Tesi sul tema "Protection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Protection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.
Testo completoKoval, L. A., e T. N. Burenko. "Environmental protection". Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17562.
Testo completoClausen, Jenelle. "Asset Protection". Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1429269560.
Testo completoBradley, Lucy. "Frost Protection". College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/144680.
Testo completoThe variation of the first and the last frost date is due to differences in elevation, density of population and several other factor, including a variation in temperature from year to year. All these variations make it more difficult to protect plants. To adequately protect your plants from frost damage you need to understand cold weather; how plants respond to cold; how heat is transferred; how to prevent frost damage; symptoms of frost damage and how to care for plants that have been damaged by frost.
Stevens, Katy. "Thermophysiological comfort and water resistant protection in soft shell protective garments". Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493789.
Testo completoGerhardsson, Daniel. "Starter Motor Protection". Thesis, Linköping University, Vehicular Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57309.
Testo completoStarter motors are sensitive for overheating. By estimating the temperature and
preventing cranking in time, there is an option to avoid the dangerous temperatures.
The truck manufacturer Scania CV AB proposed a master thesis that
should evaluate the need of an overheating protection for the starter motor.
The aim is to evaluate any positive effects of implementing an algorithm that
can estimate the brush temperature instead of using the available time constrain,
which allows 35 seconds of cranking with a following 2 seconds delay, allowing the
crank shaft to stop before a new start attempt is allowed. To achieve high load
on the starter motor and high temperature in the brushes, tests were performed
under
Initial testing on truck, under normal temperatures, showed that the batteries
could not run the starter motor long enough to reach high temperatures in the
brushes. This is believed to be caused by the voltage drop between the batteries
and the starter motor, causing the starter motor to run in an operating area it
is not optimized for. There are several other problems which gives a higher load
on the engine, for example oil viscosity, resulting in higher currents, but those are
not mentioned in this report.
Three different models are compared, Two State Model, Single State Model
and a Time Constrained Model. Tests and verifications show that the Two State
Model is superior when it comes to protecting the starter motor from overheating
and at the same time maximizing the cranking time. The major difference between
the Two State Model and the Single State Model are the cooling characteristics.
In the Single State Model the brush temperature drops quickly to the outside
temperature while in the Two State Model the brush temperature drops to a
second state temperature instead of the outside temperature. With the currently
implemented time constrain it is possible to overheat the starter motor. The
algorithms are optimized under cold conditions, due to problems in reaching high
temperatures under warmer conditions.
−20 Celsius.
Mellstrand, Per. "Informed system protection /". Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/169a9a18d7974145c12572f00031dd2b?OpenDocument.
Testo completoInuwa, A. D. "Smart motor protection". Thesis, University of Sussex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431615.
Testo completoSvensson, Niklas, e Martin Holmberg. "Offshore cable protection". Thesis, Linnéuniversitetet, Institutionen för maskinteknik (MT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34775.
Testo completoShwani, Hazim G. "Critical infrastructure protection". Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.
Testo completoThis research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.
Khan, K. R. "Digital generator protection". Thesis, Imperial College London, 1985. http://hdl.handle.net/10044/1/37743.
Testo completoWitchel, Emmett Jethro 1970. "Mondriaan memory protection". Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28330.
Testo completoIncludes bibliographical references (p. 129-135).
Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and security of computer systems, but will be adopted only if the protection mechanism does not compromise performance, and if the hardware mechanism can be used easily by existing software. Mondriaan memory protection (MMP) provides fine-grained memory protection for a linear address space, while supporting an efficient hardware implementation. MMP's use of linear addressing makes it compatible with current software programming models and program binaries, and it is also backwards compatible with current operating systems and instruction sets. MMP can be implemented efficiently because it separates protection information from program data, allowing protection information to be compressed and cached efficiently. This organization is similar to paging hardware, where the translation information for a page of data bytes is compressed to a single translation value and cached in the TLB. MMP stores protection information in tables in protected system memory, just as paging hardware stores translation information in page tables. MMP is well suited to improve the robustness of modern software. Modern software development favors modules (or plugins) as a way to structure and provide extensibility for large systems, like operating systems, web servers and web clients. Protection between modules written in unsafe languages is currently provided only by programmer convention, reducing system stability.
(cont.) Device drivers, which are implemented as loadable modules, are now the most frequent source of operating system crashes (e.g., 85% of Windows XP crashes in one study [SBL03]). MMP provides a mechanism to enforce module boundaries, increasing system robustness by isolating modules from each other and making all memory sharing explicit. We implement the MMP hardware in a simulator and modify a version of the Linux 2.4.19 operating system to use it. Linux loads its device drivers as kernel module extensions, and MMP enforces the module boundaries, only allowing the device drivers access to the memory they need to function. The memory isolation provided by MMP increases Linux's resistance to programmer error, and exposed two kernel bugs in common, heavily-tested drivers. Experiments with several benchmarks where MMP was used extensively indicate the space taken by the MMP data structures is less than 11% of the memory used by the kernel, and the kernel's runtime, according to a simple performance model, increases less than 12% (relative to an unmodified kernel).
by Emmett Jethro Witchel.
Ph.D.
Rabuzin, Tin. "Shaft Current Protection". Thesis, KTH, Industriella informations- och styrsystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177353.
Testo completoSkydd mot axelstrommar i vattenkraft- och turbo-generatorer ar mycket viktiga. Strommar kan uppkomma i generatoraxeln beroende pamagnetisk osymmetri istatorkarnan. Denna osymmetri ger upphov till en inducerad spanning i axelnsom sedan kan ge en axel-strom vid kortslutning av isolationen som rotornslager vilar pa. Om axel-strommen gar genom generatorns lager, kan lagretskadas allvarligt. Detta kommer i sin tur minska drifttiden och orsaka storaekonomiska forluster vid produktionsbortfall. Darfor ar det viktigt att detekteraom det gar axelstrommar genom generatorns lager. Examensarbetets mal var att utveckla ett mat- och skyddssystem for att detekteraaxel-strommar. Den matande enheten maste kunna detektera strommarmindre an 1 A i generatoraxeln vilken kan variera i diameter fran 16 cm upp till3 m. Dessutom kan dessa strommar ha frekvenser lika med eller multiplar avkraftnatets frekvens (50 eller 60Hz). Den matande enheten skall vidare kunnamonteras i ett trangt utrymme och i narhet av generatorns stator. Lackodefran statorn kan forvantas vara stort, och detta kan antas ha stor paverkanpamatningarna. Eftersom axelstrommen som mats ar lag, ar utsignalen franden matande enheten vanligtvis en lagnivasignal. Denna laga signalnivamasteanpassas saatt den kan anvandas i ett numeriskt rela, vilka vanligtvis kraverhogre energinivaer paingangsignalerna.Efter genomford litteraturstudie och oversikt over mojliga losningar, konkluderadesdet att en losning med Rogowski spole som matanordning borde varaintressant, och denna analyserades ytterligare. Tvastromtransformatorer medkonventionell konstruktion med karna av elektroplat valdes som jamforelse medlosningen baserad paRogowski spole. Flera olika tester och matningar gjordes. Dessutom undersoktes hur en process-bus losning enligt IEC61850-9-2LE meden Merging Unit (MU) skulle kunna anvandas i denna tillampning. Vid alladessa undersokningar har kompletta system for matning och skydd monteratsoch testats i laboratoriemiljo.For att registrera funktionen for de olika systemlosningarna i en verkligmiljo, monterades det kompletta systemet fran laboratorietesterna in i ett vattenkraftverki Hallstahammar. I detta vattenkraftverk ingar traditionella skydd-, styrnings- och kontroll-system och aven en aldre losning for att skydda generatornmot axelstrommar. Darmed kunde man jamfora prestanda mellan deolika losningarna baserade pastromtransformatorer av konventionell konstruktionmed karna av elektroplat och losningen med Rogowski spole. Signalerfran bada givarna anslots till ett numeriskt rela, och anslutning av Rogowskispolen gjordes aven via en MU till det numeriska relat. Matningar och testersom gjordes i kraftstationen kunde tas som ett slutligt bevis paatt de olikalosningarna baserade pa Rogowski spole ar en framtida losning for ett valfungerande axel-stroms skydd for generatorer. Resultaten visar att Rogowskispolen ar ett lampligt val aven med avseendepadess fordelaktiga mekaniska och elektriska egenskaper. Testerna som gjordesmed en verklig axel-strom visade tydligt fordelarna med att anvanda Rogowskispolen i kombination med MU och process bus jamfort med traditionella skyddssystem. Det ska dock understrykas att bade systemet med och det utan MUuppfyllde projektets krav.
Krys', P. "Labour protection finansing". Thesis, Вид-во СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/13057.
Testo completoMerzlikina, J., e L. M. Chuchilina. "Protection of information". Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17576.
Testo completoCherry, Shirley J. "Radiation Protection Review". Digital Commons @ East Tennessee State University, 2002. https://dc.etsu.edu/etsu-works/2490.
Testo completoLoureiro, Sergio. "Mobile code protection /". Paris : École nationale supérieure des télécommunications, 2001. http://catalogue.bnf.fr/ark:/12148/cb38828305r.
Testo completoFarrell-Poe, Kitt, e Susan Pater. "Private Well Protection". College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2011. http://hdl.handle.net/10150/156922.
Testo completo1. Drinking Water Wells; 2. Private Water Well Components; 3. Do Deeper Wells Mean Better Water; 4. Maintaining Your Private Well Water System; 5. Private Well Protection; 6. Well Water Testing and Understanding the Results; 7. Obtaining a Water Sample for Bacterial Analysis; 8. Microorganisms in Private Water Wells; 9. Lead in Private Water Wells; 10. Nitrate in Private Water Wells; 11.Arsenic in Private Water Wells; 12. Matching Drinking Water Quality Problems to Treatment Methods; 13. Commonly Available Home Water Treatment Systems; 14. Hard Water: To Soften or Not to Soften; 15. Shock Chlorination of Private Water Wells
This fact sheet is one in a series of fifteen for private water well owners. The one- to four-page fact sheets will be assembled into a two-pocket folder entitled Private Well Owners Guide. The titles will also be a part of the Changing Rural Landscapes project whose goal is to educate exurban, small acreage residents. The authors have made every effort to align the fact sheets with the proposed Arizona Cooperative Extension booklet An Arizona Well Owners Guide to Water Sources, Quality, Sources, Testing, Treatment, and Well Maintenance by Artiola and Uhlman. The private well owner project was funded by both the University of Arizonas Water Sustainability Program-Technology and Research Initiative Fund and the USDA-CSREES Region 9 Water Quality Program.
Cherry, Shirley J. "Radiation Protection Overview". Digital Commons @ East Tennessee State University, 2006. https://dc.etsu.edu/etsu-works/2486.
Testo completoCherry, Shirley J. "Radiation Protection Review". Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/2492.
Testo completoMcGinty, Heather L. "Predicting Fear of Recurrence and Protective Health Behaviors Using Protection Motivation Theory". Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3631.
Testo completoAlpsten, Gustav, e Sercan Samanci. "Portfolio Protection Strategies: A study on the protective put and its extensions". Thesis, KTH, Matematisk statistik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231585.
Testo completoHantering av volatilitet i finansiella marknader har under de senaste decennierna visat sig vara nödvändigt för investerare, framför allt i samband med krascher och långdragna nedgångar i de globala aktiemarknaderna. Detta har gett upphov till en likvid derivatmarknad i form av optioner samt väckte intresse för forskning i området. Tidigare studier har i synnerhet undersökt effektiviteten i den välkända protective put-strategin som kombinerar en lång position i underliggande aktie med en put-option. Resultaten är ofta inte tilltalande och visar få fördelar med strategin, där dess höga kostnader lyfts upp som ett stort problem. Således väcks frågan om protective put-strategin kan förbättras eller om det möjligtvis finns några kostnadseffektiva alternativ med relativt bättre säkerhet mot eventuella nedgångar i underliggande. Denna studie utvidgar tidigare forskning i området genom att undersöka förbättringsmöjligheter för och alternativ till protective put-strategin. Särskilt studeras tre olika put spread-strategier och en collar-strategi, samt en modifierad version av protective put som ämnar att minska på vägberoendet i en löpande optionsstrategi. Resultatet från denna studie pekar på att ingen optionsbaserad strategi är universellt bäst. Generellt sett ger en avyttring av delar av aktieinnehavet ett mer effektivt skydd, men vi visar att det finns situationer då en collar-strategi som köper 5 % OTM put-optioner och säljer 5 % OTMcall-optioner har en attraktiv risk-justerad profil och säkerhet mot nedgångar. Vi visar vidare att protective put-strategin blir mer effektiv, både i termer av en risk-justerad avkastning och som säkerhet mot svansrisker, för längre förfallodatum på optionerna.
Shi, Zhanpeng. "Investigation on Generator Loss of Excitation Protection in Generator Protection Coordination". Thesis, KTH, Elektriska energisystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119259.
Testo completoFay, Franziska Maria. "Perilous protection : discipline, chastisement and child protection in schools in Zanzibar". Thesis, SOAS, University of London, 2017. http://eprints.soas.ac.uk/26491/.
Testo completoPavlovic, Dusan <1981>. "Online Gambling in the UE: from Data Protection to Gambler Protection". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8721/1/PAVLOVIC_DUSAN_tesi.pdf.
Testo completoFinken, Paul J. "Protecting the force : application of statistical process control for force protection in Bosnia /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380139.
Testo completoNilsson, Jennie. "Are Colours Worth Protecting? : An Examination of Abstract Colour Marks’ Scope of Protection". Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-11212.
Testo completoIn the search for companies to distinguish themselves from the mass, so called non-traditional trade marks have become increasingly popular, and in particular colour marks. It is now clear that abstract colour marks can be registered as trade marks, and the number of registered colour marks has increased considerably in recent years. However, it remains a lot more uncertain, mainly due to lack of case law, what the extent of colour marks’ scope of protection is. Are colours actually worth protecting? The purpose of this thesis is to examine the scope of protection of registered abstract colour marks from an EU perspective. Through this examination it will also be established whether colours are worth protecting.
The essential function of trade marks is to indicate the origin of products. Signs that are capable of being represented graphically and capable of distinguishing goods and services from one undertaking from those of other undertakings can be registered as trade marks. Colours can fulfil these criteria in certain circumstances, however, colours can practically never have distinctive character per se. Instead, they must have acquired distinctive character through use. Since it is quite difficult to register colour marks, a colour mark proprietor should be prepared to have the validity of his trade mark challenged if he issues proceedings for infringement.
There are a few national cases from EU Member States that have concerned infringement of colour marks, and in all of these the plaintiff was successful in claiming infringement. Through the decisions in these cases, general legal principles and statements made in literature, the scope of protection of colour marks has been examined. Infringement of a colour mark occurs in three different situations: where there is likelihood of confusion, where there is double identity and where there is dilution of a trade mark with a reputation.
Some of the most important findings are that confusingly similar colours include adjacent shades, but in order to prove likelihood of confusion, the infringing colour must probably be perceived by the public as an indication of origin and other signs that appear together with the colour must probably be taken into account, which limits the scope of protection to some extent. However, since colour marks must almost always have acquired distinctive character through use, consumers are used to perceiving that colour as a trade mark in relation to those types of goods/services, and are therefore more likely to do so also when the colour is used by the third party. Furthermore, there have to be an individual assessment in each case in order to determine whether surrounding signs exclude a likelihood of confusion, where all factors should be considered, including the distinctiveness of the colour mark and how clear and prominent the other signs are.
In situations of double identity, the infringing sign does not have to be used as a trade mark, which is advantageous for colour mark owners. Furthermore, identical colours can possibly include other shades if they are so similar that the difference is barely perceptible in a direct comparison.
Colour marks can often qualify as trade marks with a reputation, since the assessment of whether trade marks have a reputation is similar to the assessment of whether trade marks have acquired distinctive character through use. Trade marks with a reputation has an extended protection meaning that if a third party uses a sign that is identical or similar to a trade mark with a reputation, and that use without due cause takes unfair advantage of, or is detrimental to, the distinctive character or repute of the trade mark, then that use constitutes infringement. This applies both in relation to identical, similar and dissimilar products, however, it will probably only apply in relation to identical or similar products when it comes to colour marks, due to the extensive use of colours in the market. The extended protection could be relevant in particular in situations where likelihood of confusion cannot be proven, because the public does not perceive the infringing sign as a trade mark or because of surrounding prominent signs.
This examination shows that the scope of protection of colour marks is not great, it has some weaknesses. However, it is definitely not worthless either, which clearly shows in the fact that the plaintiffs were successful in claiming infringement in all of the infringement cases. By registering a colour as a trade mark, a company can to some extent stop others from using the same or similar colour, and it will also most likely have a discouraging effect. However, some carefulness should still be applied in relation to colour marks, since this is still a very new phenomenon and additional case law can take another direction. But considering how the situation looks today, colours are worth protecting as trade marks.
Gonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.
Testo completoHarvey, Janell M. "Protecting Biscayne an analysis of strategies for the protection of Biscayne National Park /". [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000530.
Testo completoKreiser, Kilian. "SPAN (Special Protection Area Network) : A platform to protect bird protection areas". Thesis, Umeå universitet, Institutionen Designhögskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-72662.
Testo completoMethods Involving all important stakeholders was inevitable to make sure the result will fit their needs. In meetings with coordinators of different existing caretaker networks in Berlin I learned about the organizational aspects and got an holistic perspective on the topic. The creation of blueprint drafts and stakeholder maps in an early phase was an effective way to figure out what kind of touchpoints are needed by which users.Voluntary caretakers who monitor protection areas are the primary users, so I conducted interviews with caretakers of other networks to learn everything about their monitoring work, their needs and experiences.An in-depth analysis and synthesis of my research findings led to the ideation phase where I explored in which ways I could involve, educate, bond and assist caretakers with diverse profiles. Getting their feedback on the ideas helped me to select the most promising concepts and consolidate the final result.
Result SPAN consists of a web-application and a smartphone app performing a wide range of functions for caretakers of protection areas. With their help they can retrieve information, network with other caretakers, conduct monitoring activities and submit reports about the condition of protection areas.With SPAN, caretakers can learn about habitats, species, and other caretakers who help with monitoring them. Together they can plan their activities and exchange information with the shared schedule and annotation tools.With the smartphone app, caretakers can take notes or retrieve location based information while being out in the field. Another mobile feature are customizable print-out forms making the caretakers independent from access to power or signal-coverage.Filled-in forms are digitalized and put into the database with the help of an image recognition scanning tool.With SPAN, caretakers can also lend unmanned photogrammetry vehicles to conduct aerial monitoring in a feasible and easy-to-use way.
SPAN - A platform to monitor bird protection areas.
Aageson-Morlock, Megan. "The politics of protection : conceptualizing climatic displacement and a global protection regime". Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/28122.
Testo completoGovarthanam, K. Kanchi. "Development of an advanced personal protection equipment fabric for protection against slashes". Thesis, University of Bolton, 2012. http://ubir.bolton.ac.uk/677/.
Testo completoBattino, Stéphanie. "Protection des ressources souterraines en eau potable : notions de périmétre de protection". Paris 5, 1994. http://www.theses.fr/1994PA05P112.
Testo completoSebé, Feixas Francesc. "Transparent Protection of Data". Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7026.
Testo completoL'estudi es divideix tenint en compte els dos tipus de dades la protecció transparent de les quals s'estudia: continguts multimèdia i microdades estadístiques.
Pel que fa a dades multimèdia, es tracta la seva protecció des de dues vessants: la protecció del copyright i la protecció de la integritat i l'autentificació.
En comerç electrònic de continguts multimèdia, els comerciants venen dades a usuaris en qui no confien plenament i que és possible que en facin còpies il·legals. Aquest fet fa que sigui necessari protegir la propietat intel·lectual d'aquests productes.
Centrant-se en imatges digitals, es presenten diverses contribucions a les dues principals tècniques de protecció del copyright electrònic: marca d'aigua i empremta digital.
Concretament, pel que fa a marca d'aigua, es presenten dos nous esquemes per imatges digitals. El primer és semi-cec i robust contra atacs de compresió, filtratge i escalat. El segon és cec i robust contra atacs de compresió, filtratge, escalat i distorsió geomètrica moderada. Seguidament, es proposa una nova tècnica basada en mesclar objectes marcats que permet combinar i augmentar la robustesa de diferents esquemes de marca d'aigua actuals.
En empremta digital, es presenta una construcció per obtenir codis binaris segurs contra atacs de confabulació de fins a tres usuaris deshonestos. La proposta actual obté, per un nombre moderat de possibles compradors, paraules codi més curtes que les obtingudes fins al moment.
Freqüentment, els continguts multimèdia es publiquen en llocs de poca confiança on poden ser alterats. En aquestes situacions, la marca d'aigua es pot utilitzar per protegir dades proporcionant-los integritat i autenticació. Es demostra l'aplicabilitat de l'algorisme de marca d'aigua basat en expansió d'espectre en el domini espacial per proporcionar, de forma transparent, autenticació i integritat sense pèrdua a imatges digitals.
L'altre tipus de dades tractades en aquesta tesi són les microdades estadístiques.
Quan fitxers amb dades estadístiques que contenen informació sobre entitats individuals són lliurats per al seu estudi, és necessari protegir la privacitat d'aquestes entitats. Aquest tipus de dades s'han de lliurar de manera que es combini la utilitat estadística amb la protecció de la privacitat de les entitats afectades. Els mètodes per pertorbar dades amb aquest objectiu s'anomenen mètodes de control del risc de revelació estadística. En aquest camp, es proposa una modificació d'una mètrica existent per mesurar la pèrdua d'informació i el risc de revelació per tal que permeti avaluar mètodes que generen fitxers emmascarats amb un nombre de registres diferent a l'original.
Es proposa també un algorisme per post-processar fitxers de dades emmascarades per tal de reduir la pèrdua d'informació mantenint un risc de revelació similar. D'aquesta manera s'aconsegueix millorar els dos millors mètodes d'emmascarament actuals: 'microagregació multivariant' i 'intercanvi de rangs'.
Finalment, es presenta una nova aplicació per proporcionar accés multinivell a dades de precisió crítica. D'aquesta manera, les dades protegides es fan disponibles a diferents usuaris, que segons el seu nivell d'autorització, podran eliminar part de la protecció obtenint dades de millor qualitat.
This dissertation is about protection of data that have to be made available to possibly dishonest users. Data must be protected while keeping its usability. Such protection must be imperceptible, so as not to disrupt correct use of data, and effective against unauthorized uses.
The study is divided according to the two kinds of data whose transparent protection is studied: multimedia content and statistical microdata.
Regarding multimedia content, protection is addressed in two ways: 1)copyright protection; 2) integrity protection and authentication.
In electronic commerce of multimedia content, merchants sell data to untrusted buyers that may redistribute it. In this respect, intellectual property rights of content providers must be ensured.
Focusing on digital images, several contributions are presented on the two main electronic copyright protection techniques: watermarking and fingerprinting.
Two new schemes for watermarking for digital images are presented. The first is semi-public and robust against compression, filtering and scaling attacks. The second one is oblivious and robust against compression, filtering, scaling and moderate geometric distortion attacks. Next, a new technique based on mixture of watermarked digital objects is proposed that allows robustness to be increased by combining robustness properties of different current watermarking schemes.
In the field of fingerprinting, a new construction to obtain binary collusion-secure fingerprinting codes robust against collusions of up to three buyers is presented. This construction provides, for a moderate number of possible buyers, shorter codewords than those offered by current proposals.
Rather often, multimedia contents are published in untrusted sites where they may suffer malicious alterations. In this situation, watermarking can be applied to protecting data in order to provide integrity and authentication. A spatial-domain spread-spectrum watermarking algorithm is described and proven suitable for lossless image authentication.
The other kind of data addressed in this dissertation are statistical microdata.
When statistical files containing information about individual entities are released for public use, privacy is a major concern. Such data files must be released in a way that combines statistical utility and protection of the privacy of entities concerned. Methods to perturb data in this way are called statistical disclosure control methods. In this field, a modification to a current score to measure information loss and disclosure risk is proposed that allows masked data sets with a number of records not equal to the number of records of the original data set to be considered.
Next, a post-masking optimization procedure which reduces information loss while keeping disclosure risk approximately unchanged is proposed. Through this procedure, the two best performing masking methods are enhanced: 'multivariate microaggregation' and 'rankswapping'.
Finally, a novel application to providing multilevel access to precision-critical data is presented. In this way, protected data are made available to different users, who, depending on their clearance, can remove part of the noise introduced by protection, thus obtaining better data quality.
Kessing, Sebastian Georg. "Essays on employment protection". [S.l.] : [s.n.], 2003. http://www.diss.fu-berlin.de/2003/202/index.html.
Testo completoAniekwe, Uchechukwu Victor. "Protection of copper coolers". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0020/MQ54125.pdf.
Testo completoTsang, Ruby Lo Man. "Teenagers and sun protection". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0027/MQ40120.pdf.
Testo completoTähepõld, Peeter. "Myocardial protection by hyperoxia /". Stockholm, 2002. http://diss.kib.ki.se/2002/91-7349-247-7.
Testo completoWaanders, Femke. "Advancements in renal protection". [S.l. : [Groningen : s.n.] ; University of Groningen] [Host], 2008. http://irs.ub.rug.nl/ppn/.
Testo completoMorris, Kathryn Mary. "Families, care and protection". Thesis, University of Nottingham, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.595293.
Testo completoMak, Tak-hing, e 麥德興. "The Environment Protection Centre". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31983558.
Testo completoHiggins, Eric John, Ronald Leroy Higgs, Gregory Rodger Parkins, Vincent S. Tionquiao e Christopher Kevin Wells. "Expeditionary warfare : force protection". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/6917.
Testo completoIn 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study. The Systems Engineering and Analysis Team used the Systems Engineering and Management process as the primary methodology to complete this multidisciplinary task. Survivability was identified as the most critical factor for evaluating the protection of the Sea Base and its transport assets. Threats to the Sea Base were reviewed, analyzed, and prioritized. System design and analysis focused on preliminary analyses of various sensors, search concepts, and weapons. These preliminary analyses identified capability gaps that were translated into functional concepts and proposed architectures for detailed modeling and analysis. These proposed architectures were identified as either Point or Distributed. In order to adequately determine the relative performance of the proposed architectures generated by the team, a thorough and systematic design of experiments was developed and applied in the Naval Simulation System and EXTEND. Based on the results obtained, the Systems Engineering and Analysis Team determined that a Distributed Sensor and Weapons architecture would significantly increase the survivability of future Expeditionary Warfare forces.
Wilson, Robin. "Advanced surge protection devices". Thesis, Queen's University Belfast, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317489.
Testo completoMohd, Zin Abdullah Asuhaimi Bin. "Coordination of overcurrent protection". Thesis, University of Manchester, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.332239.
Testo completoMoore, Philip John. "Adaptive digital distance protection". Thesis, City University London, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.328244.
Testo completoValli, Elsa. "Essays on social protection". Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/69365/.
Testo completoMajima, Shunzo. "Ethics of civilian protection". Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/2877/.
Testo completoCabrera, Martínez Abel. "Total protection in graphs". Doctoral thesis, Universitat Rovira i Virgili, 2021. http://hdl.handle.net/10803/672561.
Testo completoSupongamos que una o varias entidades están situadas en algunos de los vértices de un grafo simple y que una entidad situada en un vértice puede ocuparse de un problema en cualquier vértice de su vecindad cerrada. En general, una entidad puede consistir en un robot, un observador, una legión, un guardia, etc. Informalmente, decimos que un grafo está protegido bajo una determinada ubicación de entidades si existe al menos una entidad disponible para tratar un problema en cualquier vértice. Se han considerado varias estrategias (o reglas de ubicación de entidades), bajo cada una de las cuales el grafo se considera protegido. Estas estrategias de protección de grafos se enmarcan en la teoría de la dominación en grafos, o en la teoría de la dominación segura en grafos. En esta tesis, introducimos el estudio de la w-dominación (segura) en grafos, el cual es un enfoque unificado a la idea de protección de grafos, y que engloba variantes conocidas de dominación (segura) en grafos e introduce otras nuevas. La tesis está estructurada como un compendio de diez artículos, los cuales han sido publicados en revistas indexadas en el JCR. El primero está dedicado al estudio de la w-dominación, el quinto al estudio de la w-dominación segura, mientras que los demás trabajos están dedicados a casos particulares de estrategias de protección total. Como es de esperar, el número mínimo de entidades necesarias para la protección bajo cada estrategia es de interés. En general, se obtienen fórmulas cerradas o cotas ajustadas sobre los parámetros estudiados
Suppose that one or more entities are stationed at some of the vertices of a simple graph and that an entity at a vertex can deal with a problem at any vertex in its closed neighbourhood. In general, an entity could consist of a robot, an observer, a legion, a guard, and so on. Informally, we say that a graph is protected under a given placement of entities if there exists at least one entity available to handle a problem at any vertex. Various strategies (or rules for entities placements) have been considered, under each of which the graph is deemed protected. These strategies for the protection of graphs are framed within the theory of domination in graphs, or in the theory of secure domination in graphs. In this thesis, we introduce the study of (secure) w-domination in graphs, which is a unified approach to the idea of protection of graphs, that encompasses known variants of (secure) domination in graphs and introduces new ones. The thesis is structured as a compendium of ten papers which have been published in JCR-indexed journals. The first one is devoted to the study of w-domination, the fifth one is devoted to the study of secure w-domination, while the other papers are devoted to particular cases of total protection strategies. As we can expect, the minimum number of entities required for protection under each strategy is of interest. In general, we obtain closed formulas or tight bounds on the studied parameters.
Dantas, Rui. "DC grid discriminating protection". Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/108656/.
Testo completoRoze, Nathalie. "La protection des médicaments". Paris 8, 2003. http://www.theses.fr/2003PA083695.
Testo completo