• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 289
  • 36
  • 34
  • 32
  • 31
  • 21
  • 15
  • 8
  • 6
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • Tagged with
  • 572
  • 182
  • 126
  • 91
  • 84
  • 83
  • 66
  • 65
  • 59
  • 57
  • 57
  • 51
  • 47
  • 46
  • 45
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

Late Assyrian Arms and Armour: Art versus Artifact

Barron, Amy E. 04 August 2010 (has links)
The present study was intended as a new approach to the study of the military equipment of the Late Assyrian period which has traditionally relied upon the pictorial representations of the palace reliefs. By examining extant artifacts from the first millennium in their own right, with the reliefs merely serving to contextualize them, a truer understanding of Assyrian arms and armour can be gathered. This is necessary because the artwork only provides us with a filtered view of the real world, the reliefs are as much works of propaganda as of history. The approach taken here is to first examine the existing weapons typologically, and then to evaluate whether such weapon types appear to be accurately represented in contemporary artwork. Textual sources are also used where they can aid in the discussion. Five categories of arms and armour were studied: swords and daggers, spearpoints, shields, armour and helmets. The quality and quantity of the items in these categories varied significantly, providing for a much better representative sample of some items than others. Further questions concerning the possible ritual, rather than military, use of some of the existing artifacts were raised. However, the main conclusions reached were that the reliefs suffer not only from a propagandistic viewpoint which sometimes obscures the reality of Assyrian warfare, but that they also suffer from artistic license and spatial restraints, the difficulties in representing three-dimensional objects in a two-dimensional manner, the possible unfamiliarity of the artists with changing military technology and methods of construction, and finally, our inability to understand artistic short-hand for what were commonplace objects to the contemporary viewer. These have led to misunderstanding both as to the dating and chronological changes in weaponry, and also to the tactics used by the Late Assyrian military. This study of the artifacts themselves reveals a more mundane, utilitarian, and conservative military force which shows both a basic homogeneousness throughout the empire, and the myriad tiny variables of an army on the move drawing weapons and troops from many regions.
242

Kaltinimo ir gynybos procesinis lygiateisiškumas / The procedural equality of prosecution and defence

Michailovskaja, Vitalija 25 June 2014 (has links)
Pagrindinis magistro darbo tikslas – teismų praktikos ir baudžiamojo proceso teisės mokslo analizės pagrindu pateikti kaltinimo ir gynybos procesinio lygiateisiškumo sampratą, pateikti jos turinio elementus ir nustatyti, kaip ir kokių būdu kaltinimo ir gynybos šalių procesinis lygiateisiškumas yra įtvirtintas Lietuvos teisės aktais bei koks yra jo įgyvendinimo mechanizmas ir veiksmingumas. Magistro darbas susideda iš turinio, įžangos, keturių dalių, išvadų, santraukų lietuvių ir anglų kalbomis ir literatūros sąrašo. Pirmoje dalyje baudžiamojo proceso tipų raidos istorijos ir Lietuvos Respublikos Konstitucijos nuostatų analizės pagrindu prieinama prie išvados, kad kaltinimo ir gynybos šalių lygiateisiškumas turi būti pripažintas Lietuvos baudžiamojo proceso požymiu. Antroje dalyje nagrinėjamas konstitucinis asmenų lygiateisiškumo principas ir jo išraiška baudžiamajame procese; nagrinėjamas sąžiningo proceso principas ir šalių procesinių galimybių lygybė – vienas iš sąžiningo proceso pagrindinių reikalavimų. Taip pat analizuojamas doktrininis šalių procesinio lygiateisiškumo supratimas ir pateikiami jo turinio elementai. Trečia dalis skirta ikiteisminio tyrimo reguliavimo analizei siekiant nustatyti, ar kiekvienai iš šalių yra suteikta pakankamai procesinių priemonių tam, kad jos būtų lygios procesine prasme. Ketvirtoje dalyje pateikiamos kelios papildomos gynybos garantijos, kurios turėtų padėti užtikrinti kaltinimo ir gynybos procesinio lygiateisiškumo įgyvendinimą, ir jų... [toliau žr. visą tekstą] / The main aims of the Master's thesis: 1) to analyze case law of the courts and the science of criminal procedure law in order to present concept of the procedural equality of prosecution and defence, 2) to determine its elements, 3) to identify how and in what way such procedural equality is enshrined in the Lithuanian legal acts and what is its implementation mechanism. The Master's thesis consists of the contents, introduction, four main parts, conclusions, summaries in Lithuanian and English languages and source list. In the first part on the bases of historical development of criminal procedure types and the analysis of the Constitution of the Republic of Lithuania it is stated that the procedural equality of prosecution and defense must be recognized as an atribute of modern Lithuanian criminal procedure. The second part consists of the explanation of the constitutional principle of individuals equality and its expression in criminal proceedings. Moreover, in this part the fair trail principle and one of its key requirements – the equality of arms is presented. Then the doctrinal understanding of the procedural equality of the parties and its elements is discussed. The third part is dedicated to the investigation of the prie-trial stage of criminal procedure regulation in order to determine whether each party is given sufficient procedural measures to ensure that they are equal in procedural terms. The fourth section presents a number of additional defence guarantees... [to full text]
243

Can commercial satellite data aid in the detection of covert nuclear weapons programs?

Lance, Jay Logan January 1993 (has links)
This research was conducted to determine the effectiveness of using commercial satellite data to detect covert nuclear weapons programs. Seven-band Landsat Thematic Mapper data covering the Pahute Mesa (an area within the United States Nevada Nuclear Testing Site), acquired on October 16, 1985, were analyzed to determine if underground nuclear test sites were spectrally distinguishable from the surrounding area. The analysis consisted of four steps: (1) analyzing the raw data, (2) manipulating the raw data through contrast stretching, filter application, matrix algebra, and principal components analyses, (3) identifying parameters that affect classification of underground nuclear tests and (4) selectively limiting parameters. The results of limiting parameters showed that a supervised classification of a signature created with a five-original-pixel seed of one representative, known test site provided an accurate classification of most known test sites. To further eliminate erroneous classification of roads and other areas of similar reflectance, these areas were seeded to create a second signature. This signature, whose spectral responses were different, was then used in a simultaneous classification. This classification further eliminated erroneous classification of non-test site areas, demonstrating that commercial satellite digital data can aid in the detection of covert nuclear weapons programs, in this case, underground nuclear testing. An application of the classification scheme used is proposed to confront a scenario in which a country seeks additional verification of another party's proposed violation of test ban treaties. / Department of Physics and Astronomy
244

Runaway stars in the Galactic halo : their origin and kinematics

Silva, Manuel Duarte de Vasconcelos January 2012 (has links)
Star formation in the Milky Way is confined to star-forming regions (OB association, HII regions, and open clusters) in the Galactic plane. It is usually assumed that these regions are found preferably along spiral arms, as is observed in other spiral galaxies. However, young early-type stars are often found at high Galactic latitudes, far away from their birthplaces in the Galactic disc. These stars are called runaway stars, and it is believed that they were ejected from their birth- places early in their lifetimes by one of two mechanisms: ejection from a binary system following the destruction of the massive companion in a supernova type II event (the binary ejection mechanism), or ejection from a dense cluster following a close gravitational encounter between two close binaries (the dynamical ejection mechanism). The aims of our study were: to improve the current understanding of the nature of high Galactic latitude runaway stars, in particular by investigating whether the theoretical ejection mechanisms could explain the more extreme cases; to show the feasibility of using high Galactic latitude stars as tracers of the spiral arms. The main technique used in this investigation was the tracing of stellar orbits back in time, given their present positions and velocities in 3D space. This technique allowed the determination of the ejection velocities, flight times and birthplaces of a sample of runaway stars. In order to obtain reasonable velocity estimates several recent catalogues of proper motion data were used. We found that the evolutionary ages of the vast majority of runaway stars is consistent with the disc ejection scenario. However, we identified three outliers which would need flight times much larger then their estimated ages in order to reach their present positions in the sky. Moreover, the ejection velocity distribution appears to be bimodal, showing evidence for two populations of runaway stars: a “low” velocity population (89 per cent of the sample), with a maximum ejection velocity of about 300 kms−1, and a “high” velocity population, with ejection velo- cities of 400 – 500 kms−1. We argue that the observed bimodality and maximum ejection velocity of 500 kms−1 can be interpreted as a natural consequence of a variation of the binary ejection mechanism. A possible connection between the “high” velocity population and the so-called hypervelocity stars is also explored, resulting in the conclusion that some stars previously identified as hypervelocity may be in fact runaway stars. The feasibility of using stars as tracers of the spiral arms was tested on a local sample, in order to obtain better quality data and larger numbers. We found that the spiral arms pattern speeds estimated from this sample (24.9±5.2 kms−1 kpc−1) and from a selected sample of runaways (22.8 ± 7.8 kms−1 kpc−1) are consistent within the errors and also consistent with other published estimates. We concluded that our estimates combined with the ones obtained in other studies suggest a value in the range 20 − 25 kms−1 kpc−1 for the pattern speed. Moreover, we concluded that an adequate representation of the spiral arms is obtained given the former pattern speed estimate, even when applied to the sample of runaway stars.
245

Le régime des armes légères : approche juridique d'un facteur majeur d'insécurité humaine

Raoui, Sarah 27 January 2011 (has links)
La plupart des conflits aujourd'hui sont menés essentiellement avec des armes légères et de petit calibre. Celles-ci sont les armes privilégiées dans les guerres civiles, le crime organisé et les guerres de gang. L'examen des divers aspects de la question des armes légères met l'accent sur l'incidence négative que ces armes ont sur la sécurité humaine, les droits de l'homme et le développement social et économique, en particulier dans les situations de crise, de conflit et d'après conflit. Lutter contre la prolifération des armes légères exige d'agir sur l'offre et la demande en armements, de se préoccuper des stocks d'armes existants et des flux du commerce des armes, tant au niveau des trafics illicites que de celui des ventes légales. Par ailleurs, la problématique des armes légères doit à la fois être abordée de manière spécifique en fonction des caractéristiques particulières de ce type d'arme, mais aussi être incluse dans la question des stocks et des ventes d'armes conventionnelles en général. Grâce à la volonté de quelques Etats et à la mobilisation de la société civile, une réelle dynamique internationale est née il y a quelques années et devrait aboutir à l’adoption d’un Traité sur le Commerce des Armes en 2012. / Most conflicts today are held essentially with small arms and light weapons. They are the weapons of choice in civil wars, organized crime and gang wars. The consideration of the various aspects of the question of light weapons emphasizes the negative incidence that these weapons have on human security, human rights and social and economic development, in particular in situations of crisis, conflict and post-conflict.Fighting against the proliferation of small arms and light weapons requires to act on the supply and demand in armaments, to control existing stocks of weapons and their flow, both at the level of the illicit traffics and legal sales. Besides, the problem of SALW proliferation must be approached in a specific way according to the particular characteristics of this type of weapon, but they should also be included in the control of conventional arms sales in general.Thanks to the will of some States and to the mobilization of the civil society, a real international dynamic was born a few years ago and should lead to the adoption of an Arms Trade Treaty in 2012.
246

Planification de mouvements et manipulation d'objets par des torses humanoïdes / Motions planning and objects manipulation with humanoid torsos

Gharbi, Mokhtar 08 November 2010 (has links)
L’apparition de robots de service de plus en plus complexes ouvre de nouvelles perspectives quant aux tâches de manipulation d’objets. Malgré les progrès récents des techniques de planification de mouvement, peu d'entre elles s'intéressent directement à des systèmes multi-bras comme les torses humanoïdes. Notre contribution à travers cette thèse porte sur trois aspects. Nous proposons une technique de planification de mouvement performante basée sur la coordination des mouvements du système multi-bras. Elle exploite au mieux la structure du système en la divisant en parties élémentaires dont les mouvements sont planifiés indépendamment du reste du système. La fusion des différents réseaux élémentaires générés est ensuite réalisée dans le but d’obtenir un graphe prenant en compte le robot tout entier. Une seconde contribution porte sur l'extension des méthodes de planification pour des robots présentant des chaînes cinématiques fermées. Ces boucles cinématiques apparaissent dans le système lorsque, par exemple, le torse humanoïde saisit un objet avec plusieurs bras. Cette méthode traite explicitement les configurations singulières des manipulateurs, offrant ainsi une meilleure maniabilité de l’objet. Finalement, nous proposons deux approches pour la planification de tâches de manipulation d'objets par un torse humanoïde. La première concerne la résolution d’une tâche de prise et pose d'objets par un torse humanoïde à deux bras dans le cas où les contraintes imposées par la tâche nécessitent le passage par une double prise afin de transférer l'objet d'une main à l'autre. La seconde porte sur la résolution du même type de tâche par un manipulateur mobile. La thèse, effectuée dans le cadre du projet européen Phriends, présente les résultats d'expérimentations réalisées sur le robot Justin, démonstrateur du projet. / The emergence of new more and more complex service robots opens new research fields on objet manipulation. Despite the recent progresses in motion planning techniques, few of them deal directly with multi-arm systems like humanoid torsos. Our contribution through this thesis focuses on three aspects. We present an efficient motion planning technique based on the multi-arm system motion coordination. It takes advantage of the system's structure by dividing it into elementary parts of which movements are planned independently of the rest of the system. Generated elementary networks are then fused to obtain a roadmap that takes into account the whole robot. The second contribution consists of the extension of motion planning methods for a robot under loop closure constraints. These kinematic loops appear in the system when, for example, the humanoid torso grasps an objet with two arms. This method treats explicitly the singular configurations of the manipulators, providing better handling of the object. Finally, we present two approaches for planning object manipulation tasks by humanoid torsos. The first concerns solving pick and place task by humanoid torso where the imposed task constraints require a passage through a double grasp to transfer the object from one hand to the other. The second approach concerns the resolution of the same type of task by a mobile manipulator. The presented methods have been integrated on a real platform, Justin, and validated with experiments in the frame of E.U. FP-6 PHRIENDS project.
247

The Frontiers of Technology in Warhead Verification

Toivanen, Henrietta N 01 January 2017 (has links)
How might new technical verification capabilities enhance the prospects of success in future nuclear arms control negotiations? Both theory and evidence suggest that verification technologies can influence the dynamics of arms control negotiations by shaping and constraining the arguments and strategies that are available to the involved stakeholders. In the future, new technologies may help transcend the specific verification challenge of high-security warhead authentication, which is a verification capability needed in future disarmament scenarios that address fewer warheads, limit new categories of warheads, and involve nuclear weapons states other than the United States and Russia. Under these circumstances, the core challenge is maintaining the confidentiality of the classified information related to the warheads under inspection, while providing transparency in the verification process. This analysis focuses on a set of emerging warhead authentication approaches that rely on the cryptographic concept of zero-knowledge proofs and intend to solve the paradox between secrecy and transparency, making deeper reductions in warhead arsenals possible and thus facilitating future nuclear arms control negotiations.
248

Mathematical Methods for Enhanced Information Security in Treaty Verification

MacGahan, Christopher, MacGahan, Christopher January 2016 (has links)
Mathematical methods have been developed to perform arms-control-treaty verification tasks for enhanced information security. The purpose of these methods is to verify and classify inspected items while shielding the monitoring party from confidential aspects of the objects that the host country does not wish to reveal. Advanced medical-imaging methods used for detection and classification tasks have been adapted for list-mode processing, useful for discriminating projection data without aggregating sensitive information. These models make decisions off of varying amounts of stored information, and their task performance scales with that information. Development has focused on the Bayesian ideal observer, which assumes com- plete probabilistic knowledge of the detector data, and Hotelling observer, which assumes a multivariate Gaussian distribution on the detector data. The models can effectively discriminate sources in the presence of nuisance parameters. The chan- nelized Hotelling observer has proven particularly useful in that quality performance can be achieved while reducing the size of the projection data set. The inclusion of additional penalty terms into the channelizing-matrix optimization offers a great benefit for treaty-verification tasks. Penalty terms can be used to generate non- sensitive channels or to penalize the model's ability to discriminate objects based on confidential information. The end result is a mathematical model that could be shared openly with the monitor. Similarly, observers based on the likelihood probabilities have been developed to perform null-hypothesis tasks. To test these models, neutron and gamma-ray data was simulated with the GEANT4 toolkit. Tasks were performed on various uranium and plutonium in- spection objects. A fast-neutron coded-aperture detector was simulated to image the particles.
249

Chemical control : exploring mechanisms for the regulation of riot control agents, incapacitants and related means of delivery

Crowley, Michael John Anthony January 2012 (has links)
A holistic arms control (HAC) analytical framework was employed to explore the full range of mechanisms that could potentially be utilised to effectively regulate the development, stockpiling, transfer or use of riot control agents (RCAs), incapacitants and related means of delivery. From this analysis it is clear that the Chemical Weapons Convention (CWC) and its attendant regime are the most appropriate and probably the most receptive mechanisms, at least in the short term, for the discussion of these concerns and the development of appropriate policy responses. However, the response of CWC States Parties to these issues is by no means certain and parallel processes should be established to explore alternative regulatory mechanisms with the Biological and Toxin Weapons Convention, UN drugs conventions, international and regional human rights instruments, international humanitarian law, and transfer controls potentially yielding positive results in the next five to ten year period. Other regimes that may well prove important in the longer term include: the international criminal court and other international criminal law entities; the UN Secretary General's investigation mechanism and other ad hoc UN investigatory mechanisms. A comprehensive HAC strategy for the regulation of RCAs, incapacitants and related means of delivery will also require active involvement of informed and activist civil society in societal verification; development and promotion of norms prohibiting the involvement of scientific and medical communities in weaponisation programmes intended for malign application; and far greater active engagement of such expert communities in relevant State and international policy development processes.
250

Étude du polymorphisme des gènes TAP : TAP1 et TAP2, en relation avec la susceptibilité au VIH chez les africains

Lajoie, Julie January 2003 (has links)
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.

Page generated in 0.0165 seconds