Dissertations / Theses on the topic 'IDRs'

To see the other types of publications on this topic, follow the link: IDRs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'IDRs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bruley, Apolline. "Exploitation de signatures des repliements protéiques pour décrire le continuum ordre/désordre au sein des protéomes." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS474.

Full text
Abstract:
Une fraction significative des protéomes reste non annotée, laissant inaccessible une partie du répertoire fonctionnel de la vie, incluant des innovations moléculaires ayant une valeur thérapeutique ou environnementale. Le manque d'annotation fonctionnelle est en partie dû aux limites des approches actuelles pour la détection de relations cachées, ou à des caractéristiques spécifiques telles que le désordre. L'objectif de ma thèse a été de développer des approches méthodologiques reposant sur les signatures structurales des domaines repliés, afin de caractériser plus avant les séquences protéiques dont la fonction est inconnue, même en l'absence d'informations évolutives. Tout d'abord, j'ai développé un score permettant d'estimer le potentiel de repliement d'une séquence d'acides aminés, basé sur sa densité en amas hydrophobes, correspondant principalement aux structures secondaires régulières. J'ai décrit le continuum entre l'ordre et le désordre, couvrant différents états allant des conformations étendues aux globules fondus et ai caractérisé des cas d'ordre conditionnel. Ensuite, j'ai combiné ce score avec les prédictions de structure 3D d'AlphaFold2 (AF2) disponibles pour 21 protéomes de référence. Une grande fraction des acides aminés des modèles AF2 associés à un très faible index de confiance est incluse dans des segments non repliables, soutenant la qualité d'AF2 comme prédicteur du désordre. Cependant, dans chaque protéome, de longs segments repliables avec des prédictions AF2 de faible confiance présentent également des caractéristiques de domaines solubles et repliés. Cela suggère un ordre caché (conditionnel ou inconditionnel), qui n'est pas détecté par AF2 en raison du manque d'informations évolutives, ou des motifs de repliement non répertoriés. Enfin, à l'aide de ces outils, j'ai effectué une exploration préliminaire de protéines ou de régions non annotées, identifiées via le développement et l'application d'une nouvelle procédure d'annotation. Bien que ces séquences soient enrichies en désordre, une part importante d'entre elles présente des caractéristiques de type globulaire soluble. Ces séquences constituent de bons candidats pour de futures validations et caractérisations expérimentales. De plus, l'analyse de gènes de novo validés expérimentalement m'a permis de contribuer au débat encore ouvert sur les caractéristiques structurales des protéines codées par ces gènes, qui présentent un enrichissement en désordre et une grande diversité d'états structuraux
A significant fraction of the proteomes remains unannotated, leaving inaccessible a part of the functional repertoire of life, including molecular innovations with therapeutic or environmental value. Lack of functional annotation is partly due to the limitations of the current approaches in detecting hidden relationships, or to specific features such as disorder. The aim of my PhD thesis was to develop methodological approaches based on the structural signatures of folded domains, in order to further characterize the protein sequences with unknown function even in absence of evolutionary information. First, I developed a scoring system in order to estimate the foldability potential of an amino acid sequence, based on its density in hydrophobic clusters, which mainly correspond to regular secondary structures. I disentangled the continuum between order and disorder, covering various states from extended conformations (random coils) to molten globules and characterize cases of conditional order. Next, I combined this scoring system with the AlphaFold2 (AF2) 3D structure predictions available for 21 reference proteomes. A large fraction of the amino acids with very low AF2 model confidence are included in non-foldable segments, supporting the quality of AF2 as a predictor of disorder. However, within each proteome, long segments with very low AF2 model confidence also exhibit characteristics of soluble, folded domains. This suggests hidden order (conditional or unconditional), which is undetected by AF2 due to lack of evolutionary information, or unrecorded folding patterns. Finally, using these tools, I made a preliminary exploration of unannotated proteins or regions, identified through the development and application of a new annotation workflow. Even though these sequences are enriched in disorder, an important part of them showcases soluble globular-like characteristics. These would make good candidates for further experimental validation and characterization. Moreover, the analysis of experimentally validated de novo genes allowed me to contribute to the still-open debate on the structural features of proteins encoded by these genes, enriched in disorder and displaying a great diversity of structura
APA, Harvard, Vancouver, ISO, and other styles
2

Refstie, Hilde. "IDPs redefined – Participatory ActionResearch with urban IDPs in Uganda." Thesis, Norwegian University of Science and Technology, Department of Geography, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5115.

Full text
Abstract:

This dissertation investigates the discourse on Internally Displaced Persons (IDPs) in Uganda and how IDPs in urban areas fit in to the discourse on both the theoretical and practical level. The dissertation reveals that although IDPs in urban areas by definition are included in both international and national IDP definitions, urban IDPs are seen as either economic migrants, or as former IDPs who have now reached a durable solution. The consequences of such exclusion from the IDP label are that IDPs outside camps are not considered for assistance or included in the return and resettlement frameworks or information activities.

The formation of the IDP label in Uganda has been influenced by the government’s approach of control and military presence aimed at keeping people in camps in the north. Consequently, IDPs are perceived entirely as people residing in camps. The humanitarian community has been complicit with the government’s policy of keeping people in camps by limiting assistance to IDPs registered and residing within them. The obvious lack of resources dedicated to protecting IDPs also influences the way the label is shaped. It is challenging to identify IDPs in an urban setting because of lack of registration and information. It is also difficult to determine who are forced migrants, and which of them have reached a durable solution. Consequently, IDPs in Uganda has in practice been redefined to those staying in camps.

Upon acknowledging how the voices of urban IDPs are marginalized within the dominant discourse, phase two of the fieldwork progressed towards influencing this discourse by revealing the political and bureaucratic agency in the processes of labelling creating greater awareness of the processes that serve to exclude urban IDPs from return and resettlement frameworks. By facilitating the mobilization of an urban IDP interest group I together with the community outreach organization Refugee Law Project worked together with urban IDP communities advocating for their rights.

APA, Harvard, Vancouver, ISO, and other styles
3

Brandão, José Eduardo Malta de Sá. "Composições de IDSs." Florianópolis, SC, 2007. http://repositorio.ufsc.br/xmlui/handle/123456789/90293.

Full text
Abstract:
Tese (doutorado) - Universidade Federal de Santa Catarina, Centro de Tecnológico. Programa de Pós-Graduação em Engenharia Elétrica
Made available in DSpace on 2012-10-23T08:11:59Z (GMT). No. of bitstreams: 1 242582.pdf: 1822805 bytes, checksum: 609b5a41dd95627d4cfddc5803190cc7 (MD5)
A crescente necessidade de compartilhamento de informações entre organizações parceiras ou membros de organizações virtuais envolve um grande desafio de segurança. Um dos aspectos chave neste desafio é a construção de sistemas de detecção de intrusão (IDSs) que possam operar em ambientes heterogêneos de larga escala. Isto é particularmente difícil devido ao fato de que as diferentes redes envolvidas usam IDSs que não foram projetados para trabalhar de forma cooperativa. O tema central desta tese é a proposta de uma nova abordagem de monitoramento de segurança baseada em composições de IDSs. Uma composição de IDSs é a combinação de elementos de detecção de intrusão, que podem ser IDSs completos ou suas partes, distribuídos entre redes diferentes, mas que operam de forma cooperativa, formando um sistema unificado. Nesta Tese, as composições de IDSs são construídas usando uma arquitetura orientada a serviços baseada na tecnologia de Web Services. A interoperabilidade entre os diversos elementos de uma composição é obtida a partir do amplo emprego de esforços de padronização, sobretudo da IETF, W3C e OASIS. As composições dinâmicas são suportadas pelo uso da orquestração de serviços. Para viabilizar as composições de IDSs, é proposta neste documento uma infra-estrutura de serviços, capaz de suportar elementos de IDs baseados em softwares prontos (commercial off-the-shelf # COTS), uma necessidade fundamental para prover a interoperabilidade e facilitar a implementação. Nesta Tese também são descritas as implementações de protótipos da infra-estrutura proposta e analisados os resultados obtidos por meio de experimentos com estes protótipos. The growing need for information sharing among partnering organizations or members of virtual organizations poses a great security challenge. One of the key aspects of this challenge is deploying intrusion detection systems (IDS) that can operate in heterogeneous, largescale environments. This is particularly difficult because the different networks involved generally use IDSs that have not been designed to work in a cooperative fashion. This Thesis presents a model for integrating intrusion detection systems in such environments. The main idea of this Thesis is a new security monitoring approach, based on IDSs compositions. A IDS composition is a combination of intrusion detection elements (which can be complete IDS systems or their components) distributed across different networks so that they operate in a cooperative fashion, in order to provide a unified service. On this Thesis, the IDSs compositions are constructed using a service-oriented architecture (SOA), based on the Web Services technology. The necessary interoperability among the elements of the compositions is achieved through the use of standardized specifications, mainly those developed by IETF, W3C and OASIS. Dynamic compositions are supported through service orchestration. To make possible the IDSs compositions, is proposed on this document a services infrastructure that is capable of supporting commercial off-the-shelf (COTS) IDS elements, a crucial feature for providing interoperability and deployability. On this Thesis are also described prototypes implementations, tests and results.
APA, Harvard, Vancouver, ISO, and other styles
4

Qaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.

Full text
Abstract:
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmitted to particular destinations such as MySQL,Oracle databases or log files. The data is normally dumped to these destinations without a forensic standard structure. When digital evidence is needed, forensic specialists are required to analyse a very large volume of data. Even though forensic tools can be utilised, most of this process has to be done manually, consuming time and resources. In this research, we aim to address this issue by combining several existing tools to archive the original IDS data into a new container (Digital Evidence Bag) that has a structure based upon standard forensic processes. The aim is to develop a method to improve the current IDS database function in a forensic manner. This database will be optimised for future, forensic, analysis. Since evidence validity is always an issue, a secondary aim of this research is to develop a new monitoring scheme. This is to provide the necessary evidence to prove that an attacker had surveyed the network prior to the attack. To achieve this, we will set up a network that will be monitored by multiple IDSs. Open source tools will be used to carry input validation attacks into the network including SQL injection. We will design a new tool to obtain the original data in order to store it within the proposed DEB. This tool will collect the data from several databases of the different IDSs. We will assume that the IDS will not have been compromised.
APA, Harvard, Vancouver, ISO, and other styles
5

Bergöö, Martin. "IDR "Interaktionsdesignad rädsla"." Thesis, Malmö högskola, Institutionen för konst, kultur och kommunikation (K3), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23137.

Full text
Abstract:
This essay focuses on the possibilities and problems that come with having teleportation mixed with horror and fear and not having monsters in fear games. How it is to play a horror game without enemies and just being able as an Interactiondesigner to relay on the psychological feeling within the player, if the feeling is more than enough if the player him self get to fantasies and let their deepest fright feelings take over. Is there no difference if there are monsters/enemies or not. Is fright and fear already there before you encountering the enemies? These questions are answered as the paper also presents a game in the shape of a course that has been paralleled worked with. The world with the complete and finished game have bin done in the Hammer editor which the game HalfLife2 (VU games/Valve Software, 2004) is built on. The finished game is a result of several user tests from the prototype game and user questionnaires. Fear games are mainly built on humans’ psychological feelings, the imaginations and how one feel. Through strong usage and building upon these main factors to create fear I have worked from that perspective and investigated how I by best possible means, should do to create fear to fright players by not using enemies as main frightening objects. Focus has been on the narrative of both visual and auditive narration. I have also given an account of the advantage and disadvantages with working with the tool I have chosen, how it has affected my work and my result. The Result turned out to be even better than I had in mind and a positive attitude towards my game from all the test persons. They thought it was a good example that a horror game is not bound to have monsters in order to fright the player. I got a loot of good feedback, response and ideas of what I could improve and what was already good. Some wanted more light effects on the first part and others less sound in the last part. By listening to the test persons I started to create and shape the final version of the game. Everyone became scared and felt more or less frightened through all four parts of the game. I also got positive feedback on my theory from the test persons, that teleportation mixed with horror and fear is something that they could consider using more in games and that this was a good start in the right direction.
APA, Harvard, Vancouver, ISO, and other styles
6

NATH, PANDEY ARUNENDRA. "Secure IDMS for Cloud Computing Environment." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121175.

