Academic literature on the topic 'Missed thrust'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Missed thrust.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Missed thrust"

1

Laipert, Frank E., and James M. Longuski. "Automated Missed-Thrust Propellant Margin Analysis for Low-Thrust Trajectories." Journal of Spacecraft and Rockets 52, no. 4 (July 2015): 1135–43. http://dx.doi.org/10.2514/1.a33264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rubinsztejn, Ari, Carrie Grace Sandel, Rohan Sood, and Frank E. Laipert. "Designing trajectories resilient to missed thrust events using expected thrust fraction." Aerospace Science and Technology 115 (August 2021): 106780. http://dx.doi.org/10.1016/j.ast.2021.106780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rubinsztejn, Ari, Rohan Sood, and Frank E. Laipert. "Neural network optimal control in astrodynamics: Application to the missed thrust problem." Acta Astronautica 176 (November 2020): 192–203. http://dx.doi.org/10.1016/j.actaastro.2020.05.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Allio, Lorenzo. "On the Smartness of Smart Regulation – A Brief Comment on the Future Reform Agenda." European Journal of Risk Regulation 2, no. 1 (March 2011): 19–20. http://dx.doi.org/10.1017/s1867299x00000581.

Full text
Abstract:
We live at a time where Smart is better than Better, and Better was not Smart enough. This is not a dull pun. It actually reflects the status in which regulatory reform finds itself nowadays. To many observers, the switch from Better to Smart just reflects the attempt to instil renewed commitment and faith in an agenda, which in some (European) countries has maybe exhausted its thrust. The European Commission also admits candidly that the choice of the new term largely serves as a refreshing slogan. But limiting it to a branding change, with little consideration of its content, would be a mistake in appreciation. And a missed opportunity. We do need “Smart Regulation” – and not only in the Commission. Above all, we need smart regulators.
APA, Harvard, Vancouver, ISO, and other styles
5

Devi, Gayatri. "Dentistry as a prospective career choice in India." Bioinformation 16, no. 12 (December 31, 2020): 1134–38. http://dx.doi.org/10.6026/973206300161134.

Full text
Abstract:
Career choice is a complex decision in a student’s life. The opportunity to participate in dental education in many countries, especially in the developing ones, is limited to a small percentage of the community. There is a wide range of options for students to choose as a career in general family, gender, personal interest; outcome expectancies can affect the decision in choosing it. Many studies showed that many individuals find themselves in occupations not really knowing why they made that particular decision. The changing nature of the dental workforce and the need to retain the services of future members has made it important to understand why current dental students have chosen dentistry as their career. However, the choice of dentistry becomes forceful at times by peer pressure, cultural thrust or inability to procure medicine. It is of interest to evaluate dentistry as a prospective career choice in India. The participants answered a questionnaire based online survey and the results were collected and analysed statistically. Analyses of data from the survey shows that majority (36.72%) of students had chosen dentistry as a career choice having missed entry or selection into medicine.
APA, Harvard, Vancouver, ISO, and other styles
6

Pait, T. Glenn, and Matthew Helton. "The crippled brain that prolonged the Civil War: General Joseph Hooker’s concussions at Chancellorsville." Neurosurgical Focus 53, no. 3 (September 2022): E4. http://dx.doi.org/10.3171/2022.6.focus22210.

Full text
Abstract:
President Lincoln appointed General Joseph Hooker to command the Army of the Potomac in January 1863. In April 1863, Hooker had 130,000 men compared to the Confederate Army’s 60,000. The Union forces had more food, clothing, and ammunition. On a decisive day of the Chancellorsville campaign, as Hooker stood on his headquarters porch, a cannonball struck the pillar against which he was leaning. He was hurled to the floor, stunned and senseless. Unconsciousness followed a lucid interval, requiring rest, when another cannonball struck near him. Half of the army was not thrust into battle, resulting in retreat, because Hooker was not capable of commanding. Hooker’s army missed the opportune time to attack; the order was never received because Hooker suffered a traumatic brain injury. Under current military protocol, Hooker would not be allowed to return to participation. During this crucial period a reporter stated, “the precious hour passed, while our army was without a head.” The Chancellorsville campaign resulted in Union retreat. Hooker’s disabling traumatic brain injury prevented him from giving orders and changing the battle’s outcome. Had the general not sustained a concussion, the Civil War probably would have ended earlier.
APA, Harvard, Vancouver, ISO, and other styles
7

Rn, Arun Kishore, Yuvaraj Babu K, and Gayatri Devi R. "Assessing the Reason for Choosing Dentistry as a Career: A Survey Among First-Year Dental College Students." ECS Transactions 107, no. 1 (April 24, 2022): 14739–54. http://dx.doi.org/10.1149/10701.14739ecst.

Full text
Abstract:
Career choice is a complex decision in our life. The opportunity to participate in dental education in many countries, especially in the developing ones, is limited to a small percentage of the community. Choosing dentistry as a career option may be due to various reasons, influences like economical status, financial status, social status, and many more. Students also try to make a career choice while studying itself. Meanwhile, choosing dentistry as a job should be accomplished with more precise considerations because changing this job is rarely possible. The changing nature of the dental workforce and the need to retain the services of future members has made it important to understand why current dental students have chosen dentistry as their career. However, the choice of dentistry becomes forceful at times by peer pressure, cultural thrust, or inability to procure medicine. Questions distributed through an online survey were answered by the participants and the results are collected and analyzed statistically. From the results obtained and analyzed the various reasons for choosing dentistry as a carrier was understood. The main reason for choosing dentistry as a career is because majority (42.97%) missed MBBS as their first career choice.
APA, Harvard, Vancouver, ISO, and other styles
8

Devi, Gayatri. "Dentistry as a prospective career choice in India." Bioinformation 16, no. 12 (December 31, 2020): 1134–38. http://dx.doi.org/10.6026/973206300161134.

Full text
Abstract:
Career choice is a complex decision in a student’s life. The opportunity to participate in dental education in many countries, especially in the developing ones, is limited to a small percentage of the community. There is a wide range of options for students to choose as a career in general family, gender, personal interest; outcome expectancies can affect the decision in choosing it. Many studies showed that many individuals find themselves in occupations not really knowing why they made that particular decision. The changing nature of the dental workforce and the need to retain the services of future members has made it important to understand why current dental students have chosen dentistry as their career. However, the choice of dentistry becomes forceful at times by peer pressure, cultural thrust or inability to procure medicine. It is of interest to evaluate dentistry as a prospective career choice in India. The participants answered a questionnaire based online survey and the results were collected and analysed statistically. Analyses of data from the survey shows that majority (36.72%) of students had chosen dentistry as a career choice having missed entry or selection into medicine.
APA, Harvard, Vancouver, ISO, and other styles
9

Gupte, Novy, and Sapna Pradhan. "Pharmacovigilance: Perspectives in India." Journal of Medical Academics 3, no. 2 (2020): 59–62. http://dx.doi.org/10.5005/jp-journals-10070-0062.

Full text
Abstract:
ABSTRACT Background Adverse drug reactions are a significant burden on the health system across the world. Paradoxically, a considerable chunk of ADRs is missed or not reported on account of avoidable reasons, resulting in bottlenecks in carrying out the proper management. This problem is much more evident in India and other resource-limited communities than in the prosperous countries of the West. Aim and objective To provide a state-of-the-art update on pharmacovigilance with special reference to perspectives in India and make appropriate recommendations for improving ADR reporting. Design The contents are based on a review of English medical literature augmented with the author's first-hand experience in the field over the past more than a decade. Results Well-organized pharmacovigilance started in India with the launching of the Pharmacovigilance Programme of India in 2010. Despite it making a perceptible improvement in ADR reporting, high underreporting of ADRs still prevails. The yet greater thrust on inculcating awareness comprising knowledge attitudes and practices among the healthcare professionals is likely to lead to further improvement in ADR reporting, resulting in augmentation of the safe use of drugs. Conclusion Pharmacovigilance, a mandatory drug safety activity, needs to be propagated with yet greater vigor among healthcare professionals in India. How to cite this article Gupte N, Pradhan S. Pharmacovigilance: Perspectives in India. J Med Acad 2020;3(2):59–62.
APA, Harvard, Vancouver, ISO, and other styles
10

Telli, Hilal. "The Validity and Reliability of Provocation Tests in the Diagnosis of Sacroiliac Joint Dysfunction." January 2018 1, no. 21;1 (July 15, 2018): E367—E376. http://dx.doi.org/10.36076/ppj.2018.4.e367.

Full text
Abstract:
Background: Although sacroiliac joint dysfunction (SIJD) is generally regarded as a source of lumbar pain, its anatomical position and the absence of a diagnostic ‘gold standard’ lead to difficulties at examination and differential diagnosis. However, since sacroiliac (SI) joint blocks only provide information about pathologies of joint origin and since SIJD developing secondary to pathologies in structures around the joint can be missed. Provocation and palpation tests also need to be used in diagnosis. Objectives: The purpose of this study was to examine the reliability of clinical examination and provocation tests used in the diagnosis of SIJD. Study Design: Retrospective analysis of prospectively collected data. Setting: Outpatient physical medicine and rehabilitation clinic. Methods: One hundred and seventeen patients presenting with lumbar and/or leg pain and diagnosed with SIJD through clinical evaluation were included in the study. Range of lumbar joint movement, pain location and specific tests used in the diagnosis of SIJD were evaluated. Positivity in 3 out of 6 provocation tests was adopted as the criterion. Results: 75.2% of patients were female and 24.8% were male. Mean age was 46.41 ± 10.45 years. A higher level of females was determined in ender distribution. SIJD was determined on the right in 52.6% of patients and on the left in 47.4%. When SI joint provocation tests were analyzed individually, the highest positivity, in 91.4% patients diagnosed with SIJD, was in the FABER test. The lowest positivity, in 56.4% of patients, was determined in the Ganslen test. The same patients were assessed by the same clinician at 2 different times. In these data, the simple consistence, kappa and PABAK coefficient values of all tests were close to 1 and indicating good agreement. The thigh thrust (POSH) and sacral thrust tests exhibited very good agreement with a kappa coefficient of 0.90 and a PABAK coefficient of 0.92, while the FABER test exhibited good agreement with a kappa coefficient of 0.78 and a PABAK coefficient of 0.92. Limitation: Agreement between different observers was not evaluated, and also no comparison was performed with SI joint injection, regarded as a widely used diagnostic technique. Conclusion: The anatomical position of the SI joint and the lack of a diagnostic ‘gold standard’ make the examination and diagnosis of SIJD difficult. Most SI joint clinical tests have limited reliability and validity on their own, while a multitest regimen consisting of SI joint pain provocation tests is a reliable method, and these tests can be used instead of unnecessary invasive diagnostic SI joint procedures. Key words: Dysfunction, lumbar, sacroiliac joint, provocation test, sacroiliac joint pain, pain pattern
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Missed thrust"

1

Magklaras, Georgios Vasilios. "An insider misuse threat detection and prediction language." Thesis, University of Plymouth, 2012. http://hdl.handle.net/10026.1/1024.

Full text
Abstract:
Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is difficult to address for a number of reasons. A fundamental reason that makes the problem mitigation difficult relates to the level of trust legitimate users possess inside the organization. The trust factor makes it difficult to detect threats originating from the actions and credentials of individual users. An equally important difficulty in the process of mitigating insider IT threats is based on the variability of the problem. The nature of Insider IT misuse varies amongst organizations. Hence, the problem of expressing what constitutes a threat, as well as the process of detecting and predicting it are non trivial tasks that add up to the multi- factorial nature of insider IT misuse. This thesis is concerned with the process of systematizing the specification of insider threats, focusing on their system-level detection and prediction. The design of suitable user audit mechanisms and semantics form a Domain Specific Language to detect and predict insider misuse incidents. As a result, the thesis proposes in detail ways to construct standardized descriptions (signatures) of insider threat incidents, as means of aiding researchers and IT system experts mitigate the problem of insider IT misuse. The produced audit engine (LUARM – Logging User Actions in Relational Mode) and the Insider Threat Prediction and Specification Language (ITPSL) are two utilities that can be added to the IT insider misuse mitigation arsenal. LUARM is a novel audit engine designed specifically to address the needs of monitoring insider actions. These needs cannot be met by traditional open source audit utilities. ITPSL is an XML based markup that can standardize the description of incidents and threats and thus make use of the LUARM audit data. Its novelty lies on the fact that it can be used to detect as well as predict instances of threats, a task that has not been achieved to this date by a domain specific language to address threats. The research project evaluated the produced language using a cyber-misuse experiment approach derived from real world misuse incident data. The results of the experiment showed that the ITPSL and its associated audit engine LUARM provide a good foundation for insider threat specification and prediction. Some language deficiencies relate to the fact that the insider threat specification process requires a good knowledge of the software applications used in a computer system. As the language is easily expandable, future developments to improve the language towards this direction are suggested.
APA, Harvard, Vancouver, ISO, and other styles
2

Castillo, Alfred. "Respondent Perceived Threat During the Information Systems Requirements Determination Process: Understanding and Mitigation." FIU Digital Commons, 2017. https://digitalcommons.fiu.edu/etd/3549.

Full text
Abstract:
Requirements determination is a critical driver in a successful software development process. Despite decades of research prescribing various software development methodologies, intended to aid in achieving an eventual convergence between the user’s mental models and an informationally equivalent representation that is codified within an information system, we can still attribute many of the deficiencies in software development projects to the improper or ineffective execution of the requirements determination process. This study draws on the user resistance, software development, and psychology literature to discuss how perceived threats by potential users and key respondents can result in sub-optimization of a proposed information system via reduction in the quality of their responses during the requirements gathering phase. A laboratory experiment was carried out to explore the sources and effects of various threat perceptions and the effectiveness of techniques intended to detect and mitigate such perceptions of threat. The results confirm that perception of threat does lead to a degradation in response quality, with perceived adaptability fully mediating the relationship. The findings on whether interviewer reassurance has a moderating effect on the relationship between threat and perceived adaptability had interesting results, which are discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Mat, Roni Mohd Saiyidi. "An analysis of insider dysfunctional behavours in an accounting information system environment." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1640.

Full text
Abstract:
Insider deviant behaviour in Accounting Information Systems (AIS) has long been recognised as a threat to organisational AIS assets. The literature abounds with a plethora of perspectives in attempts to better understand the phenomenon, however, practitioners and researchers have traditionally focussed on technical approaches, which, although they form part of the solution, are insufficient to address the problem holistically. Managing insider threats requires an understanding of the interconnectedness between the human and contextual factors in which individuals operate, since technical methodologies in isolation have the potential to increase rather than reduce insider threats. This dilemma led many scholars to examine the behaviour of individuals, to further their understanding of the issues and in turn, control insider threats. Despite promising findings, some of these behavioural studies have inherent methodological limitations, and no attempt has been made to differentiate between apparently similar, yet fundamentally different, negative behaviours. Using the theory of planned behaviour (TPB) and actor network theory (ANT) as a foundation, the current study addresses the first concern by integrating AIS complexity and organisational culture, and identifies the contextual factors influencing behaviours that lead to insider threats. Secondly, the study addresses concerns regarding methodological approaches, by categorising various deviant insider behaviours using the concept of dysfunctional behaviour, based on two-dimensional behaviour taxonomy. Partial least square structural equation modelling (PLS-SEM) revealed that TPB‘s predictor variables: attitude (ATT), subjective norm (SN) and perceived behavioural control (PBC), together with the moderator variables of organisational culture (CULTURE) and AIS complexity (COMPLEX), accounted for substantial variations in intention (INTENT) to engage in dysfunctional behaviour. The findings also indicated that PBC is a dual-factor construct. Changes in predictors at the behavioural subset level were highlighted, and the findings of previous studies, that ATT is a salient predictor of intention, were confirmed. This was significant across all four dysfunctional behaviour categories. These findings add to the body of knowledge by contributing a theory that explains insider threats in AIS by deciphering dysfunctional behaviour using a predictive model. The study also provides a methodological foundation for future research to account for behavioural factors. Moreover, the findings have implications for managerial practices who want to reduce insider threats to an acceptable level by strengthening organisational culture, moderating AIS complexity, and focussing on management programs with sufficient momentum to impact attitudinal change.
APA, Harvard, Vancouver, ISO, and other styles
4

Abu-Sheikh, Khalil. "Reviewing and Evaluating Techniques for Modeling and Analyzing Security Requirements." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6203.

Full text
Abstract:
The software engineering community recognized the importance of addressing security requirements with other functional requirements from the beginning of the software development life cycle. Therefore, there are some techniques that have been developed to achieve this goal. Thus, we conducted a theoretical study that focuses on reviewing and evaluating some of the techniques that are used to model and analyze security requirements. Thus, the Abuse Cases, Misuse Cases, Data Sensitivity and Threat Analyses, Strategic Modeling, and Attack Trees techniques are investigated in detail to understand and highlight the similarities and differences between them. We found that using these techniques, in general, help requirements engineer to specify more detailed security requirements. Also, all of these techniques cover the concepts of security but in different levels. In addition, the existence of different techniques provides a variety of levels for modeling and analyzing security requirements. This helps requirements engineer to decide which technique to use in order to address security issues for the system under investigation. Finally, we found that using only one of these techniques will not be suitable enough to satisfy the security requirements of the system under investigation. Consequently, we consider that it would be beneficial to combine the Abuse Cases or Misuse Cases techniques with the Attack Trees technique or to combine the Strategic Modeling and Attack Trees techniques together in order to model and analyze security requirements of the system under investigation. The concentration on using the Attack Trees technique is due to the reusability of the produced attack trees, also this technique helps in covering a wide range of attacks, thus covering security concepts as well as security requirements in a proper way.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Missed thrust"

1

Jr, Larry Allen McCluney. Yazoo Pass Expedition: A Union Thrust into the Delta. Arcadia Publishing, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jr, Larry Allen McCluney. Yazoo Pass Expedition: A Union Thrust into the Delta. Arcadia Publishing, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jr, Larry Allen McCluney. Yazoo Pass Expedition: A Union Thrust into the Delta. Arcadia Publishing, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wheatley, Michael, John R. Weekes, Andrea E. Moser, and Kathleen Thibault. Drugs and Prisons. Edited by John Wooldredge and Paula Smith. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199948154.013.14.

Full text
Abstract:
This essay explores how illegal drugs are linked to imprisonment, especially in the United States. First, the chapter considers statistics that demonstrate how the high U.S. imprisonment rate is driven by the criminalization of substance misuse, despite the high incidence of drug use in the general population. Prison populations that include a mixture of drug users and drug dealers are virtually guaranteed to find ways of bringing drugs into prison, and the demand is increased by the desire to ease the pains of imprisonment. The illicit drug economy in prisons and the associated violence is a threat to the safety of both staff and prisoners. Discussed are ways drugs enter correctional institutions and the methods used to disrupt supply routes. Types of treatment to reduce demand are considered. The complex mix of issues affecting drug use in prisons means that a careful, balanced approach to care and control is needed.
APA, Harvard, Vancouver, ISO, and other styles
5

Wallace, Mark I. When God Was a Bird. Fordham University Press, 2018. http://dx.doi.org/10.5422/fordham/9780823281329.001.0001.

Full text
Abstract:
At one time, God was a bird. In ancient Egypt, Thoth was the Ibis-headed divinity of magic and wisdom. Winged divine beings—griffins and harpies—populated the pantheon of Greek antiquity, and Quetzalcoatl was the plumed serpent deity of the pre-Columbian Aztecs. It is said that in spite of—or better, to spite—this time-honored wealth of divine avifauna, Christianity divorced God from the avian world in order to defend a pure form of monotheism. This narrative, however, misses the startling scriptural portrayals of God as the beaked and feathered Holy Spirit, the third member of the Trinity who, alongside the Father and Son, is the “animal God” of historic Christian witness. Appearing as a winged creature at the time of Jesus’ baptism (Luke 3:21-22), the bird-God of the New Testament signals the deep grounding of archi-original biblical faith in the natural world. This book calls this new but ancient vision of the world “Christian animism” in order to signal the continuity of biblical religion with the beliefs of indigenous and non-Western communities that Spirit enfleshes itself within everything that grows, walks, flies, and swims in and over the Earth. To this end, it weaves together philosophy (Heidegger, Girard), theology (Augustine, Hildegard, Muir), and the author’s own birdwatching visitations (wood thrush, pileated woodpecker, great blue heron, American dipper, domestic pigeon) to argue that all things are alive with sacred personhood and worthy of human beings’ love and protection in a time of ecocidal, even deicidal, climate change.
APA, Harvard, Vancouver, ISO, and other styles
6

Doumouchtsis, Stergios K., and S. Arulkumaran, eds. Emergencies in Obstetrics and Gynaecology. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199651382.001.0001.

Full text
Abstract:
This handbook provides a practical and accessible guide to all emergency situations encountered in obstetrics and gynaecology, from the immediately life-threatening to the smaller but urgent problems that may arise. Designed around the symptoms and signs with which the patient presents to the hospital, this handbook explains how to arrive at a differential diagnosis and how to prevent, manage, and treat an emergency. The obstetric emergencies section covers topics from early pregnancy through to post-delivery complications, whilst the gynaecological emergencies section addresses those issues that could potentially pose a threat to a women’s fertility or even her life. The second edition addresses new topics on issues that have become more prevalent in recent years, such as substance misuse in pregnancy and violence against women and children. A new topic on ‘preoperative assessment’ outlines how to get consent, the risks, benefits, and what the patient should expect. Fully revised and updated, covering new guidance, this title provides foundation year doctors, specialty trainees, and consultants in obstetrics and gynaecology with an invaluable source of information for every emergency situation.
APA, Harvard, Vancouver, ISO, and other styles
7

Cornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.

Full text
Abstract:
As societies, governments, corporations, and individuals become more dependent on the digital environment, so they also become increasingly vulnerable to misuse of that environment. A considerable industry has developed to provide the means with which to make cyberspace more secure, stable, and predictable. Cybersecurity is concerned with the identification, avoidance, management, and mitigation of risk in, or from, cyberspace—the risk of harm and damage that might occur as the result of everything from individual carelessness to organized criminality, to industrial and national security espionage, and, at the extreme end of the scale, to disabling attacks against a country’s critical national infrastructure. But this represents a rather narrow understanding of security and there is much more to cyberspace than vulnerability, risk, and threat. As well as security from financial loss, physical damage, etc., cybersecurity must also be for the maximization of benefit. The Oxford Handbook of Cybersecurity takes a comprehensive and rounded approach to the still evolving topic of cybersecurity: the security of cyberspace is as much technological as it is commercial and strategic; as much international as regional, national, and personal; and as much a matter of hazard and vulnerability as an opportunity for social, economic, and cultural growth.
APA, Harvard, Vancouver, ISO, and other styles
8

Goh, Robbie B. H. Christopher Nolan. Bloomsbury Publishing Plc, 2022. http://dx.doi.org/10.5040/9781350140004.

Full text
Abstract:
Christopher Nolan is the writer and director of Hollywood blockbusters like The Dark Knight and The Dark Knight Rises, and also of arthouse films like Memento and Inception. Underlying his staggering commercial success however, is a darker sensibility that questions the veracity of human knowledge, the allure of appearance over reality and the latent disorder in contemporary society. This appreciation of the sinister owes a huge debt to philosophy and especially modern thinkers like Friedrich Nietzsche, Sigmund Freud and Jacques Derrida. Taking a thematic approach to Nolan’s oeuvre, Robbie Goh examines how the director’s postmodern inclinations manifest themselves in non-linearity, causal agnosticism, the threat of social anarchy and the frequent use of the mise en abyme, while running counter to these are narratives of heroism, moral responsibility and the dignity of human choice. For Goh, Nolan is a ‘reluctant postmodernist’. His films reflect the cynicism of the modern world, but with their representation of heroic moral triumphs, they also resist it.
APA, Harvard, Vancouver, ISO, and other styles
9

Tom, Grant, and Brent Richard. Part I The International Law of Tainted Money, 1 General Introduction: Some Problems Relating to the Role of International Law. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780198716587.003.0001.

Full text
Abstract:
This book is concerned with the emergence of an international law of money laundering. The Introduction explains that a re-ordering of international monetary relations after World War II necessitated new approaches to the law of money in general. Epochal changes in monetary relations across borders have resulted in review and revision of the rules of international law concerned with money, and, accordingly, governments, legislatures, courts, and commentators have needed to re-visit those rules occasionally. The international law of money laundering has mostly been grafted upon the world’s monetary system; it has not involved the creation of a completely new system. However, the Introduction argues, it has had a significant impact. The impetus that has led states and international organizations to adopt money laundering rules at the international level is a reaction to a threat, or series of threats, originating largely outside the system. These threats include: organized crime on an international and macro-economic scale; terrorism; and the need to change the conduct of some states. This book as a whole presents an account of international law in its present evolving state in the field of tainted money. The chapters herein aim to address the law as it currently is; and close with a look at where the future of money might take us and those who aim to regulate its misuse.
APA, Harvard, Vancouver, ISO, and other styles
10

Kokkonen, Andrej, Jørgen Møller, and Anders Sundell. The Politics of Succession. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780192897510.001.0001.

Full text
Abstract:
Abstract The problem of leadership succession is perennial; the death of the ruler poses a significant threat to the stability of any polity. Arranging for a peaceful and orderly succession has been a formidable challenge in most historical societies, and it continues to be a test that modern authoritarian regimes regularly face and often fail. There is in practice no optimal solution to the problem of who should succeed the ruler, at least not when power is vested in one person. The absence of a successor causes uncertainty and plotting; the existence of one creates another centre of power, with dangerous implications. This book documents how successions have historically been moments of violence and insecurity: The succession wars known from European history are simply the tip of the iceberg. But the book also shows that the development and spread of primogeniture—the eldest-son-taking-the-throne—mitigated the problem of succession in Europe in the period after AD 1000. Primogeniture presented a reasonable compromise that in ‘normal’ circumstances allowed for an orderly transfer of power while minimizing threats to the incumbent ruler. In a long-term historical perspective, father-to-son successions—in the context of hereditary monarchy—therefore created political stability and facilitated state-formation. Today, representative democracy does the same, but in a very different way where frequent rotations in power and guarantees against the misuse of power are used to lessen the stakes of leadership succession.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Missed thrust"

1

Jensen, Jostein, Inger Anne Tøndel, and Per Håkon Meland. "Experimental Threat Model Reuse with Misuse Case Diagrams." In Information and Communications Security, 355–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17650-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ristanovic, E. "Bioterrorism — Risk and Threat: The Misuse of Science." In Counteraction to Chemical and Biological Terrorism in East European Countries, 121–25. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2342-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Sharful Islam, Samira Dishti Irfan, and Mohammad Niaz Morshed Khan. "Methamphetamine Use and Chemsex: An Emerging Threat for gender and sexually diverse people." In Handbook of Substance Misuse and Addictions, 1–26. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-67928-6_146-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Sharful Islam, Samira Dishti Irfan, and Mohammad Niaz Morshed Khan. "Methamphetamine Use and Chemsex: An Emerging Threat for Gender and Sexually Diverse People." In Handbook of Substance Misuse and Addictions, 2689–714. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92392-1_146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McIlveen, Peter, and Harsha N. Perera. "Abuse and Misuse of Psychometrics as a Threat to Vocational Psychology." In International Handbook of Career Guidance, 721–34. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25153-6_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stanger, Allison. "The Real Cost of Surveillance Capitalism: Digital Humanism in the United States and Europe." In Perspectives on Digital Humanism, 33–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86144-5_5.

Full text
Abstract:
AbstractShoshana Zuboff’s international best seller, The Age of Surveillance Capitalism: The Fight for a Human Future at the Frontier of Power, has rightfully alarmed citizens of free societies about the uses and misuses of their personal data. Yet the concept of surveillance capitalism, from a global perspective, ultimately obscures more than it reveals. The real threat to liberal democracies is not capitalism but the growing inequalities that corporate surveillance in its unfettered form both reveals and exacerbates. By unclearly specifying the causal mechanisms of the very real negative costs she identifies, Zuboff creates the impression that capitalism itself is the culprit, when the real source of the problem is the absence of good governance.
APA, Harvard, Vancouver, ISO, and other styles
7

Čtvrtník, Mikuláš. "The Paradox of Archiving: Personality Protection and a Threat in One—Archives and Child Sexual Abuse." In Archives and Records, 91–110. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-18667-7_4.

Full text
Abstract:
AbstractPerspectives on the protection of the individual are usually based primarily on the question of how a person and their personality rights may be harmed by the retention and disclosure of data concerning this particular individual. Hence the intentions of the European GDPR to allow for “minimisation” and “storage limitation” when it comes to personal data and the correlating “right to be forgotten” (“right to erasure”). Although these intentions apply primarily to data controllers other than archives, most often of private law provenance, they also apply to archives. Along with this trend, however, the opposite perspective proportionally fades, which is the starting point of this chapter: Apart from the risks associated with the preservation and disclosure of personal data, archiving in the public interest is also one of the tools by which the protection of personality rights can be implemented, even enhanced. Permanent preservation of certain categories of personal data is not only necessary for various future research purposes and official interests, but in some cases such preservation becomes the key guarantee of the protection of personality as well as other human and civil rights. The author will demonstrate this thesis on some specific cases including a specific category of records testifying about sexual abuse inside and outside the Church and the protection of victim rights. An analysis of the opposite situation, in which personal data, especially in archival records, have been misused, will be discussed in more detail in the following chapters.
APA, Harvard, Vancouver, ISO, and other styles
8

Leiman, Ashley, and Nilofer Ghaffar. "Use, misuse and abuse of the orang utan — exploitation as a threat or the only real salvation?" In The Exploitation of Mammal Populations, 345–57. Dordrecht: Springer Netherlands, 1996. http://dx.doi.org/10.1007/978-94-009-1525-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Specht, Felix, and Jens Otto. "Hardening Deep Neural Networks in Condition Monitoring Systems against Adversarial Example Attacks." In Machine Learning for Cyber Physical Systems, 103–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_11.

Full text
Abstract:
AbstractCondition monitoring systems based on deep neural networks are used for system failure detection in cyber-physical production systems. However, deep neural networks are vulnerable to attacks with adversarial examples. Adversarial examples are manipulated inputs, e.g. sensor signals, are able to mislead a deep neural network into misclassification. A consequence of such an attack may be the manipulation of the physical production process of a cyber-physical production system without being recognized by the condition monitoring system. This can result in a serious threat for production systems and employees. This work introduces an approach named CyberProtect to prevent misclassification caused by adversarial example attacks. The approach generates adversarial examples for retraining a deep neural network which results in a hardened variant of the deep neural network. The hardened deep neural network sustains a significant better classification rate (82% compared to 20%) while under attack with adversarial examples, as shown by empirical results.
APA, Harvard, Vancouver, ISO, and other styles
10

Ho, Calvin W. L., and Tsung-Ling Lee. "Global Governance of Anti-microbial Resistance: A Legal and Regulatory Toolkit." In Ethics and Drug Resistance: Collective Responsibility for Global Public Health, 401–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-27874-8_25.

Full text
Abstract:
Abstract Recognizing that antimicrobial resistance (AMR) poses a serious threat to global public health, the World Health Organization (WHO) has adopted a Global Action Plan (GAP) at the May 2015 World Health Assembly. Underscoring that systematic misuse and overuse of drugs in human medicine and food production is a global public health concern, the GAP-AMR urges concerted efforts across governments and private sectors, including pharmaceutical industry, medical professionals, agricultural industry, among others. The GAP has a threefold aim: (1) to ensure a continuous use of effective and safe medicines for treatment and prevention of infectious diseases; (2) to encourage a responsible use of medicines; and (3) to engage countries to develop their national actions on AMR in keeping with the recommendations. While the GAP is a necessary step to enable multilateral actions, it must be supported by effective governance in order to realize the proposed aims. This chapter has a threefold purpose: (1) To identify regulatory principles embedded in key WHO documents relating to AMR and the GAP-AMR; (2) To consider the legal and regulatory actions or interventions that countries could use to strengthen their regulatory lever for AMR containment; and (3) To highlight the crucial role of the regulatory lever in enabling other levers under a whole-of-system approach. Effective AMR containment requires a clearer understanding of how the regulatory lever could be implemented or enabled within health systems, as well as how it underscores and interacts with other levers within a whole-of-system approach.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Missed thrust"

1

Madni, Ashley A., William Hart, Travis Imken, David Y. Oh, and Steve Snyder. "Missed Thrust Requirements for Psyche Mission." In AIAA Propulsion and Energy 2020 Forum. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2020. http://dx.doi.org/10.2514/6.2020-3608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Laipert, Frank E., and James Longuski. "Automated Missed-Thrust Propellant Margin Analysis for Low-Thrust Missions to Mars and a Near-Earth Asteroid." In AIAA/AAS Astrodynamics Specialist Conference. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2014. http://dx.doi.org/10.2514/6.2014-4224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Laipert, Frank E., and Travis Imken. "A Monte Carlo Approach to Measuring Trajectory Performance Subject to Missed Thrust." In 2018 Space Flight Mechanics Meeting. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2018. http://dx.doi.org/10.2514/6.2018-0966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmad, M. "Confirming Reservoir Geometry and Exploration Opportunity through 5D Interpolation PSDM in The Sub-ophiolite Zone, Banggai Sula Basin, Central Sulawesi." In Indonesian Petroleum Association 44th Annual Convention and Exhibition. Indonesian Petroleum Association, 2021. http://dx.doi.org/10.29118/ipa21-g-147.

Full text
Abstract:
In 2020, Pertamina EP made another gas discovery in Banggai-Sula Basin. However, the prediction missed the top of formation by several hundred meters and therefore increased the uncertainty in the actual amount of the discovered gas resources. The previous geological model was based on 3D Pre-Stack Depth Migrated seismic data from 2018. With only one well as data control, plus complex structure and the proximity to the Batui thrust, the velocity has not been modeled correctly. To reduce the uncertainty, a reprocessed seismic data is required to help building an updated geological model. The newly drilled well, WOL-002, provides new velocity information for PSDM reprocessing. It is however located below an ophiolite layer when signals are very weak. To improve the signal to noise ratio, a powerful yet time-consuming 5D Interpolation is employed. This step significantly improves image quality especially below the thrust. Since this project is tightly time constrained, a careful parameterization has been done for improving processing efficiency. As a result, the imaging can be finished ahead of schedule. Reflector’s depth is confirmed using not only velocity data from well W-20 but also from the neighboring field. New interpretation based on the 2020 reprocessing suggests a larger structure in the subsurface compared to the previous model. This newly processed 3D seismic is also used for identifying new prospect closer toward the thrust zones.
APA, Harvard, Vancouver, ISO, and other styles
5

Encina, C. Oscar, Eduardo B. Fernandez, and A. Raúl Monge. "Threat analysis and misuse patterns of federated inter-cloud systems." In the 19th European Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2721956.2721986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sinurat, F. D. "Numerical Analysis of the Design of a Subsea Gas Pipe Route Passing the Thrust Fault Using the Finite Element Method." In Indonesian Petroleum Association 44th Annual Convention and Exhibition. Indonesian Petroleum Association, 2021. http://dx.doi.org/10.29118/ipa21-se-124.

Full text
Abstract:
In submarine pipeline route planning, there is a possibility that the pipeline route will pass through a potential geohazard in the form of an active subduction zone. The planned pipeline route in this study is located in the Arafura Sea, which cross path through a subduction zone system that has a thrust fault mechanism. To analyse the structural response of the pipe passing through the thrust fault, a numerical analysis using the finite element method is being used. Numerical modelling will accommodate the interaction of nonlinear behaviour between an API 5L X70 steel pipe and a cohesive clay soil. Then the pipe section in the fault area will be examined in detail with a parametric study of the variation in the angle of the pipe passing through the fault line and the impact of various earthquake magnitudes. The results of the numerical analysis show that the maximum von mises stress and maximum strain values will have a greater value for a larger pipe angle and a greater earthquake magnitude. The axial strain along the pipe will be significantly increased at the fault line and has a greater value for the pipe on the hanging wall than the pipe on the footwall. It can be concluded that the optimum route for the submarine pipeline passing through the thrust fault should be kept as small/short as possible against the fault line. The results of this analysis are expected to provide an overview of the behaviour of submarine pipes that pass through the thrust fault so that the pipe route designed can be optimal by considering safety, integrity, and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmed, Yahya. "Insider Threats and The Security of Organizational Data: A Qualitative Analysis Using In-Vivo Algorithm." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p45.

Full text
Abstract:
The concern of organizational management is now towards protecting their data and information against the insider threat. Who uses the opportunities as employees to undertake malicious acts on organization information assets for one reason or the other? This paper looked into the definition of insider threat, responsibility misuse, insider threat phases, insider threat levels and ways to mitigate insider threat by organizational management. The paper use qualitative approach base on Nvivo software to find the relationship between the four variables insider intention, insider level of training and security awareness, insider level of technical expertise and insider role. The findings reveals the following:  There is relationships between the insider intention, insider’s level of technical expertise, level of training and awareness, user role with insider’s behavior.  The insider threat activities affects the organization because  Malicious activities will be carried out and at the end it will affect the organizations data integrity.  Organizations are put at high risk due to low level of training and awareness. Keywords: Insider Threats, Security, Organizational Data, Qualitative Analysis, In-Vivo Algorithm .
APA, Harvard, Vancouver, ISO, and other styles
8

Kang, P., S. Tanaka, and M. Esashi. "Micro Turbocharger on a Single Silicon Rotor." In ASME Turbo Expo 2004: Power for Land, Sea, and Air. ASMEDC, 2004. http://dx.doi.org/10.1115/gt2004-53565.

Full text
Abstract:
This paper describes the design, fabrication and preliminary test of a MEMS-based turbocharger. In this device, a compressor and a turbine are formed on the same side of the rotor to escape miss-alignment during bonding process. The rotor is supported by hydrostatic journal and thrust bearings. The device rotated only at low rotation speed up to 2500 rpm, and the rotation speed did not remarkably changed by adjusting air supplies to the hydrostatic bearings. From the test results, we found important issues to be solved for high speed rotation. Concerning to fabrication, flat and smooth bearing surfaces is difficult to fabricate, and bearing/tip clearances are difficult to precisely control due to spikes on etched surfaces and the warp of the devices induced by anodic bonding. We developed special deep RIE recipe to realize spike-free, uniform etching. And, we found that the wafer warp became negligible at a bonding temperature of 320 °C and an applied voltage of 400–600 V, when a 1 mm thick Pyrex glass substrate was used. Even after 5 times anodic bonding to stack 6 wafers, the warp was below 2 μm. The other concern is on bearing design. The journal bearing has a very low L/D number (length divided by diameter). As a result, the journal bearing has a small journal surface, and it is difficult to install orifices on the journal bearing. Additionally, there is interference between the journal and thrust bearing due to air leakage.
APA, Harvard, Vancouver, ISO, and other styles
9

Prakash, Raghu, Hithesh Channegowda, and Anandavel Kaliyaperumal. "A Study on Bird Impact Damages on Shrouded Fan Blades of an Aero-Engine." In ASME 2013 Gas Turbine India Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/gtindia2013-3804.

Full text
Abstract:
Aero-engine fan blades are the critical components that are vulnerable to Foreign Object Damage (FOD) such as bird impact. The thrust loss due to bird impact can affect engine core function, resulting in catastrophic failure. The fan blades should be designed to have adequate resistance to bird impact. The present paper focuses on numerical evaluation of bird impact response on shrouded and un-shrouded rotating set of fan blades using three dimensional computational methodology. The impact response is compared between shrouded and un-shrouded blades in terms of deformation, von-Mises stress, plastic strain, and energy absorbed. Numerical analysis results indicate that the shrouded fan blade absorbs 35 % more energy compared to un-shrouded blade. Deformation damage at impact location of shrouded blade is lesser compared to un-shrouded blade. The maximum plastic strain observed on shrouded blade due to bird impact is also 50 % lesser than the un-shrouded blade. The study suggests that the shrouded fan blades provide better impact resistance characteristics to bird impact compared to un-shrouded fan blades.
APA, Harvard, Vancouver, ISO, and other styles
10

Warman, David J., David Z. Kendrick, and John D. Mackenzie. "Development of a Pipeline Post Seismic Response Screening Process." In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78422.

Full text
Abstract:
US pipeline operators may receive USGS automated earthquake notifications. In most of these cases, the seismic event poses little threat to pipeline assets. However, until an analysis is performed there can be uncertainty as to when and what actions should be taken. The paper describes the development and implementation of a simplified screening process to assess the effects of seismic events on buried pipelines. A design basis was established based on a literature review of seismic models, seismic-pipeline interactions, von Mises equivalent pipeline stress limits, standards, regulations, and practices that are currently used to assess seismic effects on buried pipelines. This design basis was used to develop a screening tool that provides a simple “pass/no pass” determination and is based on the readily obtained attributes (seismic magnitude and pipeline distance from the earthquake epicenter). “No Pass” scenarios are sub-divided into medium or high threat categories, with the latter likely needing to be evaluated on a more detailed basis. General guidelines and charts have been developed and incorporated into a general procedure to assess when and what actions should be taken.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography