Dissertations / Theses on the topic 'Protection'

To see the other types of publications on this topic, follow the link: Protection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Koval, L. A., and T. N. Burenko. "Environmental protection." Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clausen, Jenelle. "Asset Protection." Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1429269560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bradley, Lucy. "Frost Protection." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/144680.

Full text
Abstract:
4 pp.
The variation of the first and the last frost date is due to differences in elevation, density of population and several other factor, including a variation in temperature from year to year. All these variations make it more difficult to protect plants. To adequately protect your plants from frost damage you need to understand cold weather; how plants respond to cold; how heat is transferred; how to prevent frost damage; symptoms of frost damage and how to care for plants that have been damaged by frost.
APA, Harvard, Vancouver, ISO, and other styles
5

Stevens, Katy. "Thermophysiological comfort and water resistant protection in soft shell protective garments." Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gerhardsson, Daniel. "Starter Motor Protection." Thesis, Linköping University, Vehicular Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57309.

Full text
Abstract:

Starter motors are sensitive for overheating. By estimating the temperature and

preventing cranking in time, there is an option to avoid the dangerous temperatures.

The truck manufacturer Scania CV AB proposed a master thesis that

should evaluate the need of an overheating protection for the starter motor.

The aim is to evaluate any positive effects of implementing an algorithm that

can estimate the brush temperature instead of using the available time constrain,

which allows 35 seconds of cranking with a following 2 seconds delay, allowing the

crank shaft to stop before a new start attempt is allowed. To achieve high load

on the starter motor and high temperature in the brushes, tests were performed

under

Initial testing on truck, under normal temperatures, showed that the batteries

could not run the starter motor long enough to reach high temperatures in the

brushes. This is believed to be caused by the voltage drop between the batteries

and the starter motor, causing the starter motor to run in an operating area it

is not optimized for. There are several other problems which gives a higher load

on the engine, for example oil viscosity, resulting in higher currents, but those are

not mentioned in this report.

Three different models are compared, Two State Model, Single State Model

and a Time Constrained Model. Tests and verifications show that the Two State

Model is superior when it comes to protecting the starter motor from overheating

and at the same time maximizing the cranking time. The major difference between

the Two State Model and the Single State Model are the cooling characteristics.

In the Single State Model the brush temperature drops quickly to the outside

temperature while in the Two State Model the brush temperature drops to a

second state temperature instead of the outside temperature. With the currently

implemented time constrain it is possible to overheat the starter motor. The

algorithms are optimized under cold conditions, due to problems in reaching high

temperatures under warmer conditions.

−20 Celsius.

APA, Harvard, Vancouver, ISO, and other styles
7

Mellstrand, Per. "Informed system protection /." Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/169a9a18d7974145c12572f00031dd2b?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Inuwa, A. D. "Smart motor protection." Thesis, University of Sussex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431615.

Full text
Abstract:
The temperature of the stator winding of an induction motor is monitored by measuring the resistance of the winding while the motor is in operation. By computer simulation of an induction motor controlled by thyristor phase control, using back to back connected thyristors in each phase of a 3 phase system. it is shown that the motor stator winding resistance can be deduced from the DC components of the phase voltage and current resulting from intentionally unbalancing the non-conducting periods (notches) in the voltage waveform. The DC voltage and current components are measured by integrating the unbalanced phase voltage and current over an exact number of electrical cycles. The stator winding resistance is determined by dividing the DC voltage component with the DC current component. A generalised d-q axes mathematical model of the induction motor system has been developed for the computer simulation. The practical implementation of the method using a phase controlled microprocessor motor controller and support circuitry is presented. A motor protection algorithm calculates the stator winding temperature from the measured stator resistance. displays the winding temperature and provides a motor protection function by comparing the calculated winding temperature with the temperature limit of the motor and acting accordingly. A calibration procedure before installation measures the motor stator winding resistance at cold and reads the motor's cold temperature. full load current and insulation class. Experimental results are presented and the features and the limitations of the method are discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Svensson, Niklas, and Martin Holmberg. "Offshore cable protection." Thesis, Linnéuniversitetet, Institutionen för maskinteknik (MT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34775.

Full text
Abstract:
The market for renewable energy and an international power grid is constantly growing. This project has focused on the installation and protection methods for offshore power cables. Long distance cables over e.g. oceans and smaller distances within offshore wind farms. The focus is on three different materials for the protection task; concrete, cast iron and plastics. These materials have been evaluated in aspect to strength, life-length, reliability and environmental impact. Snapp products of Sweden AB have developed a cable protective pipe of polypropylene for offshore usage. This product and its opportunities are thoroughly investigated.
APA, Harvard, Vancouver, ISO, and other styles
10

Shwani, Hazim G. "Critical infrastructure protection." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.

Full text
Abstract:

This research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.

APA, Harvard, Vancouver, ISO, and other styles
11

Khan, K. R. "Digital generator protection." Thesis, Imperial College London, 1985. http://hdl.handle.net/10044/1/37743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Witchel, Emmett Jethro 1970. "Mondriaan memory protection." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28330.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 129-135).
Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and security of computer systems, but will be adopted only if the protection mechanism does not compromise performance, and if the hardware mechanism can be used easily by existing software. Mondriaan memory protection (MMP) provides fine-grained memory protection for a linear address space, while supporting an efficient hardware implementation. MMP's use of linear addressing makes it compatible with current software programming models and program binaries, and it is also backwards compatible with current operating systems and instruction sets. MMP can be implemented efficiently because it separates protection information from program data, allowing protection information to be compressed and cached efficiently. This organization is similar to paging hardware, where the translation information for a page of data bytes is compressed to a single translation value and cached in the TLB. MMP stores protection information in tables in protected system memory, just as paging hardware stores translation information in page tables. MMP is well suited to improve the robustness of modern software. Modern software development favors modules (or plugins) as a way to structure and provide extensibility for large systems, like operating systems, web servers and web clients. Protection between modules written in unsafe languages is currently provided only by programmer convention, reducing system stability.
(cont.) Device drivers, which are implemented as loadable modules, are now the most frequent source of operating system crashes (e.g., 85% of Windows XP crashes in one study [SBL03]). MMP provides a mechanism to enforce module boundaries, increasing system robustness by isolating modules from each other and making all memory sharing explicit. We implement the MMP hardware in a simulator and modify a version of the Linux 2.4.19 operating system to use it. Linux loads its device drivers as kernel module extensions, and MMP enforces the module boundaries, only allowing the device drivers access to the memory they need to function. The memory isolation provided by MMP increases Linux's resistance to programmer error, and exposed two kernel bugs in common, heavily-tested drivers. Experiments with several benchmarks where MMP was used extensively indicate the space taken by the MMP data structures is less than 11% of the memory used by the kernel, and the kernel's runtime, according to a simple performance model, increases less than 12% (relative to an unmodified kernel).
by Emmett Jethro Witchel.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
13

Rabuzin, Tin. "Shaft Current Protection." Thesis, KTH, Industriella informations- och styrsystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177353.

