999 resultados para reactive security
Resumo:
Thèse numérisée par la Division de la gestion de documents et des archives de l'Université de Montréal
Resumo:
Une des caractéristiques fondamentales des policiers et des agents correctionnels est le recours légitime à la coercition pour imposer leur autorité. Cette force publique doit donc, en théorie, avoir le dessus sur toute forme de force privée. Dans l’étude des phénomènes de violence, cette caractéristique rend leur victimisation singulière. À ce jour, les formes d’influence, de pressions indues et d’intimidation vécus par les agents de la force publique demeurent relativement peu étudiées. Les objectifs de cette thèse sont d’améliorer notre compréhension des dynamiques d’intimidation, de soulever les différents enjeux pour la force publique et de proposer une théorie de l’intimidation criminelle. La force publique étant, avant toute chose, une émanation de l’État, nous avons commencé par analyser la problématique de l’intimidation criminelle de manière plus globale. En testant la théorie de l’action de sécurité (Cusson, 2010), nous avons constaté qu’une force publique intimidée et corrompue entraîne une perte de légitimité et une inefficacité du système judiciaire dans sa lutte contre la criminalité. Nous avons ensuite adopté une perspective interactionniste pour comprendre les dynamiques d’intimidation au quotidien. Nous nous sommes demandés quels étaient les éléments qui rendaient une intimidation crédible et grave pour les policiers. En identifiant leur monde d’objets (Blumer, 1986), nous avons constaté que les actes d’intimidation qui survenaient en dehors du cadre professionnel étaient jugés plus graves par les policiers et que l’appartenance de l’intimidateur à une organisation criminelle entraînait une augmentation de la gravité de la menace. Ensuite, nous nous sommes interrogés sur la notion d’identité sociale des agents correctionnels victimes d’intimidation (Tedeschi et Felson, 1994). Nous avons constaté que les intimidations mineures mais répétées avaient tendance à modifier les pratiques professionnelles des surveillants. Une analyse intégrée de ces perspectives met en lumière l’existence de deux formes d’intimidation : une intimidation réactive et peu sévère en nature et une intimidation planifiée et grave. Elle soulève également trois enjeux pour la force publique : son aspect symbolique, la transformation de son action et sa légitimité. En intégrant ces enjeux, une théorie de l’intimidation criminelle est proposée. En dernier lieu, des solutions préventives et répressives sont avancées pour lutter contre ce phénomène.
Resumo:
Le glaucome est la principale cause de cécité irréversible dans le monde. Chez les patients atteints de cette pathologie, la perte de la vue résulte de la mort sélective des cellules ganglionnaires (CGR) de la rétine ainsi que de la dégénérescence axonale. La pression intraoculaire élevée est considérée le facteur de risque majeur pour le développement de cette maladie. Les thérapies actuelles emploient des traitements pharmacologiques et/ou chirurgicaux pour diminuer la pression oculaire. Néanmoins, la perte du champ visuel continue à progresser, impliquant des mécanismes indépendants de la pression intraoculaire dans la progression de la maladie. Il a été récemment démontré que des facteurs neuroinflammatoires pourraient être impliqués dans le développement du glaucome. Cette réponse est caractérisée par une régulation positive des cytokines pro-inflammatoires, en particulier du facteur de nécrose tumorale alpha (TNFα). Cependant, le mécanisme par lequel le processus neuroinflammatoire agit sur la mort neuronale reste à clarifier. L’hypothèse principale de ce doctorat propose que les facteurs pro-inflammatoires comme le TNFα et la phosphodiestérase 4 (PDE4) interagissent avec les mécanismes moléculaires de la mort neuronale, favorisant ainsi la survie et la protection des CGRs au cours du glaucome. Dans la première partie de ma thèse, J’ai utilisé un modèle in vivo de glaucome chez des rats Brown Norway pour montrer que l’expression du TNFα est augmentée après l'induction de l'hypertension oculaire. L'hypothèse spécifique de cette étude suggère que les niveaux élevés de TNFα provoquent la mort des CGRs en favorisant l'insertion de récepteurs AMPA perméables au calcium (CP-AMPAR) à la membrane cytoplasmique. Pour tester cette hypothèse, j’ai utilisé un inhibiteur sélectif de la forme soluble du TNFα, le XPro1595. L'administration de cet agent pharmacologique a induit une protection significative des somas et des axones des neurones rétiniens. L'évaluation de la perméabilité au cobalt a montré que le TNFα soluble est impliqué dans l'insertion de CP-AMPAR à la membrane des CGRs lors du glaucome. L’exposition des neurones à une pression oculaire élevée est à l’origine de la hausse de la densité membranaire des CP-AMPARs, grâce à une diminution de l’expression de la sous-unité GluA2. La présence de GluA2 au sein du récepteur ne permet pas l’entrée du calcium à l’intérieur de la cellule. L'administration intraoculaire d’antagonistes spécifiques des CP-AMPARs promeut la protection des somas et des axones des CGRs. Ces résultats montrent que les CP-AMPARs jouent un rôle important dans la pathologie du glaucome. Dans la deuxième partie de ma thèse, j’ai caractérisé l'effet neuroprotecteur d’un inhibiteur de la PDE4, l’ibudilast, dans notre modèle de glaucome. L'hypothèse spécifique s’oriente vers une atténuation de la réponse neuroinflammatoire et de la gliose par l’administration d’ibudilast, favorisant ainsi la protection neuronale. Les résultats montrent que dans les rétines glaucomateuses, l’ibudilast diminue la gliose et l'expression de plusieurs facteurs tels que le TNFα, l'interleukine-1β (IL-1β), l’interleukine-6 (IL-6) et le facteur inhibiteur de la migration des macrophages (MIF). Chez les rats glaucomateux, nous avons observé une expression notable de PDE4A dans les cellules de Müller, qui est en corrélation avec l'accumulation de l’AMP cyclique (AMPc) dans ces cellules après un traitement d’ibudilast. Finalement, nous avons démontré que la protection des CGRs via l’administration d’ibudilast est un mécanisme dépendent de l’AMPc et de la protéine kinase A (PKA). En conclusion, les résultats présentés dans cette thèse identifient deux mécanismes différents impliqués dans la perte des CGRs au cours du glaucome. Ces mécanismes pourraient fournir des perspectives potentielles pour le développement de nouvelles stratégies de traitement du glaucome.
Resumo:
From the introduction: Mexico is in a state of siege. In recent years, organized crime and drug-related violence have escalated dramatically, taking innocent lives and leaving the country mired in bloodshed. The Mexican government, under the leadership of President Felipe Calderón, has responded in part by significantly extending the reach of its security operations, deploying thousands of federal police officers and military troops to combat the activities of drug cartels, and collaborating with the United States on an extensive regional security plan known as the Mérida Initiative. In the midst of the security crisis, however, the government has somewhat paradoxically adopted judicial reforms that protect human rights and civil liberties rather than erode them, specifically the presumption of innocence standard in criminal proceedings and the implementation of oral trials. Assuming that the new laws on the books will be applied in practice, these reforms represent an important commitment on the part of the government to uphold human rights and civil liberties. This is in stark contrast to the infamous judicial reforms in Colombia—the institutionalization of anonymous or “faceless” prosecutions in special courts—implemented after a surge in leftist and cartel brutality, and the murders of several prominent public and judicial officials in the 1980s.
Resumo:
The study is a close scrutiny of the process of investigation of offences in India along with an analysis of powers and functions of the investigating agency. The offences, which are prejudicial to sovereignty, integrity and security of the nation or to its friendly relations with foreign states, are generally called the offences against national security. Offences against national security being prejudicial to the very existence of the nation and its legal system, is a heinous and terrible one. As early as 1971 the Law Commission of India had pointed out the need of treating the offences relating to national security and their perpetrators on a totally different procedural footing. The recommendation that, all the offences coming under the said category ought to be brought under the purview of a single enactment so as to confront such offences effectively. The discrepancies in and inadequacies of the criminal justice system in India as much as they are related to the investigations of the offences against national security are examined and the reforms are also suggested. The quality of criminal justice is closely linked with the caliber of the prosecution system and many of the acquittals in courts can be ascribed not only to poor investigations but also to poor quality of prosecution.
Resumo:
The present research problem is to study the existing encryption methods and to develop a new technique which is performance wise superior to other existing techniques and at the same time can be very well incorporated in the communication channels of Fault Tolerant Hard Real time systems along with existing Error Checking / Error Correcting codes, so that the intention of eaves dropping can be defeated. There are many encryption methods available now. Each method has got it's own merits and demerits. Similarly, many crypt analysis techniques which adversaries use are also available.
Resumo:
The main aim of the study was to optimise the reactive extrusion conditions in the conventional modification processes of polyethylenes in a single screw extruder.The optimum conditions for peroxide crosslinking of low density polyethylene (LDPE), linear low density polyethylene (LLDPE) and their blend were determined in a torque rheometer. The actual reactive extrusion was performed in a laboratory single screw extruder using the optimum parameters. The influence of the coagent, triaUyl cyanurate (TAC), on the cross linking of low density polyethylene in the presence of peroxide was also investigated. The peroxide crosslinking was found to improve the mechanical properties and the thermal stability of the polyethylenes. The efficiency of crosslinking was found to be improved by the addition of coagent such as TAC.The optimum conditions for silane grafting viz temperature, shear rate, silane and DCP concentrations were determined on a torque rheometer in the case of LDPE, LLDPE and their blend. Silane grafting of LDPE in the presence of peroxide was performed with and without addition of water. Compounding of such mixtures in the melt at high temperatures caused decomposition of the peroxide and grafting of alkoxy silyl groups to the polyethylene chains.The optimum parameters for maleic anhydride modification of LDPE, LLDPE and their blend were determined. The grafting reaction was confinned by FTIR spectroscopy. Modification of polyethylenes with maleic anhydride in the presence of dicumyl peroxide was found to be useful in improving mechanical properties. The improvement was found to be mainly due to the grafting of carboxyl group and formation of crosslinks between the chains. The cross linking initiated improvements indicate extended property profiles and new application fields for polyethylenes.On the whole the study shows that the optimum conditions for modifying polyethylenes can be determined on a torque rheometer and actual modification can be performed in a single screw extruder by employing the optimum parameters for improved mechanical! thermal behaviour without seriously affecting their processing behaviour.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
A novel fixed frequency beam scanning microstrip leaky wave antenna is reported. The beam scanning at fixed frequency is achieved by reactive loading. Simulation and measured results shows frequency scanability of 80° as well as fixed frequency beam steering of 68° over the −10 dB impedance band of 4.56–5.06 GHz.
Resumo:
Globalisation has many facets and its impact on labour is one of the most significant aspects.Though its influence is worldwide,it is much more significant in a transforming economy like India.The right of workers to social security is seen recognised under the Constitution of India and other welfare legislations.But,after adoption of the new economic policy of liberalisation and privatisation by the Government of India,the labour is exposed to new set of challenges.They are posed mainly due to economic restructuring affected in employment relationship,coupled with the increase in unprotected informal labour force.This study is an attempt to analyse the new challenges stemming up in employment relation,efficacy of the existing measures for social security of labour in the present economic condition and the suggestions for securing workers'right to social security in the trade regime.
Resumo:
A socio-economic research is required as an attempt to address the socio-economic issues facing small-scale fisheries. A study of the socio economic conditions of small-scale fishermen is a prerequisite for good design and successful implementation of effective assistance Programmes. It will provide an overall pidure of the structure, activities and standards of living of small-scale fisherfolk The study is confined to the coastal districts of Ernakulam, Thrissur and Malappuram districts. It also gives a picture of socio-economic conditions of the fisher folk in the study area. The variables that may depict the standard of living of the small-scale fisherfolk are occupational structure, family size, age structure, income, expenditure, education, housing and other social amenities. It attempts to see the asset creation of the fisherfolk with the help of government agencies, and the nature of savings and expenditure pattern of the fisherfolk. It also provides a picture of the indebtedness of the fisherfolk in the study area. The study analyses the schemes implemented by the government through its agencies, like Fisheries Department, Matsyaboard, and Matsyafed; and the awareness of fisherfolk regarding these schemes, their attitude and reactions, the extent of accessibility, and the viability of the schemes.
Resumo:
Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Resumo:
The thesis entitled ‘Studies on the Solvent Dependence in the Reaction of a Few (Anthracen-9-yl)methylamines and Sulfanes with Reactive Acetylenes’ is divided into six chapters. ln Chapter l a general survey of electron transfer reactions, Diels-Alder reactions and Michael-type additions is presented. A detailed discussion on the synthesis of several (anthracen-9-yl)methylamines is presented in Chapter 2. In Chapter 3, results of preliminary photophysical studies on a few (anthracen-9yl) methylamines are compiled. A detailed discussion on extensive examination of dependence in the reaction of (anthracen-9-yl)methylamines with reactive acetylenes is presented Chapter 4. Details on the synthesis and reaction of a few (anthracen-9-yl)methylsulfanes with DMAD are described in Chapter 5.
Resumo:
Any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identity of an individual, referred to as biometrics, has gained significant interest in the wake of heightened concerns about security and rapid advancements in networking, communication and mobility. Multimodal biometrics is expected to be ultra-secure and reliable, due to the presence of multiple and independent—verification clues. In this study, a multimodal biometric system utilising audio and facial signatures has been implemented and error analysis has been carried out. A total of one thousand face images and 250 sound tracks of 50 users are used for training the proposed system. To account for the attempts of the unregistered signatures data of 25 new users are tested. The short term spectral features were extracted from the sound data and Vector Quantization was done using K-means algorithm. Face images are identified based on Eigen face approach using Principal Component Analysis. The success rate of multimodal system using speech and face is higher when compared to individual unimodal recognition systems
Resumo:
This paper discusses the properties of rice husk ash samples produced from different types of field ovens to compare the performance of the ovens and to identify the most feasible method to produce a reactive pozzolana as an alternative to cement for building applications requiring lower strengths. Different types of ashes are produced and long-term strength of rice husk ash pozzolanas with lime or cement is investigated to suggest a sustainable affordable option in rural building applications, especially for rural housing in Kerala, a southern state of India