To see the other types of publications on this topic, follow the link: ISCS.

Dissertations / Theses on the topic 'ISCS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'ISCS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nuth, Manunya. "Mechanism of Fe-S cluster biosynthesis the [2Fe-2S] IscU as a model scaffold /." Connect to this title online, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1092856116.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2004.
Document formatted into pages. Includes bibliographical references. Abstract available online via OhioLINK's ETD Center; full text release delayed at author's request until 2005 Aug. 18.
APA, Harvard, Vancouver, ISO, and other styles
2

Tantalean, Vásquez Juan Carlos. "La cisteina desulfurasa (IscS) de Geobacillus stearothermophilus V confiere a Escherichia Cole resistencia a la telurito de potasio." Tesis, Universidad de Chile, 2003. http://www.repositorio.uchile.cl/handle/2250/106710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bricault, Laurent. "Isis myrionyme." Paris 4, 1994. http://www.theses.fr/1994PA040152.

Full text
Abstract:
Le culte de la deesse egyptienne isis a connu une expansion considerable dans le monde greco-romain des la fin du iveme s. Av. J. -c. Les grecs et les latins ont developpe ou cree un riche vocabulaire pour qualifier les pouvoirs et fonction s de la deesse celui-ci s'inspire a la fois de la tradition grecque et de la tradition egyptienne. Un txte du ier s. Pc , publie comme p. Oxy. Xi 1380 en 1915, est une longue litanie a isis, ecrite en grec mais s'inspirant d'un lexique hymnologique egyptien. Ce txte se presente comme une longue liste geographique des centres du culte isiaque, suivie pra une invocation, puis un hymne a la deesse. Ce texte long de 298 lignes sur 12 colonnes est malheureusement incomplet au debut et sans doute a la fin
The cult of the egyptian goddess isis went to europe since the beginning of the ivth century bc. Greeks and latins developped a rich vocabulary to qualify the powers and attributes of the goddess, inspired by both hellenic and egyptian traditions. A text from the beginning of the irst century ad, known as p. Oxy. Xi 1980, published in 1915, is long isis litany, written in greek but inspired by the egyptian hymns from philae and assuan. This text could be divided in three parts; first, a long geographical list of the isis cult centers, second an invocatio n to the goddess and third a long hymn. 298 lines long, in twelve comumns, it's unfortunately incomplete at the beginning, and, probably, at the end too
APA, Harvard, Vancouver, ISO, and other styles
4

Przybyla-Toscano, Jonathan. "Étude des protéines NFU, ISCA et FDX, impliquées dans la maturation des centres fer-soufre dans les mitochondries d’Arabidopsis thaliana." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0127.

Full text
Abstract:
Chez les plantes, les protéines à centre fer-soufre (Fe-S) sont impliquées dans de nombreux processus cellulaires (e.g. photosynthèse, respiration). La maturation de ces protéines nécessite la synthèse de novo des centres Fe-S à l’aide de machineries d’assemblage spécifiques. Les plantes possèdent trois machineries d’assemblage nommées SUF, ISC et CIA, dédiées à la maturation des protéines plastidiales, mitochondriales et nucléaires ou cytosoliques, respectivement. Lors de la maturation des protéines mitochondriales, un centre [2Fe-2S] est initialement assemblé sur la protéine d’échafaudage ISU puis transféré vers les apoprotéines cibles à l’aide de chaperons et de diverses protéines de transfert. Si ces étapes semblent suffisantes pour la maturation de protéines incorporant des centres [2Fe-2S], un couplage réductif de deux centres [2Fe-2S] est nécessaire pour la maturation des protéines de type [4Fe-4S]. Cette conversion nécessite des protéines de transfert et un donneur d’électrons, potentiellement la même ferrédoxine que celle qui agit déjà lors des étapes précoces pour la réduction du soufre. En combinant des approches moléculaires, biochimiques et génétiques, l’implication des protéines de transfert NFU et ISCA et des ferrédoxines mitochondriales (mFDX) dans les étapes tardives de transfert et de conversion a été explorée au cours de cette thèse chez la plante modèle Arabidopsis thaliana. Des expériences de complémentation en levure ont démontré que les protéines NFU et ISCA de plantes peuvent assurer les mêmes fonctions que leurs orthologues respectifs, suggérant que ces étapes tardives ont été conservées. Cependant, contrairement à la levure, l’analyse de lignées n’exprimant pas les deux protéines NFU indiquent qu’elles sont essentielles pour le développement de l’embryon. Au niveau moléculaire, les analyses effectuées à l’aide d’approches in vivo et/ou in vitro ont permis d’identifier une interaction entre ISCA1a ou ISCA1b et ISCA2, NFU4 et NFU5 mais aucune interaction avec les deux mFDX dont le rôle dans les dernières étapes d’assemblage des centres Fe-S reste donc incertain. La formation d’holo-hétérocomplexes entre ISCA1 et ISCA2 a été confirmée par co-expression chez E. coli et purification des protéines recombinantes. Globalement, en associant la littérature à propos de la machinerie ISC et les résultats obtenus, le modèle qui ressort est que des hétérocomplexes ISCA1/2 agiraient immédiatement en amont des protéines NFU qui permettraient a minima la maturation des centres [4Fe-4S] de la lipoate synthase. Ce seul partenaire pourrait expliquer en grande partie la létalité d’un mutant nfu4 x nfu5 car l’activité de plusieurs protéines centrales pour le métabolisme mitochondrial dépend de l’acide lipoïque
In plants, iron-sulfur (Fe-S) proteins are involved in crucial processes such as photosynthesis and respiration. The maturation of these proteins requires the de novo synthesis of their Fe-S clusters through dedicated assembly machineries. Plants have three Fe-S cluster assembly machineries, namely SUF, ISC and CIA, devoted to the maturation of plastidial, mitochondrial and nuclear or cytosolic proteins, respectively. During the mitochondrial Fe-S protein maturation, a [2Fe-2S] cluster is first assembled on the ISU scaffold protein then transferred to target proteins with the help of chaperones and various transfer proteins. If these steps are sufficient for the maturation of [2Fe-2S] proteins, a reductive coupling process of two [2Fe-2S] clusters is required for the maturation of [4Fe-4S] proteins. This conversion needs transfer proteins and an electrons donor, potentially the same ferredoxin which acts during the first step of the Fe-S cluster biogenesis for sulfur reduction. By combining molecular, biochemical and genetic approaches, the involvement of NFU and ISCA transfer protein and mitochondrial ferredoxin (mFDX) in the late transfer and conversion steps has been explored during this PhD project by using the Arabidopsis thaliana plant model. Yeast complementation experiments have demonstrated that plant NFU and ISCA proteins have functions similar to their respective orthologs, suggesting that these late steps are conserved. However, unlike yeast, the characterization of nfu mutant lines indicates that both proteins are essential for early embryonic development. At the molecular level, in vivo and in vitro approaches have shown an interaction between ISCA1a or ISCA1b and ISCA2, NFU4 and NFU5 but no interaction with the two mFDX whose participation in the late steps remains uncertain. The formation of ISCA1-ISCA2 holo-heterocomplexes has been confirmed by co-expression in E. coli and purification of recombinant proteins. Overall, the literature and results obtained here highlight a model where ISCA1/2 heterocomplexes would act immediately downstream of NFU proteins which would a minima allow [4Fe-4S] cluster maturation of the lipoate synthase. This sole partner could primarily explain the lethality of a nfu4 x nfu5 double mutant because the activity of several proteins central for the mitochondrial metabolism depends on lipoic acid
APA, Harvard, Vancouver, ISO, and other styles
5

Hadra, Dana. "ISIS: Past, Present and Future?: Pro-ISIS Media and State Formation." Thesis, Boston College, 2015. http://hdl.handle.net/2345/bc-ir:104188.

Full text
Abstract:
Thesis advisor: David DiPasquale
This paper examines the role that media plays in the state building strategy of the Islamic State of Iraq and al-Sham (ISIS). Research findings suggest that ISIS is not merely a disorderly group of militants, but is a sophisticated organization driven by powerful religious and political ideas. The goal of my research is to tap into the intellectual face of ISIS, to uncover ISIS's own arguments and state building aspirations. In order to gain a more comprehensive understanding of ISIS, this paper examines how ISIS spreads its message and analyzes the significance of that message as it relates to state formation
Thesis (BA) — Boston College, 2015
Submitted to: Boston College. College of Arts and Sciences
Discipline: Arts and Sciences Honors Program
Discipline: Islamic Civilization and Societies
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Nadella Navin. "Evaluation of ISDS software." Master's thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-01262010-020122/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kameníček, Lukáš. "Návrh systém managementu ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-229425.

Full text
Abstract:
This diploma thesis analyses the current state of information security management in an organization. In the theoretical part of the thesis general concepts are described as well as the relations between risk management and information security, applicable laws and standards. Further, the theoretical part deals with the risk analysis and risk management, strategies, standard procedures and methods applied in this field. In the practical part a methodology is suggested for information risk analysis in a particular organization and appropriate measures are selected.
APA, Harvard, Vancouver, ISO, and other styles
8

Pospíchal, Jindřich. "Zavedení ISMS v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241309.

Full text
Abstract:
The master’s thesis is aimed at proposing an implementation of information security management system in a company. It covers basic theoretical background and concepts of information system security and describes standards of ČSN ISO/IEC 27000. Specific provisioning of ISMS is then proposed based on the theoretical background and analysis of current state.
APA, Harvard, Vancouver, ISO, and other styles
9

Havlík, Michal. "Návrh průmyslového řešení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318610.

Full text
Abstract:
Thesis deals with industrial solutions of ISMS mainly network infrastructure. First introduction into theoretical background of the thesis. Further analysis of the current situation in the company and its evaluation. Consequently, the design of solution done to meet the standards of ISO / IEC 27000.
APA, Harvard, Vancouver, ISO, and other styles
10

Pawlik, Jan. "Zavedení ISMS v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224837.

Full text
Abstract:
This master thesis deals with the implementation of the information security management system according to the standard ISO/IEC 27 001 in the environment of a small company. In the first part, it focuses on the theoretical background of the information security. The second part deals with the analysis of the company and concept of a company's measures to increase the security of information within the selected company.
APA, Harvard, Vancouver, ISO, and other styles
11

Cull, Dominic. "ISPs IN THE MIDDLE." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Řehořek, Tomáš. "Dopady ISDS na uživatele." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-198252.

Full text
Abstract:
This thesis work is to do with the Information system of data boxes (ISDS) which is introduced from legislation's and user's point of view. Because the introduction of this system has influenced hundreds of thousands of subjects the main target of this thesis is to find out about the impact of the ISDS on users with the help of the analysis method. In this work firstly the data provided by the Ministry of Internal Affairs are examined and interpreted, secondly the results of the poll conducted by the author and then a cost-benefit analysis of the system from the users' point of view is carried out. The results of the work show that the ISDS was at the end of the examined period (2009 -- 2013) beneficial for its users and the total economic benefit for the respective period is 3.6 billion Czech crowns. This means that every crown spent on the operation of the system by the Ministry of Internal Affairs represents savings of 2 Czech crowns. The author of this work has come to the conclusion that the system is from a legislative, technological and economic point of view very well created. The author recommends to the system administrator its further development and also recommends to use its potential among thousands of OSVČ (the self-employed).
APA, Harvard, Vancouver, ISO, and other styles
13

Asp, Sandin Agnes. "A simplified ISMS : Investigating how an ISMS for a smaller organization can be implemented." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20238.

Full text
Abstract:
Over the past year, cyber threats have been growing tremendously, which has led to an essential need to strengthen the organization's security. One way of strengthening security is to implement an information security management system (ISMS). Although an ISMS will help improve the information security work within the business, organizations struggle with its implementation, and significantly smaller organizations. That results in smaller organization's information being potentially less protected.This thesis investigates how an ISMS based on MSB can be simplified to make it suitable for a small organization to implement. This thesis aims to open for further research about how it can be simplified and if it has a value of doing it.The study is based on a qualitative approach where semi-structured interviews with experts were conducted. This thesis concludes that it is possible to simplify an ISMS based on MSB for a small organization by removing external analysis, information classification, information classification model, continuity management for information assets, and incident management. In addition, the study provides tips on what a small organization should think about before and during implementation.
APA, Harvard, Vancouver, ISO, and other styles
14

Tawaifi, Alexandra. "ICC and ISIS : An Examination of the Rome Statute Regarding Individuals Operating under ISIS." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-61207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ulfskans, Niklas, and Christian Thorell. "ISPS : Vakten i Göteborgs oljehamn." Thesis, University of Kalmar, Kalmar Maritime Academy, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-241.

Full text
Abstract:

Med anledning av ISPS- kodens inträdande 2004 och personliga erfarenheter från fartyg och skyddsvaktsarbete har vi valt att fördjupa oss i ämnet portvaktens arbetsuppgifter. Vad vi har observerat sedan tidigare är att den allmänna uppfattningen bland ombordanställda är att portvakten är i vägen och det tar lång tid att komma till sin arbetsplats på fartyget.

Detta är en deskriptiv uppsats, där vi gjort en kvalitativ studie som bygger på intervju med vaktpersonal. Intervjun är sedan jämförd med de regler som finns för vakten i porten. Vi har avgränsat oss till att undersöka Göteborgs hamn, då denna var först i Europa att införa ISPS. Vi har intervjuat Magnus Rosenqvist, gruppchef på G4S i Göteborgs hamn. Detta har vi sedan jämfört med vad sjöbefälsstudenter på Högskolan i Kalmar har för erfarenheter och uppfattningar.

Vakten ansvarar för tillträdet till hamnområdet. Anledningen varför kontrollerna är så höga är för att upprätthålla hamnskyddet, inte fartygsskyddet. Vakten har samma ISPS- utbildning som resterande hamnpersonal, den utbildning en väktare måste inneha, men i Göteborgs hamn måste man dessutom vara skyddsvakt.


In connection with the ISPS- code's arising in 2004 and personal experiences from ships and security guarding, we have selected to deepen ourselves in the matter the gatekeeper’s duties. We have observed already that the general view among the vessel’s apployes, that the gatekeeper is in the way and it takes a long time to get to the workplace onboard the ship.

This is a descriptive essay, where we have done a qualitative study that builds on interview with local security personnel. The interview is then compared with the rules that are for the security guard in the gate. We have delimited ourselves to examining Gothenburg's port, because this is the first port in Europe to introduce the ISPS- code. We have interviewed Magnus Rosenqvist, squad commander at G4S in Gothenburg’s port. This result is then compared with the experiences and thoughts of students at Kalmar Maritime Academy.

The security guards are responsible for the access to the port area. The reason why the controls are so high is in order to maintain the port’s protection, not the ship’s protection. The security guard has the same ISPS education that all port personnel have, the education a general security guard must hold, but in Gothenburg’s port a security guard also must have a “skyddsvakt’s” education.

APA, Harvard, Vancouver, ISO, and other styles
16

Fine, Zoe D. "Becoming a Woman of ISIS." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7619.

Full text
Abstract:
In this study, I examine how terrorism is produced and consumed in communication. Using discourse analysis, I investigate how terrorism is constituted in the accounts of four women described in online news reports as having joined, or almost joined the so-called Islamic State (IS): “Alex,” constructed as having been lonely and flirted with IS; “Khadija,” presented as a schoolteacher turned member of IS’s all-women’s brigade; Laura, described as a woman whose partner abandoned her, who met a man online, and who brought her son with her to join IS; and Tareena, referred to as a health worker who brought her child with her to join IS. My analyses address how each interview can add to our insights about becoming a woman of IS. I make four arguments. First, terrorism is mobilized through interaction. Second, the double bind is a dynamic uniquely applicable to women because becoming a member of IS can be examined as an act of gender resistance. Third, accounts of becoming a woman of IS work as rhetoric designed to prevent other vulnerable people from being recruited. Fourth, terrorism is mobilized through narrative storytelling, especially through the use of paralinguistic features in the building of accounts. By researching terrorism as communication, and focusing in particular on four women’s interviews of their recruitment experiences, this dissertation contributes to new, applicable, and actionable interventions designed to counter and prevent the violence of terrorism, as well as to research about women, terrorism, and communication.
APA, Harvard, Vancouver, ISO, and other styles
17

Dejmek, Martin. "Zavedení ISMS v obchodní společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224221.

Full text
Abstract:
This master thesis deals with the implementation of information security management system in the company. It summarizes the theoretical background in this field and uses it to analyze the current state of information security, as well as analysis and risk management and not least the actual implementation of ISMS in the particular company. This work also contains three groups of measures that reduce the impact of identified risks and which also implements an essential parts of ISMS.
APA, Harvard, Vancouver, ISO, and other styles
18

Palarczyk, Vít. "Zavedení ISMS v malém podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224894.

Full text
Abstract:
This master's thesis is focused on the design of the implementation of information security management system (ISMS) into a specific business. In the theoretical part, it provides basic concepts and detailed description of ISMS. There is also described the analysis of a current information security state of the company. In the practical part, it provides a risk analysis and selection of measures to minimize found risks. In the final part is designed a process and a schedule of an implementation of the selected measures.
APA, Harvard, Vancouver, ISO, and other styles
19

Trunkát, Jan. "Návrh zavedení ISMS ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-225000.

Full text
Abstract:
The master´s thesis is aimed at Proposal for the information security management system implementation in the company. It introduces with basic concepts of information security and provides general procedures for information security management system. As part of the work was carried out a risk analysis company and proposed measures to reduce risk. Work is mainly drawn from the series of standards ISO/IEC 27000.
APA, Harvard, Vancouver, ISO, and other styles
20

Svoboda, Milan. "Zavedení ISMS v malém podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241114.

Full text
Abstract:
The diploma thesis focuses on proposing an information security management system (ISMS) in a small company. This publication includes theoretical facts, which are needed to understand and design a ISMS. The design proposal of the ISMS itself is based on an analysis of the current status of the company's information security. The proposed security measures are based on the actual state of information security within the company, and on recommendations stemming from the ISO/IEC 27000 standard.
APA, Harvard, Vancouver, ISO, and other styles
21

Kuchařík, Lukáš. "Návrh ISMS v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241472.

Full text
Abstract:
The master’s thesis is aimed at the proposal of network infrastructure and introduction of the managerial system for the safety of information in the industrial environment. At the beginning the work is focused on theoretical knowledge concerning the safety of information wherein it describes basic concepts and common procedures of the managerial system of the safety of information. Further, the work deals with risk analysis in which the measures for reduction in hazard are suggested. The proposal for a new network infrastructure is finally carried out. The work draws the information from CSN standards ISO/IEC, series 27000.
APA, Harvard, Vancouver, ISO, and other styles
22

Dokoupil, Ondřej. "Návrh metodiky pro zavedení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-254270.

Full text
Abstract:
This master’s thesis deals with the design of methodology for implementation of ISMS (Information Security Management System). The theoretical part describes the basic principles and procedures for processing of this domain, including normative and legal - legislative aspects. The next section is an analysis of the current state of the organization. On its basis the practical part is drafted, including an economic evaluation of the project and possible benefits of implementation.
APA, Harvard, Vancouver, ISO, and other styles
23

Hensl, Marek. "Zavedení ISMS pro základní školu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318615.

Full text
Abstract:
This diploma’s thesis deals with information security management system on elementary school. This work is based on long time experience with chosen school and on communication with representatives of elementary school. In this thesis are teoretical basics, specific state, shortcomings and proposed or recommended solutions.
APA, Harvard, Vancouver, ISO, and other styles
24

Lopes, Bruno Cardoso 1985. "Design and evaluation of compact ISAs." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275494.

Full text
Abstract:
Orientador: Rodolfo Jardim de Azevedo
Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-24T12:29:38Z (GMT). No. of bitstreams: 1 Lopes_BrunoCardoso_D.pdf: 3162388 bytes, checksum: 3a46d0fb9404a69bf87489922e4743b0 (MD5) Previous issue date: 2014
Resumo: Sistemas embarcados modernos são compostos de SoC heterogêneos, variando entre processadores de baixo e alto custo. Apesar de processadores RISC serem o padrão para estes dispositivos, a situação mudou recentemente: fabricantes estão construindo sistemas embarcados utilizando processadores RISC - ARM e MIPS - e CISC (x86). A adição de novas funcionalidades em software embarcados requer maior utilização da memória, um recurso caro e escasso em SoCs. Assim, o tamanho de código executável é crítico, porque afeta diretamente o número de misses na cache de instruções. Processadores CISC costumavam possuir maior densidade de código do que processadores RISC, uma vez que a codificação de instruções com tamanho variável beneficia as instruções mais usadas, os programas são menores. No entanto, com a adição de novas extensões e instruções mais longas, a densidade do CISC em aplicativos recentes tornou-se similar ao RISC. Nesta tese de doutorado, investigamos a compressibilidade de processadores RISC e CISC; SPARC e x86. Nós propomos uma extensão de 16-bits para o processador SPARC, o SPARC16. Apresentamos também, a primeira metodologia para gerar ISAs de 16-bits e avaliamos a compressão atingida em comparação com outras extensões de 16-bits. Programas do SPARC16 podem atingir taxas de compressão melhores do que outros ISAs, atingindo taxas de até 67%. O SPARC16 também reduz taxas de cache miss em até 9%, podendo usar caches menores do que processadores SPARC mas atingindo o mesmo desempenho; a redução pode chegar à um fator de 16. Estudamos também como novas extensões constantemente introduzem novas funcionalidades para o x86, levando ao inchaço do ISA - com o total de 1300 instruções em 2013. Alem disso, 57 instruções se tornam inutilizadas entre 1995 e 2012. Resolvemos este problema propondo um mecanismo de reciclagem de opcodes utilizando emulação de instruções legadas, sem quebrar compatibilidade com softwares antigos. Incluímos um estudo de caso onde instruções x86 da extensão AVX são recodificadas usando codificações menores, oriundas de instruções inutilizadas, atingindo até 14% de redução no tamanho de código e 53% de diminuição do número de cache misses. Os resultados finais mostram que usando nossa técnica, até 40% das instruções do x86 podem ser removidas com menos de 5% de perda de desempenho
Abstract: Modern embedded devices are composed of heterogeneous SoC systems ranging from low to high-end processor chips. Although RISC has been the traditional processor for these devices, the situation changed recently; manufacturers are building embedded systems using both RISC - ARM and MIPS - and CISC processors (x86). New functionalities in embedded software require more memory space, an expensive and rare resource in SoCs. Hence, executable code size is critical since performance is directly affected by instruction cache misses. CISC processors used to have a higher code density than RISC since variable length encoding benefits most used instructions, yielding smaller programs. However, with the addition of new extensions and longer instructions, CISC density in recent applications became similar to RISC. In this thesis, we investigate compressibility of RISC and CISC processors, namely SPARC and x86. We propose a 16-bit extension to the SPARC processor, the SPARC16. Additionally, we provide the first methodology for generating 16-bit ISAs and evaluate compression among different 16-bit extensions. SPARC16 programs can achieve better compression ratios than other ISAs, attaining results as low as 67%. SPARC16 also reduces cache miss rates up to 9%, requiring smaller caches than SPARC processors to achieve the same performance; a cache size reduction that can reach a factor of 16. Furthermore, we study how new extensions are constantly introducing new functionalities to x86, leading to the ISA bloat at the cost a complex microprocessor front-end design, area and energy consumption - the x86 ISA reached over 1300 different instructions in 2013. Moreover, analyzed x86 code from 5 Windows versions and 7 Linux distributions in the range from 1995 to 2012 shows that up to 57 instructions get unused with time. To solve this problem, we propose a mechanism to recycle instruction opcodes through legacy instruction emulation without breaking backward software compatibility. We present a case study of the AVX x86 SIMD instructions with shorter instruction encodings from other unused instructions to yield up to 14% code size reduction and 53% instruction cache miss reduction in SPEC CPU2006 floating-point programs. Finally, our results show that up to 40% of the x86 instructions can be removed with less than 5% of overhead through our technique without breaking any legacy code
Doutorado
Ciência da Computação
Doutor em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
25

Štukhejl, Kamil. "Návrh zavedení ISMS ve veřejné správě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399673.

Full text
Abstract:
This diploma thesis focuses on the implementation of information security management system in the public administration based on ISO/IEC 27000 series of standards. The thesis contains theoretical background, introduction of the organization, risk analysis and a proposal of appropriate measures for minimization of these identified risks. In the end, an implementation plan is proposed including an economic evaluation.
APA, Harvard, Vancouver, ISO, and other styles
26

Lukošienė, Kristina. "Eseistinis mąstymas Cz. Miłosz‘o romane "Isos slėnis"." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080804_110757-73347.

Full text
Abstract:
Magistro darbe nagrinėjama esė ir autobiografinio romano sandūra Miłosz‘o romane Isos slėnis. Darbe keliamas tikslas apžvelgti autobiografinio romano bei eseistikos teorinius pagrindus ir nustatyti jų sąlyčio taškus bei skirtis, išskirti romano Isos slėnis žanrines dominantes, įvardinti pagrindinius Miłosz‘o eseistikos bei autobiografinio romano skirtumus bei panašumus ir jų raišką Isos slėnyje, nustatyti ir pailiustruoti pavyzdžiais, kaip kinta konkrečios struktūros skirtinguose žanrų lygmenyse. Šio tikslo siekiama analizuojant Miłosz‘o romaną Isos slėnis bei šio autoriaus eseistinius kūrinius Gimtoji Europa, Tėvynės ieškojimas ir Pakelės šunytis. Įvairių esė bei autobiografinio žanro teorijų ir formuluočių analizė bei istorinė apžvalga padėjo išskirti esminius šių žanrų sąlyčio taškus: autoriaus poziciją, tikrovės ir fikcijos santykį pasakojime, atminties fenomeno reikšmę, mitinio pasakojimo vaidmenį, filosofinius motyvus, kintantį laiko modelį bei daugialinijinį pasakojimą. Įsigilinus į šių kategorijų raišką romane, paaiškėjo, kad Isos slėnyje vyrauja esė žanrui būdingos ypatybės: subjektyvumas (asmenybiškumas), realūs faktai, pasakojimas iš dabarties perspektyvos, individualizuotas mitinis pasakojimas, kuriama asmeninė filosofija, fragmentiškas, trūkčiojantis, aliuzijomis paremtas pasakojimas. Laiko modelis varijuoja. Aptarus minėtąsias kategorijas, daroma išvada, kad Miłosz‘o romane dominuoja eseistinis mąstymas, todėl siūloma Isos slėnį vadinti ne autobiografiniu, bet... [toliau žr. visą tekstą]
Analysis of the essayistic thinking in the novel by Miłosz The Issa Valley helps to understand new situation in modern day culture. In this Master’s paper, we analyze similarities and differences between autobiographical novel and essay. The goal of this Master’s paper is to overlook theories of autobiography and essay genres, to name the differences and similarities of Miłosz‘s novel The Issa Valley and native essay texts, such like Native Realm (Gimtoji Europa), In search of a Homeland (Tėvynės ieškojimas) and Roadside dog (Pakelės šunytis). The base of an essay is very important. There is no rules to tell, what is a pure essayistic text (sometimes called perfect essay), and what is not. Essayistic and essayistic thinking are not identical concepts. The essayistic thinking is identifiable by value judgment, when the process of thinking is most important. It is connected with special quality of thinking. The autobiographical novel is based on the author’s true story of his life. The writer uses fictional details and turns his life to fiction. Names and locations are usually changed, but and actions are more dramatic, but the author stays recognizable. The Master’s paper consists of three parts. In the first part we give a brief overview of autobiography and essay theory and development. The second and the third parts are the survey of the novel The Issa Valley. In this novel we find essayistic thinking. According to that survey, we draw a conclusion, that Miłosz‘s novel... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
27

Cheema, Ansar Zaman, and Imran Ullah Saqib. "Collaborating ISPs Supporting Various Real-Time Services." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4902.

Full text
Abstract:

These days, internet service providers (ISPs) face the challenge about how to increase profitability while hey must ensure a good quality service at the same time and scale up their network. The study involves previous research papers. On the bases of those papers,the comparison is made between different alternatives. The purpose on this study is to find a solution that combines different methods and configurations about how several ISPs could cooperate. Its implementation includes how different ISPs can configure their networks to cooperate on service provision supporting various real-time services.

APA, Harvard, Vancouver, ISO, and other styles
28

Duggan, Carl. "Isis : a study in Lully's French style." Thesis, Durham University, 1985. http://etheses.dur.ac.uk/7572/.

Full text
Abstract:
This study examines Lully's fifth tragedie lyrique Isis (1677), and shows its placement within the composer's operatic oeuvre; it assesses the importance of the opera in the development of a genre that for nearly a century would remain essentially unchanged. The study begins with an examination of aspects of Lully's first five tragedies Cadmus et Hermione (1673), Alceste (1674), Thesee (1675), Atys (1676) and Isis (1677)--citing those literary and musical features that gave the tragedie lyrique its unique qualities. Chapter III deals with three contemporary scores of Isis, the set of ten part books (Lully's first published music) printed under the composer's supervision in 1677, the first printed full score, published nearly fifty years later, and an undated full score manuscript, probably copied about 1690; they show how remarkably little his works were changed from generation to generation. The final section of this study is an examination of Lully's musical style, those features and qualities that comprise Lully's Isis.
APA, Harvard, Vancouver, ISO, and other styles
29

Tham, Sebastian. "Ledningsstrukturer inom terroristorganisationer - En fallstudie om ISIS." Thesis, Försvarshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5482.

Full text
Abstract:
Since events of September 11 and the subsequent conflicts surrounding the event, the war against terrorism has been constantly present. It has been used several methods and strategies to address these threats, including a method current in use, the targeting method. The method refers to use few but precise attacks to knock out key functions within these organizations, mostly individuals in the higher command and control structures within these organizations. The effectiveness of the method has been put in question when the majority of the terrorist organizations continue their strife, in some cases even increasing its intensity. The purpose of this study is to investigate which role the higher command plays in these organizations ability to wage war. This study utilize the organization ISIS as a representative for other similar Islamist terrorist organizations. The study use theories regarding network based groups and decentralized organizations in order to explain the structure of ISIS. The study shows that ISIS is an organization which has largely evolved into something other than what is described as an typical terrorist organization, the organization is more like one among other nations with a large and well structured organization, where management conditions are clear and well developed. ISIS can be a inconsistency in terrorist organizations, but may also have developed like the theoretician Galula named as the fourth step in the orthodox model of an terrorist or irregular force inevitable development  in the struggle for control.
APA, Harvard, Vancouver, ISO, and other styles
30

Totti, Maria. "Ausgewählte Texte der Isis- und Sarapis - Religion /." Hildesheim : G. Olms, 1985. http://catalogue.bnf.fr/ark:/12148/cb37592223r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Takács, Sarolta A. "Isis and Sarapis in the roman world /." Leiden : E. J. Brill, 1995. http://catalogue.bnf.fr/ark:/12148/cb357223360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Šebrle, Petr. "Zavedení ISMS do podniku podporujícího kritickou infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318630.

Full text
Abstract:
This diploma thesis deals with the methodology of Management of Information Security in a medium size company supporting critical infrastructure. The first part is focused on the theoretical aspects of the topic. Practical part consists of analysis of the current state, risk analysis and correction arrangements according to the attachment A of standard ČSN ISO/IEC 27001:2014. Implementation of ISMS is divided into four phases. This thesis however covers the first two phases only
APA, Harvard, Vancouver, ISO, and other styles
33

Ajisafe, Dickson O. A. "Radicalisation of European Citizens and ISIS Terrorism." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/63963.

Full text
Abstract:
The growing numbers of terror attacks in Europe in recent times has made the concept of radicalization a sensitive phenomenon, most especially, Islamic radicalization. The activities of Islamic extremists and terrorists have been identified with a good number of European citizens, who have joined the Islamic State (IS) and engaged in acts of terror against their own citizens and governments. Radicalisation has been used as a weapon by the Islamic State to recruit some European citizens as its members in order to perpetuate its objectives in Europe. The objective of this project is to examine how the Islamic State has been able to radicalize some European citizens as its members and build its network across the continent. It seeks to critically analyse the influence of the Islamic State ideology on European citizens, which has consequently led and could further lead to the participation of some European citizens in terrorist engagements. This work seeks to respond to the puzzle: how is it possible for the Islamic State to secure the interest of some Europeans into terrorism, considering the distance between Europe and the Middle East and the high standard of living as well as education that is available in Europe? In this mini-dissertation, the relevance of the study is pointed out in today Europe as far as peace and security development of the continent is concerned. This research makes use of secondary sources of data collection to investigate the study and its theoretical analyses is drawn from social network and contagion theories in order to shed more light on the discourse of the radicalisation of European citizens as Islamic State members. Specifically, this mini-dissertation discusses a brief origin and objectives of the Islamic State, the ideological perspectives of the group, reasons behind the radicalization of Europeans citizens as well as channels of radicalizing European citizens.
Mini Dissertation (MA)--University of Pretoria, 2017.
Modern European Languages
MA
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
34

Colin, Florent. "Caractérisation du rôle de la frataxine dans la machinerie de biosynthèse des clusters FeS et développement d'un logiciel de prédiction des protéines FeS." Thesis, Strasbourg, 2013. http://www.theses.fr/2013STRAJ113/document.

Full text
Abstract:
L’Ataxie de Friedreich est une maladie génétique récessive neurodégénérative. Elle est due à un déficit dans l’expression d’une protéine mitochondriale, la frataxine. Cette protéine est impliquée dans l’assemblage des protéines fer-soufre (FeS). Le premier axe de ma thèse a consisté à mieux caractériser le rôle de la frataxine au sein du complexe précoce de biosynthèse des clusters FeS (NFS1/ISD11/ISCU). Mes résultats m’ont permis de mettre en évidence l’importance de la frataxine dans le contrôle de l’entrée du fer au sein du complexe de biosynthèse, sur l’activité enzymatique de NFS1 et sur le transfert des clusters FeS vers les apo-protéines. Le second axe a été le développement du programme de bioinformatique (PredISC) nous permettant des candidats de protéines FeS. Ce programme a permis de générer une liste de candidat qui pourra être compilée sous la forme d’une base de données. Par la suite, des approches transversales y seront associées à afin d’affiner les listes de candidats
Friedreich Ataxia (FA) is the most prevalent form of autosomal recessive ataxia in the Caucasian population. Frataxin is implicated in the biosynthesis of iron-sulfur (FeS). The first axis of my work was to better characterize the function of Frataxin in the “early” complex of FeS clusters biosynthesis (NFS1/ISD11/ISCU). I was able to show the crucial involvement of Frataxin in the control of iron entry in this complex, on the enzymatic activity of NFS1 and on the transfert of FeS cluster to apo-proteins. Thesecond axis was the development of a bio-informatic software (PredISC) that is able to predict potential iron-sulfur containing proteins. The software allows us to generate a list of candidates that will be compiled in a database. In the future transversal approaches have to be associated in order to reduced the number of candidates, and increase their interest
APA, Harvard, Vancouver, ISO, and other styles
35

Ramaswamy, Padmanabhan. "Provisioning task based symmetric QoS in iSCSI SAN." Thesis, Wichita State University, 2008. http://hdl.handle.net/10057/2096.

Full text
Abstract:
This thesis examines Internet Small Computer System Interface (iSCSI) storage architecture and introduces a framework to furnish Quality of Service (QoS) for the qualified storage traffic. The framework incorporates IO scheduler that does priority scheduling for desired IO request and receives higher degree of service in its journey through the network by adopting Differentiated Services (DS) network architecture with each node exhibiting Expedited Forwarding (EF) behavior. In this thesis, to achieve end-to-end QoS for the application, a novel functional module is introduced in storage server to provision QoS for the requested data and the proposed framework is examined subsequently with an analytical model to estimate the maximum delay bound. The results derived in the analytical model are compared with the available experimental results in the literature. The distinct implication of the proposed framework is in achieving its objectives of guaranteed transmission of data with deterministic maximum delay, without modifying existing structural components and network protocol semantics.
Wichita State University, College of Engineering, Dept. of Electrical and Computer Science Engineering
Includes bibliographic references (leaves 60-65)
APA, Harvard, Vancouver, ISO, and other styles
36

Koscielniak, S. R. "Longitudinal beam dynamics studies on the ISIS synchrotron." Thesis, University of Oxford, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.379845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ramaswamy, Padmanabhan Pendse Ravi. "Provisioning task based symmetric QoS in iSCSI SAN." A link to full text of this thesis in SOAR, 2008. http://hdl.handle.net/10057/2096.

Full text
Abstract:
Wichita State University, College of Engineering, Dept. of Electrical and Computer Science Engineering.
Copyright 2008 by Padmanabhan Ramaswamy. All Rights Reserved. Includes bibliographical references (leaves 60-65).
APA, Harvard, Vancouver, ISO, and other styles
38

Felldén, Daniel. "Det moderna kalifatets strategi – en fallstudie om ISIS." Thesis, Försvarshögskolan, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8641.

Full text
Abstract:
In four years, ISIS managed to conquer vast areas in both Iraq and Syria and have proven themselves capable of conducting sophisticated military operations. Using terrorism, they have also shocked the world numerous times, most recently in Sri Lanka during the spring of 2019, in an attack leaving more than 250 people dead. Even today there seems to be a discrepancy in how this organization should be defined. Therefore, this thesis examines ISIS through the years of 2010-2015. The ambition is to explain how this organization can be understood through the contrasting theories of hybrid warfare and insurgency from Frank G. Hoffman and David Galula respectively. This thesis concludes that while ISIS’s initial progression bore strong resemblance to the historically typical insurgent, like gaining publicity through terror and using guerilla warfare to acquire supplies and grow, they became something more. They evolved into a hybrid organization capable of mixing conventional combined arms warfare with the deadly effectiveness of irregular methods, essentially converging terrorism with their conventional units. Using modern technology, they managed to turn both social media and commercial products alike, into effective tools of war. This spectacular metamorphosis that is ISIS, illuminates the requirement for development of new theories, or at the very least, to expand on those present today.
APA, Harvard, Vancouver, ISO, and other styles
39

Clancy, Timothy. "The Dynamics of ISIS: An Emerging-State Actor." Digital WPI, 2016. https://digitalcommons.wpi.edu/etd-theses/206.

Full text
Abstract:
This paper explains how the Islamic State grew rapidly, answering a question of "what is" the Islamic State? A review of existing literature on simulation modeling of insurgencies identifies several gaps, as existing theories of non-state actors and insurgencies are inadequate to explain ISIS's performance. Additionally, there are few mathematical simulation models of insurgent behavior that can reproduce ISIS results. Finally, what models exist are not detailed enough either to conduct detailed experiments testing proposed explanations of ISIS, or evaluate policy responses aimed at containing or mitigating ISIS. The paper offers several contributions. First it proposes a dynamic hypothesis that the Islamic State (ISIS) is an emerging-state actor, a new form of actor that differs from traditional non- state actors and insurgencies. Propositions are constructed and presented as an overall theory of emerging-state actor behavior. These propositions are then simulated as experiments within a detailed model parameterized with conditions very similar to what ISIS faced in Iraq and Syria 2013. The model is then run from 2013-2020, and experiment results confirm evidence of emerging- state actor behavior and allow refinement of model boundary assumptions. Second, an initial set of intervention policies are tested in a variety of conditions: best case, operationally constrained, isolated, combined, and at different timing intervals. Analysis of the results yields key dynamic insights. These insights aid policy makers in understanding the challenges posed by emerging state actors. Finally, the detailed simulation model used to test the propositions and policy analysis, including a novel approach to combat simulation with endogenous geospatial feedback, is provided in full detail in two Appendices. Appendix A provides a sector-by-sector view of model structure and equations. Appendix B provides more discussion, analysis and sources used to develop model structure, establish parameter values and determine equations for the simulation. Due to length and other considerations, Appendix B is available only upon request. The detailed simulation model can be used to refine non-state actor theories (configured for insurgencies, emerging-state actors, or other scenarios). The model can be loaded with other scenarios to simulate other actors in other geospatial terrain: ISIS in Libya, Boko Haram in Nigeria, the returning Taliban in Afghanistan, etc. Keywords: ISIS, ISIL, DAESH, insurgency, conflict, security, stability, non-state actor, emerging- state actor, combat simulator, geospatial, national security.
APA, Harvard, Vancouver, ISO, and other styles
40

Spiquel, Agnès. "La déesse cachée : Isis dans l'oeuvre de Hugo." Paris 7, 1989. http://www.theses.fr/1989PA070065.

Full text
Abstract:
Partant des representations du mythe d'isis communement admises par son siecle (isis la voilee, la nature), hugo en fait le lieu d'interrogations multiples et contradictoires, dans l'ensemble de son oeuvre. Sur le versant negatif, il draine dans la figure de lilithisis, fille-emanation de satan dans la fin de satan, tout ce qu'ont de tenebreux, de "fatal" a ses yeux, l'orient, l'egypte et isis parmi d'autres deesses paiennes. Lilithisis, concretion d'ombre, constitue un paradigme du mal absolu, repris en de nombreuses figures romanesques. Isis voilee est, par ailleurs, la nature, que l'effort scientifique de l'humanite tente de devoiler; mais la promesse de lumiere s'articule chez hugo sur une acceptation de l'ombre : il s'agit aussi de contempler le voiler, qui devient alors transparent. L'isis hugolienne est une etoile rayonnant derriere le voile; l'image du rayonnement concretise la notion d'immanence qui designe le mode de presence de l'autre dans le meme, de l'infini dans le fini. Isis, enfin, est un des mythes selon lesquels hugo pense la femme : ce n'est pas par sa fonction (mere, fille ou amante) que celle-ci apporte le salut mais par sa simple presence et, plus encore, par l'articulation specifique de la chair et de l'ame qu'elle realise en sa nature, et qui est aussi de l'ordre de l'immanence. Mythe de la presence-absence de l'alterite, isis devient figure de l'ame, a travers les nombreuses voilees hugoliennes, -ame affirmee, souvent ame eclipsee. . . .
The isiac myth, in its commonly accepted figures in hugo's times, is for him the source of manifold and contradictory questionings throughout his work. Negatively, he gathers under the image of lilithisis, emanation-daughter of satan in la fin de satan, all that he feels obscure and "fatal" in the east, egypt and isis among other heathen goddesses. Lilithisis, a condensation of shadow, stands as a figure of the absolute evil, which numerous patterns echo in his novels. Besides, the veiled isis is nature : the nature which the scientific endeavour of mankind attempts to unveil. But the promise of light is matched with an acceptation of shadow : which also involves the contemplation of the veil, becoming then transparent. Isis is thus a star radiating from behind the veil : the radiance stands metaphorically for the notion of immanence which points to the type of presence of the other in the same, the infinite in the finite. Lastly, isis is one of the myths through which hugo views woman : the salvation is not brought about by her sheer function in relation to man but by her mere presence and, still more, by the specific union of flesh and soul she essentially accomplishes and which again belongs to the sphere of immanence. A myth of the presence-absence of alterity, isis become a figure of the soul. . . .
APA, Harvard, Vancouver, ISO, and other styles
41

Ferreira, Sónia Cristina das Neves. "ISCR and their association with antibiotic resistance genes." Doctoral thesis, Universidade de Aveiro, 2010. http://hdl.handle.net/10773/974.

Full text
Abstract:
Doutoramento em Biologia
A prevalência de bactérias resistentes a antibióticos em ambiente hospitalar tem vindo a tornar-se dramática e preocupante a nível mundial. Contudo, com a utilização inadequada de antibióticos em áreas tão diversas como a veterinária, a aquacultura e a agricultura, esta deixou de estar confinada ao ambiente hospitalar, sendo o ambiente um reservatório natural de microganismos resistentes a estes compostos. O conhecimento detalhado dos determinantes de resistência a antibióticos presentes nestes ambientes, sejam estes genes de resistência ou estruturas envolvidas na sua mobilização, é fundamental, não só do ponto de vista do conhecimento como para a eventual implementação de medidas de contenção da sua disseminação. Neste contexto, são necessários estudos que permitam conhecer o panorama mais realista da distribuição destes determinantes de resistência a antibióticos, quer no meio ambiente quer no ambiente clínico. Assim, constituiu objectivo principal deste trabalho contribuir para o conhecimento do panorama actual da prevalência e distribuição dos elementos ISCR, bem como de outros determinantes de resistência a antibióticos em espécies de Gram-negativo clinicamente relevantes (Escherichia coli, Klebsiella pneumoniae, Acinetobacter baumannii e Citrobacter freundii) recolhidas a partir de amostras de pacientes do Hospital Infante D. Pedro, EPE, Aveiro, Portugal, entre 2006 e 2008. Adicionalmente, foram também recolhidas bactérias de Gram-negativo do meio ambiente, a partir de amostras de águas e de vísceras de peixes, nas quais foram igualmente pesquisados os elementos acima referidos. À excepção dos isolados de E. coli e de Gramnegativo ambientais, todas as estirpes estudadas foram seleccionadas com base no seu perfil de multirresistência a antibióticos. Os resultados mostraram que em todas as espécies recolhidas no ambiente hospitalar foi detectada a presença de elementos ISCR, do tipo ISCR1 ou ISCR2. O elemento ISCR1, foi encontrado em isolados de E. coli, K. pneumoniae e C. freundii e o elemento ISCR2 em isolados de A. baumannii. Não foi detectada a presença de ISCRs nos isolados de Gram-negativo ambientais, o que sugere que a ocorrência dos mesmos é fortemente influenciada pela pressão selectiva exercida pelo ambiente em que os microrganismos se encontram. Genes qnr e integrões de classe 1 foram os determinantes de resistência mais frequentemente encontrados associados aos elementos ISCR1. Os vários determinantes de resistência foram encontrados em diferentes contextos genéticos e localizados em estruturas móveis, nomeadamente em plasmídeos. O elemento ISCR2 presente em isolados de A. baumannii encontra-se associado ao gene sul2 em todos os isolados, dentro de um mesmo contexto genético e com uma localização cromossomal. Contudo, o contexto genético encontrado nestes isolados é novo não tendo sido descrito até à data em outros microrganismos. O presente estudo constitui a primeira descrição de elementos ISCR intrinsecamente ligados a genes de resistência a antibióticos, em Portugal. Uma vez que estes elementos parecem ser responsáveis pela mobilização de um grande número de genes de resistência a antibióticos, a sua elevada incidência entre estirpes resistentes e multirresistentes, bem como a sua associação com genes de resistência é preocupante e requer vigilância.
Within the hospital environment, antibiotic resistant bacteria are a problem of concern worldwide. However, the antibiotic resistance has breached outside the confined hospital environment due to an inappropriate and intensive use of antibiotics in areas such as veterinary, aquaculture and agriculture, being the natural environment also a reservoir of antibiotic resistant microorganisms. Accurate and detailed studies focusing on the existing resistance determinants, either resistance genes or structures enhancing/involved in their dissemination, is needed in order to provide a realistic scenario of their distribution as well as for the implementation of measures that could prevent the dissemination of those genes. Thus, studies giving a wider and realistic panorama of the distribution of antibiotic resistance genes in both the natural and the hospital environment are of utmost importance. The main goal of this thesis was to contribute to the present knowledge of distribution and prevalence of antibiotic resistance genes and ISCRs elements in clinically relevant Gram-negative species (Escherichia coli, Klebsiella pneumoniae, Acinetobacter baumannii and Citrobacter freundii) collected from clinical specimens from patients in the Hospital Infante D. Pedro, EPE, Aveiro, Portugal between 2006 and 2008. Additionally, environmental Gram-negative isolates, collected from water and fish guts were also screened for the presence of the ISCR elements. All the isolates that were included in the present study were multi-drug resistant, with the exception of Escherichia coli and the Gram-negative environmental isolates. The results obtained revealed that the ISCR1 and ISCR2 elements were present in all the species collected within the hospital settings. ISCR1 was present in E. coli, K. pneumoniae and C. freundii isolates and ISCR2 was detected in the A. baumannii isolates. The presence of ISCRs was not detected among the environmental Gram-negative isolates, suggesting that the occurrence of ISCR is clearly biased by the pressure exerted by the environment from where the microorganisms were isolated. qnr genes and class 1 integrons were the main resistance determinants found associated with ISCR1 and were both described in different genetic contexts, located on mobile structures such as plasmids. Moreover, the ISCR2 element was found associated with the sul2 gene in all the A. baumannii isolates with the same genetic context and located on the chromosome. Noteworthy is that the genetic context described is unique and was never described before in other microorganisms. This is the first study reporting the presence of ISCR elements in Portuguese isolates. Since these elements are responsible for the mobilization of several antibiotic resistance genes and were found intrinsically linked to them, their high incidence, among multi-drug resistant isolates is disconcerting and requires surveillance.
APA, Harvard, Vancouver, ISO, and other styles
42

Imrich, Martin. "Nasazení kontextového DLP systému v rámci zavádění ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224836.

Full text
Abstract:
This diploma thesis focuses on a DLP implementation within a specific organization. The thesis contains current situation analysis and provides decision for choice of the most suitable DLP based on the analysis findings. Eventually describes a real implementation of the chosen DLP system within the organization.
APA, Harvard, Vancouver, ISO, and other styles
43

Kohoutek, Josef. "Zavádění bezpečnostních opatření dle ISMS do malé společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241610.

Full text
Abstract:
In my master´s thesis I focus on the design of information security management system for the company INNC s.r.o., which specializes in the design and implementation of computer networks. The thesis is divided into two parts. The first part provides theoretical knowledge of the issue. Second part is the analysis and proposal of security measures.
APA, Harvard, Vancouver, ISO, and other styles
44

Klepárník, Roman. "Návrh zavedení nutných oblastí ISMS ve veřejné správě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378365.

Full text
Abstract:
This diploma thesis focuses on the application of information security management system in the public administration. Thesis focuses on the most frequent threats on information security and describes the best practices which are compliant with the ISO/IEC 27000. It contains the proposal of security recommendation that will help the organisation with ensuring better information security and with the preparation for GDPR
APA, Harvard, Vancouver, ISO, and other styles
45

Foltýn, Adam. "Akvizice služby pro zabezpečení emailové komunikace dle ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378381.

Full text
Abstract:
The diploma thesis focuses on a proposal of acquisition of email communication security service according to ISMS for a company which provides trading services on financial markets. The thesis is divided into three parts. In the theoretical part, necessary terms and theoretical essentials are explained in order to ensure understanding of the following parts of the thesis. The following analytical part describes the company's current security status of information. As a solution in the final part of the thesis, partial risk analyses are conducted. Based on these, suitable options for email communication security measures are proposed as well as their the economical evaluation.
APA, Harvard, Vancouver, ISO, and other styles
46

Pexa, Marek. "Zavedení bezpečnostních opatření dle ISMS pro základní školu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402084.

Full text
Abstract:
The diploma thesis deals with introduction of security measures for primary and elementary school. The thesis is devided into three main parts. The first part deals with basic theoretical concepts of information security and legislative elements needed for understanding the issue. The second part desrcibes the current state for primary and elementary school. The last practical part includes proposal of security measures and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
47

Arun, Asim Kumar. "ISIS threat to India : how should India respond?" Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60305.

Full text
Abstract:
This thesis traces the evolution of the Islamic State of Iraq and Syria (ISIS) and its present geopolitical extent and identifies the major trends and strategic directions. It examines the official pronouncements about its intentions regarding India and analyses the threat and proposes a policy prescription. Today’s terrorist organizations, including ISIS, publish online magazines and videos stating their policies, strategies and, tactics. These original voices were studied to understand them. The US invasion of Iraq (2003) and the subsequent failure in creating a “democratic government” acceptable to the powerful Sunni minority led to strife and sectarian violence. Radical Islamists and leftover elements of Saddam Hussain’s military got together and created large scale insurgency eventually leading to the declaration of a “Caliphate” calling out to all the Muslims in the world to accept it and join the effort to extend it. Less than 30 Indians as compared to a total of 25,000 are known to have migrated to ISIS area. Even with all its aberrations, India’s resilience as a syncretic and inclusive society renders hijrat (migration) an unattractive option. But coming together of radicalized youth into a small terror modules and striking nearer home is a real and probable threat. To protect itself, India should follow policies that integrate its Muslim community into the social mainstream. To prevent its people from getting radicalized through exposure to ISIS propaganda, the counter radicalization effort needs to be strengthened. The few persons who are known to have been radicalized but have not undertaken any kind of violence could be considered for softer deradicalization methods. By involving their family, friends and, community it is possible to bring these people back into normal domestic life. Attacks can still happen and the capability to deal with them must be enhanced by creating interdiction capabilities at the state and district levels. Finally, international terror requires measures across countries for which mechanisms for international cooperation must be created so that information, intelligence and, evidence flow seamlessly.
Arts, Faculty of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
48

Niu, Yue, Ning Hao, and Lingling An. "Detection of rare functional variants using group ISIS." BioMed Central, 2011. http://hdl.handle.net/10150/610089.

Full text
Abstract:
Genome-wide association studies have been firmly established in investigations of the associations between common genetic variants and complex traits or diseases. However, a large portion of complex traits and diseases cannot be explained well by common variants. Detecting rare functional variants becomes a trend and a necessity. Because rare variants have such a small minor allele frequency (e.g., <0.05), detecting functional rare variants is challenging. Group iterative sure independence screening (ISIS), a fast group selection tool, was developed to select important genes and the single-nucleotide polymorphisms within. The performance of the group ISIS and group penalization methods is compared for detecting important genes in the Genetic Analysis Workshop 17 data. The results suggest that the group ISIS is an efficient tool to discover genes and single-nucleotide polymorphisms associated to phenotypes.
APA, Harvard, Vancouver, ISO, and other styles
49

Meyer, Kyrill, and Michael Thieme. "Theory and Practice for System Services Providers in Complex Value and Service Systems." Universitätsbibliothek Leipzig, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-128474.

Full text
Abstract:
In September 2013, the „International Symposium on Service Science (ISSS)“ offered various participants a unique platform for advancing research and discussions in service science for the fifth consecutive year. Being held as part of the “Leipzig Days of Applied Informatics/Leipziger Tage der Angewandten Informatik”, researchers and practitioners alike joined in their effort to better understand the emergence of system services providers in complex value chains and service systems. The proceedings book documents some of their insights and wants to serve as reference for the advancing discussion.
APA, Harvard, Vancouver, ISO, and other styles
50

Šupolová, Veronika. "Aktuální vývoj informačních systémů veřejné správy v ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-1547.

Full text
Abstract:
Tato práce se zabývá informačními systémy veřejné správy. Především jejich vývojem, základními dokumenty a arogány a otázkou jejich dlouhodobého řízení. Práce obsahuje návrh, jak by orgány veřejné správy mohly postupovat při tvorbě hlavního nástroje řízení ISVS, informační strategie.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography