Spelling suggestions: "subject:"capside"" "subject:"denside""
11 |
The Supply-Side Effects of Tax-Induced and Macroeconomic Policy AssignmentChen, Yu-lung 07 July 2004 (has links)
The thesis has closely examined that an important shortcoming of the Keynesian analysis is the neglect of potential tax-induced aggregate supply effects, and therefore, just as Marshall's proverbial scissors with one "misplaced" blade, the government cannot make proper policy decision. Hence, this paper incorporates the tax-induced aggregate supply effects into the analysis.
When a model does not include the supply-side effects of tax-induced, it degrades to a Ramirez (1986) and cannot be sued for policy assignment. On the other hand, a model incorporates the tax-induced aggregate supply effects remedies the flaws in Ramirez (1986) and can be used for appropriate policy assignment.
|
12 |
Affiliate marketing s využitím optimalizace trackování provizí / Affiliate marketing with using optimized solution for conversion trackingČernochová, Petra January 2015 (has links)
This thesis focuses on inclusion of affiliate marketing to internet marketing as a contemporary modern tool for acquiring new customers in the online market and on analysis of the system solution for conversion tracking at eHUB.cz Ltd. The thesis is divided into three parts: the first part presents the general overview of affiliate marketing, the second section analyzes the current state of the conversion tracking system at eHUB.cz Ltd. and the third proposes an optimal solution for the future status of this system. Theoretical level corresponds to the first part and a practical second and third. The theoretical part clarifies the position of affiliate marketing within online marketing, including basic knowledge and relationships that are necessary for proceeding to the practical part. The practical part contains a description of the original and current technical solutions of system eHUB. At the same time suggests its optimization for a future state. The main objective is to find a precise definition of the current standards of conversion tracking system solutions in eHUB.cz Ltd. The main contribution of this work is the usability of the optimal technical solution at eHUB.cz Ltd.
|
13 |
THE EFFECT OF CIMETIDINE, RANITIDINE, AND HALOTHANE ON LIDOCAINE PHARMACOKINETICS IN MAN.Glass, Steven James. January 1983 (has links)
No description available.
|
14 |
Stability of riprap side slopes in open channelsAhmed, A. F. January 1988 (has links)
No description available.
|
15 |
The effects of radiation and chemotherapy on late responding tissuesEwen, C. January 1987 (has links)
No description available.
|
16 |
Understanding and Countermeasures against IoT Physical Side Channel LeakageMoukarzel, Michael Antoine 24 April 2019 (has links)
With the proliferation of cheap bulk SSD storage and better batteries in the last few years we are experiencing an explosion in the number of Internet of Things (IoT) devices flooding the market, smartphone connected point-of-sale devices (e.g. Square), home monitoring devices (e.g. NEST), fitness monitoring devices (e.g. Fitbit), and smart-watches. With new IoT devices come new security threats that have yet to be adequately evaluated. We propose uLeech, a new embedded trusted platform module for next-generation power scavenging devices. Such power scavenging devices are already widely deployed. For instance, the Square point-of-sale reader uses the microphone/speaker interface of a smartphone for communications and as a power supply. Such devices are being used as trusted devices in security-critical applications, without having been adequately evaluated. uLeech can securely store keys and provide cryptographic services to any connected smartphone. Our design also facilitates physical side-channel security analysis by providing interfaces to facilitate the acquisition of power traces and clock manipulation attacks. Thus uLeech empowers security researchers to analyze leakage in next- generation embedded and IoT devices and to evaluate countermeasures before deployment. Even the most secure systems reveal their secrets through secret-dependent computation. Secret- dependent computation is detectable by monitoring a system’s time, power, or outputs. Common defenses to side-channel emanations include adding noise to the channel or making algorithmic changes to mitigate specific side-channels. Unfortunately, existing solutions are not automatic, not comprehensive, or not practical. We propose an isolation-based approach for eliminating power and timing side-channels that is automatic, comprehensive, and practical. Our approach eliminates side-channels by leveraging integrated decoupling capacitors to electrically isolate trusted computation from the adversary. Software has the ability to request a fixed- power/time quantum of isolated computation. By discretizing power and time, our approach controls the granularity of side-channel leakage; the only burden on programmers is to ensure that all secret-dependent execution differences converge within a power/time quantum. We design and implement three approaches to power/time-based quantization and isolation: a wholly-digital version, a hybrid version that uses capacitors for time tracking, and a full- custom version. We evaluate the overheads of our proposed controllers with respect to software implementations of AES and RSA running on an ARM- based microcontroller and hardware implementations AES and RSA using a 22nm process technology. We also validate the effectiveness and real-world efficiency of our approach by building a prototype consisting of an ARM microcontroller, an FPGA, and discrete circuit components. Lastly, we examine the root cause of Electromagnetic (EM) side-channel attacks on Integrated Circuits (ICs) to augment the Quantized Computing design to mitigate EM leakage. By leveraging the isolation nature of our Quantized Computing design, we can effectively reduce the length and power of the unintended EM antennas created by the wire layers in an IC.
|
17 |
Application of side-scan sonar in mapping seabed morphology and coral reefs off LIU-CHIEU YÜYan, Shyh-Bin 12 August 2004 (has links)
About the investigation method of the present situation of coral reef at present, the main choice is scuba diving investigation no matter domestic and foreign countries. Take the coral reef of physical examination in Taiwan as example, divers use transects as basic methods to calculate the coverage rate of coral reef and characteristic of the seabed environment and to survey specific fish and quantity of the invertebrate in order to judge the influence that the human activity causes to the coral reef.
In above-mentioned methods can really make full and accurate investigation to the coral reef of monitor area, so the method has already been adopted and walked for many years by the domestic and international relevant organization. But its shortcomings are slower investigating speed and lack accurate fixed position methods, and the divers also have hiding danger. However, some characteristics of side-scan sonar system just can mend the weak points of them. For the speed of investigating, our side-scan sonar's survey range can reach the belt area of hundred meters wide in both route sides, so it can substantially improve the speed of investigating. For the accuracy of fixed position, the side-scan sonar system match to GPS can obtain certain longitude and latitude of targets¡]the precision about 10 m¡^. So, this research is using side-scan sonar system to survey the seabed around LIU-CHIEU YU¡]the survey area about 2.6 km2¡^, the steps contain: mapping the distribute condition¡]sand, mud and rock¡^of seabed bottom, then identifying growing coral reef of rocky area, final assessing its feasibility by the process and result of survey. The ultimate purpose is an attempt to provide a new method for coral reef survey.
The result of study shows: the seabed bottom around LIU-CHIEU YÜ can be divided into several parts by the difference of acoustics reflectivity. Among them, coral reef covers maximum area, and the area can reach to 1,133,670m2¡]46.4% of effective survey area¡^.
In the part of identifying growing coral reef in the acoustics image, this study compares with optics images of TOV and acoustics images of side-scan sonar to establish the characteristics of growing coral reef in the acoustics image. Among them, the tree-like corals have some characteristics about high backscatter, individual risings, tree-like figures and acoustics shadows, unregulated reflection surfaces and complicated color tones in the reflection surface, but the cover-form reefs do not have tree-like figures and acoustics shadows. Then, using the above-mentioned characteristics to identify survey area seabed shows¡GThe cover area of growing coral reef is 547,438 m2¡]22.4% of effective survey area¡^, and the growing coral reef distributes in the southwest, southern and eastern sea area of LIU-CHIEU YÜ. And the optics images of the TOV shows the growth state of growing coral reef in the southeast sea area is superior to the southwest sea area,
Finally, assessed by the process and result of this research, basically it is feasible to map the distribute condition of growing coral reef by side-scan sonar system.
|
18 |
Evaluating the efficacy of DNA repair biomarkers to assess human cell response to chemotherapy using imaging flow cytometryZahir, Sheba Adam January 2013 (has links)
Chemotherapy and radiotherapy are widely accepted as common forms of treatment for cancers. The majority of cancer patients receive chemotherapy alone or in combination with radiotherapy. Most chemotherapeutic drugs cause DNA damage to the rapidly dividing cancer cells but normal cells are also damaged in the process. Therefore DNA repair levels in tumour and normal cells may determine the success of the treatment. The aim of this work was to evaluate the use of DNA repair biomarkers for assessing responses to chemotherapeutic drugs. The novel technique of imaging flow cytometry was employed to analyse the induction and resolution of γ-H2AX and RAD51 DNA repair biomarkers in DNA repair normal cell lines MRC5-SV1 and NB1-HTERT, an ATM-deficient cell line AT5BIVA (derived from an Ataxia Telangiectasia patient) and an XPF-deficient cell line GM08437B. Two cell lines were also developed, MRC5-SV1R and NB1-HTERTR which had been made resistant to HN2. A range of chemotherapeutic drugs, Adriamycin, Cisplatin and Nitrogen Mustard which have different modes of action were examined in this work. We have demonstrated distinct differences in γ-H2AX and RAD51 foci induction and resolution between the two DNA repair normal cell lines following exposure to different chemotherapeutic drugs. Additionally, it was demonstrated that both the resistant and sensitive cell lines have elevated γ-H2AX and RAD51 expression profiles in comparison to the parental cell lines over a 48 hour period post treatment with the cross-linking agent HN2. It is concluded that while both the γ-H2AX and Rad51 biomarkers may be useful for determining chemotherapeutic response, a larger cohort of cell lines and tumour samples is required for further analysis.
|
19 |
Relative efficacy of certain central nervous system depressants against drug-induced convulsions and mortalityDavidson, Allen Jay, 1941- January 1969 (has links)
No description available.
|
20 |
Growth, development and carbohydrate reserves of sideoats grama (Bouteloua curtipendula) and plains lovegrass (Eragrostis intermedia)Sule, Bello, 1947- January 1974 (has links)
No description available.
|
Page generated in 0.0397 seconds