Dissertations / Theses on the topic 'Protection and Control (WAMPAC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Protection and Control (WAMPAC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Full textDepartment of Computer Science
Wang, Sheng. "Control and protection of HVDC grids." Thesis, Cardiff University, 2016. http://orca.cf.ac.uk/99015/.
Full textJutla, Dawn N. "Multiview model for protection and access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ31529.pdf.
Full textBackman, A. (Aleksi). "A brief tour on control-flow protection." Bachelor's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201904241518.
Full textAL-Shareefi, Hussein. "Neutral network corrosion control by impressed cathodic protection." Thesis, Högskolan Dalarna, Maskinteknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:du-4258.
Full textBishay-Girges, Nagui William. "Seismic protection of structures using passive control system." Thesis, University of Canterbury. Civil Engineering, 2004. http://hdl.handle.net/10092/7509.
Full textStedall, Bruce David. "The hierarchical control and protection of power systems." Thesis, University of Bath, 1994. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.760655.
Full textLi, Xinyao. "Enhanced control and protection for inverter dominated microgrids." Thesis, University of Strathclyde, 2014. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=23510.
Full textThompson, Adam Craig. "The Future of Substations: Centralized Protection and Control." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/73177.
Full textMaster of Science
Unnikrishnan, Suraj. "Adaptive Envelope Protection Methods for Aircraft." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11478.
Full textSalomonsson, Daniel. "Modeling, Control and Protection of Low-Voltage DC Microgrids." Doctoral thesis, Stockholm : Elektriska energisystem, Electric Power Systems, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4666.
Full textSweeney, Latanya. "Computational disclosure control : a primer on data privacy protection." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8589.
Full textIncludes bibliographical references (leaves 213-216) and index.
Today's globally networked society places great demand on the dissemination and sharing of person specific data for many new and exciting uses. When these data are linked together, they provide an electronic shadow of a person or organization that is as identifying and personal as a fingerprint even when the information contains no explicit identifiers, such as name and phone number. Other distinctive data, such as birth date and ZIP code, often combine uniquely and can be linked to publicly available information to re-identify individuals. Producing anonymous data that remains specific enough to be useful is often a very difficult task and practice today tends to either incorrectly believe confidentiality is maintained when it is not or produces data that are practically useless. The goal of the work presented in this book is to explore computational techniques for releasing useful information in such a way that the identity of any individual or entity contained in data cannot be recognized while the data remain practically useful. I begin by demonstrating ways to learn information about entities from publicly available information. I then provide a formal framework for reasoning about disclosure control and the ability to infer the identities of entities contained within the data. I formally define and present null-map, k-map and wrong-map as models of protection. Each model provides protection by ensuring that released information maps to no, k or incorrect entities, respectively. The book ends by examining four computational systems that attempt to maintain privacy while releasing electronic information. These systems are: (1) my Scrub System, which locates personally-identifying information in letters between doctors and notes written by clinicians; (2) my Datafly II System, which generalizes and suppresses values in field-structured data sets; (3) Statistics Netherlands' pt-Argus System, which is becoming a European standard for producing public-use data; and, (4) my k-Similar algorithm, which finds optimal solutions such that data are minimally distorted while still providing adequate protection. By introducing anonymity and quality metrics, I show that Datafly II can overprotect data, Scrub and p-Argus can fail to provide adequate protection, but k-similar finds optimal results.
by Latanya Sweeney.
Ph.D.
bin, Mohd Ariff Mohd. "Adaptive protection and control for wide-area blackout prevention." Thesis, Imperial College London, 2014. http://hdl.handle.net/10044/1/24488.
Full textScordino, Monica. "Food control: quality assurance and protection against adulteration techniques." Doctoral thesis, Università di Catania, 2012. http://hdl.handle.net/10761/1154.
Full textRosky, Jeffrey W. "Examining the relationship between risk, protection, self-control and resilience." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Dissertations/Spring2010/j_rosky_121409.pdf.
Full textKumbale, Murali. "Bulk transmission system reliability analysis of protection and control groups." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/13840.
Full textOleiwi, H. M. "Using cathodic protection to control corrosion of reinforced concrete structures." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/47895/.
Full textHuang, Chiung-Yi. "The application of phasor measurements for adaptive protection and control." Thesis, Virginia Tech, 1991. http://hdl.handle.net/10919/42131.
Full textThis thesis describes an adaptive protection scheme that performs the collection of the voltage and
current phasors during post-fault period, tracking the power swing phenomena, identifying the onset
of instability, and then issuing a stabilizing command. In this work, the protection system is to
maintain the reliability! ensure the secure operation, and prevent total collapse of the power system.
The work is based upon methods of clustering for meter placement in a bulk power system, and
selecting the pilot points for installing the phasor measurement units (PMU) to measure the bus
voltage phasors and associated branch current phasors. According to the network law, fast calculation
of state estimation can be made from these measurements. Because the on-line assessment
of transient stability has to provide a quick and approximate result, the direct method which determines
stability without explicit integration techniques is applicable in this study.
The results of the system stability prediction in real-time by digital computer simulation under
stable and unstable operating conditions are presented.
Master of Science
Miller, Kathryn M. "A test of protection-motivation theory for promoting injury control." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07112009-040238/.
Full textBreedlove, Joseph Toth. "Environmental Protection Agency enforcement and facility pollution control device selection /." Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3008288.
Full textJeram, Geoffrey James Joseph. "Open Platform for Limit Protection with Carefree Maneuver Applications." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/4933.
Full textVan, Egteren Henry John Bernard. "The control of non-localized externalities with asymmetric information." Thesis, University of British Columbia, 1989. http://hdl.handle.net/2429/31372.
Full textArts, Faculty of
Vancouver School of Economics
Graduate
Hunt, Richard K. "Hidden Failure in Protective Relays: Supervision and Control." Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/36571.
Full textMaster of Science
Zhang, Pinjia. "Active thermal protection for induction motors fed by motor control devices." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34811.
Full textVoskuijl, Mark. "Rotorcraft flight control for improved handling, loads reduction and envelope protection." Thesis, University of Liverpool, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485872.
Full textPALHARES, DIOGO FARIA DOMINGUES. "LEGAL PROTECTION TO MINORITY SHAREHOLDERS AND THE SIZE OF CONTROL BLOCKS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2008. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=12281@1.
Full textWhat is the effect of greater activity in the market for corporate control on firms´ ownership structure ? We show that, in economies with malfunctioning credit markets, illiquid entrepreneurs increase their blocks´ size, so that in a context for control, their limited resources suffices to defeat takeover attempts. As entrepreneur´s financial restriction is softened, the threat of takeovers dwindles and the size of the controlling blocks falls. The model predicts that sales of shares in carve-outs should be less sensitive to the level of activity in the market for control than thos in IPOs of independent firms.
Minh, Hyunsik Eugene. "Communication options for protection and control device in Smart Grid applications." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82401.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 74-75).
Increasing use of electricity, interest in renewable energy sources, and need for a more reliable power grid system are some of the many drivers for the concept of the Smart Grid technology. In order to achieve these goals, one of the critical elements is communication between systems or between the system and human beings. With the decreasing cost of various communication technologies, especially wireless devices and utilities, researchers are increasingly interested in implementing complex two-way communication infrastructures to enhance the quality of the grid. The protection and control relay at the distribution level is one of the key component in enhancing the efficiency, security and reliability of power grid. At present, it may be premature to apply wireless devices to power electronics and to distribution automation, especially for protection and control relays in the distribution level. While fiber technology is still very attractive for protection and control applications in general, wireless technology can bring improvements in user experience applications in the future. The ABB medium voltage group needs to overcome challenges that arise from conservative industry structure, increasing complexity and cost of the product, and needs for higher reliability and security. However, with collaborative efforts among different product groups, the medium voltage group will successfully develop next generation distribution feeder relay.
by Hyunsik Eugene Minh.
S.M.
M.B.A.
Kotze, Charl. "Biological control of the grapevine trunk disease pathogens : pruning wound protection." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/2117.
Full textIn recent years, several studies have conclusively shown that numerous pathogens, including several species in the Botryosphaeriaceae, Phomopsis, Phaeoacremonium, as well as Phaeomoniella chlamydospora and Eutypa lata, contribute to premature decline and dieback of grapevines. These pathogens have the ability to infect grapevines through pruning wounds, which leads to a wide range of symptoms developing that includes stunted growth, cankers and several types of wood necrosis. Pruning wounds stay susceptible for 2 to 16 weeks after pruning and sustained levels of pruning wound protection is therefore required. The aims of this study were to (i) evaluate the ability of several biological agents to protect pruning wounds, (ii) characterise unknown Trichoderma strains and identify their modes of action and (iii) determine the optimal time of season for biological agent application. Several biological agents were initially evaluated in a laboratory for their antagonism against trunk disease pathogens. The best performing control agents were tested in a field trial conducted on Merlot and Chenin blanc vines in the Stellenbosch region. Spurs were pruned to three buds and the fresh pruning wounds were treated with benomyl as a control treatment, Trichoderma-based commercial products, Vinevax® and Eco77®, Bacillus subtilis, and Trichoderma isolates, USPP-T1 and -T2. Seven days after treatment the pruning wounds were spray inoculated with spore suspensions of four Botryosphaeriaceae spp. (Neofusicoccum australe, N. parvum, Diplodia seriata and Lasiodiplodia theobromae), Eutypa lata, Phaeomoniella chlamydospora and Phomopsis viticola. After a period of 8 months the treatments were evaluated by isolations onto potato dextrose agar. Trichodermabased products and isolates in most cases showed equal or better efficacy than benomyl, especially USPP-T1 and -T2. Moreover, these isolates demonstrated a very good ability to colonise the wound tissue. The two uncharacterised Trichoderma isolates (USPP-T1 and USPP-T2), which were shown to be highly antagonistic toward the grapevine trunk disease pathogens, were identified by means of DNA comparison, and their ability to inhibit the mycelium growth of the trunk disease pathogens by means of volatile and non-volatile metabolite production studied. The two gene areas that were used include the internal transcribed spacers (ITS 1 and 2) and the 5.8S ribosomal RNA gene and the translation elongation factor 1 (EF). The ITS and EF sequences were aligned to published Trichoderma sequences and the percentage similarity determined and the two Trichoderma isolates were identified as Trichoderma atroviride. The volatile production of T. atroviride isolates was determined by placing an inverted Petri dish with Trichoderma on top of a dish with a pathogen isolate and then sealed with parafilm. Trichoderma isolates were grown for 2 days on PDA where after they were inverted over PDA plates containing mycelial plugs. The inhibition ranged from 23.6% for L. theobromae to 72.4% for P. viticola. Inhibition by non-volatile products was less than for the volatile inhibition. Inhibition ranged from 7.5% for N. parvum to 20.6% for L. theobromae. In the non-volatile inhibition USPP-T1 caused significantly more mycelial inhibition than USPP-T2. The timing of pruning wound treatment and subsequent penetration and colonisation of the wound site was also determined. One-year-old canes of the Shiraz and Chenin blanc cultivars were grown in a hydroponic system, pruned and spray treated with a spore suspension of Trichoderma atroviride (USPP-T1) as well as a fluorescent pigment. On intervals 1, 3, 5 and 7 days after treatment, the distal nodes were removed and dissected longitudinally. From the one half, isolations were made at various distances from the pruning surface, while the other half was observed under ultra-violet light to determine the depth of fluorescent pigment penetration. Shortly after spray-inoculation of a fresh pruning wound, Trichoderma was isolated only from the wound surface and shallow depths into the wound (2 to 5 mm). One week after inoculation, Trichoderma was isolated at 10 mm depths, and after 2 weeks, at 15 mm depths. Fluorescent pigment particles were observed to a mean depth of 6 mm, which suggests that initial isolation of Trichoderma at these depths was resultant of the physical deposition of conidia deeper into the pruning wound tissue, whereas the isolation of Trichoderma from deeper depths might be attributed to colonisation of grapevine tissue. In a vineyard trial, fluorescent pigment was spray-applied to pruning wounds of Shiraz and Chenin blanc grapevines during July and September at intervals 0, 1, 3, 7 and 14 days after pruning. One week after treatment, the distal nodes were removed and dissected longitudinally. Each half was observed under UV light and the pigment penetration measured. For Chenin blanc and Shiraz, July pruning wounds showed significant deeper penetration of the pigment than pruning wounds treated in September. Moreover, pruning wounds made in September showed pigment particles in longitudinal sections up to 1 day after pruning, whereas wounds made in July showed pigment particles up to 3 days in the xylem vessels. These findings suggest that the best time for application of a biological control agent should be within the first 24 hours after pruning.
Adewole, Adeyemi Charles. "Voltage stability assessment and wide area protection/control using synchrophasor measurements." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2380.
Full textElectric power systems are being operated closer to their designed stability limits due to the constraints caused by the continuous increase in system loading, and the lack of new power stations and transmission network infrastructure to support this increase in system loading. This coupled with the practice of long distance bulk power transmission and cascading contingencies, makes system instability and consequently blackouts inevitable. In such scenarios, system instabilities like voltage instability becomes a serious threat to the secure operation of the power system, and voltage collapse (system-wide blackouts) are prone to occur. This is often compounded by the unavailability of real-time system measurements for situational awareness from the existing Supervisory Control and Data Acquisition (SCADA)/Energy Management System (EMS) platforms which are usually based on unsynchronized SCADA measurements with a slow reporting rate of 1 measurement every 2-10 seconds. This Doctoral thesis proposes non-iterative algorithms and methods of solution based on the IEEE C37.118 synchrophasor measurements from Phasor Measurement Units (PMUs) with a high reporting rate of up to 200 measurements every second (200 fps) for voltage stability assessment and automated wide area Centralised Protection/Control (CPC) against catastrophic voltage instabilities/blackouts in power systems. Extended formulations are proposed for the Optimal Placement of PMUs (OPP) in power systems with respect to voltage stability assessment. The impact of zero injection buses, critical buses, and PMU redundancy is considered in the formulation of the OPP problem solution. The extended formulations made use of Binary Integer programming (BIP) and Modal Participation Factors (MPFs) derived from the eigenvalues of the power flow Jacobian.
Barik, Tapas Kumar. "Modern Adaptive Protection and Control Techniques for Enhancing Distribution Grid Resiliency." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103644.
Full textDoctor of Philosophy
With widespread integration of inverter-based distributed energy resources (DERs) in the distribution grid, the conventional protection and control schemes no longer hold valid. The necessity of an adaptive protection scheme increases as the DER penetration in the system increases. Apart from this, changes in system topology and variability in DER generation, also change the fault current availability in the system in real-time. Hence, the protection schemes should be able to adapt to these variations and modify their settings for proper selectivity and sensitivity towards faults in the system, especially in systems with high penetration of DERs. These protection schemes need to be modified in order to properly identify and isolate faults in the network as well as correctly identify Loss of Mains (LOM) or islanding phenomenon. Special attention is needed to plan the next course of action after the islanding occurrence. Additionally, the protective devices in distribution system should be utilized to their maximum capability to create an adaptive and smart protection system. This document elaborately explains the research work pertaining to these areas.
Hessler, Sven. "Protection of data networks by enforcing congestion control on UDP flows /." Berlin : dissertation.de, 2008. http://d-nb.info/992351677/04.
Full textROSA, Marco. "Data-at-Rest Protection and Efficient Access Control in the Cloud." Doctoral thesis, Università degli studi di Bergamo, 2020. http://hdl.handle.net/10446/181509.
Full textPECORELLI, MARICA LEONARDA. "Semi-Active Structural Control for the Seismic Protection of Cultural Heritage." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2649090.
Full textHedefine, Eeva Kaarina. "Personal Privacy Protection within Pervasive RFID Environments." Fogler Library, University of Maine, 2006. http://www.library.umaine.edu/theses/pdf/HedefineEK2006.pdf.
Full textWikman-Svahn, Per. "Ethical aspects of radiation protection." Licentiate thesis, Stockholm : Kungliga Tekniska högskolan, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3946.
Full textTodd, Katherine. "Health Protection in NSW." Master's thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/147911.
Full textKhan, Sheroz. "Coordinated protection and control in power systems : an expert system approach to interlocking management." Thesis, University of Strathclyde, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338913.
Full textChambers, C. "Industrial strength techniques for the development of PLC-based safety-related control and protection systems." Thesis, University of Sheffield, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.327619.
Full textHastings, John Charles. "A communications framework with applications in wide-area monitoring, protection and control." Thesis, Queen's University Belfast, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.726840.
Full textLiu, Tong. "Protection control unit for the multi-view on-the-fly memory model." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0002/MQ31614.pdf.
Full textAljadid, Abdolmonem Ibrahim. "Control and protection analysis for power distribution in a distributed generation system." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2192.
Full textDistributed Generation systems based on renewable energy sources, such as wind or solar are mostly intermittent sources, due to their dependency on the weather, whereas those based on other primary energy sources are non-intermittent. All of them are specially designed to be integrated into distribution systems, in order to improve the power demand of consumers. In the last few decades of the twentieth century, several different factors have played a key role in increasing interest in systems. Distributed Generation (DG) is gaining more and more attention worldwide as an alternative to large-scale central generating stations. The aim of this research project is to investigate the contribution of distributed generation in fault current level in a power distribution system. The simulation results indicate that DG can have a positive or negative impact, on the fault current level in distribution network systems. The DG location and size affect the fault level. The second aim of this research was to suggest a model-based method for design, and implementation of a protection scheme for power distribution systems, by establish algorithms in a hardware environment. The overcurrent relay was chosen for the model development because it is considered a simple and popular protection scheme, and it is a common scheme in relaying applications. The proposed relay model was tested for fault conditions applied on a simple power system in different scenarios. The overcurrent relay model was implemented in MATLAB/Simulink, by using MATLAB programming languages and the SimPowerSystem (SPS) Tool. MATLAB/SIMULINK software is applicable to the modelling of generation, transmission, distribution and industrial grids, and the analysis of the interactions of these grids. This software provides a library of standard electrical components or models such as transformers, machines, and transmission lines. Therefore, the modelling and simulations are executed using MATLAB/Simulink version 2014b
Burrow, Ryan David. "Enhancing Input/Output Correctness, Protection, Performance, and Scalability for Process Control Platforms." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89903.
Full textMaster of Science
Complex modern systems, from unmanned aircraft system to industrial plants are almost always controlled digitally. These digital control systems (DCSes) need to be verified for correctness since failures can have disastrous consequences. However, proving that a DCS will always act correctly can be infeasible if the system is too complex. In addition, with the growth of inter-connectivity of systems through the internet, malicious actors have more access than ever to attempt to cause these systems to deviate from their proper operation. This thesis seeks to solve these problems by introducing a new architecture for DCSes that uses isolated components that can be verified for correctness. In addition, safety monitors are implemented as a part of the architecture to prevent unsafe operation.
Sun, Keyao. "Protection, Control, and Auxiliary Power of Medium-Voltage High-Frequency SiC Devices." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103743.
Full textDoctor of Philosophy
The wide bandgap semiconductor enables next-generation power electronics systems with higher efficiency and higher power density which will reduce the space, weight, and cost for power supply and conversion systems, especially for renewable energy. However, by pushing the system voltage level higher to medium-voltage of tens of kilovolts, although the system has higher efficiency and simpler control, the reliability drops. This dissertation, therefore, focusing on solving the possible overcurrent, overvoltage, and gate failure issues of the power electronics system that is caused by the high voltage and high electromagnetic interference environment. By utilizing the inductance of the device, a dual-protection method is proposed to prevent the overcurrent problem. The overcurrent fault can be detected within tens of nanoseconds so that the device will not be destroyed because of the huge fault current. When multiple devices are connected in series to hold higher voltage, the voltage sharing between different devices becomes another issue. The proposed modeling and control method for series-connected devices can balance the shared voltage, and make the control system stable so that no overvoltage problem will happen due to the non-evenly distributed voltages. Besides the possible overcurrent and overvoltage problems, losing control of the devices due to the unreliable auxiliary power supply is another issue. This dissertation proposed a scalable auxiliary power network with high efficiency, high immunity to electromagnetic interference, and high reliability. In this network, a wireless power transfer converter is designed to provide enough insulation and isolation capability, while a switched capacitor converter is designed to transfer voltage from several kilovolts to tens of volts. With the proposed overcurrent protection method, voltage sharing control, and reliable auxiliary power network, systems utilizing medium-voltage wide-bandgap semiconductor will have higher reliability to be implemented for different applications.
Scalavino, Enrico. "A data protection architecture for derived data control in partially disconnected networks." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/10203.
Full textCox, Donald Patrick. "THE APPLICATION OF AUTONOMIC COMPUTING FOR THE PROTECTION OF INDUSTRIAL CONTROL SYSTEMS." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/202691.
Full textCASTELLI, FILIPPO. "Foul-control paints behavior near anodes of Impressed Current Cathodic Protection systems." Doctoral thesis, Università degli studi di Genova, 2023. https://hdl.handle.net/11567/1104637.
Full textCeccato, Silvia. "Security in Global Navigation Satellite Systems: authentication, integrity protection and access control." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.
Full textLewis, Karen Jane. "Biological control mechanisms of the mycoparasite Pythium oligandrum Drechsler." Thesis, University of Sheffield, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243848.
Full textKoski, A. (Anna). "Applicability of crude tall oil for wood protection." Doctoral thesis, University of Oulu, 2008. http://urn.fi/urn:isbn:9789514287237.
Full textUkeh, Donald A. "The identification and use of semiochemicals for the control of the maize weevil, Sitophilus zeamais (Motschulsky) in Nigeria." Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources, 2008. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=25167.
Full text