Rozprawy doktorskie na temat „Defensive”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Defensive”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Hellström, Per, i Victor Jaccopucci. "Defensive Yahtzee". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168668.
Pełny tekst źródłaGame, Carlos Vallejo. "Defensive minefield planning". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26960.
Pełny tekst źródłaEsparza, Jana Scoville. "Validating the Rorschach Defense Scale by Examining Defensive Functioning in College Students". Thesis, North Texas State University, 1988. https://digital.library.unt.edu/ark:/67531/metadc501158/.
Pełny tekst źródłaBerggren, Jennie, i Carina Engström. "Defensive Tactics : In hostile takeovers". Thesis, Jönköping University, JIBS, Business Administration, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-469.
Pełny tekst źródłaDale, Andrew James Roger. "Defensive behaviours toward knowledge sharing". Thesis, University of Warwick, 1999. http://wrap.warwick.ac.uk/4491/.
Pełny tekst źródłaAtkinson, Cathie. "Defensive Coping, Stress, and Immunity /". The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487861396027367.
Pełny tekst źródłaSmith, Anna Magdalena. "Food choices of tactile defensive children". Thesis, University of Port Elizabeth, 2003. http://hdl.handle.net/10948/d1020371.
Pełny tekst źródłaChen, Hao. "Toward hardware-oriented defensive network infrastructure". Thesis, State University of New York at Binghamton, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3713553.
Pełny tekst źródłaThe prosperity of the Internet has made it attractive to hackers and malicious attackers. Distributed attacks, such as: DDoS attacks and Internet worms have become major threats towards the network infrastructure. Collaborating existent single-point-deployed security applications over multi-domains for distributed defense is promising. Taking advantage of the small-world network model, a three-layered network modeling platform was developed for exploring behaviors of collaborative defense under the scope of a complex system. Using this platform, a comparison study between two major collaborative defense schemes was conducted. Their performance and eectiveness against signature-embedded worm attacks were evaluated accordingly.
Given the rapid evolution of attack methods and toolkits, software-based solutions to secure the network infrastructure have become overburdened. The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution to close this performance gap is through hardware implementation of security functions. After a comprehensive survey on major recongurable hardware-based approaches application on network infrastructure security area, an optimized design of FPGA-based Power Spectral Density (PSD) data converter for online Shrew DDoS attack detection was proposed and prototyped. Combining an innovative component-reusable Auto-Correlation (AC) algorithm and the adapted 2N-point real-valued Discrete Fourier Transform (DFT) algorithm, a maximum reduction of 61.8% processing time from 27471.4 us to 10504.8 us was achieved. These ecient hardware realization enabled the implementation of this design to a Xilinx Virtex2 Pro FGPA.
The scalability issue against continuously expanding signature databases is another major impediment aecting hardware application for network intrusion detection. With the observation that signature patterns are constructed from combinations of a limited number of primary patterns, a two-stage decomposition approach was developed to solve this issue. The evaluation results show that a reduction in size of over 77% can be achieved on top of signature patterns extracted from the Snort rule database after decomposition.
Hendershott, Robert J. "Defensive leveraged recapitalizations : theory and evidence". The Ohio State University, 1993. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267618346.
Pełny tekst źródłaHendershott, Robert J. "Defensive leveraged recapitatilizations : theory and evidence /". Connect to resource, 1993. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1267618346.
Pełny tekst źródłaVillanueva, Javier Gerardo. "Defensive processing in elementary school children /". Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.
Pełny tekst źródłaYang, Yumei. "Out of control : organizational defensive routines". Thesis, Bournemouth University, 2017. http://eprints.bournemouth.ac.uk/29322/.
Pełny tekst źródłaGoldberg, Stephen Gregory. "Durational Control of Defensive Burying in Rats: An Investigation of a Species-Specific Defense Reaction". DigitalCommons@USU, 1988. https://digitalcommons.usu.edu/etd/5977.
Pełny tekst źródłaBarnsley, Megan Christina. "The social consequences of defensive physiological states". Thesis, University of Exeter, 2012. http://hdl.handle.net/10036/4062.
Pełny tekst źródłaBufacchi, Rory John. "Understanding defensive peripersonal space through mathematical modelling". Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10054520/.
Pełny tekst źródłaCitadini, Jessyca Michele. "A influência da temperatura no comportamento defensivo em Tomodon dorsatus (Serpente, Dipsadidae)". Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/41/41135/tde-26042011-232110/.
Pełny tekst źródłaTetrapodes and ecotermicos vertebrates have a variable body temperature according to the temperature of the environment. Studies addressing lizards and snakes show that several behavior and functions of ectotermicos vertebrates suffer directly or indirectly influence of temperature on biological adequacy (fitness) (BARTHOLOMEW, 1982; HUEY, 1982; LILLYWHITE, 1987, MORI; BURGHARDT, 2001). Anti-predatory behavior constitutes a special case among behaviors influenced by temperature, because it seems to suffer from various types of changes in different groups of tetrápodes ectotermicos as salamanders (BRODIE JR.; DUCEY; LEMOS-ESPINAL, 1991), anuros amphibians (GOMES; BEVIER; NAVAS, 2002), lizards (RAND, 1964; HERTZ; HUEY; NEVO, 1982; CROWLEY; PIETRUSZKA, 1983), and snakes (FITCH, 1965; HERCKROTTE,1967; ARNOLD; BENNETT, 1984; SCHIEFFELIN; QUEIROZ, 1991; KEOGH; DESERTO, 1994; MORI; BURGHARDT, 2001).These studies show that the temperature affects behavioral responses both in terms of magnitude and quality, which suggests that the changes on the type of behavior with temperature be consistent with the effects of temperature on the behavioral performance. The current study tested through an analysis of the behavior Tomodon dorsatus snake (Dipsadidae) at different body temperatures when exposed to an external stimulus simulating a predatory attack. This species was chosen because it presents an enriched defensive repertoire (BIZERRA, 1998). For analysis, the defensive behaviors were classified into two main groups: \"aggressive\" and \"passive or escape as the behavior exhibited when the stimulus. During the study, it was observed that some animals were overly aggressive while others were extremely prone to flight. Therefore, besides the initial classification was made a separate analysis was to classify individual in two groups: DPA and FCP. This division that was useful to analyze the influence of temperature in different animals in their degree of aggressiveness. In this study we found that there was great individual variation in relation to antipredator behavior and the difference between individuals appears to be more significant when compared with the variation may be induced by temperature
Johansen, Aleksandra I. "Seasonal change in defensive coloration in a shieldbug". Doctoral thesis, Stockholms universitet, Zoologiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-62466.
Pełny tekst źródłaAt the time of the doctoral defense, the following papers were unpublished and had a status as follows: Paper 3: Manuscript. Paper 4: Accepted.
Lin, Borchyi. "A HYPERMEDIA SIMULATION THAT TEACHES DEFENSIVE DRIVING SKILLS". UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_diss/337.
Pełny tekst źródłaWatling, Dawn Marie. "Assertive and defensive self-presentational tactics in children". Thesis, University of Sussex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.399821.
Pełny tekst źródłaMitchell, Heidi Joanna. "The mechanisms underlying defensive lignin deposition in wheat". Thesis, University of Southampton, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243081.
Pełny tekst źródłaPangerl, Stefanie. "Defensive Publishing Handlungsfreiheit und die Aneignung von Innovationsgewinnen". Wiesbaden Gabler, 2009. http://d-nb.info/993686257/04.
Pełny tekst źródłaMarkwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems". Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Pełny tekst źródłaVislay, Tricia Ann. "A comparison of U.S. and Soviet strategic defensive doctrine". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25758.
Pełny tekst źródłaAlsuhibany, Suliman Abdullah. "Quantitative analysis of the release order of defensive mechanisms". Thesis, University of Newcastle upon Tyne, 2014. http://hdl.handle.net/10443/2549.
Pełny tekst źródłaMoutoussis, Michael. "Defensive avoidance in paranoid delusions : experimental and computational approaches". Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/defensive-avoidance-in-paranoid-delusions-experimental-and-computational-approaches(e36dbfcf-9341-43a0-be41-087f9b22d994).html.
Pełny tekst źródłaMiller, Claude Harold. "Indignation, defensive attribution, and implicit theories of moral character". Diss., The University of Arizona, 2000. http://hdl.handle.net/10150/284210.
Pełny tekst źródłaGurram, Sriharsha. "DESIGN OF A CACC ASSISTANT FOR DAILY DEFENSIVE DRIVING". OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2563.
Pełny tekst źródłaPacheco, Renan Santana. "Efeitos da temperatura no comportamento defensivo de Oxyrhopus guibei (Serpentes, Dipsadidae)". Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/41/41133/tde-11012019-151744/.
Pełny tekst źródłaPredatory events and the ability of an animal to avoid them play a crucial role in fitness, acting as a selective force on the emergence of morpho-phisyological adaptations (LIMA; DILL, 1990). In natural conditions the prey-predator interaction is influenced by the individual\'s extrinsic and intrinsic characteristics, such as sex, body-size and temperature. For ectoterms tetrapods, temperature probably is the mosy important variable, because in general terms, they experience substancial variation in their body temperatures through their daily or sazonal activities, and chemical reactions are highly dependable on temperature, as well as physiochemical processes, and therefore, the animal\'s performance as a whole (LILLYWHITE, 1987). The relation between the possible restrictions imposed by body temperature and the defensive behavior in snakes has been subject to dozens of studies over the last six decades, in a way that those studies show discrepancys between them from theorical-methodologycal differences (MORI; BURGHARDT, 2004). In light of this situation, the present study sought to answer the following research question: the individual variation in the defensive behavior of the false-coral snake, Oxyrhopus guibei is temperature dependent? To answer this question the main objective of this study is to test the hypothesis that in an optimal thermal range, defensive behaviors of locomotion will be expressed in greater quantity by individuals of the species Oxyrhopus guibei, while in sub-optimal temperatures static behaviors will predominate. Therefore, a series of thermal preference and behavioral experiments were carried out on false-coral specimens from the State of São Paulo borrowed from Instituto Butantan between September 2017 and March 2018. The experiments with the objective of understand the thermal preference of O. guibei were performed in a thermal gradient and during the study it was observed that the snakes actively searched for specific temperature ranges in a non-opportunistic way. The behavioral experiments performed in a climatic room at temperatures of 17.2, 24, 30.8 and 37.6 ° C indicated that in the presence of a simulated predatory stimulus behaviors of apparent \"fleeing\" function were expressed in greater quantity by 24°C. Larger individuals tended to express \"cryptic\" behaviors in lower quantity than smaller individuals. Temperature, sex and length (SVL) did not produce significant effects in the other behavioral groups studied. The defensive behavior in Oxyrhopus guibei individuals is largely determined by individual tendencies and not only by temperature constraints
Blackburn, James Robert. "The role of dopamine in preparatory and consummatory defensive behaviours". Thesis, University of British Columbia, 1989. http://hdl.handle.net/2429/29009.
Pełny tekst źródłaArts, Faculty of
Psychology, Department of
Graduate
Clendening, Michael, James New, Alejandro Cuevas, Van Ngo, Amritpal Dhindsa, Amrish Patel, Dennis Hopkins i in. "C4I architecture supporting conduct of defensive and offensive joint ASW". Monterey, California, 2008. http://hdl.handle.net/10945/6987.
Pełny tekst źródłaTsamtsaridis, Charalampos I. "Stochastic network interdiction for optimizing defensive counter air operations planning". Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10705.
Pełny tekst źródłaOrgan, A. J. "Structural and synthetic studies in the defensive chemistry of termites". Thesis, University of Southampton, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370388.
Pełny tekst źródłaBoden, Joseph Matthew. "Defensive miserliness: Hoarding attention in the service of emotional regulation". Case Western Reserve University School of Graduate Studies / OhioLINK, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=case1058293961.
Pełny tekst źródłaWarwick, James. "THE EFFICACY OF COUNTER-PRESSING AS AN OFFENSIVE-DEFENSIVE PHILOSOPHY". Miami University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=miami1564743483963884.
Pełny tekst źródłaBecker, Kyle William. "Optimizing defensive alignments in baseball through integer programming and simulation". Thesis, Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/2345.
Pełny tekst źródłaRisbrough, Victoria. "CRF and serotonin 1A receptor influences on defensive startle behaviors /". Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3123665.
Pełny tekst źródłaStrickland, John Scott. "Experimental Analysis of Protective Headgear Used in Defensive Softball Play". UNF Digital Commons, 2019. https://digitalcommons.unf.edu/etd/880.
Pełny tekst źródłaEl-Barghathi, Mariam Fadeel. "Influence of environmental and physiological variables on patterns of resource allocation in Urtica species". Thesis, Keele University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.321700.
Pełny tekst źródłaWu, Yue. "Novel bioactive peptides from the defensive skin secretions of selected frogs". Thesis, Queen's University Belfast, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.728833.
Pełny tekst źródłaCozzie, Linsey Renee. "Anti-insect defensive behaviors of equines after West Nile virus infection". Click here to access thesis, 2007. http://www.georgiasouthern.edu/etd/archive/spring2007/linsey_r_cozzie/Cozzie_Linsey_R_200701_MS.pdf.
Pełny tekst źródła"A thesis submitted to the Graduate Faculty of Georgia Southern University in partial fulfillment of the requirements for the degree Master of Science." Under the direction of William S. Irby. ETD. Electronic version approved: May 2007. Includes bibliographical references (p. 36-39)
Underwood, III Maj Robert E. "The Moral Reality of War: Defensive Force and Just War Theory". Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/philosophy_theses/53.
Pełny tekst źródłaSouthcott, Joseph Arthur. "Analysis of antiarmor organizations in defensive desert operations by airborne infantry". Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/25031.
Pełny tekst źródłaGirlevičius, Linas. "Defensive constructions in Vilnius in the 14th to the 18th centuries". Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090305_092610-90352.
Pełny tekst źródłaŠio mokslinio darbo tikslams įgyvendinti buvo pasitelkti įvairių mokslo šakų rezultatai, didesnį dėmesį darbe skiriant archeologinių tyrinėjimų rezultatams. Tyrimų duomenų analizė, apibendrinimas įgalino pasiekti užsibrėžtus tikslus, iškelti naujas hipotezes, išskirti iki šiol buvusias mažiau ištirtas Vilniaus gynybinio paveldo objektų grupes, o tai suteikė galimybę nuosekliau apžvelgti Vilniaus gynybinės koncepcijos raidą. Dalis Vilniaus gynybinių įrenginių vis dar yra nepakankamai gerai ištirti, todėl apibrėžti tikslesnius jų parametrus, tūrinę ir planinę struktūrą problematiška. Tenka pripažinti, kad dalies darbe aptariamų objektų priskyrimas gynybiniams yra hipotetinis. Šis darbas ir jame iškeltos tyrimų metu gautais faktais pagrįstos išvados bei hipotezės gali suteikti kokybiškai naują impulsą Lietuvos sostinės senovės gynybinių įtvirtinimų tyrinėjimams bei Vilniaus urbanistinės raidos rekonstravimui. Įvertinus tyrimo rezultatus galima teigti, kad miesto plėtra ir gynybinių įtvirtinimų raida buvo glaudžiai tarpusavyje susiję procesai, todėl ir ateityje atliekant panašaus pobūdžio tyrimus tikslinga naudotis kiek įmanoma platesne duomenų apie senąjį Vilnių baze.
Langridge, Keri V. "Defensive coloration and behaviour in juvenile common cuttlefish Sepia officinalis L". Thesis, University of Sussex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441630.
Pełny tekst źródłaCampbell, Adam Michael. "Enabling tactical autonomy for unmanned surface vehicles in defensive swarm engagements". Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118718.
Pełny tekst źródłaThesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 91-93).
This research incorporates practical applications of marine vehicles with robotics control theory to reduce the vulnerability of allied assets to asymmetric warfare. This work utilizes distributed decentralized multi-objective optimization in the Mission Oriented Operating Suite with Interval Programming (MOOS-IvP) to enable a number of simulated unmanned surface vehicles (USV) to provide defense for a high value unit (HVU) against fast attack craft (FAG) aggressors. The primary objective is to enable a swarm of defending vehicles to protect the HVU and successfully counter a swarm of aggressors with the ability to adapt to changing situations. This research makes it possible for autonomous defenders to react according to variables such as number of defenders, number of aggressors, known kinematic capabilities of defenders, perceived kinematic capabilities of aggressors, and positional distribution of aggressors. A theoretical framework is first described for analyzing the engagements based on game theory by constructing the defense scenario as a three-party differential game. MATLAB is then utilized to demonstrate optimal solutions to this scenario as an application of game theoretical guidance, which was developed for use in missile guidance systems. Algorithms and behaviors are then presented to demonstrate that the multi-objective optimization in MOOS-IvP approaches the optimal solutions in the vehicles' autonomous response during engagements consistent with the three-party differential game. Finally this work presents MOOS-IvP simulation data to demonstrate autonomous tactical decision-making in more realistic engagement scenarios.
by Adam Michael Campbell.
Nav. E.
S.M.
Ji, Dangjie. "Indirect defensive responses to hostile questions in British broadcast news interviews". Thesis, University of York, 2008. http://etheses.whiterose.ac.uk/14112/.
Pełny tekst źródłaBerglund, Nils. "Assessing defensive and offensive aspects of bacterial infection using computer simulations". Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/387222/.
Pełny tekst źródłaRoche, Kathleen. "The Great Recession and Nonprofit Endurance: Framing the Mission-Defensive Paradox". Case Western Reserve University Doctor of Management / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=casedm1568627407775438.
Pełny tekst źródłaQuintal, Kyle. "Context-Awareness for Adversarial and Defensive Machine Learning Methods in Cybersecurity". Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40835.
Pełny tekst źródłaUnderwood, Robert E. "The moral reality of war defensive force and just war theory /". unrestricted, 2009. http://etd.gsu.edu/theses/available/etd-04212009-201600/.
Pełny tekst źródłaTitle from file title page. Andrew Altman, committee chair; Sebastian Rand, Andrew J. Cohen, committee members. Description based on contents viewed July 14, 2009. Includes bibliographical references (p. 85).