• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 137
  • 91
  • 49
  • 23
  • 16
  • 8
  • 7
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 357
  • 58
  • 43
  • 32
  • 30
  • 27
  • 25
  • 24
  • 24
  • 22
  • 21
  • 20
  • 20
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

Termální lázně Yverdon, pět smyslů v architektuře / Thermal baths Yverdon, five senses in architecture

Bělkovský, Martin January 2015 (has links)
New thermal spa in town Yverdon is located in a town park. New spa is placed at the edge of the site. Protecting the park from the surroundings and keeping the identity of the park.
262

Brunnen, röken, vattnet : En historia om badandet som aktivitet med influenser från stilepoken allmoge

Karlsson, Josephine January 2023 (has links)
I mitt examensarbete utforskar jag allmogestilen i Skåne och för samman den med nordisk badkultur. Allmogestilen utgör ett betydande kulturellt och designmässigt arv som riskerar att försvinna på grund av bristen på tillräcklig restaurering av allmogemöbler och till och med olaglig export. Med inspiration från nordisk badkultur där aktiviteter såsom kallbad, rökbastu och dricka brunn är centralt omtolkar jag det moderna spat. Den reducerade estetiken som i vanliga fall associeras till den här typen av rum ersätts med den kraftfullt ornamenterade allmogestilen. Allmoge kan vara både en lyxartikel och något vardagligt, beroende på hur det används och värderas. Syftet för mitt examensarbete är att belysa allmogestilen genom att använda dess stilistiska element som inspirationskällor och genom interiören berätta en historia, i sann allmogeanda.Dessutom utforskar jag allmogestilens och ornamentikens förmåga att kommunicera budskap och historia genom materiella objekt.
263

Change in guest behavior during the COVID-19 pandemic : Research study of health spa hotels in Slovakia

Madunická, Veronika January 2022 (has links)
The global tourism and hotel industry have been among the fastest-growing sectors for years. However, the global pandemic of COVID-19 caused extreme disruption and changed the situation all around the globe. The global COVID-19 pandemic did not only leave an imprint on economic sectors all over the world but also caused changes in the everyday lives of people. Implemented travel restrictions and self-isolation have resulted in workforce reductions in all economic sectors and job losses impacting individuals, organizations, and countries globally. With regard to the hotel industry, the crisis has led to an immense number of cancellations and a loss of foreign clientele. The situation has altered and the behavior of guests has changed accordingly. This research aims to investigate the impact of the COVID-19 pandemic on guest behavior and its consequences. To achieve this aim, a mixed methods research approach consisting of 2 stages of empirical study is employed. The qualitative method in the form of email interviews was aimed at the hotel staff of 5 chosen health spa hotels in Slovakia where 9 employees were asked questions about the impact of COVID-19 on the hotel industry and guest behavior from a hotel employee’s perspective. The collected data were analyzed by using thematic analysis. The quantitative method was used to investigate the impact of the global pandemic from hotel guests’ points of view themselves. The second part of the research therefore involves 100 participants of an online survey about guest behavior during the pandemic, change in values and behavior patterns. The findings proved that there is a significant change in guest behavior induced by the COVID-19 pandemic and its consequences. Furthermore, the aftermath of adopted behaviors has been identified, including the change in the booking process, difficulties in rules compliance, and main differences in hotel stays before and during the pandemic.
264

台灣精品養生會館之商業企劃書 / MassageLuxe Taiwan: A Spa Revolution

林珍玉, Jennifer Lynn Biondo Unknown Date (has links)
MassageLuxe Taiwan (MLT) is a franchise of MassageLuxe International (MLI). MassageLuxe Taiwan plans to open its first location in Taipei in 2012. The first location will be the flagship salon and serve as a model to franchises to be sold throughout Taiwan. MassageLuxe Taiwan will acquire area developers in prominent cities such as Taichung, Tainan, and Kaohsiung. MassageLuxe Taiwan also has first rights to China and Singapore and plans to expand into these areas within the next 3 years. Jennifer Biondo is the Master Franchisor of MassageLuxe Taiwan. This business plan outlines the strategy for entering the Taiwan market and acquiring investors for the flagship location.
265

Termální lázně Yverdon, pět smyslů v architektuře / Thermal baths Yverdon, five senses in architecture

Kupcová, Tereza January 2015 (has links)
Spa is located on the outskirts of the Swiss city of Yverdon. Area is surrounded by disparate buildings especially residential character. There are historical buildings on the land and buildings of the spa and hotel. The current spa and the outbuilding of hotel don´t meet requirements, that´s why the buildings will be replaced by a new complex. Neighbourhood doesn´t have any relationship with the spa, that´s why the whole land is surrounded by a wall. Water surface with three “floating” pavilions is inserted into this closed spa park. There are the public spa, the therapeutic spa and the part of the hotel on the water surface. Each of them works largely independently; they are connected by the water surface. The complex is separated by a part of shallow water from the park. It´s solitaire in the park, but it has close connection with it. The spa complex is located near the forest on the south part of the land, because the whole system is quite open.
266

Kvalita života pacienta před a po operaci aortální chlopně. / Patient's life quality befor and after aortic valve operation

Vyskočilová, Ludmila January 2019 (has links)
(v AJ) Introduction to the topic and importance of the topic: Aortic valve disease is the third most frequent cardiovascular disease and also the most frequently operated valvular disease in adulthood. The natural process of the disease is unfavorable, almost half of the patients suffer from symptoms of heart failure (Branny et al. 2012). This is the reason why I focused my thesis on the assessment of the quality of life of patients diagnosed of aortic stenosis. Aim of the thesis and research questions: The aim of my thesis is to evaluate the quality of life patients with diagnosed aortic valve disease, within one month before the planned surgery and in the postoperative period when patients will be checked at a cardiac surgery clinic. The partial objective at the same time was to compare the quality of life and health status of patients with aortic valve disease who have completed a spa therapy with those who have rejected it. Methodology (method, research sample): The research work will be carried out as a quantitative research in a group of 29 respondents. The HRQoL construct it means questionnaire SF-36 were used to obtain the data. The questionnaire was anonymous. For the completed questionnaires, a closed box was set up, which I didn't open until the poll was complete. The survey was...
267

Développement de stratégies éducatives auprès de patients souffrant de gonarthrose, en milieu thermal / Development of educational strategies for knee osteoarthritis people, in spa therapy resort

Gay, Chloe 12 October 2017 (has links)
L’objectif de ce travail était de développer des stratégies éducatives en association avec une cure thermale à destination de patients porteurs de gonarthrose, avec un objectif non seulement d’efficacité clinique et psychologique mais aussi d’amélioration du niveau d’activité physique. Au total, 745 patients souffrants de gonarthrose ont été recrutés sur les 9 stations thermales membre du Cluster Innovatherm et répartis dans les 3 études composant ce projet. La première étude porte sur l’analyse qualitative des freins et des leviers à la pratique d’activité physique. La seconde étude a mesuré le niveau d’activité physique et analysé les facteurs influençant la régularité de la pratique. La troisième étude a évalué les effets d’un programme d’éducation à l’exercice en milieu thermal. L’analyse des résultats des 2 premières études a montré que le niveau d’activité physique des gonarthrosiques était significativement dépendant de certaines données sociodémographiques, anthropométriques (genre, indice de masse corporelle, obésité), de facteurs extrinsèques (lieu de vie, situation familiale) et de facteurs intrinsèques (motivation, bien être, « self-efficacy », fatigue, vieillissement, peur d’aggraver la gonarthrose). La troisième étude a montré que le traitement thermal associé ou non aux ateliers d’éducation à l’exercice permettait d’augmenter significativement le niveau d’activité physique, avec un effet taille moyen de 0.53 [0.28;0.77] à 3 mois. Les ateliers d’éducation à l’exercice ont un effet bénéfique significatif sur l’anxiété, la dépression et les peurs et croyances (sous item médecin du KOFBeQ), à 3 mois. Ces études confirment l’impact du traitement thermal sur les paramètres cliniques de la gonarthrose et fournissent de nouvelles données concernant ce traitement sur l’évolution du niveau d’activité physique. Cette étude argumente en faveur de l’effet cognitif et psychologique du programme d’éducation à l’exercice. / The aim of this work was to develop educational strategies in association with spa therapy treatment for patients with knee osteoarthritis, with a goal not only of clinical, psychological but also of improvement of the level of physical activity. A total of 745 patients with knee osteoarthritis were recruited from the 9 member’s thermal spa of the Innovatherm Cluster and distributed among the 3 studies building this project. The first study looked at the qualitative analysis of facilitators and barriers to physical activity. The second study on the level of physical activity and the analysis of the factors influencing the practice. The third study evaluated the effects of a self-management exercise education program in spa therapy resort. Analysis of the results of studies 1 and 2 showed the level of physical activity was significantly dependent on certain anthropometric data (gender, BMI, obesity), extrinsic factors (life situation, family situation) and intrinsic factors (motivation, well-being, self-efficacy, fatigue, aging, fear of aggravating knee osteoarthritis). Study 3 showed that spa treatment associated with or without self-management exercise program significantly increases the physical activity level, with medium effect size 0.53 [0.28; 0.77] at 3 months. Exercise education has a significant beneficial effect between groups in favor of the intervention group on anxiety, depression and fears and beliefs. These studies confirm the impact of spa therapy treatment on the clinical parameters of osteoarthritis and provide new data on the increase of the physical activity level and argue in favor of the cognitive and psychological effect of the self-management exercise program.
268

Contre-mesures géométriques aux attaques exploitant les canaux cachés

Guilley, Sylvain 10 January 2007 (has links) (PDF)
Ce travail de thèse concerne la sécurisation des circuits électroniques contre les attaques (dites SCA) qui visent leur implémentation. Les algorithmes cryptographiques ont été traditionnellement étudiés pour résister aux attaques théoriques. Néanmoins, dès lors que ces algorithmes sont mis en oeuvre sur des dispositifs concrets, de nouvelles attaques deviennent possibles. Effectivement, de l'information peut être extraite passivement (par observation). Cette information complémentaire, communément appelée "canal caché", apporte un pouvoir supplémentaire aux attaquants. Les canaux cachés les plus populaires sont la consommation électrique et le rayonnement électromagnétique. Nous montrons tout d'abord que les attaques sur les canaux cachés sont structurelles, c'est-à-dire inhérentes au traitement de l'information. Il se trouve par ailleurs que les algorithmes cryptographiques sont spécialement sensibles aux SCA, à cause des propriétés constitutives des fonctions booléennes utilisées. Le talon d'Achille principal est l'architecture RTL de l'opérateur cryptographique. Effectivement, les transferts de registres rendent possible une attaque dite en distance de Hamming. Nous continuons en recherchant des moyens permettant de ne fuir pratiquement aucune information exploitable par un attaquant. Des portes logiques sécurisées sont conçues de sorte à minimiser les violations de symétrie. Une stratégie de routage équilibré obéi aux mêmes critères. La conservation de la symétrie est traitée avec un soin tout particulier, aboutissant à la méthode générique de "backend duplication".
269

Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging

Moreno, Carlos January 2013 (has links)
Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded systems such as hand-held mobile devices, smart cards, RFID tags, etc. These types of attacks bypass any intrinsic mathematical security of the cryptographic algorithm or protocol by exploiting observable side-effects of the execution of the cryptographic operation that may exhibit some relationship with the internal (secret) parameters in the device. Two of the main types of side-channel attacks are timing attacks or timing analysis, where the relationship between the execution time and secret parameters is exploited; and power analysis, which exploits the relationship between power consumption and the operations being executed by a processor as well as the data that these operations work with. For power analysis, two main types have been proposed: simple power analysis (SPA) which relies on direct observation on a single measurement, and differential power analysis (DPA), which uses multiple measurements combined with statistical processing to extract information from the small variations in power consumption correlated to the data. In this thesis, we propose several countermeasures to these types of attacks, with the main themes being timing analysis and SPA. In addition to these themes, one of our contributions expands upon the ideas behind SPA to present a constructive use of these techniques in the context of embedded systems debugging. In our first contribution, we present a countermeasure against timing attacks where an optimized form of idle-wait is proposed with the goal of making the observable decryption time constant for most operations while maintaining the overhead to a minimum. We show that not only we reduce the overhead in terms of execution speed, but also the computational cost of the countermeasure, which represents a considerable advantage in the context of devices relying on battery power, where reduced computations translates into lower power consumption and thus increased battery life. This is indeed one of the important themes for all of the contributions related to countermeasures to side- channel attacks. Our second and third contributions focus on power analysis; specifically, SPA. We address the issue of straightforward implementations of binary exponentiation algorithms (or scalar multiplication, in the context of elliptic curve cryptography) making a cryptographic system vulnerable to SPA. Solutions previously proposed introduce a considerable performance penalty. We propose a new method, namely Square-and-Buffered- Multiplications (SABM), that implements an SPA-resistant binary exponentiation exhibiting optimal execution time at the cost of a small amount of storage --- O(\sqrt(\ell)), where \ell is the bit length of the exponent. The technique is optimal in the sense that it adds SPA-resistance to an underlying binary exponentiation algorithm while introducing zero computational overhead. We then present several new SPA-resistant algorithms that result from a novel way of combining the SABM method with an alternative binary exponentiation algorithm where the exponent is split in two halves for simultaneous processing, showing that by combining the two techniques, we can make use of signed-digit representations of the exponent to further improve performance while maintaining SPA-resistance. We also discuss the possibility of our method being implemented in a way that a certain level of resistance against DPA may be obtained. In a related contribution, we extend these ideas used in SPA and propose a technique to non-intrusively monitor a device and trace program execution, with the intended application of assisting in the difficult task of debugging embedded systems at deployment or production stage, when standard debugging tools or auxiliary components to facilitate debugging are no longer enabled in the device. One of the important highlights of this contribution is the fact that the system works on a standard PC, capturing the power traces through the recording input of the sound card.
270

Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging

Moreno, Carlos January 2013 (has links)
Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded systems such as hand-held mobile devices, smart cards, RFID tags, etc. These types of attacks bypass any intrinsic mathematical security of the cryptographic algorithm or protocol by exploiting observable side-effects of the execution of the cryptographic operation that may exhibit some relationship with the internal (secret) parameters in the device. Two of the main types of side-channel attacks are timing attacks or timing analysis, where the relationship between the execution time and secret parameters is exploited; and power analysis, which exploits the relationship between power consumption and the operations being executed by a processor as well as the data that these operations work with. For power analysis, two main types have been proposed: simple power analysis (SPA) which relies on direct observation on a single measurement, and differential power analysis (DPA), which uses multiple measurements combined with statistical processing to extract information from the small variations in power consumption correlated to the data. In this thesis, we propose several countermeasures to these types of attacks, with the main themes being timing analysis and SPA. In addition to these themes, one of our contributions expands upon the ideas behind SPA to present a constructive use of these techniques in the context of embedded systems debugging. In our first contribution, we present a countermeasure against timing attacks where an optimized form of idle-wait is proposed with the goal of making the observable decryption time constant for most operations while maintaining the overhead to a minimum. We show that not only we reduce the overhead in terms of execution speed, but also the computational cost of the countermeasure, which represents a considerable advantage in the context of devices relying on battery power, where reduced computations translates into lower power consumption and thus increased battery life. This is indeed one of the important themes for all of the contributions related to countermeasures to side- channel attacks. Our second and third contributions focus on power analysis; specifically, SPA. We address the issue of straightforward implementations of binary exponentiation algorithms (or scalar multiplication, in the context of elliptic curve cryptography) making a cryptographic system vulnerable to SPA. Solutions previously proposed introduce a considerable performance penalty. We propose a new method, namely Square-and-Buffered- Multiplications (SABM), that implements an SPA-resistant binary exponentiation exhibiting optimal execution time at the cost of a small amount of storage --- O(\sqrt(\ell)), where \ell is the bit length of the exponent. The technique is optimal in the sense that it adds SPA-resistance to an underlying binary exponentiation algorithm while introducing zero computational overhead. We then present several new SPA-resistant algorithms that result from a novel way of combining the SABM method with an alternative binary exponentiation algorithm where the exponent is split in two halves for simultaneous processing, showing that by combining the two techniques, we can make use of signed-digit representations of the exponent to further improve performance while maintaining SPA-resistance. We also discuss the possibility of our method being implemented in a way that a certain level of resistance against DPA may be obtained. In a related contribution, we extend these ideas used in SPA and propose a technique to non-intrusively monitor a device and trace program execution, with the intended application of assisting in the difficult task of debugging embedded systems at deployment or production stage, when standard debugging tools or auxiliary components to facilitate debugging are no longer enabled in the device. One of the important highlights of this contribution is the fact that the system works on a standard PC, capturing the power traces through the recording input of the sound card.

Page generated in 0.0332 seconds