Dissertations / Theses on the topic 'Kew'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Kew.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Scaramuzza, Filho Mauro. "Kew Gardens, de Virginia Woolf." reponame:Repositório Institucional da UFPR, 2009. http://hdl.handle.net/1884/20251.
Full textStaveley, Alice Elizabeth. "Reconfiguring 'Kew Gardens' : Virginia Woolf's 'Monday or Tuesday' years." Thesis, University of Oxford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365488.
Full textClifford, Sean C. "Breeding systems in Oncidium and related genera (Orchidaceae)." Thesis, University of Reading, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.305083.
Full textDay, Cheryl. "Magnificence, misery and madness : a history of the Kew Asylum 1872-1915 /." Connect to thesis, 1998. http://repository.unimelb.edu.au/10187/2443.
Full textKew, Chun [Verfasser], and Adam [Gutachter] Antebi. "Control of Innate Immunity by RNA Metabolism / Chun Kew ; Gutachter: Adam Antebi." Köln : Universitäts- und Stadtbibliothek Köln, 2018. http://d-nb.info/1180601556/34.
Full textScaramuzza, Filho Mauro. "Evocação poético-visual na literatura performática de Virginia Woolf, em Mrs. Dalloway e Kew Gardens." reponame:Repositório Institucional da UFPR, 2017. http://hdl.handle.net/1884/47958.
Full textTese (doutorado) - Universidade Federal do Paraná, Setor de Ciências Humanas, Programa de Pós-Graduação em Letras. Defesa: Curitiba, 30/03/2017
Inclui referências : f.210-227
Área de concentração : Estudos Literários
Resumo: A tese discute a escrita literária performática de Virginia Woolf (1882-1941) em Mrs. Dalloway (1925) e Kew Gardens (1919). Focaliza a presença da transgressão como vocalização e fragmentação verbo-visual na narrativa woolfiana. A prosa lírica de Woolf proporciona identificar a disposição de letras, palavras e sentenças arranjados como peças de um jogo poético-visual que desarticula a linguagem convencional. Esses segmentos instigam a percepção do leitor-espectador, desafiando-o a uma performance no ato de sua decodificação ou da tentativa de efetuá-la. No esfacelamento das estruturas linguísticas, presentes na ficção da escritora e das formas de transposição de contextos, argumentamos em favor de sua associação com os conceitos da literatura e da pintura. De modo análogo ao Cubismo, a prosa woolfiana apresenta a sobreposição de planos e o recurso técnico da colagem que contempla a desarticulação da linguagem verbal como reflexão a respeito do cotidiano. As relações intertextuais presentes na prosa de Virginia Woolf incorporam um complexo sistema de referências e dialogam tanto com a obra de William Shakespeare quanto com a linguagem de propaganda e com as referências vertidas da pintura cubista. Dentro dessa visão, propomos uma leitura das relações entre as artes literárias e pictóricas. Esse fenômeno entre mídias ocorre em um momento em que literatura e pintura sugerem uma provocação ao leitor-espectador, a partir de um influxo de transgressão dos seus valores estéticos convencionais, que evocam os textos impressos e a tipografia. Para o substrato teórico, a tese assenta-se sobre a visão de intertextualidade segundo Julia Kristeva, Roland Barthes e Gérard Genette; os estudos de intermidialidade, conforme Irina Rajewsky e Claus Clüver e os postulados sobre a performance literária, de Paul Zumthor. PALAVRAS-CHAVE: Virginia Woolf. Cubismo. Performance literária. Intertextualidade. Intermidialidade.
Abstract: The dissertation discusses the literary performative writing of Virginia Woolf (1882-1941) in Mrs. Dalloway (1925) and Kew Gardens (1919). It focalizes the presence of transgression as vocalization and verbal and visual fragmentation in woolfian narrative. Woolf's lyrical prose offers the identification of the letters arrangement, the words and sentences with the pieces organized as the elements of a poetic and visual game that disarticulate the conventional language. These segments instigate the reader/espectator's perception, challenging him to a performance in the act of its decodification or its try to conclusion. In the slicing of linguistic structures, and the transsection of contexts, present in the writer's fiction, we argument in favor of its association with the concepts of literature and painting. In an analogous way to Cubism, the woolfian prose presents the juxtaposition of plans and the technique source of collage, which contemplates the disarticulation of the verbal language as a reflexion about the trivial. The intertextual relations present in Virginia Woolf's prose incorporates an intricate complex of references and dialog with William Shakespeare's production, and also in relation to the publicity's language, and from the cubist painting's references in literature. According to this view, we propose a reading interpretation of the literary arts and painting. This phaenomenon occurs in a moment in which both media suggest a provocative challenge to the reader/espectator, after an influxus of transgression in its conventional aesthetic values that evokes the press texts and letterpressing. As the theoretical embasement, the argumentation rests over Julia Kristeva's, Roland Barthes' and Gérard Genette's view of intertextuality; Irina Rajewsky's and Claus Clüver's intermedia studies, and the literary performance concepts of Paul Zumthor. KEYWORDS: Virginia Woolf. Cubism. Literary performance. Intertextuality. Intermediality.
Macdonald, Lee Todd. "From King's Instrument Repository to National Physical Laboratory : Kew Observatory, physics and the Victorian world, 1840-1900." Thesis, University of Leeds, 2015. http://etheses.whiterose.ac.uk/11346/.
Full textCorrado, Amanda Roberta 1983. "Historiografia de espécies da família urticaceae coletadas no Brasil e depositadas nos herbários de Kew, New York e Paris /." Botucatu, 2014. http://hdl.handle.net/11449/127562.
Full textBanca: Maria Franco Trindade Medeiros
Banca: Maria Christina de Mello Amorozo
Resumo: A exsicata é um documento misto, onde a planta fixada representa a evidência biológica e os registros do rótulo, as evidências textuais. A evidência biológica da exsicata é a base do estudo da taxonomia e sistemática que normalmente utiliza-se da observação e comparação da planta fixada para revisão e atualização da nomenclatura. Como fonte documental, as séries de exsicatas foram estudadas neste trabalho com foco nas evidências textuais. Através da revisita, resgate e sistematização dos registros. Buscou-se reunir informações sobre: (1) nome comum das plantas; (2) uso, (3) percepções da relação humano-natural e (4) aspectos histórico das coleções analisadas. O estudo abordou as séries de exsicatas da família Urticaceae depositadas em de três instituições estrangeiras: (1) Royal Botanic Gardens (K), Kew, Inglaterra; (2) Muséum National d'Histoire Naturelle (P), Paris, França, que participam do Projeto REFLORA; (3) New York Botanical Garden (NY), Estados Unidos, juntamente com fontes impressas e manuscritos. Foram analisadas ao todo 2644 exsicatas, 707 de K, 542 de P e 1395 de NY, e oito obras históricas. Na análise dos dados, 50 espécies de Urticaceae apresentaram registro de nomes populares, com destaque para o gênero Cecropia. Trinta e cinco exsicatas apresentaram a indicação de uso das espécies coletadas categorizados em: (1) medicinal; (2) alimentação humana; (3) alimentação aninal; (4) fibra e (5) energia. As espécies com registro de uso foram: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. A descrição dos aspectos históricos da formação das coleções biológicas e dos ...
Abstract: Exsiccates forms a mixed document, in which the fixed plant represents the biological evidence and the registers of the label, the textual evidence. The biological evidence of the exsiccata is the basis for the study of the taxonomy and systematic which normally uses the observation and comparison of the fixed plant for the review and updating of the nomenclature. As a documental source, the series of exsiccates have been studied in this work with focus on the textual evidence. Through the revisiting, recovery and systematization of registers, information was gathered on: (1) common name of the plants; (2) usage, (3) perception on the relation human-natural and (4) historical aspects of the collection analyzed. The study has approached the series of exsiccates of the family deposited in three foreign institutions: (1) Royal Botanic Gardens (K), Kew, England; (2) Muséum National d'Histoire Naturelle (P), Paris, France, which have participated in the Project REFLORA; (3) New York Botanical Garden (NY), United States, together with printed sources and manuscripts. A total of 2644 exsiccates, have been analyzed, 707 from K, 542 from P and 1395 from NY, and eight historical works. With the analysis of the data, 50 species of the family Urticaceae presented registers of popular names, of which the genre Cecropia outstands. Thirty-five exsicatas presented indication of use of the species collected categorized in (1) medicinal; (2) human food; (3) animal food; (4) fiber and (5) energy. The species with register of use were: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. The description of the historical aspects of formation of the ...
Mestre
Corrado, Amanda Roberta [UNESP]. "Historiografia de espécies da família urticaceae coletadas no Brasil e depositadas nos herbários de Kew, New York e Paris." Universidade Estadual Paulista (UNESP), 2014. http://hdl.handle.net/11449/127562.
Full textA exsicata é um documento misto, onde a planta fixada representa a evidência biológica e os registros do rótulo, as evidências textuais. A evidência biológica da exsicata é a base do estudo da taxonomia e sistemática que normalmente utiliza-se da observação e comparação da planta fixada para revisão e atualização da nomenclatura. Como fonte documental, as séries de exsicatas foram estudadas neste trabalho com foco nas evidências textuais. Através da revisita, resgate e sistematização dos registros. Buscou-se reunir informações sobre: (1) nome comum das plantas; (2) uso, (3) percepções da relação humano-natural e (4) aspectos histórico das coleções analisadas. O estudo abordou as séries de exsicatas da família Urticaceae depositadas em de três instituições estrangeiras: (1) Royal Botanic Gardens (K), Kew, Inglaterra; (2) Muséum National d'Histoire Naturelle (P), Paris, França, que participam do Projeto REFLORA; (3) New York Botanical Garden (NY), Estados Unidos, juntamente com fontes impressas e manuscritos. Foram analisadas ao todo 2644 exsicatas, 707 de K, 542 de P e 1395 de NY, e oito obras históricas. Na análise dos dados, 50 espécies de Urticaceae apresentaram registro de nomes populares, com destaque para o gênero Cecropia. Trinta e cinco exsicatas apresentaram a indicação de uso das espécies coletadas categorizados em: (1) medicinal; (2) alimentação humana; (3) alimentação aninal; (4) fibra e (5) energia. As espécies com registro de uso foram: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. A descrição dos aspectos históricos da formação das coleções biológicas e dos ...
Exsiccates forms a mixed document, in which the fixed plant represents the biological evidence and the registers of the label, the textual evidence. The biological evidence of the exsiccata is the basis for the study of the taxonomy and systematic which normally uses the observation and comparison of the fixed plant for the review and updating of the nomenclature. As a documental source, the series of exsiccates have been studied in this work with focus on the textual evidence. Through the revisiting, recovery and systematization of registers, information was gathered on: (1) common name of the plants; (2) usage, (3) perception on the relation human-natural and (4) historical aspects of the collection analyzed. The study has approached the series of exsiccates of the family deposited in three foreign institutions: (1) Royal Botanic Gardens (K), Kew, England; (2) Muséum National d'Histoire Naturelle (P), Paris, France, which have participated in the Project REFLORA; (3) New York Botanical Garden (NY), United States, together with printed sources and manuscripts. A total of 2644 exsiccates, have been analyzed, 707 from K, 542 from P and 1395 from NY, and eight historical works. With the analysis of the data, 50 species of the family Urticaceae presented registers of popular names, of which the genre Cecropia outstands. Thirty-five exsicatas presented indication of use of the species collected categorized in (1) medicinal; (2) human food; (3) animal food; (4) fiber and (5) energy. The species with register of use were: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. The description of the historical aspects of formation of the ...
Boampong, James Kwadwo. "Solar thermal heating of a glasshouse using phase change material (PCM) thermal storage techniques." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/12863.
Full textBrennan, E. "Heterogeneous cloth : an ethnography of the coming into being of barkcloth artefacts at the Royal Botanic Gardens, Kew, and amongst the Nuaulu of Nua Nea Village, Maluku, Eastern Indonesia." Thesis, University College London (University of London), 2017. http://discovery.ucl.ac.uk/10037521/.
Full textHill, Sandra. "Unsettled: A Collection of Sort Stories." University of the Western Cape, 2013. http://hdl.handle.net/11394/8198.
Full textHarriott is asleep under a jacaranda tree in her daughter's lush Escombe garden. Escombe is no longer part of the Natal Colony, the Natal Colony exists only in the minds of people like Harriott. Escombe, though still in the same place it's always been, is now part of the Union of South Africa. It is the 20th of January 1923. Harriott has lived in the Natal Colony for thirty years exactly. She has been married for only one day less. Dorothy's garden Is wonderful, but according to Harriott, not as wonderful as it could be with a little more effort. Dorothy's bougainvillea are a riot of cerise, peach and white. Her dipladenias climbing the pillars of the front veranda - a profusion of pink. The creamy day Iillies are in full bloom. The lavender is a field of purple and the plumbago hedge, where dragon-like Harriott is asleep under a jacaranda tree in her daughter's lush Escombe garden. The barometer has dropped. Harriott does not notice the thickening of the air, nor the band of dampness spreading along her back. Her chair is covered with blankets and a white sheep fleece. It Is the day-bed of a woman whose own padding has melted away, whose bones are dissolving, whose joints have swollen over. 'It won't be long,' whispers Herbert to his bride as they lie side by side sweltering in the room next to Harriott's, the door ajar so Dorothy can hear her if she calls out. 'I'm afraid, it won't be for very much longer, my dear.' chameleons lurk, is thick with blue ... a cool blue ud at t he bottom of the garden, Dorothy thinks. Boy is hard pressed to kee~~~~~~~~~i_~~~~ go, paw-paw and avocado trees. Harriott pays little heed to t ~ e for her lawns, beds, shrubs, Harriott's book is lying on the grass. It is a very slim volume, the slimmest she owns and the latest addition to her collection, thanks to dear Rose who tracked it down somewhere in London and sent it over. Harriott cannot hold anything heavier than the slimmest of books, nor can she make.
Cattoor, Romain. "Investigation sur des sources lasers émettant à 2 μm utilisant des cristaux monocliniques." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0212/document.
Full textThis thesis is devoted to the study on the potential of biaxial crystals in order to increase laser output power. Biaxial crystals have two optic axes and an effect called conical refraction (or diffraction) can occur. This effect is known since 1832, and intensively studied since the last decade. Thanks to the progress of crystal growth and crystal cutting, it is possible to have long samples of good optical quality in order to ob serve the conical refraction. This effect has already been used in a laser cavity [79, 78]. The aim of this thesis was to confirm the results previously obtained. Thus, Neodymium-doped KGd(WO4)2 (KGW) crystals, cut along the optic axis, have been tested. These first results were disappointing. Stability, beam quality and efficiency were very low. The maximum efficiency achieved was arount 40% compared to the 74% claimed in publication [77]. Thus, this orientation which should be an athermal direction using the calculation of Biswal [10] shows astigmatism when there is a temperature gradient. Furthermore, this laser being difficult to align with strong intensity fluctuations, rise interrogations about the optical property variations around the optic axis. Thus, in the first Chapters of this thesis a study of those properties around the optic axis is given. It shows a strong variation of the optical properties depending on the polarization and orientation around the optic axis. The study of the refraction along the optic axis helps to understand this complex dependency with the orientation. In a second time, holmium-doped KY(WO4)2 (KYW) crystals have been tested for laser emission at 2 µm. The choice of this ion has been done on several criteria. The first one is that the ISL laboratory is used to work with this wavelength and has a lot of equipment. The second one is that Holmium ions have a small "quantum defect" (pump wavelength 1960 nm and lasing wavelength 2074 nm). This low "quantum defect" limits the dispersion between the pump and lasing wavelengths. This decreases the separation between the optic axes of both wavelengths. Thus, when the pump is aligned for conical refraction the lasing wavelength is also aligned along the optic axis. Thanks to a better setup (with new mechanical parts) the polarization and orientation dependencies of the laser efficiency have been investigated. Up to 3 W of output power with a slope efficiency of 70% has been reached near the optic axis. The doping concentration of the Holmium-doped KY(WO4)2 (KYW) being more appropriated for high power laser, no thermal lens effect has been observed. Furthermore, the first conical refraction laser with a quasi-three-level system has been realized. An efficiency of 50% has been achieved with such a conical refraction laser. Finally, a new innovative setup is proposed using the External Conical Refraction. An output power of 800 mW for 4 W of incident pump power has been reached
Key, Joey Shapiro. "Characterizing astrophysical sources of gravitational waves." Thesis, Montana State University, 2010. http://etd.lib.montana.edu/etd/2010/key/KeyJ0510.pdf.
Full textПутій, М. В., and M. V. Putii. "Адміністративно-правове забезпечення проходження служби у Корпусі оперативно-раптової дії Національної поліції : дисертація." Thesis, Харків, 2020. https://youtu.be/TJm5rCFz-kw.
Full textУ дисертації наведено теоретичне узагальнення та нове вирішення наукового завдання, яке полягає у визначенні сутності та розкритті особливостей адміністративно-правового забезпечення проходження служби у Корпусі оперативно-раптової дії Національної поліції та напрямків його вдосконалення з урахуванням вітчизняної практики та зарубіжного досвіду. Визначено поняття та особливості служби в Національній поліції як різновиду державної служби особливого характеру. Виділено види адміністративних процедур проходження служби в КОРД та надано конкретні пропозиції щодо їх удосконалення.
The dissertation provides a theoretical generalization and a new solution to the scientific problem, which consists in defining the essence and disclosing the features of administrative and legal support of service in the Corps of operative-sudden action of the National Police and directions of its improvement taking into account domestic practice and foreign experience. The concept and features of service in the National Police as a kind of civil service of a special nature are defined. The types of administrative procedures for service in KORD are highlighted and specific proposals for their improvement are provided.
В диссертации приведено теоретическое обобщение и новое решение научной задачи, которая заключается в определении сущности и раскрытии особенностей административно-правового обеспечения прохождения службы в Корпусе оперативно-внезапного действия Национальной полиции и направлений его совершенствования с учетом отечественной практики и зарубежного опыта. Определено понятие и особенности службы в Национальной полиции как разновидности государственной службы особого характера. Выделены виды административных процедур прохождения службы в КОРД и предоставлены конкретные предложения по их усовершенствованию.
Williams, Deidre D. "Key management for McEliece public-key cryptosystem." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/14864.
Full textHoleček, Zdeněk. "Price Convergence between the Czech Republic and the EU-15." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16389.
Full textPaterová, Iveta. "Monetary integration and intensitym of mutual trade empirical evidence." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16392.
Full textSingh, Jagmeet 1980. "Key characteristic coupling and resolving key characteristic conflict." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/16953.
Full textIncludes bibliographical references (p. 159-166).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Real complex assemblies have to deliver large number of customer requirements. Assemblies in general have many parts which work together to deliver those requirements. The involvement of many parts and presence of many requirements to be delivered, results in the involvement of a part in the delivery chains of more than one requirement. As a result most of the requirements are not delivered independently. Coupling among the requirements makes it hard to achieve all the requirements with in their respective tolerance limits. The thesis gives classification of nature of relationships that can exist among various requirements. It discusses characteristic of each relationship and how it can affect the robustness of an assembly. When the requirements in the assembly are conflicting, i.e. reduction in variation in one of the requirements increases variation in conflicting requirement, it tends to become non-robust. Non-robust assemblies entail high manufacturing costs. Aim of the thesis is to identify the scenarios of conflict in the assembly. Screw theory can be used to find the presence of coupling among requirements in the assembly. It can also be used to identify the nature of coupling. If coupling suggests that requirements are coupled, we analyze the intensity of the conflict. Not all conflicts need to be solved. Only the conflicts that will make assembly miss tolerance limits on its requirements need to be solved. The thesis outlines some of the methods that can be used to either resolve conflict or reduce the amount of conflict in the assembly. Conflicts can be removed from the assembly by making suitable changes in design. Design changes will modify DFCs of the conflicting requirements. Use of appropriate assembly techniques can also remove conflicts from the assembly. An assembly without any conflicts is more robust and can be produced at a less cost as compared to the one having conflicts.
by Jagmeet Singh.
S.M.
Barrera, Reyes Keiko Dallana, Ocampo Christian Castañeda, Arenas Geannel Yani Rosas, and Condorena Natalia Andrea Zegarra. "KEY BAG." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653102.
Full textFor many time, plastic bags had been helpful for the costumers, many of them were got for free in every supermarket and shops. However, Nowadays there is the Law N° 30884, which made every customer have a bag to carry their products, otherwise the customer could buy a bag at the supermarket or shop they are at the moment. That is the moment when our project is born, “KEYBAG”, is a key chain bag which is designed for not planned shopping, it gives you the advantage to have a bag in your key chain, it has a thermic cloth bag which protects your products and the environment, it also allows you to organize your products, and use it to go shopping o buy you products many times. Our tempting project has an estimated time of 5 years, requires an initial investment of S/. 28005.53 and after the financial analysis it determined that the external financing S/ 11,202.21, and to the end of the project. Also, the return of investment would be a year after the commercial activities start. Finally, following the current trend about the responsible consumption we are using eco-friendly and resistant materials, what makes KeyBag a product that generates a positive impact for the environment.
Trabajo de investigación
Gaunt, Hailey Kathryn. "Who knew." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1001812.
Full textConnell, Rachel. "Knew religion." Thesis, University of Iowa, 2018. https://ir.uiowa.edu/etd/6081.
Full textWiesmaier, Alexander. "Secure private key management in adaptable public key infrastructures." Berlin mbv, Mensch-und-Buch-Verl, 2008. http://d-nb.info/998075051/04.
Full textYeung, Hin-Kei. "Chen Yi and Her Choral Music: A Study of the Composer's Ideal of Fusing Chinese Music and Modern Western Choral Traditions." Thesis, connect to online resource. Access restricted to the University of North Texas campus, 2006. http://www.unt.edu/etd/all/Dec2006/Restricted/yeung_hin-kei/index.htm.
Full textSystem requirements: Adobe Acrobat Reader. Accompanied by 4 recitals, recorded Apr. 22, 2003, Apr. 27, 2003, Oct. 7, 2004, and Oct. 16, 2006. Includes bibliographical references (p. 89-90).
Jureková, Petra. "Zabezpečení vícesměrové komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400936.
Full textKibritov, Ivan. "Mergers and Takeovers in European economies: The Impact on Performance." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16383.
Full textSonalker, Anuja Anilkumar. "Asymmetric Key Distribution." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-20020403-040240.
Full textABSTRACT BY Anuja A Sonalker on Asymmetric Key Distribution. (Under the direction of Dr. Gregory T. Byrd) Currently, in Threshold Public Key Systems key shares are generated uniformly and distributed in the same manner to every participant. We propose a new scheme, Asymmetric Key Distribution (AKD), in which one share server is provided with a larger, unequal chunk of the original secret key. Asymmetric Key Distribution is a unique scheme for generating and distributing unequal shares via a Trusted Dealer to all the registered peers in the system such that without the combination of the single compulsory share from the Special Server no transaction can be completed. This application is aimed for circumstances where a single party needs to co-exist within a group of semi-trusted peers, or in a coalition where every entity should have a choice to participate and one of the entities needs to be privileged with more powers. This thesis presents the algorithm and security model for Asymmetric Key Distribution, along with all the assumptions and dependencies within the boundaries of which this algorithm is guaranteed to be secure. Its robustness lies in its simplicity and in its distributed nature. We address all security concerns related to the model including compromised share servers and cryptanalytic attacks. A variation, called the Dual Threshold Scheme, is created to reduce the vulnerability in the algorithm, namely, the compromise of the Special Server and its secret share. In this scheme, a combination of another threshold number of Distributed Special Servers must combine to collectively generate a share equivalent to the Special Server?s share. This flexibility allows us to adjust our threshold scheme for the environment. We describe a Java-based implementation of the AKD algorithm, using Remote Method Invocation (RMI) for communication among share servers. A typical scenario of a Trusted Dealer, a Special Server and a number of Share Servers was created, where timed asymmetric key generation and distribution was carried out after which the servers initiated and carried out certificate signing transactions in the appropriated manner. As an interesting exercise, the share servers were corrupted so that they would try to exclude the Special Server in the transactions and try to form its share themselves, to observe the consequence. All their efforts were futile. Another interesting aspect was the key generation timing. Key generation is known to be a very time-extensive process but the key share reuse concept used in this implementation reduced the time for key generation by 66-90% of the classical key generation time.
Sousa, Valter Balegas de. "Key-CRDT stores." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/7802.
Full textThe Internet has opened opportunities to create world scale services. These systems require highavailability and fault tolerance, while preserving low latency. Replication is a widely adopted technique to provide these properties. Different replication techniques have been proposed through the years, but to support these properties for world scale services it is necessary to trade consistency for availability, fault-tolerance and low latency. In weak consistency models, it is necessary to deal with possible conflicts arising from concurrent updates. We propose the use of conflict free replicated data types (CRDTs) to address this issue. Cloud computing systems support world scale services, often relying on Key-Value stores for storing data. These systems partition and replicate data over multiple nodes, that can be geographically disperse over the network. For handling conflict, these systems either rely on solutions that lose updates (e.g. last-write-wins) or require application to handle concurrent updates. Additionally, these systems provide little support for transactions, a widely used abstraction for data access. In this dissertation, we present the design and implementation of SwiftCloud, a Key-CRDT store that extends a Key-Value store by incorporating CRDTs in the system’s data-model. The system provides automatic conflict resolution relying on properties of CRDTs. We also present a version of SwiftCloud that supports transactions. Unlike traditional transactional systems, transactions never abort due to write/write conflicts, as the system leverages CRDT properties to merge concurrent transactions. For implementing SwiftCloud, we have introduced a set of new techniques, including versioned CRDTs, composition of CRDTs and alternative serialization methods. The evaluation of the system, with both micro-benchmarks and the TPC-W benchmark, shows that SwiftCloud imposes little overhead over a key-value store. Allowing clients to access a datacenter close to them with SwiftCloud, can reduce latency without requiring any complex reconciliation mechanism. The experience of using SwiftCloud has shown that adapting an existing application to use SwiftCloud requires low effort.
Project PTDC/EIA-EIA/108963/2008
Shoufan, Abdulhadi. "Group Key Management." Phd thesis, [S.l.] : [s.n.], 2007. http://tuprints.ulb.tu-darmstadt.de/814/1/shoufan.pdf.
Full textDvořák, Dalibor. "Key Account Management." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-15373.
Full textGonzalez-Nieto, Juan Manuel. "Key recovery systems." Thesis, Queensland University of Technology, 2002.
Find full textDjamaludin, Christopher I. "Decentralised key management for delay tolerant networks." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/94983/1/Christopher_Djamaludin_Thesis.pdf.
Full textAzam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.
Full textMotazedian, Tahirih. "To Key or Not to Key| Tonal Design in Film Music." Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584956.
Full textScholars have long been dismissive of the viability of long-range tonal organization in film music. Controversy over questions of authorial intent, aural perception and tonal memory, and the ability of a sound track to function as a cohesive "work" have led scholars to steer dear of (or reject) the concept of tonal design in film. To date, filmic tonal design has been explored by only a few scholars in the context of a few films. Having analyzed over sixty films, my work addresses this lacuna, and establishes a systematic methodology for tonally analyzing film sound tracks. My analyses reveal overarching tonal organization and elaborate networks of harmonic relationships, in which specific keys serve explicit functions within the filmic narrative and structure. In addition to overturning prevalent assumptions about the feasibility of large-scale tonality in film, my findings foster a fascinating new level of engagement between a film's music and narrative, and challenge the sedimented notion that key is an irrelevant parameter in the study of film music.
The following films will be analyzed: The Talented Mr. Ripley (1999), The English Patient (1996), Breaking and Entering (2006), The Grand Budapest Hotel (2014), The Royal Tenenbaume (2001), Fantastic Mr. Fax (2009), Moonrise Kingdom (2012), The Darjeeling Limited (2007), Persuasion (1995), Emma (1996), and Amadeus (1984). i
Uslu, Sevgi Koltuksuz Ahmet. "Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library/." [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000618.pdf.
Full textDrudiková, Dita. "Inflation Growth Relation." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-73333.
Full textDavies, Gareth Thomas. "Encryption in the presence of key-dependent messages and related-key attacks." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.688349.
Full textTvedt, Ole Christian. "Quantum key distribution prototype." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15845.
Full textLeila, Rouatbi. "Maskuliniteter inom visual kei." Thesis, Stockholms universitet, Avdelningen för japanska, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-120400.
Full textNovak, Julia. "Generalised key distribution patterns." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/f582aac8-df73-28ea-fe2e-80f1c37f5e59/8/.
Full textYu, Jiangshan. "Mitigating private key compromise." Thesis, University of Birmingham, 2016. http://etheses.bham.ac.uk//id/eprint/6915/.
Full textGraham, Marc Miller. "Design is the key." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43487.
Full textMarc Miller Graham.
M.S.
Cotter, Cara E. "Ghosts That We Knew." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1689.
Full textWoodburn, Diana. "Understanding Key Account Management." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/understanding-key-account-management(ff717e1b-2f1e-4f38-8a7f-172edf08f97a).html.
Full textWolf, Katherine, Nakia J. Woodward, and Rick L. Wallace. "Clinical Key: A Review." Digital Commons @ East Tennessee State University, 2013. https://dc.etsu.edu/etsu-works/8678.
Full textDittus, Jami. "I Knew You When." VCU Scholars Compass, 2009. http://scholarscompass.vcu.edu/etd/1818.
Full textKurt, Yesem. "New key exchange primitives." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3243768.
Full textTitle from PDF t.p. (viewed Nov. 18, 2008). Source: Dissertation Abstracts International, Volume: 67-12, Section: B, page: 7117. Adviser: Jee-Heub Koh.
Quinn-Bork, Heather Fae. "Desolation is Key: Essays." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2369.
Full textPoskočil, Jan. "EU Trade Policy in Relation to Central Europe and Its Impact on Local Market: the Case of the Czech Republic." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16384.
Full textPutnářová, Zuzana. "Are the Peripheries Trapped in Their Initial Economic Positions od does Convergence with the Cores Occur? The Case of the Central European Countries/Regions." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16385.
Full text