Rozprawy doktorskie na temat „Police code”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Police code”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Webber, Jason J. "Indiana Criminal Code 9-30-2-2 who does it protect? /". [Muncie, Ind.] : Ball State University, 2008. http://cardinalscholar.bsu.edu/375.
Pełny tekst źródłaMorrow, Jadi Leigh. "Creating the blue code: Identity, gender and class in a police training environment". Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3303888.
Pełny tekst źródłaEde, Andrew, i andrew ede@premiers qld gov au. "The Prevention of Police Corruption and Misconduct: A Criminological Analysis of Complaints Against Police". Griffith University. School of Criminology and Criminal Justice, 2000. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030102.114721.
Pełny tekst źródłaAdams, Carole Helen. "#Balance' in pre-trial criminal justice : suspects' experience in the nick under the revised PACE Code of Practice C". Thesis, London School of Economics and Political Science (University of London), 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307469.
Pełny tekst źródłaGonzales, Jean-Luc. "Le commissaire de police et l'hospitalisation d'office d'urgence : pour une application unique de l'article L. 343 du code de la santé publique". Clermont-Ferrand 1, 1995. http://www.theses.fr/1995CLF10160.
Pełny tekst źródłaFoltynová, Hana. "Návrh na zefektivnění vztahů mezi policisty a občany". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-222854.
Pełny tekst źródłaIosca, Benjamin. "L'effectivité de la sanction des infractions au Code de la Route". Thesis, Toulon, 2014. http://www.theses.fr/2014TOUL0086.
Pełny tekst źródłaThe year 1992 marks an historic turning point in punishing infractions driving (licences) offences. Today each french citizen have a driving licence with a number of points that increases according to the offences. This autoproclamed pedagogical law, that it is hard contest the repressif and ambitions : eradicate roads deaths ; the target is parially achieved. But with more than 15000 death per 4000 in 30 years will a cost : a greater repression
Gelin, Carl. "Polisens Tystnadskod - Översikt kring yrkeskulturella normer och sanktioner och dess följder inom den svenska polisorganisationen". Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25398.
Pełny tekst źródłaAncel, Baudouin. "Lois de police et ordre public dans le droit des conflits (XIIe siècle-XXe siècle) : genèse et réception de l'article 3, alinéa 1er du Code civil". Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020043.
Pełny tekst źródłaThis research aims at shedding light on the historical background of the avatars of two mechanisms now integrated into the French system of private international law: lois de police (i.e. overriding mandatory rules) and (international) ordre public (i.e. public policy). Both share the common feature of opposing the normal interplay of choice-of-law rules and rely on Art. 3, para. 1 of the 1804 Civil Code. Preventing by pre-emption infringements of utilitas publica vel communis or reacting to them by eviction from the normally applicable law, these two types of norms have emerged from a common history beginning with the antecedents of prohibitive and territorial statutes identified by medieval romano-canonical commentators. Then members of the Dutch and French Schools adapted the two concepts to the prevailing hypothesis at the end of the Ancien Régime, that of conflicts of sovereignties. In 1804, lois de police and ordre public were collected in the French Civil Code. Thanks to the joint work of scholars and case law, on the one hand, and to a reaction to the hybrid notion of lois d’ordre public that emerged over the next century, on the other hand, the distinction between the two concepts was made possible at the turn of the 19th and 20th centuries. As conflict of sovereignties declined, leading to a loss of interest in public law, or even in criminal law, and as a more private-law-driven representation arose, without ignoring, however, growing state interventionism, the distinction has been confirmed between the two concepts: lois de police or d’application immédiate, promoting the utilitas communis, and exception d’ordre public, defending fundamental values
Evans, David Elliot 1971. "Policy-directed code safety". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86424.
Pełny tekst źródłaMoll, Monica M. "HOW FAR HAVE WE COME? THE STATE OF POLICE ETHICS TRAINING IN POLICE ACADEMIES IN THE U.S". Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461239418.
Pełny tekst źródłaHashii, Brant. "Policy-based protection against external programs via code transformation /". For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2003. http://uclibs.org/PID/11984.
Pełny tekst źródłaDegree granted in Computer Science. Dissertation completed in 2003; degree granted in 2004. Also available via the World Wide Web. (Restricted to UC campuses)
Rezk, Tamara. "Verification of confidentiality policies for mobile code". Nice, 2009. http://www.theses.fr/2006NICE4099.
Pełny tekst źródłaLes politiques de flux d’information garantissent la confidentialité à travers l’absence de fuites d’information non-désirables pendant l’exécution des programmes. Ce travail propose des techniques statiques de spécification et de vérification pour les politiques de flux d’information. Trois majeurs parties composent ce travail. Dans la première partie, nous proposons des formulations pour la spécification des politiques de flux d’information au sein de programmes déterministes et non-déterministes, et qui peuvent être appliqués afin de caractériser logiquement des politiques de confidentialité dans des logiques temporelles et de programmation. Nous démontrons l’applicabilité de notre approche dans le contexte de plusieurs langages incluant un langage permettant la composition parallèle et un langage possédant des structures de données partagées et mutables. Dans la deuxième partie, nous proposons la spécification de la non-interférence, une politique de flux d’information particulière, pour un langage non-structuré semblable à la machine virtuelle Java (JVM) et qui inclut des objets, des méthodes, des classes avec héritage, et des exceptions. Nous définissons un système de type qui assure que les programmes typables tiennent la propriété spécifiée. Afin de fournir une application de la sécurité des langages dans le contexte de code mobile, nous proposons un système de type pour la non-interférence des programmes semblables aux programmes Java et montrons une connexion entre la typabilité d’un code source et celle d’un code machine de la JVM, en présence d’un compilateur non-optimisant et non-fiable
Sistany, Bahman. "A Certified Core Policy Language". Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/34865.
Pełny tekst źródłaStromberger, Joanne. "The Constitutionality of Dress Code and Uniform Policies". Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4725/.
Pełny tekst źródłaKingshott, Brian Frederick. "Ethics of policing a study of English police codes". Thesis, University of Exeter, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272996.
Pełny tekst źródłaMwai, Paul Macharia. "Information security policy an investigation into rewriting the policy for Loreto College Msongari /". [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:148.
Pełny tekst źródłaAllen, Kara Christine. "Breaking the “At Risk” Code: Deconstructing the Myth and the Label". Digital Commons at Loyola Marymount University and Loyola Law School, 2014. https://digitalcommons.lmu.edu/etd/196.
Pełny tekst źródłaCastle, Joseph Roland. "An Organizational Analysis of Publishing the People's Code". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97952.
Pełny tekst źródłaDoctor of Philosophy
Publishing software and its associated source code for public use is a new phenomenon for U.S. federal government agencies. In August 2016, the White House issued the Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software (FSCP). The FSCP mandated executive-level agencies to publish at least 20% of their custom developed code as open source software (OSS). OSS is software that can be shared within a community of developers through accompanying licenses hosted in online code sharing platforms. The federal government has the responsibility to account for public spending, including spending for IT. The publication of OSS is one way the public can know about government spending. OSS additionally benefits the public by providing access to code, thus, making it the "People's Code." From 2016 to 2019, the progress of executive branch agencies in implementing the FSCP was mixed. This study examines whether and how organizational factors – cultural beliefs, public engagement, structural dimensions, and organizational location – affect agency policy implementation. The study uses the publication of OSS as an indicator of effective policy implementation, and it identifies the factors that hinder or aid publishing OSS. To arrive at a general understanding of agency efforts at policy implementation, I collected data from GitHub's application programming interface (API) and created a list of 23 of 24 executive-level agencies that published OSS both before and after the FSCP was issued. From these agencies, 25 participants from 20 agencies agreed to participate in the study. These participants were from software development units that minimally, moderately, or frequently published OSS. The sample consisted of participants from units mostly located outside a Chief Information Officer (CIO) office that focused on software development and data science activities. Grounded theory provided an approach for data collection with interviews and document collection, leading to continuous analysis for generating a theory of policy implementation for OSS publication. Units more frequently published OSS when they expressed views complementary to those of their parent organization and held advantageous cultural beliefs; practiced more and more varied public engagement through two-way communication, events, and electronic tools; had structures with less centralization, more formalization, more differentiation, and more coordination; and were located in the "middle" of an organization with fewer hierarchical layers. Additionally, some units expressed both cautionary and advantageous cultural beliefs suggesting beliefs alone are not enough to allow units to publish OSS. This study contributes to policy, public administration, and organization theory literatures. It enhances scholarship by examining a new phenomenon and aids practitioners by providing implications for consideration when implementing policy.
Soltner, Eugene F. "The factors of a voluntary school uniform policy". Diss., This resource online, 1997. http://scholar.lib.vt.edu/theses/available/etd-10022007-144802/.
Pełny tekst źródłaBurbidge, Anne Leslie. "Breaking the code, the 1995 immigration policy of the Reform Party of Canada". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0010/MQ30204.pdf.
Pełny tekst źródłaAllen, Kara C. "Breaking the "At Risk" Code| Deconstructing the Myth and the Label". Thesis, Loyola Marymount University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3641922.
Pełny tekst źródłaThe term “at risk” is a label that is used to describe students who encompass a host of prominent socially and politically constructed titles that are intended to simplify student understanding and awareness and allow for clear reporting. The purpose of this study was to demythologize the concept of “at risk” by creating the conditions for student voice and critical dialogue to emerge, through the use of narrative inquiry. This research hoped to provide an outlet for young people to find and use their own voices, while finding their own place within their lived histories. The research also aimed to raise awareness of the reality of the contemporary U.S. educational system: we often create policies and programs without considering the perspectives of the young people whom these services are designed to serve. Through critical narrative inquiry, six former student's engaged in unstructured interviews and a focus group. Through analysis of the data set, five themes emerged and include 1) relationships with bicultural adults who understand, 2) instrumentalizing pedagogy, 3) the impact of money-driven policy, 4) the awareness of limitations of opportunities, and 5) the overall theme of the transparency of hegemony. This research hoped to problematize the label in an effort to move toward an emancipatory understanding of how we speak about young people and make sense of the circumstances these young people must navigate through their education and their world.
Vile, Matthew. "Gun Control Policy Preference in Context: A Contextually Sensitive Model of Gun Control Policy Preferences". ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/332.
Pełny tekst źródłaMargherita, Michelangelo. "Southern cone economic liberalization policies and the credibility constraint". Thesis, McGill University, 1995. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23723.
Pełny tekst źródłaNalbant, Serkan. "An Evaluation Of The Reinspection Decision Policies For Software Code Inspections". Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605827/index.pdf.
Pełny tekst źródłaNever Reinspect&rsquo
and &lsquo
Always Reinspect&rsquo
do not exhibit the most appropriate outcomes regarding cost, schedule, and quality. Additionally, the study presents suggestions for further improving the cost, schedule, and quality of the software based on the analysis of the experiment factors.
Gaffney, Francis John Paul. "The New Jersey common policy on marriage preparation in light of the 1983 Code". Theological Research Exchange Network (TREN), 1989. http://www.tren.com.
Pełny tekst źródłaLeucht, Brigitte. "Transatlantic policy networks and the formation of core Europe". Thesis, University of Portsmouth, 2008. https://researchportal.port.ac.uk/portal/en/theses/transatlantic-policy-networks-and-the-formation-of-core-europe(c7bc66fb-334c-4bef-99c2-155eb4df6d73).html.
Pełny tekst źródłaKrentz, Caroline D. "A theoretical-integrative model of core curriculum policy-making". Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/20769.
Pełny tekst źródłaSerri, Seyed Hamidreza. "The World of the United States Foreign Policy Elite: A Case Study of the U.S. Foreign Policy Think Tanks' Debates in the General Elections of 2004, 2008, and 2012". FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2224.
Pełny tekst źródłaGeorge, William. "Explaining State Crisis Behavior Using the Operational Code". Master's thesis, University of Central Florida, 2014. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6283.
Pełny tekst źródłaM.A.
Masters
Political Science
Sciences
Political Science; International Studies Track
Aktas, Arzu. "L'acquisition et la perte de la nationalité française : 1804-1927". Phd thesis, Université Paris-Est, 2011. http://tel.archives-ouvertes.fr/tel-00762429.
Pełny tekst źródłaMashiyi, Fidelia Nomakhaya Nobesuthu. "How South African teachers make sense of language-in-education policies in practice". Thesis, University of Pretoria, 2011. http://hdl.handle.net/2263/25180.
Pełny tekst źródłaThesis (PhD)--University of Pretoria, 2011.
Education Management and Policy Studies
unrestricted
Naz, Sajida. "Police and psychological trauma : a cross-cultural, mixed methodological study of how police cope with the psychological consequences of their work". Thesis, University of Huddersfield, 2012. http://eprints.hud.ac.uk/id/eprint/17132/.
Pełny tekst źródłaCalland-Jackson, Paul-Napoléon. "La politique sociale napoléonienne : De la charité chrétienne à une politique sociale d’état : L’organisation du salut public sous le Consulat et l’Empire : 1785 – 1815". Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS017S/document.
Pełny tekst źródłaThe revolutionaries of the period spanning 1789 – 1799 abolished the corps intermédiaires between the State and the People. According to the Declaration of the Rights of Man, no organisation or individual must step between the power and the plebeians. Thus, the Le Chapelier laws (among others) abolished the guilds, and successive governments attempted to eradicate the opposing forces of the regions and local « feudalisms ». However, when Napoleon Bonaparte took charge of the ship of State in November 1799, the country was in search of new references. The chief of the new government installed in February 1800 aimed to lay « masses of granite », that is to say stable institutions, on the soil of France.The creation of the Bank of France, of the Prefects, of the Lycées, Baccalaureate and Legion of Honour are well-known examples among many others. But the subject of this thesis is less famous, except perhaps for students and teachers of law. For in the heart of the new Civil Code of the French, there is the « spirit of fraternity » expressed in the Declaration of the Rights of Man and of the Citizen, and in the Constitution of the 5th of Fructidor. The Catholic Church no longer being – since the Concordat – the official State religion, but the religion of the majority of Frenchmen, the State replaced the duty of charity with civil fraternity. The First Consul (who was soon to be Emperor) added a clause to the Civil Code stipulating that parents must provide for their children, even as adults, if the latter are unable to do so (and vice versa).Throughout the era of the Consulate and First Empire, this thesis aims to show the development of structures of social solidarity, particularly via legislation, but also in relation to the institutions and policies of the State during this period. We will study (among others) the Civil Code in its context, the Maisons d’Education de la Légion d’Honneur, legislation on labour (particularly in relation to child labour), mutual aid societies (predecessors of the mutual insurance companies and trades unions of our times) and the welfare administrations. We will also cast an eye, in conclusion, over the unfinished projects developed under later regimes. In order to better situate this era in its context in relation to the 21st Century.The period of the Consulate and Empire was a great period for the creation of retirement pension funds, and the Emperor Napoleon even set down the principles which were to regulate this « right » that he wanted to extend to all trades. Our thesis therefore follows in the trail of the creation of these institutions and of the framework of daily life according to Napoleonic principles, a synthesis of the Old Regime and the ideals of 1789
Limon, Jesus Jr. "Impact of Parental Incarceration on Family Reunification| California Welfare and Institution Code 361.5| A Policy Analysis". Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10262385.
Pełny tekst źródłaThe purpose of this policy analysis was to examine Article 10: Dependent Children-Judgments and Orders, Welfare and Institutions Code (WIC) 361.5, which describes the criteria for offering or denying visitation and reunification services to incarcerated parents or guardians with their children in out-of-home care. This analysis begins with a historical overview of the incarceration explosion in the past decades, and its relation to children in out-of-home care. The policy analysis identifies systemic challenges faced by incarcerated parents as they make efforts to reunify and preserve their child-parent relationships. The analysis is based on Gil’s (1992) original nationally recognized framework and updated by Jimenez, Pasztor, Chambers, and Fujii, (2015). Limitations and alternative policy recommendations that could best meet these objectives are provided.
Dominic, P. A. "Language practices and identities of multilingual students in a Western Cape tertiary institution : implications for teaching and learning". University of the Western Cape, 2012. http://hdl.handle.net/11394/5193.
Pełny tekst źródłaIn South Africa, there has been little research into the language practices of multilingual students in tertiary institutions or into how such students negotiate identities in these globalising contexts where the dominance of English remains an important factor. This research was aimed at exploring the appropriateness of 1997 Language-In-Education policy for schools and the national Language Policy for Higher Education (2002) for equipping students for tertiary teaching and learning. It therefore investigated the relationship between the language practices and construction of identities of a group of multilingual first year students in the Education Faculty at a Western Cape university. In this integrated institution, in spite of the current political and socio-economic transformation that has been at the centre of new policies, the medium of instruction is still predominantly monolingual. The premise of the research was that in a multilingual country such as South Africa with 11 official languages, tertiary institutions ought to more vigorously engage with their current language policies in order to value and extend the language practices of multilingual students for academic learning. Here multilingual repertoires are understood as resources rather than problems. The research draws extensively on Bourdieu's notion of 'linguistic capital' quantifying language itself as a form of capital with a market value. Through thematic analysis of themes drawn from questionnaires, interviews, focus group discussions, and participant observation in both tutorials and lectures, the investigation concluded that a monolingual medium of instruction to non-native speakers should be practised alongside other languages as means to support in their academic attainment. Finally the research emphasised the importance of code switching as a strategy that facilitates learning and promotes understanding of the role language resources play in social and academic interaction.
Marttala, Amanda, i Nicolina Ahlstedt. ""Kungens pojkar" : En kvalitativ studie om hur poliser kan legitimera kollegors anmälningsbara gärningar". Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-61478.
Pełny tekst źródłaTrani, Brett. "Crises, consensus, and conviction : the core executive and the institutionalisation of British efficiency reforms". Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225335.
Pełny tekst źródłaHöckerman, Kasper. "Aktörskoalitioner i svensk säkerhetspolitik : En analys av riksdagspartiernas inställning till Natomedlemskap". Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74503.
Pełny tekst źródłaRay, Donald James. "A Quantified Model of Security Policies, with an Application for Injection-Attack Prevention". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6133.
Pełny tekst źródłaKeeler, Rebecca L. "Analysis of Proposed Revisions to Ethics Code of American Society for Public Administration". Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/653.
Pełny tekst źródłaLiu, Chun. "China's telecommunications accomplishments, problems and the shape of the future to come /". online access from Digital Dissertation Consortium, 2006. http://libweb.cityu.edu.hk/cgi-bin/er/db/ddcdiss.pl?3248361.
Pełny tekst źródłaHatch, Walter. "Rearguard regionalization : protecting core networks in Japan's political economy /". Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/10327.
Pełny tekst źródłaFoley, Virginia P. "What Parents Should Know about Common Core". Digital Commons @ East Tennessee State University, 2013. https://dc.etsu.edu/etsu-works/5983.
Pełny tekst źródłaGray, Stacie J. "Achieving compliance with the World Anti-Doping Code : learning from the implementation of three selected international agreements". Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/35464.
Pełny tekst źródłaBonacina, Florence Marguerite. "Conversation analytic approach to practiced language policies : the example of an induction classroom for newly-arrived immigrant children in France". Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/5268.
Pełny tekst źródłaBen, Hadj Fredj Abir. "Computations for the multiple access in wireless networks". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT030.
Pełny tekst źródłaFuture generations of wireless networks pose many challenges for the research community. In particular, these networks must be able to respond, with a certain quality of service, to the demands of a large number of connected people and objects. This drives us into quite important requirements in terms of capacity. It is within this framework that non-orthogonal multiple access methods (NOMA) have been introduced. In this thesis, we have studied and proposed a multiple access method based on the compute and forward technique and on Lattice codes while considering different lattice constructions. We have also proposed improvements to the algorithm for decoding the Sparse code multiple access (SCMA) method based on Lattice codes. In order to simplify the multi-stage decoders used in here, we have proposed simplified expressions of LLRs as well as approximations. Finally, we studied the construction D of lattices using polar codes. This thesis was in collaboration with the research center of Huawei France
Chaulet, Julia. "Etude de cryptosystèmes à clé publique basés sur les codes MDPC quasi-cycliques". Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066064/document.
Pełny tekst źródłaConsidering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix) codes allows us to build a post-quantum encryption scheme with nice features. Namely, it has reasonable key sizes and both encryption and decryption are performed using binary operations. Thus, this scheme seems to be a good candidate for embedded and lightweight implementations. In this case, any information obtained through side channels can lead to an attack. In the McEliece cryptosystem, the decryption process essentially consists in decoding. As we consider the use of an iterative and probabilistic algorithm, the number of iterations needed to decode depends on the instance considered and some of it may fail to be decoded. These behaviors are not suitable because they may be used to extract information about the secrets. One countermeasure could be to bound the number of encryptions using the same key. Another solution could be to employ a constant time decoder with a negligible decoding failure probability, that is to say which is about the expected security level of the cryptosystem. The main goal of this thesis is to present new methods to analyse decoder behavior in a cryptographic context.Second, we explain why a McEliece encryption scheme based on polar code does not ensure the expected level of security. To do so, we apply new techniques to resolve the code equivalence problem. This allows us to highlight several common properties shared by Reed-Muller codes and polar codes. We introduce a new family of codes, named decreasing monomial codes, containing both Reed-Muller and polar codes. These results are also of independent interest for coding theory
Welch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code". Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.
Pełny tekst źródłaCole, LaQuitta D. "California welfare and institutions code § 369.5 authorization of psychotropic medication to California's dependent children A policy analysis". Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1527687.
Pełny tekst źródłaThe purpose of this policy analysis is to critically review the Welfare and Institutions Code§ 369.5, which regulates the authorization of psychotropic medication to treat mental disorders among California's dependent children. While these medications have been proven effective forms of treatment, there is a growing concern about their life threatening side effects.
Research has concluded that children exposed to chronic child abuse and neglect often present with behaviors indicative of trauma. The Diagnostic and Statistical Manual of Mental Disorders 5th Edition has included criteria for Post-Traumatic Stress Disorder (P.T.S.D.) in children. However, the Welfare and Institutions Code§ 369.5 does not mandate psychiatrists and pediatricians to first rule out trauma prior to diagnosing foster children with one or more behavior, mood, or psychotic disorders.
Results support amending child welfare legislation and policies to reflect a shift toward trauma-focused services, thereby reducing the reliance on potentially dangerous pharmaceutical drugs.