Dissertations / Theses on the topic 'Defensive'

To see the other types of publications on this topic, follow the link: Defensive.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Defensive.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Hellström, Per, and Victor Jaccopucci. "Defensive Yahtzee." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168668.

Full text
Abstract:
In this project an algorithm has been created that plays Yahtzee using rule based heuristics. The focus is getting a high lowest score and a high 10th percentile. All rules of Yahtzee and the probabilities for each combination have been studied and based on this each turn is optimized to get a guaranteed decent high score. The algorithm got a lowest score of 79 and a 10th percentile of 152 when executed 100 000 times.
APA, Harvard, Vancouver, ISO, and other styles
2

Game, Carlos Vallejo. "Defensive minefield planning." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Esparza, Jana Scoville. "Validating the Rorschach Defense Scale by Examining Defensive Functioning in College Students." Thesis, North Texas State University, 1988. https://digital.library.unt.edu/ark:/67531/metadc501158/.

Full text
Abstract:
This study attempted to provide validation for Lerner and Lerner's Rorschach Defense Scale by investigating the relationship between primitive defenses as measured by the Rorschach Defense Scale, level of object relations as measured by the Developmental Analysis of the Concept of the Object Scale, and characteristic defensive operations as assessed by the Minnesota Multiphasic Personality Inventory. One hundred and twenty undergraduates completed the Rorschach and MMPI, and the RDS and DACOS were applied to their Rorschach responses. The results show a significant positive correlation between use of primitive defenses and level of object relations development -and a significant negative correlation between the defense Projective Identification and MMPI scale 6 (Paranoia) elevation. Overall, these results did not support the validity of the RDS.
APA, Harvard, Vancouver, ISO, and other styles
4

Berggren, Jennie, and Carina Engström. "Defensive Tactics : In hostile takeovers." Thesis, Jönköping University, JIBS, Business Administration, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dale, Andrew James Roger. "Defensive behaviours toward knowledge sharing." Thesis, University of Warwick, 1999. http://wrap.warwick.ac.uk/4491/.

Full text
Abstract:
Direct patient care requires knowledge sharing between clinical professionals. However, clinicians have often been suspicious of managers' motives, this lack of trust often resulting in reluctance to share knowledge for managerial purposes. Trust is one component of the psychological contract - an unwritten set of expectations between employees and employer. There are strong links between components of the psychological contract and defensive behaviours. There is much theory to support these links but little research evidence to support and explain these links. To overcome defensive behaviours requires an understanding of how they have developed, and particularly the role played by the psychological contract. This research builds on research first undertaken by Argyris in the 1960s, enhanced and made relevant to the current business environment and organisational arrangements currently prevailing in the NHS. A model and an analytical framework were developed for this research to assess organisational, professional and employee health in two health authorities. This research concludes that organisational ill-health, and failure to ensure the psychological contract is intact, result in employees displaying defensive behaviours and keeping knowledge to themselves. Components of the psychological contract were found to have strong links with organisational arrangements. Subtle variances were found between clinical and non-clinical employees, and between Chief Executives/Directors and those below this level. This research adds to our knowledge by identifying the different ways in which these groups develop paradigms that are often in conflict, sometimes intangible, and usually difficult to change. This added knowledge will allow organisational, team and personal development to have a sharper focus, particularly with reference to development of the psychological contract in the NHS, overcoming defensive behaviours, and breaking down barriers to knowledge sharing. This will support the development of infrastructures, teams and individuals to take NHS organisations into the 21st century with added confidence.
APA, Harvard, Vancouver, ISO, and other styles
6

Atkinson, Cathie. "Defensive Coping, Stress, and Immunity /." The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487861396027367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Anna Magdalena. "Food choices of tactile defensive children." Thesis, University of Port Elizabeth, 2003. http://hdl.handle.net/10948/d1020371.

Full text
Abstract:
This research explores a different view of the picky or fussy eater. Although occupational therapists and speech therapists are aware that children with sensory defensiveness and specific tactile defensiveness have different eating habits, this has not been described before.
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Hao. "Toward hardware-oriented defensive network infrastructure." Thesis, State University of New York at Binghamton, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3713553.

Full text
Abstract:

The prosperity of the Internet has made it attractive to hackers and malicious attackers. Distributed attacks, such as: DDoS attacks and Internet worms have become major threats towards the network infrastructure. Collaborating existent single-point-deployed security applications over multi-domains for distributed defense is promising. Taking advantage of the small-world network model, a three-layered network modeling platform was developed for exploring behaviors of collaborative defense under the scope of a complex system. Using this platform, a comparison study between two major collaborative defense schemes was conducted. Their performance and eectiveness against signature-embedded worm attacks were evaluated accordingly.

Given the rapid evolution of attack methods and toolkits, software-based solutions to secure the network infrastructure have become overburdened. The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution to close this performance gap is through hardware implementation of security functions. After a comprehensive survey on major recongurable hardware-based approaches application on network infrastructure security area, an optimized design of FPGA-based Power Spectral Density (PSD) data converter for online Shrew DDoS attack detection was proposed and prototyped. Combining an innovative component-reusable Auto-Correlation (AC) algorithm and the adapted 2N-point real-valued Discrete Fourier Transform (DFT) algorithm, a maximum reduction of 61.8% processing time from 27471.4 us to 10504.8 us was achieved. These ecient hardware realization enabled the implementation of this design to a Xilinx Virtex2 Pro FGPA.

The scalability issue against continuously expanding signature databases is another major impediment aecting hardware application for network intrusion detection. With the observation that signature patterns are constructed from combinations of a limited number of primary patterns, a two-stage decomposition approach was developed to solve this issue. The evaluation results show that a reduction in size of over 77% can be achieved on top of signature patterns extracted from the Snort rule database after decomposition.

APA, Harvard, Vancouver, ISO, and other styles
9

Hendershott, Robert J. "Defensive leveraged recapitalizations : theory and evidence." The Ohio State University, 1993. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267618346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hendershott, Robert J. "Defensive leveraged recapitatilizations : theory and evidence /." Connect to resource, 1993. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1267618346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Villanueva, Javier Gerardo. "Defensive processing in elementary school children /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Yumei. "Out of control : organizational defensive routines." Thesis, Bournemouth University, 2017. http://eprints.bournemouth.ac.uk/29322/.

Full text
Abstract:
The current theory posits that organizational defensive routines (ODRs) are one of the reasons to explain why organizations still fail to achieve their learning goals. However, this assumption lacks consistent empirical evidence. This study is one of very few attempts to refine the concept of ODRs and analyze empirically the role ODRs play with respect to organizational learning. The thesis is a collection of essays that addresses the challenges of understanding the effect of ODRs at organizational learning. Each essay has its own focused research objectives to respond the main research questions. The researcher first examines the characteristics of ODRs based on the concept of organizational routines, then the researcher addresses the theoretical debate of how ODRs can affect organizational learning. At organizations, not only organizational factors such as structure, size and age can affect organizational learning, but so does individual factors such as individuals’ personality. Hence, the model integrated both organizational factors and individual factors into the model. To empirically assess the relationships proposed in the framework, it requires a reliable scale to measure ODRs which is missing in previous research. Therefore, the first study focuses on developing a measurement of ODRs through psychometric assessment and validation procedures. This study results in a construct measuring ODRs at the organizational level with two factors with eight items, namely organizational cover-up and organizational pretense. Additionally, ODRs at an individual level are measured by a scale with two factors and six items, namely embarrassment avoidance and rigidity at work. Equipped with the newly developed measurement of ODRs, the researcher conducted another two studies to test theoretical relations between ODRs and organizational learning. The second study uses multiple regressions to analyze the sample of 358 working on organizations of various size, structure, and age. The study includes some important predictors such as age, size and structure of organizations. The researcher confirms that centralized and formalized structures are negatively associated with organizational learning, but age and size do not have statistical influence on learning. The researcher confirms that high ODRs worsen the negative relationship between formalization and organizational learning. The third study applies the ODRs scale at the individual level to test role of these routines on organizational learning. It employs multiple regressions to analyze a sample of 351 observations. All the participants have more than one year working experience in their current organizations. The study includes three important personality traits as predictors, namely conscientiousness, openness to experience and neuroticism. The researcher confirms that openness to experience and neuroticism affect organizational learning. However, the researcher fails to find support on the theoretical hypotheses which predict the level of ODRs has an effect on relationships between organizational learning and those three traits. Theoretically, this study clarifies the definition of ODRs and built a close link with the organizational routines. It also enriches current understanding on the characteristic of routines being stable at the lens of defensive routines. The newly developed scale provides an opportunity to empirically test their roles on organizational learning and other organizational variables. While findings of the empirical study targeting the organizational level lead to the conclusion that organizations should endeavor to reduce ODRs, findings of the other empirical study suggest that individual’s perception of ODRs could be beneficial for organizational learning. This work claims that there seem to be a collective/social effect that is not apparent at the individual level while it influences the organization. Results diverging from theoretical deductions stimulate interesting prospects for further research in the future which are also discussed. Finally, the study indicates that structure is the most effective factor of organizational learning in comparison with age and size. Hence, organizations should endeavor to reduce the level of formalization and centralization to create a learning environment. The study can benefits organizations at following three aspects. First, organizations can make use of the new scale to identify ODRs at any stages of their development. This would prevent organizations from suffering serious consequences of by-passing and covering up negative issues caused by ODRs. Second, the organizations regardless of age and size can learnt from this study about the importance to realize the contributions of ODRs at organizational level and individual level. In order to alleviate ODRs, organizations should consider changing organizational factors which encourage people at organizations collectively avoid open communication. Meanwhile, they also need to pay attention at educating individuals who tend to be more likely to avoid discussing embarrassing issues. Third, organizations should design an appropriate organizational structure to facilitate information sharing and empower employees at decision making.
APA, Harvard, Vancouver, ISO, and other styles
13

Goldberg, Stephen Gregory. "Durational Control of Defensive Burying in Rats: An Investigation of a Species-Specific Defense Reaction." DigitalCommons@USU, 1988. https://digitalcommons.usu.edu/etd/5977.

Full text
Abstract:
Six experiments were run to determine whether the duration of conditioned defensive burying (COB) in rats is a function of its consequences. Four experiments developed the methodology. Experiment 1 replicated the standard one-trial experiment, where rats are shocked once by a prod. All three rats exhibited CDB. Experiment 2 used a lever-press-for-water contingency to force recontact with the lever, following shock deliveries in Sessions 6 and 14. All three rats buried the lever in both sessions. Experiment 3 replicated Experiment 2, employing albino and hooded rats. All six buried the lever. The albinos exhibited longer burying durations. Experiment 4 used the lever-press-for-water contingency but employed extinction to test whether rats would bury the lever under that condition. They did not. Experiment 5 used three groups of rats to determine whether burying durations are a function of CDB's consequences. Groups LS and LSH had enough sawdust to cover the lever, but a hole under the lever was opened during LSH's burying. Group SS lacked enough sawdust to cover the lever. The groups' mean burying durations (MBDs) were not significantly different in Session 6. Following Session 14, group differences and a group-by-session interaction were statistically significant. Effect sizes for Groups LS and SS were large. Group LS's MBD increased, Group LSH's remained unchanged, and Group SS's decreased. Experiment 6 used two groups of rats to determine whether MBDs are a function of shock source visibility. Group C's substratum consisted of uncolored, transparent Plexiglas blocks. Group B had black, opaque blocks. Only the group-by-session interaction was statistically significant. The MBDs of Groups Band C paralleled those of Groups LS and SS in Experiment 5. The effect sizes for C and B were large and medium, respectively. CDB occurred in all experiments where the rats received shocks, and CDB was reproduced in experiments where the animals were forced to recontact the shock source through a lever-press-for-water contingency. CDB durations are a function of their consequences. Rats whose burying covers or blocks the shock source from view exhibit longer burying durations in succeeding shock trials. Rats whose burying is ineffective exhibit shorter durations.
APA, Harvard, Vancouver, ISO, and other styles
14

Barnsley, Megan Christina. "The social consequences of defensive physiological states." Thesis, University of Exeter, 2012. http://hdl.handle.net/10036/4062.

Full text
Abstract:
This thesis examines the validity of polyvagal theory as a model of normal socio-emotional responding (Porges, 1995, 2001, 2003a). Polyvagal theory makes several claims, and to date many of its predictions lack empirical testing. In the current research, five main hypotheses stemming from polyvagal theory were identified and tested using healthy participants. The initial empirical study examined the influence of laboratory stressors on autonomic function. The findings revealed that social evaluative threat increases activation of the sympathetic nervous system more than a virtual reality maze, and that arousal remains elevated for longer during anticipation of social evaluative threat in comparison to recovery from social evaluative threat. The second study investigated the effects of emotion regulation strategies on autonomic function, and highlighted the effectiveness of two meditation practices in reducing defensive physiological arousal and increasing subjective positive emotion. These studies were followed with a set of studies designed to evaluate the effects of defensive physiological arousal on socio-emotional functioning, as a direct test of polyvagal theory. The first study examined the effects of a laboratory stressor on facial expressivity, revealing that social evaluative threat had little impact on expressive regulation. A second study investigated the effects of a laboratory stressor on emotional sensitivity and spontaneous facial mimicry. Some limited support was found for polyvagal theory, although neither emotional sensitivity nor facial mimicry was significantly affected by laboratory stress. A final empirical study investigated the effects of a laboratory stressor on affiliation tendencies. The laboratory stressor did not influence participants’ willingness to spend time with others, however the experiment did reveal significant relationships between markers of social safeness and affiliation. The overall conclusion of this thesis is that polyvagal may not be a representative model of socio-emotional functioning in healthy participants. The implications of these findings are discussed in relation to the validity of polyvagal theory as a universal model of socio-emotional responding.
APA, Harvard, Vancouver, ISO, and other styles
15

Bufacchi, Rory John. "Understanding defensive peripersonal space through mathematical modelling." Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10054520/.

