Dissertations / Theses on the topic 'RBTC'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'RBTC.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
RINALDI, RICCARDO. "An empirical study on the relationship between technological innovation and the task structure of jobs." Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1082074.
Full textGuo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.
Full textKhambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.
Full textBuccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.
Full textDarwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.
Full textMa, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.
Full textBáča, Petr. "RBC model - aplikace na ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76667.
Full textRegateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Full textNowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases it becomes hard to adjust the access control mechanisms. This challenge has led to the development of an extension to the role based access control (RBAC) model where permissions are defined as a sequence of create, read, update and delete (CRUD) expressions that can be executed and the interfaces to access them. From these permissions it's possible to generate security artefacts on the client side, i.e. in a distributed manner, which allows the clients to access the stored data while satisfying the security policies defined. On top of this model extension, a security layer has also been created in order to make the access control secure and obligatory. For the RBAC model extension this work leverages a previous work that created a dynamic access control architecture for relational applications, here referred to as DACA (Dynamic Access Control Architecture). DACA uses business logic information and the defined access control policies to build dynamically the security artefacts for the applications. In situations where the access control policies can evolve dynamically, the security artefacts are adjusted automatically. This base work, however, defines as permissions CRUD expressions, which can be executed in any order, and needs an adequate security layer to authenticate users and protect the system form intruders. Hence, this work aims to create a new architecture, called “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), which extends the work done with DACA so that it is capable of enforcing sequences of CRUD expressions that the applications can execute if the sequences are associated with their roles and the development of a security layer to make it secure. We discuss as well the performance of this system and its applicability to other environments outside of relational databases.
Atualmente, aplicações que acedem a bases de dados utilizam ferramentas como o Java Database Connectivity, Hibernate ou ADO.NET para aceder aos dados nelas armazenados. Estas ferramentas estão desenhadas para unir os paradigmas das bases de dados relacionais e da programação orientada a objetos, mas não estão preocupados com as políticas de controlo de acesso a aplicar. Portanto, os programadores de aplicações têm de dominar as políticas estabelecidas a fim de desenvolver aplicações em conformidade com as políticas de controlo de acesso estabelecidas.. Além disso, existem situações em que as políticas de controlo de acesso podem evoluir dinamicamente. Nestes casos, torna-se difícil adequar os mecanismos de controlo de acesso. Este desafio motivou o desenvolvimento de uma extensão ao modelo de controlo de acesso baseado em papeis (RBAC) que define como permissões sequências de expressões para criar, ler, atualizar e apagar (CRUD) informação e as interfaces de acesso a cada uma delas. A partir destas permissões podem ser gerados artefactos de segurança do lado dos clientes, i.e. de uma forma distribuída, que lhes permitem aceder à informação armazenada na base de dados segundo as políticas definidas. Por cima desta extenção também foi criada uma camada de segurança para tornar o controlo de acesso seguro e obrigatório. Para a extensão do modelo RBAC este trabalho baseou-se num trabalho anterior que criou uma arquitectura dinâmica de controlo de acesso para aplicações de bases de dados relacionais, aqui referida como DACA (Dynamic Access Control Architecture). DACA utiliza informação da lógica de negócio e as políticas de controlo de acesso que foram definidos para criar dinamicamente os artefactos de segurança para as aplicações. Em situações onde as políticas de controle de acesso evoluem de forma dinâmica, os artefactos de segurança são ajustados automaticamente. Este trabalho base, no entanto, define como permissões as expressões CRUD, podendo estas ser executadas em qualquer ordem, e necessita de uma camada de segurança adequada para autenticar utilizadores e proteger os dados sensíveis de intrusos. Portanto, neste trabalho, pretende-se criar uma nova arquitectura, chamada “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), que estende o trabalho feito no âmbito do DACA para que este seja capaz de garantir que sejam cumpridas sequência de expressões CRUD que as aplicações podem executar e que estão associados aos seus papéis nas políticas RBAC e desenvolver uma camada de segurança adequada para a tornar segura. Discutimos, também, o seu desempenho e aplicabilidade em outros ambientes sem ser em bases de dados relacionais.
Squarcina, Marco <1984>. "Granalyze: towards the automatic verification of Grsecurity RBAC policies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4729.
Full textGoran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.
Full textAccess control is concerned with the way in which users can access to resources in the computer system. This dissertation focuses on problems of access control for business processes. The subject of the dissertation is a formal specification of the RBAC-based context sensitive access control model for business processes. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation in existing access control models for business processes is not possible or is very complicated. The given model is applicable in diferent business systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by two case studies on real business processes. The presented prototype implementation represents a proof of the proposed model's practical value.
Law, Boon-Chuan. "UNCERTAINTY ANALYSIS FOR ROCKET-BASED COMBINED CYCLE (RBCC) SYSTEMS TESTING." MSSTATE, 2003. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07152003-174339/.
Full textCosta, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC." Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.
Full textPlataformas de grade computacional têm sido adotadas para promover o compartilhamento, agregação e coordenação de grandes quantidades de recursos geograficamente distribuídos e multi-institucionais. Em tais ambientes, que envolvem grandes quantidades de recursos localizados em diversos domínios administrativos e sujeitos a uma diversidade de políticas de controle de acesso, o controle de acesso é obrigatório. Como principal contribuição, o presente trabalho estende o arcabouço (framework) de portais GridSphere com o objetivo de fornecer ferramentas de controle de acesso que podem ser utilizadas para o desenvolvimento de aplicaçõess para grades computacionais. Os mecanismos e ferramentas propostos também realizam o controle de acesso no nível de invocação de serviço, que pode ser usado por qualquer aplicação compatível com OGSA que realize invocações a serviços de grade. Nossa abordagem permite a integração e consistência entre políticas de autorização aplicadas no lado do portal e no lado do provedor de serviço.
Damasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.
Full textControle de Acesso (CA) é um dos principais pilares da segurança da informação. Em resumo, CA permite assegurar que somente usuários habilitados terão acesso aos recursos de um sistema, e somente o acesso necessário para a realização de uma dada tarefa será disponibilizado. Neste contexto, o controle de acesso baseado em papel (do inglês, Role Based Access Control - RBAC) tem se estabelecido como um dos mais importante paradigmas de controle de acesso. Em uma organização, usuários recebem responsabilidades por meio de cargos e papéis que eles exercem e, em sistemas RBAC, permissões são distribuídas por meio de papéis atribuídos aos usuários. Apesar da aparente simplicidade, enganos podem ocorrer no desenvolvimento de sistemas RBAC e gerar falhas ou até mesmo brechas de segurança. Dessa forma, processos de verificação e validação tornam-se necessários. Teste de CA visa identificar divergências entre a especificação e o comportamento apresentado por um mecanismo de CA. Teste Baseado em Modelos (TBM) é uma variante de teste de software que se baseia em modelos explícitos de especificação para automatizar a geração de casos testes. TBM tem sido aplicado com sucesso no teste funcional, entretanto, ainda existem lacunas de pesquisa no TBM de requisitos não funcionais, tais como controle de acesso, especialmente de critérios de teste. Nesta dissertação de mestrado, dois aspectos do TBM de RBAC são investigados: métodos de geração de teste baseados em Máquinas de Estados Finitos (MEF) para RBAC; e priorização de testes para RBAC. Inicialmente, dois métodos tradicionais de geração de teste, W e HSI, foram comparados ao método de teste mais recente, SPY, em um experimento usando políticas RBAC especificadas como MEFs. As características (número de resets, comprimento médio dos casos de teste e comprimento do conjunto de teste) e a efetividade dos conjuntos de teste gerados por cada método para cinco políticas RBAC foram analisadas. Posteriormente, três métodos de priorização de testes foram comparados usando os conjuntos de teste gerados no experimento anterior. Neste caso, um critério baseado em similaridade RBAC foi proposto e comparado com a priorização aleatória e baseada em similaridade simples. Os resultados obtidos mostraram que o método SPY conseguiu superar os métodos W e HSI no teste de sistemas RBAC. A similaridade RBAC também alcançou uma detecção de defeitos superior.
Modebe, Emmanuel Obinna. "Extended Cr-51 RBC combined with Tc-99m RBC for the detection and localisation of occult GIT bleeding." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86509.
Full textENGLISH ABSTRACT: Background Occult blood loss from the gastrointestinal tract (GIT), causing iron deficiency often with anaemia, can be diagnostically and therapeutically challenging. This is because the endoscopic and radiologic tests may be negative due to the slow, chronic and intermittent nature of the gastrointestinal bleeding, making timing key in detection and localisation of the bleed. These limitations can be approached using two different radioactive isotopes. Firstly, we tested the sensitivity of extending Cr-51 RBC for 21 days relative to 5 days to detect GIT bleeding and its use to optimise timing of a Tc-99m RBC study for GIT blood loss localisation. Finally, we tested if the information provided by the Tc-99m RBC study aided gastroenterologic intervention for anatomical localisation of a lesion. Method In this retrospective review, after obtaining institutional and ethics committee approval, records of patients referred for evaluation of possible GIT blood loss were reviewed. In each; daily appearance of radiochromium in stool was measured in the whole body counter. In those cases exceeding 50 ml/day, a technetium-99m (Tc-99m) localization study was performed. These studies were correlated with clinical findings. Results A total of 59 Cr-51 RBC studies were carried out in 36 females and 21 males (n = 57). In 32 (54%) the radiochromium results were positive with 75% of the bleeding incidences occurring after 5 days of stool collection. Of 17 cases in whom Tc-99m RBC imaging studies were performed, 14 (82%) were positive with specific anatomical sites successfully defined in twelve. In all patients with blood loss of >100 ml/24h, Tc-99m RBC were positive and localised. Ten of the 17 Tc-99m RBC studies were further investigated and half diagnosed with small-bowel angiodysplasia. Conclusion This sequential twin isotope method is practical in revealing otherwise silent intestinal haemorrhage. Although it has good patient acceptability and clinical as well as diagnostic utility in management, further studies are required to clearly establish a cut-off level of blood loss for performing imaging studies and the impact of the findings on the overall patient management.
