• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 418
  • 49
  • 43
  • 27
  • 19
  • 19
  • 8
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 753
  • 226
  • 161
  • 159
  • 154
  • 141
  • 131
  • 89
  • 80
  • 79
  • 76
  • 75
  • 74
  • 72
  • 69
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Modern exchange-rate regimes, stabilisation programmes, and co-ordination of macroeconomic policies : recent experiences of selected developing Latin American economies

Silva, Maria Luiza Falcao January 1997 (has links)
No description available.
12

Preference between predictable and unpredictable administrations of carbon dioxide-enriched air

Lejuez, Carl Wilbourne, January 1999 (has links)
Thesis (Ph. D.)--West Virginia University, 1999. / Title from document title page. Document formatted into pages; contains vii, 43 p. : ill. Vita. Includes abstract. Includes bibliographical references (p. 30-36).
13

Exploration of the quality of three measures for assessing state anxiety in hospitalized cardiac patients /

Radford, Kari A., January 2009 (has links)
Thesis (Ph.D.) -- University of Rhode Island, 2009. / Typescript. Includes bibliographical references (leaves 157-179).
14

The effects of subliminal stimulation : Semantic priming and the arousal of anxiety

Kemp-Wheeler, S. M. January 1987 (has links)
No description available.
15

Spectre: Attack and Defense

Harris, Rae 01 January 2019 (has links)
Modern processors use architecture like caches, branch predictors, and speculative execution in order to maximize computation throughput. For instance, recently accessed memory can be stored in a cache so that subsequent accesses take less time. Unfortunately microarchitecture-based side channel attacks can utilize this cache property to enable unauthorized memory accesses. The Spectre attack is a recent example of this attack. The Spectre attack is particularly dangerous because the vulnerabilities that it exploits are found in microprocessors used in billions of current systems. It involves the attacker inducing a victim’s process to speculatively execute code with a malicious input and store the recently accessed memory into the cache. This paper describes the previous microarchitecture side channel attacks. It then describes the three variants of the Spectre attack. It describes and evaluates proposed defenses against Spectre.
16

A study of the effects of September 11, 2001 on third and eleventh grade students

Kaproth, Carissa. January 2003 (has links) (PDF)
Thesis--PlanB (M.S.)--University of Wisconsin--Stout, 2003. / Includes bibliographical references.
17

Veiled passion negotiation of gender, race and religiosity among young Muslim American women /

Maruoka, Etsuko. Unknown Date (has links)
Thesis (Ph. D.)--Stony Brook University, 2008. / This official electronic copy is part of the DSpace Stony Brook theses & dissertations collection maintained by the University Libraries, Special Collections & University Archives on behalf of the Stony Brook Graduate School. It is stored in the SUNY Digital Institutional Repository and can be accessed through the website. Presented to the Stony Brook University Graduate School in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Sociology; as recommended and accepted by the candidate's degree sponsor, the Dept. of Sociology. Includes bibliographical references (p. 102-114).
18

Closing Pandora's box : panic and agoraphobia : treatments and mediators /

Reilly, Kevin. January 2002 (has links)
Thesis (Ph. D.)--Lehigh University, 2003. / Includes vita. Includes bibliographical references (leaves 89-101).
19

Biomechanics of the upper limb : applications of motion analysis and force measurement techniques

Chadwick, Edward K. J. January 1999 (has links)
Two studies involving different applications of motion analysis and force measurement techniques are presented. The first study provides data on typical loads on the upper limb, and the muscle and joint forces which oppose them. The second presents parameters defining the biomechanics of knife stab attacks in order to specify standards for the testing of stab resistant body armour. A three dimensional, mathematical model of the elbow and wrist joints, including 15 muscle units, 3 ligaments and 4 joint forces, has been developed. A new strain gauge transducer has been developed to measure functional grip forces. The device measures radial forces divided into six components and forces of up to 250N per segment can be measured with an accuracy of «1%. Ten normal volunteers from within the Bioengineering Unit were asked to complete four tasks representing occupational activities, during which time their grip force, was monitored. Together with kinematic information from the six-camera Vicon data, the moment effect of these loads at the joints was calculated. These external moments are assumed to be balanced by the internal moments, generated by the muscles, passive soft tissue and bone contact. The effectiveness of the body's internal structures in generating joint moments was assessed by studying the geometry of a simplified model of the structures, where information about the lines of action and moment arms of muscles, tendons and ligaments is contained. The assumption of equilibrium between these external and internal joint moments allows formulation of a set of equations from which muscle and joint forces can be calculated. A two stage, linear optimisation routine minimising the overall muscle stress and the sum of the joint forces has been used to overcome the force sharing problem. Humero-uInar forces of up to 1600N, humero-radial forces of up to 800N and wrist joint forces of up to 2800N were found for moderate level activity. The model was validated by comparison with other studies. A wide range of parameters defining the biomechanics of knife stab attacks has been measured in order to specify standards for the testing of stab resistant body armour. Stab styles based on reported incidents provided more realistic data than had previously existed. A six camera Vicon motion analysis system and specially developed force measuring knife were used to measure the parameters. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. The body holding the knife u-as modelled as a series of rigid segments: trunk, upper arm, forearm and hand, and knife. The calculation of the velocities of theses egments, and knowledge of the mass distribution from biomechanical tables, allowed the calculation of the segment energy and momentum values. The knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. The 95th Percentile values for axial force and energy were 1885N and 69J respectively.
20

Vztah útoků odvozených od vyšších stupňů a CCZ ekvivalence / Relationship between higher order attacks and CCZ-equivalence

Deptová, Lucie January 2016 (has links)
In this thesis, we explain the term CCZ-equivalence in more detail to- gether with an analysis of a special type of matrices of this equivalence. We also clarify the higher order differential cryptanalysis and its generalized ver- sion. To demonstrate this method we present several attacks on a simple five round Feistel cipher, two of these attacks are our own. We have implemented the most important attacks and results of these experiments can be found in the text. We also explore how to use a decomposition F = F2 ◦F−1 1 (where F1 and F2 are permutations) to construct a generalized higher order differential attack to a block cipher with an S-box F. This construction may be used while searching for an attack to F using the CCZ-equivalence which is gener- ally a hard question. The result of our research is a theorem which presents a necessary condition on a degree of F which is needed for an existence of such a decomposition. 1

Page generated in 0.0285 seconds