Spelling suggestions: "subject:"De none"" "subject:"De note""
71 |
L’improvisation dramatique, étude clinique et psychanalytique d’ateliers théâtre en structures de soin / The dramatic improvisation, the clinical and psychoanalytical trial of studios theater in structures of careVandevelde - Pouliquen, Béatrice Anne Sabine 14 September 2016 (has links)
Au XXIème, une psychologue clinicienne décide d’offrir à ses patients une scène de théâtre comme lieu d’exposition de leur inconscient. Elle constate un paradoxe : l’art dramatique qui fraye avec la folie aurait des vertus thérapeutiques.Ainsi peut se résumer l’intrigue de cette thèse en 3 actes dont les personnages principaux sont des patients, psychotiques pour la plupart, en mal de psychothérapie, et un artiste fou, grand homme de théâtre : Antonin Artaud.Par l’exposition de saynètes comme expression brute de l’inconscient, la présente thèse illustre le cheminement des réflexions de son auteure. Elle reprend d’abord la genèse d’une médiation singulière : l’improvisation dramatique. Ensuite, inspirée par le cas emblématique d’A. Artaud et à travers la psychanalyse, elle explore les mécanismes mis en jeu lors d’ateliers théâtre et leurs effets sur le psychisme des patients devenus comédiens. Enfin, en suivant le cheminement du noeud borroméen, elle conclut que l’improvisation dramatique, foncièrement inscrite dans le Réel, qui convoque l’Imaginaire et introduit le Symbolique, s’impose comme une activité sinthomatoire / During the 21st century, a clinical psychologist decides to offer to her patients a theatre stage as an exhibition space for their unconscious. She notes a paradox : drama, which has to do with madness, would have therapeutic properties.Thus can be synthesized the plot of this three-act PhD thesis, whose main characters are patients, mostly psychotic ones needing to undergo psychotherapy, and an insane artist, also great man of the Theatre: Antonin Artaud.Through presenting role-plays as raw expression of the unconscious, this thesis shows how its author’s thinking unfolds. It first draws on the genesis of a singular mediation: theatrical improvisation. Then, inspired by A. Artaud’s emblematic case and through psychoanalysis, it explores the mechanisms involved during theatrical workshops and their effects on the patients who became actors. Lastly, by following the path of the borromean node, it concludes that theatrical improvisation, which is deeply inscribed in the Real, which summons the Imaginary and introduces the Symbolic, emerges as a sinthomatic activity.
|
72 |
Factors affecting the concentration of financial services in the non metropolitan United States, 2000-2003Button, Ryan January 1900 (has links)
Master of Arts / Department of Sociology, Anthropology, and Social Work / W. Richard Goe / Over the last twenty-five years, the environment for banking has changed radically. In the 1980s, legislation was enacted to permit both interstate branching and combinations of banks, securities firms, and insurance companies. A generally strong economy, as well as deregulation, led to marked improvements in bank profitability and capital positions. At the same time, however, the deregulation of products and markets intensified competition among banks and between banks and nonbank financial companies. This, combined with improved information technology, applications for banking, accelerated the consolidation of the banking industry through mergers and acquisitions and set the stage for the establishment of huge banking firms of unprecedented size and complexity.
While processes such as mergers and acquisitions decreased the number of firms, competition between these firms prompted the growth of new establishments in banking and financial services. While a larger proportion of the literature has focused on the structural and regulatory changes among firms that have arose during this transformation, little attention has been given to the factors that affect the location of physical establishments. This is particularly the case in relation to the location of new banking establishments in the nonmetropolitan U.S. It is the intention of this thesis to come to a better understanding of the factors that affect the locations of these establishments, in hopes of adding more insight into the process of bank establishment growth.
|
73 |
Comparative popliteal and mesenteric computed tomographic lymphography of the caudal canine thoracic ductMillward, Ian Ralph 19 May 2010 (has links)
Thoracic duct (TD) ligation has long been the treatment of choice for canine idiopathic chylothorax. Clear identification of all the TD branches at the surgical site is critical to facilitate complete ligation, and this can be difficult due to the highly variable nature of the TD system in number, location and patency of TD branches. Failure to ligate all of the TD branches may result in persistent flow of chyle into the pleural cavity through any missed ducts, and this is the single most common cause of failure with TD ligation. Performing direct positive contrast lymphography with a water soluble contrast medium, administered through a surgically implanted mesenteric lymphatic vessel catheter has been the conventional method used to identify TD branches. This procedure involves invasive surgery to both implant and remove the mesenteric lymphatic catheter, which increases patient risk and discomfort, as well as the diagnostic time and cost. Ultrasound (US) guided percutaneous administration of contrast medium into either a popliteal or mesenteric lymph node (LN) have been proposed as alternatives to mesenteric lymphatic vessel catheterisation, however their comparability with the conventional approach has not been assessed. Computed tomographic (CT) lymphography of the caudal canine TD was performed in seven beagles with contrast medium administered through a mesenteric lymphatic catheter, and by US guided percutaneous injection into a popliteal LN. Images of the TD system were collected using both helical and sequential CT modalities for each contrast medium administration technique. It was found that percutaneous popliteal lymphography had a total diagnostic procedure time just 46% of that found with mesenteric lymphatic vessel administration, and resulted in a time saving of 52 minutes. It also incurred only 29% of the total costs, and patients were assessed to have significantly less discomfort compared to mesenteric lymphatic vessel lymphography. There was no significant difference in the number of TD branches identified by the two contrast medium administration techniques (P = 0.256). However administration of contrast medium into a mesenteric lymphatic vessel did result in the largest TD branch having a significantly greater widest diameter (P < 0.001), cross-sectional area (P < 0.001) and mean Hounsfield unit (HU) value (P < 0.001) than popliteal administration. The significant difference in TD size and contrast medium concentration may help to explain the trend for popliteal administration of contrast medium to detect slightly fewer TD branches (CR = 0.830), however this study could not confirm this trend nor its possible causes. There was no significant difference in the number of TD branches identified by the two CT modalities (P = 0.417). However helical CT did result in the largest TD branch having a significantly greater widest diameter (P < 0.001), cross-sectional area (P < 0.001) and higher mean HU value (P < 0.001). It should be noted however that in this study sequential CT was consistently performed after the helical CT was completed, which could explain the differences seen between the two CT modalities in TD branch size and contrast medium concentration. Despite helical CT having the apparent advantage of a larger TD branch which contained a higher concentration of contrast medium, it was actually found that there was a trend for helical CT to detect slightly fewer TD branches (CR = 0.876). This is possibly due to the positive pressure breath hold that was used to minimise thoracic respiratory movement for the helical CT; while the sequential CT was performed during normal respiration and was therefore not subject to abnormally elevated intrapleural pressure. This study could not confirm the slight superiority of sequential CT in detecting TD branches nor the possible reasons for this apparent difference. / Dissertation (MMedVet)--University of Pretoria, 2010. / Companion Animal Clinical Studies / unrestricted
|
74 |
Portal to Pretoria - establishing a northern gateway to the citySmalberger, Marinda 22 November 2007 (has links)
Developing a point of orientation whereby users can navigate the Pretoria inner city. Integrating public resources to promote efficient and integrated public service delivery. Gateway to mark entry to the city at Boom street, along Paul Kruger street to act as a catalytic intervention for the regeneration of the northern district. / Dissertation (MArch(Prof))--University of Pretoria, 2008. / Architecture / unrestricted
|
75 |
Defense Against Node Compromise in Sensor Network SecurityChen, Xiangqian 15 November 2007 (has links)
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
|
76 |
Ca2+ handling in a mice model of CPVT / Ca2+ manutention dans un model de souris de CPVTWang, YueYi 07 July 2016 (has links)
Le canal calcique de libération du Ca2+, appelé récepteur à la ryanodine (RyR) est localisé dans la membrane du réticulum sarcoplasmique des cardiomyocytes, en incluant ceux du pacemaker, et a un rôle important dans le couplage excitation contraction et la génération du rythme cardiaque. Des mutations dans leur gène sont responsables de la tachycardie catécholergique (CPVT), qui est une maladie létale, manifestée par des syncopes ou mort subite lors de stress émotionnel ou physique. Au repos, ces patients ont un électrocardiogramme normal, mais une tendance plus importante à la bradycardie.Nos collaborateurs ont identifié la mutation RyR2R420Q dans une famille espagnole atteinte de CPVT. Nous avons construit une souris portant cette mutation et étudié l’activité du nœud sinoatrial (NSA, pacemaker principale) afin d’élucider les mécanismes.Nous avons trouvé que les cellules du NSA présentent une activité spontanée plus lente que les souris sauvages (WT). Dans la cellule in situ, on peut étudier l’activité des RyRs par l’analyse des « sparks » Ca2+, qui sont des évenements élémentaires produits par l’activation d’un cluster des RyRs. Nos analyses en microscopie confocale sur des NSA disséquées on montré que la fréquence des sparks Ca2+ était légèrement augmentée. Par contre, la longueur de ces sparks est fortement prolongée dans les cellules KI. Ceci produit une libération plus importante de Ca2+ pendant la diastole dans les cellules KI qui réduit l’automatisme, en réduisant la charge en Ca2+ du réticulum sarcoplasmique et en inactivant le courant calcique type L. Donc les thérapies en étude qi favoriseraient la stabilisation du RyR2 en état fermé pourraient ne pas Être efficaces, et il faudra plutôt essayer des thérapies qui faciliteraient la fermeture du canal, une fois il est ouvert. / The cardiac type-2 ryanodine receptor (RyR2) encodes a Ca2+ release channel on sarcoplasmic reticulum (SR) membrane in cardiomyocytes, including sinoatrial node (SAN) myocytes, and releases Ca2+ required for contraction and SAN spontaneous rhythm. Its genetic defects are related to catecholaminergic polymorphic ventricular tachycardia (CPVT), which is a lethal heritable disease characterized by exercise/stress-induced syncope and/or sudden cardiac death. Interestingly, CPVT patients frequently present SAN dysfunction as bradycardia at rest.In a previous study, a novel CPVT-related RyR2 mutation (RyR2R420Q) in a Spanish family, associated with SAN dysfunction was reported. R420 is located at the N-terminal portion of the channel and seems to be an important site for maintaining a stable A/B/C domain of N-terminus in RyR2. As N-terminal mutation resultant RyR2 behaviour and SAN function are never analyzed before, we created the KI mice model bearing mutation R420Q to understand the underlying mechanism.In this thesis, we found increased Ca2+ release during diastole, indicating a gain-of-function effect of RyR2 N-terminal mutation R420Q. Interestingly, this defect may not be only an enhanced activity, as the Ca2+ sparks frequency was only slightly increased in KI, but also the closing mechanism, producing longer Ca2+ sparks. That is, the number of Ca2+ sparks is increased by the RyR2R420Q mutation, and meanwhile the amount of Ca2+ released in each Ca2+ spark is also dramatically enhanced. This increased Ca2+ release retards SR Ca2+ replenishment, disrupting the Ca2+ clock and the coupled clock, resulting in the slower SAN function. Thus favouring RyR stabilization in the closing state might not be an adequate therapy but accelerating its closure.
|
77 |
Návrh virtualizace a replikace fyzického serveru pro středně velkou firmu / Implementation of virtualization technology and replication of physical server for medium size companyKováč, Matej January 2019 (has links)
The purpose of master’s thesis is to project virtualization solution together with replication of the servers. Thesis is divided into the three parts and that it theoretical, analytical and projection part. In analytical part there are basic information about virtualization technologies, in analytical part there is analysis of the present status of the company and mainly about status of the IT infrastructure and in the end projection part there is realization of the virtualization solution from choosing the right type of cluster to choosing hardware solution.
|
78 |
Knihovna pro abstrakci práce s blockchainy kryptoměn / Blockchain Abstraction LibraryGallovič, Ľubomír January 2019 (has links)
This thesis deals with cryptocurrencies and the underlying principles they are based on. It describes the blockchain technology and explores various cryptocurrencies that utilize it with the focus on their similarities and differences. The next part analyzes InsightAPI, the existing tool for real-time Bitcoin blockchain exploration. It then describes the proposed solution for the Ethereum blockchain explorer, highlights the implementation details, and shows results of its testing. The created tool allows the user to quickly gather information about desired blocks, users, and transactions of the Ethereum blockchain.
|
79 |
Lokalizace objektů v prostředí bezdrátové senzorové sítě / Localization of Objects in Wireless Sensor Network EnvironmentVícha, Tomáš January 2021 (has links)
This thesis deals with the use of spatial awareness methods within technologies designed for creation of short-range wireless sensor networks. The thesis analyzes several techniques that can be used to estimate position of objects within the sensor network. For a practical solution, a method based on measuring the time differences of the sent messages was chosen. A circuit implementation of a network node based on the DW1000 chip, which works on ultra-wideband transmission technology, was implemented. A sensor network with the appropriate user application for its operation and display of localization results was also implemented.
|
80 |
Implementace bezkotevní lokalizační techniky do simulačního prostředí ns2 / Investigation of Anchor-Free Localization in Network SimulatorMartynek, Tomáš January 2010 (has links)
This thesis deals with the issue of localization in wireless sensor networks. It focuses on the implementation Anchor-Free localization techniques to NS2 and evaluation of its effectiveness. In the theoretical introduction is summarized IEEE802.15.4 and ZigBee technology. The following chapter describes the Anchor-Based and Anchor-Free localization methods. Furthermore, existing methods of measuring the distance of network nodes are described. Also pay attention NS2 environment, especially the inclusion of standard IEEE802.15.4. The section devoted to Anchor-Free algorithm describes how to search and select anchor modes. It also described the method of optimization by measuring the distance of neighboring nodes using the Mass-Spring Algorithm. Next chapter describe the inclusion of a new protocol called AFLOCAL into NS2 and detailed analysis of its function. Next described the process of localization and calculating the coordinates. Described was aslo a method of simulation and evaluation of results. In conclusion, the results are summarized and formulated the characteristics of designed protocol AFLOCAL.
|
Page generated in 0.0698 seconds