AFRIKAANSE OPSOMMING: Agtergrond Die evaluasie van okkulte bloedverlies uit die gastro-intestinale kanaal (GIT), met gevolglike ystertekort anemie, kan diagnosties en terapeuties uitdagend wees. Dit is omdat endoskopiese en radiologiese ondersoeke negatief mag wees as gevolg van die stadige, chroniese en intermitterende aard van die gastro-intestinale bloeding, wat die presiese tydstip van opsporing en lokalisering van die bloeding krities belangrik maak. Hierdie beperkings kan aangespreek word deur twee verskillende radioaktiewe isotope te gebruik. Eerstens is die sensitiwiteit van die verlenging van die Cr-51 RBS studie tot 21 dae in plaas van 5 dae om die GIT bloeding op te spoor, getoets, asook die gebruik daarvan om die optimale tyd vir ‘n Tc-99m RBS studie om die GIT bloedverlies te lokaliseer, vas te stel. Laastens is getoets of die inligting van die Tc-99m RBS studie wel bygedra het tot die gastroenterologiese ingreep om die letsel anatomies te lokaliseer. Metode Na institusionele en etiese komitee toestemming is inligting van pasiënte wat vir die evaluering van ‘n moontlike GI bloedverlies verwys is, in hierdie retrospektiewe oorsig nagegaan. Die daaglikse voorkoms van radioaktiewe chroom in stoelgangmonsters is in ‘n heelliggaamteller gemeet. In gevalle waar dit 50 ml/dag oorskry het, is ‘n tegnesium 99m (Tc 99m) studie gedoen. Hierdie studies is met die kliniese bevindinge gekorreleer. Resultate ‘n Totaal van 59 Cr-51 RBS studies is in 36 vroue en 21 mans (n = 57) gedoen. Die gemerkte chroomstudies was positief in 32 (54%), met 75% van die bloedings wat meer as 5 dae na versameling van die stoelgang plaasgevind het. In veertien (82%) van die 17 gevalle waar Tc-99m RBS studies gedoen is, was die studies positief. Spesifieke anatomiese gebiede van bloeding kon in 12 hiervan suksesvol bevestig word. Tc-99m RBS studies was positief in al die pasiënte met ‘n bloedverlies van >100 ml/24h, en kon gelokaliseer word. Tien van die 17 Tc-99m RBS studies is verder ondersoek en die helfte daarvan gediagnoseer met dunderm angiodisplasie. Gevolgtrekking Die opeenvolgende twee isotoopmetode om andersins asimptomatiese dermbloeding op te spoor, is prakties uitvoerbaar. Alhoewel die studies goed deur pasiënte aanvaar is, en ook van kliniese en diagnostiese waarde in die hantering van die pasiënte is, is verdere studies nodig om die afsnypunt vir die hoeveelheid bloedverlies om beeldingstudies uit te voer, sonder twyfel vas te stel, asook om die impak van die bevindings op ‘n groter pasiëntpopulasie vas te stel.
Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.
Full textLee, Chang Hee. "The competitive effects of RBOC interLATA entry on local telephone markets." Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1078943781.
Full textTitle from first page of PDF file. Document formatted into pages; contains xiii, 274 p.; also includes graphics (some col). Includes abstract and vita. Advisor: Douglas N. Jones, Dept. of Public Policy and Management. Includes bibliographical references (p. 275-317).
Jadidi, Mansoor. "Numerical and Experimental Model of Healthy and Damaged Red Blood Cell Trajectories in Micro-channels." Thesis, Griffith University, 2023. http://hdl.handle.net/10072/421347.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Eng & Built Env
Science, Environment, Engineering and Technology
Full Text
Carneiro, Dias André Eduardo. "Study of RBC shape transitions induced by nanoparticles." Doctoral thesis, Universitat Rovira i Virgili, 2019. http://hdl.handle.net/10803/668080.
Full textEsta tesis describe el estudio de las propiedades del medio extracelular en la crioconservación de los glóbulos rojos y la posible aplicación de nanopartículas de sílice como coagentes para la entrega intracelular de trehalose, un crioprotector natural. La primera parte del estudio se centró en las condiciones de congelación y descongelación, y en las propiedades del medio extracelular para la congelación. Se analizaron diferentes propiedades de acuerdo con su influencia en la tasa de supervivencia de los glóbulos rojos, según se evaluó mediante el ensayo de hemólisis, y se analizó el efecto de la congelación mediante el análisis morfológico de las imágenes de los glóbulos rojos. La segunda parte del estudio investiga la interacción de nanopartículas de sílice, cargadas de manera diferente, con glóbulos rojos para su futura aplicación como coagente para la entrega de trehalose. La toxicidad de la nanopartícula de sílice se determinó mediante un ensayo de hemólisis y su distribución espacial se estudió mediante la obtención de imágenes de los glóbulos rojos que flotan libremente usando microscopía confocal (LSCM). Se desarrolló un nuevo método de visualización 3D de alto rendimiento que se aplicó a las imágenes LSCM para corregir la deriva en toda la pila z permitiendo el análisis de las imágenes. Los resultados se confirmaron mediante la interacción de las nanopartículas de sílice con vesículas unilamelares gigantes (GUV) como un sistema de modelo experimental.
This thesis describes the study of the properties of extracellular medium on the cryopreservation of red blood cells and the potential application of silica nanoparticles as co-agents for the intracellular delivery of trehalose, a natural cryoprotectant. The first part of the study focused on the freezing and thawing conditions, and on the properties of the extracellular medium for freezing. Different properties were analyzed according to their influence on the survival rate of red blood cells as assessed by hemolysis assay and the effect of freezing was analyzed by morphological analysis of images of red blood cells. The second part of the study investigates the interaction of differently charged silica nanoparticles with red blood cells for future application as co-agent for trehalose delivery. Silica nanoparticle toxicity was determined by hemolysis assay and their spatial distribution was studied by imaging freely floating red blood cells using laser scanning confocal microscopy (LSCM). A novel high-throughput 3D visualization method was developed and applied to LSCM images in order to correct the drift throughout the z-stack allowing the analysis of the images. Results were confirmed by interacting the silica nanoparticles with giant unilamellar vesicles (GUV) as an experimental model system.
Mendes, William Corrêa. "ARQUITETURA BASEADA EM ONTOLOGIAS DE UM AGENTE RBC." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/506.
Full textCase-Based Reasoning (CBR) is a problem-solving paradigm where it is possible to use knowledge from past experiences to solve new situations. The CBR agent approach that combines agent autonomy with the problem-solving model of CBR has been proven adequate for the development of complex systems. This paper proposes the architecture of a CBR agent whose main differential is the use of ontologies for representing the case base along with all the mechanisms that make up a CBR system. The proposed architecture besides promoting the reuse of the case ontology, unifies the software agent approach with CBR, a typical paradigm of human reasoning. All the CBR mechanisms are present in the proposed architecture: case representation, similarity analysis for cases retrieval, adaptation and cases learning, where the last two mechanisms are still being specified. The architecture was evaluated in the Brazilian Family Law legal domain. For that, a targeted ontology for the representation CBR cases of this area was created. The results obtained in the tests showed good effectiveness in retrieving similar cases and showing the feasibility of the architecture using the semantic model of similarity for retrieval of CBR cases.
O Raciocínio Baseado em Casos (RBC) é um paradigma de resolução de problemas no qual é possível utilizar conhecimentos de experiências passadas para resolver novas situações. A abordagem de agentes RBC que combina a autonomia dos agentes e o modelo de resolução de problemas do RBC tem se mostrado adequada para o desenvolvimento de sistemas complexos. Este trabalho propõe a arquitetura de um agente RBC cujo principal diferencial é utilizar ontologias para representar a base de casos junto com todos os mecanismos que compõem um sistema RBC. A arquitetura proposta, além de promover o reúso da ontologia de representação dos casos, unifica as abordagens de agentes de software e RBC, um paradigma de raciocínio típico dos seres humanos. Estão presentes na arquitetura os mecanismos de representação dos casos, análise de similaridade para recuperação de casos, adaptação e aprendizado de casos, estes dois últimos ainda em fase de especificação. A arquitetura foi avaliada no domínio jurídico do Direito de Família brasileiro, sendo que para isso foi criada uma ontologia, representando casos RBC nesta área. Os resultados obtidos nos testes realizados demonstraram uma boa efetividade na recuperação de casos similares e a consequente viabilidade do uso da arquitetura com o modelo de similaridade semântico utilizado para recuperação de casos RBC.
Almeida, Sara Cristina Cantarino Valente de. "An RBC model with a rich fiscal sector." Master's thesis, NSBE - UNL, 2013. http://hdl.handle.net/10362/9698.
Full textContributing to the general understanding of fiscal policy e ectiveness, this study consists in the reformulation and estimation of the DSGE model developed in Azevedo and Ercolani (2012), to measure the potential relations between the private sector and the consumption and investment components of government expenditures. The estimation results show that public consumption and capital have both a substitutability e ect on private factors. For the study of the dynamic e ects, the model is augmented with strict fiscal rules, whose imposition creates a "crowding-out" e ect of the simulated fiscal policy shocks on government consumption and investment.
Morrow, Carl. "Phylogenetic investigations of the African Restionaceae using rbc." Thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/26316.
Full textBeppler, Fabiano Duarte. "Emprego de RBC para recuperação inteligente de informações." Florianópolis, SC, 2002. http://repositorio.ufsc.br/xmlui/handle/123456789/82898.
Full textMade available in DSpace on 2012-10-19T19:18:05Z (GMT). No. of bitstreams: 1 189259.pdf: 2369619 bytes, checksum: 6081c39e99c22484b1465b896722ff2a (MD5)
A dimensão do volume de informações disponíveis na Internet e as taxas diárias de crescimento tornam cada vez mais presentes mecanismos eficientes e eficazes de recuperação de informações. A maioria dos métodos pesquisados e aplicados tem por base o tratamento das informações disponíveis nos repositórios associados aos sites. Nesta abordagem, um elemento de conhecimento é normalmente negligenciado: a memória das interações efetuadas pelos usuários que utilizaram o site previamente a um usuário atual. A construção desta memória viabiliza o emprego de interações de busca do passado na apresentação de informações desejadas no momento das consultas. A presente dissertação propõe a construção da memória das buscas aos sites na forma de casos de consulta e a aplicação de Raciocínio Baseado em Casos para utilização destas interações passadas como subsídio em novos processos de consulta. O método proposto deu origem à ferramenta RBNet. Para demonstração de sua viabilidade, RBNet foi aplicada ao site de busca do "Diretório dos Grupos de Pesquisa no Brasil", projeto do Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq). RBNet permite que usuários interessados em grupos de pesquisa possam encontrar rapidamente o que desejam, quando se valem das interações semelhantes registradas na base de casos do RBNet.
Simm, Robert. "Enhanced biological phosphorus removal using a sequencing batch RBC." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/28517.
Full textApplied Science, Faculty of
Civil Engineering, Department of
Graduate
Tapon, Njamo Julien Serge. "Olive wastewater bioremediation using a rotating biological contactor (RBC)." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2023.
Full textThe expansion of the South African olive processing industry has brought an increased threat to the environment. More production activities lead to more wastewater generation that requires more costly treatment. Regulatory bodies concerned with the release of effluents into the environment are imposing evermore-restrictive guidelines. With this information in mind, the South African olive industry is facing a significant challenge of maintaining economic competitiveness while becoming more environmentally benign. To begin addressing this challenge, the olive processing industry must develop and implement new, more effective, tailored treatment technologies to remediate olive wastewater prior to its release into the environment. In this study, the use of indigenous olive wastewater biofilms in combination with a rotating biological contactor (RBC) was investigated for possible bioremediation purposes. The development of microbial biofilms resulted in the breakdown of the hazardous chemical compounds present in the olive wastewater, i.e. reducing the chemical oxygen demand (COD) and polyphenol content. Results showed that indigenous microorganisms within table olive and olive mill wastewater have a strong tendency to form biofilms. Furthermore, when these biofilms are applied to a small-scale RBC system, significant lower levels of both COD (on average 55% for table olive wastewater (TOWW) and 46% for olive mill wastewater (OMWW) and total phenol (on average 51% for TOWW and 39% for OMWW) were obtained. Results from shocking the biofilms with chemicals routinely used during olive processing indicates that most have a negative effect on the biofilm population, but that the biofilms are able to survive and recover in a relatively short time. This study confirms the potential application of indigenous biofilms found in olive wastewater streams for future bioremediation technologies that form the basis for the development of an eco-friendly, easy-to-manage, low cost technologies specifically designed for the small South African olive processing industry.
Moreira, Antão Leonir Langendolff. "PRECISÃO DO POSICIONAMENTO RTK USANDO CORREÇÕES DIFERENCIAIS TRANSMITIDAS PELO SISTEMA NTRIP (RBMC-IP)." Universidade Federal de Santa Maria, 2011. http://repositorio.ufsm.br/handle/1/9547.
Full textO Sistema Global de Navegação por Satélite (GNSS) nos últimos anos vem se apoiando no desenvolvimento da telefonia móvel e no avanço da eletrônica dos equipamentos (receptores GNSS) para promover uma revolução nos levantamentos geodésicos em tempo real. Neste contexto, se destaca a técnica de posicionamento Real Time Kinematic (RTK) usando correções diferenciais transmitidas pelo protocolo Networked Transport of RTCM via internet Protocol (NTRIP), a partir de uma estação de referência via internet. O objetivo deste trabalho foi avaliar a precisão desta técnica para diferentes comprimentos de linha de base e com o uso de diferentes números de épocas de rastreio. Para isso, foram utilizadas as coordenadas tridimensionais de 10 estações (marcos), localizadas em três municípios do estado do Rio Grande do Sul, rastreadas pelo método relativo estático pós-processado (estático PP), o qual serviu de referência na comparação com a técnica RTK / NTRIP, que utilizou de correções da Rede Brasileira de Monitoramento contínuo dos Sistemas GNSS em tempo real (RBMC-IP). Os resultados mostraram que houve resolução das ambiguidades em nove estações numa linha de base superior a 54 km e que os valores de acurácia não apresentaram diferença superior a 0,041 m na componente horizontal e 0,083 m na componente vertical. Além disso, entre os números de épocas testados (5, 10, 30, 60 e 120 épocas) para o método RTK / NTRIP, aquele que apresentou a melhor média de acurácia horizontal foi o de 120 épocas (0,01 m) e para a componente vertical o melhor resultado foi alcançado com o número de 5 épocas rastreadas (0,02 m). Deste modo, foi comprovada a confiabilidade da técnica RTK / NTRIP (RBMC-IP) em linhas de base de até 54 km, podendo ser utilizada para levantamentos topográficos em locais providos por Internet wireless ou serviços de telefonia celular tais como, GPRS, GSM e 3G.
Thompson, Martin John. "Investigation of the effects of HLS5 : a novel member of the RBCC family." University of Western Australia. School of Medicine and Pharmacology, 2006. http://theses.library.uwa.edu.au/adt-WU2006.0106.
Full textMonniot, Céline. "Les protéines à ancre GPI de Candida albicans dans l’interaction avec l’hôte : de l’étude de domaines solubles à la caractérisation de la protéine Rbt1." Thesis, Paris, AgroParisTech, 2012. http://www.theses.fr/2012AGPT0075/document.
Full textC. albicans is an opportunistic pathogen present as commensal in 75% of the population. This is the first fungal pathogen (4th cause of nosocomial infections) responsible for superficial infections in immunocompetent patients or deep infections in immunocompromised patients. C. albicans GPI-anchored proteins (Glycosyl Phosphatidyl Inositol) present at the interface between the yeast and the host cells appear to be the proteins most capable of modulating the immune response. In this study, a library overexpressing and secreting twenty fonctionnal domains from GPI-anchored proteins potentially exposed to the surface was constructed. We identified seven polypeptides involved in the modulation of the macrophage response and three polypeptides with immunogenic properties. In a second project, we demonstrated the properties of the hyphae specific GPI-anchored protein Rbt1 in adhesion, biofilm formation and aggregation. The characterization of this protein gives us new data on surface exposure of membrane proteins depending to C. albicans morphological state
Galhardo, Pablo Henrique Souza. "Análise do posicionamento GNSS cinemático em ambiente urbano com uso da técnica RTK via Ntrip." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/3/3138/tde-24092018-073219/.
Full textThe continuous progress of the Global Navigation Satellite System (GNSS) enables its large user community around the world to use its products for a wide range of purposes. Amongst them, autonomous vehicular navigation is featured as one of the main focuses of investments and research in universities and private institutions. At the same time, the modernization of GNSS receivers follows this evolution, offering smaller and more versatile equipment than before, which are able to trace new constellations and high-precision operations in real time. The use of mobile networks and wireless Internet connections have supported this development, allowing geomatics professionals to carry out surveys using the technique known as Real Time Kinematic (RTK). This research aims at assessing the quality of the data gathered by this RTK technique, based on the use of the Networked Transport of RTCM via Internet Protocol (Ntrip) to obtain differential corrections necessary to the operation in an urban environment, and the use of Brazilian Network of Continuous Monitoring of GNSS Systems in real time (RBMC-IP). In order to do so, we gathered data with the receiver installed in a vehicle which travelled the same route for twenty-nine days. The test site was the North-South Corridor in São Paulo, which is approximately 22,700 m long. The methodology of data analysis was divided into three cases: The first one took the whole route into account. The second one, only one travel leg without interference (such as tall trees, tunnels, viaducts and skyscrapers), flat and curveless. Lastly, the third one investigated how the receiver would behave after a situation of total blockade of satellites, such as under a viaduct. We evaluated the horizontal and vertical accuracies of the recorded points, the number of satellites traced, the Positional Dilution of Precision (PDOP) values, the solutions to the vector of ambiguities during the course and the quality of the mobile connection. The results showed that the use of the RTK technique via Ntrip via the RBMC-IP service is a reliable tool for precise positioning in real time. However, in urban environments in addition to the kinematic mode of collection, such values become more susceptible to the degradation of precision.
Chikochi, Christopher. "Ore breakage characterisation of UG2 deposits using the JK RBT." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/27300.
Full textPeredriy, Sergiy Black Stanley W. "Endogenous credit market incompleteness RBC approach to emerging markets crises /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,1921.
Full textTitle from electronic title page (viewed Dec. 11, 2008). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Economics." Discipline: Economics; Department/School: Economics.
Dong, Wei-Feng. "Expression and regulation of rhombotin-2 (RBTN/LMO-2) in normal hematopoiesis and leukemogenesis." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0017/NQ53807.pdf.
Full textCho, John Myung-Jae. "Characterization of RBT1, a novel member of the TRIP-Br family of transcriptional modulators." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85062.
Full textBLAST analysis of the human genome localizes RBT1 to chromosome 19g13.1-q13.2 adjacent to the coding region for TRIP-Br1/p34SEI-1 in a region characterized by frequent amplification in ovarian carcinomas. Further analysis of amino acid homology places RBT1 in the TRIP-Br protein family consisting of at least four members (RBT1, TRIP-Br1 (p34SEI-1), TRIP-Br2, and HEPP (cdca4)). While not much is known about this protein family, TRIP-Br1 has been found to interact with the cyclin-dependent kinase, cdk4, and modulates E2F transcriptional activity (Hsu et al., 2001). In vitro binding and co-immunoprecipitation assays suggest that RBT1 interacts with at least cdk1, cdk2 and cdk4, and modulates E2F1 transcriptional activity indicative of one possible mechanism by which higher levels of RBT1 can both promote and enhance tumorigenesis.
We propose that RBT1 is a novel transcriptional co-activator that interacts with several important cellular proteins including RPA and cdk4, and that RBT1 may promote tumorigenesis when its protein product is over-expressed. Enhancement of E2F1 transcriptional activity by overexpressing RBT1 suggests that this novel protein has implications on cell cycle regulation and progression.
Singh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.
Full textIncludes bibliographical references (leaves 69-71).
by Arundhati Singh.
M.Eng.
Sabharwal, Dharmesh. "Regulatory roles of sRNAs in pathogenesis of Vibrio cholerae." Doctoral thesis, Umeå universitet, Institutionen för molekylärbiologi (Medicinska fakulteten), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-100528.
Full textPeddie, Craig Cameron. "RBC treatment of a municipal landfill leachate : a pilot scale evaluation." Thesis, University of British Columbia, 1986. http://hdl.handle.net/2429/26319.
Full textApplied Science, Faculty of
Civil Engineering, Department of
Graduate
Moghabghab, Rania Hounir. "External surface and porosity of RBC biofilms in leachate pre-treatment." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq28835.pdf.
Full textPetrauskienė, Rasa. "Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282.
Full textLocation-based Access Control LBAC techniques allow taking users’ physical location into account when determining their access privileges. The analysis of possibilities of integrating location information into access control and authentication is provided. I show the advantages of using location information for authentication and access control. I present location-based access control model that can increase the probability of correct authentication. I design wireless LAN location-based access control system that is used in building of several floors. The model is compliant with OGC (Open GeoSpatial Consortium) and Geo-RBAC (the extent of RBAC model); it integrates other types of location-based features. I describe the periodicity algorithm of location-based access control and design the policy enforcement algorithm that uses location mapping functions and the evaluation of confidence. The model is evaluated by testing the speed of the system and computer resources used by the system. The vulnerabilities of location-based access control are discussed in the context of sniffing, highjacking, DoS and warmhole attacks.
Landberg, Fredrik. "Flexible role-handling in command and control systems." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880.
Full textIn organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the approach taken within military command and control systems. Military operations are often characterized by frictions and uncontrollable factors. People being absent when needed are one such problem.
This thesis has examined how roles are handled in three Swedish command and control systems. The result is a model for handling vacant roles with the possibility, in some situations, to override ordinary rules.
Manning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Full textWaddington, Gary. "Biedermans Recognition by Components (RBC) theory of human object recognition - an investigation." Thesis, University of Reading, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.301971.
Full textRoyes, Gleiber Fernandes. "Plataforma híbrida Fuzzy-Multicritério-RBC para o apoio à análise de políticas." Florianópolis, SC, 2003. http://repositorio.ufsc.br/xmlui/handle/123456789/84953.
Full textMade available in DSpace on 2012-10-20T14:01:27Z (GMT). No. of bitstreams: 1 193852.pdf: 2312973 bytes, checksum: dca4abbcf0d79a1000e03e9eafcef809 (MD5)
A avaliação de cenários realizada por especialistas humanos envolve critérios cujos valores são vagos e definidos de forma imprecisa. Para exemplificar, dentro de um cenário de política de contratação de funcionários, um critério para a análise sobre a capacidade de liderança dos candidatos certamente aplicaria valores lingüísticos vagos como Grande ou Pouca para representar, de forma natural, o desempenho de cada concorrente. O especialista humano pondera e agrega os diversos critérios subjetivos de análise para chegar a uma conclusão consistente. Este trabalho propõe uma abordagem de apoio ao processo de análise de políticas através da reunião de três metodologias básicas. O objetivo principal é estabelecer um método de auxílio diferenciado que permita a direta representação e avaliação dos critérios vagos de um problema. A arquitetura híbrida Difusa - Multicritério - Raciocínio Baseado em Casos sugere uma forma integrada de tratamento do conhecimento: Conjuntos Difusos - para a representação e manipulação do conhecimento vago; Multicritério - para a agregação do conhecimento vago e avaliação do cenário e RBC - para a recuperação deste conhecimento e aperfeiçoamento do aparato de apoio. A proposta de auxílio não se limita apenas à indicação de um melhor caminho dentre as opções disponíveis, mas sim abrange mecanismos para a simulação e exploração do cenário apresentado. Um sistema protótipo mostra, através de alguns casos implementados, que a metodologia de auxílio pode ser útil como uma das ferramentas de análise de políticas. Além disto, a cooperação entre as metodologias Difusa - Multicritério - RBC expõe uma forma distinta e promissora de lidar com o conhecimento através da máquina que merece um aprofundamento posterior por intermédio de novas pesquisas.
Bradshaw, Adrian Tyrone. "The Impact of Information Systems Consultants on Small and Medium-sized Enterprises: A Theory of the Firm Perspective." Thesis, University of Canterbury. Management, 2012. http://hdl.handle.net/10092/6933.
Full textGummidi, Srinivasa Raghavendra Bhuvan. "Smart-RBAC." Master's thesis, 2015. http://hdl.handle.net/10362/14568.
Full textChang, Che-Chih, and 張哲誌. "A Study On Combining CR-RBAC And I-RBAC." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/69026994270833604481.
Full text中原大學
資訊工程研究所
100
In a role-based access control system with context roles, when a user does not satisfy the context constraints, the user can not activate a context role to execute operation on the objects. But if there are dependencies between the operations on the objects, when an operation on an object could not be executed, subsequent operations on other objects can not be executed as well. In this thesis, we propose a method to combine context roles and isolated roles. When a user can not activate a context role, she can access the object by using an isolated role in the isolation environment temporarily. After some waiting period, depending on whether the context conditions are satisfied or not, the action will either be committed or canceled. The combined model can be used in workflow applications to avoid some delay or interruption. Finally, a document flow system was implemented to illustrate this model.
Li, Chung-Hsuan, and 李忠璇. "An Integrated model of CR-RBAC and I-RBAC Application on Workflow System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/m3u5uf.
Full text中原大學
資訊工程研究所
102
Abstract In a role-based access control system with context roles (CR-RBAC), if context constraints are not satisfied, then a context role could not be activated by a user to execute operation on objects. But there are task dependencies among tasks in a workflow, if one task could not complete in time, then other tasks would be delayed. In this thesis, an approach to integrate CR-RBAC and I-RBAC, with applications to workflow systems, will be presented. In a workflow, when a user could not activate a context role to perform a task, an isolation role could be assigned to the user to execute the task temporarily, to continue execution of the workflow. However, the task still needs to be confirmed by using the context role. If the task could not be confirmed during a timeout period, the workflow must be rollbacked to an earlier state. An example document workflow was used to illustrate this model. It is assumed that the approval of documents must be performed inside the company. If there is an emergent document needs to be approved and the manager who has the permission to approve the document is not in the company, an isolation role could be assigned to the manager to approve the document temporarily. The approval must be confirmed when the context constraints are satisfied and the context role could be activated. Otherwise, the workflow has to be rollbacked. Keywords:Access Control、RBAC、CR-RBAC、I-RBAC、Workflow、Rollback
Lo, Ying Jie. "Dielectrophoresis on Plasma/RBC Separation and RBC Manipulation." 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2607200411101400.
Full textLo, Ying Jie, and 羅英傑. "Dielectrophoresis on Plasma/RBC Separation and RBC Manipulation." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/55952934965144409799.
Full text國立臺灣大學
應用力學研究所
92
This thesis takes advantage of dielectric property of material, where a dielectrophoretic (DEP) force is induced in a sinusoidally time-variant electric field to achieve cell-plasma separation and cell manipulation. Dielectrophoretic theory is based on the distinct dielectric and conductive properties of cell and medium. This distinction will physically induce a directional force depending on frequency, spatial electric strength, and spatial electric phase distribution. Through fabrication of MEMS, devices miniaturized are to increase the influence of DEP force on separation and manipulation of cells. Additionally, with the aid of numerical simulation of electric field and cell trajectory, more effective devices are designed. The use of bio-compatible material polydimethysilloxane (PDMS) proved ease of fabrication and integration [1]. Types of cell-plasma separator tested various electrode design include stair, inclined, and gradient confuguration, and 3D channel assisting design. For cell manipulation, traveling wave, cell concentrator, and cell portioning devices are all tested and their performance quantified. Results show successful separation of red blood cell (RBC) and plasma vis DEP. for a wide range of electrode geometry configurations. Traveling wave DEP, however, was more difficult to implement. Manipulation of RBC proved viable using the non-uniform E-field at the tip of multi-electrode design.
"Automated Testing for RBAC Policies." Master's thesis, 2014. http://hdl.handle.net/2286/R.I.24933.
Full textDissertation/Thesis
M.S. Computer Science 2014
Lin, Ping-Jie, and 林品婕. "An Integrated model of CR-RBAC and I-RBAC and Its Application to Workflow System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/43769565959443691598.
Full text中原大學
資訊工程研究所
101
Context roles can be used to describe context constraints in an RBAC system. In a CR-RBAC system, a user cannot activate a context role to get the permissions to complete a job if the user does not satisfy the context constraints. To complete a workflow, one must execute successfully all the tasks that are defined sequentially. When the context constraints associated with some tasks of a workflow are not satisfied, those tasks cannot be executed and thus the workflow cannot proceed. This will cause delay of the workflow. In this thesis, we will introduce a model that integrated CR-RBAC and I-RBAC, and show its application to a workflow. If a user who was assigned to a task of a workflow does not satisfy the associated context constraint, the user cannot activate a context role to execute the task. But the user can use an isolation role to execute the task in an isolation environment temporarily. The workflow can still proceed without waiting. But the task must still be completed on host environment using the context role when the context constraints are satisfied. If the task cannot be completed on host environment, the task and its subsequent tasks must be rollbacked. A bank loan workflow was used as an example to illustrate our model. We assume that the task "Approve" has to be executed inside the bank. The user who was assigned to do the task "Approve" can use an isolation role to complete this task in isolated environment if he cannot meet the context constraints to activate a context role. Afterward the task can be confirmed in host environment by the task "Confirm". We used Activiti workflow engine in our implementation, where a program can be attached to a task. The system will reserve the loan amount of the workflow when the task "Approve" is executed by an isolation role. This amount will be restored if the final result of "Approve" is deny, and the system will notify other waiting workflows which need this amount to continue.
KLÍMA, Martin. "Optimalizace tvorby rolí pomocí RBAC modelu." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-316587.
Full text