Full text
Abstract:
Shaft current protection in hydro and turbo generators is an important generatorprotection issue. Currents owing in the generator shaft might damagegenerator bearings which, in turn, could reduce operating time and cause largenancial losses. Therefore, it is important to prevent operation of the generatorunder conditions of high shaft currents.In this project, task was to develop measurement and protection system thatis able to operate under certain conditions. Measurement device has to be ableto accurately measure currents lower than 1 A in a generator shaft that canvary in diameter from 16 cm up to 3 m. Also, those currents might appear infrequencies equal to multiples of line frequency. Device is to be located in alimited space and in a proximity of the generator. Thus, stray ux is expectedwhich might inuence measurements. Furthermore, since currents that haveto be measured are low, output of a measurement device is usually a low levelsignal. Such signal had to be catered for and adapted in a way that it can beused with numerical relay. After literature review and overview of possible solutions, Rogowski coil waschosen as the measurement device which will be further analysed. Two othercurrent transformers were considered which served as a good comparison withRogowski coil. Several dierent tests and measurements were made on mentionedmeasurement devices. Also, it was investigated how IEC61850-9-2 andMerging Unit (MU) could be used in this application. Upon this investigation,complete protection systems were assembled in the laboratory and they weretested. To asses the behaviour of dierent systems in the real environment, test installationwas built in the hydro power plant, Hallstahammar. This installationincluded traditional systems, with measurement signals connected to the relaya,and the one which utilized concepts of Process Bus and Merging Unit. Measurementsand tests that were made there served as a nal proof of successfulnessof protection systems. Results showed that Rogowski coil was a suitable choice for a measurementdevice due to its benecial mechanical and electrical properties. Also, tests madewith actual shaft current showed advantages of using Rogowski coil in pair withMerging Unit and process bus over traditional protection systems. Nevertheless,it was conrmed that both types of systems satisfy project requirements.
Skydd mot axelstrommar i vattenkraft- och turbo-generatorer ar mycket viktiga. Strommar kan uppkomma i generatoraxeln beroende pamagnetisk osymmetri istatorkarnan. Denna osymmetri ger upphov till en inducerad spanning i axelnsom sedan kan ge en axel-strom vid kortslutning av isolationen som rotornslager vilar pa. Om axel-strommen gar genom generatorns lager, kan lagretskadas allvarligt. Detta kommer i sin tur minska drifttiden och orsaka storaekonomiska forluster vid produktionsbortfall. Darfor ar det viktigt att detekteraom det gar axelstrommar genom generatorns lager. Examensarbetets mal var att utveckla ett mat- och skyddssystem for att detekteraaxel-strommar. Den matande enheten maste kunna detektera strommarmindre an 1 A i generatoraxeln vilken kan variera i diameter fran 16 cm upp till3 m. Dessutom kan dessa strommar ha frekvenser lika med eller multiplar avkraftnatets frekvens (50 eller 60Hz). Den matande enheten skall vidare kunnamonteras i ett trangt utrymme och i narhet av generatorns stator. Lackodefran statorn kan forvantas vara stort, och detta kan antas ha stor paverkanpamatningarna. Eftersom axelstrommen som mats ar lag, ar utsignalen franden matande enheten vanligtvis en lagnivasignal. Denna laga signalnivamasteanpassas saatt den kan anvandas i ett numeriskt rela, vilka vanligtvis kraverhogre energinivaer paingangsignalerna.Efter genomford litteraturstudie och oversikt over mojliga losningar, konkluderadesdet att en losning med Rogowski spole som matanordning borde varaintressant, och denna analyserades ytterligare. Tvastromtransformatorer medkonventionell konstruktion med karna av elektroplat valdes som jamforelse medlosningen baserad paRogowski spole. Flera olika tester och matningar gjordes. Dessutom undersoktes hur en process-bus losning enligt IEC61850-9-2LE meden Merging Unit (MU) skulle kunna anvandas i denna tillampning. Vid alladessa undersokningar har kompletta system for matning och skydd monteratsoch testats i laboratoriemiljo.For att registrera funktionen for de olika systemlosningarna i en verkligmiljo, monterades det kompletta systemet fran laboratorietesterna in i ett vattenkraftverki Hallstahammar. I detta vattenkraftverk ingar traditionella skydd-, styrnings- och kontroll-system och aven en aldre losning for att skydda generatornmot axelstrommar. Darmed kunde man jamfora prestanda mellan deolika losningarna baserade pastromtransformatorer av konventionell konstruktionmed karna av elektroplat och losningen med Rogowski spole. Signalerfran bada givarna anslots till ett numeriskt rela, och anslutning av Rogowskispolen gjordes aven via en MU till det numeriska relat. Matningar och testersom gjordes i kraftstationen kunde tas som ett slutligt bevis paatt de olikalosningarna baserade pa Rogowski spole ar en framtida losning for ett valfungerande axel-stroms skydd for generatorer. Resultaten visar att Rogowskispolen ar ett lampligt val aven med avseendepadess fordelaktiga mekaniska och elektriska egenskaper. Testerna som gjordesmed en verklig axel-strom visade tydligt fordelarna med att anvanda Rogowskispolen i kombination med MU och process bus jamfort med traditionella skyddssystem. Det ska dock understrykas att bade systemet med och det utan MUuppfyllde projektets krav.
APA, Harvard, Vancouver, ISO, and other styles
14

Krys', P. "Labour protection finansing." Thesis, Вид-во СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/13057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Merzlikina, J., and L. M. Chuchilina. "Protection of information." Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cherry, Shirley J. "Radiation Protection Review." Digital Commons @ East Tennessee State University, 2002. https://dc.etsu.edu/etsu-works/2490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Loureiro, Sergio. "Mobile code protection /." Paris : École nationale supérieure des télécommunications, 2001. http://catalogue.bnf.fr/ark:/12148/cb38828305r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Farrell-Poe, Kitt, and Susan Pater. "Private Well Protection." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2011. http://hdl.handle.net/10150/156922.

Full text
Abstract:
3 pp.
1. Drinking Water Wells; 2. Private Water Well Components; 3. Do Deeper Wells Mean Better Water; 4. Maintaining Your Private Well Water System; 5. Private Well Protection; 6. Well Water Testing and Understanding the Results; 7. Obtaining a Water Sample for Bacterial Analysis; 8. Microorganisms in Private Water Wells; 9. Lead in Private Water Wells; 10. Nitrate in Private Water Wells; 11.Arsenic in Private Water Wells; 12. Matching Drinking Water Quality Problems to Treatment Methods; 13. Commonly Available Home Water Treatment Systems; 14. Hard Water: To Soften or Not to Soften; 15. Shock Chlorination of Private Water Wells
This fact sheet is one in a series of fifteen for private water well owners. The one- to four-page fact sheets will be assembled into a two-pocket folder entitled Private Well Owners Guide. The titles will also be a part of the Changing Rural Landscapes project whose goal is to educate exurban, small acreage residents. The authors have made every effort to align the fact sheets with the proposed Arizona Cooperative Extension booklet An Arizona Well Owners Guide to Water Sources, Quality, Sources, Testing, Treatment, and Well Maintenance by Artiola and Uhlman. The private well owner project was funded by both the University of Arizonas Water Sustainability Program-Technology and Research Initiative Fund and the USDA-CSREES Region 9 Water Quality Program.
APA, Harvard, Vancouver, ISO, and other styles
19

Cherry, Shirley J. "Radiation Protection Overview." Digital Commons @ East Tennessee State University, 2006. https://dc.etsu.edu/etsu-works/2486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cherry, Shirley J. "Radiation Protection Review." Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/2492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

McGinty, Heather L. "Predicting Fear of Recurrence and Protective Health Behaviors Using Protection Motivation Theory." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3631.

Full text
Abstract:
Prior research suggests that fear of cancer recurrence is very common among cancer survivors. This study examined the extent to which Protection Motivation Theory variables of threat appraisal and coping appraisal accounted for differences in fear of recurrence and performance of health behaviors in cancer patients who recently completed treatment. It was hypothesized that greater fear of recurrence would be related to a combination of high threat appraisal and low coping appraisal. Also, it was hypothesized that higher rates of health behaviors would be related to higher threat appraisals for cancer recurrence and higher coping appraisals for reducing risk of recurrence by improving diet or exercising. A sample of 155 early-stage breast cancer patients (mean age = 59 years) who completed surgery, chemotherapy, and/or radiotherapy between 6-24 months previously (mean = 12 months) completed measures of fear of recurrence, threat appraisal (perceived risk and severity of a potential cancer recurrence), fruit and vegetable intake in the past month, exercise for the past week, and coping appraisal (perceived response efficacy and self-efficacy to perform diet and exercise recommendations to reduce recurrence risk). Basic demographic and clinical information was also collected. The study findings supported the hypothesis that the combination of threat and coping appraisal beliefs explain which breast cancer survivors report higher fear of recurrence. However, the observed results did not support the hypothesized interaction between threat and coping appraisal for predicting either diet or exercise habits. Instead, coping appraisal alone predicted both fruit and vegetable consumption and exercise habits. Future research should focus on examining these relationships longitudinally and further assess coping appraisal and how it impacts fear of recurrence.
APA, Harvard, Vancouver, ISO, and other styles
22

Alpsten, Gustav, and Sercan Samanci. "Portfolio Protection Strategies: A study on the protective put and its extensions." Thesis, KTH, Matematisk statistik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231585.

Full text
Abstract:
The need among investors to manage volatility has made itself painfully clear over the past century, particularly during sudden crashes and prolonged drawdowns in the global equity markets. This has given rise to a liquid portfolio insurance market in the form of options, as well as attracted the attention of many researchers. Previous literature has, in particular, studied the effectiveness of the widely known protective put strategy, which serially buys a put option to protect a long position in the underlying asset. The results are often uninspiring, pointing towards few, if any, protective benefits with high option premiums as a main concern. This raises the question if there are ways to improve the protective put strategy or if there are any cost-efficient alternatives that provide a relatively be.er protection. This study extends the previous literature by investigating potential improvements and alternatives to the protective put strategy. In particular, three alternative put spread strategies and one collar strategy are constructed. In addition, a modified protective put this introduced to mitigate the path dependency in a rolling protection strategy.   The results show that no option-based protection strategy can dominate the other in all market situations. Although reducing the equity position is generally more effective than buying options, we report that a collar strategy that buys 5% OTM put options and sells 5% OTM call options has an attractive risk-reward profile and protection against drawdowns. We also show that the protective put becomes more effective, both in terms of risk-adjusted return and tail protection, for longer maturities.
Hantering av volatilitet i finansiella marknader har under de senaste decennierna visat sig vara nödvändigt för investerare, framför allt i samband med krascher och långdragna nedgångar i de globala aktiemarknaderna. Detta har gett upphov till en likvid derivatmarknad i form av optioner samt väckte intresse för forskning i området. Tidigare studier har i synnerhet undersökt effektiviteten i den välkända protective put-strategin som kombinerar en lång position i underliggande aktie med en put-option. Resultaten är ofta inte tilltalande och visar få fördelar med strategin, där dess höga kostnader lyfts upp som ett stort problem. Således väcks frågan om protective put-strategin kan förbättras eller om det möjligtvis finns några kostnadseffektiva alternativ med relativt bättre säkerhet mot eventuella nedgångar i underliggande. Denna studie utvidgar tidigare forskning i området genom att undersöka förbättringsmöjligheter för och alternativ till protective put-strategin. Särskilt studeras tre olika put spread-strategier och en collar-strategi, samt en modifierad version av protective put som ämnar att minska på vägberoendet i en löpande optionsstrategi.   Resultatet från denna studie pekar på att ingen optionsbaserad strategi är universellt bäst. Generellt sett ger en avyttring av delar av aktieinnehavet ett mer effektivt skydd, men vi visar att det finns situationer då en collar-strategi som köper 5 % OTM put-optioner och säljer 5 % OTMcall-optioner har en attraktiv risk-justerad profil och säkerhet mot nedgångar. Vi visar vidare att protective put-strategin blir mer effektiv, både i termer av en risk-justerad avkastning och som säkerhet mot svansrisker, för längre förfallodatum på optionerna.
APA, Harvard, Vancouver, ISO, and other styles
23

Shi, Zhanpeng. "Investigation on Generator Loss of Excitation Protection in Generator Protection Coordination." Thesis, KTH, Elektriska energisystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119259.

Full text
Abstract:
This thesis analyzes the generator loss of excitation fault and describes an investigation on existing loss of excitation protection schemes. In addition, a simulation model is established in PSCAD to simulate the loss of excitation fault and external faults. According to the simulation results, this thesis compares the speed of different protection schemes on loss of excitation fault detection and finds the drawbacks of some protection schemes on fault detection during special operation condition. What’s more, this thesis also compares the stabilities of different loss of excitation protection schemes during generator external faults. Finally, this thesis summarizes the advantages and disadvantages of different schemes and serves as a reference for selecting the loss of excitation protection scheme.
APA, Harvard, Vancouver, ISO, and other styles
24

Fay, Franziska Maria. "Perilous protection : discipline, chastisement and child protection in schools in Zanzibar." Thesis, SOAS, University of London, 2017. http://eprints.soas.ac.uk/26491/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pavlovic, Dusan <1981&gt. "Online Gambling in the UE: from Data Protection to Gambler Protection." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8721/1/PAVLOVIC_DUSAN_tesi.pdf.

Full text
Abstract:
The thesis tends to answer how does the processing of online gamblers’ personal data, which is used for identification and commercial communication purposes, affect the protection of online gamblers in the EU? After the introduction into the context of online gambling in Europe and risks that jeopardize the protection of online gamblers and the concept of responsible gambling, the first part of the thesis sheds light on the relationship between the processing of online gamblers’ data and the provocation of problem gambling. The attention is given to the gambling-related commercial communication and its role in provoking problem gambling on one side. On other, data processing to identify gamblers is taken as a contributing factor to the recognition of problem gamblers and prevention of negative consequences deriving from gambling. In the second part of the thesis, the relations, tensions, and conflicts between the protection of online gamblers and the protection of personal data, as processed by online gambling service providers are analyzed. The work of Jaap-Henk Hoepman on privacy design strategies was used as an inspirational source for the designing of strategies for processing online gamblers’ personal data. The strategies for the processing of online gamblers’ personal data and accompanying tactics based on Hoepman’s proposals for data minimization and data separation strategies and their antipodes – data maximization and data linking strategies outline scenarios that may prevent/provoke problem gambling. The thesis analyzes the business practice regarding the types of online gambler data that is processed for gambling-related activities, including data processed for the protection of online gamblers. Finally, the legal analysis answers whether and to what extent the implementation of privacy-invasive strategies (data maximization and data linking strategies) could be lawful.
APA, Harvard, Vancouver, ISO, and other styles
26

Finken, Paul J. "Protecting the force : application of statistical process control for force protection in Bosnia /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Nilsson, Jennie. "Are Colours Worth Protecting? : An Examination of Abstract Colour Marks’ Scope of Protection." Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-11212.

Full text
Abstract:

In the search for companies to distinguish themselves from the mass, so called non-traditional trade marks have become increasingly popular, and in particular colour marks. It is now clear that abstract colour marks can be registered as trade marks, and the number of registered colour marks has increased considerably in recent years. However, it remains a lot more uncertain, mainly due to lack of case law, what the extent of colour marks’ scope of protection is. Are colours actually worth protecting? The purpose of this thesis is to examine the scope of protection of registered abstract colour marks from an EU perspective. Through this examination it will also be established whether colours are worth protecting.

The essential function of trade marks is to indicate the origin of products. Signs that are capable of being represented graphically and capable of distinguishing goods and services from one undertaking from those of other undertakings can be registered as trade marks. Colours can fulfil these criteria in certain circumstances, however, colours can practically never have distinctive character per se. Instead, they must have acquired distinctive character through use. Since it is quite difficult to register colour marks, a colour mark proprietor should be prepared to have the validity of his trade mark challenged if he issues proceedings for infringement.

There are a few national cases from EU Member States that have concerned infringement of colour marks, and in all of these the plaintiff was successful in claiming infringement. Through the decisions in these cases, general legal principles and statements made in literature, the scope of protection of colour marks has been examined. Infringement of a colour mark occurs in three different situations: where there is likelihood of confusion, where there is double identity and where there is dilution of a trade mark with a reputation.

Some of the most important findings are that confusingly similar colours include adjacent shades, but in order to prove likelihood of confusion, the infringing colour must probably be perceived by the public as an indication of origin and other signs that appear together with the colour must probably be taken into account, which limits the scope of protection to some extent. However, since colour marks must almost always have acquired distinctive character through use, consumers are used to perceiving that colour as a trade mark in relation to those types of goods/services, and are therefore more likely to do so also when the colour is used by the third party. Furthermore, there have to be an individual assessment in each case in order to determine whether surrounding signs exclude a likelihood of confusion, where all factors should be considered, including the distinctiveness of the colour mark and how clear and prominent the other signs are.

In situations of double identity, the infringing sign does not have to be used as a trade mark, which is advantageous for colour mark owners. Furthermore, identical colours can possibly include other shades if they are so similar that the difference is barely perceptible in a direct comparison.

Colour marks can often qualify as trade marks with a reputation, since the assessment of whether trade marks have a reputation is similar to the assessment of whether trade marks have acquired distinctive character through use. Trade marks with a reputation has an extended protection meaning that if a third party uses a sign that is identical or similar to a trade mark with a reputation, and that use without due cause takes unfair advantage of, or is detrimental to, the distinctive character or repute of the trade mark, then that use constitutes infringement. This applies both in relation to identical, similar and dissimilar products, however, it will probably only apply in relation to identical or similar products when it comes to colour marks, due to the extensive use of colours in the market. The extended protection could be relevant in particular in situations where likelihood of confusion cannot be proven, because the public does not perceive the infringing sign as a trade mark or because of surrounding prominent signs.

This examination shows that the scope of protection of colour marks is not great, it has some weaknesses. However, it is definitely not worthless either, which clearly shows in the fact that the plaintiffs were successful in claiming infringement in all of the infringement cases. By registering a colour as a trade mark, a company can to some extent stop others from using the same or similar colour, and it will also most likely have a discouraging effect. However, some carefulness should still be applied in relation to colour marks, since this is still a very new phenomenon and additional case law can take another direction. But considering how the situation looks today, colours are worth protecting as trade marks.

APA, Harvard, Vancouver, ISO, and other styles
28

Gonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.

Full text
Abstract:
This thesis is intended to develop a comprehensive understanding of how trade secrets can be used as a means to protect knowledge developed through projects conducted in the telecommunications sector. At the same time, the study explores which mechanisms should be employed to regulate access and utilization of trade secrets when their disclosure is inevitable to accomplish project requirements. Telecommunication firms are large and globally distributed organizations whose business operations rely upon interoperability and close collaboration with different parties. This suggests that conducting virtual projects crossing national and cultural boundaries, and sharing information for future survival and development, are common practices within this industry. Research around intellectual property issues in the area of project management in general has been poorly developed. At the same time, studies have been conducted towards patenting as a means to protect technological knowledge in telecommunications whilst trade secrets have not been contemplated by the academia. The purpose of the investigation is to contribute to a certain degree with new knowledge as a basis for future studies in the field. In order to achieve this, an extensive literature review of the three relevant theories to the study is carried out: trade secret protection, virtual project literature and intellectual property rights in telecommunications. The empirical data collected through interviews and document analysis serve as a basis for assessing the results of the literature study. This thesis is mainly divided into 4 sections. In the first section, the methodology of the study is widely described, which follows a qualitative approach. The research design is explicated including a brief discussion of how the research questions were defined. The data collection process is also presented along with the interview guide model, the narratives from the interviews conducted and the document analysis as a supplementary method. Reliability and validity issues of the study are described in the last part of this section. The second section illustrates the literature study of this thesis. The theoretical framework is built upon three different approaches associated with the previously mentioned theories. Literature review on the topic of trade secrets as a means to protect intellectual property is presented, comprising the role of trade secrets in virtual projects and common protection mechanisms. Factors affecting trade secret protection when working along with collaborative partners in a virtual project setting are outlined. Theory that discusses the core issues of intellectual property rights in telecommunications is also presented. Finally, the main findings from the literature are summarized in a proposed theoretical model which revolves around the life cycle of the project. A distinction between shared and created information that is or might be catalogued as a trade secret is described in the model. The third section introduces the data analysis of the investigation. It is based on literature findings and the empirical part encompassing 3 interviews and document analysis. Experiences from practitioners and important issues found in the document analysis are presented in order to elaborate an empirical basis for the discussion. Furthermore, implications encountered between theory and practice are exposed discussing differences, similarities and new contributions. The fourth and last section of this thesis includes the discussion chapter and the concluding remarks. The information presented in the discussion is based on the empirical and theoretical findings, and is classified in two parts. Factors regulating trade secret disclosure before, during and after project execution constitute the first part of the discussion. Trade secret as an instrument to secure future innovations in telecommunications represents the second part of the discussion. An enhanced model is illustrated covering the results from this chapter. This model comprises factors influencing the protection of confidential information considered as trade secret across the life cycle of the project, and evaluates the extent to which trade secrets can be used to secure future innovations developed along with collaborative partners within a virtual project setting. Limitations of the study and suggestions for further research are also addressed. This section ends with the conclusions of the study, where the problem statement is revisited in order to examine to what extent the research questions have been answered throughout the course of this thesis.
APA, Harvard, Vancouver, ISO, and other styles
29

Harvey, Janell M. "Protecting Biscayne an analysis of strategies for the protection of Biscayne National Park /." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kreiser, Kilian. "SPAN (Special Protection Area Network) : A platform to protect bird protection areas." Thesis, Umeå universitet, Institutionen Designhögskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-72662.

Full text
Abstract:
Background The foundation for life on our planet are all the resources we can draw upon: sunlight, clean water, fresh air and many more. But one existential resource a lot of people are not aware of, is the rich variety of life forms on earth. Biodiversity surrounds us every day: It is in the clothes we wear, the food we eat and the medicine we take. It is also an important driver for tourism, economy and technology: Various technological innovations are directly inspired by nature.But biodiversity is degrading rapidly caused by the rising land consumption in many countries. In Germany, this pressure is exceedingly high: 70% of natural habitats are endangered, 40% of animal species are on the IUCN red list and every second bird species is threatened.Using scientific methods and inventive technology, SPAN helps to monitor bird protection areas in Germany and to collect data as a basis to enforce conservation supported by European legislation.
Methods Involving all important stakeholders was inevitable to make sure the result will fit their needs. In meetings with coordinators of different existing caretaker networks in Berlin I learned about the organizational aspects and got an holistic perspective on the topic. The creation of blueprint drafts and stakeholder maps in an early phase was an effective way to figure out what kind of touchpoints are needed by which users.Voluntary caretakers who monitor protection areas are the primary users, so I conducted interviews with caretakers of other networks to learn everything about their monitoring work, their needs and experiences.An in-depth analysis and synthesis of my research findings led to the ideation phase where I explored in which ways I could involve, educate, bond and assist caretakers with diverse profiles. Getting their feedback on the ideas helped me to select the most promising concepts and consolidate the final result.
Result SPAN consists of a web-application and a smartphone app performing a wide range of functions for caretakers of protection areas. With their help they can retrieve information, network with other caretakers, conduct monitoring activities and submit reports about the condition of protection areas.With SPAN, caretakers can learn about habitats, species, and other caretakers who help with monitoring them. Together they can plan their activities and exchange information with the shared schedule and annotation tools.With the smartphone app, caretakers can take notes or retrieve location based information while being out in the field. Another mobile feature are customizable print-out forms making the caretakers independent from access to power or signal-coverage.Filled-in forms are digitalized and put into the database with the help of an image recognition scanning tool.With SPAN, caretakers can also lend unmanned photogrammetry vehicles to conduct aerial monitoring in a feasible and easy-to-use way.
SPAN - A platform to monitor bird protection areas.
APA, Harvard, Vancouver, ISO, and other styles
31

Aageson-Morlock, Megan. "The politics of protection : conceptualizing climatic displacement and a global protection regime." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/28122.

Full text
Abstract:
Climate change is anticipated to drive millions of people from their homes this century. Estimates indicate that between 200 and 250 million people may be displaced because of rising sea levels, desertification, and increased storm surges working in concert. At present, however, there is no protection regime, institutional mandate, or legal architecture capable of responding to the plight of climatically displaced persons (CDPs). Since 2007, a number of legal regimes have been proposed to provide CDPs with legal assistance. Each regime creates compulsory mandates for states in terms of their assistance to the climatically displaced. Though proposed regimes address the existing legal gaps in protection, they fail to address why states would in fact be willing politically to sign such a treaty. This paper argues that a hard legal framework for CDP protection is not politically prudent. Rather, CDP protection should be pursued through soft legalization. In particular, this paper examines the 1998 Guiding Principles on Internal Displacement and the ways in which their non-binding nature provide a normative framework for the development of a CDP protection instrument. The 1998 Guiding Principles developed in response to the political limitations of the 1951 Refugee Convention and its contemporary application. States have taken increased measures to limit their existing asylum obligations under the legally binding 1951 framework and the non-binding IDP Guiding Principles emerged in direct response to this political resistance. The non-binding nature of the Guiding Principles has not undermined their authoritative force, however, but rather it has served as a powerful tool for protecting vulnerable populations. Thus, this paper contributes to the literature on climatic displacement by conceptualizing how the evolution and application of contemporary protection regimes, as well as their normative frameworks, can shape efforts to protect those who are displaced by climate change.
APA, Harvard, Vancouver, ISO, and other styles
32

Govarthanam, K. Kanchi. "Development of an advanced personal protection equipment fabric for protection against slashes." Thesis, University of Bolton, 2012. http://ubir.bolton.ac.uk/677/.

Full text
Abstract:
Knife is the most commonly used single weapon in the UK, being 32% of the weapons employed in a violent incident. Studies reveal that majority (63.3%) of the knife inflicted wounds were slash type and could be disfiguring or life threatening if the blood vessels are ruptured. The stab resistant armours that are currently available do not protect the arms, neck and face as they are very rigid and heavy to be worn comfortably for everyday use for security personnel and are also expensive for the civilian population. During the research programme, various composite yarns consisting of; a) blends of Spectra® (Ultra High Molecular Weight Polyethylene), glass and polyamide; b) Stainless steel core with wraps of Dyneema® (Ultra High Molecular Weight Polyethylene) and polyester; and c) Kevlar®, in different compositions, were thoroughly investigated to determine the most appropriate yarn for the slash proof materials. The slash proof fabric structures were developed by using knitting technology as it offers significant advantages in terms of cost, design flexibility and versatility. Different fabrics using the appropriate yarn were developed using various knitting criteria. Since there was neither any literature published for slash resistant fabrics nor any comparable fabric availability, the developed fabrics were tested against each other using a test method stipulated for slash proof application. The fabrics were also tested for their thermophysiological and flame resistant properties using a wide range of test methods and procedures. Due to the probable application of slash resistant fabrics, i.e. outer wear in open atmosphere, the developed fabrics were also characterized after exposing 5 years equivalent of UVA/B radiation. This research programme has led to some extremely successful and innovative outcomes including the granting of a full patent. One of the major findings has been that a two-layered knitted structure produced by using a combination of composite and staple-fibre aramid yarns helps to withstand a higher impact force during the slash attack. It was also established that the designed racked structure in the fabric not only provides resistance to the continuous movement of the knife blade but also increases the overall slash resistance capability of the protective fabric. The research has also led to some recommendations for further work in order to re-confirm some of the findings established during the study and also to improve the structure by reducing the area density of the slash resistant fabrics further due to the changes in the pass criteria of the slash resistant standard, set as a direct outcome of this research.
APA, Harvard, Vancouver, ISO, and other styles
33

Battino, Stéphanie. "Protection des ressources souterraines en eau potable : notions de périmétre de protection." Paris 5, 1994. http://www.theses.fr/1994PA05P112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sebé, Feixas Francesc. "Transparent Protection of Data." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7026.

Full text
Abstract:
Aquesta tesi tracta la protecció de dades quan aquestes han de ser lliurades a usuaris en qui no es té absoluta confiança. En aquesta situació, les dades s'han de protegir de manera que segueixin essent utilitzables. Aquesta protecció ha de ser imperceptible, per tal de no destorbar la utilització correcta de les dades, i alhora efectiva, protegint contra la utilització no autoritzada d'aquestes.
L'estudi es divideix tenint en compte els dos tipus de dades la protecció transparent de les quals s'estudia: continguts multimèdia i microdades estadístiques.

Pel que fa a dades multimèdia, es tracta la seva protecció des de dues vessants: la protecció del copyright i la protecció de la integritat i l'autentificació.

En comerç electrònic de continguts multimèdia, els comerciants venen dades a usuaris en qui no confien plenament i que és possible que en facin còpies il·legals. Aquest fet fa que sigui necessari protegir la propietat intel·lectual d'aquests productes.
Centrant-se en imatges digitals, es presenten diverses contribucions a les dues principals tècniques de protecció del copyright electrònic: marca d'aigua i empremta digital.
Concretament, pel que fa a marca d'aigua, es presenten dos nous esquemes per imatges digitals. El primer és semi-cec i robust contra atacs de compresió, filtratge i escalat. El segon és cec i robust contra atacs de compresió, filtratge, escalat i distorsió geomètrica moderada. Seguidament, es proposa una nova tècnica basada en mesclar objectes marcats que permet combinar i augmentar la robustesa de diferents esquemes de marca d'aigua actuals.
En empremta digital, es presenta una construcció per obtenir codis binaris segurs contra atacs de confabulació de fins a tres usuaris deshonestos. La proposta actual obté, per un nombre moderat de possibles compradors, paraules codi més curtes que les obtingudes fins al moment.

Freqüentment, els continguts multimèdia es publiquen en llocs de poca confiança on poden ser alterats. En aquestes situacions, la marca d'aigua es pot utilitzar per protegir dades proporcionant-los integritat i autenticació. Es demostra l'aplicabilitat de l'algorisme de marca d'aigua basat en expansió d'espectre en el domini espacial per proporcionar, de forma transparent, autenticació i integritat sense pèrdua a imatges digitals.


L'altre tipus de dades tractades en aquesta tesi són les microdades estadístiques.

Quan fitxers amb dades estadístiques que contenen informació sobre entitats individuals són lliurats per al seu estudi, és necessari protegir la privacitat d'aquestes entitats. Aquest tipus de dades s'han de lliurar de manera que es combini la utilitat estadística amb la protecció de la privacitat de les entitats afectades. Els mètodes per pertorbar dades amb aquest objectiu s'anomenen mètodes de control del risc de revelació estadística. En aquest camp, es proposa una modificació d'una mètrica existent per mesurar la pèrdua d'informació i el risc de revelació per tal que permeti avaluar mètodes que generen fitxers emmascarats amb un nombre de registres diferent a l'original.
Es proposa també un algorisme per post-processar fitxers de dades emmascarades per tal de reduir la pèrdua d'informació mantenint un risc de revelació similar. D'aquesta manera s'aconsegueix millorar els dos millors mètodes d'emmascarament actuals: 'microagregació multivariant' i 'intercanvi de rangs'.

Finalment, es presenta una nova aplicació per proporcionar accés multinivell a dades de precisió crítica. D'aquesta manera, les dades protegides es fan disponibles a diferents usuaris, que segons el seu nivell d'autorització, podran eliminar part de la protecció obtenint dades de millor qualitat.
This dissertation is about protection of data that have to be made available to possibly dishonest users. Data must be protected while keeping its usability. Such protection must be imperceptible, so as not to disrupt correct use of data, and effective against unauthorized uses.
The study is divided according to the two kinds of data whose transparent protection is studied: multimedia content and statistical microdata.

Regarding multimedia content, protection is addressed in two ways: 1)copyright protection; 2) integrity protection and authentication.

In electronic commerce of multimedia content, merchants sell data to untrusted buyers that may redistribute it. In this respect, intellectual property rights of content providers must be ensured.
Focusing on digital images, several contributions are presented on the two main electronic copyright protection techniques: watermarking and fingerprinting.
Two new schemes for watermarking for digital images are presented. The first is semi-public and robust against compression, filtering and scaling attacks. The second one is oblivious and robust against compression, filtering, scaling and moderate geometric distortion attacks. Next, a new technique based on mixture of watermarked digital objects is proposed that allows robustness to be increased by combining robustness properties of different current watermarking schemes.
In the field of fingerprinting, a new construction to obtain binary collusion-secure fingerprinting codes robust against collusions of up to three buyers is presented. This construction provides, for a moderate number of possible buyers, shorter codewords than those offered by current proposals.

Rather often, multimedia contents are published in untrusted sites where they may suffer malicious alterations. In this situation, watermarking can be applied to protecting data in order to provide integrity and authentication. A spatial-domain spread-spectrum watermarking algorithm is described and proven suitable for lossless image authentication.

The other kind of data addressed in this dissertation are statistical microdata.

When statistical files containing information about individual entities are released for public use, privacy is a major concern. Such data files must be released in a way that combines statistical utility and protection of the privacy of entities concerned. Methods to perturb data in this way are called statistical disclosure control methods. In this field, a modification to a current score to measure information loss and disclosure risk is proposed that allows masked data sets with a number of records not equal to the number of records of the original data set to be considered.
Next, a post-masking optimization procedure which reduces information loss while keeping disclosure risk approximately unchanged is proposed. Through this procedure, the two best performing masking methods are enhanced: 'multivariate microaggregation' and 'rankswapping'.

Finally, a novel application to providing multilevel access to precision-critical data is presented. In this way, protected data are made available to different users, who, depending on their clearance, can remove part of the noise introduced by protection, thus obtaining better data quality.
APA, Harvard, Vancouver, ISO, and other styles
35

Kessing, Sebastian Georg. "Essays on employment protection." [S.l.] : [s.n.], 2003. http://www.diss.fu-berlin.de/2003/202/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Aniekwe, Uchechukwu Victor. "Protection of copper coolers." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0020/MQ54125.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Tsang, Ruby Lo Man. "Teenagers and sun protection." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0027/MQ40120.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Tähepõld, Peeter. "Myocardial protection by hyperoxia /." Stockholm, 2002. http://diss.kib.ki.se/2002/91-7349-247-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Waanders, Femke. "Advancements in renal protection." [S.l. : [Groningen : s.n.] ; University of Groningen] [Host], 2008. http://irs.ub.rug.nl/ppn/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Morris, Kathryn Mary. "Families, care and protection." Thesis, University of Nottingham, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.595293.

Full text
Abstract:
This thesis brings together my published works focused upon the themes of families, care and protection . It contains empirical studies, a co - authored book, academic articles and a narrative drawing together the themes
APA, Harvard, Vancouver, ISO, and other styles
41

Mak, Tak-hing, and 麥德興. "The Environment Protection Centre." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31983558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Higgins, Eric John, Ronald Leroy Higgs, Gregory Rodger Parkins, Vincent S. Tionquiao, and Christopher Kevin Wells. "Expeditionary warfare : force protection." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/6917.

Full text
Abstract:
Includes supplementary material.
In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study. The Systems Engineering and Analysis Team used the Systems Engineering and Management process as the primary methodology to complete this multidisciplinary task. Survivability was identified as the most critical factor for evaluating the protection of the Sea Base and its transport assets. Threats to the Sea Base were reviewed, analyzed, and prioritized. System design and analysis focused on preliminary analyses of various sensors, search concepts, and weapons. These preliminary analyses identified capability gaps that were translated into functional concepts and proposed architectures for detailed modeling and analysis. These proposed architectures were identified as either Point or Distributed. In order to adequately determine the relative performance of the proposed architectures generated by the team, a thorough and systematic design of experiments was developed and applied in the Naval Simulation System and EXTEND. Based on the results obtained, the Systems Engineering and Analysis Team determined that a Distributed Sensor and Weapons architecture would significantly increase the survivability of future Expeditionary Warfare forces.
APA, Harvard, Vancouver, ISO, and other styles
43

Wilson, Robin. "Advanced surge protection devices." Thesis, Queen's University Belfast, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Mohd, Zin Abdullah Asuhaimi Bin. "Coordination of overcurrent protection." Thesis, University of Manchester, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.332239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Moore, Philip John. "Adaptive digital distance protection." Thesis, City University London, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.328244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Valli, Elsa. "Essays on social protection." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/69365/.

Full text
Abstract:
This thesis analyses issues related to aid in Ethiopia and provision of elder care in the US. The first essay assesses the targeting of two major aid interventions, public works and food aid. Both types of aid are primarily allocated through community-based targeting. The few studies that have analysed the accuracy of aid targeting in Ethiopia have shown biases along demography, geography and political affiliations lines. With the introduction in 2005 of the Productive Safety Net Programme (PSNP), a major social protection programme, several administrative guidelines were introduced aimed at improving targeting. This paper uses the last two rounds of the Ethiopian Rural Household Survey to investigate whether there were changes in both targeting determinants, and amount received for PSNP public works and food aid components from 2004 to 2009. Overall, the PSNP appears to be allocated on the basis of observable-poverty-related characteristics, and food aid on household demographics. In addition, results suggest for both PSNP and food aid beneficiaries, political connections are significant in determining receipt of the program in 2004, but no longer in 2009, indicating an improvement towards means-based targeting. The second essay investigates the long-term effectiveness of emergency aid in Ethiopia in pro- tecting child health from the negative effects of a severe drought that hit the country in 2011. Child malnutrition remains a critical issue in Ethiopia and the literature has shown that shocks can have long lasting effects on physical and cognitive development. Using the two rounds of the Ethiopian Rural Socioeconomic Survey (ERSS) collected in 2011 and 2013, I explore the impact of emergency aid on child height-for-age aged 0-36 months two years after the drought had occurred. Because aid was not randomly allocated, I use a matching estimator to account for selection into the programme. The results show that emergency aid was effective in protecting children that experienced the drought. In the last essay, I research the effects of kindergarten eligibility on the provision of elder care in the US. I am able to identify the trade-off between child care and elder care by exploiting age eligibility criterion for public kindergarten, in combination with state-level variation, in the provision of full-time kindergarten. Through a reduced form approach, I estimate the Intention to Treat (ITT) for the effect of eligibility to kindergarten on provision of elder care. The results show that having the youngest child aged 5 in states that offer full-time kindergarten increases the probability of providing elder care by around 9 percentage points, which corresponds to 63 percentage increase to the baseline. The effect is higher for females (9.2) than for males (8.1).
APA, Harvard, Vancouver, ISO, and other styles
47

Majima, Shunzo. "Ethics of civilian protection." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/2877/.

Full text
Abstract:
In this thesis, I discuss the ethics of civilian protection in armed conflict from the perspective of applied ethics. Specifically, I attempt to explore a way to supplement the limitations of just war theory in civilian protection by providing a fundamental case for civilian protection, by way of considering insights gleaned from David Hume’s conception of justice, and from the perspective of professional military ethics. Moreover, I will further defend my argument for the protection of civilians in armed conflict by demonstrating the immorality of torture. In Chapter 1, I discuss the status of civilians by examining legal and ethical concepts. In Chapter 2, I critically discuss the scope and limitations of just war theory in civilian protection. In Chapter 3, I analyse how civilian protection was considered and how civilians were harmed in the Israeli–Palestinian conflict. In Chapter 4, I critically examine civilian protection as part of just conduct in armed conflict by referring to Hume’s conception of justice. In Chapter 5, I examine civilian protection from the perspective of military ethics. In Chapter 6, I make a case against the moral justifiability of torturing civilians in order to illustrate how civilians should be protected in an extreme situation.
APA, Harvard, Vancouver, ISO, and other styles
48

Cabrera, Martínez Abel. "Total protection in graphs." Doctoral thesis, Universitat Rovira i Virgili, 2021. http://hdl.handle.net/10803/672561.

Full text
Abstract:
Suposem que una o diverses entitats estan situades en alguns dels vèrtexs d'un graf simple, i que una entitat situada en un vèrtex es pot ocupar d'un problema en qualsevol vèrtex del seu entorn tancat. En general, una entitat pot consistir en un robot, un observador, una legió, un guàrdia, etc. Informalment, diem que un graf està protegit sota una determinada ubicació d'entitats si hi ha almenys una entitat disponible per tractar un problema en qualsevol vèrtex. S'han considerat diverses estratègies (o regles d'ubicació d'entitats), sota cadascuna de les quals el graf es considera protegit. Aquestes estratègies de protecció de grafs s'emmarquen en la teoria de la dominació en grafs, o en la teoria de la dominació segura en grafs. En aquesta tesi, introduïm l'estudi de la w-dominació (segura) en grafs, el qual és un enfocament unificat a la idea de protecció de grafs, i que engloba variants conegudes de dominació (segura) en grafs i introdueix de noves. La tesi està estructurada com un compendi de deu articles, els quals han estat publicats en revistes indexades en el JCR. El primer està dedicat a l'estudi de la w-dominació, el cinquè a l'estudi de la w-dominació segura, mentre que els altres treballs estan dedicats a casos particulars d'estratègies de protecció total. Com és d'esperar, el nombre mínim d'entitats necessàries per a la protecció sota cada estratègia és d'interès. En general, s'obtenen fórmules tancades o fites ajustades sobre els paràmetres estudiats.
Supongamos que una o varias entidades están situadas en algunos de los vértices de un grafo simple y que una entidad situada en un vértice puede ocuparse de un problema en cualquier vértice de su vecindad cerrada. En general, una entidad puede consistir en un robot, un observador, una legión, un guardia, etc. Informalmente, decimos que un grafo está protegido bajo una determinada ubicación de entidades si existe al menos una entidad disponible para tratar un problema en cualquier vértice. Se han considerado varias estrategias (o reglas de ubicación de entidades), bajo cada una de las cuales el grafo se considera protegido. Estas estrategias de protección de grafos se enmarcan en la teoría de la dominación en grafos, o en la teoría de la dominación segura en grafos. En esta tesis, introducimos el estudio de la w-dominación (segura) en grafos, el cual es un enfoque unificado a la idea de protección de grafos, y que engloba variantes conocidas de dominación (segura) en grafos e introduce otras nuevas. La tesis está estructurada como un compendio de diez artículos, los cuales han sido publicados en revistas indexadas en el JCR. El primero está dedicado al estudio de la w-dominación, el quinto al estudio de la w-dominación segura, mientras que los demás trabajos están dedicados a casos particulares de estrategias de protección total. Como es de esperar, el número mínimo de entidades necesarias para la protección bajo cada estrategia es de interés. En general, se obtienen fórmulas cerradas o cotas ajustadas sobre los parámetros estudiados
Suppose that one or more entities are stationed at some of the vertices of a simple graph and that an entity at a vertex can deal with a problem at any vertex in its closed neighbourhood. In general, an entity could consist of a robot, an observer, a legion, a guard, and so on. Informally, we say that a graph is protected under a given placement of entities if there exists at least one entity available to handle a problem at any vertex. Various strategies (or rules for entities placements) have been considered, under each of which the graph is deemed protected. These strategies for the protection of graphs are framed within the theory of domination in graphs, or in the theory of secure domination in graphs. In this thesis, we introduce the study of (secure) w-domination in graphs, which is a unified approach to the idea of protection of graphs, that encompasses known variants of (secure) domination in graphs and introduces new ones. The thesis is structured as a compendium of ten papers which have been published in JCR-indexed journals. The first one is devoted to the study of w-domination, the fifth one is devoted to the study of secure w-domination, while the other papers are devoted to particular cases of total protection strategies. As we can expect, the minimum number of entities required for protection under each strategy is of interest. In general, we obtain closed formulas or tight bounds on the studied parameters.
APA, Harvard, Vancouver, ISO, and other styles
49

Dantas, Rui. "DC grid discriminating protection." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/108656/.

Full text
Abstract:
High-voltage direct current (HVDC) has been proven an affordable and technically capable solution to bring vast amounts of power over long distances, though overhead lines, underground or undersea cables. As a result, a large number of point-to-point HVDC links appeared in several locations over the last decades. The technological step currently going on is the connection of point-to-point links to form a multi-terminal dc (MTDC) grid, a configuration that would bring several advantages. The construction of MTDC grids faces a few technical challenges, where the most notorious one might be dc grid protection. This thesis presents protection strategies for MTDC grids equipped with different dc fault clearance and isolation devices. These include ac circuit breakers (ACCBs), converters with fault blocking (FB) capability, dc circuit breakers (DCCBs) and fast dc disconnectors (only for isolation purposes). Each of these strategies in presented in a chapter, where the steps of the protection strategy are described and overvoltage suppression methods are proposed. The protection strategies include dc fault detection and dc fault discrimination algorithms. In literature, extensive research is available regarding dc fault discrimination, potentially the "hottest" topic in dc protection. In this thesis, discrimination algorithms are proposed being those based on analysis of local currents and voltages. Thus, link communication channels are not required, which reduces the overall decision-making time. The performance of the developed protection strategies is tested in PSCAD/EMTDC environment. DC faults are applied on two MTDC grids, including a 4-terminal meshed grid and the CIGRE 11-terminal dc grid. The main outcomes of this thesis include the discriminative fault criteria and the tailored protection strategies for dc grids equipped with either ACCBs, FB converters or DCCBs as main fault current clearance devices.
APA, Harvard, Vancouver, ISO, and other styles
50

Roze, Nathalie. "La protection des médicaments." Paris 8, 2003. http://www.theses.fr/2003PA083695.

Full text
Abstract:
L'innovation en matière de médicaments se trouve plus que jamais au cœur des préoccupations de santé publique. Alors que la brevetabilité du médicament a longtemps prêté à controverse, il semble aujourd'hui tout à fait légitime que le législateur ait donné aux industriels des outils de protection juridique efficaces concernant les innovations dans le secteur pharmaceutique. Des restrictions liées à la nature même de ces innovations subsistent pourtant. Le médicament ne peut en effet pas être assimilé à tous les produits de l’industrie : sa production, sa qualité, son prix intéressent étroitement la santé publique et ne peuvent être abandonnés au seul mécanisme du marché. Du système de protection actuellement en vigueur surgissent aujourd’hui de nombreuses difficultés. La définition même de la notion de médicament est en proie à d’importants bouleversements, du fait du développement des biotechnologies qui seront la base de la pharmacie demain. Comment adapter un outil aussi ancien que le brevet d’invention à la protection de matières vivantes, parfois issues du corps humain ? D’autre part, le mouvement vers une protection renforcée, qui paraissait inéluctable, est actuellement remis en cause par différents pays et organisations au sujet de l’accès aux médicaments dans certaines régions du monde touchées par des épidémies particulièrement préoccupantes comme celle du sida. La protection des inventions de médicaments est assurée par deux catégories de droits distincts : *1. La protection des créations industrielles : les brevets et droits voisins tels que le certificat complémentaire de protection, *2. La protection des signes distinctifs : les marques. Après avoir étudié ces différents titres de protection (1ère partie), nous aborderons les effets de l’acquisition de la protection : l’exercice du droit conféré et son originalité, notamment les contraintes particulières, liée à la nature de l’invention (2ème partie). Nous évoquerons, enfin, les conséquences de l’extinction de la protection des médicaments, qui passent du statut de médicaments protégés à celui de médicaments copiables, susceptibles d’être copiés par les génériques (3ème partie).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography