Tesis sobre el tema "Kew"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Kew.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Kew".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Scaramuzza, Filho Mauro. "Kew Gardens, de Virginia Woolf". reponame:Repositório Institucional da UFPR, 2009. http://hdl.handle.net/1884/20251.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Staveley, Alice Elizabeth. "Reconfiguring 'Kew Gardens' : Virginia Woolf's 'Monday or Tuesday' years". Thesis, University of Oxford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365488.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Clifford, Sean C. "Breeding systems in Oncidium and related genera (Orchidaceae)". Thesis, University of Reading, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.305083.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Day, Cheryl. "Magnificence, misery and madness : a history of the Kew Asylum 1872-1915 /". Connect to thesis, 1998. http://repository.unimelb.edu.au/10187/2443.

Texto completo
Resumen
The Kew Asylum has been a dominant feature of Melbourne’s built environment for over 100 years. In addition to the visual impact it has made on Melbourne’s skyline it has been very much a part of the psychological landscape of the collective imagination of the city’s inhabitants. Despite this, comparatively little has been written about its impact on society, and almost nothing has been recorded in any comprehensive sense, about its occupants or inmates. This dissertation aims to go some way towards redressing this, not with a broad sweep institutional biography, but with an intimate portrait of the asylum’s earliest days. Covering a time frame of less than 50 years, this thesis adopts a multi-theoretical approach in order to illuminate the different facets of asylum life with the maximum clarity. The thesis contains several themes, some of which overlap and interweave in order to examine the complexity of institutional life.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kew, Chun [Verfasser] y Adam [Gutachter] Antebi. "Control of Innate Immunity by RNA Metabolism / Chun Kew ; Gutachter: Adam Antebi". Köln : Universitäts- und Stadtbibliothek Köln, 2018. http://d-nb.info/1180601556/34.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Scaramuzza, Filho Mauro. "Evocação poético-visual na literatura performática de Virginia Woolf, em Mrs. Dalloway e Kew Gardens". reponame:Repositório Institucional da UFPR, 2017. http://hdl.handle.net/1884/47958.

Texto completo
Resumen
Orientadora : Profa. Dra. Célia Arns de Miranda
Tese (doutorado) - Universidade Federal do Paraná, Setor de Ciências Humanas, Programa de Pós-Graduação em Letras. Defesa: Curitiba, 30/03/2017
Inclui referências : f.210-227
Área de concentração : Estudos Literários
Resumo: A tese discute a escrita literária performática de Virginia Woolf (1882-1941) em Mrs. Dalloway (1925) e Kew Gardens (1919). Focaliza a presença da transgressão como vocalização e fragmentação verbo-visual na narrativa woolfiana. A prosa lírica de Woolf proporciona identificar a disposição de letras, palavras e sentenças arranjados como peças de um jogo poético-visual que desarticula a linguagem convencional. Esses segmentos instigam a percepção do leitor-espectador, desafiando-o a uma performance no ato de sua decodificação ou da tentativa de efetuá-la. No esfacelamento das estruturas linguísticas, presentes na ficção da escritora e das formas de transposição de contextos, argumentamos em favor de sua associação com os conceitos da literatura e da pintura. De modo análogo ao Cubismo, a prosa woolfiana apresenta a sobreposição de planos e o recurso técnico da colagem que contempla a desarticulação da linguagem verbal como reflexão a respeito do cotidiano. As relações intertextuais presentes na prosa de Virginia Woolf incorporam um complexo sistema de referências e dialogam tanto com a obra de William Shakespeare quanto com a linguagem de propaganda e com as referências vertidas da pintura cubista. Dentro dessa visão, propomos uma leitura das relações entre as artes literárias e pictóricas. Esse fenômeno entre mídias ocorre em um momento em que literatura e pintura sugerem uma provocação ao leitor-espectador, a partir de um influxo de transgressão dos seus valores estéticos convencionais, que evocam os textos impressos e a tipografia. Para o substrato teórico, a tese assenta-se sobre a visão de intertextualidade segundo Julia Kristeva, Roland Barthes e Gérard Genette; os estudos de intermidialidade, conforme Irina Rajewsky e Claus Clüver e os postulados sobre a performance literária, de Paul Zumthor. PALAVRAS-CHAVE: Virginia Woolf. Cubismo. Performance literária. Intertextualidade. Intermidialidade.
Abstract: The dissertation discusses the literary performative writing of Virginia Woolf (1882-1941) in Mrs. Dalloway (1925) and Kew Gardens (1919). It focalizes the presence of transgression as vocalization and verbal and visual fragmentation in woolfian narrative. Woolf's lyrical prose offers the identification of the letters arrangement, the words and sentences with the pieces organized as the elements of a poetic and visual game that disarticulate the conventional language. These segments instigate the reader/espectator's perception, challenging him to a performance in the act of its decodification or its try to conclusion. In the slicing of linguistic structures, and the transsection of contexts, present in the writer's fiction, we argument in favor of its association with the concepts of literature and painting. In an analogous way to Cubism, the woolfian prose presents the juxtaposition of plans and the technique source of collage, which contemplates the disarticulation of the verbal language as a reflexion about the trivial. The intertextual relations present in Virginia Woolf's prose incorporates an intricate complex of references and dialog with William Shakespeare's production, and also in relation to the publicity's language, and from the cubist painting's references in literature. According to this view, we propose a reading interpretation of the literary arts and painting. This phaenomenon occurs in a moment in which both media suggest a provocative challenge to the reader/espectator, after an influxus of transgression in its conventional aesthetic values that evokes the press texts and letterpressing. As the theoretical embasement, the argumentation rests over Julia Kristeva's, Roland Barthes' and Gérard Genette's view of intertextuality; Irina Rajewsky's and Claus Clüver's intermedia studies, and the literary performance concepts of Paul Zumthor. KEYWORDS: Virginia Woolf. Cubism. Literary performance. Intertextuality. Intermediality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Macdonald, Lee Todd. "From King's Instrument Repository to National Physical Laboratory : Kew Observatory, physics and the Victorian world, 1840-1900". Thesis, University of Leeds, 2015. http://etheses.whiterose.ac.uk/11346/.

Texto completo
Resumen
This thesis attempts to fill a notable gap in the literature on nineteenth-century science, by writing the history of Kew Observatory between 1840 and 1900 as an institution. I frame this institutional history within three overall questions:- 1) What can the history of Kew Observatory tell us about how the physical sciences were organised in the Victorian era? 2) How did the ‘observatory sciences’ (defined by historian David Aubin as sciences practised within the observatory, of which astronomy is just one) at Kew develop over the course of the nineteenth century? 3) How did standardisation develop at Kew in the context of the culture of the physical sciences between 1840 and 1900? I demonstrate that throughout the period 1840-1900, the organisation of science at Kew was thoroughly a part of Victorian laissez-faire ideology. Indeed, laissez-faire dictated the emphasis of the work at Kew later in the century, as the observatory was forced to concentrate on lucrative standardisation services. I show that until the 1871 transfer of Kew from the British Association for the Advancement of Science to the Royal Society, the work at Kew expanded to include several observatory sciences, but that after 1871 Kew became a specialist organisation that concentrated principally on just one of these: standardisation. I show that Kew did not simply reflect contemporary trends in the observatory sciences but that it actually helped to set these trends. Finally, I show that as early as the 1850s, the standardisation work at Kew was an essential service to the London instrument trade, private individuals and government departments. I use this, plus archival evidence, to argue that the National Physical Laboratory evolved as an extension of Kew Observatory. I thus argue that the origins of the NPL in Kew Observatory represent one of the last triumphs of laissez-faire.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Corrado, Amanda Roberta 1983. "Historiografia de espécies da família urticaceae coletadas no Brasil e depositadas nos herbários de Kew, New York e Paris /". Botucatu, 2014. http://hdl.handle.net/11449/127562.

Texto completo
Resumen
Orientador: Lin Chau Ming
Banca: Maria Franco Trindade Medeiros
Banca: Maria Christina de Mello Amorozo
Resumo: A exsicata é um documento misto, onde a planta fixada representa a evidência biológica e os registros do rótulo, as evidências textuais. A evidência biológica da exsicata é a base do estudo da taxonomia e sistemática que normalmente utiliza-se da observação e comparação da planta fixada para revisão e atualização da nomenclatura. Como fonte documental, as séries de exsicatas foram estudadas neste trabalho com foco nas evidências textuais. Através da revisita, resgate e sistematização dos registros. Buscou-se reunir informações sobre: (1) nome comum das plantas; (2) uso, (3) percepções da relação humano-natural e (4) aspectos histórico das coleções analisadas. O estudo abordou as séries de exsicatas da família Urticaceae depositadas em de três instituições estrangeiras: (1) Royal Botanic Gardens (K), Kew, Inglaterra; (2) Muséum National d'Histoire Naturelle (P), Paris, França, que participam do Projeto REFLORA; (3) New York Botanical Garden (NY), Estados Unidos, juntamente com fontes impressas e manuscritos. Foram analisadas ao todo 2644 exsicatas, 707 de K, 542 de P e 1395 de NY, e oito obras históricas. Na análise dos dados, 50 espécies de Urticaceae apresentaram registro de nomes populares, com destaque para o gênero Cecropia. Trinta e cinco exsicatas apresentaram a indicação de uso das espécies coletadas categorizados em: (1) medicinal; (2) alimentação humana; (3) alimentação aninal; (4) fibra e (5) energia. As espécies com registro de uso foram: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. A descrição dos aspectos históricos da formação das coleções biológicas e dos ...
Abstract: Exsiccates forms a mixed document, in which the fixed plant represents the biological evidence and the registers of the label, the textual evidence. The biological evidence of the exsiccata is the basis for the study of the taxonomy and systematic which normally uses the observation and comparison of the fixed plant for the review and updating of the nomenclature. As a documental source, the series of exsiccates have been studied in this work with focus on the textual evidence. Through the revisiting, recovery and systematization of registers, information was gathered on: (1) common name of the plants; (2) usage, (3) perception on the relation human-natural and (4) historical aspects of the collection analyzed. The study has approached the series of exsiccates of the family deposited in three foreign institutions: (1) Royal Botanic Gardens (K), Kew, England; (2) Muséum National d'Histoire Naturelle (P), Paris, France, which have participated in the Project REFLORA; (3) New York Botanical Garden (NY), United States, together with printed sources and manuscripts. A total of 2644 exsiccates, have been analyzed, 707 from K, 542 from P and 1395 from NY, and eight historical works. With the analysis of the data, 50 species of the family Urticaceae presented registers of popular names, of which the genre Cecropia outstands. Thirty-five exsicatas presented indication of use of the species collected categorized in (1) medicinal; (2) human food; (3) animal food; (4) fiber and (5) energy. The species with register of use were: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. The description of the historical aspects of formation of the ...
Mestre
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Corrado, Amanda Roberta [UNESP]. "Historiografia de espécies da família urticaceae coletadas no Brasil e depositadas nos herbários de Kew, New York e Paris". Universidade Estadual Paulista (UNESP), 2014. http://hdl.handle.net/11449/127562.

Texto completo
Resumen
Made available in DSpace on 2015-09-17T15:24:14Z (GMT). No. of bitstreams: 0 Previous issue date: 2014-02-07. Added 1 bitstream(s) on 2015-09-17T15:48:09Z : No. of bitstreams: 1 000846924.pdf: 2362392 bytes, checksum: fb68da9704e107bd12fc3b897ddbc8cf (MD5)
A exsicata é um documento misto, onde a planta fixada representa a evidência biológica e os registros do rótulo, as evidências textuais. A evidência biológica da exsicata é a base do estudo da taxonomia e sistemática que normalmente utiliza-se da observação e comparação da planta fixada para revisão e atualização da nomenclatura. Como fonte documental, as séries de exsicatas foram estudadas neste trabalho com foco nas evidências textuais. Através da revisita, resgate e sistematização dos registros. Buscou-se reunir informações sobre: (1) nome comum das plantas; (2) uso, (3) percepções da relação humano-natural e (4) aspectos histórico das coleções analisadas. O estudo abordou as séries de exsicatas da família Urticaceae depositadas em de três instituições estrangeiras: (1) Royal Botanic Gardens (K), Kew, Inglaterra; (2) Muséum National d'Histoire Naturelle (P), Paris, França, que participam do Projeto REFLORA; (3) New York Botanical Garden (NY), Estados Unidos, juntamente com fontes impressas e manuscritos. Foram analisadas ao todo 2644 exsicatas, 707 de K, 542 de P e 1395 de NY, e oito obras históricas. Na análise dos dados, 50 espécies de Urticaceae apresentaram registro de nomes populares, com destaque para o gênero Cecropia. Trinta e cinco exsicatas apresentaram a indicação de uso das espécies coletadas categorizados em: (1) medicinal; (2) alimentação humana; (3) alimentação aninal; (4) fibra e (5) energia. As espécies com registro de uso foram: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. A descrição dos aspectos históricos da formação das coleções biológicas e dos ...
Exsiccates forms a mixed document, in which the fixed plant represents the biological evidence and the registers of the label, the textual evidence. The biological evidence of the exsiccata is the basis for the study of the taxonomy and systematic which normally uses the observation and comparison of the fixed plant for the review and updating of the nomenclature. As a documental source, the series of exsiccates have been studied in this work with focus on the textual evidence. Through the revisiting, recovery and systematization of registers, information was gathered on: (1) common name of the plants; (2) usage, (3) perception on the relation human-natural and (4) historical aspects of the collection analyzed. The study has approached the series of exsiccates of the family deposited in three foreign institutions: (1) Royal Botanic Gardens (K), Kew, England; (2) Muséum National d'Histoire Naturelle (P), Paris, France, which have participated in the Project REFLORA; (3) New York Botanical Garden (NY), United States, together with printed sources and manuscripts. A total of 2644 exsiccates, have been analyzed, 707 from K, 542 from P and 1395 from NY, and eight historical works. With the analysis of the data, 50 species of the family Urticaceae presented registers of popular names, of which the genre Cecropia outstands. Thirty-five exsicatas presented indication of use of the species collected categorized in (1) medicinal; (2) human food; (3) animal food; (4) fiber and (5) energy. The species with register of use were: Boehmeria nivea (L.) Gaudich., Cecropia concolor Willd., C. obtusa Trécul, C. pachystachya Trécul, Laportea aestuans (L.) Chew, Pourouma cecropiifolia Mart., P. cucura Standl. & Cuatrec., P. guianensis Aubl., P. minor Benoist, Urera baccifera (L.) Gaudich. ex Wedd., U. caracasana (Jacq.) Gaudich. ex Griseb., U. punu Wedd. The description of the historical aspects of formation of the ...
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Boampong, James Kwadwo. "Solar thermal heating of a glasshouse using phase change material (PCM) thermal storage techniques". Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/12863.

Texto completo
Resumen
The Royal Botanic Gardens (RGB) is used as an umbrella name for the institution that runs Kew and Wakehurst Place gardens in Sussex The RBG has a large number of glasshouses at Kew and Wakehurst sites that consume lots of heating energy which is a major concern and the group is looking for an alternative heating system that will be more efficient and sustainable to save energy, cost and reduce CO2 emissions. Glasshouse due to greenhouse effect trap solar energy in the space with the slightest solar gains but the energy trapped in the space most often is vented through the roof wasted to keep the space temperature to the required level. An environmental measurement was carried out in twenty one zones of the glasshouse to establish the temperature and humidity profiles in the zones for at least three weeks. The investigation established that large amount of heat energy is vented to the atmosphere wasted and therefore need a heating system that could absorb and store the waste thermal energy. Phase change material (PCM) thermal energy storage technique was selected to be the best options compared to the others. It has been established that active and passive solar systems could provide enough thermal energy to meet the glasshouse heating requirements. PCM filled heating pipes will be installed to absorb the heat energy trapped in the glasshouse and use it when needed. The research analysis established that 204 MWh of the trapped energy wasted could be saved. The space temperature of the glasshouse could be maintained through melting and freezing of the PCM filled in the heating pipes. The site CHP waste heat could be useful. The research results have shown that nearly zero CO2 emission heating system could be achieved and the project is technically, economically and environmentally viable.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Brennan, E. "Heterogeneous cloth : an ethnography of the coming into being of barkcloth artefacts at the Royal Botanic Gardens, Kew, and amongst the Nuaulu of Nua Nea Village, Maluku, Eastern Indonesia". Thesis, University College London (University of London), 2017. http://discovery.ucl.ac.uk/10037521/.

Texto completo
Resumen
This thesis uses barkcloth artefacts as a methodological point of entry and fieldsite, to explore their material properties. It argues that the material properties of barkcloth artefacts are indexical of social relations, as it moves between contexts; exploring the nature of properties as inherently diverse or diversely exploited, rather than homogenously embedded. The thesis argues that properties are processual, and uses the operational sequence or chaîne opératoire as a route to beginning to unpack the attribution of these qualities. The thesis follows the material through two distinct contexts; beginning with a collection of barkcloth artefacts in the Economic Botany Collection, at the Royal Botanic Gardens, Kew. Here artefacts illustrate the relationship between people and plants through technical process; and are packed within the botanical episteme and a British history of material relations, exploitation and development. From within the collections store, laboratory, and herbarium at Kew, material origins and structure are foregrounded as inherent to material identity. From Kew, research relocates to Maluku in eastern Indonesia; to a region situated historically as foundational in the exploitation of plant ‘resources’ and botanical exploration. Thematically then, the region is congruous with the Kew context. Nuaulu barkcloth artefacts, as explored in Nua Nea village, on Seram island are efficacious in male life-transformation rituals, and clan constitution. Barkcloth properties are generative and contingent. The efficacy of these artefacts is inseparable from the proximal dynamics as managed through their ongoing coming into being: bodily, temporal and territorial. A processual approach to barkcloth artefacts’ material properties across contexts allows access to the nature and diversity of the relationships between humans and non-humans: in this case, with plants, and trees. This is in what plant materials are able to reflect back at us, as transformed living kinds.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Hill, Sandra. "Unsettled: A Collection of Sort Stories". University of the Western Cape, 2013. http://hdl.handle.net/11394/8198.

Texto completo
Resumen
Magister Artium - MA
Harriott is asleep under a jacaranda tree in her daughter's lush Escombe garden. Escombe is no longer part of the Natal Colony, the Natal Colony exists only in the minds of people like Harriott. Escombe, though still in the same place it's always been, is now part of the Union of South Africa. It is the 20th of January 1923. Harriott has lived in the Natal Colony for thirty years exactly. She has been married for only one day less. Dorothy's garden Is wonderful, but according to Harriott, not as wonderful as it could be with a little more effort. Dorothy's bougainvillea are a riot of cerise, peach and white. Her dipladenias climbing the pillars of the front veranda - a profusion of pink. The creamy day Iillies are in full bloom. The lavender is a field of purple and the plumbago hedge, where dragon-like Harriott is asleep under a jacaranda tree in her daughter's lush Escombe garden. The barometer has dropped. Harriott does not notice the thickening of the air, nor the band of dampness spreading along her back. Her chair is covered with blankets and a white sheep fleece. It Is the day-bed of a woman whose own padding has melted away, whose bones are dissolving, whose joints have swollen over. 'It won't be long,' whispers Herbert to his bride as they lie side by side sweltering in the room next to Harriott's, the door ajar so Dorothy can hear her if she calls out. 'I'm afraid, it won't be for very much longer, my dear.' chameleons lurk, is thick with blue ... a cool blue ud at t he bottom of the garden, Dorothy thinks. Boy is hard pressed to kee~~~~~~~~~i_~~~~ go, paw-paw and avocado trees. Harriott pays little heed to t ~ e for her lawns, beds, shrubs, Harriott's book is lying on the grass. It is a very slim volume, the slimmest she owns and the latest addition to her collection, thanks to dear Rose who tracked it down somewhere in London and sent it over. Harriott cannot hold anything heavier than the slimmest of books, nor can she make.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Cattoor, Romain. "Investigation sur des sources lasers émettant à 2 μm utilisant des cristaux monocliniques". Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0212/document.

Texto completo
Resumen
Cette thèse est consacrée à l’étude du potentiel des cristaux biaxes dans le but de réaliser un laser de puissance. Les cristaux biaxes possèdent deux axes optiques ce qui donnent lieu à un effet appelé "réfraction (ou diffraction) conique". Cet effet, connu depuis 1832, est intensé- ment étudié depuis une décennie. Les progrès en croissance et découpe cristalline permettent d’obtenir des échantillons de longueurs et de qualités optiques suffisantes pour observer ce phénomène. L’utilisation de cet effet en cavité laser ayant déjà été réalisée [79, 78], l’objectif de cette thèse fut dans un premier temps de confirmer ces résultats. Ainsi, un système utilisant des cristaux de KGd(WO4)2 (KGW) dopés au Néodyme a été préalablement testé. Ces premiers résultats furent décevants. La stabilité, la qualité de faisceau ainsi que l’efficacité étaient plus que mé- diocres. L’efficacité maximale fut d’environ 40 % contre 74 % dans la publication [77]. Par ailleurs, le faisceau de sortie présentait un profil elliptique indiquant la présence d’une lentille thermique avec un fort astigmatisme. Ainsi, cette orientation, qui devrait être proche d’une direction athermale (ne présentant pas d’astigmatisme d’origine thermique) selon Biswal [10], ne l’est pas dans une cavité laser pour ce cristal. De plus ce laser est très peu stable et difficile à aligner. Les fluctuations importantes de l’efficacité de celui-ci ont abouti à une interrogation quant à la dépendance des propriétés optiques aux alentours de l’axe optique. Ainsi, dans les premiers chapitres de cette thèse, figurent une étude détaillée des principales propriétés optiques d’absorption et d’émission. Les ré- sultats de cette étude montrent que ces propriétés varient non seulement suivant la polarisation mais également suivant l’orientation aux alentours de l’axe optique. Etant donné que l’état de polarisation autour de l’axe optique varie avec l’orientation, les dépendances en orientation et polarisation sont liées. [...] Enfin, un montage innovant a été testé afin d’utiliser la réfraction conique. La puissance de sortie ainsi que l’efficacité de ce montage étaient très faibles, environ 800 mW en sortie pour 4 W de puissance de pompe
This thesis is devoted to the study on the potential of biaxial crystals in order to increase laser output power. Biaxial crystals have two optic axes and an effect called conical refraction (or diffraction) can occur. This effect is known since 1832, and intensively studied since the last decade. Thanks to the progress of crystal growth and crystal cutting, it is possible to have long samples of good optical quality in order to ob serve the conical refraction. This effect has already been used in a laser cavity [79, 78]. The aim of this thesis was to confirm the results previously obtained. Thus, Neodymium-doped KGd(WO4)2 (KGW) crystals, cut along the optic axis, have been tested. These first results were disappointing. Stability, beam quality and efficiency were very low. The maximum efficiency achieved was arount 40% compared to the 74% claimed in publication [77]. Thus, this orientation which should be an athermal direction using the calculation of Biswal [10] shows astigmatism when there is a temperature gradient. Furthermore, this laser being difficult to align with strong intensity fluctuations, rise interrogations about the optical property variations around the optic axis. Thus, in the first Chapters of this thesis a study of those properties around the optic axis is given. It shows a strong variation of the optical properties depending on the polarization and orientation around the optic axis. The study of the refraction along the optic axis helps to understand this complex dependency with the orientation. In a second time, holmium-doped KY(WO4)2 (KYW) crystals have been tested for laser emission at 2 µm. The choice of this ion has been done on several criteria. The first one is that the ISL laboratory is used to work with this wavelength and has a lot of equipment. The second one is that Holmium ions have a small "quantum defect" (pump wavelength 1960 nm and lasing wavelength 2074 nm). This low "quantum defect" limits the dispersion between the pump and lasing wavelengths. This decreases the separation between the optic axes of both wavelengths. Thus, when the pump is aligned for conical refraction the lasing wavelength is also aligned along the optic axis. Thanks to a better setup (with new mechanical parts) the polarization and orientation dependencies of the laser efficiency have been investigated. Up to 3 W of output power with a slope efficiency of 70% has been reached near the optic axis. The doping concentration of the Holmium-doped KY(WO4)2 (KYW) being more appropriated for high power laser, no thermal lens effect has been observed. Furthermore, the first conical refraction laser with a quasi-three-level system has been realized. An efficiency of 50% has been achieved with such a conical refraction laser. Finally, a new innovative setup is proposed using the External Conical Refraction. An output power of 800 mW for 4 W of incident pump power has been reached
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Key, Joey Shapiro. "Characterizing astrophysical sources of gravitational waves". Thesis, Montana State University, 2010. http://etd.lib.montana.edu/etd/2010/key/KeyJ0510.pdf.

Texto completo
Resumen
The Laser Interferometer Space Antenna (LISA) and the Laser Interferometer Gravitational-wave Observatory (LIGO) are designed to detect gravitational waves from a wide range of astrophysical sources. The parameter estimation ability of these detectors can be determined by simulating the response to predicted gravitational wave sources with instrument noise and searching for the signals with sophisticated data analysis methods. A possible source of gravitational waves will be beams of radiation from discontinuities on cosmic length strings. Cosmic strings are predicted to form kinks and cusps that travel along the string at close to the speed of light. These disturbances are radiated away as highly beamed gravitational waves that produce a burst-like pulse as the cone of emission sweeps past an observer. The detection of a gravitational wave signal from a cosmic string cusp would illuminate the fields of string theory, cosmology, and relativity. Gravitational wave sources also include coalescing binary systems of compact objects. Colliding galaxies have central black holes that sink to the center of the merged galaxy and begin to orbit one another and emit gravitational waves. Previous LISA data analysis studies have assumed that binary black hole systems have a circular orbit or an extreme mass ratio. It is ultimately necessary to understand the general case of spinning black hole binary systems in eccentric orbits and how LISA observations can be used to measure the eccentricity of the orbits as well as the masses, spins, and luminosity distances of the black holes. Once LISA is operational, the comparison of observations of eccentric and circular black hole binary sources will constrain theories on galaxy mergers in the early universe.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Путій, М. В. y M. V. Putii. "Адміністративно-правове забезпечення проходження служби у Корпусі оперативно-раптової дії Національної поліції : дисертація". Thesis, Харків, 2020. https://youtu.be/TJm5rCFz-kw.

Texto completo
Resumen
Путій, М. В. Адміністративно-правове забезпечення проходження служби у Корпусі оперативно-раптової дії Національної поліції : дис . ... д-ра філос.: 081, 08 / Микола Володимирович Путій; МВС України, Харків. нац. ун-т внутр. справ. - Харків, 2020. - 256 с.
У дисертації наведено теоретичне узагальнення та нове вирішення наукового завдання, яке полягає у визначенні сутності та розкритті особливостей адміністративно-правового забезпечення проходження служби у Корпусі оперативно-раптової дії Національної поліції та напрямків його вдосконалення з урахуванням вітчизняної практики та зарубіжного досвіду. Визначено поняття та особливості служби в Національній поліції як різновиду державної служби особливого характеру. Виділено види адміністративних процедур проходження служби в КОРД та надано конкретні пропозиції щодо їх удосконалення.
The dissertation provides a theoretical generalization and a new solution to the scientific problem, which consists in defining the essence and disclosing the features of administrative and legal support of service in the Corps of operative-sudden action of the National Police and directions of its improvement taking into account domestic practice and foreign experience. The concept and features of service in the National Police as a kind of civil service of a special nature are defined. The types of administrative procedures for service in KORD are highlighted and specific proposals for their improvement are provided.
В диссертации приведено теоретическое обобщение и новое решение научной задачи, которая заключается в определении сущности и раскрытии особенностей административно-правового обеспечения прохождения службы в Корпусе оперативно-внезапного действия Национальной полиции и направлений его совершенствования с учетом отечественной практики и зарубежного опыта. Определено понятие и особенности службы в Национальной полиции как разновидности государственной службы особого характера. Выделены виды административных процедур прохождения службы в КОРД и предоставлены конкретные предложения по их усовершенствованию.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Williams, Deidre D. "Key management for McEliece public-key cryptosystem". Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/14864.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Holeček, Zdeněk. "Price Convergence between the Czech Republic and the EU-15". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16389.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Paterová, Iveta. "Monetary integration and intensitym of mutual trade empirical evidence". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16392.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Singh, Jagmeet 1980. "Key characteristic coupling and resolving key characteristic conflict". Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/16953.

Texto completo
Resumen
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2003.
Includes bibliographical references (p. 159-166).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Real complex assemblies have to deliver large number of customer requirements. Assemblies in general have many parts which work together to deliver those requirements. The involvement of many parts and presence of many requirements to be delivered, results in the involvement of a part in the delivery chains of more than one requirement. As a result most of the requirements are not delivered independently. Coupling among the requirements makes it hard to achieve all the requirements with in their respective tolerance limits. The thesis gives classification of nature of relationships that can exist among various requirements. It discusses characteristic of each relationship and how it can affect the robustness of an assembly. When the requirements in the assembly are conflicting, i.e. reduction in variation in one of the requirements increases variation in conflicting requirement, it tends to become non-robust. Non-robust assemblies entail high manufacturing costs. Aim of the thesis is to identify the scenarios of conflict in the assembly. Screw theory can be used to find the presence of coupling among requirements in the assembly. It can also be used to identify the nature of coupling. If coupling suggests that requirements are coupled, we analyze the intensity of the conflict. Not all conflicts need to be solved. Only the conflicts that will make assembly miss tolerance limits on its requirements need to be solved. The thesis outlines some of the methods that can be used to either resolve conflict or reduce the amount of conflict in the assembly. Conflicts can be removed from the assembly by making suitable changes in design. Design changes will modify DFCs of the conflicting requirements. Use of appropriate assembly techniques can also remove conflicts from the assembly. An assembly without any conflicts is more robust and can be produced at a less cost as compared to the one having conflicts.
by Jagmeet Singh.
S.M.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Barrera, Reyes Keiko Dallana, Ocampo Christian Castañeda, Arenas Geannel Yani Rosas y Condorena Natalia Andrea Zegarra. "KEY BAG". Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653102.

Texto completo
Resumen
Por mucho tiempo, las bolsas de plástico fueron útiles para muchos consumidores, siendo más fáciles para ellos adquirirlas de manera gratuita en los supermercados, mercados, bodegas y diversos establecimientos. Sin embargo, a partir de la promulgación de la Ley N° 30884, hizo que cada persona sea responsable de portar una bolsa para llevar sus productos o caso contrario podría comprarla en el establecimiento en que se encuentra. Partiendo de esta premisa y analizando las necesidades generadas en el mercado, nace “KEYBAG”, un llavero-bolsa diseñado para aquellas compras que no están planificadas, dando la oportunidad de llevarla siempre con el consumidor. Este llavero armable contiene una bolsa de tela reforzada en su interior con otra tela antifluido, que ayudará a proteger los productos, mantenerlos en orden y reusarla en diversas compras. Nuestro tentador proyecto tiene como periodo 5 años, requiere una inversión inicial de S/ 28,005.53 y con el análisis financiero se determinó que el financiamiento externo sea de S/ 11,202.21 y al periodo total del proyecto. Asimismo, el retorno de la inversión sería al primer año de iniciada las actividades comerciales. Finalmente, guiándonos de la tendencia actual por el consumo responsable se emplearan materiales eco amigables y resistentes, lo que hace que KeyBag sea un producto que genere impacto positivo en el medio ambiente.
For many time, plastic bags had been helpful for the costumers, many of them were got for free in every supermarket and shops. However, Nowadays there is the Law N° 30884, which made every customer have a bag to carry their products, otherwise the customer could buy a bag at the supermarket or shop they are at the moment. That is the moment when our project is born, “KEYBAG”, is a key chain bag which is designed for not planned shopping, it gives you the advantage to have a bag in your key chain, it has a thermic cloth bag which protects your products and the environment, it also allows you to organize your products, and use it to go shopping o buy you products many times. Our tempting project has an estimated time of 5 years, requires an initial investment of S/. 28005.53 and after the financial analysis it determined that the external financing S/ 11,202.21, and to the end of the project. Also, the return of investment would be a year after the commercial activities start. Finally, following the current trend about the responsible consumption we are using eco-friendly and resistant materials, what makes KeyBag a product that generates a positive impact for the environment.
Trabajo de investigación
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Gaunt, Hailey Kathryn. "Who knew". Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1001812.

Texto completo
Resumen
This book of poems ranges in style from narrative to condensed lyric moment, and shifts in perspective from observation to introspection. Thematically, these poems explore everyday life through its many manifestations – memory, nature, marriage, faith and death – with an emphasis on finding meaning in absolutely ordinary things. Though their tone is often vulnerable and tender, even when it is more distant the poems are always searching.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Connell, Rachel. "Knew religion". Thesis, University of Iowa, 2018. https://ir.uiowa.edu/etd/6081.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Wiesmaier, Alexander. "Secure private key management in adaptable public key infrastructures". Berlin mbv, Mensch-und-Buch-Verl, 2008. http://d-nb.info/998075051/04.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Yeung, Hin-Kei. "Chen Yi and Her Choral Music: A Study of the Composer's Ideal of Fusing Chinese Music and Modern Western Choral Traditions". Thesis, connect to online resource. Access restricted to the University of North Texas campus, 2006. http://www.unt.edu/etd/all/Dec2006/Restricted/yeung_hin-kei/index.htm.

Texto completo
Resumen
Thesis (D.M.A.)--University of North Texas, 2006.
System requirements: Adobe Acrobat Reader. Accompanied by 4 recitals, recorded Apr. 22, 2003, Apr. 27, 2003, Oct. 7, 2004, and Oct. 16, 2006. Includes bibliographical references (p. 89-90).
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Jureková, Petra. "Zabezpečení vícesměrové komunikace". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400936.

Texto completo
Resumen
This work deals with the issue of multicast communication, specifically it focuses on group key management. It discusses group key management protocols as well as existing algorithms and algorithm designs for efficient key management and distribution. Based on the knowledge, two solutions were developed. The application for comparing the efficiency of algorithms was created as well. Both existing and proposed schemes were compared using two scenarios. Based on the resulting graphs, the suitability of individual algorithms was evaluated.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kibritov, Ivan. "Mergers and Takeovers in European economies: The Impact on Performance". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16383.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Sonalker, Anuja Anilkumar. "Asymmetric Key Distribution". NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-20020403-040240.

Texto completo
Resumen

ABSTRACT BY Anuja A Sonalker on Asymmetric Key Distribution. (Under the direction of Dr. Gregory T. Byrd) Currently, in Threshold Public Key Systems key shares are generated uniformly and distributed in the same manner to every participant. We propose a new scheme, Asymmetric Key Distribution (AKD), in which one share server is provided with a larger, unequal chunk of the original secret key. Asymmetric Key Distribution is a unique scheme for generating and distributing unequal shares via a Trusted Dealer to all the registered peers in the system such that without the combination of the single compulsory share from the Special Server no transaction can be completed. This application is aimed for circumstances where a single party needs to co-exist within a group of semi-trusted peers, or in a coalition where every entity should have a choice to participate and one of the entities needs to be privileged with more powers. This thesis presents the algorithm and security model for Asymmetric Key Distribution, along with all the assumptions and dependencies within the boundaries of which this algorithm is guaranteed to be secure. Its robustness lies in its simplicity and in its distributed nature. We address all security concerns related to the model including compromised share servers and cryptanalytic attacks. A variation, called the Dual Threshold Scheme, is created to reduce the vulnerability in the algorithm, namely, the compromise of the Special Server and its secret share. In this scheme, a combination of another threshold number of Distributed Special Servers must combine to collectively generate a share equivalent to the Special Server?s share. This flexibility allows us to adjust our threshold scheme for the environment. We describe a Java-based implementation of the AKD algorithm, using Remote Method Invocation (RMI) for communication among share servers. A typical scenario of a Trusted Dealer, a Special Server and a number of Share Servers was created, where timed asymmetric key generation and distribution was carried out after which the servers initiated and carried out certificate signing transactions in the appropriated manner. As an interesting exercise, the share servers were corrupted so that they would try to exclude the Special Server in the transactions and try to form its share themselves, to observe the consequence. All their efforts were futile. Another interesting aspect was the key generation timing. Key generation is known to be a very time-extensive process but the key share reuse concept used in this implementation reduced the time for key generation by 66-90% of the classical key generation time.

Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Sousa, Valter Balegas de. "Key-CRDT stores". Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/7802.

Texto completo
Resumen
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
The Internet has opened opportunities to create world scale services. These systems require highavailability and fault tolerance, while preserving low latency. Replication is a widely adopted technique to provide these properties. Different replication techniques have been proposed through the years, but to support these properties for world scale services it is necessary to trade consistency for availability, fault-tolerance and low latency. In weak consistency models, it is necessary to deal with possible conflicts arising from concurrent updates. We propose the use of conflict free replicated data types (CRDTs) to address this issue. Cloud computing systems support world scale services, often relying on Key-Value stores for storing data. These systems partition and replicate data over multiple nodes, that can be geographically disperse over the network. For handling conflict, these systems either rely on solutions that lose updates (e.g. last-write-wins) or require application to handle concurrent updates. Additionally, these systems provide little support for transactions, a widely used abstraction for data access. In this dissertation, we present the design and implementation of SwiftCloud, a Key-CRDT store that extends a Key-Value store by incorporating CRDTs in the system’s data-model. The system provides automatic conflict resolution relying on properties of CRDTs. We also present a version of SwiftCloud that supports transactions. Unlike traditional transactional systems, transactions never abort due to write/write conflicts, as the system leverages CRDT properties to merge concurrent transactions. For implementing SwiftCloud, we have introduced a set of new techniques, including versioned CRDTs, composition of CRDTs and alternative serialization methods. The evaluation of the system, with both micro-benchmarks and the TPC-W benchmark, shows that SwiftCloud imposes little overhead over a key-value store. Allowing clients to access a datacenter close to them with SwiftCloud, can reduce latency without requiring any complex reconciliation mechanism. The experience of using SwiftCloud has shown that adapting an existing application to use SwiftCloud requires low effort.
Project PTDC/EIA-EIA/108963/2008
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Shoufan, Abdulhadi. "Group Key Management". Phd thesis, [S.l.] : [s.n.], 2007. http://tuprints.ulb.tu-darmstadt.de/814/1/shoufan.pdf.

Texto completo
Resumen
IP multicast is an efficient solution for group communication over the Internet, as both the sender resources and the network bandwidth are relieved with the aid of this emerging technology. However, this superiority suffers, when the group communication must fulfill some security requirements. An essential issue relates to sharing the communication key. Particularly, this key must be updated and securely distributed, every time the group membership changes. This process, which is denoted as group rekeying, raises a scalability problem in large dynamic groups: Rekeying is based on computationally extensive cryptographic operations and on the dissemination of rekeying messages. Thus, the scalability problem presents itself by a computation overhead on both the sender and the receiver sides, and by a communication overhead in the network. Numerous architectures, algorithms, and protocols have been proposed in the literature to cope with this scalability problem. Related work on optimizing rekeying performance mostly concentrates on minimizing the number of required cryptographic operations and thus the length of the rekeying message. An accepted strategy to reduce rekeying costs utilizes batch processing of rekeying requests, which are summed up during a rekeying interval. However, a specification of the maximal length of this rekeying interval is not provided, so far. Too long rekeying intervals cause longer waiting times for new members and longer access times for removed ones. Consequently, a problem of QoS and security is associated with batch rekeying. Because of its novelty and complexity, the work on rekeying optimization lacks a unified way to estimate rekeying performance. In most cases, therefore, an evaluation of different algorithms is impossible. The presented dissertation addresses the above three problems of group rekeying. Firstly, an approach, denoted as Even-Driven Batch Rekeying, is proposed to tackle the QoS and security problems caused by long rekeying intervals in batch rekeying. Secondly, to enable a reliable evaluation of rekeying algorithms, a Rekeying Benchmark is introduced, which provides a unified way to estimate the performance of different rekeying algorithms on the system level. Thirdly, three novel hardware and hardware/software architectures are presented for optimizing the rekeying performance. In contrast to related work, these architectures, denoted as the Real-Time Rekeying Processor, the Batch Rekeying Processor, and the High-Flexibility Rekeying Processor, optimize rekeying not only on the rekeying algorithm level, but also on the cryptography and platform levels.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Dvořák, Dalibor. "Key Account Management". Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-15373.

Texto completo
Resumen
The purpose of the diploma thesis is to identify main activities and responsibilities of key account managers - based on example of Imperial Tobacco CR, s.r.o. company. The theoretical part describes the development of the Czech Retail market from 1989 till 2007. It is focused on international retail chains and it's entrance in the Czech market. Also main trends and possible future development are identified. The practical part provide with detailed characteristics of the Czech tobacco market as well as Imperial Tobacco CR, s.r.o. company - a representative of suppliers. Crucial part is the analysys of activities and responsibilities of Imperial Tobacco's key account managers. The authenticity is guaranteed by real business examples, situations and relationships.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Gonzalez-Nieto, Juan Manuel. "Key recovery systems". Thesis, Queensland University of Technology, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Djamaludin, Christopher I. "Decentralised key management for delay tolerant networks". Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/94983/1/Christopher_Djamaludin_Thesis.pdf.

Texto completo
Resumen
Public key authentication is the verification of the identity-public key binding, and is foundational to the security of any network. The contribution of this thesis has been to provide public key authentication for a decentralised and resource challenged network such as an autonomous Delay Tolerant Network (DTN). It has resulted in the development and evaluation of a combined co-localisation trust system and key distribution scheme evaluated on a realistic large geographic scale mobility model. The thesis also addresses the problem of unplanned key revocation and replacement without any central authority.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Azam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.

Texto completo
Resumen
In recent times the usage of smart phones has significantly increased. Businesses are transforming to make more out of smart phones. As a consequence, there is an increasing demand to have more and more mobile applications. Among other areas, mobile applications are also being used to make financial transactions. Applications used for financial transactions need to be more reliable and have end-to-end security. To implement security we heavily depend on cryptography and the heart of cryptography is the keys which are used in cryptographic processes (encryption/decryption). Therefore, it is essential not only to protect, but also to properly manage these keys, so that a robust and secure system can be achieved. This research work provides a complete implementation of symmetric key management for mobile phone applications with a focus on financial data using a key hierarchy approach. We have developed a key management system which allows smart phones to download the cryptographic key hierarchy. This key hierarchy is used to encrypt and decrypt financial data, such as PIN and other transaction information. Using this application (key management system), we can achieve an end-to-end security between client (mobile phones) and payment server (banking server). This research work presents implementation of key management system for Android OS only.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Motazedian, Tahirih. "To Key or Not to Key| Tonal Design in Film Music". Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584956.

Texto completo
Resumen

Scholars have long been dismissive of the viability of long-range tonal organization in film music. Controversy over questions of authorial intent, aural perception and tonal memory, and the ability of a sound track to function as a cohesive "work" have led scholars to steer dear of (or reject) the concept of tonal design in film. To date, filmic tonal design has been explored by only a few scholars in the context of a few films. Having analyzed over sixty films, my work addresses this lacuna, and establishes a systematic methodology for tonally analyzing film sound tracks. My analyses reveal overarching tonal organization and elaborate networks of harmonic relationships, in which specific keys serve explicit functions within the filmic narrative and structure. In addition to overturning prevalent assumptions about the feasibility of large-scale tonality in film, my findings foster a fascinating new level of engagement between a film's music and narrative, and challenge the sedimented notion that key is an irrelevant parameter in the study of film music.

The following films will be analyzed: The Talented Mr. Ripley (1999), The English Patient (1996), Breaking and Entering (2006), The Grand Budapest Hotel (2014), The Royal Tenenbaume (2001), Fantastic Mr. Fax (2009), Moonrise Kingdom (2012), The Darjeeling Limited (2007), Persuasion (1995), Emma (1996), and Amadeus (1984). i

Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Uslu, Sevgi Koltuksuz Ahmet. "Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library/". [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000618.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Drudiková, Dita. "Inflation Growth Relation". Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-73333.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Davies, Gareth Thomas. "Encryption in the presence of key-dependent messages and related-key attacks". Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.688349.

Texto completo
Resumen
This thesis investigates enhanced adversarial models for encryption, for scenarios where established notions of security are not sufficient to accurately model the capabilities of real-world adversaries. In particular we focus on achieving encryption schemes that are secure even when the adversary has more power than granted by standard notions such as indistinguishability under chosen-plaintext attack (IND-CPA). These extended models allow researchers, implementors and end-users to confidently pinpoint areas of strength and weakness in cryptographic hardware and software. Our first contribution considers key-dependent message (KDM) security, meaning security even when an adversary has access to encryptions of the decryption key. Our focus is the hybrid encryption framework, a method for public key encryption that is widely deployed. We give sufficient conditions for achieving KOM security for this paradigm in the random oracle model using novel proof techniques, and cast known impossibility results in KOM security in the context of hybrid encryption. Next we investigate modelling an adversary that is yet more powerful: related-key-attackand- key-dependent message (RKA-KDM) security considers when an adversary has to access encryptions, performed under related keys, of key-dependent messages. Our main result is a composition theorem showing how to generically achieve RKA-KDM security. To indicate the efficacy of our approach, we present a number of symmetric key instantiations that use known KDM-secure public key encryption schemes as a starting point.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Tvedt, Ole Christian. "Quantum key distribution prototype". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15845.

Texto completo
Resumen
This thesis covers the basics of cryptography, both classical and the newer quantum-basedapproches. Further, it details an implementation of a BB84-based quantum key distributionsystem currently under construction, focusing on the controlling hardware and FPGA-basedsoftware. The overarching goal is to create a system impervious to currently known attackson such systems. The system is currently running at 100 Mbit/s, though the goal is to double this asthe design nears its completion. The system currently chooses encoding base, bit value andwhether a state is a socalled decoy state. However, the modulator for bit encoding is notyet operational. Output for decoy state generation, however, is fully functional. Finally, the thesis describes what steps are necessary to reach a complete BB84-basedquantum key distribution system implementing decoy states.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Leila, Rouatbi. "Maskuliniteter inom visual kei". Thesis, Stockholms universitet, Avdelningen för japanska, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-120400.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Novak, Julia. "Generalised key distribution patterns". Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/f582aac8-df73-28ea-fe2e-80f1c37f5e59/8/.

Texto completo
Resumen
Given a network of users, with certain secure communication requirements, we examine the mathematics that underpins the distribution of the necessary secret information, to enable the secure communications within that network. More precisely, we let f!lJ be a network of users and ~, § be some prede- termined families of subsets of those users. The secret information (keys or subkeys) must be distributed in such a way that for any G E ~, the members of G can communicate securely among themselves without fear of the members of some F E § (that have no users in common with G), colluding together to either eavesdrop on what is being said (and understand the content of the message) or tamper with the message, undetected. , In the case when ~ and § comprise of all the subsets of f!lJ that have some fixed cardinality t and w respectively, we have a well-known and much studied problem. However, in this thesis we remove these rigid cardinality constraints and make ~ and § as unrestricted as possible. This allows for situations where the members of ~ and § are completely irregular, giving a much less well-known and less studied problem. Without any regularity emanating from cardinality constraints, the best approach to the study of these general structures is unclear. It is unreason- able to expect that highly regular objects (such as designs or finite geometries) play any significant role in the analysis of such potentially irregular structures. Thus, we require some new techniques and a more general approach. In this thesis we use methods from set theory and ideas from convex analysis in order to construct these general structures and provide some mathematical insight into their behaviour. Furthermore, we analyse these general structures by ex- ploiting the proof techniques of other authors in new ways, tightening existing inequalities and generalising results from the literature.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Yu, Jiangshan. "Mitigating private key compromise". Thesis, University of Birmingham, 2016. http://etheses.bham.ac.uk//id/eprint/6915/.

Texto completo
Resumen
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. This thesis provides research on how to mitigate private key compromise in three different cases. The first case considers compromised signing keys of certificate authorities in public key infrastructure. To address this problem, we analyse and evaluate existing prominent certificate management systems, and propose a new system called "Distributed and Transparent Key Infrastructure", which is secure even if all service providers collude together. The second case considers the key compromise in secure communication. We develop a simple approach that either guarantees the confidentiality of messages sent to a device even if the device was previously compromised, or allows the user to detect that confidentiality failed. We propose a multi-device messaging protocol that exploits our concept to allow users to detect unauthorised usage of their device keys. The third case considers the key compromise in secret distribution. We develop a self-healing system, which provides a proactive security guarantee: an attacker can learn a secret only if s/he can compromise all servers simultaneously in a short period.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Graham, Marc Miller. "Design is the key". Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43487.

Texto completo
Resumen
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 1997, and Thesis (M.S.)--Massachusetts Institute of Technology, Sloan School of Management, 1997.
Marc Miller Graham.
M.S.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Cotter, Cara E. "Ghosts That We Knew". ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1689.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Woodburn, Diana. "Understanding Key Account Management". Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/understanding-key-account-management(ff717e1b-2f1e-4f38-8a7f-172edf08f97a).html.

Texto completo
Resumen
This document is presented in three parts, i.e. Part 1, ‘The context of ‘Understanding Key Account Management’, positions the portfolio of work in terms of its contribution to knowledge within the literature of Key Account Management and its underlying theories, and relative to alternative research methodologies: Part 2: ‘Understanding Key Account Management’, starting on page 31, gives an account of the author’s research and knowledge development activities in Key Account Management in chronological order, to link together the material submitted as the portfolio of work (listed below). Each part has its own separate list of contents and references. The portfolio of work forms Part 3 of the document, but only the research reports from 2006-2009 are included here: the other reports, articles and books are not available electronically or are published with copyright restrictions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Wolf, Katherine, Nakia J. Woodward y Rick L. Wallace. "Clinical Key: A Review". Digital Commons @ East Tennessee State University, 2013. https://dc.etsu.edu/etsu-works/8678.

Texto completo
Resumen
Elsevier is a leading publisher of medical content, and ClinicalKey is the company's latest endeavor to aggregate multiple resources in one easily searchable interface. ClinicalKey merges medical education with clinically relevant information. This review will provide an overview of the contents, search options, features and limitations of this database.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Dittus, Jami. "I Knew You When". VCU Scholars Compass, 2009. http://scholarscompass.vcu.edu/etd/1818.

Texto completo
Resumen
Four short stories and the first quarter of a novel revolve around characters sick with want, sick of and from the worlds in which they live. They crave connection with other people, often through indirect methods, but can’t always manage the connections they make with other characters. Objects, comforting and static when people cannot be, take prominence as connection to the real world.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Kurt, Yesem. "New key exchange primitives". [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3243768.

Texto completo
Resumen
Thesis (Ph.D.)--Indiana University, Dept. of Mathematics, 2006.
Title from PDF t.p. (viewed Nov. 18, 2008). Source: Dissertation Abstracts International, Volume: 67-12, Section: B, page: 7117. Adviser: Jee-Heub Koh.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Quinn-Bork, Heather Fae. "Desolation is Key: Essays". PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2369.

Texto completo
Resumen
Desolation is Key: Essays is a collection of eight personal essays that revolve around the themes of the redemptive qualities of desolation in nature; the legacy of violence in the family and in the relationship between man and his environment; and the struggle of the speaker to reconcile her adult self to the burdens of inheritance and loss from her childhood. The content is a blending of exterior observation and interior meditation; it straddles the line between narrative journalism and memoir, which allows the narrator both to treat the exterior as an entry point for personal reflection, and to use the personal as a frame to connect with more universal human experience. In addition to thematic connections, the essays share a setting: Southern California, and in particular, the Colorado Desert region in the southeastern corner of the state. Circling back to this desert setting again and again works as a frame for the speaker to contemplate the death of her parents, and her relationship with her father, who died by suicide more than two decades ago. As the essays build upon each other, family lore and personal recollection aggregates and culminates in what eventually becomes a full picture of the situation surrounding the father's death, and the reasons behind its haunting legacy for the speaker.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Poskočil, Jan. "EU Trade Policy in Relation to Central Europe and Its Impact on Local Market: the Case of the Czech Republic". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16384.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Putnářová, Zuzana. "Are the Peripheries Trapped in Their Initial Economic Positions od does Convergence with the Cores Occur? The Case of the Central European Countries/Regions". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16385.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía