To see the other types of publications on this topic, follow the link: Protect.

Dissertations / Theses on the topic 'Protect'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Protect.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Alhabashneh, Mohammad Abad Alhameed. "Protect team handler (PTH)." Thesis, University West, Department of Technology, Mathematics and Computer Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-567.

Full text
Abstract:

There is always a need for easy-to-follow processes that enable accurate and non-time consuming solutions. Nowadays we see a lot of different approaches to development processes in software engineering. This project is concerned with how to manage a software development process in a reliable, secure and efficient way. Software is available which provides some help for project managers / administrators to work more productively, with effective communication. Using such systems, it is possible to keep track of all the phases of development, including task distribution, making maximum use of previous hands-on experience and increasing productivity, to deliver a finished product in minimum time. No existing solution, however, fulfills all the desirable criteria. This paper describes the motivation, design and implementation of an improved development management system using Active Server Pages and Microsoft Internet Information Services with a backend Microsoft Access Database developed using a waterfall software development process. The resulting system is described and evaluated. This system will be beneficial for software houses, because they can communicate on the web, allowing efficiency gains by avoiding the need to call meetings for distribution of tasks among employees, with the additional advantage of location-transparent team management through the Internet.

APA, Harvard, Vancouver, ISO, and other styles
2

Ярмак, Любов Павлівна, Любовь Павловна Ярмак, Liubov Pavlivna Yarmak, and N. Novatarska. "To protect our environment." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/15998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shaibah, Hassan S. "Does Wld's protect in Drosophila?" Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pollentine, Marc. "Constructing the responsibility to protect." Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/43100/.

Full text
Abstract:
Debate about how populations can be protected from mass atrocities is well-established in international affairs. Beset with a raft of ethical, legal, political and normative questions, the rapid development of the ‘responsibility to protect’ has been held up as evidence of emerging, and even settled, consensus in this area. Indeed, from the perspective of well-established models of norm construction, notably the “Norm Life Cycle”, R2P’s institutionalization in the 2005 World Summit Outcome may signify momentum towards full acceptance. However, based upon a detailed tracing of R2P’s path into the Summit Outcome, this thesis questions how R2P is increasingly characterized as well as the theoretical explanatory frames used by scholars to describe the development and impact of international norms. It challenges the twin problems of linearity and norm exogenization which distort our understanding, and which are evident in overly optimistic portrayals of R2P’s development. With these in mind, the thesis adopts a framework constituted by a constructivist-inspired hypothesis and a process-tracing methodology defined by elite-level interviews and extensive documentary analysis. It shows how tracing the micro-processes of R2P’s development generates a very different story to those derived from broader theoretical frames. Indeed, the empirical findings show how and why the agreement was possible, and – through an analysis of the complex political negotiations – in what form R2P was collectively defined. This leads to the introduction of the concept of the ‘structured outcome’ to describe how R2P was propelled towards agreement more by a series of factors relating to the design and effect of the negotiation process than by the progressive acceptance of states. Accordingly, R2P’s formulation was purposefully limited to navigate pronounced dividing-lines and as a political agreement was more cosmetic than transformational. Resultantly its normative foundations were far shallower and far less significant than oft-rendered in mainstream perception.
APA, Harvard, Vancouver, ISO, and other styles
5

Pochatko, T. V. "Ways to protect your ideas." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/62829.

Full text
Abstract:
Nowadays the protection of intellectual property is very important in our society. Several forms of legal protection are available for your creations. Which you should use depends on what you have created.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Yaping. "Organic Coatings to Protect Ferrous Structures." Diss., North Dakota State University, 2013. https://hdl.handle.net/10365/27125.

Full text
Abstract:
Corrosion induces damages that can result in enormous costs and safety issues. Steels are the most commonly used metallic structural materials but they can corrode rapidly when exposed to corrosive environments and need to be protected. The thesis research focuses on two aspects of steel protection. The first aspect is using barrier protection mechanism to protect steel pipeline structures in the presence of Super-Critical CO2. The second aspect is improving cathodic protection of steels by metal rich coatings in ground vehicles, bridges, water tanks, and other structures. In part one, coatings for protection of steel pipeline used for carbon transportation in the form of supercritical carbon dioxide were examined. Pipeline coatings serve to protect pipelines by maintaining their integrity and to increase their service time. Different pipeline coatings with the exposure to SCCO2 have been examined, and these results will be presented here. Different parameters, such as the thickness of coatings, the exposure temperature and pressure, and the exposure time as they affect pipeline coating were investigated and will be described. In the second part of this thesis research, the addition of magnesium particles to the standard zinc particles as metal rich primer was examined for the improvement of current zinc rich coatings to serve as protection for metal substrates in Army ground vehicles. Optimization of primer formulation, such as ratio of Mg and Zn, was investigated. The test primers were exposed in accelerated weathering tests, including ASTM B117 salt spray method and ProhesionTM cycle test as part of this research. The results have been compared with the behavior of the current commercial zinc rich primers to identify the improvements in the protection of the steel with mixed metal systems. For both investigations, electrochemical impedance spectroscopy was mainly used to examine coating performance. Other tests, including color measurement, thickness measurement, X-ray diffraction measurements, and pH measurements, were used to examine the corrosion behavior of steel structures under different corrosive environments. Results showed that coating systems can protect ferrous structures in ways of barrier protection and cathodic protection and can be improved by the application of modern methods and equipment.
Department of Energy
North Dakota State University. Department of Coatings and Polymeric Materials
APA, Harvard, Vancouver, ISO, and other styles
7

MARTINS, THEO COTRIM. "DO MANDATORY DIVIDEND RULES PROTECT MINORITY SHAREDHOLDERS?" PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=16280@1.

Full text
Abstract:
Este trabalho mostra que as regras brasileiras de dividendos mínimos fazem com que a distribuição de proventos no Brasil seja alta relativamente aos Estados Unidos, apesar da fraca proteção oferecida pela lei das S.A. aos acionistas minoritários no Brasil. Ainda assim, subterfúgios legais permitem que 42% de uma ampla amostra de empresas não financeiras com ações listadas na Bovespa distribuem menos dividendos do que o previsto em estatuto. Tal retenção de ganhos poderia ser benéfica aos acionistas, visto que garante financiamento a novos projetos. Entretanto, dados de investimentos das empresas listadas na Bovespa mostram que este não parece ser o caso: à exceção de períodos com forte restrição ao crédito, a regra brasileira de dividendos mínimos protege os acionistas minoritários sem prejudicar a capacidade das firmas financiarem oportunidades de investimento.
This paper shows that Brazil s mandatory dividend rules partly explain why its average dividend yield is higher than in the U.S. And yet, several Brazilian firms bypass the mandatory dividend rules. We show that 42% of a broad sample of nonfinancial firms with shares listed at Bovespa use legal loopholes to pay fewer dividends than the amount that their statutes call for. The data suggest that the main reason for these firms to bypass the dividend rules is not to ensure financing for new projects. Instead, lower dividend payments seem to pave the way for the controlling shareholders to dilute the cash-flow rights of minority shareholders. Thus, short of credit crunch, the Brazilian mandatory dividend rules do protect minority shareholders, without making harder for firms to finance investment opportunities.
APA, Harvard, Vancouver, ISO, and other styles
8

Hayes, Kelli A. "Logical extensions of the responsibility to protect." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2197.

Full text
Abstract:
Thesis (MPhil (Philosophy))--University of Stellenbosch, 2009.
ENGLISH ABSTRACT: Are violent and non-violent mass atrocities morally different? According to the United Nations, they are. But why? The answer to this question is important as it in part determines our obligations to people living in other countries. This thesis seeks to determine if violent and non-violent mass atrocities are morally different and, if not, whether the latter should be included under the United Nations’ doctrine of the responsibility to protect. In order to do this, the thesis first examines the conditions under which sovereignty exists in order to understand when intervention can occur. It also analyzes just war theory to discern when military intervention to halt nonviolent mass atrocities is justified. Having established these two concepts, the thesis then presents three arguments for why non-violent mass atrocities are morally indistinguishable from violent ones and should also be included under the doctrine of the responsibility to protect. A discussion of the feasibility of implementing this extension and the long-term effects of these types of interventions follows. Finally, the thesis contains three case studies in order to apply the arguments presented earlier.
AFRIKAANSE OPSOMMING: Is daar ‘n morele verskil tussen gewelddadige en nie-gewelddadige gruweldade? Volgens die Verenigde Nasies is daar so ‘n verskil, maar hoekom? Die antwoord tot hierdie vraag is deels belangrik omdat dit ons verantwoordelikhede tot mense in ander lande bepaal. In hierdie tesis word daar gepoog om te bepaal of daar so ‘n verskil tussen gewelddadige en nie-gewelddadige gruweldade is, en, indien nie, of nie-gewelddadige gruweldade ook moet tel onder die Verenige Nasies se verantwoordelikheid om te beskerm. Die tesis poog eerstens om die kondisies vir soewereiniteit te bepaal ten einde te probeer verstaan wanneer ‘n intervensie moreel regverdigbaar is. Dit analiseer ook die teorie van geregverdigde oorlogvoering ten einde te bepaal wanneer militêre inmenging om nie-gewelddadige gruweldade stop te sit geregverdig is. Na hierdie twee konsepte ondersoek is word daar drie argumente verskaf om aan te toon dat nie-gewelddadige gruweldade nie moreel onderskeibaar is van gewelddadige gruweldade nie, en dus dat nie-gewelddadige gruweldade onder die verantwoordelikheid om te beskerm behoort te tel. Dit word gevolg deur ‘n bespreking van die praktiese haalbaarheid van die implementering van so ‘n uitbreiding van die verantwoordelikheid om te beskerm, asook ‘n bespreking van die langtermyn effekte van hierdie tipes intervensies. Die tesis eindig met drie gevallestudies ten einde die argumente wat reeds gemaak is toe te pas.
APA, Harvard, Vancouver, ISO, and other styles
9

Asher, Courtani. "Project protect and nurture| A grant proposal." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10076460.

Full text
Abstract:

The purpose of this project was to write a grant proposal to identify resource materials that can be used in whole or adapted for a series of workshops for K–6 school social workers and their colleagues (teachers, counselors, and support staff) aimed at enhancing their knowledge and skills in child abuse and trauma prevention and intervention. The potential host agency will be Dr. Albert Schweitzer Elementary, a school in Anaheim, California. The grant writer developed the project after an extensive review of the literature available on child abuse and trauma. The project seeks to provide social workers and their colleagues with the skills and knowledge needed to aid in the prevention and treatment of child abuse and trauma. The Weingart Foundation was chosen as the potential funding source for this project. The actual funding and submission of this grant proposal was not a requirement for successful completion of this project.

APA, Harvard, Vancouver, ISO, and other styles
10

Mazzanti, Maria Rita. "From State sovereignty to responsibility to protect." Paris, Institut d'études politiques, 2013. https://spire.sciencespo.fr/notice/2441/45eb019724sn6sg9mcu4j489l.

Full text
Abstract:
Notre étude a pour objet l’analyse des développements politiques et juridiques relatifs au concept de “Responsabilité de protéger“ (R2P). Notre recherche est conduite selon deux parcours parallèles : l’un traite de l’évolution du concept de souveraineté et de l’importance grandissante du rôle qu’assume la communauté internationale dans les affaires internes d’un Etat ; l’autre est consacré à la notion d’intervention à des fins humanitaires et des leçons qui découlent des expériences des années ‘90. Notre point de départ était que ce que la Responsabilité de protéger est ou n’est pas aujourd'hui, doit être compris à la lumière de cette évolution. Ayant délimité notre espace de recherche et identifié quels sont les éléments essentiels de la Responsabilité de protéger, nous avons evalué si, et de quelle manière la Responsabilité de protéger - après dix années d’existence - a été capable d’influencer la conduite de la communauté internationale, et, en particulier, du Conseil de Sécurité des Nations Unies. C’est pourquoi nous avons choisi d’étudier quatre cas – Libye, Côte d’Ivoire et Sri Lanka et Syrie – où la Responsabilité de protéger a été invoquée ou aurait dû l’être, pour déterminer les règles applicables à l’avenir. Nous avons adopté pour hypothèse de recherche que la Responsabilité de protéger est influencée par cinq variables indépendantes, à savoir, , la dynamique des discussions au sein du Conseil de Sécurité, la perspective d’un succès raisonnable fondée sur l’analyse coûts/bénéfices; le rôle des organisations régionales/subrégionales concernées; les activités du Conseil des droits de l´homme et l´action de la société civile
The research was aimed at understanding by means of which developments in the political and legal thinking the R2P finally reached its present shape. To this end, we analyzed on one side the evolution of the concept of absolute sovereignty and the shift towards an increased involvement of the international community in the internal affairs of the individual states, and, on the other side, the modifications incurred in the concept of intervention for humanitarian purposes and the lessons learned out of the experiences of the 1990s. We have argued that what R2P is, or is not, should be understood in the light of this long development. Having then established what now R2P is about we wanted to measure to which extent R2P was able, in the ten years of its existence, to influence the behavior of the international community, and in particular of the United Nations Security Council. Hence, we selected four cases – Libya, Côte d’Ivoire Sri Lanka and Syria – where R2P was invoked or should have been invoked, with the aim of finding regularities useful for guiding future action. Our research hypothesis was that R2P is influenced by five main independent variables, namely: the dynamic within the Security Council (active involvement of some specific countries/country representatives); reasonable perspective of success/attractive cost-benefit profile; the role of the relevant regional/sub-regional organizations; the activity of the Human Rights Council; and the action of civil society
APA, Harvard, Vancouver, ISO, and other styles
11

Roberts, Adam. "The Yazidi and the Responsibility to Protect." Thesis, University of Oregon, 2016. http://hdl.handle.net/1794/20521.

Full text
Abstract:
This thesis analyzes the international community’s response to the persecution of the Yazidi people by the Islamic State of Iraq and Syria and what implications this response has for the Responsibility to Protect doctrine. To answer this question, I chart and assess the major historical events that contributed to the emergence of the Responsibility to Protect, define the current legal status of the Responsibility to Protect, compare related sources of public international law, and investigate the relationship between the responsibility to protect doctrine and the Yazidi people through a case study of the persecution of the Yazidi people at the hands of the extremist organization known as the Islamic State of Iraq and Syria (ISIS). I found the international community’s response to the Yazidi crisis to be both inadequate and harmful to the Yazidi. Additionally, the international community’s response reinforced the unfavorable precedent set during the Libyan Intervention in 2011.
APA, Harvard, Vancouver, ISO, and other styles
12

Enjaian, Brian Michael. "WHEN AND WHY WE PROTECT OUR HONOR." UKnowledge, 2019. https://uknowledge.uky.edu/psychology_etds/158.

Full text
Abstract:
Men from a culture of honor often use physical aggression in response to threats as a way of restoring lost honor. Threats can range from being called an offensive name to someone flirting with their romantic partner. On the other hand, women from a culture of honor are expected to be submissive and avoid situations that can result in harm to their reputation. However, a recent meta-analytic review of the literature suggests that women do not always avoid situations that can harm their reputation. Rather, women in a culture of honor also use physical aggression in response to threats. In this study, I tested when and why men and women from a culture of honor use aggression in response to an honor threat. Participants (N = 1,043) responded to hypothetical scenarios that included threats to a person’s honor. Overall, men and women from a culture of honor used more aggression following a threat to their honor compared to people not from a culture of honor. People from a culture of honor also felt as though their reputation was hurt more by an honor threat than those, not from a culture of honor. The more participants felt their reputation was hurt, the more aggression they used against their attacker.
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Jia. "Increased hexosamine biosynthesis and protein O-GLCNAC protect isolated rat heart from ischemia/reperfusion injury." Thesis, Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006p/liu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

George, Alison. "Towards the development of a capsular polysaccharide-protein conjugate vaccine to protect against Burkholderia pseudomallei." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/towards-the-development-of-a-capsular-polysaccharideprotein-conjugate-vaccine-to-protect-against-burkholderia-pseudomallei(8336d2d3-a328-43e7-8fec-97924112a232).html.

Full text
Abstract:
Burkholderia pseudomallei is the causative agent of melioidosis, a debilitating disease in endemic areas and a potential biowarfare agent, for which there is currently no vaccine available. Many licensed vaccines exist for protection against a range of other bacterial pathogens and many of these are based on the cell-surface polysaccharides of the respective infectious agent. The immunogenicity of bacterial polysaccharides may be improved by conjugating to a carrier protein. The aim of this thesis was to develop a method for production and conjugation of the capsular polysaccharide (CPS) from B. pseudomallei. This involved two areas of development; to improve the production and extraction of B. pseudomallei CPS and to develop a chemical-based method for conjugation of both a synthetic CPS and a native CPS to a carrier protein. To simplify production and extraction of B. pseudomallei CPS, a recombinant source was investigated. Two genomic libraries were screened for an Escherichia coli clone containing the B. pseudomallei CPS gene cluster. A clone was identified but failed to express the CPS. The extraction and purification of CPS from B. pseudomallei was optimised to produce a pure source of material. CPS was extracted from a B. pseudomallei LPS knock-out strain, DeltarmlB and purified using an affinity chromatography column labelled with a monoclonal antibody against the CPS. This purified CPS was found to be protective in a murine model of melioidosis. Mice immunized with CPS produced higher levels of IgM and IgG and showed an increased survival compared to the control groups. Furthermore, bacterial loads were lower in organs from mice immunized with CPS, compared to the controls. A method for chemical conjugation of a synthetic B. pseudomallei CPS to the tetanus Hc fragment protein was developed using EDC to activate the protein, followed by sodium borohydride to covalently attach synthetic CPS. Unfortunately, this conjugate could not be proven using analytical methods. A second approach using CDAP activation of native CPS extracted from B. pseudomallei, followed by addition of an adipic acid dihydrazide linker and EDC-mediated attachment of the carrier protein successfully produced a conjugate vaccine candidate.
APA, Harvard, Vancouver, ISO, and other styles
15

An, Nan. "Protect Data Privacy in E-Healthcare in Sweden." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1619.

Full text
Abstract:

Sweden healthcare adopted much ICT (information and communication technology). It is a highly information intensive place. This thesis gives a brief description of the background of healthcare in Sweden and ICT adoption in healthcare, introduces an Information system security model, describes the technology and law about data privacy and carries out a case through questionnaire and interview.

APA, Harvard, Vancouver, ISO, and other styles
16

Gottwald, Marlene. "Europe's responsibility to protect : from Kosovo to Syria." Thesis, University of Edinburgh, 2014. http://hdl.handle.net/1842/16229.

Full text
Abstract:
With lessons learned from the 1999 Kosovo intervention as a point of departure, this thesis addresses the question of whether the development of the Responsibility to Protect (RtoP) doctrine and the Common Security and Defence Policy (CSDP) actually made a difference in determining whether and how Europe responded to subsequent mass atrocities in its neighbourhood. Viewing the RtoP as an emerging international norm, a social constructivist framework is applied to explore the influence of norms on European foreign policy-making. It is argued that even an emerging international norm can be influential if it is considered a legitimate behavioural claim. The influence of the RtoP will be assessed by gauging the extent to which it is distinctively used to justify foreign policy decisions and to communicate the basis for those choices to a wider audience. The development of the RtoP and the CSDP from 1999-2011 in theory and practice paves the way for an in-depth case study analysis. Focusing on the UN, the EU as well as French, German and British discourses, the question of whether the RtoP has actually made a difference will be answered by scrutinizing European responses to the Libyan crisis (March – October 2011) and the Syrian crisis (March 2011 – September 2013). Ultimately, light is shed not only on the relevance of the RtoP for Europe but also on the role of the EU as a security actor in its neighbourhood.
APA, Harvard, Vancouver, ISO, and other styles
17

Charoenchon, Nisamanee. "Can green tea catechin supplement protect against photoageing?" Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/can-green-tea-catechin-supplement-protect-against-photoageing(64eefb5f-ef37-4900-9c03-3477c8a74e50).html.

Full text
Abstract:
Photoaged skin caused by chronic ultraviolet radiation (UVR) is characterised clinically with hyperpigmentation, coarse skin texture and deep wrinkles; the worst outcome is skin cancer. Histological investigation of the alteration within major extracellular matrices (ECM; elastic fibres, fibrillar collagens) is essential study to understand the cellular effect on skin structure from UVR. This thesis used an acute dose of radiation to examine in humans in vivo the effect of UVR on ECM components before assessing whether a dietary intervention could protect skin from UVR damage. Green tea catechins (GTCs) have anti-oxidant properties and may be an interesting option as a systemic photoprotection agent. Hence this thesis assesses: 1) the effect of acute irradiation of skin on dermal ECM damage to see whether it mimics the changes observed in photoageing and; 2) whether dietary supplementation with GTC will provide dermal ECM protection. UV-induced change in elastic fibre network. Initially, the effect of two different UV light sources on elastic fibre protein (elastic fibres, fibrillin-rich microfibrils and fibulin-2 and -5 microfibrils) remodelling was performed. The effect of ultraviolet B vs full-spectrum solar simulated radiation (SSR) were investigated in a small sample of healthy Caucasian volunteers (n = 6 per group). At 24 hour after 3× MED irradiation, Weigert's resorcin–fuchsin stained elastic fibres showed a significant reduction regardless of irradiation protocol (UVB, P<0.01; SSR P<0.05). Specific components were identified by immunohistochemistry; a significant reduction in fibrillin-rich microfibrils (FRM) was observed in UVB-irradiated skin (P<0.05), whilst fibulin-5-positive microfibrils were only affected by SSR (P<0.05). The data revealed, therefore, differential effects on UV wavelength on ECM remodelling. SSR, the more physiologically relevant light source was used in subsequent studies Supplement effect in SSR-induced damage in elastic fibre. Fifty healthy volunteers were recruited to this randomised control trial to investigate whether GTC can protect skin from photodamage. Volunteers were randomized to GTC (1080 mg plus 100 mg vitamin C; n=25) or placebo (maltodextrin; n = 25) daily for 12-weeks with compliance assessed biochemically in urine samples. Of the n = 50 recruited, 44 volunteers completed the study. In baseline, UVR challenge resulted in a significant remodeling of the cutaneous elastic fiber system (P<0.001), particularly fibulin-2 and fibulin-5-positive microfibrils at 24-hr after 3×MED irradiation. In post-supplementation, fibulin-5 positive microfibrils were protected from UVR remodeling (% staining, mean ± SE; no UV, 18.1±0.89; UVR, 17.1±0.61; P=0.30) whilst no protection was seen in the placebo group (no UVR, 19.41±0.79; UVR, 17.69±0.61; P<0.05). Supplement effect in SSR-induced damage in collagenous matrix. In the identical experiment, collagenous matrices including synthesis of procollagen I was also examined as fibrillar collagens are the major ECM components providing strength within dermis. The fibrillar collagen and newly synthesised procollagen I were stained by Picrosirius red and immunohistochemistry respectively. At baseline, acute irradiation significantly reduced papillary dermal fibrillar collagens (P<0.001) and induced deposition of newly synthesised pro-collagen I (P=0.02). In post-supplementation, GTC enhanced the deposition of thin collagen fibres in the dermis. Whilst placebo showed no effect on the altered organisation of fibrillar collagens or deposition of pro-collagen I following the irradiation challenge, GTC protected the organisation of fibrillar collagens in the papillary dermis (P=0.97).This novel in vivo human study may be used to recapitulate elastic fibre and collagen changes associated with photoageing and may be useful for dissecting out the mechanisms underlying extracellular matrix damage in response to chronic sunlight exposure. Furthermore, in a randomized control trial, dietary GTC protected fibulin-5 microfibrils and collagen fibres in the papillary dermis from UV-mediated degradation. The mechanism by which this protection occurs requires further study.
APA, Harvard, Vancouver, ISO, and other styles
18

Neufeld, David A. "Planning to protect groundwater, toward an ecosystem approach." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0011/NQ30636.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hooper, R. S. "The responsibility to implement 'The Responsibility to Protect'." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604216.

Full text
Abstract:
The Responsibility to Protect offers a morally based policy that places a new responsibility on the international community to protect populations from extremes of harm caused by governments. From the policy’s text, the reason for action seems to lie, most fundamentally, in an expression of ‘our common humanity’. However, The Responsibility to Protect does not offer any justification for its proposals. It responds to the question ‘what ought to be done?’ but answers the question ‘what can be done?’ leaving in between a gap in the moral credibility of action. The thesis explores what this lack of philosophical underpinning means to the persuasive power of the policy. The thesis then examines the claim of sovereignty as responsibility and finds it confused and incomplete and lacking the detail necessary for coherent implementation. It uses the Aristotelian square of opposition to investigate the tripartite nature of the new responsibilities to prevent and rebuild. Finally, the thesis investigates the policy’s apparent assumption that an ethically based policy of humanitarian intervention can be appropriately guided by the ethical rules of war. It asks if war and humanitarian intervention are the same thing and finds that they are not. It then explores the incoherence created by using the Just War Tradition for guide R2P. If The Responsibility to Protect offers no greater generation of will and effective action to humanitarian intervention than the current ad hoc process does, its establishment as UN policy becomes a pyrrhic victory. It will result in further anomalies in response by the UN, and consequent damage to the reputation and credibility of the UN as the guardian of international peace and security.
APA, Harvard, Vancouver, ISO, and other styles
20

Ryan, Annette Coralie. "Does isoprene protect plants against complex environmental stress?" Thesis, Lancaster University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Koya, Vijay. "EVALUATION OF IMMUNOGENICITY OF TRANSGENIC CHLOROPLAST DERIVED PROTECT." Master's thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3023.

Full text
Abstract:
Anthrax, a fatal bacterial infection is caused by Bacillus anthracis, a gram-positive, spore forming, capsulated, rod shaped organism. Centers for Disease Control (CDC) lists anthrax as Category A biological agent due to its severity of impact on human health, high mortality rate, acuteness of the disease and potential for delivery as a biological weapon. The currently available human vaccine in the United States (AVA anthrax vaccine adsorbed) is prepared from Alum adsorbed formalin treated supernatant culture of toxigenic, non-encapsulated strain of Bacillus anthracis with the principle component being protective antigen (PA83). Evaluation of anthrax vaccine given to nearly 400,000 US military personnel by Vaccine Adverse Event Reporting System (VAERS) showed adverse effects such as flu-like symptoms, local pain, large degree of inflammation, edema, malaise, rash, arthralgia, and headache following vaccination. All the adverse reactions are attributed to the composition of vaccine components. These vaccine preparations contain trace contaminants of lethal and edema factors that contribute to the adverse side effects. Also, the current method of vaccine manufacture has limited production capacity.The production of PA83, in plants through chloroplast genetic engineering might eliminate the concerns of adverse side effects and the levels of expression would ensure the availability of vaccine for the human population in an environmentally friendly approach. The primary concern is whether the PA83 purified from transgenic chloroplasts is as immunogenic as the PA83 in the AVA. For this, PA83 has been expressed in transgenic chloroplasts of Nicotiana tabacum var. petit Havana, by inserting the pag (2205 bp) with the N-terminal 6X histidine tag, into the chloroplast genome by homologous recombination. Chloroplast integration of the pag was confirmed by PCR and Southern analysis. The PA83 protein was detected in transgenic chloroplasts by immunoblot analysis using anti-PA83 antibodies. Maximum expression levels of PA83 (14.17% TSP) were observed in mature leaves upon continuous illumination, due to the presence psbA 5'UTR, a light and developmentally regulated translation enhancer sequence. The PA83 has been purified by affinity chromatography using Ni resin columns. Chloroplast derived PA83 was functional in vitro and was able to lyse the mouse macrophages when combined with the lethal factor. The in vitro assays showed that the crude extracts contained up to 20ug/ml of functional PA83.The immunization studies of PA83 on Balb/c mice, revealed highly immunogenic IgG titers. Subcutaneous immunization with purified chloroplast derived PA83 with adjuvant yielded IgG titers up to 1:320,000, similar to that of the group immunized with PA83 derived from Bacillus anthracis. Immunization of groups with PA83 combined with alhydrogel adjuvant showed four - eight times higher immune response than the groups without adjuvant. The higher expression levels of PA83 in transgenic chloroplasts might ensure the availability of anthrax vaccine to the general public and the high immune response observed in the mouse model would enable the replacement of the current AVA with a cleaner and safer vaccine.
M.S.
Department of Molecular Biology and Microbiology
Burnett College of Biomedical Sciences
Molecular Biology and Microbiology
APA, Harvard, Vancouver, ISO, and other styles
22

Russell, Brandon. "How to protect your firm against rogue traders." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/72017.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2004.
ENGLISH ABSTRACT: Many companies have suffered large financial losses as a result of the actions of rogue traders; traders taking unauthorised positions in financial markets - specifically derivatives markets. Effective operational controls must form the foundation of managing the risk of derivatives trading. A large number of institutions, specifically those directly involved in the trading of derivatives, and regulatory bodies have developed controls and procedures which firms need to put in place to help manage the risk of rogue trading. Many of the controls firms can implement are "common sense" however, there are a number of formal procedures that have been developed. These risk management practices need to be implemented and overseen by individuals who have the necessary skills and experience in dealing with the risks associated with trading in derivative instruments. Many firms consider these risk management policies and procedures to be sufficient to address the risk of rogue trading. However. many firms have come to the realisation that no matter what controls and procedures they have in place, a well-motivated rogue trader will always be able to "outfox" the system. This has Jed some firms to consider appropriate risk transference measures in addition to risk management policies and procedures. Two such measures are insurance and outsourcing. At this stage only a limited number of firms are using insuring themselves against rogue trading or outsourcing their treasury functions. Although this number is increasing, companies should not dismiss insurance and outsourcing as effective tools to combat rogue trading, without conducting thorough cost benefit analysis. This paper offers guidelines to both the common sense and formal measures that are currently employed by firms to combat rogue trading, as well as a few "fanatical" options. As rogue traders are continuously pushing the boundaries, we should be thinking out-of-the box too.
AFRIKAANSE OPSOMMING: Talle maatskappye Iy groot finansiele verliese as gevolg van die aksies van slenterhandelaars; handelaars wat ongemagtigde posisies in finansiele markte neem - veral in die handel van afgeleide instrumente. Effektiewe operasionele kontrole moet die basis vorm om die risiko van handel in afgeleide instrumente te beheer. 'n Groot aantal instellings, spesifiek die wat direk betrokke is by handel in afgeleide instrumente, en regulerende liggame het kontrolemaatreels en prosedures ontwikkel wat maatskappye in plek moet plaas om die risiko van ongemagtigde handel te help bestuur. Verskeie van hierdie kontroles wat maatskappye kan implementeer is algemene kennis, maar 'n paar formele prosedures is ook ontwikkel. Hierdie risikobestuursaksies behoort ge·implementeer en bestuur te word deur individue wat die nodige vaardighede en ondervinding het om die risiko's te bestuur wat geassosieer word met handel in afgeleide instrumente. Verskeie maatskappye beskou hierdie risikobestuursbeleidsriglyne en prosedures as voldoende om die risiko van ongemagtigde handel aan te spreek. Verskeie maatskappye het egter tot die besef gekom dat ongeag watter kontroles en prosedures in plek is, 'n goedgemotiveerde slenterhandelaar altyd 'n manier sal vind om die stelsel te omseil. Dit het daartoe gelei dat maatskappye bo en behalwe risikobestuursbeleid en prosedures, geskikte stappe oorweeg om risiko oor te dra, waarvan versekering en uitkontraktering twee insluit. In hierdie stadium gebruik slegs 'n beperkte aantal maatskappye versekering teen ongemagtigde handel of uitkontraktering van hul tesourie. Alhoewel hierdie getal besig is om toe te neem, moet maatskappye nie versekering of uitkontraktering as effektiewe teenmaatreels teen ongemagtigde handel uitsluit voordat hulle nie deeglike koste-voordeel analises gedoen het nie. Hierdie tesis bied riglyne vir beide die algemene kennis en formele maatreels wat tans deur maatskappye gebruik word om ongemagtigde handel te keer, maar sluit ook 'n paar "fanatiese" voorstelle in. Aangesien slenterhandelaars aanhoudend besig is om die grense te oorskry, moet ons ook verby die voor-die-hand-liggende kyk.
APA, Harvard, Vancouver, ISO, and other styles
23

Hümpfner-Hierl, Heike, Alexander Bohne, Andreas Schaller, Gert Wollny, and Thomas Hierl. "Does facial soft tissue protect against zygomatic fractures?" Universitätsbibliothek Leipzig, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-171696.

Full text
Abstract:
Introduction: Zygomatic fractures form a major entity in craniomaxillofacial traumatology. Few studies have dealt with biomechanical basics and none with the role of the facial soft tissues. Therefore this study should investigate, whether facial soft tissue plays a protecting role in lateral midfacial trauma.
APA, Harvard, Vancouver, ISO, and other styles
24

Hurst, MaryKathryn. "VEGF-R1 AGONISTS PROTECT CARDIOMYOCYTES AGAINST OXIDATIVE STRESS." Master's thesis, Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/239774.

Full text
Abstract:
Biomedical Sciences
M.S.
VEGF-R1 Agonists protect Cardiomyocytes against Oxidative Stress Background: Selective agonists of the vascular endothelial growth factor receptor 1 (VEGFR-1) display cytoprotective and anti-apoptotic effects in the failing heart. Since a major determinant of myocardial damage in heart failure is oxidative stress, we tested the hypothesis that VEGFR-1 mediates anti-oxidant mechanisms. Methods: Freshly prepared cardiac tissue slices were obtained from dogs with pacing-induced heart failure that had been previously transduced with the VEGFR-1 selective ligand VEGF-B. Dihydroetidium (DHE) fluorescence was used to monitor the production of reactive oxygen species. In addition, cultured rat neonatal cardiomyocytes were tested with two major mediators causing oxidative stress in the failing heart, namely angiotensin II (10-8 M for 24 hours) and norepinephrine (50 µM for 24 hours). The experiments were performed in the absence or in the presence of the VEGFR-1 agonists VEGF-B and PlGF or of the mixed VEGFR-1 and VEGFR-2 agonist VEGF-A or of the selective VEGFR-2 agonist VEGF-E. Mitochondrial superoxide and cytosolic hydrogen peroxide were measured, respectively, as MitoSox and DCF fluorescence intensity. Results: In fresh cardiac tissue slices, DHE fluorescence indicated that superoxide production was significantly reduced in VEGF-B treated hearts compared to control failing hearts. In cultured cardiomyocytes, VEGF-B and PlGF, but not VEGF-A or VEGF-E, prevented mitochondrial superoxide and cytosolic hydrogen peroxide overproduction in response to angiotensin II or norepinephrine. These findings were consistent with the induction of mitochondrial superoxide dismutase and glutathione peroxidase-1 overexpression in VEGF-B-treated cells. Conclusions: VEGF-R1 activation can reduce oxidative stress both in vivo and in vitro. Our results provide insights in the cardioprotective mechanisms activated by VEGF-B gene therapy in the failing heart.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
25

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Full text
Abstract:
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were found: (1) most recommendations are such that implementing the strategies would serve to protect against opportunistic, low-skilled attacks; (2) most recommendations could be considered routine precautions, that when bundled, would secure most people against cyber-theft; and finally, (3) the Situational Crime Prevention framework was not fully realized because much of cyber-theft does not involve direct victim-perpetrator interactions. From these three themes policy recommendation and limitations are presented as well as avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
26

Spencer, Valero Lilian Maritza. "Monoclonal antibodies binding to malarial merozoite surface protein 1 protect in vivo against plasmodium yoelii infection." Thesis, Open University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Potter, Elizabeth Katherine. "Do family-style restaurants support, protect and promote breastfeeding?" Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0027/MQ33260.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mendoza, Noriega Maria Teresa. "Alternatives to protect the OTC market againist counterparty risk." Thesis, Universidad de las Américas Puebla, 2012. http://catarina.udlap.mx/u_dl_a/tales/documentos/lni/mendoza_n_mt/.

Full text
Abstract:
This thesis assesses the implications that netting practices, collateralization and centralization of the risk in Central Counterparties (CCPs) have on the structure of Over-the-Counter (OTC) derivative market and determine when those practices are plausible alternatives to protect OTC market against counterparty risk. Benefits and disadvantages are addressed from a general and a specific perspective. The general scope discusses the positive and negative implications that affect the structure of OTC derivative market as a whole, while the specific scope include the direct implications for market participants from a narrower point of view. The theoretical framework is based mainly on literature from books, journal papers, regulative approaches from financial authorities and statistical data from the BIS and ISDA. The outcomes from the three assessments are: (i) Bilateral and multilateral netting is justified when the reduction of counterparty credit risk and cost advantages obtained from closing-out positions are greater than the legal risk and operational risk; (ii) The risks and costs derived from collateral are justified when there is a clear reduction of counterparty credit risk and capital requirements; when collateral is well segregated from other companies´ assets and is liquid enough to cover exposure; and when there are already risk management practices in place that control the increase of other risks; (iii) Centralizing risk in CCPs is justified if the reduction of counterparty risk by mutualising losses of counterparties is greater than the potential systemic risk from the centralization of trading and if the reduction of operational risk, market risk, legal risk, capital requirements, costs and time invested in management practices are greater than the potential benefits obtained in bilateral agreements outside of a CCP.
APA, Harvard, Vancouver, ISO, and other styles
29

Weisser, Shelley Bonnie. "Alternatively activated macrophages protect mice during induced intestinal inflammation." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Nasir, Amina. "The Responsibility to Protect Applied to Internally Displaced Persons." Thesis, University of Kent, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.520859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Parajuly, Krishna Prasad. "Responsibility to Protect (R2P) : The Reconceptualization of Humanitarian Intervention." Thesis, Linköpings universitet, Statsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-111929.

Full text
Abstract:
I have analyzed humanitarian intervention within the framework of Responsibility to Protect (R2P), particularly in relation to the three statements of my thesis. First, the conceptual aspect of humanitarian is discussed in regards to the definition of sovereignty fostered by the norm, and limitations and constraints on the practice. Secondly, inadequacy of the Chapter VII of the UN Charter to understand the nature and dynamics of conflicts today is dealt and whether the gap is looked up to. Third, the partnership with regional organizations and agencies as imagined by the norm is discussed as to find out whether this approach takes real politics in its consideration about conflict solution. Underneath this split analysis lies the single purpose of understanding humanitarian intervention under the light of Responsibility to Protect (R2P).
APA, Harvard, Vancouver, ISO, and other styles
32

Mapel, Monica. "Protecting those who protect us: federal law enforcement deconfliction." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41414.

Full text
Abstract:
CHDS State/Local
Police-on-police encounters, also referred to as Blue-on-Blue, are serious occurrences that can compromise investigations, cause physical injuries, or worse'result in death to officers, informants and/or innocent bystanders. Law enforcement deconfliction is the protocol that was developed to address this specific issue. This research focuses on the scope and breadth of federal law enforcement deconfliction processes within the United States. An examination of these processes uncovered complex organizational issues and human factors that undermine complete and consistent reporting of both failed and successful deconfliction events. With national oversight and accountability, however, gaps and vulnerabilities in deconfliction operations could be addressed, and a repository to archive and evaluate these efforts could be formed. This thesis proposes that the Blue Diamond Deconfliction Division (BD3) should be established within the United States Attorney's Office to provide deconfliction oversight and reporting, reduce federal law enforcement organizational and fiscal inefficiencies, and most importantly, save lives.
APA, Harvard, Vancouver, ISO, and other styles
33

Ewins, Benjamin Alan. "Molecular mechanisms by which isoflavones protect against cardiovascular disease." Thesis, University of Reading, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Denney, Anne. "Redesigning River des Peres: to improve, protect, and maintain." Kansas State University, 2013. http://hdl.handle.net/2097/15632.

Full text
Abstract:
Master of Landscape Architecture
Department of Landscape Architecture, Regional and Community Planning
Tim Keane
During a 75-year building boom starting in the early to mid 1900's we built most of the stormwater and sewage infrastructure that sustains us today. As these infrastructural systems begin to meet their life expectancy, and with our cities being impacted by flooding, rapid urbanization, and water quality concerns there is a need for designers to begin rethinking these infrastructural systems. With rapid urbanization cities are seeing increased peak flow discharge volumes within their river systems and combined sewer overflow occurrences. The River des Peres located in the City and County of Saint Louis, Missouri, is an urban waterway that is affecting the natural ecosystem and community well-being. The main stem of the River des Peres is a heavily degraded concrete trapezoidal channel that in 1988 became a National Historic Civil Engineering landmark for its sewerage and drainage works. Which leads to the question of why a historic civil engineering landmark, such as the River des Peres, is such a wreck today? In compliance with the Clean Water Act the Metropolitan St. Louis Sewer District is proposing to implement enhanced green infrastructure and stormwater/sewer storage tanks to reduce the amount of Combined Sewer Overflow (CSO) occurrences in the River des Peres watershed. However, through review of literature, site inventory and analysis, a watershed stormwater BMP plan, and corresponding site design developments it has been found that return frequency flow can be reduced as much as 56% in the watershed, reducing the need for storage tanks and reducing CSO occurrences. Through the incorporation of stormwater best management practices (BMPs) the River des Peres responds to recurrence flow, wildlife habitat, and to the well-being of the community.
APA, Harvard, Vancouver, ISO, and other styles
35

Stevens, Laura J. "Engineering durable late blight resistance to protect solanaceous plants." Thesis, University of Dundee, 2016. https://discovery.dundee.ac.uk/en/studentTheses/27fe2bc9-ac18-4000-a3cf-9bb895cabe3a.

Full text
Abstract:
Phytophthora infestans, the oomycete pathogen responsible for late blight of potato and tomato, is regarded as the biggest threat to global potato production and is thought to cost the industry around £6 billion annually. Traditionally, fungicides have been used to control the disease, but this is both economically and environmentally costly, as multiple chemical applications may be required during a single growing season. P. infestans has rapidly overcome genetic resistances introduced into cultivated potato from wild species. This provides the rationale for developing artificial resistance genes to create durable resistance to late blight disease.Phytophthora species secrete essential effectors into plant cells that target critical host cellular mechanisms to promote disease. One such P. infestans effector is AVR3aKI which is recognised by the potato R3a protein, a member of the CC-NB-LRR type resistance gene family. However, the closely related virulent form, AVR3aEM, which is homozygous in more than 70% of wild P. infestans isolates, evades this recognition. Domain swapping experiments have revealed that the LRR domain of R3a is involved in recognition of AVR3aKI, as the CC-NB domain of an R3a-paralog which does not mediate recognition of AVR3aKI, is able to induce a HR when combined with the LRR of wild-type R3a. However, a chimeric protein consisting of the CC-NB domain of a more distantly-related homolog of R3a and the LRR of domain of R3a, is unable to recognise AVR3aKI, suggesting that function is achieved only when the different domains of an R protein are attuned to recognition and signalling. Gain-of-function variants of R3a (R3a*), engineered by an iterative process of error-prone PCR, DNA fragmentation, re-assembly of the leucine rich repeat (LRR)-encoding region of R3a, are able to recognise both forms of AVR3a. This gain-of-recognition is accompanied by a gain-of-mechanism, as shown by a cellular re-localisation from the cytoplasm to prevacuolar compartments upon perception of recognised effector forms. However, R3a* variants do not confer resistance to AVR3aEM-carrying isolates of P. infestans.Future efforts will target the NB-ARC domain of R3a, in a bid to fine-tune the intra-cellular signalling of gain-of-recognition R3a* variants. It is hoped that a shuffled R3a* gene, capable of conferring resistance to P. infestans isolates harbouring AVR3aEM, will provide durable late blight resistance when deployed in the field in combination with other mechanistically different R proteins.
APA, Harvard, Vancouver, ISO, and other styles
36

Yahya, Farashazillah. "A security framework to protect data in cloud storage." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/415861/.

Full text
Abstract:
According to Cisco Global Cloud Index, cloud storage users will store 1.6 Gigabytes data per month by 2019, compared to 992 megabytes data per month in 2014. With this trend, it has been shown that more and more data will reside in cloud storage and it is expected to grow further. As cloud storage is becoming an option for users for keeping their data online, it comes with security concerns for protecting data from threats. This thesis addresses the need to investigate the security factors that will enable efficient security protection for data in cloud storage and the relationships that exist between the different security factors. Consequently, this research has developed a conceptual framework that supports security in cloud storage. The main contribution of this research is the development of a Cloud Storage Security Framework (CSSF) to support an integrative approach to understanding and evaluating security in cloud storage. The framework enables understanding of the makeup of security in cloud storage and measures the understanding of security in cloud storage. Drawing upon established theories and prior research findings, the framework indicates that security in cloud storage can be determined by nine factors: (1) security policies implementation in cloud storage, security measure that relates to (2) protecting the data accessed in cloud storage; (3) modifications of data stored; (4) accessibility of data stored in cloud storage; (5) non-repudiation to the data stored; (6) authenticity of the original data; (7) reliability of the cloud storage services; (8) accountability of service provision; and (9) auditability of the data accessed and stored in cloud storage. An example of CSSF application has been demonstrated through the development of a measuring instrument called Security Rating Score (SecRaS) and through a series of experiments, SecRaS has been validated and used in a research scenario. The instrument consists of several items generated using goal-question-metric approach. These potential items were evaluated by a series of experiments; the security experts assessed using content validity ratio while the security practitioners took part in the validation study. The validation study completed two experiments that look into the correlation analyses and internal reliability. SecRaS instrument was later applied in a research scenario; the validated instrument was distributed and a number of 218 usable responses were received. Using structural equation modelling, the data has revealed a good fit of the measurement analyses and structural model. The key findings were as follow: the relationships between factors were found to have both direct and indirect effects in the result. While establishing the relationship(s) among the factors, the structural model proposes three types of causal relationships in terms of how the security implementation in cloud storage could be affected by the security factors. This thesis presents a detailed discussion of the CSSF development, confirmation, and application in a research scenario. For security managers, CSSF offers a new paradigm on how stakeholders can make cloud storage security implementation successful in some depth. For security practitioners, the CSSF enables deconstruction of the concept of security in cloud storage into smaller, conceptually distinct and manageable factors to guide the design of security in cloud storage. For researchers, the CSSF provides a common framework in which to conceptualise their research and make it easier to see how the security factors fit into the larger picture.
APA, Harvard, Vancouver, ISO, and other styles
37

Gavinio, Roberto. "PINK1 and Parkin complementarily protect dopaminergic neurons in vertebrates." Kyoto University, 2013. http://hdl.handle.net/2433/180338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Dehghani, Sanij Mohammad Saied. "Optimal Resource Allocation Strategies to Protect Network-structured Systems." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/78042.

Full text
Abstract:
Protection of critical national infrastructure has received significant attention in the past recent years. As a result, researchers have developed methods to preserve and maintain critical infrastructure systems and minimize their vulnerability to disasters and disruptions. However, these models are often customized to meet the characteristics and functionality requirements for a particular system, and are computationally intensive and require simplifying assumptions. In this study, we first develop a tractable and relatively comprehensive model for optimizing maintenance planning of generic network-structured systems. We considered both linear and nonlinear objective functions for our problems. We then reformulate the model in order to enhance its computational effectiveness for large scale complex problems. The proposed modeling framework inherently captures the network topography, the stochastic nature of disruptions, and can be applied to network-structured systems for which performance is assessed based on network flow efficiency and mobility. A hypothetical small-sized network is used to illustrate the developed models, and the pro- posed models are also applied to analyze a larger scale real network in order to assess their relative computational effectiveness and robustness. We selected the Istanbul highway net- work for the latter purpose because of its critical location and also because it has been considered in previous studies, which enables us to compare the effectiveness of our models with an existing model in the literature. We designed several test cases (considering single and multiple treatment types, and linear and nonlinear objectives), and solved them on the NEOS server using different available software. The results demonstrate that our models are capable of attaining optimal solutions within a very short time. Furthermore, the linear model is shown to yield a good approximation to the nonlinear model (it determined solutions within 0.3% of optimality, on average). Moreover, in both cases (our hypothetical illustrative example and the Istanbul highway network), the optimal policies obtained appear to favor the selection of fewer links and to apply a higher quality treatment to them.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
39

Henderson-Howat, Fenella. "Displaced persons in South Sudan - whose responsibility to protect?" Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/23755.

Full text
Abstract:
There have been severe shortcomings in the protection of internally displaced persons (IDPs), and gaps in research with academic and legal focus remaining on refugees instead. These gaps are revealed and correspondingly explored in this thesis through a case study analysis of South Sudan. The main objective of this thesis is to expose the overall protection discrepancies facing IDPs, and the need to re-address international responsibility to protect in cases where national authorities are unable or unwilling to do so. The lack of a clear definition, legal status and institutional framework at an international level is shown to have an adverse impact on protection. The case study of South Sudan is introduced through an overall analysis of key events and displacement trends. Evidence in support of the main argument is presented through an analysis of the injustices and human rights violations facing IDPs in South Sudan. The roles of the two major providers of protection in South Sudan - the national authorities and the international community - are evaluated to ultimately show how a more flexible approach must be adopted by the international community in such cases. Overall, this thesis seeks to bring the displaced in South Sudan to the forefront of the debate about who is responsible for their protection.
APA, Harvard, Vancouver, ISO, and other styles
40

Rosenälv, Sandra. "Responsibility to protect : a legal principle in international law?" Thesis, Stockholms universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-142938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Nyström, Frida. "Responsibility to Protect och utbildningen av soldater : En komparativ fallstudie om kopplingen mellan Responsibility to Protect och utbildningen av soldater i Sverige och USA." Thesis, Karlstads universitet, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85719.

Full text
Abstract:
This thesis examined the connection between Responsibility to Protect (R2P) as an international norm and the education of soldiers in Sweden and America. In a number of military handbooks and guides, the United States has emphasized the importance of R2P training as fundamental to the conduct of peace operations. One of the Swedish Armed Forces' four pillars (crimes against humanity, genocide, war crimes and ethnic cleansing) is international peace operations, which indicates that training in such operations is of great importance. Sweden and the United States have a positive stance on the UN principle R2P and have expressed themselves in that it is an important tool in the work towards peace. The education within the four crimes that are included in R2P is thus of great importance for both Sweden and the United States in peace work. Thus, the purpose of this thesis is to describe and compare the connection between R2P as an international norm and the training of soldiers in the four crimes that are included in the R2P principle. The results showed that R2P contains parts that are more or less prioritized by the Swedish and American military in terms of training of soldiers. It is clear that the principle R2P is not prioritized per se, but the education is instead given in subjects that the principle concerns, and therefore the education can be counted as being given, to a certain extent, in R2P.
APA, Harvard, Vancouver, ISO, and other styles
42

Sama, Semie. "Harnessing Environmental Justice to Protect Against Land-grabbing in Cameroon." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/35861.

Full text
Abstract:
I am submitting this thesis to the Faculty of Law, the University of Ottawa in fulfillment of the requirements for the Degree of Doctor of Philosophy (Ph.D.) in August 2016. The thesis examined the issue of land-grabbing through an environmental justice lens. The thesis first reviewed the concept of environmental justice and the threats that land-grabbing by powerful transnational corporations pose to subsistence communities in Africa. Additionally, this study investigated the adequacy of international guidelines to regulate against land-grabbing, including the Minimum Human Rights Principles, the Voluntary Guidelines on the Responsible Governance of Tenure, and the Principles for Responsible Agricultural Investments. Using Cameroon as my case study, the study also examined the adequacy of Cameroon’s land tenure rules and environmental impact assessment (EIA) system to protect vulnerable communities against land-grabbing. Drawing on examples from Cameroon, Ethiopia, Ivory Coast, Mozambique, Nigeria, Senegal, Tanzania, and Uganda, this thesis argues that subsistence communities who failed to have their customary land rights formalized or failed to adequately participate in environmental decision-making end up dispossessed of their means of surviving and thriving. There were three key findings: first, international guidelines regulating against global land-grabbing lack the binding force to coerce host states to take the necessary action to enforce the guidelines and, hence promote responsible agricultural investments. Next, the land rights of subsistence Cameroonians are not formally recognized under Cameroon`s land tenure system, making it difficult for vulnerable populations to contest these allocations or receive compensation in the event of expropriation. Thirdly, EIA follow-up in Cameroon is driven entirely by the investor: the EIA system does not encourage a joint follow-up activity initiated by all groups of stakeholders involved in EIA. Without an independent environmental oversight body that can provide expert evaluation and monitor the Cameroon government and (agricultural) corporations, there is no guarantee that proposed mitigation measures will be translated into specific actions by Herakles Farms. Based on the evaluation results, the following recommendations are made to the Cameroon Government to promote environmental justice in communities that are vulnerable to land-grabbing: (1) formalize customary land tenure, (2) promote environmental contracting; (3) encourage sustainability assessments.
APA, Harvard, Vancouver, ISO, and other styles
43

Winski, Peter A. "A CompStat counterterrorism strategy to protect train and subway systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FWinski.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2008.
Thesis Advisor(s): Brannan, David. "March 2008." Description based on title screen as viewed on May 19, 2008. Includes bibliographical references (p. 67-72). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
44

Lau, Hiu-wan Leonia, and 劉曉蘊. "Indirect benefit of vaccinating children to protect the community frominfluenza." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48423919.

Full text
Abstract:
Background Influenza causes annual, worldwide epidemics of respiratory disease that affects all segments of the population. Mass vaccination of healthy children, who are playing an important role in the transmission of influenza, is promoted to be a complementary approach in prevention and control of influenza. However, lack of published systemic review evidencing the indirect protection of vaccinating healthy children makes the implementation under uncertainty. Method A systemic review was conducted by computerized bibliographic searches in PubMed and the Cochrane Library identifying the published studies on the effectiveness and cost-effectiveness of vaccinating healthy children to control influenza epidemics by reducing transmission in the community. Any study design with vaccinating healthy children as the intervention versus control group with no influenza vaccine was included. Only outcomes measured on the contacts of children, either the community or household members were considered. Result Twenty-two articles were selected to be reviewed in this project, in which 17 of them covered the public health benefit of vaccinating healthy children to protect others in the community against influenza, and five of them were economic studies. Overall the result suggested that vaccinating health children produces a public health benefit in protecting others in the community against influenza and that it is a cost-effective measure. Discussion Targeting vaccines to healthy children should be promoted for optimal vaccine allocation, maximizing the vaccination effectiveness. Community planning on vaccine delivery infrastructure as well as educational and communicational strategies is necessary to improve influenza vaccine coverage. Further well-designed studies such as RCT with larger sample sizes, as well as studies in Hong Kong or other sub-tropical regions should be carried out and included. Moreover, large and population-based studies should be conducted to examine the overall impact of universal childhood influenza immunization.
published_or_final_version
Public Health
Master
Master of Public Health
APA, Harvard, Vancouver, ISO, and other styles
45

Martins, Fernando Miguel Pinto. "Do classified boards protect top management? : evidence from shareholder proposals." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/117995.

Full text
Abstract:
Thesis: S.M. in Management Research, Massachusetts Institute of Technology, Sloan School of Management, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 38-40).
This paper examines the relationship between classified boards and managerial entrenchment by applying a panel regression discontinuity design to shareholder proposals on board declassification. We focus on shareholder proposals that pass or fail by a small margin of votes in order to provide a causal estimate of the impact of board declassification. We find that shareholder proposal approval leads to a reduction in CEO compensation, an increase in the likelihood of CEO replacement, a positive but insignificant impact on pay-performance elasticity, and an increase in firm value. The reduction in CEO compensation is strongest among firms who possess weaker levels of corporate governance. These findings suggest that classified boards protect top management and lead to higher levels of managerial entrenchment.
by Fernando Miguel Pinto Martins.
S.M. in Management Research
APA, Harvard, Vancouver, ISO, and other styles
46

Blackwelder, Reid B. "Physician Burn Out/Wellness, How to Protect the Family Physician." Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/etsu-works/6948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Stanke, Jennifer J. "Beyond Neuronal Replacement: Embryonic Retinal Cells Protect Mature Retinal Neurons." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1250820277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lindley, Trevor Ray. "A Framework to Protect Water Distribution Systems Against Potential Intrusions." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin990722657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yoshida, Atsuhiro. "Adipose Tissue-Derived Stromal Cells Protect Hair Cells From Aminoglycoside." Kyoto University, 2012. http://hdl.handle.net/2433/157458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hays, Sally Renee Easley. "Eco-labeling as a viable option to protect groundwater quality /." view abstract or download file of text, 1999. http://wwwlib.umi.com/cr/uoregon/fullcit?p9948020.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 1999.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 141-147). Also available for download via the World Wide Web; free to University of Oregon users. Address: http://wwwlib.umi.com/cr/uoregon/fullcit?p9948020.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography