• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 11
  • 5
  • 5
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 41
  • 17
  • 11
  • 9
  • 9
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

By the Grace of Joyce, the Brute is Freed: Brutish Bodies, Munificent Minds, and Liberating Language Within Dubliners

Fowkes, Julie E 12 August 2016 (has links)
My thesis examines Dubliners through the lens of Rene Descartes’s mind-body dualism to explain the relationship between contrasting themes in the text and demonstrate how they are connected. In an explication of the three words introduced by Joyce in the introductory paragraph of the first story in his collection, namely paralysis, gnomon, and simony, linking them with their more subtle but equally significant antonymic themes, which I propose are progression, epiphany, and grace, I show that Joyce was as compassionate as he was contemptuous of his countrymen. I propose that recognizing this balance helps us better understand what Joyce may have meant by making no apology for the brute-like spectacle he projects in his nicely polished looking-glass. Moreover, I argue that Dubliners serves as a fictional canvas upon which Joyce projects his dream of an Ireland that can transcend the tedium-inducing confines of its past.
2

A Unified Model of Pattern-Matching Circuits for Field-Programmable Gate Arrays

Clark, Christopher R. 28 August 2006 (has links)
The objective of this dissertation is to develop a methodology for describing the functionality, analyzing the complexity, and evaluating the performance of a large class of pattern-matching circuit design approaches for field-programmable gate arrays (FPGAs). The developed methodology consists of three elements. The first is a functional model and associated nomenclature that unifies a significant portion of published circuit design approaches while also illuminating many novel approaches. The second is a set of analytical expressions that model the area and time complexity of each circuit design approach based on attributes of a given pattern set. Third, software tools are developed that facilitate architectural design space exploration and circuit implementation. This methodology is used to conduct an extensive evaluation and comparison of design approaches under a wide range of conditions using pattern sets from multiple application domains as well as synthetic pattern sets. The results indicate strong dependences between pattern set properties and circuit performance and provide new insights on the fundamental nature of various design approaches. A number of techniques have been proposed for designing pattern-matching hardware circuits with reconfigurable FPGA chips. The use of FPGAs enables high performance because the circuits can be customized for a particular application and pattern set. A relatively unstudied consequence of tailoring circuits for specific patterns is that circuit area and performance are affected by various properties of the patterns used. Most previous work in this field only considers a single design approach and a small number of pattern sets. Therefore, it is not clear how each design is affected by pattern set properties. For a given set of patterns, it is difficult to determine which approach would be the most efficient or provide the highest performance. Previous attempts to compare approaches using results from different publications are conflicting and inconclusive due to variations in the FPGA devices, patterns, and circuit optimizations used. There has been no attempt to evaluate a wide range of designs under a common set of conditions. The methodology presented in this dissertation provides a framework for studying multiple aspects of FPGA pattern-matching circuits in a controlled and consistent manner.
3

Recuperação avançada de petróleo (EOR) com a utilização da glicerina bruta (GB) co-produto da produção de biodiesel

Borges, Sarah Maria Santana January 2009 (has links)
Submitted by Ana Hilda Fonseca (anahilda@ufba.br) on 2013-04-09T15:04:00Z No. of bitstreams: 1 Dissertação_Sarah Maria Santana Borges.pdf: 7849388 bytes, checksum: ddd168dafd8dbc5bab8fd53afdedd1b9 (MD5) / Approved for entry into archive by Ana Hilda Fonseca(anahilda@ufba.br) on 2013-04-18T17:09:58Z (GMT) No. of bitstreams: 1 Dissertação_Sarah Maria Santana Borges.pdf: 7849388 bytes, checksum: ddd168dafd8dbc5bab8fd53afdedd1b9 (MD5) / Made available in DSpace on 2013-04-18T17:09:58Z (GMT). No. of bitstreams: 1 Dissertação_Sarah Maria Santana Borges.pdf: 7849388 bytes, checksum: ddd168dafd8dbc5bab8fd53afdedd1b9 (MD5) Previous issue date: 2009 / CAPES / Nesse trabalho foi desenvolvido um sistema experimental que simula um reservatório de petróleo, no qual é possível fazer injeções que simule a recuperação de petróleo. A simulação da injeção foi conduzida em uma célula micro reservatória, com uma janela de policarbonato transparente onde era possível observar o comportamento do petróleo com o decorrer da injeção. Foram analisadas a injeção para quatro fluidos de recuperação diferentes: solução aquosa do polímero polióxido de etileno (PEO), solução aquosa do surfactante linear alquilbezeno sulfonado de sódio (LAS), e dois tipos de glicerina, a técnica (GP) e a bruta (GB) (co-produto da produção do biodiesel). Após cada uma das injeções a célula micro-reservatório foi aberta e o material remanescente e recuperado foi analisado por métodos volumétricos, térmicos (por DSC) e espectroscópicos (por FTIR), e os dados obtidos foram tratados e a sua interpretação foi feita com base no teor parafínico do petróleo. Com o objetivo de reforçar a interpretação dos resultados foram feitas análises quimiometricas de reconhecimento de padrões (PCA e HCA), correlacionando os dados obtidos. / Salvador
4

Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS

Eklund Berggren, Oscar January 2020 (has links)
I en tid då datorer, mobiler och andra enheter som kan ansluta till ett WLAN är stor, kommer säkerheten i dessa WLAN spela en stor roll. Det som skiljer WLAN och LAN när det kommer till säkerheten är att informationen måste färdas trådlöst i luften, vilket kan medföra att obehöriga kan lyssna av eller försöka koppla upp sig mot det trådlösa nätverket. Valet och implementationen av kryptering av WLAN för SME och privatpersoner har en stor inverkan på säkerheten i ens WLAN. Hur enkelt är det för en obehörig person att ta sig in på ett WLAN? Denna undersökning testar WLAN som använder WEP, WPA/WPA2 PSK och WPS med hjälp av en brute force attack för att avgöra om krypteringprotokollen är lämpliga att använda sig av. Testet simuleras med en obehörig laptop som försöker ta sig in in WLAN med brute force på WLAN som använder WEP, WPA/WPA2 PSK och WPS. Program som aircrack-ng och airgeddon används för att utföra testerna.
5

Traduire la littérature brute : le second tapuscrit de Vincenzo Rabito / Translating outsider literature : the second typescript of Vincenzo Rabito

Brignon, Laura 08 December 2017 (has links)
Vincenzo Rabito (1899-1981), Sicilien jamais scolarisé, fut l’auteur de deux immenses tapuscrits autobiographiques qui présentent une extraordinaire traversée du XXe siècle italien vu par un membre des classes les plus défavorisées. Dans son écriture qui mêle le sicilien et l’italien, les mots, dont la graphie calque la prononciation, sont séparés par des signes de ponctuation, et les échos de la tradition orale se font sentir dans le propos fortement digressif qui entremêle la vie vécue et la vie imaginée. Notre thèse prend pour objet d’analyse le second tapuscrit en vue d’en proposer une traduction en français. Par le biais d’une réflexion qui a pour fil rouge le rapport à l’altérité linguistique, la recherche se déroule en trois étapes successives. Dans la première, à partir d’une mise en contexte de la vie de l’auteur, de sa langue et de son œuvre, on construit une réflexion sur la « littérature brute », les modalités de sa publication et de sa réception tant en Italie qu’en France, pays caractérisé par un rapport très normatif à la langue. La deuxième étape, tout entière dédiée au texte de Rabito, analyse la langue de l’auteur, ainsi que la structuration et les procédés stylistiques de sa narration. À partir d’une réflexion à propos des dichotomies à l’œuvre dans la pensée de la traduction, la dernière étape se fonde sur les notions d’hybridité et de déplacement pour construire la traduction de Rabito, entreprise subjective à la recherche d’un équilibre entre les spécificités du texte source et l’exigence de lisibilité imposée par la perspective d’une publication. Elle se termine avec une vingtaine de pages traduites extraites du tapuscrit étudié, envisagées comme préalable à une publication future. / Vincenzo Rabito (1899-1981), an unschooled Sicilian, wrote two immense autobiographical typescriptscovering his extraordinary journey through the 20th century in Italy as a member of the most underprivileged social classes. In his writing, which mixes Sicilian with Italian, words are graphically modelled on pronunciation and separated by punctuation marks. The text strongly echoes oral traditions as the discourse becomes digressive, intertwining life and fantasy. The purpose of this thesis is to analyse the second typescript in the aim of translating it into French. Using the relation to linguistic otherness as the main thread, this research falls into three successive parts. The first one uses the life, language and work of the author in context and develop the idea of ‘Outside Literature’; it analyses the publication process and conditions of reception in Italy and in France as well, as the latter is characterised by its highly normative relation to language. The second part which is dedicated to Rabito’s text, analyses the language of the author, the narrative structure and stylistic devices. Questioning the dichotomies which are at work in translation theory, the last part develops the notion of hybridity and displacement to build the translation of Rabito’s text – a subjective project aiming at achieving a balance between the specificities of the original text and the demand for readability required by any prospect of publication. This thesis ends with the translation of twenty pages extracted from the typescript under scrutiny, as a prelude to its coming publication.
6

Grundlegende Textsuchalgorithmen / basics of text search algorithms

Reichelt, Stephan 01 July 2002 (has links) (PDF)
This document was created in addition to a recital for the seminar Pattern Matching at Chemnitz University of Technology in term 2001/2002. It is a description of basic text search approaches, which are the algorithms of Brute Force, Knuth-Morris-Pratt, Boyer-Moore and Boyer-Moore-Horspool. / Dieses Dokument entstand parallel zu einem Vortrag für das Proseminar Pattern Matching im Wintersemester 2001/2002 an der Technischen Universität Chemnitz. Es stellt die Funktionsweise der grundlegenden Suchalgorithmen Brute Force, Knuth-Morris-Pratt, Boyer-Moore sowie Boyer-Moore-Horspool dar.
7

La publication volontaire des flux de trésorerie par les dirigeants incitations et conséquences sur la valeur de la firme /

Elouafa, Khalid Capron, Michel. January 2008 (has links) (PDF)
Reproduction de : Thèse de doctorat : Sciences de gestion : Paris 8 : 2007. / Titre provenant de l'écran-titre. Bibliogr. p. 255-275.
8

Inloggning : Lösenordskryptering och Brute force attack

Strandberg, Emil January 2015 (has links)
This report is the result of a sub-project of a larger project to create a platform formathematical education. The sub-project focuses on authentication with associ-ated security, where security is emphasized. The project environment is Java EE 6where GlassFish 4.0 acts as the server. The project has been divided into threeparts; password encryption, Java EE authentication and brute force attack. Thepassword encryption part focuses on examining different hash functions executionspeed, the result shows that none of the examined hash algorithms is suitable fordirect use. Instead its recommended to use PBKDF2 with salt to encrypt pass-words. The Java EE section constructs a working application where users can reg-ister and login etc. This is performed as a study of the security tools available inJava EE. The result meets the requirement specification and a section on Java EEsecurity tools is presented. The brute force attack section is a theoretical study ofwhat can be done to protect against a brute force attack. The result shows thatCAPTCHAs is not recommended by OWASP and a system using cookies and aform of userblocking is purposed. The various parts are separated as far as possi-ble through the report with the exception that the result of the password encryp-tion section is applied in the Java EE application. / Denna rapport är resultatet av en deluppgift i ett större projekt att skapa en platt-form för undervisning av matematik. Uppgiften fokuserar på inloggning med till-hörande säkerhet. Projektets miljö är Java EE 6 med Glassfish 4.0 som server.Projektet har delats upp i tre underkategorier; Lösenordskryptering, Java EE in-loggning och Brute force attacks. Lösenordskrypterings delen fokuserar på att un-dersöka olika hashfunktioners exekveringshastighet, resultatet visar att ingen avde algoritmer som undersöks lämpar sig att användas direkt. Istället rekommende-ras system som PBKDF2 med SALT för att kryptera lösenord. Java EE avsnittetkonstruerar en fungerande applikation där användare kan registrera sig och loggain med mera. Arbetet utförs som en studie av vilka säkerhetsverktyg som finnstillgängliga i Java EE. Resultatet uppfyller kravspecifikationen och ett avsnitt omJava EEs verktyg presenteras. Brute force attack-avsnittet är en teoretisk studieav vad som kan göras för att skydda sig mot Brute force attacker. Resultatet visaratt robotfilter inte är rekommenderat av OWASP och ett förslag på ett system somanvänder kakor och en form av användarblockering presenteras. De olika delarnaär separerade så långt som möjligt genom rapporten med undantaget att resultatetav lösenordskrypterings avsnittet tillämpas i Java EE applikationen.
9

Utvärdering av nätverkssäkerheten på J Bil AB / Evaluation of the network security at J Bil AB

Ahmed, Olfet, Saman, Nawar January 2013 (has links)
Detta examensarbete är en utvärdering av nätverkssäkerheten hos J BiL AB, både på social och teknisk nivå. Företaget är beroende av säkra Internet-anslutningar för att nå externa tjänster och interna servrar lokaliserade på olika geografiska platser. Företaget har ingen IT-ansvarig som aktivt underhåller och övervakar nätverket, utan konsulterar ett externt dataföretag. Syftet med examensarbetet är att utvärdera säkerheten, upptäcka brister, ge förbättringsförslag och till viss del implementera lösningar. För att undersöka säkerheten har observationer och intervjuer med personalen gjorts och ett flertal attacker mot nätverket har utförts. Utifrån den data som samlats in kunde slutsatsen dras att företaget har brister vad gäller IT-säkerheten. Framförallt den sociala säkerheten visade sig ha stora luckor vilket till stor del beror på att de anställda varken har blivit utbildade eller fått någon information om hur de ska hantera lösenord, datorer och IT-frågor i allmänt. Förbättringsförslag har getts och viss implementation har genomförts för att eliminera bristerna. De anställda har även med hjälp av en IT-policy och föreläsning blivit utbildade i hur de ska agera och tänka kring IT-relaterade säkerhetsfrågor. / The aim of this project is to evaluate the network security at J Bil AB. The focus will be on both social and technical issues. For the employees to be able to con-nect to remote servers and external services and perform their daily work tasks, secure connections is needed. J Bil Ab has no IT manager who actively maintains and monitors the network; rather they consult a computer company when changes and implementations are required. The projects’ goal is to identify gaps, come up with suggestions for improvement and to some extent implement so-lutions. To do this, an observation of the employees hav been made, an inter-view have been held, and several attacks on the network have been performed. Based on the data collected, it was concluded that the company has shortcom-ings in IT security. Above all, the social security appeared to have major gaps in it and that is mainly because the lack of knowledge among the employees and they have never been informed of how to manage their passwords, computers and IT issues in general. Suggestions for improvement have been given and some implementations have been performed to eliminate the deficiencies.
10

Stabilité thermique de la fraction aromatique de l'huile brute Safaniya (Moyen Orient) : étude expérimentale, schéma cinétique par classes moléculaires et implications géochimiques

Al Darouich, Tammam 11 July 2005 (has links) (PDF)
L'évolution thermique des huiles dans les réservoirs est contrôlée par la cinétique du craquage. Cette étude traite de la stabilité thermique des composés aromatiques légers (C6-C14) des huiles brutes dans les conditions géologiques. L'objectif est de prédire cette stabilité par un modèle dérivé des expériences au laboratoire. La coupe légère de l'huile brute Safaniya <250 °C, correspondant aux composés en C15- , est séparée par distillation fractionnée. Une fraction aromatique pure est ensuite isolée par chromatographie liquide. La caractérisation moléculaire complète de cette fraction est réalisée par HPLC, GC et GC/MS. Les composés aromatiques ainsi identifiés et quantifiés sont regroupés selon leurs structures et leurs stabilités thermiques estimées dans six classes moléculaires: les BTXN, les méthylaromatiques, les alkylaromatiques, les naphténoaromatiques, les indènes et les composés aromatiques soufrés. Les pyrolyses sont effectuées en milieu fermé dans des tubes en or sous une pression de 100 bars et pour différentes conditions (température/temps) couvrant une très large gamme de conversion (1 à 93 %). Les effluents de pyrolyse sont fractionnés, analysés et regroupés en classes. L'évolution de l'ensemble des classes a été interprétée par l'élaboration d'un schéma cinétique semi-empirique composé de 13 réactions stoechiométriques qui rendent compte du craquage de la charge et du craquage secondaire des produits instables. Les paramètres cinétiques estimés de ce schéma ont été ensuite calibrés par optimisation numérique sous la contrainte des bilans de masse et de la conservation d'hydrogène. Afin d'évaluer l'effet de la pression sur le craquage thermique, nous avons réalisé une série de pyrolyses à 375 °C sous de hautes pressions de 400, 800 et 1200 bars. La comparaison des résultats de ces expériences à ceux obtenus à 100 bars a montré que l'augmentation de la pression retarde le craquage. Nous avons également mis en évidence une certaine sélectivité dans l'action de la pression sur les différentes classes que contient la charge et sur la distribution des produits de pyrolyse. L'extrapolation du modèle construit dans cette étude aux conditions du Bassin d'Elgin (Mer du Nord) a montré que l'augmentation de la pression aurait augmenté la stabilité thermique de la fraction aromatique légère en décalant son craquage de 8 °C.

Page generated in 0.0356 seconds