Dissertations / Theses on the topic 'Pseudolo'

To see the other types of publications on this topic, follow the link: Pseudolo.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Pseudolo.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Rossetto, Laura. "Lo "Pseudolo" e lo "Stico" di Plauto: volgarizzamenti rinascimentali." Doctoral thesis, Università Ca' Foscari Venezia, 1994. http://hdl.handle.net/10579/97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

JUBERT, DUPONT-LHOTELAIN MARIE-CHRISTINE. "Syndrome pseudo-phlebite et pseudo-pseudo-phlebitique des kystes poplites." Angers, 1989. http://www.theses.fr/1989ANGE1091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

JACQUET, JEAN-PHILIPPE. "Logique pseudo-consistante." Paris 6, 1995. http://www.theses.fr/1995PA066349.

Full text
Abstract:
Nous proposons une logique, la logique pseudo-consistante, permettant la manipulation formelle de donnees contradictoires. Cette logique possede une contrepartie algebrique, les pc-algebres, et deux semantiques (une semantique locale pouvant etre interpretee de deux facon differentes et une semantique de type topologique). Nous montrons que la logique pseudo-consistante, en raison de son approche de la verite, est differente des logiques paraconsistantes. Nous decrivons de quelles facons elle peut-etre utilisee, notamment pour resoudre certains problemes lies a la categorisation
APA, Harvard, Vancouver, ISO, and other styles
4

Cattelat, Catherine. "L'appendicite pseudo-tumorale." Montpellier 1, 1988. http://www.theses.fr/1988MON11038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thiénot, Cédric. "Logique pseudo-intuitionniste." Paris 6, 1999. http://www.theses.fr/1999PA066651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Galaffi, Giulia. "Operatori pseudo-differenziali." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4625/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

D'Amico, Daniela <1977&gt. "Sullo pseudo-vitellio." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gaito, Stephen Thomas. "Shadowing of weakly pseudo-hyperbolic pseudo-orbits in discrete dynamical systems." Thesis, University of Warwick, 1992. http://wrap.warwick.ac.uk/109461/.

Full text
Abstract:
We consider Cr (r ≥ 1 +γ) diffeomorphisms of compact Riemannian manifolds. Our aim is to develop the analytic machinery required to describe the topological symbolic dynamics of sets of weakly hyperbolic orbits. The Pesin set is an example of such a set. For Axiom-A dynamical systems, that is, for diffeomorphisms which have a uniformly hyperbolic nonwandering set which is the closure of the periodic orbits, this analytic machinery is provided by the Shadowing Lemma. This lemma is a consequence of the Stable Manifold Theorem, and the local product structure of the nonwandering set of an Axiom-A diffeomorphism. Weakly hyperbolic invariant sets, such as the Pesin set, do not, in general, have local product structure. We can however, prove a generalization of the Shadowing Lemma by combining Anosov’s Stability Lemma with the Stable Manifold Theorem. In essence we prove a perturbed Stable Manifold Theorem. In order to deal with weakly hyperbolic orbits we use Pugh and Shub’s graph transform version of Pesin’s Stable Manifold Theorem. Normally, the contraction required to prove either Anosov’s Stability Lemma or the Stable Manifold Theorem, is derived from the hyperbolicity of a “supporting” invariant set. In fact neither of these proofs require this invariance; hyperbolic, or even pseudo-hyperbolic, families of pseudo-orbits are all that they require. This allows us to conclude the existence of shadowing orbits in the neighbourhood of “hyperbolic invariant sets” of numerical simulations of lowdimensional dynamical systems. In particular corresponding to any such numerical “hyperbolic invariant set”, there is a uniformly hyperbolic invariant set of the dynamical system itself.
APA, Harvard, Vancouver, ISO, and other styles
9

Mefenza, Nountu Thierry. "Pseudo-random generators and pseudo-random functions : cryptanalysis and complexity measures." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE064/document.

Full text
Abstract:
L’aléatoire est un ingrédient clé en cryptographie. Par exemple, les nombres aléatoires sont utilisés pour générer des clés, pour le chiffrement et pour produire des nonces. Ces nombres sont générés par des générateurs pseudo-aléatoires et des fonctions pseudo-aléatoires dont les constructions sont basées sur des problèmes qui sont supposés difficiles. Dans cette thèse, nous étudions certaines mesures de complexité des fonctions pseudo-aléatoires de Naor-Reingold et Dodis-Yampolskiy et étudions la sécurité de certains générateurs pseudo-aléatoires (le générateur linéaire congruentiel et le générateur puissance basés sur les courbes elliptiques) et de certaines signatures à base de couplage basées sur le paradigme d’inversion. Nous montrons que la fonction pseudo-aléatoire de Dodis-Yampolskiy est uniformément distribué et qu’un polynôme multivarié de petit dégré ou de petit poids ne peut pas interpoler les fonctions pseudo-aléatoires de Naor-Reingold et de Dodis-Yampolskiy définies sur un corps fini ou une courbe elliptique. Le contraire serait désastreux car un tel polynôme casserait la sécurité de ces fonctions et des problèmes sur lesquels elles sont basées. Nous montrons aussi que le générateur linéaire congruentiel et le générateur puissance basés sur les courbes elliptiques sont prédictibles si trop de bits sont sortis à chaque itération. Les implémentations pratiques de cryptosystèmes souffrent souvent de fuites critiques d’informations à travers des attaques par canaux cachés. Ceci peut être le cas lors du calcul de l’exponentiation afin de calculer la sortie de la fonction pseudo-aléatoire de Dodis-Yampolskiy et plus généralement le calcul des signatures dans certains schémas de signatures bien connus à base de couplage (signatures de Sakai-Kasahara, Boneh-Boyen et Gentry) basées sur le paradigme d’inversion. Nous présentons des algorithmes (heuristiques) en temps polynomial à base des réseaux qui retrouvent le secret de celui qui signe le message dans ces trois schémas de signatures lorsque plusieurs messages sont signés sous l’hypothèse que des blocs consécutifs de bits des exposants sont connus de l’adversaire
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate keys, for encryption and to produce nonces. They are generated by pseudo-random generators and pseudorandom functions whose constructions are based on problems which are assumed to be difficult. In this thesis, we study some complexity measures of the Naor-Reingold and Dodis-Yampolskiy pseudorandom functions and study the security of some pseudo-random generators (the linear congruential generator and the power generator on elliptic curves) and some pairing-based signatures based on exponentinversion framework. We show that the Dodis-Yampolskiy pseudo-random functions is uniformly distributed and that a lowdegree or low-weight multivariate polynomial cannot interpolate the Naor-Reingold and Dodis-Yampolskiy pseudo-random functions over finite fields and over elliptic curves. The contrary would be disastrous since it would break the security of these functions and of problems on which they are based. We also show that the linear congruential generator and the power generator on elliptic curves are insecure if too many bits are output at each iteration. Practical implementations of cryptosystems often suffer from critical information leakage through sidechannels. This can be the case when computing the exponentiation in order to compute the output of the Dodis-Yampolskiy pseudo-random function and more generally in well-known pairing-based signatures (Sakai-Kasahara signatures, Boneh-Boyen signatures and Gentry signatures) based on the exponent-inversion framework. We present lattice based polynomial-time (heuristic) algorithms that recover the signer’s secret in the pairing-based signatures when used to sign several messages under the assumption that blocks of consecutive bits of the exponents are known by the attacker
APA, Harvard, Vancouver, ISO, and other styles
10

Tomasetti, Luca. "Sulla Pseudo-Telepatia Quantistica." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9677/.

Full text
Abstract:
La tesi descrive il fenomeno della pseudo-telepatia quantistica; vengono spiegati quali avvenimenti storici hanno portato alla nascita di questa teoria. Attraverso vari esempi, in un primo momento si cerca di far capire cosa sia realmente il fenomeno analizzato, successivamente verrà dimostrato che la pseudo-telepatia è la migliore strategia esistente per la risoluzione di alcune particolari tipologie di compiti.
APA, Harvard, Vancouver, ISO, and other styles
11

Kapanadze, David, and Bert-Wolfgang Schulze. "Pseudo-differential crack theory." Universität Potsdam, 2000. http://opus.kobv.de/ubp/volltexte/2008/2575/.

Full text
Abstract:
Crack problems are regarded as elements in a pseudo-differential algbra, where the two sdes int S± of the crack S are treated as interior boundaries and the boundary Y of the crack as an edge singularity. We employ the pseudo-differential calculus of boundary value problems with the transmission property near int S± and the edge pseudo-differential calculus (in a variant with Douglis-Nirenberg orders) to construct parametrices od elliptic crack problems (with extra trace and potential conditions along Y) and to characterise asymptotics of solutions near Y (expressed in the framework of continuous asymptotics). Our operator algebra with boundary and edge symbols contains new weight and order conventions that are necessary also for the more general calculus on manifolds with boundary and edges.
APA, Harvard, Vancouver, ISO, and other styles
12

Soriano, Del Amo David. "Pseudo-dynamic combinatorial chemistry." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32577.

Full text
Abstract:
Pseudo-dynamic combinatorial chemistry (pDCC) combines the synthesis, screening and destruction of combinatorial libraries to kinetically resolve inhibitors based on their affinity for a target. In our proof-of-principle studies, a library of dipeptides was formed in the presence of a target, carbonic anhydrase (CA), and a destruction mechanism, a protease. Since the target and the protease were separated by a dialysis membrane, only the proportion of dipeptides that was not bound to the target was available for destruction and therefore, the rate of hydrolysis of the pseudo-dynamic combinatorial library (pDCL) could be correlated to the librarie's relative affinity for the target. The first set of proof-of-principle pDCC experiments were found to be flawed. Rather than reflecting the binding affinity of the library for the target, the final product distribution reflected the protease's substrate specificity. The main problems with these pDCLs were insufficient and imbalanced rate of destruction of the peptides in the absence of the target, pH drift, and insufficient permeability across 1000 MWCO cellulose ester membranes. A dipeptide amide based pDCL that was efficiently cleaved by thermolysin was designed. The new pDCL could be used in pH 7.5 75 mM HEPES, 16.6 mM CaCl2 buffer, provided that the chambers were limited by 3500 MWCO membranes. A 4th generation pDCC experiment that evolved reflecting the library's affinity for the target was performed. In order to study pDCC behavior a simplified pDCC mimic (pDCCm) was designed. In pDCCm, synthesis was replaced by a static library of compounds and destruction by dilution. The design of a pDCCm based kinetic model led to a
La chimie combinatoire pseudo dynamique (pDCC) combine la synthèse, le criblage et la destruction de libraires combinatoires afin de sélectionner cinétiquement des inhibiteurs sur la base de leur affinité pour une cible. Nos études préliminaires ont été basées sur une librairie de dipeptides formés en présence de l'anhydrase carbonique (CA) comme cible et détruits grâce à une protéase. Étant donné que la cible et la protéase étaient séparées par une membrane de dialyse, seuls les dipeptides non complexés avec la cible étaient susceptibles d'être détruits. Ainsi, la vitesse d'hydrolyse des membres de la librairie combinatoire pseudo-dynamique (pDCL) peut correspondre aux affinités relatives des molécules pour la cible. Les premières expériences prototypes de pDCC étaient défectueuses. Plutôt que de refléter l'affinité des membres de la librairie pour la cible, la distribution finale des produits reflétait la préférence de la protéase pour les substrats. Les principaux problèmes de ces pDCL étaient: une vitesse de destruction des peptides insuffisante et inégale en l'absence de la cible, une déviation progressive du pH et une perméabilité insuffisance au travers les membranes d'ester de cellulose 1000 MWCO. Une pDCL basée sur des amides dipeptidiques, aptes à être efficacement clivés par thermolysine a été élaborée, et utilisée avec succès. Afin d'étudier les pDCC, une expérience modèle simplifiée (pDCCm) a été créée. Dans ce modèle, la synthèse a été remplacée par une librairie statique de molécules et la destruction par une dilution. Le design d'un modèle cinétique basé sur la pDCCm a mené à la cr
APA, Harvard, Vancouver, ISO, and other styles
13

Corbett, Andrew D. "Pseudo-dynamic combinatorial libraries." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=19735.

Full text
Abstract:
A new method of drug discovery, the pseudo-dynamic combinatorial library, is described. The technique involves expanding on the dynamic combinatorial library method, where a reversible synthetic reaction is carried out in the presence of a target. In the pseudo-dynamic combinatorial library, this reversible reaction is separated into two irreversible steps. The independent control of the two steps leads to superior selectivity in the screening process. A model system based on peptidic inhibitors of carbonic anhydrase was developed and studied. The synthesis of a series of new carbonic anhydrase inhibitors is described. Amino acids with sulfonamide and sulfamide functional groups, which are known to bind to carbonic anhydrase, were prepared. The synthesis of a series of active esters attached to solid support are described. The tetrafluorophenyl esters are shown to be ideal for amide bond formation in aqueous media. The properties of this class of active esters were investigated. Initial studies on a static library screening method are reported. The design and results of a series of dynamic combinatorial library experiments are described.
APA, Harvard, Vancouver, ISO, and other styles
14

Montenegro, Guzmán Samaria. "Théorie des modèles des corps pseudo-réels clos et pseudo-p-adiquement clos." Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCC269.

Full text
Abstract:
Ceci est une thèse en théorie des modèles appliquée à l'algèbre. Dans cette thèse nous étudions la théorie des corps pseudo-réels clos (corps PRC) et pseudo-p-adiquement clos (corps PpC) bornés d'un point de vue modèle-théorique. Les corps PRC et PpC sont des généralisations des corps pseudo-algébriquement clos (corps PAC), des corps réels clos, et des corps p-adiquement clos. Le résultat principal de cette thèse est une réponse positive à la conjecture de Chernikov, Kaplan et Simon : Si M est un corps PRC, alors M est borné si et seulement si Th(M) est NTP2. Dans le cas des corps PpC nous prouvons que si M est un corps PpC borné, alors Th(M) est NTP2. Nous généralisons également ce résultat pour obtenir que si M est un corps PRC (respectivement PpC) borné avec exactement n ordres (respectivement n valuations p-adiques), alors Th(M) est forte de fardeau n. Ceci permet également de calculer explicitement le fardeau des types et de décrire la déviation. D'autres résultats importants sont des résultats d'amalgamation de types et l'élimination des imaginaires pour les corps PRC bornés
This is a thesis in model theory applied to algebra. In this thesis we study the theory of bounded pseudo real closed fields (PRC fields) and pseudo p-adically closed fields (PpC fields) from a model theoretic point of view. The classes of bounded PRC and PpC fields are generalizations of those of pseudo-algebraically closed fields (PAC fields), real closed fields, and p-adically closed fields. The main result of the thesis is a positive answer to the conjecture by Chernikov, Kaplan and Simon: If M is a PRC-field, then Th(M) is NTP2 if and only if M is bounded. In the case of PpC fields, we prove that if M is a bounded PpC field, then Th(M) is NTP2. We also generalize this result to obtain that, if M is a bounded PRC or PpC field with exactly n orders or p-adic valuations respectively, then Th(M) is strong of burden n. This also allows us to explicitly compute the burden of types, and to describe forking. Other results of independent interest are some amalgamation results, and the elimination of imaginaries for bounded PRC fields. Keywords: Model theory, ordered fields, p-adic valuation, real closed fields, p-adically closed fields, PRC, PpC, NIP, NTP2, elimination of imaginaries
APA, Harvard, Vancouver, ISO, and other styles
15

Dalla, Venezia Marzia. "Risonanze per operatori pseudo-differenziali." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1874/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Strege, Christine. "On (pseudo- ) polymorphic phase transformations." [S.l. : s.n.], 2004. http://deposit.ddb.de/cgi-bin/dokserv?idn=974120006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

bechata, abdellah. "analyse pseudo-différentielle p-adique." Phd thesis, Université de Reims - Champagne Ardenne, 2001. http://tel.archives-ouvertes.fr/tel-00002546.

Full text
Abstract:
On développe ici l'analyse pseudodifférentielle des opérateurs agissant sur les fonctions à valeurs complexes sur k?, où k est un corps non archimédien. Cette étude met en jeu, pour commencer, une géné-ralisation au cas p--adique des méthodes obligatoires (calcul de Weyl, représentation d'Heisenberg) ou souhaitables (utilisation de familles d'états cohérents et caractérisation des classes d'opérateurs par leur action sur ces états) de l'analyse pseudodifférentielle. On en déduit une caractérisation "à la Beals" de classes d'opérateurs, ainsi qu'un calcul fonctionnel des opérateurs de poids un. L'absence d'opérateurs de dérivation interdit bien sûr tout développement "à la Moyal" de la composition de deux symboles: mais, utilisant la théorie des caractères multiplicatifs de k^(×), on donne une formule de composition reliant la décomposition en termes "homogènes" d'un produit f?f? aux décompositions de cette espèce de f? et f?
APA, Harvard, Vancouver, ISO, and other styles
18

AMINO, ROBERT, and JONI BAITAR. "Probabilistic Pseudo-random Number Generators." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-157351.

Full text
Abstract:
Random numbers are essential in many computer applications and games. The goal of this report is to examine two of the most commonly used random number generators and try to determine some of their strengths and weaknesses. These generators are the Linear Congruential Generator(LCG) and the Mersenne Twister(MT). The main objective will be to determine which one of these is the most optimal for low intensive usage and everyday work. Although some of the test results were in conclusive,there were some indications that MT is the better Pseudorandom Number Generator (PRNG) and therefore the preferred PRNG. However, be wary that this is not a general guideline and some implementations may differ from this.The final verdict was thus that MT is a more favourable option(mainly due to its speed) for everyday work, bothon a practical and theoretical level, if a choice should arise between the two options.
Slumptal representerar en viktig komponent i många datorspel, simulationer och övriga progam. Två av de mest förekommande slumptalsgeneratorerna är Linjär kongruensgeneratorn (LKG) samt Mersenne Twister(MT). Huvudfrågan som skall besvaras i denna rapport är huruvida, för vardagligt bruk, den ena generatorn är att föredra framför den andra. Ett antal tester kommer att utföras för att försöka finna eventuella styrkor samt svagheter med respektive generator.Baserat på ett fåtal tester är MT att föredra framför LKG. Detta stämmer väl överens med teorin. Notera dock att detta inte alltid gäller och att det kan förekomma skiljaktigheter mellan de båda alternativen som strider mot det tidigare påståendet. Detta är främst beroende på vilka implementationer som används för respektive generator. Slutsatsen är således att användning av MT ändå rekommenderasframför LKG, främst på grund av den snabba genereringshastigheten för MT.
APA, Harvard, Vancouver, ISO, and other styles
19

Agerblad, Josefin, and Martin Andersen. "Provably Secure Pseudo-Random Generators." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134830.

Full text
Abstract:
This report is a literary study on provably secure pseudo-random generators. In the report we explain what provably secure pseudo-random generators are and what they are most commonly used for. We also discuss one-way functions which are closely related to our subject. Furthermore, two well-known generators are described and compared, one generator by Blum and Micali, and one by Blum, Blum and Shub. What we have concluded is that the x 2 mod N generator by Blum, Blum and Shub seems to be the better one concerning speed, security and application areas. You will also be able to read about how the Blum-Blum-Shub generator can be implemented and why we believe that implementation is suitable.
Den här rapporten är en litteraturstudie om bevisbart säkra pseudo-slumpmässiga generatorer. I rapporten förklarar vi vad bevisbart säkra pseudo-slumpmässiga generatorer är och vad de vanligtvis används till. Vi tar dessutom upp envägsfunktioner som är starkt kopplat till vårt ämne. Vidare beskrivs och jämförs två kända sådana generatorer, en generator av Blum och Micali och en generator av Blum, Blum och Shub. Den slutsats som vi kommit fram till är att x 2 mod N generatorn av Blum, Blum och Shub verkar vara den bättre utav dem vad gäller hastighet, säkerhet och applikationsområden. Ni kommer även kunna läsa om hur en sådan generator kan implementeras och vi förklarar varför den presenterade koden är bra.
APA, Harvard, Vancouver, ISO, and other styles
20

LaBute, Gerard Joseph. "Pseudo-Bayesian response surface analysis." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0001/MQ34971.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Dunn, Corey. "Curvature homogeneous pseudo-Riemannian manifolds /." view abstract or download file of text, 2006. http://proquest.umi.com/pqdweb?did=1188874491&sid=3&Fmt=2&clientId=11238&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2006.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 146-147). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
22

Potter, John R. "Pseudo-triangulations on closed surfaces." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-021408-102227/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

BUSTAMANTE, SAMUEL GUSTAVO HUAMAN. "FORECASTING GEOPHYSICAL MEASUREMENTS: PSEUDO-WELLS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2012. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=22840@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
No presente trabalho de tese é apresentado, analisado e avaliado um método inédito para prever perfis de poço (para um pseudo-poço), a partir de informações dos poços verticais vizinhos e dados de sísmica 3D. Este método é formado por quatro partes principais. Na primeira parte são processados os perfis de raio gama dos poços para produzir um conjunto de sinais estratificados. Estes resultados são utilizados na segunda parte para realizar a correlação lateral de poços, com um método baseado em Algoritmos Genéticos, cujos resultados são intervalos de estratos semelhantes que indicariam a existência de estruturas rochosas contínuas na subsuperfície. Na terceira parte são estimados os deslocamentos, em profundidade, entre alguns estratos do pseudo-poço e dos poços reais. Isto é realizado com um método, baseado em Algoritmos Genéticos, para correlacionar eventos entre traços sísmicos 3D nas posições próximas aos poços reais e ao pseudo-poço. Na quarta parte são utilizados os resultados das outras três partes para interpolar vários tipos de perfis do pseudo-poço, primeiramente, dos estratos semelhantes e, em seguida, dos estratos não semelhantes, ajustados em profundidade. Os resultados desta parte constituem as medições previstas. Os pesos para a interpolação, pelo método de Shepard, são calculados através de uma função que depende da distância entre o pseudo-poço e cada um dos poços utilizados. Um estudo de sete casos é apresentado para avaliar a eficácia do método de previsão. Esses casos utilizam arranjos de dois e três poços do Campo de Namorado na Bacia de Campos (RJ) e, adicionalmente, um poço próximo a cada arranjo serve de padrão para avaliar as medições previstas através do coeficiente de correlação e da média dos erros percentuais absolutos. Em termos globais os resultados das previsões apresentam correlação linear forte e os erros percentuais absolutos estão entre 5 por cento e 30 por centoem relação aos padrões.
In this thesis is presented, analyzed and evaluated a new method to forecast well logs (for a pseudo-well), based on information of the neighboring vertical wells and the 3D seismic data. This method consists of four main parts. In the first part, the gamma ray logs from wellbores are processed to produce a stratified set of signals. In the second part, the stratified signals are used to perform a method of lateral correlation of wells with Genetic Algorithms; whose results are similar intervals strata that would indicate the existence of continuous rock structures in the subsurface. In the third part, a method, based on Genetic Algorithms, are used to estimate displacements in depth between some strata of the pseudo-well and real wells. That method correlates events between 3D seismic traces at positions near the real wells and the pseudo-well. In the fourth part, results from the other three parts are used to interpolate several types of logs of the pseudo-well, first of the similar strata and then of the not similar strata, adjusted in depth. The results of this part are the forecasted measurements. The weights for interpolation, by the method of Shepard, are calculated using a function that depends on the distance between the pseudo-well and each real well. A study of seven cases is presented to evaluate the effectiveness of the forecasting method. These cases use arrangements of two and three wells of the Namorado Field in the Campos Basin (RJ) and additionally a real well near each array serves as a standard for evaluating the forecasted measurements by the correlation coefficient and the mean absolute percentage error. Overall the results showed a strong linear correlation and the mean absolute percentage errors are between 5 per cent and 30 per cent in relation of standard data.
APA, Harvard, Vancouver, ISO, and other styles
24

Santos, Yuri David. "Pseudo-contractions in belief revision." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-08062016-105125/.

Full text
Abstract:
Belief Revision addresses the problem of how to change epistemic states, usually represented in the literature by sets of logical sentences. Solid theoretical results were consolidated with the AGM paradigm, which deals with theories (logically closed sets of sentences). After that, the theory was extended to belief bases, that is, arbitrary sets of sentences. Besides all this theoretical framework, AI researchers face serious difficulties when trying to implement belief revision systems. One of the major complications is the closure required by AGM theory, which cannot be easily computed. Even belief bases, which do not require closure, seem to be improper for practical purposes, since their changes are usually very rigid (syntax dependent). Some operations, known as pseudo-contractions, are in the middle ground between belief set change and belief base change. In the present work we have proposed a new pseudo-contraction operation, studied its properties and characterized it. We have also found connections between this operator and some other pseudo-contractions.
Revisão de Crenças aborda o problema de como alterar estados epistêmicos, normalmente representados na literatura como conjuntos de sentenças lógicas. Resultados teóricos sólidos foram consolidados com o paradigma AGM, que lida com teorias (conjuntos de sentenças logicamente fechados). Depois disso, a teoria foi estendida para bases de crenças, isto é, conjuntos arbitrários de sentenças. Apesar de todo esse arcabouço teórico, pesquisadores de IA enfrentam sérias dificuldades ao tentar implementar sistemas de revisão de crenças. Uma das maiores complicações é o fecho exigido pela teoria AGM, que não pode ser facilmente computado. Mesmo bases de crenças, que não exigem fechamento, parecem ser impróprias para fins práticos, pois suas alterações são geralmente muito rígidas (dependentes de sintaxe). Algumas operações, conhecidas como pseudo-contrações, estão no meio do caminho entre mudanças para conjuntos de crenças e mudanças para bases de crenças. Nesse trabalho, propomos uma nova operação de pseudo-contração, estudamos suas propriedades e a caracterizamos. Também encontramos conexões entre esse operador e algumas outras pseudo-contrações.
APA, Harvard, Vancouver, ISO, and other styles
25

Regis, Ávila Fátima Itzel. "Hiperespacios y Continuos Pseudo-contráctiles." Tesis de Licenciatura, UNIVERSIDAD AUTÓNOMA DEL ESTADO DE MÉXICO, 2019. http://hdl.handle.net/20.500.11799/104721.

Full text
Abstract:
Se hace un estudio de la contractibilidad y pseudo-contractibilidad principalmente en hiperespacios de continuos, con ayuda de los conceptos de "contráctil en" y "contráctil con respecto a"
UAEMex. proyecto: Un estudio sobre ‘’contractibilidad con respecto a’’ y ‘’Contractibilidad en’’. Clave de registro: 4743/2019CIB
APA, Harvard, Vancouver, ISO, and other styles
26

Gasca, Rivera Miguel Ángel. "Pseudo-contractibilidad en espacios topológicos." Tesis de Licenciatura, Universidad Autónoma del Estado de México, 2021. http://hdl.handle.net/20.500.11799/111860.

Full text
Abstract:
Sean X y Y espacios topológicos y f, g : X → Y funciones continuas. Diremos que f es pseudo-homotópica a g si existen un continuo C, dos puntos a, b ∈ C y una función continua H : X × C → Y tales que H(x, a) = f(x) y H(x, b) = g(x) para cada x ∈ X. La función H es llamada una pseudo-homotopía entre f y g y el continuo C es llamado espacio factor. Un espacio topológico X se dice ser pseudo-contráctil si la función identidad id_X es pseudo-homotópica a una función constante en X. Claramente estos conceptos generalizan a los conceptos de homotopía y contractibilidad, respectivamente. De estos últimos existen una gran variedad de resultados y artículos relacionados con el tema. R. H. Bing introdujo la noción de pseudo-contractibilidad; sin embargo, fue W. Kuperberg el primer matemático que probó que las nociones de pseudo-contractibilidad y contractibilidad son diferentes. Por la naturaleza del ejemplo que él dió, el cual, en apariencia es más complejo de escribir y similar a la curva del topólogo sen (1/x) , él preguntó lo siguiente: ¿Será la curva del topólogo pseudo-contráctil? En esta línea, H. Katsuura probó que la curva del topólogo no es pseudo-contráctil con espacio factor él mismo. De igual forma probó que si Y es un continuo indescomponible no degenerado tal que cada una de sus composantes es arco-conexa y X es un continuo que tiene arco-componentes densas, entonces X no es pseudo-contráctil con espacio factor Y . Otras preguntas relacionadas con el tema son las siguientes: Pregunta 1. ¿Es la curva del topólogo pseudo-contráctil con espacio factor el pseudoarco? Pregunta 2. ¿Es el pseudoarco pseudo-contráctil con espacio factor el pseudoarco? W. Debski demostró que la curva del topólogo no es pseudo-contráctil. Por otra parte, M. Sobolewsky mostró que el único continuo encadenable pseudo-contráctil es el arco, con esto se responde negativamente a la pregunta 2, pues como se sabe el pseudo-arco es un continuo encadenable. Actualmente se probó que en hiperespacios como 2^X, y C(X), entre otros, los conceptos de pseudo-contractibilidad y contractibilidad coinciden. Realmente esto es parte deun problema general, a saber: determinar en que tipo de espacios topológicos los conceptos de pseudo-contractibilidad y contractibilidad coinciden.
6234/2020CIB Hiperespacios g-growth, pseudo-contractibilidad vs conexidad del espacio de funciones C(X,Y)
APA, Harvard, Vancouver, ISO, and other styles
27

Alnor, Harald. "Statistically robust Pseudo Linear Identification." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/44697.

Full text
Abstract:

It is common to assume that the noise disturbing measuring devices is of a Gaussian nature. But this assumption is not always fulfilled. A few examples are the cases where the measurement device fails periodically, the data transmission from device to microprocessor fails or the A/D conversion fails. In these cases the noise will no longer be Gaussian distributed, but rather the noise will be a mixture of Gaussian noise and data not related to the physical process. This posses a problem for estimators derived under the Gaussian assumption, in the sense L that these estimators are likely to produce highly biased estimates in a non Gaussian environment.

This thesis devises a way to robustify the Pseudo Linear Identication algorithm (PLID) which is a joint parameter and state estimator of a Kalman filter type. The PLID algorithm is originally derived under a Gaussian noise assumption. The PLID algorithm is made robust by filtering the measurements through a nonlinear odd symmetric function, called the mb function, and let the covariance updating depend on how far away the measurement is from the prediction. In the original PLID the measurements are used unfiltered in the covariance calculation.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
28

Desmaison, Gilles. "Pseudo-prolactinome et hypothyroi͏̈die primaire." Bordeaux 2, 1989. http://www.theses.fr/1989BOR25257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

GABORIT, AGNES. "Pseudo-kystes hemorragiques surrenaliens unilateraux." Nantes, 1992. http://www.theses.fr/1992NANT083M.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hérau, Frédéric. "Operateurs pseudo-differentiels semi-bornes." Rennes 1, 1999. http://www.theses.fr/1999REN10101.

Full text
Abstract:
Nous etudions les relations entre la positivite du symbole a et celle de l'operateur pseudo-differentiel associe a(x, d), dans l'esprit du principe d'incertitude. On etablit dans un premier temps une inegalite a priori en dimension 1 d'espace, qui nous permet d'obtenir une inegalite du type fefferman-phong en dimension 2 avec un gain de 2 - derivees. On introduit pour cela une quantite associee a la moyene du symbole sur des boites symplectiques. Ces deux resultats utilisent une microlocalisation de niveau iii, et peuvent etre consideres comme une illustration du sak principle de fefferman. On etudie ensuite une inegalite de melin-hormander (gain de 6/5 derivees) sous une hypothese plus faible de regularite du symbole. En particulier on suppose seulement que la derivee 3-ieme du symbole appartienne a une classe recente de symboles introduite par sjostrand. Enfin on etablit une inegalite de garding a bord (gain de 1 derivee). On considere des symboles positifs seulement sur un demi-espace, et satisfaisant par ailleurs une legere hypothese de degenerescence conormale.
APA, Harvard, Vancouver, ISO, and other styles
31

Mezher, Dany. "Calcul parallèle de pseudo-spectres." Rennes 1, 2001. http://www.theses.fr/2001REN10054.

Full text
Abstract:
Nous présentons un nouvel outil pour le calcul parallèle des pseudo-spectres. L'outil proposé utilise un algorithme de suivi de lignes de niveau pour tracer la limite du pseudo-spectre. L'algorithme est parfaitement fiable et peut traverser les singularités de la ligne sans difficultés. Il offre une garantie de terminaison même en présence d'erreurs d'arrondi et présente une grande granularité pour le parallélisme permettant d'atteindre de bonnes accélérations. Notre outil est capable de tracer plusieurs lignes de niveau indépendamment et peut segmenter une même ligne de niveau en un ensemble de tranches calculées simultanément, ce qui augmente l'accélération et améliore l'efficacité. L'utilisateur utilise une interface graphique conviviale pour piloter l'application ; cette interface intègre toutes les fonctionnalités graphiques et de contrôle cruciales pour apprécier l'information offerte par le pseudo-spectre. L'application a été développée pour le problème du calcul de pseudo-spectres mais peut servir, moyennant de faibles modifications, pour tracer les lignes de niveau de toute fonction continue f(z) : C -> R.
APA, Harvard, Vancouver, ISO, and other styles
32

Bechata, Abdellah. "Analyse pseudo-différentielle þ-adique." Reims, 2001. http://www.theses.fr/2001REIMS033.

Full text
Abstract:
On développe ici l'analyse pseudodifférentielle des opérateurs agissant sur les fonctions à valeurs complexes sur kn̂, où k est un corps non archimédien. Cette étude met en jeu, pour commencer, une généralisation au cas þ-adique des méthodes obligatoires (calcul de Weyl, représentation d'Heisenberg) ou souhaitables (utilisation de familles d'états cohérents et caractérisation des classes d'opérateurs par leur action sur ces états) de l'analyse pseudodifférentielle. On en déduit une caractérisation "à la Beals" de classes d'opérateurs, ainsi qu'un calcul fonctionnel des opérateurs de poids un. L'absence d'opérateurs de dérivation interdit bien sûr tout développement "à la Moyal" de la omposition de deux symboles : mais, utilisant la théorie des caractères multiplicatifs de kx̂, on donne une formule de composition reliant la décomposition en termes "homogènes" d'un produit ƒ1#ƒ2 aux décompositions de cette espèce de ƒ1 et ƒ2.
APA, Harvard, Vancouver, ISO, and other styles
33

BATICLE, SABRINA. "Carcinose peritoneale primitive pseudo-ovarienne." Amiens, 1991. http://www.theses.fr/1991AMIEM048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Horn, Gavin B. McEliece Robert J. "Iterative decoding and pseudo-codewords /." Diss., Pasadena, Calif. : California Institute of Technology, 1999. http://resolver.caltech.edu/CaltechETD:etd-02062008-130016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Cruz, Quiñones Maria Dolores. "Introduction to pseudo-ordered groups." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Strachan, Campbell. "Pseudo state machine programming language." Thesis, Strachan, Campbell (2017) Pseudo state machine programming language. Honours thesis, Murdoch University, 2017. https://researchrepository.murdoch.edu.au/id/eprint/38694/.

Full text
Abstract:
Programmers today have many tools at their disposal to increases their effectiveness, use of time, code integrity and more. These tools can be anything from the Interactive Development Environments (IDEs) that attempt to fill in code, document particular functions and point out possible errors. Other tools include programming methods or processes that help the developer in constructing and designing their code quicker and to a higher degree of robustness. The main aim of this thesis is to create an additional tool for the students completing the Industrial Computer Systems Engineering course at Murdoch University. This tool is a Pseudo State Machine Programming Language that allows for easy development and use of the State Machine method. Subsequent to this was, the creation of a simulation application for the debugging and development of the language with the intention of it also being used by the students for their project developments. An additional goal was an investigation into the feasibility of the Arduino Uno replacing or being an addition into the ICSE units. In this thesis, the Pseudo State Machine Programming Language was developed by extending the FORTH compiler in SwiftX. It works in the intended way by making the development of simple and complicated state machine comparatively easy. The comparison has been made to an implementation of code that achieves the same end results and factored in the development time and the complexity of reading and understanding the code. The simulation created also provided the help required in completing the language within the timeframe of this project. It is also considered to be adequate for use by students for their project development. After testing the Arduino Uno, it was found that it was not a suitable replacement but may be a valuable addition to the ICSE unit. The Pseudo Language and the Simulator enhance the learning experience by making development of projects easier. The Arduino Uno exposes the students to a different type of microcontroller which increases their knowledge and experiences on the subject.
APA, Harvard, Vancouver, ISO, and other styles
37

Manoel, Rodrigo Garcia. "Teoria e prática: estudo e tradução das epístolas e invectivas de Pseudo-Salústio e Pseudo-Cícero à luz dos Progymnásmata." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/8/8143/tde-28052014-115342/.

Full text
Abstract:
Com a pesquisa busca-se descobrir quão estreita é a relação entre a teoria das prescrições retóricas feitas pelos progymnásmata de Élio Teão, Hermógenes, Aftônio e Nicolau e as produções escritas que nos restaram de alunos na iminência de praticar a oratória a partir do primeiro século d.C. Deste modo, pela análise dos documentos esperase, primeiro, produzir mais informações sobre como se dava o ensino de tal disciplina entre os romanos, a) indentificando os temas de que se serviam os professores, a relevância de tais produções escritas para a aprendizagem de gêneros textuais, os lugarescomuns e os autores que eram modelo a imitar ou evitar e o modo como tal ação se dava por meio das palavras; b) fornecendo tradução da invectiva de (Pseudo-)Cícero e da invectiva e das epístolas a César de (Pseudo-)Salústio.
This research aims to find out how close is the relationship between the theory of rhetorical prescriptions of Aelius Theon, Hermogenes, Aphtonius the Sophist, and Nicolaus the Sophist and remaining texts of students who were about to go on public speaking on first century A.D. Thus, the analysis of such documents is expected to give more information about rhetorical teaching among the Romans: identifying themes that served teachers, the relevance of such written productions for learning text genres, the common places and authors that were model to imitate or avoid and how such action took form through words. At last, there is a translation of the invective by (Pseudo -)Cicero and the invective and the epistles to Caesar by (Pseudo-)Sallust.
APA, Harvard, Vancouver, ISO, and other styles
38

Baya, Abalo. "Contribution à la génération de vecteurs aléatoires et à la cryptographie." Phd thesis, Grenoble 1, 1990. http://tel.archives-ouvertes.fr/tel-00336536.

Full text
Abstract:
Dans le chapitre 1, nous présentons les congruences linéaires simples et les tests de qualité des nombres pseudo-aléatoires (n.p.a.) congruentiels. L'accent est mis sur le test des treillis, le test spectral et le test sériel. Le test sériel est base sur l'estimation de la discrépance des vecteurs de n.p.a. Partant de cette estimation, on introduit une quantité appelée figure de mérite. Celle-ci nous permet de rechercher, pour m et b fixes, des multiplicateurs a tels que deux termes successifs de la suite (a,b,m,x#0) soient statistiquement indépendants. Nous débutons le chapitre 2 par l'étude des longueurs de cycle et du transitoire des suites engendrées par une congruence linéaire multidimensionnelle (c.l.m.). Ensuite, nous décrivons quelques méthodes de transformation de ces suites en suites de n.p.a. Enfin, nous faisons une discussion sur le choix des paramètres d'une c.l.m. Dans le chapitre 3, nous étudions la période d'un générateur vectoriel base sur le modèle de Daykin et une c.l.m. De période maximale, puis nous faisons un aperçu sur les principaux générateurs non linéaires de n.p.a. Le chapitre 4, réservé a la cryptographie, traite du problème du décryptage de l'ordre et du modulo d'une c.l.m
APA, Harvard, Vancouver, ISO, and other styles
39

Catalano, Domenico Antonino. "Concircular diffeomorphisms of pseudo-Riemannian manifolds /." [S.l.] : [s.n.], 1999. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=13064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ambühl, Tobias. "Secure bits with quantum pseudo-telepathy." Zurich : ETH, Swiss Federal Institute of Technology, Department of Computer Science, Institute of Theoretical Computer Science, 2009. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Stadie, Andreas. "Überprüfung stochastischer Modelle mit Pseudo-Residuen." [S.l.] : [s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=967458390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Muck, Markus. "Systèmes multiporteuses à postfixes pseudo aléatoires." Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00002834.

Full text
Abstract:
Dans le contexte de cette thèse, un nouveau schéma de modulation est proposé en introduisant une séquence déterministe pondérée par un scalaire pseudo aléatoire: Pseudo Random Postfix OFDM (PRP-OFDM). Il est proposé de remplacer l'extension cyclique du Cyclic Prefix OFDM (CP-OFDM) classique par un postfixe connu à l'émetteur et au récepteur [1-26]. Grâce à la nature déterministe de cette séquence, le récepteur peut exploiter sa connaissance afin d'estimer la réponse impulsionnelle du canal de propagation par une approche semi-aveugle d'ordre un. Ceci permet d'éviter l'introduction des séquences d'apprentissage ou des symboles pilotes. L'efficacité spectrale du système est donc améliorée par rapport à des architectures classiques comme le CP-OFDM, Zero-Padded OFDM(ZP-OFDM), etc. Par la suite, plusieurs algorithmes sont proposés. Ceux-ci permettent d'effectuer une estimation du canal dans un contexte statique et dans un contexte de mobilité. En delà, la dérivation d'une séquence de postfixe optimisée est présentée. Ensuite, les études sont étendues à un raffinement de la synchronisation temporelle et fréquentielle d'une estimation initiale approximative. Après, une utilisation optimale des codes LDPC (Low Density Parity Check) est discutée dans le contexte de l'OFDM: il est montré comment il faut attribuer des mots de codes LDPC à des porteuses OFDM en prenant en compte une connaissance préalable du canal de propagation à l'émetteur. Le schéma de modulation PRP-OFDM est une de plusieures propositions dans le contexte du projet européen IST-BroadWay [14-20, 29] et plus récemment par IST-WINNER [21-24, 30]: IST-WINNER est un projet IP (Integrated Project) du 6ème framework qui cible l'étude des systèmes candidats pour la prochaine génération de la communication sans file (4ème génération). Concernant l'optimisation des codes LDPC pour une utilisation avec l'OFDM, les résultats de cette thèse ont été présentés a la standardisation de IEEE802.11n; ils sont actuellement en considération pour l'adoption dans la norme [31, 32]. Efin, le dernier chapitre présente les conclusions des travaux de recherche de cette thèse, ainsi que de futurs axes de recherche.
APA, Harvard, Vancouver, ISO, and other styles
43

Boubel, Charles. "Sur l'holonomie des variétés pseudo-riemanniennes." Phd thesis, Université Henri Poincaré - Nancy I, 2000. http://tel.archives-ouvertes.fr/tel-00008842.

Full text
Abstract:
Les trois chapitres, relativement indépendants, de la thèse étudient des variétés pseudo-riemanniennes (variétés munies d'une métrique non-dégénérée mais non définie) dont l'holonomie restreinte est indécomposable mais stabilise des sous-espaces totalement isotropes. Chapitre 1. Une variété riemanienne de courbure de Ricci parallèle est localement (globalement si elle est complète et simplement connexe) un produit de variétés d'Einstein. Cela résulte de la positivité de la métrique et n'est plus vrai dans le cas pseudo-riemannien. Cependant, en utilisant les propriétés classiques de l'holonomie ainsi qu'un travail de Klingenberg de 1954 sur les paires de formes bilinéaires symétriques le chapitre 1 montre un résultat proche : décomposition en produit de variétés d'Einstein et de deux autres types, <> et < pour les paires de formes réflexives, voir pp.96-100 de la thèse. Chapitre 3. Le plus significatif, il construit, sur une certaine classe de variétés pseudo-riemanniennes réductibles, indécomposables sous l'action de leur holonomie restreinte, des coordonnées privilégiées, <> en un sens qu'il précise (th. 1 p. 167). Ces coordonnées sont un outil pour une première compréhension de la géométrie locale, complexe, de ces variétés. Elles permettent en particulier de paramétrer l'espace des germes de métriques lorentziennes correspondant à chacun des quatre types d'holonomie lorentzienne possibles donnés par A. Ikemakhen et L. Bérard Bergery. (voir pp. 204--205 et 211).
APA, Harvard, Vancouver, ISO, and other styles
44

Galstian, Anahit, and Karen Yagdjian. "Exponential function of pseudo-differential operators." Universität Potsdam, 1997. http://opus.kobv.de/ubp/volltexte/2008/2498/.

Full text
Abstract:
The paper is devoted to the construction of the exponential function of a matrix pseudo-differential operator which do not satisfy any of the known theorems (see, Sec.8 Ch.VIII and Sec.2 Ch.XI of [17]). The applications to the construction of the fundamental solution for the Cauchy problem for the hyperbolic operators with the characteristics of variable multiplicity are given, too.
APA, Harvard, Vancouver, ISO, and other styles
45

Fedosov, Boris. "Pseudo-differential operators and deformation quantization." Universität Potsdam, 1999. http://opus.kobv.de/ubp/volltexte/2008/2565/.

Full text
Abstract:
Using the Riemannian connection on a compact manifold X, we show that the algebra of classical pseudo-differential operators on X generates a canonical deformation quantization on the cotangent manifold T*X. The corresponding Abelian connection is calculated explicitly in terms of the of the exponential mapping. We prove also that the index theorem for elliptic operators may be obtained as a consequence of the index theorem for deformation quantization.
APA, Harvard, Vancouver, ISO, and other styles
46

Gélinas, Luc. "L'ontologie chez le Pseudo-Denys l'aréopagite." Thesis, University of Ottawa (Canada), 1999. http://hdl.handle.net/10393/8488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Brillante, Sergio. "Pseudo-Scylax : édition, traduction et commentaire." Thesis, Reims, 2017. http://www.theses.fr/2017REIML003.

Full text
Abstract:
La présente thèse de doctorat offre une nouvelle édition critique, traduite et commentée, du Périple de Pseudo-Scylax (hormis la description du Pont-Euxin). L’œuvre, un périple des côtes méditerranéennes, est transmise par un manuscrit du XIIIe siècle (Paris, BNF, Suppl. gr. 443) et par deux apographes de la Renaissance (München, BSB, gr. 566 e Vaticano, BAV, Pal. gr. 142) qui indiquent comme auteur Scylax de Caryanda, un personnage ayant vécu sous le règne de Darius I (522-486). Cependant différents indices ne permettent pas d’étayer telle datation et, après une longue querelle, les savants partagent aujourd’hui en général l’idée que le 338 av. J.-C. doit plutôt être indiqué comme le terminus post quem. En continuité avec ces études, notre thèse, articulée en trois parties principales (introduction, édition du texte avec traduction et commentaire), a pour but d’offrir une analyse attentive de l’œuvre afin d’apprécier à sa juste valeur le seul périple complet de la Méditerranée que l’antiquité nous ait transmis. La première partie, avec fonction d’introduction, vise à encadrer l’œuvre dans son contexte historico-politique et littéraire. Font suite à l’introduction un long chapitre sur l’histoire du texte, l’édition critique et une traduction du Périple. Enfin, la troisième et dernière partie est occupée par un commentaire dans lequel sont discutés des éléments textuels et historiques qui mettent bien en lumière l’importance et l’actualité de cette œuvre dans la civilisation occidentale
This doctoral thesis offers a new edition, accompanied by a translation and a commentary, of the Periplous of Pseudo-Skylax (with the exception of the description of Black Sea). The text, a periplous of the Mediterranean, survives in a codex unicus (Paris, BNF, Suppl. gr. 443) and in two apographs (München, BSB, gr. 566 e Vaticano, BAV, Pal. gr. 142), that indicates Skylax of Caryanda as his author, a man who lived at the time of Darius I (522-486). However, several textual evidences have demonstrated that the identification of date and author would not be plausible and after a century-long debate, today the critics generally agree that 338 BC should be seen as the terminus post quem. Agreeing with the conclusion of these studies, this thesis, organized in three major sections (introduction, edition with translation, commentary), offers a systematic analysis of the work and aims to value the only and complete ancient periplous of the Mediterranean as the true and sole example of the genre of the time. The introduction aims to put the works in his own historical, political and literary context. Then, after the introduction and a long chapter on the history of the transmission of the works, the critical edition and the translation of the Periplous follow. The third and last section furnishes a rich commentary and analyse the textual and historical aspects of the work in order to show his value and his relevance for the western tradition
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Luqi. "Pseudo-differential operators with rough coefficients." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ30120.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gelinas, Luc. "L'ontologie chez le Pseudo-Denys l'Areopagite." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0014/MQ52094.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Holst, Frederik Klokk. "Separating pseudo-microRNAs from true microRNAs." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23358.

Full text
Abstract:
MicroRNAs are small RNA molecules that regulate gene expression in cells. They are derived from hairpin shaped RNA transcripts, and about 50 \% of microRNA genes are localized in genomic regions that are associated with cancer. There are numerous other natural occurring RNA molecules that also take shape as hairpins. Being able to distinguish between these molecules and real microRNAs is vital to understand the nature of microRNAs.The goal of this thesis has been to construct a classifier that based on existing features is able to predict whether a hairpin shaped RNA molecule is a microRNA or a pseudo-microRNA. In addition the features in use have been analyzed to see which of these features are the most important for Microprocessor processing, and microRNA classification.I present a classifier that is able to distinguish between real and pseudo-microRNAs with high certainty for mus musculus microRNAs. This classifier is based on feature information constructed from the output of another classifier that predicts the Microprocessor cut site of microRNAs. The features used by this classifier have been analyzed using feature elimination. Indications show that there are specific positions within the flanking regions of a microRNA substrate that are important for Drosha recognition of the substrate. Feature analysis has also been performed for the microRNA classifier, and discoveries were made that indicate that microRNAs can be distinguished from other hairpin RNAs by the fact that microRNAs have one clear cut site candidate where the other hairpin shaped RNAs might have many possible candidates. This information will hopefully further assists the search for novel microRNAs, and also to help reanalyze existing microRNAs to verify that they are in fact microRNAs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography