulares. O exercício potencialmente danoso do dever de informar, a negligente transmissão de um parecer ou de um simples esclarecimento e os prejuízos daí decorrentes justificam o estudo mais detalhado deste tema. Assim, pretende-se discorrer sobre os fundamentos do dever de informar, de dar conselhos ou recomendações, tomando-se por base a ordem de valores de nosso ordenamento, alicerce necessário para o desenvolvimento das relações pessoais e fonte de um dever ético de conduta, a fim de demonstrar a existência de uma responsabilidade pela quebra da confiança depositada no sistema jurídico brasileiro, cuja violação gera a obrigação de reparação dos danos que dela decorram. Sobre essa base valorativa, nosso trabalho objetiva proceder à análise da responsabilidade pelos danos causados nas relações entre particulares, em virtude de conselhos, recomendações ou informações, seja na fase que antecede a formação do contrato, seja na fase de sua conclusão e execução ou até mesmo posteriormente à sua extinção.
The development of social relationships, the swift technological advancements, and the dynamics of business relations have turned knowledge and information into invaluable assets in an ever changing, globalized world. As a result, information has become a fundamental tool in the development of human relations. Disclosure of information is currently subject to the mutual reliability exercised by the several actors involved in the process. However, exchanging information may lead to a failure in complying with such reliability, which is likely to cause ultimate damage to persons or assets and therefore result in the obligation to repair. This paper was prepared on the basis of data gathered from case law and legal rules, and aims to review and discuss the liability assigned to those who provide information, counseling and recommendations to third parties, particularly within the framework of private parties. The reasons for a more detailed approach to this issue lie on the potentially damaging nature of the obligation to inform and the damage that is likely to result from the reckless rendering of either an opinion or more specific information. This paper will approach the fundamentals of the obligation to render information, counseling or recommendations on the basis of the Brazilian legal system, which is not only a pillar of personal relations development, but also a source for ethical conduct obligation. To a larger extent, it aims to provide evidence that liability stems from relying on the Brazilian legal system, and that failure to comply with said system will lead into the obligation of repairing the damage incurred. Based on these values, this paper will further review the liability derived from providing counseling, recommendations or information within the scope of private parties relationships. This applies to the initial stages of an agreement as well as the termination and settlement thereof and the procedures following thereafter.
APA, Harvard, Vancouver, ISO, and other styles
10

Sperb, Gabriela Steffens. "A relação de emprego sob uma perspectiva comunitária: um contrato existencial, relacional e fraterno pautado pela boa-fé." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/148779.

Full text
Abstract:
A presente dissertação se propõe a fazer uma análise do contrato de trabalho atual e de como a crise da pós-modernidade e os modos de produção adotados pela sociedade pós-industrial o afetaram. Será realizada uma revisão histórica do contrato de trabalho, bem como, uma investigação das teorias acerca de sua natureza jurídica, dedicando-se especial atenção à teoria comunitário-pessoal da relação de trabalho. O contrato de trabalho e suas características serão objeto de estudo, com especial atenção às críticas atuais ao instituto, a partir das quais será realizada uma comparação entre ele e os contratos civilistas e consumeristas. Analisadas as particularidades dos chamados contratos pós-modernos e a proposta de reconstrução dogmática elaborada por Maria do Rosário Palma Ramalho, será sugerida uma configuração diferente do contrato de trabalho clássico apoiada na boa-fé e a partir das concepções existencial, relacional e fraterna do contrato. A aplicação da boa-fé, sob a ótica da função social, será estudada como forma de viabilizar a noção comunitária do vínculo laboral. Analisar-se-á o conceito e a aplicabilidade das categorias contratuais existenciais e relacionais à relação de trabalho, destacando-se a possibilidade de agregá-las às características clássicas do contrato laboral. A fraternidade será estudada como elemento indispensável à concepção comunitária das relações de trabalho.
This dissertation aims make an analysis of the current labor agreement and how it is affected by the post-modern crisis and the production methods adopted by the post-industrial society. A historical review of the employment contract will be carried out and an investigation of the theories about its legal nature, devoting particular attention to community-personal theory of the employment relationship. The employment contract and its characteristics will be studied, with special attention to the current criticism of the institute, from which will be compared to civil law contract and consumer. Analyzed the characteristics of so-called postmodern contracts and the proposed dogmatic reconstruction drafted by Maria do Rosário Palma Ramalho, will be a suggested different configuration of the standard employment contract with emphasis on good faith and from the existential concepts, relational and fraternal contract. The application of good faith from the perspective of social function, will be studied as a way to enable the community concept of employment. It will analyze the concept and applicability of existential and relational categories contractual employment relationship, especially the ability to aggregate them to the classic characteristics of the labor contract. It will examine the fraternity as an essential element to the community conception of labor relations.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Truant (Boat)"

1

McGee, Rick. Eleven chickens in a boat: A story of faith, fear, and feathers! Hazelwood, MO: WAP Children, an imprint of Word Aflame Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ortberg, John. If you want to walk on water, you've got to get out of the boat. Philadelphia: Running Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

If you want to walk on water, you've got to get out of the boat. Grand Rapids, Mich: Zondervan Pub. House, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

If you want to walk on water, you've got to get out of the boat. Grand Rapids, Mich: Zondervan Pub. House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ortberg, John. If you want to walk on water, you've got to get out of the boat. Waterville, ME: Thorndike Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

If You Want to Walk on Water, You've Got to Get Out of the Boat. Grand Rapids: Zondervan, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

If you want to walk on water, you've got to get out of the boat. Grand Rapids, Mich: Zondervan, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

If you want to walk on water, you've got to get out of the boat. Waterville, Me: Walker Large Print, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Boating and fishing: Administration of the Wallop-Breaux Trust Fund : briefing report to congressional requesters. Washington, D.C: The Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Canada. Bill: An act to amend the Fisheries Act, and to prohibit the wanton destruction of small fish. Ottawa: Hunter, Rose, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Truant (Boat)"

1

Syed, Rehan, and Moe Thandar Wynn. "How to Trust a Bot: An RPA User Perspective." In Lecture Notes in Business Information Processing, 147–60. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58779-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gazza, F., M. Botti, L. Ragionieri, C. Sorteni, D. Russo, P. Clavenzani, R. Chiocchetti, L. Bo Minelli, and R. Panu. "Distribution Pattern and Chemical Coding of Sympathetic Trunk Ganglia Neurons Supplying the Boar Urinary Bladder Trigone." In Trends in Veterinary Sciences, 27–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36488-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"70. Tree Trunk for a Boat." In A Flowering Tree, 191–93. University of California Press, 1997. http://dx.doi.org/10.1525/9780520311459-071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dickens, Charles. "Chapter XI." In Great Expectations. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199219766.003.0034.

Full text
Abstract:
After well considering the matter while I was dressing at the Blue Boar in the morning, I resolved to tell my guardian that I doubted Orlick’s being the right sort of man to fill a post of trust at Miss Havisham’s. “Why, of course...
APA, Harvard, Vancouver, ISO, and other styles
5

Kipling, Rudyard. "The Elephant’S Child." In Just So Stories for Little Children. Oxford University Press, 2009. http://dx.doi.org/10.1093/owc/9780199538607.003.0006.

Full text
Abstract:
N the High and Far-Off Times the Elephant, O Best Beloved, had no trunk. He had only a blackish, bulgy nose, as big as a boot, that he could wriggle about from side to side; but he couldn’t pick up things with it. But...
APA, Harvard, Vancouver, ISO, and other styles
6

Raitz, Karl. "Connections." In Making Bourbon, 191–219. University Press of Kentucky, 2020. http://dx.doi.org/10.5810/kentucky/9780813178752.003.0011.

Full text
Abstract:
Kentucky’s early farmers and distillers were shipping products to New Orleans by way of the Ohio and Mississippi Rivers by the late 1780s. River navigation was influenced by access, channel obstructions, cold weather, and water levels; seasonal dry periods and ice-covered streams curtailed shipping. Steam-powered boats enabled two-way traffic on trunk streams. Overland roads were mere tracks prior to the turnpike era of “built roads,” which began in the 1830s and lasted until the 1890s. Some distillers obtained state charters to build turnpikes that linked their works to trunk roads, rivers, or railroads. By the 1850s, railroads reliably moved goods between the largest cities and productive hinterlands. As the railroads extended new branch lines across the countryside and through cities, distillers often relocated their works to rail-side sites.
APA, Harvard, Vancouver, ISO, and other styles
7

Rodrigues, Dário de Oliveira. "Marketing-Mix Metamorphosis and New Trusted Business Practices." In Competitive Drivers for Improving Future Business Performance, 46–66. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-1843-4.ch004.

Full text
Abstract:
This chapter discusses the impact on the marketing-mix due to the confluence of the internet of things and the internet of value which seems to be made possible by the blockchain technology. This “perfect storm” induces a vortex of reliability and business trust between people (“peer-to-peer”) and machines (“bot-to-bot”), without the traditional need of third parties to ensure confidence in a negotiation. This implies innovative business practices and self-executing contracts that will take place in a more decentralized and trustworthy environment, speeding up the metamorphosis of the four marketing-mix elements in such a way that marketers will have to deal with a “product” that is always in a “beta-version”; a dynamic “price” that initially has to be free; an atomized “promotion” of reliable messages found by costumers (not the opposite); and a new virtual secure “place,” which is made possible due to augmented reality and blockchain.
APA, Harvard, Vancouver, ISO, and other styles
8

Chauvin, John, Ray Duran, Stanley Ng, Thomas Burke, Kenneth Barton, Nicholas MacKinnon, Kouhyar Tavakolian, Alireza Akhbardeh, and Fartash Vasefi. "Advanced Optical Technologies in Food Quality and Waste Management." In Innovation in the Food Sector Through the Valorization of Food and Agro-Food By-Products. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.97624.

Full text
Abstract:
Food waste is a global problem caused in large part by premature food spoilage. Seafood is especially prone to food waste because it spoils easily. Of the annual 4.7 billion pounds of seafood destined for U.S. markets between 2009 and 2013, 40 to 47 percent ended up as waste. This problem is due in large part to a lack of available technologies to enable rapid, accurate, and reliable valorization of food products from boat or farm to table. Fortunately, recent advancements in spectral sensing technologies and spectroscopic analyses show promise for addressing this problem. Not only could these advancements help to solve hunger issues in impoverished regions of the globe, but they could also benefit the average consumer by enabling intelligent pricing of food products based on projected shelf life. Additional technologies that enforce trust and compliance (e.g., blockchain) could further serve to prevent food fraud by maintaining records of spoilage conditions and other quality validation at all points along the food supply chain and provide improved transparency as regards contract performance and attribution of liability. In this chapter we discuss technologies that have enabled the development of hand-held spectroscopic devices for detecting food spoilage. We also discuss some of the analytical methods used to classify and quantify spoilage based on spectral measurements.
APA, Harvard, Vancouver, ISO, and other styles
9

Shibasaki, Hiroshi, Mark Hallett, Kailash P. Bhatia, Stephen G. Reich, and Bettina Balint. "Dyskinesia, Motor Stereotypies, and Tics." In Involuntary Movements, 137–54. Oxford University Press, 2020. http://dx.doi.org/10.1093/med/9780190865047.003.0006.

Full text
Abstract:
Dyskinesia is characterized by complex, irregular involuntary movements involving lips, tongue, extremities, and/or trunk. The term “dyskinesia” is often used to encompass complex involuntary movements that do not fit into another category of involuntary movements. Focal dyskinesia is commonly seen in the lips and tongue (orolingual dyskinesia or oral dyskinesia). Drug side effects are the most common cause of generalized dyskinesia, usually those that influence dopamine such as L-dopa and neuroleptics (drug-induced dyskinesia, tardive dyskinesia). Motor stereotypies are repetitive occurrences of the same movements; movements commonly encountered in this condition range from simple movements like shaking arms and nodding to complex movements. Motor stereotypies are commonly observed in children with Asperger syndrome, Rett syndrome and other automatisms, and mental retardation. In adults, stereotyped movements are seen in cases of severe infectious encephalitis, autoimmune encephalitis (e.g., limbic encephalitis), cerebrovascular diseases involving the frontal lobe, and neurodegenerative diseases like frontotemporal lobar degeneration. Tics are irregular, typically brisk movements ranging from shock-like simple movements resembling myoclonus (simple tic) to complex movements (complex tic). Patients with tics tend to repeat certain movements like blinking or grimacing, but in the patients with Gilles de la Tourette syndrome, tics appear as a variety of movements including vocalization (vocal tic). These patients can stop the movements for several seconds, but it is often followed by rebound; they often feel an urge to move before a bout of tics and feel release after the bout.
APA, Harvard, Vancouver, ISO, and other styles
10

"Results and Discussions." In Detection and Mitigation of Insider Attacks in a Cloud Infrastructure, 83–90. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7924-3.ch006.

Full text
Abstract:
This chapter describes the proof-of-concept of the proposed protocol architecture. The eXtensible modular hypervisor framework has been utilized to build the TrustVisor hypervisor along with the core modules: cryptography operations, TEE, and TPM emulator, which contains TPM library function to make a secure communication with TPM hardware. The constructed hypervisor has been placed in the cloud server grub entry to make a choice of hypervisor. To ensure the trust worthiness of cloud platform, a remote attestation concept is used along with the most popular and widely used method called integrity measurement architecture (IMA). Remote attestation uses IMA. It works based on binary attestation concept. After configuring IMA, it calculates and extends the hashes of all components while boot process into their respective PCRs. To ensure the remote attestation with privacy preserving of NC, the authors used attestation identity key (AIK) for signing hashes of PCRs while performing quote operation. They used TPM emulator for communication with TPM device using TPM driver.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Truant (Boat)"

1

Pavur, James, Martin Strohmeier, Vincent Lenders, and Ivan Martinovic. "In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust." In 2021 13th International Conference on Cyber Conflict (CyCon). IEEE, 2021. http://dx.doi.org/10.23919/cycon51939.2021.9468300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pocklassery, G., W. Che, F. Saqib, M. Areno, and J. Plusquellic. "Self-authenticating secure boot for FPGAs." In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2018. http://dx.doi.org/10.1109/hst.2018.8383919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khalid, Obaid, Carsten Rolfes, and Andreas Ibing. "On implementing trusted boot for embedded systems." In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 2013. http://dx.doi.org/10.1109/hst.2013.6581569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Tian, Xiaoxin Cui, Yewen Ni, Dunshan Yu, Xiaole Cui, and Gang Qu. "A practical cold boot attack on RSA private keys." In 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2017. http://dx.doi.org/10.1109/asianhost.2017.8353995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Suzaki, Kuniyasu, Kengo Iijima, Toshiki Yagi, and Nguyen Anh Quynh. "Trusted Boot and Platform Trust Services on 1CD Linux." In 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference (APTC). IEEE, 2008. http://dx.doi.org/10.1109/aptc.2008.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McMahan, Joseph, Weilong Cui, Liang Xia, Jeff Heckey, Frederic T. Chong, and Timothy Sherwood. "Challenging on-chip SRAM security with boot-state statistics." In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2017. http://dx.doi.org/10.1109/hst.2017.7951806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Streit, Franz-Josef, Florian Fritz, Andreas Becher, Stefan Wildermann, Stefan Werner, Martin Schmidt-Korth, Michael Pschyklenk, and Jurgen Teich. "Secure Boot from Non-Volatile Memory for Programmable SoC Architectures." In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2020. http://dx.doi.org/10.1109/host45689.2020.9300126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shellshear, Evan, Johan S. Carlson, and Robert Bohlin. "A Combinatorial Packing Algorithm and Standard Trunk Geometry for ISO Luggage Packing." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-70778.

Full text
Abstract:
Automated packing algorithms for luggage compartments in automobiles are of great interest. The difficulty of automatically computing the volume of a mesh representation of a boot according to the ISO 3832 standard restricts the design of vehicles required to meet minimal trunk volume specifications and also increases the cost of physical and virtual verification of the original design specifications. In our paper we present a new heuristic combinatorial packing algorithm for the ISO luggage packing standard. The algorithm presents numerous advantages over previous algorithms in terms of its simplicity and speed as well as producing high density of packed objects. The algorithm also solves the problem of requiring a fixed grid structure to position discrete objects in the boot and can also be used as an additional optimization on existing algorithms. In addition, we also provide the first comparison of state of the art packing algorithms for a simplified trunk geometry and propose a standard trunk geometry to enable future researchers to compare their results with other packing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
9

Martinez-Bea, Sergi, Sergio Castillo-Perez, and Joaquin Garcia-Alfaro. "Real-time malicious fast-flux detection using DNS and bot related features." In 2013 Eleventh Annual Conference on Privacy, Security and Trust (PST). IEEE, 2013. http://dx.doi.org/10.1109/pst.2013.6596093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yin, Hongfei, Hongjun Dai, and Zhiping Jia. "Verification-Based Multi-backup Firmware Architecture, an Assurance of Trusted Boot Process for the Embedded Systems." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography