To see the other types of publications on this topic, follow the link: Integrity.

Dissertations / Theses on the topic 'Integrity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Integrity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Epps, Susan Bramlett. "Academic Integrity." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/2564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Epps, Susan Bramlett. "Academic Integrity." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/2557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moss, Ben. "The data integrity problem and multi-layered document integrity." Thesis, University of Nottingham, 2007. http://eprints.nottingham.ac.uk/10538/.

Full text
Abstract:
Data integrity is a fundamental aspect of computer security that has attracted much interest in recent decades. Despite a general consensus for the meaning of the problem, the lack of a formal definition has led to spurious claims such as "tamper proof", "prevent tampering", and "tamper protection", which are all misleading in the absence of a formal definition. Ashman recently proposed a new approach for protecting the integrity of a document that claims the ability to detect, locate, and correct tampering. If determining integrity is only part of the problem, then a more general notion of data integrity is needed. Furthermore, in the presence of a persistent tamperer, the problem is more concerned with maintaining and proving the integrity of data, rather than determining it. This thesis introduces a formal model for the more general notion of data integrity by providing a formal problem semantics for its sub-problems: detection, location, correction, and prevention. The model is used to reason about the structure of the data integrity problem and to prove some fundamental results concerning the security and existence of schemes that attempt to solve these sub-problems. Ashman's original multi-layered document integrity (MLDI) paper [1] is critically evaluated, and several issues are highlighted. These issues are investigated in detail, and a series of algorithms are developed to present the MLDI schemes. Several factors that determine the feasibility of Ashman's approach are identified in order to prove certain theoretical results concerning the efficacy of MLDI schemes.
APA, Harvard, Vancouver, ISO, and other styles
4

Camilleri, Andrew. "Composition integrity framework : an integrity monitor for aspect-oriented programs." Thesis, Lancaster University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.556629.

Full text
Abstract:
Aspect Oriented Programming (AOP) is becoming increasingly accepted as an approach to deal with crosscutting concerns in software development. However, AOP is known to raise software integrity issues. Within AOP, an aspect is allowed to roam the underlying system with little control on which modules end up being composed with each other. Building on the context of integrity research and AOP research, a novel approach to con- trolling aspect-oriented composition in three dimensions is developed. An integrity management framework known as Composition Integrity Framework (CIF) which is also extensible, deals with composition in the dimensions of: • Where the composition occurs. • How the composition is done. • What is being composed. CIF is evaluated from two different angles. First, we set out to show that our framework does indeed deal with compositional integrity. W~ achieve this by enforcing the necessary integrity constraints through CIF, for a number of bugs that have been uncovered for independently developed non-trivial systems, again through CIF. Second, we conduct a quantitative analysis that shows that CIF provides the right abstractions to deal with integrity, also by showing that our framework does not entail an unnecessary heavy burden on the development lifecycle.
APA, Harvard, Vancouver, ISO, and other styles
5

Phillips, Ruth. "British domestic violence perpetrator programmes : 'programme integrity' within 'service integrity'." Thesis, London Metropolitan University, 2015. http://repository.londonmet.ac.uk/940/.

Full text
Abstract:
Despite its stated importance to outcome evaluations, ‘programme integrity’ has long been lamented as a lacuna in the literature, especially in relation to domestic violence perpetrator programmes (DVPPs). Indeed, the literature reveals a lack of clarity regarding programme integrity in any context, although a baseline definition recognises its role as being to ensure programmes are delivered as intended and with a high level of efficacy. A ‘dominant definition’ emerges which is premised on programmes being subject to experimental models of development and evaluation and thus requiring strict adherence to a manual. This study draws on interviews with British DVPP pioneers, current practitioners and a case study, to explore how programme integrity is understood and practised in British DVPPs. The study finds that the dominant definition is inadequate to capture the practise of DVPPs due to their ‘process-driven’ approach which relies upon a high level of reflexivity, responsivity, and innovation. Furthermore, DVPPs require a concept of programme integrity – directly related to group-work delivery – which is embedded within a wider ‘service integrity’ which recognises the ways in which all aspects of the DVPP service contribute to integrity. The Respect Accreditation Standard requires that the work of the whole service is taken into account but this ‘whole service approach’ has not always translated into a ‘whole service ethos’ since the men’s group-work aspect of the service is often given prominence in terms of resources and status. Thus, a concept of ‘service integrity’ is presented which builds on the Accreditation Standard and encourages a culture, or ‘whole service ethos’, that properly recognises and addresses the contributions of the whole service to achieve an intervention which is effective and innovative, and has ‘integrity’.
APA, Harvard, Vancouver, ISO, and other styles
6

De, Raeve A. L. "Nursing with integrity." Thesis, Swansea University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.636429.

Full text
Abstract:
This thesis uses a philosophical method of enquiry to engage in a conceptual exploration of some significant features of the nature of integrity within nursing. Since integrity is understood in its moral sense and nursing, it is argued, is an intrinsically moral activity, the thesis is also normative. Integrity is considered to be a higher or second order virtue which contributes to the realisation of other moral goals, rather than being an end in itself. For this reason much of the thesis concerns the nature of care in nursing and an exploration of what it is to be a good nurse. However, particular issues are examined which help to illuminate the concept of integrity in nursing because they seem to offer interesting challenges to it. The thesis focuses primarily on the world of general nursing and on situations where nurses can be said to have relationships with the patients they nurse. It is argued that there is a conceptually intimate connection between caring for and caring about and through an analysis of trust and trustworthiness in nurse-patient relationships, this argument is strengthened to suggest that there are conceptual as well as moral reasons why nurses engaged in relationships with patients that persist over time, need to care about as well as for their patients. It is argued that this is not just a requirement of good nursing but that it is necessary to help to ensure that acceptable rather than negligent nursing can be sustained. One section of the thesis considers how nurses could be helped to develop and maintain such an attitude to their patients.
APA, Harvard, Vancouver, ISO, and other styles
7

Motara, Yusuf Moosa. "File integrity checking." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.

Full text
Abstract:
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized code. File integrity checking is examined as a means of removing this attack vector, and the design, implementation, and evaluation of a best-of-breed file integrity checker for the Linux operating system is undertaken. We conclude that the resultant file integrity checker does succeed in removing file execution as an attack vector, does so at a computational cost that is negligible, and displays innovative and useful features that are not currently found in any other Linux file integrity checker.
APA, Harvard, Vancouver, ISO, and other styles
8

Scheding, Steven. "High integrity navigation." Phd thesis, Department of Mechanical and Mechatronic Engineering, 1998. http://hdl.handle.net/2123/6768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nadif, Raja. "The in vivo role of integrin alpha7 in heart integrity and function." Thesis, University of Manchester, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492878.

Full text
Abstract:
Cardiovascular complications, including cardiac hypertrophy, arrhythmias and sudden death, are commonly associated with muscular dystrophies. Null mutations of the integrin alpha? gene, an essential mediator of cellular attachment to the extracellular matrix in cardiac and skeletal muscle, leads to progressive muscular dystrophy in humans, which is faithfully replicated in the integrin alpha? deficient (a7-/-) mouse model. In the latter, premature sudden death is not directly attributable to the dystrophic phenotype. We therefore analysed the cardiac phenotype in integrin a7-/- mice to determine whether their premature death is associated with altered cardiac structure and function and/or altered cardiac rhythm.
APA, Harvard, Vancouver, ISO, and other styles
10

Vohnout, Rudolf. "Řešení integrity digitálního archivu pomocí relativní časové autentizace." Doctoral thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-191814.

Full text
Abstract:
The research objective of the dissertation is a phenomenon of electronic documents archivation in long-term timeframe with focus on their security and integrity. This work at the begging deals with research issues of current approaches and solutions in the specified topic and focuses on relationship examining of the long-term archivation on restrictive conditions set by currently valid legislation scope. The main focus is on the archive integrity by means of alternative methods not related on absolute archival time. Design part deals with creation of the universal system solution leading to ensure non-repudiation of entrusted, archive managed, objects. This draft was empirically verified and results were processed and evaluated by means of statistics methods. The presented proposal of this work endeavors contribution to strengthen legal and evidence equivalence of long-term archived electronic documents on the same level of their paper siblings.
APA, Harvard, Vancouver, ISO, and other styles
11

Braidwood, Iain. "Bulk carrier structural integrity." Thesis, University of Newcastle Upon Tyne, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.327198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kadorová, Martina. "Marketingová stratégia Penziónu Integrity." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-136282.

Full text
Abstract:
The diploma thesis called Marketing Strategy of Penzion Integrity focuses on situation analysis of guesthous Penzion Integrity and suggestions for marketing strategy of the guesthouse. The thesis is devided into 5 parts. First chapter is focused on chracteristics of tourism and hospitality industry in CZE. Second chapter focuses on marketing of services, strategy and marketing research.Next, there is a guesthous charakteristics and situational analysis and the last part gives proposal for marketing strategy in 2013 orného penziónu, ako aj analýza konkurenčného
APA, Harvard, Vancouver, ISO, and other styles
13

Adedipe, Oyewole. "Integrity of offshore structures." Thesis, Cranfield University, 2015. http://dspace.lib.cranfield.ac.uk/handle/1826/9692.

Full text
Abstract:
Corrosion and fatigue have been dominant degradation mechanisms in offshore structures, with the combination of the two, known as corrosion fatigue, having amplified effects in structures in the harsh marine environments. Newer types of structure are now being developed for use in highly dynamic, harsh marine environments, particularly for renewable energy applications. However, they have significantly different structural details and design requirements compared to oil and gas structures, due to the magnitude and frequency of operational and environmental loadings acting on the support structures. Therefore, the extent of corrosion assisted fatigue crack growth in these structures needs to be better understood. In this research, fatigue crack growth in S355J2+N steel used for offshore wind monopile fabrications was investigated in air and free corrosion conditions. Tests were conducted on parent, HAZ and weld materials at cyclic load frequencies similar to what is experienced by offshore wind monopile support structures. The seawater used for testing was prepared according to ASTM D1141 specifications and was circulated past the specimens through a purpose designed and built corrosion rig at a rate of 3 l/min, at a temperature of 8-100C and at a pH of 7.78-8.1. A new crack propagation method accompanied by constant amplitude loading was used. Crack growth rates in parent, HAZ and weld materials were significantly accelerated under free corrosion conditions, at all the stress ratios used compared to in air environment. However, in free corrosion conditions, crack growth rates in the parent, HAZ and weld materials were similar, particularly at a lower stress ratio. The results are explained with respect to the interaction of the loading condition, environment and the rate of material removal by corrosion in the weldments. A new model was developed to account for mean stress effects on crack growth rates in air and in seawater, and was found to correlate well with experimental data as well as with the other mean stress models tested.
APA, Harvard, Vancouver, ISO, and other styles
14

Kvíčala, Aleš. "Možnosti zvyšování výkonnosti GNSS pro zajištění provozu RNP-RNAV." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2008. http://www.nusl.cz/ntk/nusl-227982.

Full text
Abstract:
The goal of this thesis is to analyze current requirements of navigation system RNP RNAV. Particularly is behaving about estimation current ways and description of future improving GNSS performance. In submitted thesis is describes present evolution of area navigation and required navigation performance RNP. The next part deals with the common access how to raise the performance parameters, their estimation and also description how it'll be solve in future systems.
APA, Harvard, Vancouver, ISO, and other styles
15

ERLANDSSON, LINA, and SOFIA BERGENHOLTZ. "Övervakning på arbetsplatsen, ur arbetsgivaren och arbetstagarens perspektiv." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20628.

Full text
Abstract:
I dagens kunskapssamhälle är arbetstagaren en investering i tid och pengar för arbetsgivaren. Det har medfört att det inte är lika lätt för arbetsgivaren att ersätta arbetare som tidigare, utan det läggs större vikt vid att hitta ”rätt person”. Enligt politiska beslut har arbetsgivarna tillförts ett växande ansvar för arbetstagarna i form av sjuklön, rehabiliteringsutredningar samt att organisera rehabiliteringsverksamhet på arbetsplatsen. Detta ansvar har gjort arbetsgivarna mer angelägna att veta så mycket som möjligt om arbetssökande och anställda, vilket har rest en fråga om integritet i arbetslivet. På grund av teknologisk utveckling kan arbetstagare övervakas på flera olika sätt. Dessa nya teknologier har även medfört en diskussion om etisk och laglig oro över integritetsrättvisa på arbetsplatsen.Syftet med uppsatsen har varit att illustrera de faktorer som påverkar legitimering av övervakning på arbetsplatsen. Vi har betraktat fenomenet utifrån ett managementperspektiv, där risk management och integritet har varit i fokus.Vi valde att använda oss av agentteorin och panoptikon då de är etablerade teorier inom vårt valda ämne. Risk management valde vi eftersom det används för att motivera övervakningsåtgärder. Vi har inriktat oss på riskbedömning då det är i denna fas som riskidentifieringen sker. För att läsaren ska förstå begreppet integritet, har vi valt att förklara det i den teoretiska referensramen samt presentera tre principer för att förenkla definitionen av vad dess rättighet innebär.Övervakning kan tillgodose olika intressen från arbetsgivarens sida för att till exempel upprätthålla god produktivitet och skydda tillgångar. Arbetsgivaren har även en skyldighet att bistå med en säker arbetsplats vilket gör att vissa övervakningsåtgärder legitimeras. Övervakning kan ogillas av arbetstagaren utav flera anledningar, bland annat har forskning visat att överdriven övervakning kan leda till missnöje, stress samt minskad motivation. Arbetstagarens negativa inställning till övervakning kan även bero på illegalt beteende vilket bland annat kan vara stöld eller missbruk. Vissa övervakningsåtgärder kan dock även tillgodose arbetstagarens intresse i form av exempelvis en säker arbetsmiljö.Uppsatsens studie visar att legitimering påverkas av ett flertal faktorer och att det inte finns något klart och tydligt svar på hur hantering av motsättningen mellan övervakning och personlig integritet ska behandlas. Det beror på hur arbetsgivaren motiverar övervakning samt om arbetstagaren är villig att godta de motiven. Vi anser att det är viktigt att båda parter för en kontinuerlig dialog över frågan.
APA, Harvard, Vancouver, ISO, and other styles
16

Amigud, Alexander. "A Computational Academic Integrity Framework." Doctoral thesis, Universitat Oberta de Catalunya, 2018. http://hdl.handle.net/10803/461581.

Full text
Abstract:
L'abast creixent i la naturalesa canviant dels programes acadèmics constitueixen un repte per a la integritat dels protocols tradicionals de proves i exàmens. L'objectiu d'aquesta tesi és introduir una alternativa als enfocaments tradicionals d'integritat acadèmica, per a cobrir la bretxa del buit de l'anonimat i donar la possibilitat als instructors i administradors acadèmics de fer servir nous mitjans que permetin mantenir la integritat acadèmica i promoguin la responsabilitat, accessibilitat i eficiència, a més de preservar la privadesa i minimitzin la interrupció en el procés d'aprenentatge. Aquest treball té com a objectiu començar un canvi de paradigma en les pràctiques d'integritat acadèmica. La recerca en l'àrea de la identitat de l'estudiant i la garantia de l'autoria són importants perquè la concessió de crèdits d'estudi a entitats no verificades és perjudicial per a la credibilitat institucional i la seguretat pública. Aquesta tesi es basa en la noció que la identitat de l'alumne es compon de dues capes diferents, física i de comportament, en les quals tant els criteris d'identitat com els d'autoria han de ser confirmats per a mantenir un nivell raonable d'integritat acadèmica. Per a això, aquesta tesi s'organitza en tres seccions, cadascuna de les quals aborda el problema des d'una de les perspectives següents: (a) teòrica, (b) empírica i (c) pragmàtica.
El creciente alcance y la naturaleza cambiante de los programas académicos constituyen un reto para la integridad de los protocolos tradicionales de pruebas y exámenes. El objetivo de esta tesis es introducir una alternativa a los enfoques tradicionales de integridad académica, para cubrir la brecha del vacío anonimato y dar la posibilidad a los instructores y administradores académicos de usar nuevos medios que permitan mantener la integridad académica y promuevan la responsabilidad, accesibilidad y eficiencia, además de preservar la privacidad y minimizar la interrupción en el proceso de aprendizaje. Este trabajo tiene como objetivo iniciar un cambio de paradigma en las prácticas de integridad académica. La investigación en el área de la identidad del estudiante y la garantía de la autoría son importantes porque la concesión de créditos de estudio a entidades no verificadas es perjudicial para la credibilidad institucional y la seguridad pública. Esta tesis se basa en la noción de que la identidad del alumno se compone de dos capas distintas, física y de comportamiento, en las que tanto los criterios de identidad como los de autoría deben ser confirmados para mantener un nivel razonable de integridad académica. Para ello, esta tesis se organiza en tres secciones, cada una de las cuales aborda el problema desde una de las siguientes perspectivas: (a) teórica, (b) empírica y (c) pragmática.
The growing scope and changing nature of academic programmes provide a challenge to the integrity of traditional testing and examination protocols. The aim of this thesis is to introduce an alternative to the traditional approaches to academic integrity, bridging the anonymity gap and empowering instructors and academic administrators with new ways of maintaining academic integrity that preserve privacy, minimize disruption to the learning process, and promote accountability, accessibility and efficiency. This work aims to initiate a paradigm shift in academic integrity practices. Research in the area of learner identity and authorship assurance is important because the award of course credits to unverified entities is detrimental to institutional credibility and public safety. This thesis builds upon the notion of learner identity consisting of two distinct layers (a physical layer and a behavioural layer), where the criteria of identity and authorship must both be confirmed to maintain a reasonable level of academic integrity. To pursue this goal in organized fashion, this thesis has the following three sections: (a) theoretical, (b) empirical, and (c) pragmatic.
APA, Harvard, Vancouver, ISO, and other styles
17

Lhee, Kyung-suk. "Integrity checking for process hardening." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2005. http://wwwlib.umi.com/cr/syr/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hemlin, Billström Adam, and Fabian Huss. "Video Integrity through Blockchain Technology." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211532.

Full text
Abstract:
The increasing capabilities of today’s smartphones enables users to live stream video directly from their mobile device. One increasing concern regarding videos found online is their authenticity and integrity. From a consumer standpoint, it is very hard to distinguish and discern whether or not a video found on online can be trusted, if it was the original version, or if has been taken out of context. This thesis will investigate a method which tries to apply video integrity to live streamed media. The main purpose of this thesis was to design and evaluate a proof of concept prototype which will apply data integrity while simultaneously recording videos through an Android device. Additionally, the prototype has an online verification platform which verifies the integrity of the recorded video. Blockchain is a technology with the inherent ability to store data in a chronological chained link of events: establishing an irrefutable database. Using cryptographic hashes together with blockchain: an Android device can generate cryptographic hashes of the data content from a video recording, and consequently transmit these hashes to a blockchain. The same video is deconstructed in the web client creating hashes that can subsequently be compared with the ones found in the blockchain. A resulting prototype system provides some of the desired functions. However, the prototype is limited in that it does not have the ability to sign the hashes produced. It has also been limited in that it does not employ HTTPS for communication, and the verification process needs to be optimized to make it usable for real applications.
Den ökande funktionaliteten hos dagens smarta mobiltelefoner ger användare möjligheten att direktsända video. Det förekommer en ökande oro när det kommer till videors äkthet och huruvida en video är original eller inte. Ur en konsumentsynpunkt är det nämligen väldigt svårt att bedöma huruvida det går att lita på videon, om det är originalvideon eller om det bara är så att videon är tagen ur sitt sammanhang. Detta examensarbete på Master-nivå kommer att undersöka en metod för att verifiera att direktsänd media är oförändrad. Huvudsyftet med arbetet var att ta fram och utvärdera en prototyp som kan säkerställa oföränderlighet inom direktsänd video samtidigt som videon spelas in på mobilenheten.  Prototypen har dessutom en webbaserad verifieringsplattform som kan verifiera och säkerställa huruvida videon (media) är oförändrad. Blockkedjeteknologin har den inbyggda egenskapen att kunna spara data i en kronologisk sammanlänkad ordning av händelser. Den skapar databas som inte kan ifrågasättas. Genom att använda kryptografisk hashning tillsammans med blockkedjetekniken kan en Android mobilenhet skapa kryptografiska hashar av videodata under tiden som videon spelas in och simultant skicka dessa hashar till en blockkedja. Samma video tas sedan isär i prototypens verifieringsfunktion. Verifieringsfunktionen skapar sedan hashar på samma sätt som i mobilenheten för att kunna jämföra dessa hashar mot de hashar som kan hämtas från blockkedjan. Prototypen är fungerande men saknar viss eftersträvad funktionalitet. Prototypen är begränsad på det sätt att mobilenheten inte kan signera de hashar som genereras. Den saknar även möjligheten att kommunicera över HTTPS protokollet samt att processen för att verifiera videomaterial är alldeles för långsam för att kunna användas i en verklig produkt.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhu, Feng. "Integrity-Based Kernel Malware Detection." FIU Digital Commons, 2014. http://digitalcommons.fiu.edu/etd/1572.

Full text
Abstract:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.
APA, Harvard, Vancouver, ISO, and other styles
20

Alchazidis, Nikolaos. "Data integrity in RFID systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion-image.exe/06Sep%5FAlchazidis.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S. in Systems Engineering)--Naval Postgraduate School, December 2007.
Thesis Advisor(s): Su, Weilian ; Ha, Tri T. "September 2006." Description based on title screen as viewed on March 12, 2008. Includes bibliographical references (p. 89-91). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
21

Adaiem, Miloud H. "Wellbore integrity in shale strata." Thesis, University of Aberdeen, 2010. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=165843.

Full text
Abstract:
Air drilling is limited to competent formations that are essentially dry. In these circumstances large shale fragments are often observed and it is believed that these large shale fragments are not from the cutting action of drill bit at the bottom of the hole but from caving in, or sloughing of the wellbore wall. This type of wellbore instability problems may occur when drilling formations have significant amounts of water-sensitive clays. Change in shale water content due to water dehydration induces additional rock stresses near the wellbore, which can destabilize the borehole. The primary cause of this problem may well relate to moisture movement. Because as air is often used as the drilling fluid, the water in exposed pores will start to evaporate into the borehole, so that the water content is reduced. This results in the development of different stress patterns and the shale fractures and falls into the wellbore. The work of this thesis simulates the shrinkage and the consequent cracking pattern. A model of a bonded granular material is created and its properties confirm it to be that of a brittle, isotropic elastic solid. Crack growth is simulated by sequentially removing the most highly stressed bond in turn. A number of different geometries are simulated and the influence of stochastic bond strength on the cracking pattern is investigated. The model results show that cracking pattern produced in the simulations is consistent with the ‘blocky’ debris sometimes seen during air drilling and so the recommendation is made that air used for drilling should be sufficiently humid to avoid the dehydration of the shale.
APA, Harvard, Vancouver, ISO, and other styles
22

Anderson, Byron Keith. "Thermal Integrity Profiling Instrumentation Development." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/2987.

Full text
Abstract:
Abstract This thesis has shown that the development of the instrumentation necessary to provide in-situ thermal imaging for the determination of homogeneity of concrete is theoretically sound. Drilled shafts are large diameter underground cast-in-place columns that necessarily rely on sound integrity to properly withstand imposed loadings. As a by-product of the most common construction techniques, the entire process is often completely blind whereby the excavation and concreting processes are conducted beneath the surface of the water table (or slurry level). This results in an inability to inspect the final product and in many cases allows anomalous inclusions (soil cave-ins, slurry pockets, etc) to go undetected especially when they are formed outside the steel reinforcing cage. In an effort to gain verification of the as-built, below ground structure, numerous non-destructive test methods have been devised. Each of these methods have merits and drawbacks with regards to the full extent of the tested concrete volume. To further this cause, a new methodology was developed that uses the energy from hydrating concrete to assess the presence or absence of an intact concrete. Therein, the temperature generated by the curing concrete can be measured and correlated to the probable dimensions of the drilled shaft. This thesis outlines the development of the instrumentation capable of making in-situ temperature measurement of drilled shafts to assure the homogeneity of concrete is acceptable. To that end, several configurations of instrumentation approach were tested on varying scales from small lab specimens to full-size field constructed drilled shafts. The bulk of this work was conducted several years before the completion of the thesis and has the benefit of noting later developments. For instance, this study was used to seed future research and led to subsequent FDOT and WSDOT (Washington State DOT) funded research for the express purpose of identifying capabilities of thermal testing in those states. Likewise, present day practice and use of the approach has also been documented.
APA, Harvard, Vancouver, ISO, and other styles
23

Hoel, Kristian. "Ultrasonic Evaluation of Well Integrity." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for petroleumsteknologi og anvendt geofysikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26364.

Full text
Abstract:
This thesis presents the acoustic theory behind current ultrasonic cement evaluation tools. The UltraSonic Imager tool's pulse echo technique and the new Isolation Scanner tool's pitch-catch leaky lamb wave measuring technique is explained. A laboratory experiment is conducted on a steel casing set-up (BeCaLoS) designed by SINTEF Petroleum Research to test, and highlight weaknesses of these measuring techniques. Both evaluation methods are successfully performed under four different conditions; with air, water, mud and cement behind the steel casing. Pulse-echo wave resonance attenuation measurements prove to be successful in evaluating the physical state of the material behind the casing. Interference from the third interface echo in the resonance waveform gives good annulus thickness information. Calculated cement impedance values indicate the presence of a microannuls.The pitch-catch plate wave attenuation measurements prove the evaluation method's weakness to thick casings. Lamb wave mode analysis is done and shows a possible mix of higher-order lamb modes present in the plate wave. Annulus material with high acoustic attenuation gave values that were difficult to interpret. The cement measurements showed low attenuation values caused by cement impedance above critical values; illustrating the importance of using both pulse-echo and pitch-catch to determine well integrity conditions. Third interface echoes were recorded successfully and gave a pretty accurate annulus thickness value. A question was raised to whether the amplitude of the initial flexural wave can be used to give information on annulus condition.The need for cement evaluation will greatly increase in the near future, and the limitations of current tools are a cause for concern and further research in the field of cement evaluation is encouraged.
APA, Harvard, Vancouver, ISO, and other styles
24

Ivan, Thomas R. "Comparison of data integrity models." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/43739.

Full text
Abstract:
Approved for public release; distribution is unlimited
Data integrity in computer based information systems is a concern because of the damage that can be done by unauthorized manipulation or modification of data. While a standard exists for data security, there currently is not an acceptable standard for integrity. There is a need for incorporation of a data integrity policy into the standard concerning data security in order to produce a complete protection policy. There are several existing models which address data integrity. The Biba, Goguen and Meseguer, and Clark/Wilson data integrity models each offer a definition of data integrity and introduce their own mechanisms for preserving integrity. Acceptance of one of these models as a standard for data integrity will create a complete protection policy which addresses both security and integrity.
APA, Harvard, Vancouver, ISO, and other styles
25

Das, Subrata Kumar. "Integrity constraints in deductive databases." Thesis, Heriot-Watt University, 1990. http://hdl.handle.net/10399/875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Muñoz-Garcia, Enrique. "Structural integrity of steel connections." Thesis, University of Sheffield, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.434520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hilton, Adrian J. "High integrity hardware-software codesign." Thesis, Open University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.402249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hamsund, Natalie. "Structural integrity of dental crowns." Thesis, KTH, Hållfasthetslära (Inst.), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-178844.

Full text
Abstract:
There is currently no standardized method for testing dentures made of dental ceramic materials. This creates problems for comparisons between studies concerning strength in materials and geometry. The geometry of the maxillary first premolar was used for the analysis. The modeled crown has two underlying layers, a thin cement layer closest to the crown that attaches the crown to dentin. Simplifications are made so that dentin geometry is modeled in CAD as a cuboid and the cement layer above follow its geometry. For the actual analysis, a FE-analysis has been made of different loading positions and areas to clearly show how important it is to be consistent in the selection of these. The load has been placed on two surfaces with 150 N each to resemble a real occlusal maximum load. The standard area used in other analysis was set to be 5.5 mm2 on each cusp. A comparative analysis has been made of various ceramic materials to see what impact it has on the cement layer strength. Similarly the cement material properties were modified to see how it affects the ceramic crowns strength. In real applications, one usually tries to achieve as thin cement layer as possible but here the analysis is of how much influence the cement layer thickness has on the overall crown strength. Two cylindrically shaped simplified models were created to see how much the anatomical geometry effects on the maximum stresses. One was modeled with a flat top and the other with an angled top. The load placement and the magnitude of its area turned out to be very important for the resulting maximum stresses. Surface area ranged from 0.07 - 26 mm2, and the resulting von Mises stresses for these ranged from 1120 to 34 MPa. Generally speaking, varying cement materials available on the market does not give huge impact on ceramic bearing stress. Panavia F 2.0 was found to be the strongest cementing layer that caused the highest failure load of the existing materials on the market. Super Bond B&D gave the lowest failure load. However, you could see that it was a bit more important to be careful for the crown material. The made up ceramic materials (Hypothetical Ceramic and Experimental Ceramic) proved to cause relatively close stresses for the cement to fail. It was also clear that a thicker cement layer reduces the expected failure load and the structure becomes weaker. The simplified models seemed to give a substantial exaggeration of strength. The expected failure load was nearly twice as large for these (slightly lower for the angled model) than for the anatomical model. When comparing with the test data from another study it proved that it does not match with the simulations. In the study different cementing materials had been tested and Super Bond B&D turned out to be the strongest material. With this in hand it can be said that a stable test setup with consistently identical geometries is necessary in order to evaluate these kinds of structures.
Idag finns ingen standardiserad provninvgsmetod för tandproteser gjorda i odontologiska keramikmaterial. Det skapar problem vid jämförelser mellan studier som rör hållfasthet med avseende på material och geometri. I det här examensarbetet har en geometri från övre käkbenets första premolar analyserats. Den modellerade kronan har två underliggande lager, ett tunt cementlager närmast kronan som fäster kronan till dentin. Förenklingar är gjorda så att dentinets geometri modellerats i CAD som ett rätblock och cementlagret ovan följer dess geometri. Vid själva analysen har man gjort FE-analys av olika lastpositioner och areor för att tydligt visa hur viktigt det är att vara konsekvent vid valet av dessa. Lasten har lagts på två ytor med 150 N på vardera kusp för att likna ett verkligt betts högsta lastkraft. Som standardfall att använda för andra analyser valdes en area på 5.5 mm2 på vardera kusp. En jämförande analys har gjorts av olika ceramiska material för att se vilken inverkan det har på cementlagrets hållfasthet. På samma sätt ändrades cement materialets egenskaper för att se hur det inverkar på kermaikkronans hållfasthet. I verkliga applikationer försöker man oftast nå ett så tunnt cementlager som möjligt, här har en analys gjorts av hur stor inverkan på hållfastheten som cementlagret har. Två cylindriskt formade förenklade modeller skapades för att se den anatomiska geometrins inverkan på spänningsbilden. En modellerades med platt topp och den andra med vinklad topp. Lastens placering och arean den är utbredd på visade sig vara väldigt viktigt för de resulterande maximala spänningarna. Ytans area varierade mellan 0.07 – 26 mm2 och resulterande von Mises spänningarna för dessa varierade 1120 – 34 MPa. Generellt sett hade olika cementmaterial som finns på marknaden inte jättestor inverkan på keramiklagrets spänningsbild. Panavia F 2.0 visade sig ändå vara det starkaste cementeringslagret som orsakade högst brottlast av de befintliga materialen på marknaden. Superbond B&D gav lägst resultat. Däremot kunde man se att det var lite viktigare att vara noggrann med kronans materialval. De påhittade keramikmaterialens (Hypothetical Ceramic och Experimental Ceramic) spänningar visade sig komma realtivt nära cementlagrets brottgräns. Det visade sig också tydligt att för ett tjockare cement lager minskar den förväntade brottlasten och strukturen blir svagare. De förenklade modellerna tycktes ge en kraftig överdrift i hållfasthet. Den förväntade brottlasten var nästan dubbelt så stor för dessa (något lägre för den vinklade modellen) än för den anatomiska modellen. Vid jämförelse med testdata från en annan studie visade de sig inte stämma överens med simuleringarna särskilt bra. Man hade testat olika cementeringsmaterial och där visade sig Superbond B&D vara det starkaste materialet. Utifrån det kan man säga att en stabil provningsuppställning med konsekvent identiska geometrier är nödvändigt för att kunna valuera sådana här strukturer.
APA, Harvard, Vancouver, ISO, and other styles
29

Теліженко, Людмила Вікторівна, Людмила Викторовна Телиженко, and Liudmyla Viktorivna Telizhenko. "Human integrity in ancient civilizations." Thesis, Lulu Press, 2018. http://essuir.sumdu.edu.ua/handle/123456789/70611.

Full text
Abstract:
На культурологічному матеріалі проводиться антропологічний аналіз становлення та розвитку цілісності людини древніх цивілізацій. У роботі цілісність древньої людини аналізується як нерозривна єдність людини і її умов, які разом перебувають у спільній для них субстанційній основі.
На культурологическом материале проводится антропологический анализ становления и развития целостности человека древних цивилизаций. В работе целостность древнего человека анализируется как неразрывное единство человека и его условий, которые вместе пребывают в общем для них субстанциональном основании.
An anthropological analysis of formation and development of human integrity in ancient civilizations is performed basing on culturological data. The paper analyzes the integrity of the ancient person as an inseverable unity of the person and their circumstances, that are in the common for both of them substantive basis.
APA, Harvard, Vancouver, ISO, and other styles
30

Giacotto, Luca. "Signal integrity at PCB level." Université Joseph Fourier (Grenoble), 2003. http://www.theses.fr/2003GRE10075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Carr, James Andrew. "Surface integrity through tomographic reconstruction." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/surface-integrity-through-tomographic-reconstruction(8ec24411-16c2-40a7-ab9d-4d22524c20b6).html.

Full text
Abstract:
The capability of high resolution, low energy backscattered electron microscopy has been extended to enable serial sectioning in the chamber of a conventional scanning electron microscope. For the first time, this technique, employed in a commercially available 3View facility, is used to reveal the structure of materials in 3D on the sub-micron scale. The distribution of pigments in protective organic coatings is quantified from the reconstructed 3View images and a correlation between spreadability and nearest neighbour distance of the pigment clusters is drawn. X-ray tomography is used to perform an ex-situ leaching experiment of a corrosion resistant organic coating. The depletion of inhibitor material after exposure to a corrosive environment is observed. The 3View is used to obtained additional images at higher resolution. The results indicate that inhibitor material is transported through pre-existing porous networks or through the porous networks that form following depletion of the material itself. Image based models of porous sintered silver films are produced from data obtained in the 3View facility which are used to validate the dependence of elasticity on the pore fraction.
APA, Harvard, Vancouver, ISO, and other styles
32

Kalkan, Gokhan. "Structural integrity of power transformers." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/9971.

Full text
Abstract:
The subject of this thesis is to study the mechanical integrity and performance of insulation materials used in power transformers under short circuit conditions. There are a number of methods to calculate short circuit forces in the literature. These methods were developed to determine the magnetic properties related to the short circuit condition and cannot be used in the open circuit condition due to the assumption of infinitely permeable core. To this end, a new solution strategy is introduced which is able to calculate magnetic properties of power transformers both in open circuit and in short circuit conditions. A solution was derived utilizing transform techniques and multiple connected permeable regions can now be solved. Mechanical failure modes of transformer winding are presented and new solution methods are introduced for some failure modes. Dynamic representation of the transformer winding is achieved by treating the winding turn by turn. Particular attention is given to stress calculations of Continuously Transposed Cable (CTC) and resin bonded CTC. Digital Image Correlation (DIC) technique maps the strain distribution on the test specimen and the strain distribution can be extracted at any cross section of interest. 3‐D DIC technique is used to determine the response of transformerboard material under tensional and bending loads and material properties are determined. It is also shown that the DIC method provides much more accurate results compared to strain gauges due to its manufacturing technique. DIC results are used to determine material properties related to both tensional and bending type loading conditions. Resin laminate wood is also compared to transformerboard. Viscoelastic properties of transformerboard are examined. Because a short circuit event is dynamic in nature, storage and loss modulus of transformerboard are determined as a function of temperature and frequency under cyclic loading conditions. Conventional creep test setups cannot be used for transformerboard. A test setup is designed to measure creep curves of transformerboard. The test setup measures the creep curves both in oil and in air and the displacements are recorded automatically. Tests are performed at a wide range of temperatures encountered in real service conditions of transformerboard material. The developed method can be introduced in PC codes to determine the magnetic properties related to the magnetic field. Also the method can be used to determine turn to turn or disc to disc mutual inductances of a transformer. Electromagnetic forces calculated with the introduced method are also more accurate than the methods developed earlier. Methods to calculate mechanical stresses acting on transformer components are also reviewed and new solution techniques for some failure modes are developed. Mechanical performance of insulation materials under tension and bending type loadings are measured and monitored using DIC technique. Finally, time dependent material properties of the transformerboard under constant and cyclic loading conditions are determined. Both analytical and experimental techniques are utilized to determine the material properties of the transformer components and their behaviour under different loading conditions. New solution techniques are developed and the material behaviour of the insulation materials under different loading conditions is determined. With the data obtained and solutions developed, mechanical stress calculations of the power transformer components can be made more accurately.
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Jia. "Molecular Regulation of Vascular Integrity." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/19618.

Full text
Abstract:
The integrity of blood vessels is critical to vascular homeostasis. The present study investigates how microRNAs (miRNA) and fluid shear stress (FSS) impact on vascular integrity. In the first part of this thesis, the roles of miR-23a and miR-23b were investigated. I have demonstrated they differently regulate vascular permeability and angiogenesis both in vitro and in vivo. These differences were caused by that miR-23a and miR-23b preferentially regulates junctional adhesion molecule C and zonula occludens protein 2, respectively. The difference in potency was attributed to differences in a single nucleotide outside the seed sequence. This study demonstrates a concept not hitherto appreciated, that miRNAs paralogues can have profoundly different effects on endothelial cell (EC) function due at least partially to selective effects on target proteins. In the second part of this thesis, the role of miR-27a was investigated in cerebral cavernous malformations (CCM). CCM lesions are characterised by disruptive EC junctions, with changes in the expression and location of vascular endothelial cadherin (VE-cadherin). I demonstrated that miR-27a was increased in EC islolated from the brains of the mice with CCM. BlockmiR CD5-2 specifically blocks the interaction of miR-27a with its target, VE-cadherin. CD5-2 rescued key CCM downstream signalling including RhoA activity, the inflammatory response and disruptive EC junctions in cultured EC. In CCM neonatal animal models, it markedly reduced CCM lesions in the hindbrain and retina. CCM lesions only develop in regions where blood velocity is low. The third part of this thesis was focussed on investigations into how FSS affects CCM downstream signalling in cultured EC. I demonstrated that key CCM downstream signalling pathways were deregulated under low FSS but not high FSS. Furthermore, CCM-silence-induced disruptive EC-EC junction, inflammatory response and increased RhoA activity were rescued by high FSS. These data establish that FSS acts as a key regulator for CCM gene function and may determine CCM lesion sites. Collectively, these studies demonstrated the novel role of miRNA and FSS in the regulation of vascular integrity. MiRNA-based drug targeting VE-cadherin may have therapeutical potential for the treatment of vascular malformations such as CCM.
APA, Harvard, Vancouver, ISO, and other styles
34

Robinson, Kate. "The Integrity of the Structure." Thesis, Mills College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1551689.

Full text
Abstract:

The Integrity of the Structure is an artists' book installation made of mono-printed and hand-worked masa paper framed in wood to create a series of screens (one with a video projection) that construct a space for the reader/audience to walk through. The text and video on the screens, as well as the reader/audience themselves moving through the space constitute the content of the book. This paper is a creative/critical hybrid reflection on the installation and its concepts.

APA, Harvard, Vancouver, ISO, and other styles
35

Vrtiska, Josef Michael. "Natural Law: Religion and Integrity." Thesis, The University of Arizona, 2010. http://hdl.handle.net/10150/146249.

Full text
Abstract:
This thesis examines the contemporary debates over the meaning of natural law. Kent Greenawalt and Ronald Dworkin weigh in on this debate and oppose the theory of natural law with some theories of law that they have developed themselves. Greenawalt argues that citizens in a liberal democracy are not to rely on their religious convictions but rather on publicly accessible reasons. The religious convictions that these citizens have are to be a secondary reliance but can be used in situations where publicly accessible reasons are absent such as abortion. Dworkin develops his theory of Integrity as Law which he explains as a "chain novel." Law is like a novel being written in which the judges must continually add chapters. The goal is integrity. Judges must treat the law that is in place as part of the novel that has already been partly written. It is a way to improve upon the existing laws and precedents. In order for a unifying acceptance of law and development of law, theories of law must be developed. Greenawalt and Dworkin each offer alternative approaches to natural law, and in this thesis, I compare how these theories apply to legal debates concerning abortion and pornography.
APA, Harvard, Vancouver, ISO, and other styles
36

Alpert, Caroline S. "Psychological integrity in Mansfield Park." Thesis, Boston University, 1995. https://hdl.handle.net/2144/27574.

Full text
Abstract:
Boston University. University Professors Program Senior theses.
PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
2031-01-02
APA, Harvard, Vancouver, ISO, and other styles
37

Zeng, Quanren. "Surface integrity evaluation and the effect of machining-induced surface integrity characteristics on part's performance." Thesis, University of Strathclyde, 2015. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=25912.

Full text
Abstract:
Surface integrity (SI) is the integrated surface behavior and condition of a material after being modified by a manufacturing process; it describes the influence of surface properties and characteristics upon material functional performance. As the leading-edge field of manufacturing research, SI finishing/machining and the consequent machining-induced complex combination of surface roughness, residual stress, work-hardening, macro and microstructure transformation, strongly affect the fatigue and stress behavior of machined parts. This kind of influence is particularly sensitive and pronounced in the difficult-to-machine materials, which are typically chosen for the most critical applications in the automobile, aerospace and nuclear industry. Thus, well-designed SI processing requirement and accurate SI evaluation model are essential to control and ensure the surface quality and functional performance for these key parts. In this thesis, an SI descriptive model for quantitative characterization and evaluation of surface integrity is proposed based on five principal SI characteristics. Considering the nature of surface integrity, a conceptual framework of an SI model for machined parts is established, in which the SI model is constructed based on the correlations between SI manufacturing processes, SI characteristics and final functionality. This model offers a theoretical basis and guideline for controlling SI characteristics and improving fatigue properties for machined parts. An empirical model for estimating the SI-characteristics-caused effective stress concentration factor (SCF) is established with fatigue life as the evaluating indicator. For a typical difficult-to-machine material, GH4169 superalloy, usually used in internal combustion engines, its grindability and the influence of processing parameters on the five principal SI characteristics are investigated in detail. The correlations between the processing parameters and the SI characteristics, between the processing parameters and the fatigue properties, and between the SI characteristics and the fatigue properties, are analyzed based on an orthogonally-designed grinding experiment and corresponding rotary bending fatigue testing for GH4169 samples within the selective range of grinding processing parameters. The feasibility and effectiveness of the proposed model for estimating the SI effective SCF are also validated by the experimental results, and this has actually offered an equivalent and convenient means for evaluation of SI and fatigue properties. Finally, the conclusions and contribution of the research are discussed, and potential future work to build on this research is identified.
APA, Harvard, Vancouver, ISO, and other styles
38

Ingerson, Marc-Charles. "Integrity Matters: Construction and Validation of an Instrument to Assess Ethical Integrity as an Attitudinal Phenomenon." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5491.

Full text
Abstract:
This research reviews theoretical and operational concepts of integrity. After this review, an alternative theoretical and operational definition of integrity is proposed. This alternative is one that conceives of integrity in terms of high ethical concern and positive ethical consistency among thoughts, feelings, and behavioral intentions, and which conceives of integrity as more attitude-like than trait- or state-like. Utilizing this alternative conceptualization of integrity, a new label was applied (i.e. ethical integrity) and a new psychometric instrument was developed (i.e. the Ethical Integrity Scale). This dissertation reports on the initial development of the Ethical Integrity Scale and two studies aimed at validation of this instrument. Strengths, limitations, and future directions of this approach to integrity research are then discussed.
APA, Harvard, Vancouver, ISO, and other styles
39

Ünal, Göknur, and Helen Hasselberg. "Barns rätt till integritet : En undersökning av barns rätt till integritet vid vårdnadshavarens internetpublikationer." Thesis, Karlstads universitet, Handelshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-47882.

Full text
Abstract:
Resonemanget kring personlig integritet är inget nytt förekommande, men det är däremot användningen av sociala medier som har blivit en naturlig del av människors vardag. Med det växande engagemanget i sociala medier växer ytterligare en debatt, vilket ansvar har en vårdnadshavare vid publicering av bilder och videoklipp på sitt barn, tillsammans med en text som kan anses kränkande? Enligt 6 kap. 11 § Föräldrabalken (1949:381) (FB) har vårdnadshavaren både en rätt och en skyldighet att fatta beslut som rör barnets personliga angelägenheter. Enligt 6 kap. 1 § FB är vårdnadshavaren också skyldig att tillgodose barnet skydd för dennes person och egenart, paragrafen förbjuder också vårdnadshavaren att utsätta barnet för kroppslig skada och kränkande behandling. Barnets rättigheter finns reglerat på två olika nivåer, både nationellt och internationellt. Varje människa oavsett ålder har rätt till privat- och familjeliv enligt artikel 8 Europakonventionen (EKMR). Artikeln omfattar olika perspektiv och rätten till integritet är en av dem. Enligt artikel 19 i barnkonventionen ska det allmänna förhindra att ett barn far illa i hemmet. En central fråga i debatten om barnets rättigheter är barnets kapacitet. Är barnet själv förmögen att kunna fatta välgrundade beslut och inneha självbestämmanderätt? Är barnet tillräckligt moget, intellektuellt och innehar tillräckligt med erfarenhet för att kunna göra rationella bedömningar? Det unga barnets troliga avsaknad av erfarenheter och mognad gör det svårt för barnet att utöva sina rättigheter och det är kanske på grund av detta som barnets rättigheter borde erkännas. Barnet är ibland inte kapabelt att tala för sig själv eller förstå sammanhanget av vad vårdnadshavaren publicerar. Med hänvisning till detta kan det ibland ifrågasättas om vårdnadshavaren spridning av information på sociala medier verkligen utgår från barnets bästa och barnets rätt till integritet. Uppsatsen syfte är att undersöka den problematik som kan uppstå när en vårdnadshavare lägger ut publikationer på barn i sociala medier som kan uppfattas som kränkande. Hur förhåller sig den svenska lagstiftningen, artiklarna i EKMR och barnkonventionen till detta? Kan barnets personliga integritet och rättigheter komma i konflikt med vårdnadshavarens intresse genom publiceringar på sociala medier? Genom undersökningen som gjorts i uppsatsen kan det konstateras att det finns en möjlighet för vårdnadshavaren att via internetpublikationer kränka barnets rätt till integritet. Det saknas i dagsläget direkta lagrum i svensk rätt för att skydda barnet i ovanstående hänseendet. Ett förtydligande i lagen där barn särskilt omnämns eller en inkorporering av barnkonventionen kan medföra ett starkare skydd för barns rätt till integritet på sociala medier.
The discussion concerning personal integrity is nothing new with regards to the use of social media, which has become a natural part of everyday life. With the growth of social media comes another debate, concerning what responsibility the guardian has when it comes to posting pictures and videos of their children, along with a text that can be considered offensive on social media? According to chapter 6. 11 § in the parental code the guardian has a right and an obligation to make decisions concerning the child's personal matters. According to chapter 6. § 1 in the parental code the guardian is also required to supply children with protection from their own actions. The article also prohibits the guardian to expose the child to bodily injury and offensive treatment. Children's rights are regulated at two different levels, both nationally and internationally. Every person, regardless of age has the right to privacy in family life according to article 8 of the European Convention (ECHR). The article covers different perspectives and the right to privacy is one of them. Article 19 in the UN Convention on the Rights of the Child requires the public to prevent that a child is being abused in the home environment. A central issue in the debate about child rights is the child's capacity. Is the child able to make well-grounded decisions and do they have a right to self-determination? Is the child mature enough, intellectual enough and hold enough experience to be able to make rational judgments? The young child's probable lack of experience and maturity makes it difficult for them to exercise their rights and it is perhaps because of this that childrens rights should be recognised. The child is sometimes not able to speak for himself or understand the context of what the guardian publishes on social media. With reference to this, the guardian’s dissemination of information on social media should be questioned - is it really based with the best interests of the child in mind and their right to privacy. The essay aims to examine the problems that can arise when a guardian publishes pictures of their children on social media that may be perceived as offensive. How does the Swedish legislation, the articles of the ECHR and the Convention deal with this scenario? Can the child's privacy and rights come into conflict with the guardian's interest in making publications on social media? The survey carried out in the essay states that there is a possibility for the guardian to violate the child's right to privacy through internet publications. Swedish law is missing sections of the law to protect the child of the regarding above. A clarification of the law where children are specifically referred to or a incorporation of the UN Convention on the Rights of the Child can result in greater protection for children's right to personal integrity on social media.
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Kil-Hoon. "Design of signal integrity enhancement circuits." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/37191.

Full text
Abstract:
This dissertation is aimed at examining signal integrity degradation factors and realizing signal integrity enhancement circuits for both wired and wireless communication systems. For wired communication systems, an optical coherent system employing an electrical equalization circuit is studied as a way of extending the transmission distance limited by optical fiber dispersion mechanisms. System simulation of the optical coherent receiver combined with the feed-forward equalizers is performed to determine the design specification of the equalizer circuit. The equalization circuit is designed and implemented in a 0.18 µm complementary metal-oxide semiconductor (CMOS) process and demonstrates the capability to extend the transmission reach of long-haul optical systems over single-mode fiber to 600 km. Additionally, for wireless applications, signal integrity issues found in a full-duplex wireless communication network are examined. Full-duplex wireless systems are subject to interference from their own transmitter leakage signals; thus, a transmitter leakage cancellation circuit is designed and implemented in a 0.18 µm CMOS technology. The proposed cancellation circuit is integrated with a low-noise amplifier and demonstrates over 20 dB of transmitter leakage signal suppression.
APA, Harvard, Vancouver, ISO, and other styles
41

Dalkhaa, Chantsalmaa. "Cap Rock Integrity In Co2 Storage." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612263/index.pdf.

Full text
Abstract:
One way to reduce the amount of CO2 in the atmosphere for the mitigation of climate change is to capture the CO2 and inject it into geological formations. The most important public concern about carbon capture and storage (CCS) is whether stored CO2 will leak into groundwater sources and finally into the atmosphere. To prevent the leakage, the possible leakage paths and the mechanisms triggering the paths must be examined and identified. It is known that the leakage paths can be due to CO2 - rock interaction and CO2 &ndash
well interaction. The objective of this research is to identify the geochemical reactions of the dissolved CO2 in the synthetic formation water with the rock minerals of the Sayindere cap rock by laboratory experiments. It is also aimed to model and simulate the experiments using ToughReact software. Sayindere formation is the cap rock of the Caylarbasi, a southeastern petroleum field in Turkey. The mineralogical investigation and fluid chemistry analysis of the experiments show that calcite was dissolved from the cap rock core as a result of CO2- water- rock interaction. Using the reactive transport code TOUGHREACT, the modeling of the dynamic experiment is performed. Calcite, the main primary mineral in the Sayindere is dissolved first and then re-precipitated during the simulation process. The decreases of 0.01 % in the porosity and 0.03% in permeability of the packed core of the Sayindere cap rock are observed in the simulation. The simulation was continued for 25 years without CO2 injection. However, the results of this simulation show that the porosity and permeability are increased by 0.001 % and 0.004 %, respectively due to the CO2-water-rock mineral interaction. This shows that the Sayindere cap rock integrity must be monitored in the field if application is planned.
APA, Harvard, Vancouver, ISO, and other styles
42

Woydt, Justus. "Der Integrity Pact von Transparency International." Universität Potsdam, 2005. http://opus.kobv.de/ubp/volltexte/2008/2214/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Singhal, Rohit. "Data integrity for on-chip interconnects." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5929.

Full text
Abstract:
With shrinking feature size and growing integration density in the Deep Sub- Micron (DSM) technologies, the global buses are fast becoming the "weakest-links" in VLSI design. They have large delays and are error-prone. Especially, in system-onchip (SoC) designs, where parallel interconnects run over large distances, they pose difficult research and design problems. This work presents an approach for evaluating the data carrying capacity of such wires. The method treats the delay and reliability in interconnects from an information theoretic perspective. The results point to an optimal frequency of operation for a given bus dimension for maximum data transfer rate. Moreover, this optimal frequency is higher than that achieved by present day designs which accommodate the worst case delays. This work also proposes several novel ways to approach this optimal data transfer rate in practical designs.From the analysis of signal propagation delay in long wires, it is seen that the signal delay distribution has a long tail, meaning that most signals arrive at the output much faster than the worst case delay. Using communication theory, these "good" signals arriving early can be used to predict/correct the "few" signals that arrive late. In addition to this correction based on prediction, the approaches use coding techniques to eliminate high delay cases to generate a higher transmission rate. The work also extends communication theoretic approaches to other areas of VLSI design. Parity groups are generated based on low output delay correlation to add redundancy in combinatorial circuits. This redundancy is used to increase the frequency of operation and/or reduce the energy consumption while improving the overall reliability of the circuit.
APA, Harvard, Vancouver, ISO, and other styles
44

Mallur, Vikram. "A Model for Managing Data Integrity." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20233.

Full text
Abstract:
Consistent, accurate and timely data are essential to the functioning of a modern organization. Managing the integrity of an organization’s data assets in a systematic manner is a challenging task in the face of continuous update, transformation and processing to support business operations. Classic approaches to constraint-based integrity focus on logical consistency within a database and reject any transaction that violates consistency, but leave unresolved how to fix or manage violations. More ad hoc approaches focus on the accuracy of the data and attempt to clean data assets after the fact, using queries to flag records with potential violations and using manual efforts to repair. Neither approach satisfactorily addresses the problem from an organizational point of view. In this thesis, we provide a conceptual model of constraint-based integrity management (CBIM) that flexibly combines both approaches in a systematic manner to provide improved integrity management. We perform a gap analysis that examines the criteria that are desirable for efficient management of data integrity. Our approach involves creating a Data Integrity Zone and an On Deck Zone in the database for separating the clean data from data that violates integrity constraints. We provide tool support for specifying constraints in a tabular form and generating triggers that flag violations of dependencies. We validate this by performing case studies on two systems used to manage healthcare data: PAL-IS and iMED-Learn. Our case studies show that using views to implement the zones does not cause any significant increase in the running time of a process.
APA, Harvard, Vancouver, ISO, and other styles
45

Barbour, Kim Jaime. "Constructing Artistic Integrity: An Exploratory Study." The University of Waikato, 2006. http://hdl.handle.net/10289/2474.

Full text
Abstract:
This thesis explores the concept of artistic integrity. A historical foundation for artistic integrity is laid to provide a context within which eight artists' constructions of the concept can be placed. To date, little research has been conducted to discover how artists feel about artistic integrity, despite the fact that the concept is used frequently both in the popular media, and in arts and creative industries policy and research. Secondary research into European Romanticism and the growth of the creative industries traces the complex development of artistic integrity through to contemporary New Zealand. Grounded by an internal-idealist ontology, a subjectivist epistemology, and an interpretive paradigmatic framework, qualitative, semi-structured interviews with eight artists were conducted to investigate how artistic integrity is perceived by those working within the New Zealand arts environment. The multifaceted nature of the history of artistic integrity is mirrored in the complexity of the responses from the artists involved in this research. Key themes to emerge from the analysis of the interview data were the personally constructed and contextual character of artistic integrity, its importance to the artists involved, and its social contestation. However, the opinions offered on these themes were often very different, and occasionally even contradictory. The artists' responses illuminate how differently artistic integrity could be interpreted throughout the creative community, and question the validity of current uses and definitions of the concept. Most importantly, this research provides an opportunity for artists to offer their understandings of artistic integrity, as surely it is artists who should be determining the validity and meaning of their integrity.
APA, Harvard, Vancouver, ISO, and other styles
46

Hurtado, Cahuao Jose Luis. "Airframe integrity based on Bayesian approach." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/4183.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.
Thesis research directed by: Mechanical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
47

Morrey, Charles B. III. "CIMStore: Content-aware integrity maintaining storage." Diss., Connect to online resource, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3219046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Fang, Ming. "Maintaining Integrity Constraints in Semantic Web." Digital Archive @ GSU, 2013. http://digitalarchive.gsu.edu/cs_diss/73.

Full text
Abstract:
As an expressive knowledge representation language for Semantic Web, Web Ontology Language (OWL) plays an important role in areas like science and commerce. The problem of maintaining integrity constraints arises because OWL employs the Open World Assumption (OWA) as well as the Non-Unique Name Assumption (NUNA). These assumptions are typically suitable for representing knowledge distributed across the Web, where the complete knowledge about a domain cannot be assumed, but make it challenging to use OWL itself for closed world integrity constraint validation. Integrity constraints (ICs) on ontologies have to be enforced; otherwise conflicting results would be derivable from the same knowledge base (KB). The current trends of incorporating ICs into OWL are based on its query language SPARQL, alternative semantics, or logic programming. These methods usually suffer from limited types of constraints they can handle, and/or inherited computational expensiveness. This dissertation presents a comprehensive and efficient approach to maintaining integrity constraints. The design enforces data consistency throughout the OWL life cycle, including the processes of OWL generation, maintenance, and interactions with other ontologies. For OWL generation, the Paraconsistent model is used to maintain integrity constraints during the relational database to OWL translation process. Then a new rule-based language with set extension is introduced as a platform to allow users to specify constraints, along with a demonstration of 18 commonly used constraints written in this language. In addition, a new constraint maintenance system, called Jena2Drools, is proposed and implemented, to show its effectiveness and efficiency. To further handle inconsistencies among multiple distributed ontologies, this work constructs a framework to break down global constraints into several sub-constraints for efficient parallel validation.
APA, Harvard, Vancouver, ISO, and other styles
49

Salawu, Olusegun Saheed. "Structural integrity assessment using vibration data." Thesis, University of Plymouth, 1994. http://hdl.handle.net/10026.1/2614.

Full text
Abstract:
Engineering structures need to be assessed as part of activities to ensure their continued serviceability. Global methods of assessment which also give an indication of local conditions are most attractive since they are cost effective and flexible. A suitable method with these attributes is vibration monitoring which involves relating dynamic properties, or changes in them, to the integrity of the assessed structure. The present study investigates the application of vibration testing to structural integrity assessment of civil engineering structures. A survey of existing methods of damage detection, location and quantification in structures using vibration testing was conducted. Evaluation of the performance of some of the more promising methods was conducted using both simulated and experimental data. The results revealed that the damage identification process could be enhanced if appropriate modes are used. To this end, a new function, called Modal Sensitivity Values, has been proposed for identifying damage sensitive modes to be included in damage detection and location methods. It was also found that some success could be achieved if system identification and model updating procedures are applied to the problem of damage detection in structures. The literature survey revealed that most of the available methods are not applicable to general structural systems and are often limited by the damage model assumed. A new method, called Integrity Index Damage Location method, of assessing structural integrity using vibration data has also been proposed. The method is applicable to any structure and any damage type that affects the integrity/stiffness of the structure. Performance evaluation of the method using both numerical and experimental data is presented. Full-scale forced vibration tests were conducted before and after repairs on two reinforced concrete highway bridges. The vibrator used during the tests was developed during the research project and details of its development and operation are given in the thesis. As a background to the tests, a review of full-scale dynamic testing of bridge structures was conducted. Results from the tests were used to investigate the effectiveness of forced vibration testing as an integrity monitoring tool. It was found that the repair works caused slight (less than 5%) changes in the natural frequencies while there was no definite trend in the changes to the modal damping ratios. Comparison of frequency response functions and mode shapes, using modal analysis procedures, was found to give an indication of the presence and location of the repairs. The integrity assessment method proposed was also able to identify some of the affected parts of the structures. Results from the full-scale tests were also compared with predictions from finite element analysis. Good correlation was obtained between the measured and calculated natural frequencies and mode shapes, thus enabling validation of the analytical models within limits of the model assumptions and experimental errors. The results demonstrate the importance of accurate representation of boundary conditions. They (results) also showed that the vertical stiffness of new bearings installed on one of the bridges is not as high as was assumed in the design.
APA, Harvard, Vancouver, ISO, and other styles
50

Cantrill, John. "Structural integrity of reinforced thermoplastic pipes." Thesis, University of Newcastle Upon Tyne, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.250104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography