Dissertations / Theses on the topic 'Analytic pairing'

To see the other types of publications on this topic, follow the link: Analytic pairing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 27 dissertations / theses for your research on the topic 'Analytic pairing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Baires, Natalia. "The Cultural Adaptation of Traditional Behavior-Analytic Interventions for Hispanic/Latinx Children with Autism and the Caregivers and Siblings Who Care for Them." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1851.

Full text
Abstract:
The science of behavior analysis is most notably recognized for its work with individuals with Autism Spectrum Disorder (ASD) and the development of language in individuals with and without ASD. As an extension of a behavior-analytic approach to language, Relational Frame Theory (RFT) posits that relating between stimuli is foundational for human language and cognition. This modern-day account of human verbal events also includes psychological distress, which is frequently experienced among family members of individuals with ASD. The effects of Acceptance and Commitment Therapy (ACT), which is derived from RFT, have been evaluated with caregivers of individuals with ASD and demonstrated empirical support. Despite all these advancements, researchers have not adequately considered cultural and linguistic factors in the provision of these approaches for diverse populations, such as Hispanics/Latinxs. Moreover, there is a paucity of research using such scientific approaches for caregivers and siblings of individuals with ASD. Considering that Hispanics/Latinxs are a growing population in the United States, behavior-analytic interventions should be culturally adapted. The purpose of this study was to culturally adapt treatments rooted in the science of human behavior specifically for Hispanic/Latinx families that care for a child with ASD. Specifically, sociocultural factors and Hispanic/Latinx cultural values were considered in the development of such interventions to promote the skill set and well-being of the family as a unit. In the first experiment, the evaluation of SPOP in transferring relational frames from Spanish to English in Hispanic/Latinx children with ASD was examined. Here, the language of instruction (i.e., English vs. Spanish) differed for participants, depending on their primary languages. SPOP demonstrated effectiveness for some relations with one participant, however, direct training was employed to teach correct relational responding. In the second experiment, the effects of culturally adapted ACT were evaluated on statements of psychological flexibility and inflexibility, and self-report measures for Spanish-speaking Hispanic/Latinx caregivers of children with ASD. Results demonstrated higher percentages of statements of psychological flexibility across all conditions, and a statistically significant difference in self-reported thought suppression post-treatment. Finally, the third experiment compared the effects of culturally adapted family-based ACT and non-culturally adapted non-family-based ACT on self-monitored committed actions and self-report measures for Hispanic/Latinx siblings of children with ASD. Results indicated statistically significant differences in reported committed actions before and after treatment, with changes in self-report measures post-treatment. Together, these experiments demonstrate the clinical and social significance of taking cultural and linguistic factors of diverse populations into consideration with behavior-analytic services.
APA, Harvard, Vancouver, ISO, and other styles
2

Hatzidaki, Ourania. "Part and parcel : a linguistic analysis of binomials and its application to the internal characterization of corpora." Thesis, University of Birmingham, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leroyer, Pierre S. M. Massachusetts Institute of Technology. "Robust crew pairing : delays analysis and implementation of optimization approaches." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/36168.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, February 2006.
Includes bibliographical references (p. 91-92).
With increasing delays and airport congestion that disturb airline operations, the development of robust schedules is becoming crucial. Increased traffic and poor weather are a few of the causes of airport congestion, rising delays and lengthening passenger trips. In this thesis, we identify the latest trend in the flight arrival and departure delays, differentiating major U.S. airports from other smaller airports. We also quantify the types of delays airlines should work to mitigate. We then analyze the effects of schedules changes that were implemented by a major U.S. airline at their largest hub. We measure the effects of these schedule changes on on-time performance, taxi time, plane utilization, and passenger connection and total travel time. We also analyze how extensive is the practice of adding buffer time to flight times to improve schedule reliability. Finally, we propose and implement a new model to achieve robust crew schedules, that is, crew schedules that are less likely to be inoperable due to disruptions during operations. We show that with an increase in crew costs of 0.2%, we can decrease the number of times crews must connect between different aircraft by 32%.
by Pierre Leroyer.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
4

Banting, G. S. "Analysis of the MIC2 loci and their gene products." Thesis, Institute of Cancer Research (University Of London), 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.378977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Almeida, Susana Cristina Aleixo de. "Emotional responses elicited by wine when pairing with high fat food." Master's thesis, ISA, 2017. http://hdl.handle.net/10400.5/14827.

Full text
Abstract:
Mestrado em Viticultura e Enologia / Instituto Superior de Agronomia / Faculdade de Ciências. Universidade do Porto
This work was aimed at the evaluation of emotional responses elicited by wine before and after food consumption. The tastings were performed by one trained panel and by consumers, segmented by gender, Vinotype, 6-n-propylthiouracil (PROP) sensitivity and Saliva flow rate. Three commercial red wines with different sensory features were used: i) Grand Gold awarded wine from Alentejo (2013); ii) wine from altitude vineyards in Douro (2011), iii) classical European old wine (1999) from Bairrada. Wines were evaluated using a tasting sheet with emotional and conventional tasting descriptors before and after eating a typical Portuguese dish, whose distinctive feature was its high fat content. Overall, food did not change the global evaluation scores given to the wines but some of their characteristics were scored significantly different through the emotional tasting. The results of both panels demonstrated that the emotional responses were more correlated with the global evaluation of the wines than the classical sensory descriptors. Within the trained individuals, the main correlations with global evaluation were obtained with “Initial Impression”, “Expectation for the mouth” and “Impression in relation to odor”. In particular, the global evaluation for the Bairrada wine, could be predicted by a model including these three variables with a R2=0.73. With the untrained tasters, the correlation with global evaluation was only significant for the “Impression in relation to odor”. The average scores given to the three wines by both panels did not diverge, despite their different sensory attributes. Therefore, our work only reflected trends in wine preferences. The untrained panel preferred the Alentejo wine while the trained panel preferred the Douro wine, before the food ingestion. The correlations between the global evaluation and the other sensory descriptors for the Alentejo wine could not explain this preference. We speculate that the untrained panel scored the wines based on what they are used to drink, giving lower scores to the unfamiliar one. The trained panel demonstrated a higher correlation between emotional and sensory descriptors. In fact, the trained panel seemed to understand better the different range of qualities of the wines. After ingesting food, the preference changed only for the trained panel, showing preference to the Bairrada wine. Both panels agreed that the old Bairrada was the most complex and difficult wine to understand In conclusion, the emotional tasting sheet was easy to interpret by all segments of consumers, leading to open and fair answers because it appeals to individual personal feelings. This tasting approach appears to be promising in the rapid learning of the different wine styles. In the future, it would be interesting to evaluate the evolution of scores given to unfamiliar wines that would require time to be appreciated using appropriate foods. This way, the classical European wines, that are difficult to understand by consumers, would have a better chance to be correctly appreciated
N/A
APA, Harvard, Vancouver, ISO, and other styles
6

Utami, Wahyu. "Ion pairing LC-MS/MS method for analysis of intracellular phosphorylated metabolites." Thesis, University of Nottingham, 2015. http://eprints.nottingham.ac.uk/30566/.

Full text
Abstract:
Nucleoside analogues have been extensively used in medication. The nucleoside analogue cordycepin is the principal bioactive compound found in the caterpillar fungi (Cordyceps and Ophiocordyceps). It has been shown to have biological activity, including anti-inflammatory, immunomodulatory and anti-proliferative activity in many kinds of malignant cells. Intracellular drug interactions at the nucleotide level can be explained by understanding the intracellular metabolism of nucleoside analogues as well as their plasma metabolism since their efficacy of therapy or toxicity does not associate with the plasma level of nucleoside. Therefore, investigation of the metabolism of nucleoside analogues is required for a full understanding of their pharmacological activity and toxicity. For that reason, here an ion pairing LC-MS/MS method has been developed for quantitative analysis of the nucleoside analogue cordycepin and the metabolites and its application to cell culture, using in vitro and in vivo studies. Several HPLC parameters and extraction techniques have been optimised, followed by optimisation of the mass spectrometry method by examining the fragmentation of nucleotides. The method was then validated and applied to study the metabolism of cordycepin in vitro and in vivo, to investigate the effect of the cordycepin treatment with or without pentostatin on the intracellular level of endogenous nucleotides, and to examine the intracellular metabolism of nucleoside analogue 4-thiouridine and the effect of its metabolite on the metabolic balance of adenine and uridine nucleotides. The study on the intracellular metabolism of cordycepin in MCF7 and HeLa cells shows that cordycepin was rapidly metabolized into the deaminated form by adenosine deaminase (ADA) in culture medium as well as in cancer cells; therefore combination with pentostatin, an ADA inhibitor, resulting in the highly accumulated phosphorylated metabolite intracellularly. In contrast, cordycepin in C. militaris extracts showed much lower degradation in non-heat-treated serum compared with pure cordycepin that indicates a strong evidence of the presence of a deaminase inhibitor in the extract of Cordyceps. Moreover, the determination of concentrations of cordycepin and the metabolites in the plasma and liver of rats dosed with cordycepin proves that the half-life of cordycepin and its metabolites are very short in the plasma; nevertheless they are accumulated in the liver with repeated administration. Treatment using cordycepin initially caused an increase in the intracellular concentrations of nucleoside triphosphate, but in the long term, the active metabolite of cordycepin likely induced a long term change in the cell resulting in a drop in nucleotide levels. Pentostatin on its own reduced nucleoside triphosphates levels in the long term and combination with cordycepin increased the effect of cordycepin on nucleotide concentrations. High levels of the accumulated cordycepin triphosphate led to a massive decline in nucleotide levels. A study on the intracellular metabolism of nucleoside analogue 4-thiouridine has shown that generally the uptake of 4-thiouridine into NIH 3T3 cells was fast and the phosphorylated metabolite rapidly was developed only after two min labelling. However, it was also shown that its phosphorylation was not very efficient, but the level of the phosphorylated metabolite increased in serum-stimulated cells likely because the enzyme was upregulated in the presence of growth factor. Moreover, the present study provides additional evidence that 4-thiouridine and its metabolite have no adverse effect on the metabolic balance of adenine and uridine nucleotides. This study confirms that pharmacological activity of nucleosides analogues and their cytotoxicity highly rely on the accumulation of their phosphorylated metabolites. Consequently, the activity and the level of the enzymes involved in their metabolism are highly influential on their pharmacological action as well as their toxicity.
APA, Harvard, Vancouver, ISO, and other styles
7

Sofarelli, Rachel M. "Teacher-Implemented Presession Pairing to Improve Classroom Behaviors in Public Schools." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7645.

Full text
Abstract:
Presession pairing is an antecedent intervention that has shown to decrease problem behavior of elementary school children with autism, whose problem behavior is maintained by social reinforcement. It has also shown modest increases in academic responding. However, the research on presession pairing has not examined its efficacy or acceptability in the natural classroom setting when implemented by the teacher. Therefore, this study used teacher training and a multiple baseline across participants design to test the potential efficacy of teacher-implemented presession pairing in increasing on-task behavior and reducing problem behavior of four students with problem behavior in inclusive public elementary school classrooms. The results indicated that the presession pairing successfully increased on-task behavior and decreased problem behavior for all participating students. The social validity assessment indicated that the teachers found the presession intervention contextually fit, easy to implement, and effective for all students in the classroom.
APA, Harvard, Vancouver, ISO, and other styles
8

Pelttari, Danielsson Jeanette. "Molecular analysis of protein complexes involved in pairing of mammalian chromosomes during meiosis /." Stockholm, 2003. http://diss.kib.ki.se/2003/91-7349-682-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ohta, Shoji. "Genome Analysis of Aegilops mutica Boiss.Based on the Chromosome Pairing in Interspecific and Intergeneric Hybrids." Kyoto University, 1990. http://hdl.handle.net/2433/78237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gatling, John H. "An Experimental Analysis of Second-Order Conditioned Taste Aversion: Drug Pairing Facilitated Through Excitation of Geotactic Behavior." DigitalCommons@USU, 1990. https://digitalcommons.usu.edu/etd/6019.

Full text
Abstract:
In two experiments, second-order conditioned taste aversion techniques were employed to develop aversions in rats, with a geotactic-excitation procedure as the independent variable. Periodic tilting of an experimental apparatus resulted in angular orientation changes of all subjects located within compartments of the chamber. The effect was excitation of geotactic behaviors, expressed as locomotor activity within the confines of these compartments. In the first experiment, two groups of rats (n = 6) were exposed to experimental protocols which were identical with the exception of the independent variable. Three conditioning trials were presented, separated by five to seven days, within which strychnine injections preceded LiCl injections by 15 minutes. A treatment trial was presented five days following the last drug pairing, in which a novel flavor was available in lieu of tap water. Immediately following the 10-min water-access period, an injection of the CS-drug was administered. Testing for evidence of second-order CTA was conducted via presentation of the flavored solution on the fifth day following treatment. statistically significant results were obtained in terms of Learned Aversion Ratios and CTA Suppression Ratios. A second experiment was conducted in an attempt to isolate the influence of the excitation procedures with other drug-pairings. Five groups of rats (n = 6 in each group) were run in which hypertonic saline was paired with LiCl, strychnine, or hypertonic saline. Combinations of saline and the US-drugs were tested with and without the excitation procedures. A no-injection group (n = 6) received exposure to the flavor stimulus followed only by the excitation procedure. Results obtained on the Learned Aversion Ratios were statistically significant and in the predicted direction. The excitation group in which saline had been paired with LiCl showed a significant aversion ratio compared to the appropriate control groups, the Saline-Saline Group and the No-Injection Group. The Saline-Strychnine Excitation Group also showed a significant Learned Aversion Ratio compared to its respective control group and to the No-Injection Excitation Group. The implications of these results for such issues as stimulus equipotentiality, avfail, and research methodology and CTA research in general may provide additional foundations for future research in this experimental area.
APA, Harvard, Vancouver, ISO, and other styles
11

Hewlett, Brian. "Spiritual but not Religious Being: Exploring Structural Antecedents for the pairing of Spiritual and Non-Religious Identities across National Boundaries." Diss., The University of Arizona, 2007. http://hdl.handle.net/10150/196058.

Full text
Abstract:
Recent research and popular discourse offers evidence of a significant number of people in the U.S. and elsewhere in the world that self-identify as both "spiritual" and "not religious." Based on the conventional religious paradigm that has previously been supported by western scholarship, spirituality is a factor of religious involvement and such an identity combination should be rare in societies where people overwhelmingly participate in church activities. However, these new empirical data challenge this supposition. This quandary has renewed an interest among academics in understanding the relationship between spirituality and religion and in identifying mechanisms that have an impact on variance on particular combinations of the two. This dissertation explores the antecedent nature of certain combinations of structural conditions across nation states in association with substantial aggregations of "spiritual but not religious" populations in an effort to offer empirical evidence that can be used to support theoretical arguments about the cross-national variation of this population. Using fuzzy set qualitative comparative methods and data from 32 nation states, this analysis explores the necessity and sufficiency of individual demographic and economic conditions, church and state relations, and popular attitudes about church involvement in politics while examining the consistency of their presence in paths that lead to "spiritual non-religious" identification. The results suggest that in the midst of an atmosphere of attitudes that oppose the involvement of religious organizations in politics that is related to the size of the institutional religious canopy, a nation's structural economic forces may be driving the variance in religious identification that is associated with spiritual identification. However, a full understanding of this relationship can only be gained through combining tests offered in this work with future qualitative cross-national studies that also consider subjective meaning.
APA, Harvard, Vancouver, ISO, and other styles
12

Diaz, Alejandro Rene. "An Efficiency Evaluation of Procedures to Evoke Vocalizations in Children with Autism." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3771.

Full text
Abstract:
Development of vocalizations in early learners with autism is critical to the acquisition of verbal behavior and other important life skills. The purpose of the present studies was to (1) evaluate the efficiency and efficacy of Stimulus-Stimulus Pairing (SSP) and standard Echoic Training (ET) procedures for the development and onset of verbal behavior in early learners with ASD to improve early intervention efficiency and (2) elucidate predictive characteristics or variables for the effective use of SSP. The present studies were comprised of a multiple-baseline (across behaviors) experimental design buttressed within a reversal design, also known more broadly as within-subject controlled experimental designs. It was found that SSP can have a greater treatment efficacy than ET, but any efficacy advantage is transitory. Shifting an SSP treatment to direct reinforcement contingencies once vocalizations are produced are likely the most effective strategy. SSP produces discrepant effects across learners, thus highlighting the need to assess a learner’s characteristics and assumed reinforcer effectiveness. It was also found that higher-functioning learners will benefit more greatly from ET as opposed to SSP.
APA, Harvard, Vancouver, ISO, and other styles
13

Poudel, Pramod Prasad. "NOVEL AROMATIC ION–PAIRS: SYNERGY BETWEEN ELECTROSTATICS AND Π-FACE AROMATIC INTERACTIONS." UKnowledge, 2012. http://uknowledge.uky.edu/chemistry_etds/4.

Full text
Abstract:
This dissertation focuses on the design and study of charged aromatic molecules where weak π-π interactions synergize with electrostatic interactions to enhance the overall interaction between aromatic moieties. Each chapter investigates some aspect of this hypothetical synergy between electrostatics and π-face aromatic cohesion. The first chapter unveiled the importance of electrostatics in the intramolecular stacking of flexible aromatic molecular templates 1-2Br and 2a. While our previous studies found dicationic molecular template 1-2Br to have intramolecular π-stacking between electron poor pyridinium and electron rich xylylene moieties, no such stacking interaction was observed in the neutral analog 2a. Chapter two systematically explored the stacking pattern of electron poor aromatics in the form of oxygen- and / or nitrogen- substituted triangulenium cations, [1(NR)3]+ and [1(O)3(OH)3]+. As indicated in the chemical literature, triazatriangulenium cations [1(NR)3]+ with N- ethyl (and longer alkyl chains) chains were found to pack as face-to-face dimers. This study found the formation of columnar, face-to-face, n-meric association between aromatic cations in the structures with decreased steric interactions of the side chains in the stacking planes ([1(NMe)3]+ and [1(O)3(OH)3]+). Similar iso-structural triangulene based aromatic anions, (2)- and (3)2- didn’t indicate any facial interactions in the solid states. The possible synergy between unit charge electrostatics and π-face aromatic interactions was explored in aromatic ion pairs 1•2 of triangulene based aromatic cations and aromatic anions. This charge-assisted π-π stacking seems to be the novel way of getting strong π-system interactions where the strongest non-covalent force and the weakest non-covalent force: ionic bonding and π-stacking respectively synergize together. The π-π interaction between ionic aromatics in the solid state was investigated by means of single crystal x-ray diffraction and powder x-ray diffraction (PXRD). The interaction in the solution state was examined by UV-Vis spectroscopy, electrospray ionization mass spectroscopy (ESI-MS) and electrochemical studies. Studies found that optimal synergy was possible only in the ion pairs with no steric interactions of alkyl (or aryl) side chains in the stacking planes (1(O)3•2 & 1(NMe)3•2) and the interaction was found to be comparable with the strongest radical-assisted π-stacking described in the chemical literature.
APA, Harvard, Vancouver, ISO, and other styles
14

Paul, Séverine. "Modèle de Hartree-Fock-Bogoliubov : une perspective théorique et numérique." Phd thesis, Université de Cergy Pontoise, 2012. http://tel.archives-ouvertes.fr/tel-00752813.

Full text
Abstract:
Cette thèse est consacrée à l'étude mathématique et numérique du modèle de Hartree-Fock-Bogoliubov (HFB) pour les systèmes quantiques attractifs, qui est abondamment utilisé en physique nucléaire. Après avoir présenté le modèle et ses principales caractéristiques, nous expliquons comment le discrétiser et nous montrons des résultats de convergence. Nous examinons tout particulièrement l'algorithme de point fixe (parfois appelé Roothaan) et montrons qu'il converge ou alors oscille entre deux états dont aucun n'est solution du problème. Ceci généralise au cadre HFB des résultats de Cancès et Le Bris pour le modèle plus simple de Hartree-Fock dans le cas répulsif. Suivant ces mêmes auteurs, nous proposons un algorithme basé sur la contrainte relâchée et pour lequel la convergence est garantie. Dans la dernière partie de la thèse, nous illustrons le comportement de ces algorithmes par des simulations numériques pour plusieurs modèles. Dans un premier temps nous considérons un système purement gravitationnel où les particules interagissent avec le potentiel de Newton. Nos simulations montrent que la matrice d'appariement est toujours non nulle, un fait qui n'a pas encore pu être démontré rigoureusement. Nous étudions ensuite un modèle très simplifié pour la description de protons et neutrons dans le noyau atomique.
APA, Harvard, Vancouver, ISO, and other styles
15

Revel, Aldric. "Nuclear forces at the extremes." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMC227/document.

Full text
Abstract:
L’émission de paires de neutrons par les noyaux riches en neutrons 18C et 20O (isotones N = 12) est étudié par réactions de knock-out d’un nucléon des faisceaux secondaires 19N et 21O, peuplant ainsi des états non liés jusqu’à 15 MeV au-dessus de leur seuil d’émission deux neutrons. L’analyse des corrélations des triples coïncidences fragment+n+n montre que la décroissance 19N(−1p)→18C → 16C+n+n est clairement dominée par l’émission directe de paires. Les corrélations n-n, les plus grandes jamais observées, suggèrent la prédominance d’un coeur de 14C entouré de quatre neutrons arrangés en paires très corrélées. De plus, une importante compétition du mode de décroissance séquentiel est observée dans la décroissance 21O(−1n) → 20O → 18O+n+n, interprétée par la déformation causée par le knock-out d’un neutron très lié ayant pour effet de casser le cœur de 16O et ainsi de réduire le nombre de paires.De plus, les états non liés du 26F et 28F sont étudiés. Les deux systèmes étant peuplés par knock-out d’un nucléon du 27F dans le cas du 26F et du 29Ne ou du 29F pour 28F. Cinq états ont été observés pour 26F avec en particulier l’état de plus basse énergie (0.39 MeV) identifié comme l’état 3+ résultant du couplage d5/2 ⊗ d3/2 . Pour 28F, cinq états ont aussi été observés et l’état fondamental (200 keV) a été identifié comme étant de parité négative, plaçant ainsi 28F dans l’îlot d’inversion
The emission of neutron pairs from the neutron-rich N = 12 isotones 18C and 20O has been studied by high-energy nucleon knockout from 19N and 21O secondary beams, populating unbound states of the two isotones up to 15 MeV above their two-neutron emission thresholds. The analysis of triple fragment-n-n correlations shows that the decay 19N(−1p) → 18C → 16C+n+n is clearly dominated by direct pair emission. The two-neutron correlation strength, the largest ever observed, suggests the predominance of a 14C core surrounded by four neutrons arranged in strongly correlated pairs. On the other hand, a significant competition of a sequential branch is found in the decay 21O(−1n) → 20O → 18O+n+n, attributed to its formation through the knockout of a deeply-bound neutron that breaks the 16O core and reduces the number of pairs.Moreover, unbound states in 26F and 28F have been studied. The two systems were probed using single-nucleon knockout reaction from secondary beams of 27F respectively in the case of 26F, and 29Ne and 29F for 28F. Five possible states have been identified in 26F, with in particular the lowest energy one (0.39 MeV) being identified as the 3+ state resulting from the d5/2 ⊗ d3/2 coupling. In the case of 28F, five unbound state have also been observed and in particular its ground state (200 keV) has been identified as a negative parity state, meaning that 28F is located inside the island of inversion
APA, Harvard, Vancouver, ISO, and other styles
16

Le, Crom Benjamin. "Étude de l'appariement neutron-proton dans les noyaux instables N=Z par réactions de transfert." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS007/document.

Full text
Abstract:
Le noyau est généralement décrit comme un ensemble de protons et de neutrons liés dans un potentiel de champ moyen. Cependant afin d'obtenir une meilleure description, il convient de tenir compte des interactions locales dont principalement l'appariement. Les appariements neutron-neutron et proton-proton sont assez bien étudiés alors que ce n'est pas le cas de l'appariement neutron-proton. Celui-ci peut être soit isovectoriel similaire à l'appariement nn/pp, soit isoscalaire et donc dans ce cas vraiment méconnu. La surliaison des noyaux N=Z pourrait être une manifestation de l'appariement np.Nous avons effectué l'étude de l'appariement np par réactions de transfert de paires np. Dans ce cas il est attendu que la section efficace de transfert de paires np soit augmentée en présence d'un appariement np important. L'appariement np devrait être important dans les noyaux N=Z avec des orbitales de J élevé. Or, des faisceaux de ces noyaux ne sont accessibles que depuis le développement des installations de faisceaux radioactifs.Nous avons effectué notre expérience au GANIL (Caen) avec un montage permettant une détection des produits issus de la réaction de transfert (p, ³ He). Cette réaction met en jeu à la fois des paires np isovectorielles et isoscalaires. Nous avons utilisé des faisceaux de ⁵⁶ Ni et de ⁵²Fe permettant d'observer l'évolution de l'appariement np avec l'occupation de la couche 0f7/2.Tout d'abord, nous avons analysé les données issues de la réaction ⁵⁶Ni(p,d)⁵⁵Ni et extrait des résultats que nous avons comparé à ceux existants. Cette démarche a permis de valider la procédure d'analyse des données.Après analyse des données issues de la réaction ⁵⁶Ni(p,3He)⁵⁴Co, nous avons extrait les populations des états du ⁵⁴Co qui donnent des informations sur l'intensité relative des deux types d'appariement np pour le noyau ⁵⁶Ni et montrent que l'appariement np isovectoriel est dominant dans ce noyau.De plus, dans le cadre d'un développement d'un futur détecteur de particules chargées, un travail de R&D sur la discrimination des particules légères par la forme des signaux a été réalisé et est présenté
A nucleus is described as a set of independent neutrons and protons linked by a mean-field potential. However, in order to have a better description one needs to take in account some residual interactions such as pairing. Neutron-neutron and proton-proton pairings are well-studied but neutron-proton pairing is not well-known. np pairing can be isovector pairing such as nn and pp pairing or isoscalar which is yet unknown. Overbinding of N=Z nuclei could be a manifestation of np pairing.We have studied np pairing through transfer reactions. In this case, the cross-section of np pair transfer is expected to be enhanced in the presence of important np pairing. np pairing is expected to be important in N=Z nuclei with high J orbitals. Since the development of radioactive beam facilities, such beams are only available.The experiment was performed at GANIL with an efficient set-up so as to detect products from the (p,³He) transfer reaction. This reaction is affected by isovector and isoscalar np pairing. We used ⁵⁶Ni and ⁵²Fe beams so as to see the effect of the occupancy of 0f7/2 shell on the np pairing.First, we analysed the data from the ⁵⁶Ni(p,d)⁵⁵Ni reaction and we compared the results with the literature to validate analysis procedure.After analysing data from the ⁵⁶Ni(p,3He)⁵⁴Co reaction and extracting the population of the various states of ⁵⁴Co, we obtained information about the relative intensity between isoscalar and isovector np pairing in ⁵⁶Ni showing the predominance of isovector np pairing in this nucleus .Moreover, in the framework of developing a new charged particle detector, R&D on the discrimination of light nuclei using pulse shape analysis was performed and is presented
APA, Harvard, Vancouver, ISO, and other styles
17

Kachi-Akkouche, Djemaa. "Une approche géométrique pour l'analyse d'une séquence d'images monoculaires." Compiègne, 1996. http://www.theses.fr/1996COMP878S.

Full text
Abstract:
La géométrie projective est un puissant formalisme à potentiel très riche pour l'analyse et la résolution des problèmes liés à la vision par ordinateur. Le travail réalisé s'inscrit dans le cadre de l'analyse d'une séquence d'images monoculaires obtenues par déplacements d'une caméra dans une scène polyédrique. Notre approche est une technique d'auto-calibration qui ne nécessite aucune connaissance a priori concernant la caméra et l'environnement dans lequel elle se déplace. Pour la mise en correspondance des segments de droites entre deux images d'une même séquence, nous avons adopté une méthode originale basée sur le calcul des invariants projectifs. Chaque segment de droite de l'image est représenté, de façon unique, par une paire de paramètres invariants. Ces paramètres sont inchangés par les différentes transformations projectives provoquées par le mouvement de la caméra. Nous rapportons ainsi le problème de l'appariement du plan image à l'espace des paramètres invariants. Par cette approche, nous montrons une réelle utilisation des invariants projectifs dans la résolution du problème de la mise en correspondance des segments de droites. Pour l'estimation des paramètres intrinsèques de la caméra ainsi que son mouvement, nous exposons dans un cadre projectif la correspondance entre les images d'un plan, qui est une simple homographie. Nous établissons, par la suite, une relation linéaire entre l'homographie et la matrice fondamentale. Cette matrice est directement liée aux caractéristiques et au mouvement de la caméra. D’un point de vue pratique, nous examinons des méthodes numériques permettant de calculer l'homographie et la matrice fondamentale à partir des primitives mises en correspondance. De nombreux résultats pratiques, simulations et exemples réels, complètent ce travail
APA, Harvard, Vancouver, ISO, and other styles
18

Hitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security as 1024 bit RSA. Also, the level of security provided by an ECC increases faster with key size than for integer based discrete logarithm (dl) or RSA cryptosystems. ECCs can also provide a faster implementation than RSA or dl systems, and use less bandwidth and power. These issues can be crucial in lightweight applications such as smart cards. In the last few years, ECCs have been included or proposed for inclusion in internationally recognized standards. Thus elliptic curve cryptography is set to become an integral part of lightweight applications in the immediate future. This thesis presents an analysis of several important issues for ECCs on lightweight devices. It begins with an introduction to elliptic curves and the algorithms required to implement an ECC. It then gives an analysis of the speed, code size and memory usage of various possible implementation options. Enough details are presented to enable an implementer to choose for implementation those algorithms which give the greatest speed whilst conforming to the code size and ram restrictions of a particular lightweight device. Recommendations are made for new functions to be included on coprocessors for lightweight devices to support ECC implementations Another issue of concern for implementers is the side-channel attacks that have recently been proposed. They obtain information about the cryptosystem by measuring side-channel information such as power consumption and processing time and the information is then used to break implementations that have not incorporated appropriate defences. A new method of defence to protect an implementation from the simple power analysis (spa) method of attack is presented in this thesis. It requires 44% fewer additions and 11% more doublings than the commonly recommended defence of performing a point addition in every loop of the binary scalar multiplication algorithm. The algorithm forms a contribution to the current range of possible spa defences which has a good speed but low memory usage. Another topic of paramount importance to ECCs for lightweight applications is whether the security of fixed curves is equivalent to that of random curves. Because of the inability of lightweight devices to generate secure random curves, fixed curves are used in such devices. These curves provide the additional advantage of requiring less bandwidth, code size and processing time. However, it is intuitively obvious that a large precomputation to aid in the breaking of the elliptic curve discrete logarithm problem (ECDLP) can be made for a fixed curve which would be unavailable for a random curve. Therefore, it would appear that fixed curves are less secure than random curves, but quantifying the loss of security is much more difficult. The thesis performs an examination of fixed curve security taking this observation into account, and includes a definition of equivalent security and an analysis of a variation of Pollard's rho method where computations from solutions of previous ECDLPs can be used to solve subsequent ECDLPs on the same curve. A lower bound on the expected time to solve such ECDLPs using this method is presented, as well as an approximation of the expected time remaining to solve an ECDLP when a given size of precomputation is available. It is concluded that adding a total of 11 bits to the size of a fixed curve provides an equivalent level of security compared to random curves. The final part of the thesis deals with proofs of security of key exchange protocols in the Canetti-Krawczyk proof model. This model has been used since it offers the advantage of a modular proof with reusable components. Firstly a password-based authentication mechanism and its security proof are discussed, followed by an analysis of the use of the authentication mechanism in key exchange protocols. The Canetti-Krawczyk model is then used to examine secure tripartite (three party) key exchange protocols. Tripartite key exchange protocols are particularly suited to ECCs because of the availability of bilinear mappings on elliptic curves, which allow more efficient tripartite key exchange protocols.
APA, Harvard, Vancouver, ISO, and other styles
19

Hitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security as 1024 bit RSA. Also, the level of security provided by an ECC increases faster with key size than for integer based discrete logarithm (dl) or RSA cryptosystems. ECCs can also provide a faster implementation than RSA or dl systems, and use less bandwidth and power. These issues can be crucial in lightweight applications such as smart cards. In the last few years, ECCs have been included or proposed for inclusion in internationally recognized standards. Thus elliptic curve cryptography is set to become an integral part of lightweight applications in the immediate future. This thesis presents an analysis of several important issues for ECCs on lightweight devices. It begins with an introduction to elliptic curves and the algorithms required to implement an ECC. It then gives an analysis of the speed, code size and memory usage of various possible implementation options. Enough details are presented to enable an implementer to choose for implementation those algorithms which give the greatest speed whilst conforming to the code size and ram restrictions of a particular lightweight device. Recommendations are made for new functions to be included on coprocessors for lightweight devices to support ECC implementations Another issue of concern for implementers is the side-channel attacks that have recently been proposed. They obtain information about the cryptosystem by measuring side-channel information such as power consumption and processing time and the information is then used to break implementations that have not incorporated appropriate defences. A new method of defence to protect an implementation from the simple power analysis (spa) method of attack is presented in this thesis. It requires 44% fewer additions and 11% more doublings than the commonly recommended defence of performing a point addition in every loop of the binary scalar multiplication algorithm. The algorithm forms a contribution to the current range of possible spa defences which has a good speed but low memory usage. Another topic of paramount importance to ECCs for lightweight applications is whether the security of fixed curves is equivalent to that of random curves. Because of the inability of lightweight devices to generate secure random curves, fixed curves are used in such devices. These curves provide the additional advantage of requiring less bandwidth, code size and processing time. However, it is intuitively obvious that a large precomputation to aid in the breaking of the elliptic curve discrete logarithm problem (ECDLP) can be made for a fixed curve which would be unavailable for a random curve. Therefore, it would appear that fixed curves are less secure than random curves, but quantifying the loss of security is much more difficult. The thesis performs an examination of fixed curve security taking this observation into account, and includes a definition of equivalent security and an analysis of a variation of Pollard's rho method where computations from solutions of previous ECDLPs can be used to solve subsequent ECDLPs on the same curve. A lower bound on the expected time to solve such ECDLPs using this method is presented, as well as an approximation of the expected time remaining to solve an ECDLP when a given size of precomputation is available. It is concluded that adding a total of 11 bits to the size of a fixed curve provides an equivalent level of security compared to random curves. The final part of the thesis deals with proofs of security of key exchange protocols in the Canetti-Krawczyk proof model. This model has been used since it offers the advantage of a modular proof with reusable components. Firstly a password-based authentication mechanism and its security proof are discussed, followed by an analysis of the use of the authentication mechanism in key exchange protocols. The Canetti-Krawczyk model is then used to examine secure tripartite (three party) key exchange protocols. Tripartite key exchange protocols are particularly suited to ECCs because of the availability of bilinear mappings on elliptic curves, which allow more efficient tripartite key exchange protocols.
APA, Harvard, Vancouver, ISO, and other styles
20

Lim, Johnny. "Analytic Pontryagin Duality." Thesis, 2019. http://hdl.handle.net/2440/124554.

Full text
Abstract:
Let X be a smooth compact manifold. We propose a geometric model for the group K⁰(X,R/Z): We study a well-defined and non-degenerate analytic duality pairing between K⁰(X,R/Z) and its Pontryagin dual group, the Baum-Douglas geometric K-homology K₀(X); whose pairing formula comprises of an analytic term involving the Dai-Zhang eta-invariant associated to a twisted Dirac-type operator and a topological term involving a differential form and some characteristic forms. This yields a robust R/Z-valued invariant. We also study two special cases of the analytic pairing of this form in the cohomology groups H¹(X,R/Z) and H²(X,R/Z):
Thesis (Ph.D.) -- University of Adelaide, School of Mathematical Sciences, 2019
APA, Harvard, Vancouver, ISO, and other styles
21

Thomas, Stephen W. (Stephen William). "Molecular studies of homologous chromosome pairing in Triticum aestivum." 1997. http://web4.library.adelaide.edu.au/theses/09PH/09pht462.pdf.

Full text
Abstract:
Errata pasted on front fly-leaf. Bibliography: leaves 139-173. This thesis identifies DNA structures and genes involved in the process of homologous chromosome pairing in allohexaploid bread wheat (Triticum aestivum). In addition to studying late replicating DNA, a speculative model on the action of the pairing genes in allohexaploid wheat and the putative function of the AWWM5 gene is discussed.
APA, Harvard, Vancouver, ISO, and other styles
22

Lin, Tzu-Chieh, and 林孜潔. "Study on The Taste Analysis and Situation Pairing of Beer." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/mxmk8u.

Full text
Abstract:
碩士
國立高雄餐旅大學
餐飲創新研發碩士學位學程
102
Various kinds of foreign beers have rushed into the beer market ever since Taiwan became one of the WTO members. Moreover, Taiwan locally-made beers and Tsingtao Beer have also developed new flavors at the same time. This study aimed (1) how to brew homemade beer and try to suggest the standard operating procedure of it, (2) to compare the tastes of locally-made beers with those of foreign ones on their intensity of sensory attributes by a trained panel with sensory evaluation, (3) to apply the consumers’ test and PCA (Principal Component Analysis) to analyze how different kinds of beers go with different circumstances. As for the above aims (2) and (3), eight beer samples were used, including six of Lager and two of Ale. Six beer samples of Lager were composed of two Taiwanese beers, two Japanese, and two European ones. A trained panel of ten was chosen out of sixteen. The panel analyzed intensity or strength of sensory attributes from level zero to fifteen, which included colors, bitter taste, carbonic taste (bubble taste), alcoholic taste, fruit taste, spicy taste, charbroiled taste, and all together as the whole. Next, eight beer samples were analyzed for the correlation of their principal components and the sensory attributes they have. In addition, the consumers’ survey, 120 efficient questionnaires were conducted. The survey aimed at investigating how these eight beer samples go with six circumstances, including the food choice, location, time, timing, physical condition, and psychological condition, which were done with customers’ preference test (7-point Likert Scale). Then the survey went further to analyze the principal components of the eight beer samples with regard to situation pairing. The results of this study may provide the references of beer marketing or the promotion of new beer products, and for the basis reference of related academic research.
APA, Harvard, Vancouver, ISO, and other styles
23

Thomas, Stephen W. (Stephen William). "Molecular studies of homologous chromosome pairing in Triticum aestivum / by Stephen W. Thomas." Thesis, 1997. http://hdl.handle.net/2440/18994.

Full text
Abstract:
Errata pasted on front fly-leaf.
Bibliography: leaves 139-173.
iv, 173, [88] leaves, [1] leaf of plates : ill. (some col.) ; 30 cm.
This thesis identifies DNA structures and genes involved in the process of homologous chromosome pairing in allohexaploid bread wheat (Triticum aestivum). In addition to studying late replicating DNA, a speculative model on the action of the pairing genes in allohexaploid wheat and the putative function of the AWWM5 gene is discussed.
Thesis (Ph.D.)--University of Adelaide, Dept. of Plant Science, 1997
APA, Harvard, Vancouver, ISO, and other styles
24

Lin, Jyun-yu, and 林峻宇. "Analysis of network security directed user authentication scheme using bilinear pairing over elliptic curves." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/98816025445039993879.

Full text
Abstract:
碩士
南華大學
資訊管理學研究所
94
The information security with the internet has become a serious issue recently to us. In order to protect the transaction security, many cryptosystem has developed such as RSA which based on the complex discrete logarithm problem. Recently, bilinear pairings such as Weil pairing and Tate pairing defined on elliptic curves were proved and could be applied to cryptography in 2001. It possesses faster computation and fewer bits but remaining the same security level as other public key cryptosystems, like the traditional RSA cryptosystem. In this paper, we review some exist security attributes and point out the current cryptosystem based on bilinear pairings which proposed by Manik which has some weaknesses. After that, we proposed few improvement of their scheme.
APA, Harvard, Vancouver, ISO, and other styles
25

Pavlovich, James Gilbert. "Ion pairing of nucleotides with surfactants for enhanced sensitivity in liquid matrix assisted secondary ion mass spectrometry." Thesis, 1993. http://hdl.handle.net/1957/36760.

Full text
Abstract:
In particle induced desorption-ionization mass spectrometry the strength of an analyte's signal under a given set of bombardment conditions is usually considered to be representative of the analytes relative surface activity. This rationale is generally used to explain differences in the technique's sensitivity between and within various classes of compound. In liquid matrix assisted secondary ion mass spectrometry (SIMS) sensitivity enhancement of ionic analytes by pairing with surface active counterions has been demonstrated by several groups. This technique has been utilized in this work to achieve a 10,000 fold enhancement in the signal for ATP on a double focusing magnetic sector instrument and to detect femtomole quantities of nucleoside monophosphates on a time-of-flight instrument. The analyte's signal, however, is dependent on both the analyte bulk concentration and that of the surfactant. Additionally, the surfactant concentration that produces the maximum analyte signal changes with the analyte concentration. In this study, this phenomenon has been modeled in terms of conventional solution equilibria and surface chemical principles. It is assumed that the initial surface composition and the bulk concentration are the boundary conditions of a steady state established by the competing processes of surface sputtering and surface replenishment from the bulk during analysis. Calculated surface excesses correlate well with observed relative ion intensities, suggesting that equilibrium conditions are approached in the sample matrices despite the outwardly dynamic nature of the sputtering processes.
Graduation date: 1994
APA, Harvard, Vancouver, ISO, and other styles
26

Islam, Shama Naz. "Multi-way relay networks: characterization, performance analysis and transmission scheme design." Phd thesis, 2015. http://hdl.handle.net/1885/13648.

Full text
Abstract:
Multi-way relay networks (MWRNs) are a growing research area in the field of relay based wireless networks. Such networks provide a pathway for solving the ever in- creasing demand for higher data rate and spectral efficiency in a general multi-user scenario. MWRNs have potential applications in video conferencing, file sharing in a social network, as well as satellite networks and sensor networks. Recent research on MWRNs focuses on efficient transmission protocol design by harnessing different network coding schemes, higher dimensional structured codes and advanced relaying protocols. However, the existing research misses out the characterization and analysis of practical issues that influence the performance of MWRNs. Moreover, the existing transmission schemes suffer some significant limitations, that need to be solved for maximizing the benefits of MWRNs. In this thesis, we investigate the practical issues that critically influence the perfor- mance of a MWRN and propose solutions that can outperform existing schemes. To be specific, we characterize error propagation phenomenon for additive white Gaus- sian noise (AWGN) and fading channels with functional decode and forward (FDF) and amplify and forward (AF) relaying protocols, propose a new pairing scheme that out- performs the existing schemes for lattice coded FDF MWRNs in terms of the achievable rate and error performance and finally, analyze the impact of imperfect channel state information (CSI) and optimum power allocation on MWRNs. At first, we analyze the error performance of FDF and AF MWRNs with pair- wise transmission using binary phase shift keying (BPSK) modulation in AWGN and Rayleigh fading channels. We quantify the possible error events in an L-user FDF or AF MWRN and derive accurate asymptotic bounds on the probability for the general case that a user incorrectly decodes the messages of exactly k (k ∈ [1, L − 1]) other users. We show that at high signal-to-noise ratio (SNR), the higher order error events (k ≥ 3) are less probable in AF MWRN, but all error events are equally probable in a FDF MWRN. We derive the average BER of a user in a FDF or AF MWRN under high SNR conditions and provide simulation results to verify them. Next, we propose a novel user pairing scheme for lattice coded FDF MWRNs. Lattice codes can achieve the capacity of AWGN channels and are used in digital communica- tions as high-rate signal constellations. Our proposed pairing scheme selects a common user with the best average channel gain and thus, allows it to positively contribute to the overall system performance. Assuming lattice code based transmissions, we derive upper bounds on the average common rate and the average sum rate with the proposed pairing scheme. In addition, considering M-ary QAM with square constellation as a special case of lattice codes, we derive asymptotic average symbol error rate (SER) of the MWRN. We show that in terms of the achievable rates and error performance, the proposed pairing scheme outperforms the existing pairing schemes under a wide range of channel scenarios. Finally, we investigate lattice coded FDF and AF MWRNs with imperfect CSI. Con- sidering lattice codes of sufficiently large dimension, we obtain the bounds on the com- mon rate and sum rate. In addition, considering M-ary quadrature amplitude mod- ulation (QAM) with square constellations, we obtain expressions for the average SER in FDF MWRNs. For AF MWRNs, considering BPSK modulation as the simplest case of lattice codes, we obtain the average BER. Moreover, we obtain the optimum power allocation coefficients to maximize the sum rate in AF MWRN. For both FDF and AF relaying protocols, the average common rate and sum rate are decreasing functions of the estimation error. The analysis shows that the error performance of a FDF MWRN is an increasing function of both the channel estimation error and the number of users, whereas, for AF MWRN, the error performance is an increasing function of only the channel estimation error. Also, we show that to achieve the same sum rate in AF MWRN, optimum power allocation requires 7 − 9 dB less power compared to equal power allocation depending upon users’ channel conditions.
APA, Harvard, Vancouver, ISO, and other styles
27

(10708623), Denilson Mendes de Oliveira. "Water-Mediated Interactions Through the Lens of Raman Multivariate Curve Resolution." Thesis, 2021.

Find full text
Abstract:
Raman multivariate curve resolution (Raman-MCR) spectroscopy is used to study water-mediated interactions by decomposing Raman spectra of aqueous solutions into bulk water and solute-correlated (SC) spectral components. The SC spectra are minimum-area difference spectra that reveal solute-induced perturbations of water structure, including changes in water hydrogen-bonding strength, tetrahedral structure, and formation of dangling (non-hydrogen-bonded) OH defects in a solute's hydration shell. Additionally, Raman-active intramolecular vibrational modes of the solute may be used to uncover complementary information regarding solute--solute interactions. Herein, Raman-MCR is applied to address fundamental questions related to: (1) confined cavity water and its connection to host-guest binding, (2) hydrophobic hydration of fluorinated solutes, (3) specific ion effects on nonionic micelle formation, and (4) ion pairing in aqueous solutions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography