• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 282
  • 148
  • 84
  • 32
  • 27
  • 14
  • 14
  • 13
  • 10
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • Tagged with
  • 737
  • 137
  • 130
  • 93
  • 85
  • 84
  • 82
  • 80
  • 65
  • 60
  • 49
  • 48
  • 48
  • 46
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
441

Translating LaTeX to Coq: A Recurrent Neural Network Approach to Formalizing Natural Language Proofs

Carman, Benjamin Andrew 18 May 2021 (has links)
No description available.
442

Testování bezpečnosti a výkonu Proof-of-Stake Protokolů pomocí simulace / Security and Performance Testbed for Simulation of Proof-of-Stake Protocols

Borčík, Filip January 2021 (has links)
This work deals with performance and security testing of blockchain protocols based on the Proof-of-Stake (PoS) consensus model. It describes properties, problems, but also the use of blockchain systems. On theoretical levels, this thesis compares the properties and resistance to various attacks of numerous PoS protocols, specifically Algorand, Casper, Gasper, Snow White, Stellar and Decred. Additionally, this work implements a protocol simulator of Algorand, Casper FFG and Gasper. The simulator is built on top of the Bitcoin Simulator simulation tool, which is based on the NS-3 discrete network event simulator. Then, it compares the properties of the implemented protocols using discrete simulation.
443

Strength proof according to the FKM-Guideline within Creo Simulate

Kölbl, Markus 02 July 2018 (has links)
◦ The strength verification according to FKM with FEM results is time-consuming and requires a separate tool, e.g. KISSsoft. ◦ The strength verification was so far only carried out at individual points of the model. The selection of verification points is usually based on the equivalent stresses. The following influences can not or not sufficiently be considered. ▪ Locally different limit value of strain or plastic notch factor ▪ The location of the most critical combination of stress amplitude and mean stress ▪ The local stress gradient ◦ femMeshFKM was developed from ZF for railway applications (IX), where FEM calculations are performed with Permas. Postprocessing was done in Hyperworks. ◦ For ZF Test Systems, femMeshFKM has been extended to use Creo Simulate data. The postprocessing can be done also in Simulate.
444

Addressing the Data Location Assurance Problem of Cloud Storage Environments

Noman, Ali 09 April 2018 (has links)
In a cloud storage environment, providing geo-location assurance of data to a cloud user is very challenging as the cloud storage provider physically controls the data and it would be challenging for the user to detect if the data is stored in different datacenters/storage servers other than the one where it is supposed to be. We name this problem as the “Data Location Assurance Problem” of a Cloud Storage Environment. Aside from the privacy and security concerns, the lack of geo-location assurance of cloud data involved in the cloud storage has been identified as one of the main reasons why organizations that deal with sensitive data (e.g., financial data, health-related data, and data related to Personally Identifiable Infor-mation, PII) cannot adopt a cloud storage solution even if they might wish to. It might seem that cryptographic techniques such as Proof of Data Possession (PDP) can be a solution for this problem; however, we show that those cryptographic techniques alone cannot solve that. In this thesis, we address the data location assurance (DLA) problem of the cloud storage environment which includes but is not limited to investigating the necessity for a good data location assurance solution as well as challenges involved in providing this kind of solution; we then come up with efficient solutions for the DLA problem. Note that, for the totally dis-honest cloud storage server attack model, it may be impossible to offer a solution for the DLA problem. So the main objective of this thesis is to come up with solutions for the DLA problem for different system and attack models (from less adversarial system and attack models to more adversarial ones) available in existing cloud storage environments so that it can meet the need for cloud storage applications that exist today.
445

Formální důkazní břemeno státního zástupce v trestním řízení / Formal Burden of Proof of Public Prosecutor in Criminal Proceedings

Pudilová, Anežka January 2020 (has links)
The legal concept of formal burden of proof of public prosecutor has been discussed for more than 17 years of legislative work on the new Criminal Procedure Code and an increased attention was also paid to it before by the legal science, at the same time with the enforcement of adversary elements of court proceedings. The legal concept in question was established and developed as part of the Anglo-Saxon type of criminal proceedings where trial is based on a dispute between the parties. This involves the exclusive procedural responsibility of public prosecutor to clarify the facts relevant to the indictment filed. Although it is possible to give a brief description of the legal concept in question in a single sentence, its enactment would affect the overall nature of the proceedings before the court and would also be reflected in other stages of the criminal proceedings. The aim of the dissertation was to analyse the prerequisites and consequences of the enactment of the formal burden of proof of public prosecutor in the Czech criminal proceedings. Given the origin of the legal concept, the crucial question was whether its adoption would necessarily constitute a total departure from the legal principles which the existing Criminal Procedure Code is based on or whether it is possible and appropriate...
446

ICOs - A Tale of Greed and Opportunity : A qualitative study of how entrepreneurs in Sweden perceive this novel and unique financing method

Corominas Larsson, Daniel Sven, Bobadilla Smolski, Ilia Alexeevich January 2020 (has links)
This study is within the field of financial innovation and entrepreneurship. The thesis’s primary purpose is to investigate how and why entrepreneurs in Sweden are positioning themselves in regarding Initial Coin Offerings as a new financial vehicle based on the Swedish regulations and the underlying factors to the entrepreneur’s point of view. The literature contributes a limited knowledge of the Swedish industry concerning ICOs, and therefore this research aims to enhance awareness. Through qualitative research based on eleven interviews, we conclude there is a general lack of knowledge and risk-aversion from the absence of regulations in Sweden. Furthermore, all interviewed entrepreneurs were open-minded about an ICO with certain limitations. Considering that, on average, an enticing secondary market has existed for the tokens issued by ICOs, and a remarkable amount of money has been left on the table by project promoters, investors seeking for potential profit have hoarded the cryptocurrency space, creating a situation similar to the dot-com bubble. Thus, we also discuss the benefits, drawbacks, and the possible fate regarding ICOs, a new financing method that should not be overlooked.
447

PKI based Encryption for Document Sharing, Optimized Storage, and Proof of Existence in the Cloud

Ratnayake, Yohan January 2015 (has links)
No description available.
448

Proof-of-Concept för framtida värdeflöden med aggregerad simulering / Proof-of-Concept for future value streams with the usage of aggregated simulations

Holm Svensson, Tim, Suljic, Eddie January 2022 (has links)
Studien presenterar hur Södra Wood kan applicera diskret händelsestyrd simulering (DES) genom modeller på sågverk för att bland annat öka produktionsvolym, förkorta ledtider och minska lagernivåer. Med hjälp av digitala verktyg som FACTS Analyzer simulerades önskade förändringar på produktionsflödet och även andra organisationella förändringar. Utfallet av de simulerade förändringarna resulterade i flertalet positiva slutsatser som kunde presenteras och även visualiseras. Bevisligen kan simuleringar användas som grund till diverse besulttaganden och vidare även till Proof-Of-Concept trots att aggregerade modeller används. Det finns dock mycket utrymme kvar till vidareutveckling av denna typ av arbeten där värdeflödet i industrier av denna domän kan gynnas väsentligt.
449

Van Hiele theory-based instruction, geometric proof competence and grade 11 students' reflections

Machisi, Eric 08 1900 (has links)
This study sought to (a) investigate the effect of Van Hiele theory-based instruction on Grade 11 students’ geometric proofs learning achievement, (b) explore students’ views on their geometry learning experiences, and (c) develop a framework for better teaching and learning of Grade 11 Euclidean geometry theorems and non-routine geometric proofs. The study is based on Van Hiele’s theory of geometric thinking. The research involved a convenience sample of 186 Grade 11 students from four matched secondary schools in the Capricorn district of Limpopo province, South Africa. The study employed a sequential explanatory mixed-methods design, which combined quantitative and qualitative data collection methods. In the quantitative phase, a non-equivalent groups quasi-experiment was conducted. A Geometry Proof Test was used to assess students’ geometric proof construction abilities before and after the teaching experiment. Data analysis using non-parametric analysis of covariance revealed that students from the experimental group of schools performed significantly better than their counterparts from control group schools. In the qualitative phase, data were collected using focus group discussions and students’ diary records. Results revealed that the experimental group students had positive views on their geometry learning experiences, whereas students from the control group of schools expressed negative views towards the teaching of Euclidean geometry and geometric proofs in their mathematics classes. Based on the quantitative and qualitative data findings, it was concluded that in addition to organizing instruction according to the Van Hiele theory, teachers should listen to students’ voices and adjust their pedagogical practices to meet the expectations of a diverse group of students in the mathematics class. A framework for better teaching and learning of Grade 11 Euclidean geometry theorems and non-routine geometric proofs was thus developed, integrating students’ views and Van Hiele theory-based instruction. The study recommends that teachers should adopt the modified Van Hiele theory-based framework to enhance students’ mastery of non-routine geometric proofs in secondary schools.
450

Diagnostic Thresholds in Osteoporosis: How Are They Used in Clinical Trials?

Hamdy, Ronald C., Price, Dustin M., Mottl, Miriam M. 01 September 2011 (has links)
Clinical trials are used to determine the efficacy and safety of a medication prior to approval for commercial use and to influence the prescribing habits of clinicians. The lack of uniformity in the diagnostic thresholds used in clinical trials on osteoporosis makes it difficult to compare the results of these trials. The use of placebo, different anatomical sites, T-score cutoff points, and risk factors precludes any meaningful comparison being made between the outcomes of clinical trials. Finally, the lack of uniform reporting format makes it difficult to retrieve important information to compare one medication to another. Because the diagnostic thresholds used affect the outcomes of these trials, health care providers need to be aware of these criteria to determine whether the results of a particular clinical trial can be applied to a particular patient.

Page generated in 0.0436 seconds