Full text
Abstract:
The spatial location of environmental events with respect to one’s body largely dictates their behavioural relevance. Given that stimuli occurring near the body have a greater potential to cause harm, even the phylogenetically-old defensive hand-blink reflex (HBR) increases in magnitude with stimulus proximity. The HBR has allowed for a preliminary characterisation of a defensive peripersonal space (DPPS). The work described here provides a full spatial characterization of DPPS using formal geometrical modelling of HBR data, and highlights the functional significance of DPPS through its dependence on various contextual factors. Modelling and empirical results indicate that (1) the shape of the body area defended by this DPPS can be approximated as a half-ellipsoid centred on the face. (2) The DPPS extending from this to-be-defended area has the shape of a bubble elongated along the vertical axis. (3) This DPPS is malleable: its shape is continuously updated based on gravitational cues. The DPPS also changes in disease: while blind individuals do also display a HBR, (4) the nervous system only develops the ability to modulate HBR magnitude if vision is present during early childhood. (6) In trigeminal neuralgia (TN), a condition in which innocuous trigeminal stimulation triggers paroxysmal unilateral facial pain, DPPS is larger on the side of space ipsilateral to TN. This reflects an increased estimated potential of sensory events to cause harm on that side of space. Finally, (7) DPPS expands when the HBR-eliciting stimulus is moving towards the face. These findings show that the brain purposefully modulates the defensive HBR with proximity in a context-dependent manner, in order to ensure optimal behavior and protection from estimated threats. At a more theoretical level this work also critically discusses ambiguities in the terminology used to report empirical results about peripersonal space, which have generated much confusion in the field.
APA, Harvard, Vancouver, ISO, and other styles
16

Citadini, Jessyca Michele. "A influência da temperatura no comportamento defensivo em Tomodon dorsatus (Serpente, Dipsadidae)." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/41/41135/tde-26042011-232110/.

Full text
Abstract:
Os vertebrados tetrápodes e ectotérmicos possuem a temperatura do corpo variável de acordo com a temperatura do ambiente. Estudos abordando lagartos e serpentes demonstram que diversos comportamentos ou funções dos vertebrados ectotérmicos sofrem direta ou indiretamente influência da temperatura na adequação biológica (fitness) (BARTHOLOMEW, 1982; HUEY, 1982; LILLYWHITE, 1987, MORI; BURGHARDT, 2001). O comportamento antipredatório constitui um caso especial dos comportamentos sabidamente influenciados pela temperatura, pois parece sofrer diversos tipos de alterações em diferentes grupos de tetrápodes ectotérmicos, como salamandras (BRODIE JR.; DUCEY; LEMOS-ESPINAL, 1991), anfíbios anuros (GOMES; BEVIER; NAVAS, 2002), lagartos (RAND, 1964; HERTZ; HUEY; NEVO, 1982; CROWLEY; PIETRUSZKA, 1983) e serpentes (FITCH, 1965; HERCKROTTE,1967; ARNOLD; BENNETT, 1984; SCHIEFFELIN; QUEIROZ, 1991; KEOGH; DESERTO, 1994; MORI; BURGHARDT, 2001). Esses estudos mostram que a temperatura pode afetar as repostas comportamentais tanto em termos de magnitude quanto de qualidade, o que permite supor que as mudanças no tipo de comportamento com a temperatura sejam consistentes com os efeitos da temperatura sobre o desempenho comportamental. O atual estudo testou, mediante uma análise do comportamento, a serpente Tomodon dorsatus (Dipsadidae) em diferentes temperaturas corpóreas, quando exposta a um estímulo externo simulando um ataque predatório. Esta espécie foi escolhida por apresentar um rico repertório defensivo (BIZERRA, 1998). Para as análises, os comportamentos defensivos foram classificados em dois grandes grupos: agressivos e passivos ou de escape, conforme o comportamento apresentado no momento do estímulo. No decorrer do estudo, foi observado que alguns animais eram excessivamente agressivos enquanto que outros eram extremamente propensos à fuga. Por isso, além da classificação inicial, foi feita outra análise que consistiu em classificar os indivíduos em dois grandes grupos: DPA (defesa por agressão) e FCP (defesa via fuga ou comportamento passivo). Neste estudo, observamos que houve uma grande variação individual no que se refere ao comportamento antipredador e essa diferença entre os indivíduos parece ser mais significante quando comparada à variação eventualmente induzida pela temperatura.
Tetrapodes and ecotermicos vertebrates have a variable body temperature according to the temperature of the environment. Studies addressing lizards and snakes show that several behavior and functions of ectotermicos vertebrates suffer directly or indirectly influence of temperature on biological adequacy (fitness) (BARTHOLOMEW, 1982; HUEY, 1982; LILLYWHITE, 1987, MORI; BURGHARDT, 2001). Anti-predatory behavior constitutes a special case among behaviors influenced by temperature, because it seems to suffer from various types of changes in different groups of tetrápodes ectotermicos as salamanders (BRODIE JR.; DUCEY; LEMOS-ESPINAL, 1991), anuros amphibians (GOMES; BEVIER; NAVAS, 2002), lizards (RAND, 1964; HERTZ; HUEY; NEVO, 1982; CROWLEY; PIETRUSZKA, 1983), and snakes (FITCH, 1965; HERCKROTTE,1967; ARNOLD; BENNETT, 1984; SCHIEFFELIN; QUEIROZ, 1991; KEOGH; DESERTO, 1994; MORI; BURGHARDT, 2001).These studies show that the temperature affects behavioral responses both in terms of magnitude and quality, which suggests that the changes on the type of behavior with temperature be consistent with the effects of temperature on the behavioral performance. The current study tested through an analysis of the behavior Tomodon dorsatus snake (Dipsadidae) at different body temperatures when exposed to an external stimulus simulating a predatory attack. This species was chosen because it presents an enriched defensive repertoire (BIZERRA, 1998). For analysis, the defensive behaviors were classified into two main groups: \"aggressive\" and \"passive or escape as the behavior exhibited when the stimulus. During the study, it was observed that some animals were overly aggressive while others were extremely prone to flight. Therefore, besides the initial classification was made a separate analysis was to classify individual in two groups: DPA and FCP. This division that was useful to analyze the influence of temperature in different animals in their degree of aggressiveness. In this study we found that there was great individual variation in relation to antipredator behavior and the difference between individuals appears to be more significant when compared with the variation may be induced by temperature
APA, Harvard, Vancouver, ISO, and other styles
17

Johansen, Aleksandra I. "Seasonal change in defensive coloration in a shieldbug." Doctoral thesis, Stockholms universitet, Zoologiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-62466.

Full text
Abstract:
Protective coloration such as aposematism and crypsis occurs in many insects but only a few species alter their defensive strategy during the same instar. We hypothesize the adult shield bug Graphosoma lineatum with an alternating black and non-melanised longitudinal striation exhibit such a change in defensive coloration. In Sweden, the non-melanised stripes of the pre-hibernation G. lineatum are pale brown and cryptic but they change during hibernation to red and aposematic. We have tested the adaptive functions of coloration of the two G. lineatum forms against bird predators. In Paper I we used great tits as predators and measured detection time of the two forms against a background of dry grass and plants, simulating late-summer conditions. We found that the birds took longer time to find the pale than the red form. Thus, the pale form of G. lineatum is more cryptic in a dry environment than the red form. In Paper II and III we used naïve predators and measured attack rate/latency on red and pale adults and fifth-instar larvae (black and brown) to investigate avoidance and generalisation between the stages. In Paper II domestic chicks initially found the red form most intimidating, but both adult forms are more intimidating than the larva. Moreover, there was a broad generalisation among forms. In Paper III naïve great tits did not find the red form significantly more aversive than the pale adult. Neither the chicks nor the tits showed any difference in the speed of avoidance learning between the two adult colour forms. In Paper IV the shieldbugs themselves were the main focus as we compared activity levels in the different colour forms and found that G. lineatum alters behaviour in accordance to their protective strategy. Thus they were significantly less active during the cryptic phase. Taken together, these experiments suggest that the pale brown adult invests in a cryptic strategy at the cost of reduced protection from aposematism, whereas the red adult benefits from aposematism at the cost of reduced camouflage.
At the time of the doctoral defense, the following papers were unpublished and had a status as follows: Paper 3: Manuscript. Paper 4: Accepted.
APA, Harvard, Vancouver, ISO, and other styles
18

Lin, Borchyi. "A HYPERMEDIA SIMULATION THAT TEACHES DEFENSIVE DRIVING SKILLS." UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_diss/337.

Full text
Abstract:
Because of increased commuter traffic volume on rural roadways collisions between motor vehicles and farm equipment have increased in frequency and severity over the last several years. This study investigated the effects of a multimedia narrative simulation program that taught hazard recognition and promoted defensive driving on rural roadways shared by farm equipment. A companion animated driving game allowed users to practice reaction/stopping time distances with a simulated automobile on a simulated highway when objects appeared suddenly in the path of the automobile. The program and game were delivered by an objective-oriented client/server computer program that also recorded and stored student pre-test, performance, and posttest data. Prior to the main study a user test and pilot study were conducted. Fifteen instructional systems design graduate students completed the user test to evaluate the study procedures and debug the program. Then, a pilot study sample of 17 rural high school students completed the narrative simulation exercise, the reaction/stopping time game, and the study measures that included a demographic survey, pre- and post measures of predicted reaction/stopping time, recognition of collisions hazard cues, numerical performance scores for the simulation exercise, and tracking logs of each student's performance during the animated raction/stopping time game. The main study sample included 123 students age 16 years and older who attended four rural and suburban county high schools. The schools were randome assigned to the four treatment conditions, one control and three treatment groups. The treatment group students completed either (a) the multimedia narrative simulation only, (b) the animated reaction time/stopping time game only, or (c) both the multimedia simulation and the reaction time/stopping time game. As hypothezised, students in the groups that completed the hazard recognition and defensive driving skills performed significantly better on posttests of those skills than students in groups that did not complete the simulation. Compared to students that did not complete the reaction/stopping time game, significantly more students that did complete the game became aware that they could not stop the simulated automobile before hitting an object in its pathway. Yet there was nodifference across the four groups in students' estimates of reaction/stopping time distances. Limitations of the study are noted and discussed. Recommendations for future studies are proposed.
APA, Harvard, Vancouver, ISO, and other styles
19

Watling, Dawn Marie. "Assertive and defensive self-presentational tactics in children." Thesis, University of Sussex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.399821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mitchell, Heidi Joanna. "The mechanisms underlying defensive lignin deposition in wheat." Thesis, University of Southampton, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Pangerl, Stefanie. "Defensive Publishing Handlungsfreiheit und die Aneignung von Innovationsgewinnen." Wiesbaden Gabler, 2009. http://d-nb.info/993686257/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Full text
Abstract:
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and computers to see different information within the same PDF documents. This dissertation lastly describes some future work efforts, identifying some potential vulnerabilities in the automated enforcement of copyright protection for audio (particularly music) in online systems such as YouTube.
APA, Harvard, Vancouver, ISO, and other styles
23

Vislay, Tricia Ann. "A comparison of U.S. and Soviet strategic defensive doctrine." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Alsuhibany, Suliman Abdullah. "Quantitative analysis of the release order of defensive mechanisms." Thesis, University of Newcastle upon Tyne, 2014. http://hdl.handle.net/10443/2549.

Full text
Abstract:
Dependency on information technology (IT) and computer and information security (CIS) has become a critical concern for many organizations. This concern has essentially centred on protecting secrecy, confidentiality, integrity and availability of information. To overcome this concern, defensive mechanisms, which encompass a variety of services and protections, have been proposed to protect system resources from misuse. Most of these defensive mechanisms, such as CAPTCHAs and spam filters, rely in the first instance on a single algorithm as a defensive mechanism. Attackers would eventually break each mechanism. So, each algorithm would ultimately become useless and the system no longer protected. Although this broken algorithm will be replaced by a new algorithm, no one shed light on a set of algorithms as a defensive mechanism. This thesis looks at a set of algorithms as a holistic defensive mechanism. Our hypothesis is that the order in which a set of defensive algorithms is released has a significant impact on the time taken by attackers to break the combined set of algorithms. The rationale behind this hypothesis is that attackers learn from their attempts, and that the release schedule of defensive mechanisms can be adjusted so as to impair the learning process. To demonstrate the correctness of our hypothesis, an experimental study involving forty participants was conducted to evaluate the effect of algorithms’ order on the time taken to break them. In addition, this experiment explores how the learning process of attackers could be observed. The results showed that the order in which algorithms are released has a statistically significant impact on the time attackers take to break all algorithms. Based on these results, a model has been constructed using Stochastic Petri Nets, which facilitate theoretical analysis of the release order of a set of algorithms approach. Moreover, a tailored optimization algorithm is proposed using a Markov Decision Process model in order to obtain efficiently the optimal release strategy for any given model by maximizing the time taken to break a set of algorithms. As our hypothesis is based on the learning acquisition ability of attackers while interacting with the system, the Attacker Learning Curve (ALC) concept is developed. Based on empirical results of the ALC, an attack strategy detection approach is introduced and evaluated, which has achieved a detection success rate higher than 70%. The empirical findings in this detection approach provide a new understanding of not only how to detect the attack strategy used, but also how to track the attack strategy through the probabilities of classifying results that may provide an advantage for optimising the release order of defensive mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
25

Moutoussis, Michael. "Defensive avoidance in paranoid delusions : experimental and computational approaches." Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/defensive-avoidance-in-paranoid-delusions-experimental-and-computational-approaches(e36dbfcf-9341-43a0-be41-087f9b22d994).html.

Full text
Abstract:
This abstract summarises the thesis entitled Defensive Avoidance in Paranoid Delusions: Experimental and Computational Approaches, submitted by Michael Moutoussis to The University of Manchester for the degree of Doctor of Philosophy (PhD) in the faculty of Medical and Human Sciences, in 2011.The possible aetiological role of defensive avoidance in paranoia was investigated in this work. First the psychological significance of the Conditioned Avoidance Response (CAR) was reappraised. The CAR activates normal threat-processing mechanisms that may be pathologically over-activated in the anticipation of threats in paranoia. This may apply both to external threats and also to threats to the self-esteem.A temporal-difference computational model of the CAR suggested that a dopamine-independent process may signal that a particular state has led to a worse-than-expected outcome. On the contrary, learning about actions is likely to involve dopamine in signalling both worse-than-expected and better-than-expected outcomes. The psychological mode of action of dopamine blocking drugs may involve dampening (1) the vigour of the avoidance response and (2) the prediction-error signals that drive action learning.Excessive anticipation of negative events might lead to inappropriately perceived high costs of delaying decisions. Efforts to avoid such costs might explain the Jumping-to-Conclusions (JTC) bias found in paranoid patients. Two decision-theoretical models were used to analyse data from the ‘beads-in-a-jar’ task. One model employed an ideal-observer Bayesian approach; a control model made decisions by weighing evidence against a fixed threshold of certainty. We found no support for our ‘high cost’ hypothesis. According to both models the JTC bias was better explained by higher levels of ‘cognitive noise’ (relative to motivation) in paranoid patients. This ‘noise’ appears to limit the ability of paranoid patients to be influenced by cognitively distant possibilities.It was further hypothesised that excessive avoidance of negative aspects of the self may fuel paranoia. This was investigated empirically. Important self-attributes were elicited in paranoid patients and controls. Conscious and non-conscious avoidance were assessed while negative thoughts about the self were presented. Both ‘deserved’ and ‘undeserved’ persecutory beliefs were associated with high avoidance/control strategies in general, but not with increased of avoidance of negative thoughts about the self. On the basis of the present studies the former is therefore considerably more likely than the latter to play an aetiological role in paranoia.This work has introduced novel computational methods, especially useful in the study of ‘hidden’ psychological variables. It supported and deepened some key hypotheses about paranoia and provided consistent evidence against other important aetiological hypotheses. These contributions have substantial implications for research and for some aspects of clinical practice.
APA, Harvard, Vancouver, ISO, and other styles
26

Miller, Claude Harold. "Indignation, defensive attribution, and implicit theories of moral character." Diss., The University of Arizona, 2000. http://hdl.handle.net/10150/284210.

Full text
Abstract:
Indignation is a discrete social emotion specifying disapproval of a blameworthy action explicitly perceived as violating the objective order, and implicitly perceived as injurious to the self-concept. Two experiments were conducted to examine the effects of defensive attributions and implicit theories of moral character on indignation. Both studies attempted to influence the defensive attribution process by manipulating apparent similarity between participants and an imagined offender while exploring the relationship between people's implicit theories about moral character (ITM) and measures indicative of indignation. Two implicit attribution theory perspectives were examined: Entity theorists believe that personal moral attributes are fixed and unchanging, while incremental theorists believe that personal moral attributes are malleable. Entity theorists, who tend to base their attributions on internal characterological dispositional information, were hypothesized to show greater indignation after offensive episodes than incremental theorists, who prefer to use more external situation-relevant information in forming their attributions. Subjects in the similar conditions were expected to form more defensive attributions than those in the dissimilar conditions, thus a second hypothesis predicted that those in the similar conditions would show greater indignation after offensive episodes than those in the dissimilar conditions. Study 1 used a computer program to manipulate certain aspects of similarity while designating subjects as either entity or incremental theorists based on their responses to three ITM scale measures. It revealed a positive correlation between the presence of an entity theory and the experience of indignation. Study 2, using a cognitive response set induction to operationalize similarity while experimentally manipulating ITM, provides evidence for a causal relationship between ITM and indignation. As predicted, entity theorists in both studies responded with significantly higher levels of indignation after offensive episodes than did incremental theorists. Only modest support was found for an hypothesized relationship involving defensive attribution and indignation.
APA, Harvard, Vancouver, ISO, and other styles
27

Gurram, Sriharsha. "DESIGN OF A CACC ASSISTANT FOR DAILY DEFENSIVE DRIVING." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2563.

Full text
Abstract:
Automatic Vehicles is a possible future, but it does not mean that we should forget about improving the present day to day life. Most vehicles have Cruise Control, and few have Adaptive Cruise Control, but very few have Cooperative Adaptive Cruise Control(CACC) because it's an integration of software and hardware as different companies produce different vehicles it's hard to get on common ground. CACC at the core is communication among vehicles and sharing information; in this thesis, I tried to make it usable in any car with just the software used in a smartphone. As everybody has a phone in their hand with an inbuilt GPS, it is easier to use it directly rather than have a unique mechanical device embedded with a software application. My application gives the estimated speed usable at a particular time based on the other two vehicles, and it keeps changing based on other cars. It does not depend on any external sensors; hence, no environmental change can affect the data give by my vehicle. This application is a guide that could be used in the snow, rain, or hail when even eyes or technology cannot help. Location and speed are something, and using them and providing safety is my thesis all about.
APA, Harvard, Vancouver, ISO, and other styles
28

Pacheco, Renan Santana. "Efeitos da temperatura no comportamento defensivo de Oxyrhopus guibei (Serpentes, Dipsadidae)." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/41/41133/tde-11012019-151744/.

Full text
Abstract:
Eventos de predação e a habilidade de um animal em evita-los possuem papel crucial no fitness, atuando como força seletiva determinante no surgimento de adaptações morfofisiológicas (LIMA; DILL, 1990). Em condições naturais a interação presa-predador é influenciada pelas características extrínsecas e intrínsecas dos indivíduos, como sexo, tamanho corporal e temperatura. Para tetrápodes ectotermos a temperatura talvez represente a variável mais importante, pois de forma geral, eles experienciam variações substanciais em suas temperaturas corporais ao longo de suas atividades diárias ou sazonais, e reações enzimáticas são altamente dependentes de temperatura, assim como processos fisioquímicos, e, portanto, o desempenho do animal como um todo (LILLYWHITE, 1987). A relação entre as possíveis restrições impostas pela temperatura corporal e o comportamento defensivo em serpentes foi investigada em dezenas de trabalhos ao longo das últimas seis décadas, de modo que esses estudos apresentam discrepâncias entre si oriundas diferenças teórico-metodológicas (MORI; BURGHARDT, 2004). Diante desse panorama, o presente trabalho buscará responder a seguinte questão de pesquisa: a variação individual no comportamento defensivo da falsa-coral, Oxyrhopus guibei é dependente da temperatura? Para responder essa pergunta o objetivo desse trabalho é testar a hipótese de que em um intervalo termal ótimo, comportamentos defensivos de locomoção serão expressos em maior quantidade por indivíduos da espécie Oxyrhopus guibei, enquanto em temperaturas sub-ótimas comportamentos estáticos predominarão. Portanto, foram realizados uma série de experimentos de temperatura preferencial e comportamentais em espécimes da falsa-coral oriundos do estado de São Paulo emprestados pelo Instituto Butantan entre Setembro de 2017 e Março de 2018. Os estudos com objetivo de compreender a preferência termal de O. guibei foram realizados em um gradiente termal e no decorrer do estudo observou-se que as serpentes buscavam ativamente por intervalos específicos de temperatura de forma não oportunista. Já os experimentos comportamentais realizados em uma sala climática nas temperaturas de 17,2, 24, 30,8 e 37,6°C indicaram que na presença de um estímulo predatório simulado comportamentos de função aparente de fuga foram expressos em maior quantidade em 24°C. Indivíduos maiores tenderam a expressar comportamentos \"crípticos\" em menor quantidade que indivíduos menores. Temperatura, sexo e comprimento (CRC) não produziram efeitos significativos nos outros grupos comportamentais estudados. O dardejar foi influenciado por uma interação complexa de tamanho, sexo e temperatura. O comportamento defensivo nos indivíduos de Oxyrhopus guibei é em grande parte determinado por tendências individuais e não somente por restrições impostas pela temperatura
Predatory events and the ability of an animal to avoid them play a crucial role in fitness, acting as a selective force on the emergence of morpho-phisyological adaptations (LIMA; DILL, 1990). In natural conditions the prey-predator interaction is influenced by the individual\'s extrinsic and intrinsic characteristics, such as sex, body-size and temperature. For ectoterms tetrapods, temperature probably is the mosy important variable, because in general terms, they experience substancial variation in their body temperatures through their daily or sazonal activities, and chemical reactions are highly dependable on temperature, as well as physiochemical processes, and therefore, the animal\'s performance as a whole (LILLYWHITE, 1987). The relation between the possible restrictions imposed by body temperature and the defensive behavior in snakes has been subject to dozens of studies over the last six decades, in a way that those studies show discrepancys between them from theorical-methodologycal differences (MORI; BURGHARDT, 2004). In light of this situation, the present study sought to answer the following research question: the individual variation in the defensive behavior of the false-coral snake, Oxyrhopus guibei is temperature dependent? To answer this question the main objective of this study is to test the hypothesis that in an optimal thermal range, defensive behaviors of locomotion will be expressed in greater quantity by individuals of the species Oxyrhopus guibei, while in sub-optimal temperatures static behaviors will predominate. Therefore, a series of thermal preference and behavioral experiments were carried out on false-coral specimens from the State of São Paulo borrowed from Instituto Butantan between September 2017 and March 2018. The experiments with the objective of understand the thermal preference of O. guibei were performed in a thermal gradient and during the study it was observed that the snakes actively searched for specific temperature ranges in a non-opportunistic way. The behavioral experiments performed in a climatic room at temperatures of 17.2, 24, 30.8 and 37.6 ° C indicated that in the presence of a simulated predatory stimulus behaviors of apparent \"fleeing\" function were expressed in greater quantity by 24°C. Larger individuals tended to express \"cryptic\" behaviors in lower quantity than smaller individuals. Temperature, sex and length (SVL) did not produce significant effects in the other behavioral groups studied. The defensive behavior in Oxyrhopus guibei individuals is largely determined by individual tendencies and not only by temperature constraints
APA, Harvard, Vancouver, ISO, and other styles
29

Blackburn, James Robert. "The role of dopamine in preparatory and consummatory defensive behaviours." Thesis, University of British Columbia, 1989. http://hdl.handle.net/2429/29009.

Full text
Abstract:
The effects of neuroleptic drugs on avoidance and freezing behaviours of rats were examined in a series of experiments. In Chapter I it was found that the acquisition of a one-way avoidance response was precluded by a dose of haloperidol (0.15 mg/kg) that did not prevent escape responses and that did not initially disrupt performance of a previously acquired response. The atypical neuroleptics thioridazine (10-50 mg/kg) and clozapine (1.25-10.0 mg/kg) did not preclude acquisition of the response and had nonspecific effects on performance of an acquired response. In contrast, metoclopramide (5.0 mg/kg), like haloperidol, precluded acquisition of avoidance responding without initially disrupting performance. Given the clinical profiles of these drugs, these results suggest that disruption of avoidance responding by neuroleptic drugs may be more closely related to their capacity to produce extrapyramidal side effects than to their ability to relieve psychotic symptoms. Chapter II examined the effect of metoclopramide on performance of avoidance responses after various training regimes. Metoclopramide effects were attenuated by a single training session of 10 trials, or, if the tone warning signal had previously been paired with shock, as few as 5 trials. No prophylactic effect of pretraining was observed if the rats were given noncontingent safety conditioning consisting of pairings of shock termination with the safe side of the apparatus plus a light cue. However, metoclopramide had little impact if pretraining consisted of prior tone-shock pairings plus the opportunity to escape from unsignalled shock in the avoidance apparatus. These results exclude the possibility that attenuation of metoclopramide effects is due to overtraining of the avoidance response. Chapter III established that freezing responses to shock are potentiated by metoclopramide, although the magnitude of freezing responses to a conditional stimulus signalling shock was not enhanced significantly. Following up on this discovery, Chapter IV determined that the disruptive effect of metoclopramide on avoidance responding was enhanced by the presence of additional shock or shock cues. It was concluded that the enhancement of freezing by metoclopramide contributes to the deficit in avoidance responding observed following metoclopramide treatment. These results were interpreted as supporting a hypothesis that central dopamine systems are involved in the execution of preparatory responses directed towards distal stimuli, but not in consummatory responses directed towards diffuse local or internal cues.
Arts, Faculty of
Psychology, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
30

Clendening, Michael, James New, Alejandro Cuevas, Van Ngo, Amritpal Dhindsa, Amrish Patel, Dennis Hopkins, et al. "C4I architecture supporting conduct of defensive and offensive joint ASW." Monterey, California, 2008. http://hdl.handle.net/10945/6987.

Full text
Abstract:
The Anti-Submarine Warfare (ASW) community requires a fully operational Command, Control, Communications, Computers, and Intelligence (C4I) architecture to significantly reduce time from sensor detection to defensive weapons release. The United States Navy has established programs of record leveraging space, terrestrial, and maritime communications capabilities extending to fiscal year 2015. An ordered systems engineering process was performed to derive requirements and identify Joint ASW C4I Architecture strengths and weaknesses. This architecture is dependent upon the ASW community’s ability to leverage current and planned technologies impacting C4I areas including common operational tactical picture delivery, data transmission rate, time latency, and data fusion processes. Performance forecasts for identified alternatives were modeled and simulated based on a synthesized operational scenario using the EXTEND simulation tool, and life cycle cost estimates were produced for each alternative. Based on those outcomes, one of the several alternatives is recommended for implementation. In addition, it was discovered that programmed C4I capabilities lack an integrated fielding plan and do not properly align in FY2020. Furthermore, the ASW community must make process changes to enable cross-program manager collaboration supported by a single system architect to ensure robust architectures are fielded by 2020.
APA, Harvard, Vancouver, ISO, and other styles
31

Tsamtsaridis, Charalampos I. "Stochastic network interdiction for optimizing defensive counter air operations planning." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10705.

Full text
Abstract:
This thesis describes a stochastic, network interdiction optimization model to guide defensive, counter-air (DCA) operations planning. We model a layered, integrated air-defense system, which consists of fighter and missile engagement zones. We extend an existing two-stage, stochastic, generalized-network interdiction model by Pan, Charlton and Morton, and adapt it to DCA operations planning. The extension allows us to handle multiple-type interdiction assets, and constrain the attacker's flight path by the maximum allowable traveled distance. The defender selects the locations to install multiple interceptor types, with uncertainty in the attacker's origin and destination, in order to minimize the probability of evasion, or the expected target value collected by the evader. Then, the attacker reveals an origin-destination pair (independent of the defender's decision), and sends a strike package along a path (through the interdicted network) that maximizes his probability of evasion. By adding a small persistence penalty we ensure the plans are consistent in presence of minor variations in the number of interceptors. We present computational results for several instances of a test case consisting of the airspace over a 360-by-360 nautical miles area. The computational time ranges from some seconds to ten minutes, which is acceptable for operational use of this model.
APA, Harvard, Vancouver, ISO, and other styles
32

Organ, A. J. "Structural and synthetic studies in the defensive chemistry of termites." Thesis, University of Southampton, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Boden, Joseph Matthew. "Defensive miserliness: Hoarding attention in the service of emotional regulation." Case Western Reserve University School of Graduate Studies / OhioLINK, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=case1058293961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Warwick, James. "THE EFFICACY OF COUNTER-PRESSING AS AN OFFENSIVE-DEFENSIVE PHILOSOPHY." Miami University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=miami1564743483963884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Becker, Kyle William. "Optimizing defensive alignments in baseball through integer programming and simulation." Thesis, Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/2345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Risbrough, Victoria. "CRF and serotonin 1A receptor influences on defensive startle behaviors /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3123665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Strickland, John Scott. "Experimental Analysis of Protective Headgear Used in Defensive Softball Play." UNF Digital Commons, 2019. https://digitalcommons.unf.edu/etd/880.

Full text
Abstract:
Every year in the United States, an estimated 1.6 to 3.8 million people sustain sports-related traumatic brain injuries (TBIs), with an appreciable number of these injuries coming from the sport of softball. Several studies have analyzed the impact performance of catcher’s masks within the context of baseball; however, virtually no studies have been performed on fielder’s masks within the context of softball. Thus, the main objective of the present work was to evaluate the protective capabilities of softball fielder’s masks. To better understand the injury mechanisms and frequency associated with softball head/facial injuries, epidemiological data from a national database was reviewed first. Results displayed “struck-by-ball” as the most frequent injury mechanism (74.3%) for all head/facial injuries with a large majority occurring to defensive players (83.7%). With further motivation, the present work focused on testing the impact attenuation and facial protection capabilities of fielder’s masks from softball impacts. Testing with an instrumented Hybrid III headform was conducted at two speeds and four impact locations for several protective conditions: six fielder’s masks, one catcher’s mask, and unprotected (no mask). The results showed that most fielder’s masks reduced head accelerations, but not to the standard of catcher’s masks. On average, they reduced peak linear and angular acceleration from 40-mph impacts by 36-49% and 14-45%, respectively, while for 60-mph impacts they were reduced by 25-42% and 13-46%, respectively. Plastic-frame fielder’s masks were observed to allow facial contact when struck at the nose region at high speed. Observed differences in impact attenuation across fielder’s mask designs further suggested influence from specific design features such as foam padding and frame properties. Overall, the results clearly demonstrate that head/facial injuries may be mitigated through the broader use of masks, while further optimization of impact attenuation for fielder’s masks is pursued.
APA, Harvard, Vancouver, ISO, and other styles
38

El-Barghathi, Mariam Fadeel. "Influence of environmental and physiological variables on patterns of resource allocation in Urtica species." Thesis, Keele University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.321700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wu, Yue. "Novel bioactive peptides from the defensive skin secretions of selected frogs." Thesis, Queen's University Belfast, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.728833.

Full text
Abstract:
In the course of this research, skin secretions from three species of frogs, Gunther's frog, Hylarana guentheri, the edible frog, Pelophylax kl. esculentus and the Hejiang odorous frog, Odorrana hejiangensis, were analysed by a range of molecular techniques. Three novel peptides, QUB2495 from the brevinin-1 family, QUB2950 from the brevinin-2 family and a bradykinin-related peptide, QUB1400, were discovered and confirmed in the skin secretion by use of MS/MS fragment sequencing. After this, peptides were synthesised, purified and used in a series of bioactivity assays, such as antimicrobial assays, a haemolysis assay, anticancer cell assays and smooth muscle assays. QUB2495 from Gunther's frog, Hylarana guentheri, display high potency and broad-spectrum of activity against bacterial and cancer cells, however, with high toxicity. QUB2950, from the skin secretion of the edible frog, Pelophylax kl. esculentus, was expected to present broad-spectrum antimicrobial activities and high selectivity, displayed little of these effects. Synthetic analogues, K2991 in which negative amino acids were replaced by Lys showed greatly increased charge, and L3180, in which charge and hydrophobicity are both enhanced by amino acids replacement. Both K2991 and L3180 showed increases in antimicrobial activity and L3180 displayed increased potency against bacterium, cancer cell line and normal cell. QUB1400, which was obtained from the skin secretion of Odorrana hejiangensis, displayed the ability to weakly contract the smooth muscles of rat bladder and uterus.
APA, Harvard, Vancouver, ISO, and other styles
40

Cozzie, Linsey Renee. "Anti-insect defensive behaviors of equines after West Nile virus infection." Click here to access thesis, 2007. http://www.georgiasouthern.edu/etd/archive/spring2007/linsey_r_cozzie/Cozzie_Linsey_R_200701_MS.pdf.

Full text
Abstract:
Thesis (M.S.)--Georgia Southern University, 2007.
"A thesis submitted to the Graduate Faculty of Georgia Southern University in partial fulfillment of the requirements for the degree Master of Science." Under the direction of William S. Irby. ETD. Electronic version approved: May 2007. Includes bibliographical references (p. 36-39)
APA, Harvard, Vancouver, ISO, and other styles
41

Underwood, III Maj Robert E. "The Moral Reality of War: Defensive Force and Just War Theory." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/philosophy_theses/53.

Full text
Abstract:
The permissible use of defensive force is a central tenet of the traditional legal and philosophical justification for war and its practice. Just War Theory holds a nation’s right to resist aggressive attack with defensive force as the clearest example of a just cause for war. Just War Theory also stipulates norms for warfare derived from a conception of defensive force asserted to be consistent with the moral reality of war. Recently, these aspects of Just War Theory have been criticized. David Rodin has challenged the status of national defense as an uncontroversial just cause. Jeff McMahan has charged that Just War Theory’s norms that govern warfare are inconsistent with the norms of permissive defensive force. In this thesis I defend the status of national defense as a clear case of a just cause. However, my defense may require revision of Just War Theory’s norms that govern warfare.
APA, Harvard, Vancouver, ISO, and other styles
42

Southcott, Joseph Arthur. "Analysis of antiarmor organizations in defensive desert operations by airborne infantry." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/25031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Girlevičius, Linas. "Defensive constructions in Vilnius in the 14th to the 18th centuries." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090305_092610-90352.

Full text
Abstract:
Findings from different disciplines were used to implement the goals of this work, with more attention given to archaeological investigations. Analysis and synthesis of investigative data allowed for achieving the goals set, for the formulation of new hypotheses and for defining groups of poorly studied Vilnius defensive heritage sites, which in turn allowed for a more comprehensive survey of the evolution of the Vilnius defensive concept. Some Vilnius defensive installations have still not been sufficiently investigated, making it problematic to define their parameters and inner and outer structures more precisely. It has to be admitted that the categorization as defensive installations of some of the sites discussed in the work is hypothetical. This work, the well-founded conclusions based on investigations drawn as well as hypotheses raised can provide a qualitatively new impulse to studies of the ancient defensive fortifications of the Lithuanian capital and the reconstruction of the urban development of Vilnius. Assessing the findings of the study, we can say that the growth of the city and evolution of defensive fortifications were intimately connected processes, therefore it would be appropriate in similar future studies to make use of as wide a data base as possible on old Vilnius.
Šio mokslinio darbo tikslams įgyvendinti buvo pasitelkti įvairių mokslo šakų rezultatai, didesnį dėmesį darbe skiriant archeologinių tyrinėjimų rezultatams. Tyrimų duomenų analizė, apibendrinimas įgalino pasiekti užsibrėžtus tikslus, iškelti naujas hipotezes, išskirti iki šiol buvusias mažiau ištirtas Vilniaus gynybinio paveldo objektų grupes, o tai suteikė galimybę nuosekliau apžvelgti Vilniaus gynybinės koncepcijos raidą. Dalis Vilniaus gynybinių įrenginių vis dar yra nepakankamai gerai ištirti, todėl apibrėžti tikslesnius jų parametrus, tūrinę ir planinę struktūrą problematiška. Tenka pripažinti, kad dalies darbe aptariamų objektų priskyrimas gynybiniams yra hipotetinis. Šis darbas ir jame iškeltos tyrimų metu gautais faktais pagrįstos išvados bei hipotezės gali suteikti kokybiškai naują impulsą Lietuvos sostinės senovės gynybinių įtvirtinimų tyrinėjimams bei Vilniaus urbanistinės raidos rekonstravimui. Įvertinus tyrimo rezultatus galima teigti, kad miesto plėtra ir gynybinių įtvirtinimų raida buvo glaudžiai tarpusavyje susiję procesai, todėl ir ateityje atliekant panašaus pobūdžio tyrimus tikslinga naudotis kiek įmanoma platesne duomenų apie senąjį Vilnių baze.
APA, Harvard, Vancouver, ISO, and other styles
44

Langridge, Keri V. "Defensive coloration and behaviour in juvenile common cuttlefish Sepia officinalis L." Thesis, University of Sussex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Campbell, Adam Michael. "Enabling tactical autonomy for unmanned surface vehicles in defensive swarm engagements." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118718.

Full text
Abstract:
Thesis: Nav. E., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2018.
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 91-93).
This research incorporates practical applications of marine vehicles with robotics control theory to reduce the vulnerability of allied assets to asymmetric warfare. This work utilizes distributed decentralized multi-objective optimization in the Mission Oriented Operating Suite with Interval Programming (MOOS-IvP) to enable a number of simulated unmanned surface vehicles (USV) to provide defense for a high value unit (HVU) against fast attack craft (FAG) aggressors. The primary objective is to enable a swarm of defending vehicles to protect the HVU and successfully counter a swarm of aggressors with the ability to adapt to changing situations. This research makes it possible for autonomous defenders to react according to variables such as number of defenders, number of aggressors, known kinematic capabilities of defenders, perceived kinematic capabilities of aggressors, and positional distribution of aggressors. A theoretical framework is first described for analyzing the engagements based on game theory by constructing the defense scenario as a three-party differential game. MATLAB is then utilized to demonstrate optimal solutions to this scenario as an application of game theoretical guidance, which was developed for use in missile guidance systems. Algorithms and behaviors are then presented to demonstrate that the multi-objective optimization in MOOS-IvP approaches the optimal solutions in the vehicles' autonomous response during engagements consistent with the three-party differential game. Finally this work presents MOOS-IvP simulation data to demonstrate autonomous tactical decision-making in more realistic engagement scenarios.
by Adam Michael Campbell.
Nav. E.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
46

Ji, Dangjie. "Indirect defensive responses to hostile questions in British broadcast news interviews." Thesis, University of York, 2008. http://etheses.whiterose.ac.uk/14112/.

Full text
Abstract:
Live broadcast interviews came into existence from 1950s in the western media. Over the last 40 years the previously deferential style of questioning in broadcast news interviews has become more direct, challenging, penetrating, pursuing—in a word, hostile. These hostile questions create 'avoidance-avoidance conflict' for the interviewee (IE), i.e. these questions can be sufficiently hostile that the only available direct responses are negative, yet a reply must be made. To avoid the negative consequences of direct replies, the IE often provides a response with 'evasion', 'equivocation' or 'indirectness'. My research sets out to explore the phenomenon of 'indirectness' in IE answer turns. Data was collected from BBC radio 4 'Today Program' (January-May 2005). Conversation Analysis was used as the research method.
APA, Harvard, Vancouver, ISO, and other styles
47

Berglund, Nils. "Assessing defensive and offensive aspects of bacterial infection using computer simulations." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/387222/.

Full text
Abstract:
Bacterial infections pose a significant problem in the modern world. An alarming increase in multi-drug resistant bacteria has become a serious source of concern, with a steep rise in reported cases of sepsis and deaths related to bacterial infection. New drugs are necessary for the treatment and management of bacterial infection, including new broad spectrum antibiotics capable of killing multi-drug resistant bacteria as well as anti-septic drugs for the management of severe bacterial infections. This thesis investigates antimicrobial peptides, that have shown promise as antibiotics due to their broadspectrum range. They are of particular interest as they do not target specific proteins that can be easily altered through point mutations, but rather the bacterial membrane itself, making the emergence of resistance rarer. Understanding the structure-function relationship of these peptides could help design new antibiotics capable of killing resistant strains of bacteria. The other aspect investigated in this thesis is the function of immune receptors TLR4 and CD14, both part of the TLR4 signalling pathway. In sepsis, it is believed that over-activation of the TLR4 pathway contributes to the over-production of pro-inflammatory cytokines that lead to septic shock. Understanding the behavior of these receptors in different environments is important as the identification of potential drug targets could be beneficial to the development of immunomodulatory drugs and the prevention of septic shock. Overall this thesis covers both the offensive aspect of dealing with bacterial infections, eradicating bacteria, and the defensive aspect, understanding the innate immune system and modulating its activity to prevent sepsis associated death.
APA, Harvard, Vancouver, ISO, and other styles
48

Roche, Kathleen. "The Great Recession and Nonprofit Endurance: Framing the Mission-Defensive Paradox." Case Western Reserve University Doctor of Management / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=casedm1568627407775438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Quintal, Kyle. "Context-Awareness for Adversarial and Defensive Machine Learning Methods in Cybersecurity." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40835.

Full text
Abstract:
Machine Learning has shown great promise when combined with large volumes of historical data and produces great results when combined with contextual properties. In the world of the Internet of Things, the extraction of information regarding context, or contextual information, is increasingly prominent with scientific advances. Combining such advancements with artificial intelligence is one of the themes in this thesis. Particularly, there are two major areas of interest: context-aware attacker modelling and context-aware defensive methods. Both areas use authentication methods to either infiltrate or protect digital systems. After a brief introduction in chapter 1, chapter 2 discusses the current extracted contextual information within cybersecurity studies, and how machine learning accomplishes a variety of cybersecurity goals. Chapter 3 introduces an attacker injection model, championing the adversarial methods. Then, chapter 4 extracts contextual data and provides an intelligent machine learning technique to mitigate anomalous behaviours. Chapter 5 explores the feasibility of adopting a similar defensive methodology in the cyber-physical domain, and future directions are presented in chapter 6. Particularly, we begin this thesis by explaining the need for further improvements in cybersecurity using contextual information and discuss its feasibility, now that ubiquitous sensors exist in our everyday lives. These sensors often show a high correlation with user identity in surprising combinations. Our first contribution lay within the domain of Mobile CrowdSensing (MCS). Despite its benefits, MCS requires proper security solutions to prevent various attacks, notably injection attacks. Our smart-injection model, SINAM, monitors data traffic in an online-learning manner, simulating an injection model with undetection rates of 99%. SINAM leverages contextual similarities within a given sensing campaign to mimic anomalous injections. On the flip-side, we investigate how contextual features can be utilized to improve authentication methods in an enterprise context. Also motivated by the emergence of omnipresent mobile devices, we expand the Spatio-temporal features of unfolding contexts by introducing three contextual metrics: document shareability, document valuation, and user cooperation. These metrics are vetted against modern machine learning techniques and achieved an average of 87% successful authentication attempts. Our third contribution aims to further improve such results but introducing a Smart Enterprise Access Control (SEAC) technique. Combining the new contextual metrics with SEAC achieved an authenticity precision of 99% and a recall of 97%. Finally, the last contribution is an introductory study on risk analysis and mitigation using context. Here, cyber-physical coupling metrics are created to extract a precise representation of unfolding contexts in the medical field. The presented consensus algorithm achieves initial system conveniences and security ratings of 88% and 97% with these news metrics. Even as a feasibility study, physical context extraction shows good promise in improving cybersecurity decisions. In short, machine learning is a powerful tool when coupled with contextual data and is applicable across many industries. Our contributions show how the engineering of contextual features, adversarial and defensive methods can produce applicable solutions in cybersecurity, despite minor shortcomings.
APA, Harvard, Vancouver, ISO, and other styles
50

Underwood, Robert E. "The moral reality of war defensive force and just war theory /." unrestricted, 2009. http://etd.gsu.edu/theses/available/etd-04212009-201600/.

Full text
Abstract:
Thesis (M.A.)--Georgia State University, 2009.
Title from file title page. Andrew Altman, committee chair; Sebastian Rand, Andrew J. Cohen, committee members. Description based on contents viewed July 14, 2009. Includes bibliographical references (p. 85).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography