Dissertations / Theses on the topic 'Science and sate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Science and sate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
GoluboviÄ, Boris 1967. "Study of near-infrared pumped solid-sate lasers and applications." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10046.
Full textIncludes bibliographical references (leaves 114-121).
by Boris Golubovic.
Ph.D.
Friend, Jennifer Ingrid Eubanks Eugene E. "Research on same-gender grouping in eighth-grade science classrooms." Diss., UMK access, 2004.
Find full text"A dissertation in urban leadership and policy studies in education, and education." Advisor: Eugene E. Eubanks. Typescript. Vita. Title from "catalog record" of the print edition. Description based on contents viewed Feb. 23, 2006. Includes bibliographical references (leaves 179-187). Online version of the print edition.
Coche, Bernard. "Societe civile et developpement des services de sante en afrique sub-saharienne : de la sante mentale a la sante publique (doctorat : biologie et sciences de la sante)." Rennes 1, 1999. http://www.theses.fr/1999REN1B037.
Full textDoherty, Kevin Eric. "SAGE-GROUSE AND ENERGY DEVELOPMENT: INTEGRATING SCIENCE WITH CONSERVATION PLANNING TO REDUCE IMPACTS." The University of Montana, 2009. http://etd.lib.umt.edu/theses/available/etd-03262009-132629/.
Full textEffective conservation planning in the face of rapid land use change requires knowledge of which habitats are selected at landscape scales, where those habitats are located, and how species ultimately respond to anthropogenic disturbance. I assessed sage-grouse (Centrocercus urophasianus) large scale habitat ecology and response to energy development in the winter and nesting seasons using radio-marked individuals in the Powder River Basin, Montana and Wyoming, USA. Landscape scale percent sagebrush (Artemisia spp.) cover at 4-km2 was the strongest predictor of use by sage-grouse in winter. After controlling for vegetation and topography, the addition the density of coal-bed natural gas wells within 4 km2 improved model fit (AIC -6.66, wi = 0.965) and indicated that sage-grouse avoided energy development. Nesting analyses showed that landscape context must be considered in addition to local scale habitat features (wi = 0.96). Findings provide managers a hierarchical filter in which to manage breeding habitats. Twice the amount of nesting habitat at 3, 5 and 10-km scales surrounded active leks versus random locations. Spatially explicit nesting and wintering models predicted independent sage-grouse locations (validation R2 ≥ 0.98). I incorporated knowledge of energy impacts into a study design that tested for threshold responses at regional scales analyzing 1,344 leks in Wyoming from 1997-2007. Potential impacts were indiscernible at 1-12 wells within 32.2 km2 of a lek (~1 well / 640 ac). At higher wells densities a time-lag showed higher rates of lek inactivity and steeper declines in bird abundance 4 years after than immediately following development. I spatially prioritized core areas for breeding sage-grouse across Wyoming, Montana, Colorado, Utah and the Dakotas and assessed risk of future energy development. Findings showed that bird abundance varies by state, core areas contain a disproportionately large segment of the breeding population and that risk of development within core areas varies regionally. My analyses document behavioral and demographic responses to energy development, offer new insights into large scale ecology of greater sage-grouse and provide resource managers with practical tools to guide conservation.
Doherty, Kevin Eric. "Sage-grouse and energy development integrating science with conservation planning to reduce impacts /." [Missoula, Mont.] : The University of Montana, 2008. http://etd.lib.umt.edu/theses/available/etd-03262009-132629/unrestricted/doherty.pdf.
Full textBenigeri, Mike. "La mesure de la sante dentaire : des indicateurs cliniques a l'auto-evaluation (doctorat : sciences de vie et de la sante)." Paris 5, 2000. http://www.theses.fr/2000PA05W065.
Full textAllen, Kimberly, Sarah Kirby, Taylor McDonald, and Bria Sledge. "B.E. Safe." Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/secfr-conf/2018/schedule/2.
Full textMcHenry, Kristen L. "Safe Practice." Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/etsu-works/2535.
Full textLindhult, Johan. "Operational Semantics for PLEX : A Basis for Safe Parallelization." Licentiate thesis, Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-631.
Full textAxelrod, Brian Maxim. "Algorithms for safe robot navigation." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/119513.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 71-73).
As drones and autonomous cars become more widespread it is becoming increasingly important that robots can operate safely under realistic conditions. The noisy information fed into real systems means that robots must use estimates of the environment to plan navigation. Efficiently guaranteeing that the resulting motion plans are safe under these circumstances has proved difficult. We build a mathematical framework for analyzing the quality of estimated geometry, rigorously developing the notion of shadows. We then examine how to use these tools guarantee that a trajectory or policy is safe with only imperfect observations of the environment. We present efficient algorithms that can prove that trajectories or policies are safe with much tighter bounds than in previous work. Notably, the complexity of the environment does not affect our method's ability to evaluate if a trajectory or policy is safe. We also examine the implications of various mathematical formalisms of safety and arrive at a mathematical notion of safety of a long-term execution, even when conditioned on observational information.
by Brian Maxim Axelrod.
M. Eng.
Conn, Matthew B. "Feeling same-sex desire: law, science, and belonging in German-speaking central Europe, 1750-1945." Diss., University of Iowa, 2014. https://ir.uiowa.edu/etd/6929.
Full textOdent, Sylvie. "Etude genetique : de l'holoprosencephalie non syndromique (doctorat : biologie et sciences de la sante)." Rennes 1, 2000. http://www.theses.fr/2000REN1B048.
Full textLaurikkala, Minna. "DIFFERENT TIME, SAME PLACE, SAME STORY? A SOCIAL DISORGANIZATION PERSPECTIVE TO EXAMINING JUVENILE HOMICIDES." Doctoral diss., University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4405.
Full textPh.D.
Department of Sociology
Sciences
Sociology
Chen, Haogang. "Certifying a crash-safe file system." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107325.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 93-99).
File systems are a cornerstone for storing and retrieving permanent data, yet they are complex enough to have bugs that might cause data loss, especially in the face of system crashes. FSCQ is the first file system that (1) provides a precise specification for the core subset of POSIX file-system APIs; and the APIs include fsync and fdatasync, which allow applications to achieve high I/O performance and crash safety, and that (2) provides a machine-checked proof that its I/O-efficient implementation meets this precise specification. FSCQ's proofs avoid crash-safety bugs that have plagued file systems, such as forgetting to insert a disk-write barrier between writing the data from the log and writing the log's commit block. FSCQ's specification also allows applications to prove their own crash safety, avoiding application-level bugs such as forgetting to invoke fsync on both the file and the containing directory. As a result, applications on FSCQ can provide strong guarantees: they will not lose data under any sequence of crashes. To state FSCQ's theorems, FSCQ introduces the Crash Hoare Logic (CHL), which extends traditional Hoare logic with a crash condition, a recovery procedure, and logical address spaces for specifying disk states at different abstraction levels. CHL also reduces the proof effort for developers through proof automation. Using CHL, the thesis developed, specified, and proved the correctness of the FSCQ file system. FSCQ introduces a metadata-prefix specification that captures the properties of fsync and fdatasync, based on Linux ext4's behavior. FSCQ also introduces disk sequences and disk relations to help formalize the metadata-prefix specification. The evaluation shows that FSCQ enables end-to-end verification of application crash safety, and that FSCQ's optimizations achieve I/O performance on par with that of Linux ext4.
by Haogang Chen.
Ph. D.
Buksh, Bala. "Services for activities in group editing 'sage'." Thesis, Aston University, 1993. http://publications.aston.ac.uk/10679/.
Full textMagnusson, Björn, and Måns Forslund. "SAFE AND EFFICIENT REINFORCEMENT LEARNING." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-76588.
Full textFörprogrammering av en robot kan vara effektiv i viss utsträckning, men eftersom en människa har programmerat roboten kommer den bara att vara lika effektiv som programmet är skrivet. Problemet kan lösas genom att använda maskininlärning. Detta gör att roboten kan lära sig det effektivaste sättet på sitt sätt. Denna avhandling är fortsättning på ett tidigare arbete som täckte utvecklingen av ramverket Safe-To-Explore-State-Spaces (STESS) för säker robot manipulation. Denna avhandling utvärderar effektiviteten hos Q-Learning with normalized advantage function (NAF), en deep reinforcement learning algoritm, när den integreras med ramverket STESS. Det gör detta genom att utföra en 2D-uppgift där roboten flyttar sitt verktyg på ett plan från punkt A till punkt B i en förbestämd arbetsyta. För att testa effektiviteten presenterades olika scenarier för roboten. Inga hinder, hinder med sfärisk form och hinder med cylindrisk form. Deep reinforcement learning algoritmen visste bara startpositionen och STESS-fördefinierade arbetsytan och begränsade de områden som roboten inte fick beträda. Genom att uppfylla dessa hinder kunde roboten utforska och lära sig det mest effektiva sättet att utföra sin uppgift. Resultaten visar att NAF-algoritmen i simulering lär sig snabbt och effektivt, samtidigt som man undviker hindren utan kollision.
Blum, William. "The safe lambda calculus." Thesis, University of Oxford, 2009. http://ora.ox.ac.uk/objects/uuid:537d45e0-01ac-4645-8aba-ce284ca02673.
Full textLópez-Pineda, Andrés Humberto. "FlightCrew Browser : a safe browser for drivers." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85444.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 55-57).
Drivers have information needs they want to solve while driving, but current mobile browser interfaces can bring forth safety issues when users browse the web even though their attention is required elsewhere, as it is during driving. FlightCrew Browser is a crowd-adapted web browser using speech input, touch input, speech output, and visual output in appropriate, informative, and safe ways to empower the driver of a car to investigate an evolving information need. Our system uses human workers to do browsing interactions for the user, as well as pick data from webpages that will be returned to the user. We use three workers at a time in order to provide quality control by using a voting system to pick what answers the workers believed to be best for the user. The workers can hear the driver's query and see the last page the driver received answers from in order to provide a shared context. FlightCrew Browser provides a low-risk way for users to access the web when they are commuting or traveling alone. We evaluated our system using metrics and tests similar to those used by the National Highway Traffic Safety Administration and found that it is safer for drivers to use than existing mobile browsers.
by Andrés Humberto López-Pineda.
M. Eng.
Lundberg, Johannes. "Safe Kernel Programming with Rust." Thesis, KTH, Programvaruteknik och datorsystem, SCS, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-233255.
Full textAtt skriva buggfri kod i ett lågnivåspråk som C är väldigt svårt. C-kompilatorer blir bättre och bättre på att upptäcka buggar men är ännu långt ifrån att kunna garantera buggfri kod. För applikationsprogrammering finns det tillgängligt olika högnivåspråk som abstrakterar bort den manuella minneshanteringen och hjälper med trådsäker programmering. Dock fortfarande så är större delar av operativsystemet och dess kärna är endast skriven i C. Hur kan vi göra programmering i kärnan säkrare? Vad är prestandakonsekvenserna av att använda ett säkrare språk? I denna uppsats ska vi försöka svara på dessa frågor genom att använda språket Rust. Ett programmeringsgränssnitt i Rust är implementerat i kärnan och en nätverksdrivrutin är portad till Rust. Källkoden skriven i Rust är analyserad för att bedömma säkerheten samt prestandan är jämförd mellan C och Rust implementationerna. Det är bevisat att vi kan skriva en drivrutin i enbart säker Rust om vi kan lita på några osäkra funktioner i gränssnittet. Mätningar visar lite bättre prestanda i Rust.
Tolley, Rebecca. "Sage Research Methods Online [workshop]." Digital Commons @ East Tennessee State University, 2011. https://dc.etsu.edu/etsu-works/5753.
Full textTurner, Sarah. "An investigation of teacher well-being as a key component of creativity in science classroom contexts in England." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/21744.
Full textJupin, Joseph. "Temporal Graph Record Linkage and k-Safe Approximate Match." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/412419.
Full textPh.D.
Since the advent of electronic data processing, organizations have accrued vast amounts of data contained in multiple databases with no reliable global unique identifier. These databases were developed by different departments for different purposes at different times. Organizing and analyzing these data for human services requires linking records from all sources. RL (Record Linkage) is a process that connects records that are related to the identical or a sufficiently similar entity from multiple heterogeneous databases. RL is a data and compute intensive, mission critical process. The process must be efficient enough to process big data and effective enough to provide accurate matches. We have evaluated an RL system that is currently in use by a local health and human services department. We found that they were using the typical approach that was offered by Fellegi and Sunter with tuple-by-tuple processing, using the Soundex as the primary approximate string matching method. The Soundex has been found to be unreliable both as a phonetic and as an approximate string matching method. We found that their data, in many cases, has more than one value per field, suggesting that the data were queried from a 5NF data base. Consider that if a woman has been married 3 times, she may have up to 4 last names on record. This query process produced more than one tuple per database/entity apparently generating a Cartesian product of this data. In many cases, more than a dozen tuples were observed for a single database/entity. This approach is both ineffective and inefficient. An effective RL method should handle this multi-data without redundancy and use edit-distance for approximate string matching. However, due to high computational complexity, edit-distance will not scale well with big data problems. We developed two methodologies for resolving the aforementioned issues: PSH and ALIM. PSH – The Probabilistic Signature Hash is a composite method that increases the speed of Damerau-Levenshtein edit-distance. It combines signature filtering, probabilistic hashing, length filtering and prefix pruning to increase the speed of edit-distance. It is also lossless because it does not lose any true positive matches. ALIM – Aggregate Link and Iterative Match is a graph-based record linkage methodology that uses a multi-graph to store demographic data about people. ALIM performs string matching as records are inserted into the graph. ALIM eliminates data redundancy and stores the relationships between data. We tested PSH for string comparison and found it to be approximately 6,000 times faster than DL. We tested it against the trie-join methods and found that they are up to 6.26 times faster but lose between 10 and 20 percent of true positives. We tested ALIM against a method currently in use by a local health and human services department and found ALIM to produce significantly more matches (even with more restrictive match criteria) and that ALIM ran more than twice as fast. ALIM handles the multi-data problem and PSH allows the use of edit-distance comparison in this RL model. ALIM is more efficient and effective than a currently implemented RL system. This model can also be expanded to perform social network analysis and temporal data modeling. For human services, temporal modeling can reveal how policy changes and treatments affect clients over time and social network analysis can determine the effects of these on whole families by facilitating family linkage.
Temple University--Theses
Sculthorpe, Neil. "Towards safe and efficient functional reactive programming." Thesis, University of Nottingham, 2011. http://eprints.nottingham.ac.uk/11981/.
Full textBoyapati, Chandrasekhar 1973. "SafeJava : a unified type system for safe programming." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/30087.
Full textIncludes bibliographical references (p. 155-164).
Making software reliable is one of the most important technological challenges facing our society today. This thesis presents a new type system that addresses this problem by statically preventing several important classes of programming errors. If a program type checks, we guarantee at compile time that the program does not contain any of those errors. We designed our type system in the context of a Java-like object-oriented language; we call the resulting system SafeJava. The SafeJava type system offers significant software engineering benefits. Specifically, it provides a statically enforceable way of specifying object encapsulation and enables local reasoning about program correctness; it combines effects clauses with encapsulation to enable modular checking of methods in the presence of subtyping; it statically prevents data races and deadlocks in multithreaded programs, which are known to be some of the most difficult programming errors to detect, reproduce, and eliminate; it enables software upgrades in persistent object stores to be defined modularly and implemented efficiently; it statically ensures memory safety in programs that manage their own memory using regions; and it also statically ensures that real-time threads in real-time programs are not interrupted for unbounded amounts of time because of garbage collection pauses. Moreover, SafeJava provides all the above benefits in a common unified type system framework, indicating that seemingly different problems such as encapsulation, synchronization issues, software upgrades, and memory management have much in common.
(cont.) We have implemented several Java programs in SafeJava. Our experience shows that SafeJava is expressive enough to support common programming patterns, its type checking is fast and scalable, and it requires little programming overhead. In addition, the type declarations in SafeJava programs serve as documentation that lives with the code, and is checked throughout the evolution of code. The SafeJava type system thus has significant software engineering benefits and it offers a promising approach for improving software reliability.
by Chandrasekhar Boyapati.
Ph.D.
Blair, Zachary. "Same-Sex Marriages: A Cross-Cultural Analysis." Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/739.
Full textBachelors
Arts and Sciences
Anthropology
Leslie, Rebekah. "A Functional Approach to Memory-Safe Operating Systems." PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/499.
Full textGan, Yee Ling. "Redesigning the memory hierarchy for memory-safe programming languages." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119765.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 69-75).
We present Hotpads, a new memory hierarchy designed from the ground up for modern, memory-safe languages like Java, Go, and Rust. Memory-safe languages hide the memory layout from the programmer. This prevents memory corruption bugs, improves programmability, and enables automatic memory management. Hotpads extends the same insight to the memory hierarchy: it hides the memory layout from software and enables hardware to take control over it, dispensing with the conventional flat address space abstraction. This avoids the need for associative caches and virtual memory. Instead, Hotpads moves objects across a hierarchy of directly-addressed memories. It rewrites pointers to avoid most associative lookups, provides hardware support for memory allocation, and unifies hierarchical garbage collection and data placement. As a result, Hotpads improves memory performance and efficiency substantially, and unlocks many new optimizations. This thesis contributes important optimizations for Hotpads and a comprehensive evaluation of Hotpads against prior work.
by Yee Ling Gan.
M. Eng.
Bank, Joseph A. "Code importing techiques for fast, safe client/server access." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38788.
Full textDuxovni, Faye(Faye Samara). "Mechanized proofs that hardware is safe from timing attacks." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/122053.
Full textThesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 47-48).
A recurring problem in cryptography engineering is the potential for secret data to be leaked through aspects of software and hardware that are orthogonal to functional correctness. In particular, much effort is put into writing cryptography code whose timing behavior - how many CPU clock cycles it takes to complete a given cryptographic operation - is independent of any secret inputs to that operation. This is a difficult problem because it depends not only on the code itself, but also on various optimizations such as branch prediction and memory caching implemented by the underlying hardware the program runs on. We make use of Kami, a domain-specific language for describing and formally verifying hardware modules, to build a system for constructing machine-checked proofs that a given piece of code running on a given RISC-V CPU design will not leak secret inputs through timing behavior. Our system allows software and hardware to be analyzed and verified independently, and we prove that any combination of software and hardware that meet our validation criteria will be safe from timing-based side channels. We demonstrate an example of validating a real cryptographic program and a concrete RISC-V CPU using our system, illustrating the applicability of our tools and laying the groundwork for validating more complex programs and CPUs.
by Faye Duxovni.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Haggerty, Brian Thomas. "Safe havens in Syria : missions and requirements for an air campaign." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/95520.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 102-109).
What if the United States had led its NATO allies to intervene in Syria's civil war in the midst of calls for humanitarian intervention in mid-2012? Despite the importance of this question for the study and evaluation of U.S. foreign policy, little exists in the way of systematic, open-source analysis of the military missions and material requirements for a possible Syrian intervention. This thesis assesses the scale, scope, and challenges of intervention in Syria at the time its proponents argue it would have been most effective. It does so through open-source analysis of a U.S.-led air campaign designed to mitigate the country's humanitarian crisis. The model of intervention analyzed -- broadly conceived as the establishment of safe havens around major Syrian population areas defended from the air -- offers a template for evaluating the utility of air power in the Syrian context more generally. The analysis suggests an intervention in mid-2012 to establish safe havens in Syria would have been a major military undertaking, likely requiring greater resources and facing greater risks than any of NATO's previous air campaigns in response to humanitarian crises in Bosnia, Kosovo, or Libya. The "low-risk" rationale for humanitarian intervention from the air thus appears far less persuasive in the Syrian case. The thesis concludes with implications for the application of air power to future humanitarian crises.
by Brian Thomas Haggerty.
S.M.
Colazzo, Dario. "Schemas for safe and efficient XML processing." Habilitation à diriger des recherches, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00626227.
Full textRackin, Heather. "Female Same-Sex Sexual Desires: An Evolutionary Perspective." Honors in the Major Thesis, University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/986.
Full textBachelors
Arts and Sciences
Anthropology
Rolland, Yan. "Elements de perception , de modelisation et d'analyse de texture (doctorat : biologie et sciences de la sante)." Rennes 1, 1997. http://www.theses.fr/1997REN1B022.
Full textDuberg, Daniel. "Safe Navigation of a Tele-operated Unmanned Aerial Vehicle." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221701.
Full textObemannad luftfarkoster (UAV:er) kan navigera i inomhusmiljöer och genom miljöer som är farliga eller svåra att nå för människor. Detta gör dem lämpliga för användning i sök- och räddningsuppdrag och av akutmottagning och rättsväsende genom ökad situationsmedvetenhet. Dock är det även för en erfaren UAV-teleoperatör krävande och svårt att kontrollera en UAV i dessa situationer utan att kollidera med hinder. Denna avhandling presenterar ett människa-UAV-gränssnitt tillsammans med en kollisionsundvikande metod, båda optimerade för en mänsklig teleoperatör. Målet är att förenkla uppgiften att navigera en UAV i inomhusmiljöer. Utvärdering av systemet görs genom att testa det mot ett antal användningsfall och en användarstudie. Resultatet av denna avhandling är en kollisionsundvikande metod som lyckas skydda UAV från hinder och samtidigt tar hänsyn till operatörens avsikter.
Malobabic, Slavica. "Transient Safe Operating Area (TSOA) for ESD applications." Doctoral diss., University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5420.
Full textID: 031001296; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Juin J. Liou.; Title from PDF title page (viewed March 7, 2013).; Thesis (Ph.D.)--University of Central Florida, 2012.; Includes bibliographical references (p. 252-262).
Ph.D.
Doctorate
Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering
Al-Qora'n, Lamis Farah. "SAFE-FLOW : a systematic approach for safety analysis of clinical workflows." Thesis, University of Hull, 2015. http://hydra.hull.ac.uk/resources/hull:13064.
Full textLiu, Kun. "Improved Onsite Wastewater Disinfection and Nutrient Removal for Safe Discharge and Reuse." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1500588070537771.
Full textEggert, Jon Edward 1962. "Self-disclosure in male same-sex friendships." Thesis, The University of Arizona, 1994. http://hdl.handle.net/10150/291779.
Full textLinder, Kari K. B. "For Fox Sake: Animal Roles and Interspecies Empathy." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1396.
Full textWang, Stephanie M. Eng Massachusetts Institute of Technology. "Certifying checksum-based logging in the RapidFSCQ crash-safe filesystem." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106390.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 57-60).
As more and more software is written every day, so too are bugs. Formal verification is a way of using mathematical methods to prove that a program has no bugs. However, if formal verification is to see widespread use, it must be able to compete with unverified software in performance. Unfortunately, many of the optimizations that we take for granted in unverified software depend on assumptions that are difficult to verify. One such optimization is data checksums in logging systems, used to improve I/O efficiency while still ensuring data integrity after a crash. This thesis explores a novel method of modeling the probabilistic guarantees of a hash function. This method is then applied to the logging system underlying RapidFSCQ, a certified crash-safe filesystem, to support formally verified checksums. An evaluation of RapidFSCQ shows that it enables end-to-end verification of application and filesystem crash safety, and that RapidFSCQ's optimizations, including checksumming, achieve I/O performance on par with Linux ext4. Thus, this thesis contributes a formal model of hash function behavior with practical application to certified computer systems.
by Stephanie Wang.
M. Eng.
Barenblat, Benjamin Ezra. "Memory-safe microcontroller applications with the Bedrock structured programming system." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100294.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 71-72).
Microcontrollers - low-power, real-mode CPUS - drive digital electronics all over the world, making their safety and reliability critical. However, microcontrollers generally lack the memory protection common in desktop processors, so memory safety must come through other means. One such mechanism is Bedrock, a library for the Coq proof assistant that applies separation logic to a small c-like language, allowing programmers to prove memory-related properties about their code. I used Bedrock to build a security peripheral out of a Cortex-m3 microcontroller; my peripheral provides both AES encryption and append-only logging to a host system, and I showed the software it runs is memory-safe. Working with Bedrock was challenging but rewarding, and it provides a glimpse into a future where system programmers can prove code correct as a matter of course.
by Benjamin Ezra Barenblat.
M. Eng.
Bendali, Fatah. "Epidemiologie des gastro-enterites neonatales chez le veau (doctorat : sciences de la vie et de la sante)." Besançon, 1998. http://www.theses.fr/1998BESA3705.
Full textLavelock, Caroline. "Four Virtues: Interventions for Goodness' Sake." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3008.
Full textYao, Conglun. "Strongly typed, compile-time safe and loosely coupled data persistence." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1186/.
Full textBlessin, Joseph Richard. "'Scientist Sade' and discovery in the High Enlightenment." Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/12263.
Full textMsosa, Alan. "Human rights and same-sex intimacies in Malawi." Thesis, University of Essex, 2018. http://repository.essex.ac.uk/21553/.
Full textLeclercq, Christophe. "Hemodynamique et stimulation cardiaque permanente : applications au traitement des dysfonctions ventriculaires (doctorat : biologie et sciences de la sante)." Rennes 1, 2000. http://www.theses.fr/2000REN1B046.
Full textMöller, Kristin, and Malin Wahlström. "Byte av triagesystem från RETTS till SATS i ambulansverksamhet." Thesis, Karlstads universitet, Institutionen för hälsovetenskaper (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-83458.
Full textJohansson, Linda, and Rebecka Hagman. "Same, Same but Different : -a Minor Field Study of the Future Red Cross Women´s Project, Malindi Branch, Kenya." Thesis, Växjö University, School of Social Sciences, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-973.
Full textSame, Same, but Different
-a Minor Field Study of the Future Red Cross Women’s Project,
Malindi Branch, Kenya.
In May 2005, we received a scholarship from the Swedish International Development Agency, SIDA, to conduct a Minor Field Study about the future women’s project at the Malindi Red Cross branch, Kenya. The branch has since May 2002 been involved in a Twinning cooperation with the Swedish Red Cross Southeast Region.
The aim of this thesis is by using the Logical Framework Approach and the Intersectional perspective, to examine the situation for women in Malindi and the work of the Red Cross branch, in order to propose guidelines for the future Red Cross women’s project. The questions asked were: How can the guidelines for the women’s project be formulated in order for the vision of the Red Cross to be reached? What changes within the individual, societal and political sphere have to be accomplished in order to meet the needs and interests of different women in Malindi?
The work of the Red Cross is in a political science perspective interesting as it through its role of a humanitarian organisation and NGO, plays an important role in the Kenyan civil society, performing activities and providing services that originally should be supplied by the government.
We have found that it is not possible to talk about the woman in Malindi, due to the fact that women’s backgrounds, problems, needs and interests are different. Therefore it is of great importance that the Red Cross in order to accomplish its vision, i.e. to reach the most vulnerable, includes a gender and an intersectional approach into its activities and outreaches. There is a desire in Kenya to politicize the gender issue, however the future will show the will to actually implement these laws and reforms needed for the empowerment of the women. Moreover, different gender structures can only be achieved through the questioning of the traditional gender roles from both men and women and in this process we have recognised the Red Cross as an important moulder of public opinion. Finally we also want to suggest an inclusion of the gender- and the intersectional perspective into the method of LFA, since the traditional model is not sufficient in considering the different needs of different people.
Hansen, Erica P. "Influence of Disturbance on Greater Sage-Grouse Habitat Selection in Southern Utah." DigitalCommons@USU, 2016. https://digitalcommons.usu.edu/etd/5231.
Full text