Full text
Abstract:
Current practices includes the integration of IDMS system and OpenStack for easy, better, balanced provisioning, identity management and user management for different types of users in order to securely access the service on cloud platform. These solutions will provide the basic building block structure which provides the motivation to enterprises to come in, out, around the cloud services. Based the research artifacts, design challenges and some current constraints, we have built these cure IDMS for cloud environment under architecture of “CryptoNET™ Security Providers”. Secure IDMS is designed by considering the SCIM schema and OpenStack cloud platform to offer better user management, secure authentication, enhanced security components, secure communication, controlled attributes and synchronized data in order to provide secure services trousers in cloud environment. Security model is based on type of users identity in OpenStack, based on roles. This enables to control and provide different types of user needs as Software as a Services(SaaS), better web application interaction including better provisioning/deprovisioing, secure identity information storage and better access control “role based-RBAC” as Platform as a Services(PaaS). Secure IDMS, provides more solutions for problems that cover the Identity and Access Management (IAM) rather than Managed Identity Services (MIS). Based on cloud IAM challenges and requirements for financial institutions, our design artifact was also evaluated. We considered central identity management approach based on security policy implementation. This research will brings the reader to understand secure IDMS platform with basic real world implementation and motivates the reader to study more cloud challenges, security enhancements and future guidelines for additional research in this area.
APA, Harvard, Vancouver, ISO, and other styles
7

Sanchez, Laura. "A comparative study of refugees and idps." Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/506.

Full text
Abstract:
There is a grave concern for the life, liberty and security of individuals who have been forced to leave their homes and have become dispersed within their native countries and throughout the Asian continent. These internally displaced persons and refugees are the subject of this study. Some of the themes that will be discussed include: civil war, human rights violations and the economy, since these are the problems affecting the populations of Afghanistan, Pakistan and Myanmar. These case studies are of particular interest because Afghanistan is where most refugees come from, Myanmar has the longest-running military regime and Pakistan hosts the most refugees in the world. All three case studies are currently in a state of civil war, are breeding grounds for violations of human rights and have corrupt economies. Thus, the goal is to end armed conflict, to put an end to the human rights violations that come with it and to restructure the economies in each of these nation states so that the internally displaced persons and refugees can be repatriated, since displacement has become too much of a burden for Afghanistan, Pakistan and Myanmar's neighboring countries, who have been taking in all of the refugees from said countries. Theoretically, if the issues causing displacement were to be solved, then the countries that host refugees would be able to concentrate on their own populations. This study can potentially address the gap between knowledge, policy formation, and policy implementation to realize the goals of the international community in dealing with the displacement crisis.
B.A.
Bachelors
Sciences
Political Science
APA, Harvard, Vancouver, ISO, and other styles
8

シャリフ, アシース モハメド, and Mohamed Shareef Asees. "Internally displaced persons (IDPs) and ethnic minorities : a case study of Muslim IDPs in the Puttalam district of Sri Lanka." Thesis, https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12677521/?lang=0, 2014. https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12677521/?lang=0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Riveiro, Barciela María del Mar. "Estudio de dos situaciones especiales en pacientes con infección crónica por el virus de la hepatitis B: Eficacia y seguridad de los análogos de nucleós(t)idos de segunda generación en una cohorte de práctica clínica real y nuevos biomarcadores para la identificación de portadores inactivos." Doctoral thesis, Universitat Autònoma de Barcelona, 2016. http://hdl.handle.net/10803/399831.

Full text
Abstract:
La hepatitis B es un problema de salud mundial, con unos 400 millones de personas infectadas crónicamente. En nuestro medio se calcula una prevalencia del 0.7%, siendo la mayoría de los sujetos HBeAg negativo. En esta fase de la infección, uno de los retos es distinguir entre aquellos sujetos portadores inactivos, que presentarán un buen pronóstico de la enfermedad a largo plazo, y los pacientes con hepatitis crónica HBeAg negativo, que tienen riesgo de desarrollar fibrosis hepática y por tanto precisar tratamiento antiviral. El primer trabajo se centró en pacientes bajo tratamiento antiviral con análogos de nucleós(t)idos de segunda generación (Entecavir y Tenofovir). Las hipótesis del mismo fueron que la eficacia y tasa de efectos adversos en práctica clínica era similar a la de los estudios de registro y la validación del modelo Page-B para predicción del riesgo de carcinoma hepatocelular (CHC). Para dicho fin se analizó la base CIBERHEP que incluye sujetos con infección crónica por el VHB, seleccionándose un total de 609 pacientes caucásicos en tratamiento con Tenofovir o Entecavir. Las tasas de respuesta virológica y bioquímica fueron altas, con pocos efectos adversos y discontinuación de tratamiento, sin observarse deterioro de la función renal. A pesar de la supresión de la replicación viral, se observaron 12 casos de CHC, número inferior a los estimados por la puntuación Page-B. Al igual que en la cohorte original, todos aquellos sujetos que presentaron CHC tenían basalmente una puntuación Page-B ≥10 puntos, confirmándose el valor predictivo negativo del 100% de dicho punto de corte. La hipótesis del segundo de los estudios, fue que los niveles séricos de antígeno de superficie (HBsAg) o antígeno relacionado con el core (HBcrAg) podrían ser útiles para identificar a los verdaderos portadores inactivos del VHB. Para ello se realizó un estudio prospectivo con al 3 determinaciones analíticas en 1 año para caracterizar a los sujetos como portadores inactivos (niveles de alanino transferasa persistentemente normales y ADN VHB≤2.000 UI/mL) o con actividad por el VHB. En primer lugar se observó que los niveles de HBsAg estaban influidos el por genotipo del VHB, dato que dificultó la búsqueda de un único punto de corte con altos índices diagnósticos en todos los genotipos, siendo el HBsAg <3 logUI/mL útil sólo para el genotipo D. Por contra, los niveles de HBcrAg no difirieron entre los diferentes genotipos, siendo la exactitud diagnóstica para la identificación de portadores inactivos mayor que los niveles de HBsAg. La combinación en una única determinación de HBcrAg ≤3 logU/mL más ADN VHB ≤2.000 UI/mL presentó una exactitud diagnóstica >85% en todos los genotipos excepto el H o F (73%).
Hepatitis B virus (HBV) infection is a worldwide health problem, with around 400 million people chronically infected. In our setting, the prevalence is 0.7% and the majority of subjects are HBeAg negative. In this stage of the disease, one of the most challenging issues is to discern between the inactive carriers, who have a long-term good prognosis of the disease, and patients with HBeAg negative chronic hepatitis B, who are at risk of fibrosis development and therefore may require antiviral therapy. The first study of this thesis is focus on patients undergoing antiviral therapy with second generation nucleos(t)tides analogs (Entecavir and Tenofovir). The hypotheses were that the effectiveness and rate of side effects in daily clinical practice were similar to the registration studies and the validation of the Page-B score for prediction of hepatocellular carcinoma (HCC) development. From the collaborative database CIBERHEP, 609 caucasian subjects with chronic hepatitis B treated with Tenofovir or Entecavir were selected. The rates of biochemical and virological response were very high, and no worsening on renal function was observed. Despite suppression of viral replication, 12 cases of HCC were reported, a number lower to the estimated by the Page-B score. Similar to the original cohort, in the CIBERHEP all patients who developed HCC presented a baseline Page-B punctuation ≥10 points, supporting the previously described 100% negative predictive value of that cut-off. The hypothesis of the second study was that the serum levels of hepatitis B antigen (HBsAg) o core-related antigen (HBcrAg) could be useful for identification of HBV inactive carriers. To achieve this goal, a prospective work with 3 consecutive blood analyses throughout 1 year was carried out. Subjects were classified as inactive carriers (defined as persistently normal alanine transferase levels and HBV DNA ≤2.000 IU/mL) or subjects with HBV activity. Firstly, it was observed that HBsAg levels varied across the different HBV genotypes. This finding hindered the search of a unique HBsAg cut-off for diagnosing the inactive carrier state among the different HBV genotypes. Previously described HBsAg <3 logIU/mL was only useful of genotype D. However, HBcrAg did no vary among genotypes, and on the whole, the diagnostic accuracy of HBcrAg was higher than HBsAg levels. The combination on a single determination of HBcrAg ≤3 logU/mL plus HBV DNA ≤2.000 IU/mL presented a diagnostic accuracy ≥85% in all genotypes except H or F (73%).
APA, Harvard, Vancouver, ISO, and other styles
10

Herdenberg, Nils David. "IDPs, Durable Solutions and Citizenship : Perspectives from Ukraine." Thesis, Uppsala universitet, Kulturgeografiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-333990.

Full text
Abstract:
This study explores how Donbass IDPs in Kyiv view the role of the state in relation to ‘durable solutions’ to their displacement. Specifically, it examines the expectations on the state as a provider of rights and entitlements vis-à- vis IDPs. Drawing on semi-structured interviews with Donbas IDPs, experiences of displacement and perceptions of durable solutions and citizen-state relations are exemplified. The data collection and analysis methodologies applied allow for the elicitation of the views and opinions of IDPs, in an attempt to mitigate vertical policy-making. The concepts of citizenship, state and sovereignty are applied to analyze the relationship between IDPs and the state. Further, the IASC framework for durable solutions to internal displacement is used to as a structure to outline the views of the IDPs. The results show a large discrepancy between the expectations of the respondents on the states’ role in durable solutions to displacement, and the experience of this in reality. Furthermore, the results reveal high levels of discontent, resignation and apathy towards the state as a provider of durable solutions, especially in terms of returning to Donbass.
APA, Harvard, Vancouver, ISO, and other styles
11

Coquerel, Patrick Ramon Stafin. "Parâmetros psicomotores e sociais em idos iron man." Universidade do Estado de Santa Catarina, 2005. http://tede.udesc.br/handle/handle/392.

Full text
Abstract:
Made available in DSpace on 2016-12-06T17:07:15Z (GMT). No. of bitstreams: 1 Dissertacao_Patrick.pdf: 1347921 bytes, checksum: cd3ae830d3cf9a626e08ce7adf2c5862 (MD5) Previous issue date: 2005-09-26
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
The objective of this study was to describe the psicomotors and social parameters of an aged competitor tri-athlete of tests of Iron Man. Front to the parameters social and psicomotors, representative aged in the category was structuralized a study of descriptive case the 70-74 years, participant of competitions of Iron Man in the South American, by means of a sampling proposed. The following materials had been used: a) Postural examination fiche of the postures of Miranda (2003); b) Psicomotor examination with Motor Escala for Elderly of Rosa Neto (2002); c) Interview half-structuralized for psicomotor and social profile: it motivates, it stress, clinical history, sportive and socio-economical; d) Formulary of the activities of the life day. The results had disclosed a position inclining of front, with diverse postures shunting lines, a high general motors levels of 120 points, motivated to train and to compete, as much in level conscientious, how much unconscious, as well as it presents a stress and agitated profile.
O objetivo deste estudo foi descrever os parâmetros psicomotores e sociais de um idoso triatleta competidor de provas de Iron Man . Foi estruturado um estudo de caso descritivo frente aos parâmetros psicomotores e sociais do único representante idoso na categoria 70 a 74 anos, participante de competições de Iron Man na América do Sul, mediante uma amostragem de conveniência. Foram utilizados os seguintes materiais: a) Exame postural ficha de anotação dos dados posturais de Miranda (2003); b) Exame psicomotor com a Escala Motora para Terceira Idade (EMTI) de Rosa Neto (2002); c) Entrevista semi-estruturada para perfil psicomotor e social: motivação; estresse, história clínica, esportiva e sócio-econômica; d) Inventário das atividades da vida diária. Os resultados revelaram uma postura anteriorizada, com diversos desvios posturais, uma aptidão motora geral superior de 120 pontos, motivado para treinar e competir, tanto no nível consciente, quanto inconsciente, assim como apresenta um perfil estressado e agitado.
APA, Harvard, Vancouver, ISO, and other styles
12

Sandmark, Maria, and Sofia Petermann. "Medledarskapsresan - En idés resa in i två organisationer." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23395.

Full text
Abstract:
Vikten av att ha ansvarstagande medarbetare som samtidigt kan vara en aktiv del av beslutsfattandet är något som de senaste årtiondena fått större utrymme i organisationer. Studien syftar att undersöka hur idén om medledarskap reser in i två organisationer och hur förändringsarbetet upplevs i en offentlig organisation samt en privat organisation. Medledarskap är en vidareutveckling av medarbetarskap och därför får medarbetarskap som begrepp även stort utrymme i vår studie. De två organisationer vi ämnar studera har båda bedrivit en förändring via ett externt konsultbolag. De teoretiska utgångspunkterna tar sitt avstamp i teorier kring idéspridning samt i teorier kring medarbetarskap och medledarskap. Centrala begrepp är översättning och överföring, vad som sker när en idé förs in i en ny kontext. Empirin har samlats in genom fyra intervjuer med såväl chefer som medarbetare i var organisation. Vidare har dokumentstudier genomförts för att ge en djupare inblick i organisationernas arbete med medledarskapsfrågor men även för att få en bredare förståelse i intervjusituationen och i arbetet med analysen. Resultaten visar att det i båda organisationer skett en förändring sedan idéns resa in i organisationerna i form av att fenomenet fått en mer betydande roll i det vardagliga arbetet.Motståndet under översättningen av idén var något högre inom den offentliga organisationen, som präglas av stark tradition, än inom den privata organisationen. Detta kan ha sin grund i av vem och hur idéresan presenterades i ett inledande skede. Den spridning och det genomslag idén om medarbetarskap, de senaste årtiondena, fått i svenskt arbetsliv kan ses i samband med tidsandan och den utveckling som skett från arbetstagare till medarbetare. Studien kan bidra till att fylla en vit fläck i forskningen till hur idén om medledarskap reser in i organisationer. Hur idén blir en del av den lokala kontexten är en central del av den problematik en idéresa kan genomgå.
APA, Harvard, Vancouver, ISO, and other styles
13

Fernandez, Maria del Mar, and Ignacio Porres. "An Evaluation of current IDS." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11635.

Full text
Abstract:

With the possibility of connecting several computers and networks the necessity of protecting the whole data and machines from attackers (hackers) that try to get some confident information to use for their own benefit or just destroy or modify valuable information was born. At this point IDS appears to help users, companies or institutions to detect when they are getting compromised. This thesis will cover two main parts: the first one consists of an intense research study about the world of IDS and its environment. Subsequently, we will conclude this part with some points where IDS still needs to be questioned and show up desirable requirements for “the perfect” intrusion detection system. This “perfect” adjective can of course be discussed variously. The second part of the thesis approaches the implementation of the most used open source IDS: Snort. Some basic attacks on the machine where Snort is installed will be performed in order to make the future user see what kind of protection it ensures and the usability of this. There is a brief discussion about two of the main challenges in IDS will follow: analyzing big amounts of packets and encrypted traffic. Finally there are conclusions for a safe computer environment as well as the suggestion that some skilled programmer should give Snort a more friendly interface for every kind of users and a built in programme package which includes webserver, database and other libraries that are needed to run it properly with all its features.

APA, Harvard, Vancouver, ISO, and other styles
14

Alevizon, John V. "Odds and Ids : a novel." Virtual Press, 1988. http://liblink.bsu.edu/uhtbin/catkey/539859.

Full text
Abstract:
Odds and Ids is a satirical novel of 419 pages that ridicules the tenets of psychotherapy and the beliefs and behaviors of psychotherapists. There are two story lines which overlap and converge at the end. Odd chapters tell the story of semi-sane Clinical Psychologist Nicholas K. Mavros and his alcoholic dog, Misty, the melancholy collie. Disillusioned by life, and in particular by the sham of psychotherapy, Nick decides to commit suicide in seven days by driving his burgundy van off the Billy Bopplemeyer Pier at sunset.He and Misty form a sacred pact to achieve that gallant end. Knowing that he will be dead in one week frees Nick at work and play to say what he is thinking and to act as he is feeling. He simply does not care any longer what others--friends, staff, and clients--think of his behavior. The odd chapters follow him day by day until he and Misty plunge or do not plunge into the cold waters of Puget Sound.The even chapters trace the rise and fall of the fictional Rumanian Bithwanians, a strange family that personifies postFreudian psychotherapy. Three generations of odd Bithwanians bungle through the bizarre world of mental health, seldom knowing the first thing about how to help another human being. Each Bithwanian is so enmeshed in the intricacies of his own theory that he's;fails to see his clients as animate human beings.The last Bithwanian, whose suicide opens the second friend of Nicholas Mavros, the errant protagonist, whose intent to commit suicide 3efines the central plot of the odd chapters.Their relationship, seen in retrospect, ties the two story lines together.The guiding idea throughout the novel is that the right to label others, and this alone, separates therapists and clients.The following are shot at in the novel: A) Therapists and their illusions.B) Clients and their unrealistic expectations.C) The non-training of future clinicians.D) Therapy, insurance companies, the union of psychologists,sex, love, religion, tradition, and existentialism.
Department of English
APA, Harvard, Vancouver, ISO, and other styles
15

Šišmiš, Lukáš. "Optimalizace IDS/IPS systému Suricata." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445503.

Full text
Abstract:
V dnešnom svete zrýchľujúcej sa sieťovej prevádzky je potrebné držať krok v jej monitorovaní . Dostatočný prehľad o dianí v sieti dokáže zabrániť rozličným útokom na ciele nachádzajúce sa v nej . S tým nám pomáhajú systémy IDS, ktoré upozorňujú na udalosti nájdené v analyzovanej prevádzke . Pre túto prácu bol vybraný systém Suricata . Cieľom práce je vyladiť nastavenia systému Suricata s rozhraním AF_PACKET pre optimálnu výkonnosť a následne navrhnúť a implementovať optimalizáciu Suricaty . Výsledky z meraní AF_PACKET majú slúžiť ako základ pre porovnanie s navrhnutým vylepšením . Navrhovaná optimalizácia implementuje nové rozhranie založené na projekte Data Plane Development Kit ( DPDK ). DPDK je schopné akcelerovať príjem paketov a preto sa predpokladá , že zvýši výkon Suricaty . Zhodnotenie výsledkov a porovnanie rozhraní AF_PACKET a DPDK je možné nájsť na konci diplomovej práce .
APA, Harvard, Vancouver, ISO, and other styles
16

Zika, Ondřej. "Analýza IDS Prahy a Bratislavy." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162145.

Full text
Abstract:
The aim of this thesis is the analysis of integrated transport systems in Prague (Prague integrated transport) and in Bratislava (Bratislava integrated transport). The analysis identifies e. g. means of transport in these integrated transport systems, transport and legal relations, practical knowledge from travelling etc. In the conclusion of this theses there are suggested some recommendations in order to improve the system. This analysis showed that the creation of high-quality transport system is quite difficult.
APA, Harvard, Vancouver, ISO, and other styles
17

Hamid, Abdalrhman. "Protracted Internal Displacement : A Case Study of Darfur IDPs." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Drissi, Mustapha. "La Ville sainte de Mouley Idris du Zerhoun, Maroc." Lille 3 : ANRT, 1989. http://catalogue.bnf.fr/ark:/12148/cb376046349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mafra, Paulo Manoel. "Comunicação segura na composição de IDSs e seus custos." Florianópolis, SC, 2006. http://repositorio.ufsc.br/xmlui/handle/123456789/88388.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Engenharia Elétrica.
Made available in DSpace on 2012-10-22T08:25:47Z (GMT). No. of bitstreams: 1 236833.pdf: 1167883 bytes, checksum: 325b4964cec8fba25025f9482fa97b01 (MD5)
Os sistemas de detecção de intrusão geralmente são projetados para funcionar solitários em redes locais. Estes sistemas não prevêem a integração com outras ferramentas de detecção de intrusão, nem o uso da infra-estrutura da Internet para correlação de eventos, reduzindo o seu escopo da análise. Este trabalho apresenta um modelo para a comunicação segura entre os componentes de sistemas de detecção de intrusão em ambientes de larga escala utilizando os programas de detecção de intrusão convencionais, com o propósito de formar composições destes sistemas, dispersos geograficamente, e detectar uma quantidade maior de ataques, inclusive ataques distribuídos, através da correlação dos eventos. É introduzido um modelo de segurança fim a fim, utilizando padrões de segurança e a tecnologia de {\it Web Services}. São apresentados os principais esforços presentes na literatura sobre detecção de intrusão distribuída fazendo um comparativo entre as abordagens utilizadas e, então, o modelo de comunicação proposto é descrito. Também são descritos um protótipo desenvolvido, os resultados dos testes efetuados e algumas conclusões sobre o modelo proposto.
APA, Harvard, Vancouver, ISO, and other styles
20

Westerberg, Adrian, and Gustav Ung. "Comparing Verification of List Functions in LiquidHaskell and Idris." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255160.

Full text
Abstract:
Formal verification is important for guaranteeing correctness of critical computer programs. LiquidHaskell and Idris are 2 functional programming languages in which formal verification can be performed using the respective type systems. This thesis investigates the differences between LiquidHaskell and Idris when verifying list functions, with respect to expressiveness, annotation overhead and type checking times. The used list functions, as well as their specifications consisting of correctness properties, were carefully selected. No large differences in expressiveness were found between LiquidHaskell and Idris. However, Idris was found to be better than LiquidHaskell without the automation feature PLE, regarding annotation overhead and type checking times. With PLE enabled, no large differences were found.
Formell verifiering är viktigt för att garantera korrekthet av kritiska datorprogram. LiquidHaskell och Idris är 2 funktionella programmeringsspråk där formell verifiering kan göras med hjälp av språkens typsystem. Denna uppsats undersöker skillnaderna mellan LiquidHaskell och Idris vid verifiering av listfunktioner, gällande expressiveness, annotation overhead och typechecking tider. De använda listfunktionerna och tillhörande specifikationer bestående av korrekthetsegenskaper, valdes omsorgsfullt. Resultaten visade inte på några stora skillnader gällande expressiveness mellan LiquidHaskell och Idris. Gällande annotation overhead och typechecking tider visades Idris vara bättre än LiquidHaskell utan automatiseringsfunktionen PLE. Med PLE visade resultaten inte på några stora skillnader.
APA, Harvard, Vancouver, ISO, and other styles
21

Johansson, Fredrik, Jörgen Johansson, and Marcus Johansson. "IDS för alla : Intrångsdetekteringssystem för hemmaanvändare." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23229.

Full text
Abstract:
I dagens IT-samhälle är säkerhet en viktig aspekt. Ett sätt att nå högre säkerhet är att bygga upp säkerheten i lager. I hemmanätverk är två vanliga lager antivirus och brandvägg. Den här kandidatuppsatsen undersöker om ett intrångsdetekteringsystem (IDS) är ett bra komplement till säkerheten i ett hemmanätverk.För att hålla systemet så attraktivt som möjligt för hemmanätverket fokuserar man på att hålla priset nere och konfigurationen enkel. Vi valde enkorts-datorn (Raspberry Pi) med programvaran IPFire, som är open-source, där IDS:en Snort ingår och IPFire har ett enkelt gränssnitt för konfiguration.För att mäta hur effektivt systemet fungerar, mäts det hur många hot Snort upptäcker. Mätningar gjordes också för att undersöka om systemet orsakade prestandaförluster i hemmanätverket.Av resultaten drogs slutsatsen att systemet är ett bra komplement till säkerheten i ett hemmanätverk. Det gick inte att säkerställa någon prestandaförlust på nätverket förens vid en uppkoppling på 100 mbit och däröver.
APA, Harvard, Vancouver, ISO, and other styles
22

Tjhai, Gina C. "Anomaly-based correlation of IDS alarms." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.

Full text
Abstract:
An Intrusion Detection System (IDS) is one of the major techniques for securing information systems and keeping pace with current and potential threats and vulnerabilities in computing systems. It is an indisputable fact that the art of detecting intrusions is still far from perfect, and IDSs tend to generate a large number of false IDS alarms. Hence human has to inevitably validate those alarms before any action can be taken. As IT infrastructure become larger and more complicated, the number of alarms that need to be reviewed can escalate rapidly, making this task very difficult to manage. The need for an automated correlation and reduction system is therefore very much evident. In addition, alarm correlation is valuable in providing the operators with a more condensed view of potential security issues within the network infrastructure. The thesis embraces a comprehensive evaluation of the problem of false alarms and a proposal for an automated alarm correlation system. A critical analysis of existing alarm correlation systems is presented along with a description of the need for an enhanced correlation system. The study concludes that whilst a large number of works had been carried out in improving correlation techniques, none of them were perfect. They either required an extensive level of domain knowledge from the human experts to effectively run the system or were unable to provide high level information of the false alerts for future tuning. The overall objective of the research has therefore been to establish an alarm correlation framework and system which enables the administrator to effectively group alerts from the same attack instance and subsequently reduce the volume of false alarms without the need of domain knowledge. The achievement of this aim has comprised the proposal of an attribute-based approach, which is used as a foundation to systematically develop an unsupervised-based two-stage correlation technique. From this formation, a novel SOM K-Means Alarm Reduction Tool (SMART) architecture has been modelled as the framework from which time and attribute-based aggregation technique is offered. The thesis describes the design and features of the proposed architecture, focusing upon the key components forming the underlying architecture, the alert attributes and the way they are processed and applied to correlate alerts. The architecture is strengthened by the development of a statistical tool, which offers a mean to perform results or alert analysis and comparison. The main concepts of the novel architecture are validated through the implementation of a prototype system. A series of experiments were conducted to assess the effectiveness of SMART in reducing false alarms. This aimed to prove the viability of implementing the system in a practical environment and that the study has provided appropriate contribution to knowledge in this field.
APA, Harvard, Vancouver, ISO, and other styles
23

Monzer, Mohamad-Houssein. "Model-based IDS design pour ICS." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT056.

Full text
Abstract:
Les systèmes industriels présentent des risques de sécurité liés à leurs vulnérabilités informatiques. Ces systèmes, répartis dans le monde, continuent d'être la cible d'attaques. Bien que les systèmes industriels partagent des vulnérabilités communes avec les systèmes informatiques, ils ont tendance à avoir plus de contraintes en raison de l'interaction entre les systèmes cyber et physiques.Les systèmes de détection d'intrusion donnent une visibilité au système et sont considérés comme l'une des solutions pour détecter les attaques ciblées. Il semble donc pertinent de s'appuyer sur un modèle physique du système cyber-physique pour obtenir un système de détection d'intrusion (IDS) pour les systèmes industriels. La plupart des IDS sont basés sur des règles qui définissent comment les attaques possibles sont détectées. Ces règles sont généralement utilisées pour décrire les scénarios d'attaque possibles sur les systèmes ou pour décrire le comportement normal du système. Cependant, la création et la maintenance manuels des règles pour un système complexe peuvent s'avérer être une tâche très difficile.Cette thèse propose une solution pour modéliser ICS et concevoir des IDS spécifiques pour les systèmes industriels. Un générateur de règles IDS basé sur un modèle est encore proposé, qui convertit un modèle de système en règles IDS basées sur des anomalies. Enfin, l'efficacité des règles générées est évaluée
Industrial systems present security risks related to their IT vulnerabilities. These systems, spread over the world, continue to be targets of attacks. While Industrial systems share common vulnerabilities with IT systems, they tend to have more constraints due to the interaction between cyber and physical systems.Intrusion detection systems give visibility to the system and are considered as one of the solutions to detect targeting attacks. Hence, it seems relevant to rely on a physical model of the cyber-physical system to obtain an intrusion detection system (IDS) for industrial systems. Most IDSs are based on rules that define how possible attacks are detected. These rules are generally used to either describe possible attack scenarios on the systems or used to describe the normal system behavior of the system. However, manually creating and maintaining rules for a complex system can prove to be a very tedious and difficult task.This thesis proposes a solution to model ICS and to design specific IDS for industrial systems. A model-based IDS rule generator is also proposed, which converts a system model into anomaly-based IDS rules. Finally, the effectiveness of the generated rules is evaluated
APA, Harvard, Vancouver, ISO, and other styles
24

Richardson, Kajsa. "En studie av Idre Fjälls webbplats med fokus på användbarhet." Thesis, Högskolan Dalarna, Grafisk teknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:du-4219.

Full text
Abstract:
Idre Fjäll currently has not full control of how visitors experience their site or if it has good usability. I have helped the company to do a usability test on their website to see how and where any improvements can be made on the page before the winter season 2010. I have also done a survey to investigate how users perceive Idre Fjälls website. Ten people of various ages participated in the survey. All test subjects was recorded with both audio and screen activity during the tests. The test consisted of five different tasks to be solved over the internet at Idre fjälls website. Nr 1, 3, 4 and 5 was solved for most without problem. In nr 2, where a booking of a house would be done, here arose a problem in nine tests out of ten. The results show that the site has very good graphic design and information design, but some weaknesses in interaction design. I have worked out proposals on the most significant problems identified during the test.
APA, Harvard, Vancouver, ISO, and other styles
25

Ahlgren, Thorbjörn. "Institutionalisering på hemmaplan : En idés resa i den sociala barnavården." Doctoral thesis, Linnéuniversitetet, Institutionen för socialt arbete (SA), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36715.

Full text
Abstract:
This thesis describes and analyses in three substudies how home-based measures for children are expanding and why an open care idea are established as part of the Swedish child welfare. The first substudy describes the national increment of what today can be considered as a treatment policy – non-institutional care in child welfare. The results are analysed with Kingdon's agenda setting theory and shows that the factors of what Kingdon describes as problems-, politics- and policyflow influenced the national increment. Significant mechanisms have primarily been, the profession, the society's concerns for socially disadvantaged children, negative experiences of institutionalisation and a political position to deinstitutionalise all care. The second substudy focuses on how knowledge and research contributes to ideological, professional, and organizational change in child welfare by analysis of Research & Developments reports and articles from the professional journal Socionomen. Based on the neo-institutional concepts of organisational fields and isoformism the study's results shows that a consequence of adaptation strategies and "rationalized myths" are a number of similarities in how home-based measures are organized and which measures that are used. The third substudy, a case study, analyses how we can understand a local development of ideas in social services for children with concepts from neo institutional theory. Interviews and municipal documents are analysed and shows that the local translation of an open care idea is characterized by discretion, personal preferences and action and affects the choice of method and organization. The study also shows a political mistrust of institutional care while there is at the same time political confidence in the individual social worker's ability to find solutions that allow non-institutional measures to be an alternative to institutional care. An overall conclusion of the thesis is that there is now a treatment policy in social services for the children, which involves extensive efforts at home and it has led to that more children receive support from social services. One result of non-institutional care increment is that it led to increased costs for municipalities for intervention for children and young people when out-of-home care has not decreased. Another general conclusion is that translation and adaptation of ideas to local contexts is something that generally fits street-level bureaucrats need for discretion.
APA, Harvard, Vancouver, ISO, and other styles
26

Shaikley, Layla Karim. "Iraq's housing crisis : upgrading settlements for IDPS (internally displaced persons)." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82280.

Full text
Abstract:
Thesis (S.M. in Architecture Studies)--Massachusetts Institute of Technology, Dept. of Architecture, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. [74]-[76]).
The most recent war in Iraq has resulted in a large wave of internal and external displacement with increased sectarian violence and ethnic tension. Subsequent conflict has exacerbated conditions within the nation and further increased displacement. Throughout the country, over one million Iraqis are currently displaced. Inadequately supported by infrastructure due to a negligent dictatorship and consecutive wars, over 250 settlements have peppered Baghdad's landscape and aggravated the capital's insufficient infrastructure. It is clear that the rapid rate at which informal settlements for internally displaced persons (IDPs) are being established exceeds the rate in which settlements are forming Many settlements have exhibited user-initiated incremental housing processes. The topic of this thesis is upgrading settlements for IDPs in Baghdad, Iraq through user-initiated methods. Baghdad is facing an overwhelming amount of sub-standard IDP settlements, and while some settlements are turning into slums, other settlements are becoming more durable. Community action can be a solution for the problems addressed in semi-durable settlements that have exhibited enough solidarity through incremental processes to reach a semi-durable state. This thesis examines the solution through three methods. First, it looks at a historical review of incremental housing processes parallel to Iraq's housing policies and history to understand the nation's current housing crisis. It finds that Iraq has struggled in addressing housing needs for the low-income sector since its independence. Following the historical review, this thesis screens IDP settlements in Baghdad to evaluate the feasibility of upgrade for different types of settlement. In the screening process, settlements that exhibit semi-durable characteristics and are available for secure tenure are most eligible for upgrade. One particular semi-durable settlement is studied: Al-Sadeq in Baghdad's peripheries. Al-Sadeq is evaluated based on the following measures of durability: infrastructure, housing, and social networks. As hypothesized, findings supported the role of incremental housing principles and community action to improve the settlement's state of durability. Lessons are extracted from community field research. As hypothesized, social cohesion and community action are the catalysts that allow incremental methods of infrastructure and housing improvements to thrive. This is especially important in a conflict zone as Baghdad, where displacement is often a direct outcome of danger. In such environments, social networks can provide feelings of security to invest in development. Lessons for communities like Al-Sadeq include the power of community action in incremental housing processes and user-initiated development. Lessons from the historical review shed light on the ineffective solutions for mitigating social housing concerns in the nation's past. Lessons for the government in this study challenge the lack of an established tradition of community action in public sector projects in Iraq.
by Layla Karim Shaikley.
S.M.in Architecture Studies
APA, Harvard, Vancouver, ISO, and other styles
27

Spoerry, Christian. "Streptococcal immunoglobulin degrading enzymes of the IdeS and IgdE family." Doctoral thesis, Umeå universitet, Institutionen för molekylärbiologi (Medicinska fakulteten), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-134552.

Full text
Abstract:
Bacteria of the genus Streptococcus are common asymptomatic colonisers of humans and animals. As opportunistic pathogens they can however, depending on their host’s immune status and other circumstances, cause mild to very severe infections. Streptococci are highly intertwined with specific host species, but can also cause zoonosis or anthroponosis in more uncommon hosts. Prolonged and reoccurring infections require immune evasion strategies to circumvent detection and eradication by the host’s immune defence. A substantial part of the immune defence against bacterial pathogens is mediated by immunoglobulins. This thesis is based on work to identify and characterise immunoglobulin degrading enzymes secreted by different Streptococcus species as a means to sabotage and evade antibody-mediated immune responses. Stoichiometric and kinetic analysis of the IgG degrading enzyme IdeS from the important human pathogen S. pyogenes revealed that IdeS cleaves IgG, opposed to previous publications, as a monomer following classical Michaelis-Menten kinetics. The IdeS homologue of S. suis, IdeSsuis, did however not cleave IgG, but was highly specific fo rporcine IgM. S. suis was found to possess yet another protease, IgdE, capable of cleaving porcine IgG. Both of these proteases were shown to promote increased bacterial survival in porcine blood during certain conditions. IgdE is the founding member of a novel cysteine protease family (C113). Novel streptococcal members of this protease family were shown to specifically degrade certain IgG subtypes of the respective Streptococcus species’ main host. The observed substrate specificity of IgdE family proteases reflects the host tropism of these Streptococcus species, thereby giving insights into host-pathogen co-evolution. The abundance of immunoglobulin degrading enzymes among Streptococcus species indicates the importance of evasion from the antibody mediated immune responses for streptococci. These novel identified immunoglobulin degrading enzymes of the IdeS and IgdE protease families are potential valid vaccine targets and could also be of biotechnological use.
APA, Harvard, Vancouver, ISO, and other styles
28

Kalerat, Pietres Yothin Sawangdee. "Unmet contraceptive need in Indonesis : an analysis of IDHS 1997 /." Abstract, 2004. http://mulinet3.li.mahidol.ac.th/thesis/2547/cd372/4638507.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Aspernäs, Andreas, and Thommy Simonsson. "IDS on Raspberry Pi : A Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43997.

Full text
Abstract:
This is a report on the possibility of using a Raspberry Pi as an intrusion detection system in a home environment to increase network security. The focus of this study was on how well two different generations of Raspberry Pi would be able to  handle network traffic while acting as an intrusion detection system. To examine this a testing environment was set up containing two workstation computers connected to a Raspberry Pi, each computer hosting a virtual machine. Tests measuring the network throughput as well as the CPU and memory usage were performed on each of the Raspberry Pi devices. Two models of Raspberry Pis were used; Raspberry Pi model B+ and Raspberry Pi 2 model B; each of them running the operating system Arch Linux ARM. The results of these tests were that both of the Raspberry Pis could be used as an intrusion detection system but has some limitations that could impede usage depending on the requirements of the user. Raspberry Pi 2 model B show benefits of its updated hardware by suffering lower throughput degradation than Raspberry Pi model B+, while using less of it's total CPU and memory capacity.
Den här rapporten behandlar möjligheten att använda en Raspberry Pi som ett intrångdetekteringssystem i en hemma miljö för att öka nätverkssäkerheten. Fokusen i den här studien ligger på hur väl de två senaste generationerna av Raspberry Pi skulle kunna hantera nätverkstrafik samtidigt som den undersöker nätverkstrafiken och söker efter hot. För att kontrollera hur väl en Raspberry Pi kan fungera som ett intrångdetekteringssystem har en laborationsmiljö upprättats bestående av två fysiska maskiner som vardera används för att virtualisera en virtuell maskin. Tester för att mäta datagenomströmning, processor och minnesbelastning utfördes på var och en av Raspberry Pi. Två modeller av Raspberry Pi användes; Raspberry Pi model b+ och Raspberry Pi 2 model b, både körde operativsystemet Arch Linux ARM. Resultatet av testerna visade att det går att använda båda enheterna för att upprätta ett intrångdetekteringssystem, men det finns vissa begränsningar i enheterna vilket kan begränsa implementationsmöjligheterna. Raspberry Pi 2 model B uppvisade bättre resultat i form av att den är lägre belastad och har en högre datagenomströmning till skillnad från Raspberry Pi model B+. Raspberry Pi 2 model B har nyare och snabbare hårdvara vilket är den troliga orsaken till att den presterar bättre.
APA, Harvard, Vancouver, ISO, and other styles
30

Choudhry, Aurang Zeb. "Internally Displaced Persons Rights in Human Rights Perspective(Specifically Focused on Pakistani IDPs Example) : “Basic Human Rights of IDPs to Attain Equality in Dignity and Rights”." Thesis, Högskolan Dalarna, Socialantropologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:du-5273.

Full text
Abstract:
After the WWII, there was much concern to protect human rights situation all over the world. During the cold wars, huge displacement took place within different countries due to internal arms/ethnic conflicts. Millions of IDPs, who were uprooted by armed conflict or ethnic strife faced human rights violence. In 2002, there were estimated between 20-25 millions IDPs in the world (Phuong, p.1). Internally displacement is a worldwide problem and millions of the people displaced in Africa and Asia. These all Internal displacements of the people are only the result of the conflicts or the violations of the Human Rights but also sometimes it happened because of the natural disasters. “All human beings are born free and equal in dignity and rights..."(Streich, Article 1) This article works as the foundation of human rights which gives every human being an equal rights and opportunity to maintain his/her dignity. Human Rights issues related to human dignity must be taken very seriously and should not be ignored at any level; Many human rights issues are not always visible, issues such as: privacy, security, equality, protection of social and cultural values etc. In this paper I am going to apply theoretical approach of “all human being are equal in dignity and rights” to defend IDPs rights.
APA, Harvard, Vancouver, ISO, and other styles
31

Johansson, Söderberg Jenny. "The streptococcal IgG degrading enzyme IdeS : studies on host-pathogen interactions." Doctoral thesis, Umeå universitet, Institutionen för molekylärbiologi (Medicinska fakulteten), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-53706.

Full text
Abstract:
The important human pathogen Streptococcus pyogenes causes both mild infections such as pharyngitis and impetigo but also severe life threatening invasive infections.  Specific antibodies (IgG) recognize pathogens and are important mediators for pathogen clearance by the immune defence. S.ipyogenes expresses a highly effective and specific IgG endopeptidase called IdeS (immunoglobulin degrading enzyme of S.ipyogenes). IdeS rescues bacteria from opsonising IgG by cleavage of IgG generating two fragments F(ab´)2 and ½Fc. Moreover, IdeS block ROS production by neutrophils. In this thesis I have studied (i) allelic variants of IdeS and their biological potential, (ii) consequences of ½Fc production for host-pathogen interactions and (iii) IdeS processing by streptococcal and neutrophil proteases. When investigating the allelic variants of IdeS we could show that in respect to IgG degradation and inhibition of ROS production the allelic variants where indistinguishable, however the allelic variant of serotype M28 appears to be an unique exception as this protein was deficient in IgG cleavage but still inhibited ROS production. Further, the ½Fc fragments produced when IgG is cleaved by IdeS were shown to prime human neutrophils and under ex vivo experimental conditions this increased the bactericidal activity of the neutrophils. Finally, we made the interesting finding that IdeS is N-terminally processed by neutrophil proteases and by the streptococcal protease SpeB, but retain enzymatic activity and was less immunogenic compared to the full length protein.
APA, Harvard, Vancouver, ISO, and other styles
32

Vindebro, Reine. "Studies on secreted cysteine proteases of Streptococcus pyogenes : IdeS and SpeB." Doctoral thesis, Umeå universitet, Institutionen för molekylärbiologi (Medicinska fakulteten), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-88223.

Full text
Abstract:
The pathogen Streptococcus pyogenes is a significant cause of human morbidity and mortality. Most of the work in this thesis is focused on streptococcal virulence factor IdeS, but the thesis also features work on SpeB, another streptococcal virulence factor. Both IdeS and SpeB are secreted cysteine proteases and both have previously been shown to degrade human IgG. IgG is the only known substrate for IdeS while SpeB is a more promiscuous protease with a larger number of identified substrates. A significant part of the data presented in this thesis is the result of designing and optimizing methods to detect and accurately measure the proteolytic degradation of IgG. Methods aimed at measuring the binding interactions between enzyme and substrate have also been frequently utilized. I show that IdeS is a monomeric protease, as opposed to previously published data that suggested it to be dimeric. IdeS cleaves the two heavy chains of IgG in a two-step reaction and I demonstrate that the first cleavage is magnitudes faster than the second one. This means that IdeS is a more efficient enzyme than previously thought. The difference in rate cannot completely be explained by a loss of affinity between IdeS and IgG after the cleavage of the first heavy chain. The velocity of IdeS is further increased by the presence of human Cystatin C, via an unknown mechanism. Cystatin C is normally a protease inhibitor and it having an opposite effect is puzzling.The synthesis and evaluation of novel inhibitors are also described. Peptide analogues mimicking the sequence surrounding the scissile bond on IgG - with an amino acid replaced with a more rigid motif - act as specific, but low-affinity, inhibitors of IdeS. The peptide analogues’ inhibitory capacity for SpeB and papain was also assayed.When it comes to SpeB, I show that it does not have IgG as a substrate under physiological conditions, in contrast to what was previously thought. This thesis does not only present findings on the IgG degrading capacity of IdeS and SpeB but also include data on fundamental enzymatic properties for these proteases.
APA, Harvard, Vancouver, ISO, and other styles
33

Silva, Maria Denise Oliveira da. "Blog, reescrita e referenciação : idas e vindas na construção dos sentidos." Universidade Federal de Sergipe, 2015. https://ri.ufs.br/handle/riufs/6424.

Full text
Abstract:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
Este trabalho apresenta reflexões e sugestões sobre o ensino da escrita a partir de uma experiência desenvolvida na rede pública estadual de Sergipe. Para tanto, aplicou-se uma proposta de intervenção, durante a qual os alunos criaram um blog de fanfictions onde divulgaram e compartilharam seus escritos. O objetivo deste experimento é contribuir com a ampliação da competência escrita dos alunos a partir das atividades de reescrita e da exploração de algumas estratégias de referenciação presentes nos textos produzidos, além de promover a circularidade e o compartilhamento desses escritos no blog. Para a criação do blog, partiu-se das perspectivas do multiletramento, que envolvem a multiplicidade cultural e semiótica da sociedade. As reflexões sobre a língua partiram das teorias dos gêneros do discurso e da escrita como processo, culminando com os estudos sobre a reescrita e a avaliação. O corpus de análise constituiu-se de cinco produções coletivas elaboradas pelos alunos durante as aulas. Os resultados desta análise apontam para a melhoria da escrita dos alunos, decorrente das atividades de reescrita e da exploração de algumas estratégias de referenciação. Constatou-se, ainda, uma participação mais efetiva dos sujeitos em consequência do uso do blog como ambiente de trocas dialógicas e compartilhamento. Desta experiência, resultou como produto um caderno pedagógico, contendo orientações que podem ser ressignificadas em outras realidades educacionais.
APA, Harvard, Vancouver, ISO, and other styles
34

Pascoli, Maria do Carmo. "Idas e vindas : o motivo da viagem em textos literários portugueses." Programa de Pós-Graduação em Letras e Linguística da UFBA, 2007. http://www.repositorio.ufba.br/ri/handle/ri/11418.

Full text
Abstract:
Submitted by Edileide Reis (leyde-landy@hotmail.com) on 2013-05-13T17:30:32Z No. of bitstreams: 1 Maria do Carmo Pascoli.pdf: 985377 bytes, checksum: 2631ccf87eaeafd66cbcdcad7979ae21 (MD5)
Approved for entry into archive by Alda Lima da Silva(sivalda@ufba.br) on 2013-05-27T21:42:55Z (GMT) No. of bitstreams: 1 Maria do Carmo Pascoli.pdf: 985377 bytes, checksum: 2631ccf87eaeafd66cbcdcad7979ae21 (MD5)
Made available in DSpace on 2013-05-27T21:42:55Z (GMT). No. of bitstreams: 1 Maria do Carmo Pascoli.pdf: 985377 bytes, checksum: 2631ccf87eaeafd66cbcdcad7979ae21 (MD5) Previous issue date: 2007
Estudo centrado no motivo da viagem e em sua importância axial na literatura portuguesa, “Idas e Vindas” concentra-se em três momentos: o da expansão marítima, ocorrida a partir dos séculos XV e XVI; a segunda metade do século XIX, quando mais nitidamente se explicita a crise gerada pelo modelo expansionista e pela falência da noção de progresso; e, finalmente, as décadas finais do século XX, quando a reconfiguração da economia mundial, com o desaparecimento de um mundo bipolar, repercute fortemente na cultura. Enfatizando o olhar de quem permanece em terra, à espera dos que partiram, a reflexão segue um fio condutor específico: a intenção de ressaltar, entre as causas determinantes da viagem, a pobreza proveniente de equívocos e descasos administrativos. Busca-se articular história e ficção, de modo a delimitar etapas decisivas na construção da história cultural portuguesa.
Salvador
APA, Harvard, Vancouver, ISO, and other styles
35

Bista, Sulabh. "Assessing the Physical Security of IDFs with PSATool: a Case Study." Digital Commons @ East Tennessee State University, 2015. https://dc.etsu.edu/etd/2605.

Full text
Abstract:
PSATool is a checklist-based, web-based application for assessing the physical security of Intermediate Distribution Frameworks. IDFs, or wiring closets, are an integral if often neglected component of information security. Earlier work by Timbs (2013) identified 52 IDF-related security requirements based on federal and international standards for physical security. PSATool refines Timbs’ prototype application for IDF assessment, extending it with support for mobile-device-based data entry. PSATool was used to assess 25 IDFs at a regional university, a college and a manufacturing corporation, with an average of 9 minutes per assessment. Network managers and assessors involved in the assessments characterized PSATool as suitable for creating assessments, usable by IT department personnel, and accurate, in terms of its characterizations of IDF status.
APA, Harvard, Vancouver, ISO, and other styles
36

Johansson, Philip, and Niklas Blomqvist. "An Approach to Achieve DBMS Vendor Independence for Ides AB's Platform." Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139220.

Full text
Abstract:
Software that is developed with few integration capabilities to different user interfaces or database vendors might lose market share in the long run. To stay competitive, companies that find themselves in situations like these might need to look at options to increase their alternatives. This thesis aims to present and evaluate how Ides AB could achieve vendor independence as it relates to database integration.The proposed solution is based on pre-existing code from an existing product and thus includes theory about the methods and details how one can read, understand and analyse code. The outcome is presented with code examples to give the reader a clear and concise understanding. In the evaluation phase, we take other related work into consideration as it relates to our thesis focus. The proposed approach presented consists of a class to represent different database vendors. It also consists of abstract functions handling the interaction between different databases. Which database the class interacts with is determined by the connection established. The approach also includes what is possible to make database agnostic verified by an evaluation.
APA, Harvard, Vancouver, ISO, and other styles
37

Cuomo, Albina. "Il contributo della idro-geomorfologia nella valutazione delle piene in Campania." Doctoral thesis, Universita degli studi di Salerno, 2012. http://hdl.handle.net/10556/344.

Full text
Abstract:
2010 - 2011
Italy and, in particular, the Campania region, has been exposed to Hydraulic Risk since long ago. In hydraulic risk analysis the definition of maximum flood discharge with a specific return time (T) is crucial and, to this aim, the VAPI- Campania procedure (1995) was adopted in the Campania region. The VAPI method is based on a geo-morphoclimatic model, identifying 7 climatic homogenous areas with respect to the rainfall probability density function and 3 classes of permeability for the rainfall-runoff transformation model. At the XXX National Congress on the Hydraulic and Hydraulic Engineering (IDRA 2006), the hydrological working group of Salerno University (Rossi and Villani (2006)), pointed out guidelines for up-dating the VAPI-Campania and, in particular the role of: orographic barriers in the evaluation of intensity and persistence of the extreme rainfalls; and the individuation of hydro-geomorphotypes for the rainfall-runoff modeling at the catchments and sub-catchments scales. In this framework, the present thesis gives a contribution to a hydro-geomorphological approach to achieve the two guidelines mentioned above. This research focuses first on the automatic individuation and objective delimitation of the orographic barriers in order to upgrade the heuristic delimitation (expert judgment) used in the simplified model of orographically induced rainfall of Rossi et al. (2005). The proposed procedure is based on the basic concepts of the hierarchic orometry (hierarchical mountain geomorphometry), prominence and parent relationships, to delineate the 'orographic mountain' in various spatial scale (hierarchical- multiscale approach). Also, the procedure defines the 'morphologic mountains' and its components (ridge, plain and hillslope) using slope, altitude, relief ratio and exposition with respect to the dominant perturbation fronts and its moving direction. The second topic of research deals with the individuation of the hydrogeomorphotypes. To this aim, the prototypal work of Guida et al. (2007), was taken into account as a guideline in the identification of the hydrogeomorphotypes and the decisional scheme of Scherrer and Naef (2003), here modify, allowed the identification of the three dominant runoff mechanisms on the Campania region. In particular, the prototypal procedure of Guida has been here objectified and automatized, defining the 9 elementary landscape forms (Troch et al., 2002), characterized in terms of sub-surface flow and soil moisture storage, under an objectbased GIS environment. The procedure here presented allowed identification on the hydro-geomorphological map, and of the runoff mechanisms: Hortonian overland flow for excess of saturation, subsurface flow, and deep percolation. In order to test the procedure some hydro-geomorphological analysis have been carried out based on data from two instrumented experimental catchments and on rainfall data from the Regional Functional Center of the Campania Civil Protection Sector. The results allowed to calculate the hydrologic index named Runoff Index, which improves the evaluation of the runoff coefficient (Cf) for un-gauged basins. Other analyses were performed on further 4 catchments with similar hydrologic and geologic behavior in order to extended the procedure to the whole Campania region. Also, conceptual discussions on the implementation of the Runoff Index in the rainfall-runoff transformation operated with a largely used hydrologic software, HECHMS, was made, in order to evaluate the feasibility of the procedure proposed in the present research and improve the RI in hydraulic risk evaluation at a regional scale. [edited by author]
X n.s.
APA, Harvard, Vancouver, ISO, and other styles
38

SILVA, Aline Lopes da. "MODELO DE IDS PARA USUÁRIOS DE DISPOSITIVOS MÓVEIS." Universidade Federal do Maranhão, 2008. http://tedebc.ufma.br:8080/jspui/handle/tede/335.

Full text
Abstract:
Made available in DSpace on 2016-08-17T14:52:48Z (GMT). No. of bitstreams: 1 Aline lopes.pdf: 2261944 bytes, checksum: 0cbbb27a7a17ab362f4fce42298c4b45 (MD5) Previous issue date: 2008-06-26
Mobile devices are increasing common reality in wireless networks and have integrated the wireless environment, helping to ease and to make available information. Meanwhile, the wireless environment is subject to vulnerabilities because of the way of spreading information that is given through the air, and is subject to interception or even information theft. Mobile Devices in addition of its vulnerability to these vulnerabilities common in wireless environments, are devices with some physical limitations such as lack of processing capacity and memory, beyond the limited battery life. These limitations become critical in this kind of environment, when unidentified threats attack are directed mobile devices. It is necessary to develop an intrusion detection system dedicated to these devices to identify intrusive behaviour, taking into account their physical limitations. This work proposes an intrusion detection system (IDS, Intrusion Detection System) for wireless networks and mobile devices. This is an adaptation and extension of NIDIA-IDS (Intrusion Detection System-Network Intrusion Detection System based on Intelligent Agents). The system acts with two processes: the first one is an information tracking on the device performance and the second one is a wireless network traffic monitoring, analyzing both the traffic of monitored devices. As proof of concepts a prototype was developed and some experiments were carried to validate this solution.
Os dispositivos móveis são uma realidade cada vez mais comum em redes wireless e se integraram ao ambiente wireless, contribuindo para facilidade e disponibilidade da informação. Entretanto, o ambiente wireless está sujeito a vulnerabilidades, devido à forma de propagação da informação que se dá através do ar, estando sujeito a intercepção ou até mesmo roubo das informações. Dispositivos móveis além de estarem sujeitos a essas vulnerabilidades comuns em ambientes wireless, são dispositivos com algumas limitações físicas, como pouca capacidade de processamento e memória, além da vida útil de bateria limitada. Estas limitações tornam-se críticas neste tipo ambiente, quando ameaças não identificadas são direcionadas a dispositivos móveis. Torna-se necessário a implementação de sistema de detecção de intrusão voltado para estes dispositivos a fim de identificar comportamentos intrusivos, levando em consideração suas limitações físicas. Este trabalho propõe um sistema de detecção de intrusão (IDS, Intrusion Detection System) em redes wireless destinados a dispositivos móveis como adaptação e extensão do IDS-NIDIA (Intrusion Detection System- Network Intrusion Detection System based on Intelligent Agents). O mecanismo utiliza dois processos: o primeiro faz o monitoramento de informações sobre o comportamento do dispositivo e o segundo através do monitoramento de tráfego da rede wireless, analisando o tráfego destinado e originado aos dispositivos monitorados. A implementação da arquitetura e os testes realizados demonstram a viabilidade da solução.
APA, Harvard, Vancouver, ISO, and other styles
39

MORAES, Falkner de Área Leão. "SEGURANÇA E CONFIABILIDADE EM IDS BASEADOS EM AGENTES." Universidade Federal do Maranhão, 2009. http://tedebc.ufma.br:8080/jspui/handle/tede/1843.

Full text
Abstract:
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-08-21T12:14:23Z No. of bitstreams: 1 Falkner de Arêa Leão Moraes.pdf: 2601896 bytes, checksum: 0fa8b49e3f279d911a70b4f78d9cbe08 (MD5)
Made available in DSpace on 2017-08-21T12:14:23Z (GMT). No. of bitstreams: 1 Falkner de Arêa Leão Moraes.pdf: 2601896 bytes, checksum: 0fa8b49e3f279d911a70b4f78d9cbe08 (MD5) Previous issue date: 2009-02-16
Lack of security is a constant concern in open distributed systems. Threats are present within environments insecure, uncertain and constantly changing. Due to this problem, many tools for evaluating vulnerabilities of the network as well as for their protection are being developed as techniques for encryption and software systems such as antivirus, firewall and IDS (Intrusion Detection System). Among these, there are IDS systems that are being conceived, designed and implemented, using techniques executed by agents. However, it is necessary to assure security and reliability of exchanged messages inside IDS. For this purpose, this paper proposes a security solution for IDS based on agents. The proposed solution provides a methodology and a secure mechanism for communication among agents, through information protection configuration mechanisms, authentication and authorization, key control and messages persistence using XML. The proposed solution is implemented as an extension to the IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), whose architecture has an intelligent agent society that communicate in a cooperative way in a distributed environment. The implementation of the prototype and tests proposed in this work show the applicability of the proposed solution.
A falta de segurança é uma preocupação constante em sistemas distribuídos abertos. Ameaças estão presentes dentro de ambientes inseguros, incertos e que mudam constantemente. Devido a esses problemas, diversas ferramentas para avaliação de vulnerabilidades da rede, bem como para sua proteção, estão sendo desenvolvidas como técnicas de criptografia e softwares como antivírus, firewall e IDS (Intrusion Detection System). Dentre estas, destaca-se Sistemas IDS que estão crescentemente sendo concebidos, projetados e implementados, usando técnicas de segurança executadas por agentes. Entretanto, é necessário que a segurança e a confiabilidade das mensagens trocadas dentro de um sistema IDS sejam asseguradas. Para este fim, este trabalho propõe uma solução segura e confiável para IDS baseada em agentes. A solução propõe estabelecer um esquema de execução e comunicação segura dos agentes através de mecanismos de proteção de informações de configuração, autenticação e autorização, controle de chaves e persistência de mensagens do IDS, utilizando XML. A solução proposta é implementada como uma extensão do IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), cuja arquitetura consiste em uma sociedade de agentes inteligentes que se comunicam de forma cooperativa em um ambiente distribuído. A implementação do protótipo e os testes apresentados neste trabalho demonstram a aplicabilidade da solução proposta.
APA, Harvard, Vancouver, ISO, and other styles
40

Scrobonia, David. "Rules Based Analysis Engine for Application Layer IDS." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1773.

Full text
Abstract:
Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional network layer tools. This thesis aims to improve the state of web application security by supporting the development of the AppSensor project. Specifically, this thesis entails contributing a rules-based analysis engine to provide a new method for determining whether suspicious activity constitutes an attack. The rules-based method aggregates information from multiple sources into a logical rule to identify malicious activity, as opposed to relying on a single source of information. The rules-based analysis engine is designed to offer more flexible configuration for administrators and more accurate results than the incumbent analysis engine. Tests indicate that the new engine should not hamper the performance of AppSensor and use cases highlight how rules can be leveraged for more accurate results.
APA, Harvard, Vancouver, ISO, and other styles
41

Carey, Nathan. "Correlation of Heterogenous IDS Alerts for Attack Detection." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15872/1/Nathan_Carey_Thesis.pdf.

Full text
Abstract:
With the increasing use of Intrusion Detection Systems (IDS) as a core component of network security, a vast array of competing products have appeared to fulfil the role of reliably detecting potential breaches of security in a network. The domain of detecting intrusions is large. This leads to products which are better at detecting some intrusions than others, and so to the use of multiple different types of IDS within a network. This typical usage, combined with the common practice of using IDS at multiple points in the network, requires sophisticated management of heterogenous alerts from multiple sources. This management should enable correlation of alerts with the goal of better detecting attacks, and reducing the monitoring workload on administrators. This thesis presents an architecture utilising commodity components and the Intrusion Detection Message Exchange Format (IDMEF) to enable this type of alert management. A signature scheme for the specification of patterns of alerts that indicate multi-step attacks is given, and a methodology for analysing alerts using the architecture that was developed. The final outcomes are a signature system and collection of tools integrated in a GUI management interface to aid in the detection of attacks, and the results of utilising these tools on a series of experiments in attack detection.
APA, Harvard, Vancouver, ISO, and other styles
42

Carey, Nathan. "Correlation of Heterogenous IDS Alerts for Attack Detection." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15872/.

Full text
Abstract:
With the increasing use of Intrusion Detection Systems (IDS) as a core component of network security, a vast array of competing products have appeared to fulfil the role of reliably detecting potential breaches of security in a network. The domain of detecting intrusions is large. This leads to products which are better at detecting some intrusions than others, and so to the use of multiple different types of IDS within a network. This typical usage, combined with the common practice of using IDS at multiple points in the network, requires sophisticated management of heterogenous alerts from multiple sources. This management should enable correlation of alerts with the goal of better detecting attacks, and reducing the monitoring workload on administrators. This thesis presents an architecture utilising commodity components and the Intrusion Detection Message Exchange Format (IDMEF) to enable this type of alert management. A signature scheme for the specification of patterns of alerts that indicate multi-step attacks is given, and a methodology for analysing alerts using the architecture that was developed. The final outcomes are a signature system and collection of tools integrated in a GUI management interface to aid in the detection of attacks, and the results of utilising these tools on a series of experiments in attack detection.
APA, Harvard, Vancouver, ISO, and other styles
43

Sulaman, Sardar Muhammad. "An Analysis and Comparison of The Security Features of Firewalls and IDSs." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-72934.

Full text
Abstract:
In last few years we have observed a significant increase in the usage of computing devices and their capabilities to communicate with each other. With the increase in usage and communicating capabilities the higher level of network security is also required. Today the main devices used for the network security are the firewalls and IDS/IPS that provide perimeter defense. Both devices provide many overlapping security features but they have different aims, different protection potential and need to be used together. A firewall is an active device that implements ACLs and restricts unauthorized access to protected resources. An IDS only provides information for further necessary actions, not necessarily perimeter related, but some of these needed actions can be automated, such as automatic blocking in the firewall of attacking sites, which creates an IPS. This thesis report analyzed some common firewall and IDS products, and described their security features, functionalities, and limitations in detail. It also contains the comparison of the security features of the both devices. The firewall and IDS perform different functions for the network security, so they should be used in layered defense architecture. The passwords, firewalls, IDSs/IPSs and physical security all together provide a layered defense and complement each other. The firewall and IDS alone cannot offer sufficient network protection against the network attacks, and they should be used together to enhance the defense-in-depth or layered approach.
APA, Harvard, Vancouver, ISO, and other styles
44

Dimitriadou, Aikaterini. "Heşt Behişt of Idris Bidlisi : the reign of Bayezid II (1481-1512)." Thesis, University of Edinburgh, 2001. http://hdl.handle.net/1842/7705.

Full text
Abstract:
Idris Bidlisi's Heşt Behişt is a history of the Ottoman empire written in Persian at the beginning of the sixteenth century. Although considered one of the most important historical works of its time, the work remains to date unedited and scarcely studied. The present work aims to make at least a part of Heşt Behişt available to modern scholarship, with particular focus on the times of the author's patron, the Ottoman sultan Bayezid II (1481-1512). The summarised translation (chapter Vll) of the eighth 'Book' of Heşt Behişt, devoted to Bayezid II's reign, provides the basis for further discussions on several issues relating to the period, including an investigation of the author's personal approach to his subject. The thesis begins with an outline of the historical background of the reign of Bayezid II (chapter I), followed by a brief account of the development of Ottoman historiography up to the appearance of Heşt Behişt (chapter II). The author, Idris Bidlisi, and Heşt Behişt itself are then introduced (chapters Ill and IV). The focus is subsequently turned to the reign of Bayezid II, with particular attention to two major issues of the period. The first relates to the civil strife between the new sultan and his brother Cem over succession to the throne, a series of events which marked the first two years of Bayezid II's reign and had a significant effect on the Ottoman empire's domestic and international politics for the next thirteen years until Cem's death in 1495 (chapter V). The second analytical chapter investigates the phenomenon of the Ottoman navy in the times of Bayezid II, under whose care the empire's naval forces were significantly expanded and upgraded, for the first time in Ottoman history achieving predominance in sea over their Christian counterparts (chapter VI). In the study of both these themes information and the results of modern scholarship are juxtaposed to the material found in Heşt Behişt, in an attempt to look into the historical knowledge of the period and disclose the chronicle's usefulness and contribution to modem research.
APA, Harvard, Vancouver, ISO, and other styles
45

Amoretti, Carolina Friedrich. "Reposi??o de corticoester?ides em crian?as com choque s?ptico." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2012. http://tede2.pucrs.br/tede2/handle/tede/1407.

Full text
Abstract:
Made available in DSpace on 2015-04-14T13:33:01Z (GMT). No. of bitstreams: 1 446168.pdf: 819347 bytes, checksum: df8fbcb39a3bf3cd0e2b8587e38200b8 (MD5) Previous issue date: 2012-12-17
Objectives: To evaluate hydrocortisone treatment and response to ACTH adrenal stimulation test, with or without respect to basal cortisol, in children with volume refractory septic shock.Method: Randomized placebo controlled clinical trial, including children admitted to the Pediatric Intensive Care Unit at S?o Lucas Hospital (HSL-PUCRS, Brazil) with a diagnosis of volume refractory septic shock, between Jun/2008 and Sep/2012. Basal cortisol level was determined and, then, ACTH test (1mcg/1,73m2) was performed. Then, patients were randomized to hydrocortisone or placebo treatment groups. Study protocol was approved by the HSL?s ethics committee.Results: Fifty six patients were analyzed. Median age was 5 months old, and mortality was 17.8%. Mortality rate was higher in patients that failed to respond to ACTH test, regardless of treatment (36% versus 6%; p=0.01). There was no difference between treatment groups regarding time and dose of vasoactive drugs, PICU length of stay and mortality, even when those who fail to respond to ACTH test were analyzed separately.Conclusion: Mortality was higher among patients who failed to respond to ACTH stimulation test, regardless of group of treatment. In our study, steroid replacement in children with volume refractory septic shock failed to improve mortality or any other studied outcome. More studies are needed to confirm these results
Objetivo: Avaliar o efeito do tratamento com hidrocortisona e da resposta ao teste de estimula??o adrenal com ACTH, com e sem rela??o ao cortisol basal, em pacientes pedi?tricos com choque s?ptico refrat?rio a volume.M?todo: Ensaio cl?nico randomizado, duplo cego, placebo controlado, incluindo crian?as admitidas na Unidade de Terapia Intensiva Pedi?trica do Hospital S?o Lucas, entre junho/2008 e setembro/2012. Os pacientes tinham diagn?stico de choque s?ptico refrat?rio a volume. Foi dosado cortisol basal e ap?s, realizado o teste de estimula??o com ACTH (1mcg/1,73m2). O paciente era ent?o randomizado para tratamento com hidrocortisona ou placebo. O protocolo de estudo foi aprovado pelo Comit? de ?tica do referido hospital.Resultados: Foram analisadas 56 crian?as. A mediana de idade foi de 5 meses, e a mortalidade foi de 17,8%. A mortalidade foi mais alta entre pacientes que n?o responderam ao teste com ACTH, independente do tratamento recebido (36% versus 6%; p=0,01). N?o houve diferen?a estat?stica entre os pacientes tratados ou n?o com hidrocortisona, com rela??o ? mortalidade, horas e quantidade de drogas vasoativas e tempo de interna??o em UTIP. Este resultado se mant?m, mesmo quando analisados separadamente os pacientes que responderam ou n?o ao teste do ACTH.Conclus?o: Pacientes que n?o respondem a est?mulo com ACTH apresentaram mortalidade aumentada, independente do tratamento recebido. A reposi??o de corticoester?ides em crian?as com choque s?ptico refrat?rio a volume n?o mostrou melhora de mortalidade, ou dos outros desfechos avaliados neste estudo. Novos estudos s?o necess?rios para confirmar estes achados
APA, Harvard, Vancouver, ISO, and other styles
46

Himeur, Said. "L'Idrīssisme, matrice orientale et ancrage maghrébin (145/213-762/828) : essai d'une nouvelle approche historiographique." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H035.

Full text
Abstract:
L‟image d‟Idrīs b. ʻAbd Allāh (IIe/VIIIesiècle), probablement le premier dynaste musulman au Maġrib al-Aqṣā, est surtout véhiculée par les médiévistes depuis les historiographies classiques andalouses et maghrébines, notamment celles émanant des chroniqueurs mérinides (VIIe-IXe/XIIIe-XVe siècle). Ceux-ci nous présentent l'image d'un fugitif miraculé, échappant aux autorités abbassides et cherchant refuge auprès des Berbères Awraba à Walīlī, l‟ancienne cité romaine. Or, deux manuscrits récemment découverts, le Kitāb Aḫbār faḫ d‟Aḥmad b. Sahl ar-Rāzī (315/927), et le Kitāb al-Maṣābīḥ d‟Abū Al-ʻAbās b. Ibrāhīm Al-Ḥasanī (352/965), nous livrent une autre image de cette figure emblématique du Maghreb médiéval. En effet, ces deux sources d‟inspiration alide nous tracent le parcours d‟Idrīs b. ʻAbd Allāh en tant que missionnaire engagé au sein d‟un mouvement politico-religieux qui est celui des Alides. Selon ces sources, celui-ci parvint à assurer une certaine continuité de ce mouvement et, par la suite, à ancrer son projet politico-religieux au sein de l‟espace maghrébin. Il ne réussit pas seulement à jeter les bases d‟un modèle étatique à Walīlī, mais également à offrir aux Berbères une nouvelle version de l‟islam propre aux Alides dont l'assise doctrinale est l'attachement aux ahl al-Bayt, la famille du Prophète : une version diamétralement opposée à celle connue par les tribus berbères maghrébines sous le règne des Omeyyades. Ainsi, le leadership dynastico-doctrinal à structure familiale (ahl al-Bayt) va se substituer pour la première fois dans l'histoire du Maġrib al-Aqṣā au leadership clanico-tribal à structure tribale (al-ʻaṣabiyya al-qabaliyya). Les auteurs de ces deux nouvelles sources mettent en exergue quatre aspects. En premier lieu, l‟orientalité d‟Idrīs, en soulignant son rôle de missionnaire et de combattant au sein du mouvement alide en Orient, avant, pendant et après la bataille du Faḫ. Ensuite, les grandes lignes de son mouvement politico-religieux, ainsi que les objectifs qu'il définit à travers ses différents discours à Walīlī. Puis, la stratégie d'Idrīs à l‟égard de ses rivaux abbassides, entre autres durant la course vers le pouvoir et ses enjeux géopolitiques de l‟époque. Enfin, l'orientation politico-religieuse supposée des deux premiers souverains idrīsides. Toutefois, si ces deux oeuvres alides se sont distinguées par une bonne couverture historiographique de la période qui s'étend du Faḫ à Walīlī, elles demeurent limitées par rapport à celles des auteurs mérinides concernant l‟époque après Walīlī qui se focalisent davantage sur le personnage d'Idrīs le fils et la ville de Fās
The image of Idrīs b. 'Abd Allāh (2nd/8th century), probably the first dynast in the country of Maġrib al-Aqṣā, is mainly conveyed by medievalists since the classical Andalusian and Maghrebian historiographies, especially those emanating from Merinid historiographers (7th-9th/13th-15th centuries). These present us with the image of a miraculously escaped fugitive, fleeing the Abbasid authorities and seeking refuge from the Berbers of Awraba in Walīlī, the ancient Roman city. Now, the two recently discovered manuscripts, that of Aḥmad b. Sahl ar-Rāzī (315/927), Kitāb Aḫbār faḫ and that of Abū Al-'Abās b. Ibrāhīm Al-Ḥasanī (352/965), Kitāb al-Maṣābīḥ, give us another image of this emblematic figure of the medieval Maghreb. Indeed, these two sources of inspiration alid us trace the course of Idrīs b. 'Abd Allāh as a missionary engaged in a political-religious movement that is that of the Alids. According to these sources, he managed to ensure a certain continuity of this movement and, subsequently, to anchor his politico-religious project within the Maghreb space. He is not only able to lay the foundations for a state model in Walīlī, but also to offer to the Berbers a new version of Alid-specific Islam whose doctrinal foundation is the attachment to ahl al-Bayt (The family of the Prophet). A version diametrically opposed to that known by the Maghreb Berber tribes under the reign of the Umayyads. Thus, the family-oriented dynastic-doctrinal (ahl-al-Bayt) leadership will be substituted for the first time in the history of Maġrib al-Aqṣā, tribal-clan-tribal leadership (al-āṣabiyya al-qabaliyya). The authors of these two new sources highlight four aspects. First, the orientality ofIdrīs, emphasizing his role as missionary and fighter in the movement alide in the East, before, during and after the battle of the Faḫ. Then, the outline of his political-religious movement and the objectives he defines through his different speeches in Walīlī. Then, Idrīs' strategy towards his Abbasid rivals, among others during the race towards power and its geopolitical stakes of the time. Finally, the supposed politico-religious orientation of the first two sovereign ideals. However, if these two alids works have distinguished themselves by a good historiographical coverage of the period stretching from the Faḫ to Walīlī, they remain limited compared to those of the Merinid authors concerning the period after Walīlī who focus more on the character from Idrīs the son and the city of Fās
APA, Harvard, Vancouver, ISO, and other styles
47

Virti, Émerson Salvadori. "Implementação de um IDS utilizando SNMP e lógica difusa." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/11475.

Full text
Abstract:
Este trabalho busca o estudo da segurança em redes de computadores através da implementação de um sistema detector de intrusão embasado na captura de informações pela utilização do protocolo SNMP. Para alcançar-se a diminuição no número de falsos positivo e negativo, problema peculiar à maioria dos IDS, utiliza-se a lógica difusa para, com o auxilio dos administradores de segurança de cada rede, possibilitar a construção de um sistema detector de intrusão que melhor se adeque às características das redes monitoradas. Posteriormente, utilizando o monitoramento de uma rede de produção, avalia-se a melhora na segurança obtida com o uso do IDS implementado por esse trabalho que, atuando quase em tempo real, propicia sua adoção como mecanismo complementar à segurança de redes.
This work develops a study about Computer Network Security through the implementation of an Instruction Detection System (IDS) based on system information captured by the SNMP protocol. To reach a reduction in the number of false positive and false negative, a peculiar problem to the majority of the IDS, it is used fuzzy logic and the assistance of Network Security Administrators. Thus it is possible to build an Intrusion Detection System better adjusted to the network characteristics that must be monitored. At last, by monitoring a production network, it is evaluated the overall security improvement obtained by the IDS proposed in this work and considers its adoption as a complementary network security mechanism.
APA, Harvard, Vancouver, ISO, and other styles
48

Ovšonka, Daniel. "Obfuskace síťového provozu pro zabránění jeho detekce pomocí IDS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236209.

Full text
Abstract:
This thesis deals with the principles of network traffic obfuscation, in order to avoid its detection by the Intrusion Detection System installed in the network. At the beginning of the work, reader is familiarized with the fundamental principle of the basic types of IDS and introduced into the matter of obfuscation techniques, that serve as stepping stone in order to create our own library, whose design is described in the last part of the work. The outcome of the work is represented by a library, that provides all the implemented techniques for further use. The library can be well utilized in penetration testing of the new systems or used by the attacker.
APA, Harvard, Vancouver, ISO, and other styles
49

Aussibal, Julien. "Rsids : un IDS distribué basé sur le framework CVSS." Pau, 2009. http://www.theses.fr/2009PAUU3044.

Full text
Abstract:
La détection d'intrusion est une méthode qui permet de garantir la notion de disponibilité dans les systèmes et réseaux informatiques. Cette disponibilité est généralement mise à mal par différentes anomalies. Ces anomalies peuvent être provoqués soit de manière légitime suite a des opérations involontaires intervenant sur ces systèmes (rupture de lien, embouteillages,. . . ), soit de manière illégitimes avec des opérations malveillantes ayant pour but de nuire à la disponibilité de ces systèmes. La mise en oeuvre d'outils recherchant ces différentes anomalies, que sont les IDS (Intrusion Dectetion System), contribuent à détecter au plus tôt ces anomalies et à les bloquer. Cette thèse nous a permis de mettre en place une nouvelle plateforme de génération d'anomalies légitimes et illégitimes. Ce travail a été réalisé dans le cadre du projet METROSEC. Cette plateforme nous a permis d'obtenir différentes captures de trafics contenant ces anomalies. Les différentes anomalies illégitimes ont été réalisées avec des outils classiques de Dénis de Service qui sont TFN2k ou encore Trinoo. Des anomalies légitimes ont aussi été réalisées sous la forme de phénomène de foules subites. L'ensemble de ces captures réelles de trafic ont été utilisées dans le cadre d'autres recherches sur la détection d'intrusion pour l'évaluation de nouvelles méthodes de détection. Dans un second temps, la mise en oeuvre d'un nouvel outil de détection nous a semblé nécessaire afin d'améliorer la qualité de détection de ces anomalies. Ce nouvel IDS distribué, appelé RSIDS (Risk Scored Intrusion Detection System), permettra de récupérer les résultats d'une multitude de sondes hétérogènes. L'utilisation de ses sondes va permettre de supprimer les risques de fausses alertes. En effet une sonde n'est pas capable de détecter l'ensemble des anomalies pouvant arriver sur un système ou un réseau. Chacune des remontées d'alertes fournies par ses sondes sera évaluée en fonction de son degré de dangerosité. Cette évaluation de la dangerosité s'appuie sur le framework CVSS (Common Vulnerability Scoring System)
Intrusion detection is a method that ensures the availability concept in systems and computer networks. This availability is generally undermined by various anomalies. These anomalies can be caused either legitimately unintended result has operations working on these systems (broken link, traffic, or. . . ), so illegitimate with malicious operations designed to undermine the availability of these systems. The implementation of these various anomalies detection tools, such as IDS (Intrusion Detection System), contribute to early identification of these anomalies and to block them. This thesis has enabled us to develop a new generation platform to generate legitimate and illegitimate anomalies. This work was carried out under the project METROSEC. This platform has enabled us to obtain various traffic captures containing these anomalies. The various illegimitate anomalies were performed with classic tools to make Denial of Service like TFN2k or Trinoo. Legitimate Anormalies were also conducted with flash crowd phenomenon. All these catch real traffic were used in further research on intrusion detection for the evaluation of new methods of detection. In a second part, the implementation of a new detection tool seems necessary to improve the quality of detection of these anomalies. This new distributed IDS, called RSIDS (Risk Scored Intrusion Detection System), will retrieve the results of a multitude of heterogeneous probes. The use of probes will remove the risk of false alarms. Indeed, a probe is not able to detect all anomalies that occur on a system or network. Each alert provided by its probes will be evaluated according to their degree of dangerousness. The assessment of dangerousness based on the framework CVSS (Common Vulnerability Scoring System)
APA, Harvard, Vancouver, ISO, and other styles
50

Čmela, Libor. "Přestupní terminál IDS JMK u žel. stanice Brno - Řečkovice." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2012. http://www.nusl.cz/ntk/nusl-225526.

Full text
Abstract:
The subject of diploma thesis is a blue-print of appropriate adjustment space by the railway station in Brno Řečkovice, in terms of road structures, so that it meets all requirements of public transfer terminal and IDS JMK. Terminal should server as a transfer station between bus service and pojected North-Southern Rail Diameter. In the terminal, there should be a continuity on systems P+R, K+R and B+R ensured. The project is dealing with a partial design of adjacent local roads. The work is processed in AutoCAD 2011, Bentley InRoads and Microsoft Office 2007.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography