• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 118
  • 29
  • 26
  • 15
  • 10
  • 7
  • 6
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 416
  • 49
  • 46
  • 45
  • 41
  • 41
  • 38
  • 37
  • 33
  • 32
  • 32
  • 31
  • 25
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
401

Seeing it Straight

Harvey, Heather 01 January 2007 (has links)
This Master of Fine Arts thesis is divided into four main sections:FAITH and DISBELIEF: In which I reckon with the implications of faith versus rationality as a secular nontheistic artist. IDEAS: The central locus of my work is a place of indeterminacy between what is known/familiar and what is just one step outside of that. This has nothing to do with mysticism, science fiction, or anything else unmoored from established fact. Section also touches on the particular vantage of a female artist with working class roots.THE WORK: Selection of work made during graduate school, and the the guiding thoughts behind each.EMPTINESS, STILLNESS, ABSENCE, GHOSTS, DOUBT: A discussion of influential artists and ideas.
402

SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure

Megahed, Mohamed Helmy Mostafa 30 May 2014 (has links)
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BSs, an adversary can still destroy them. The new BS cannot trust the deployed sensor nodes. Also, previous works lack both the procedures to ensure network reliability and security during BS failure such as storing then sending reports concerning security threats against nodes to the new BS and the procedures to verify the trustworthiness of the deployed sensing nodes. Otherwise, a new WSN must be re-deployed which involves a high cost and requires time for the deployment and setup of the new WSN. In this thesis, we address the problem of reliable recovery from a BS failure by proposing a new security architecture called Surveillance Security (SurvSec). SurvSec continuously monitors the network for security threats and stores data related to node security, detects and authenticates the new BS, and recovers the stored data at the new BS. SurvSec includes encryption for security-related information using an efficient dynamic secret sharing algorithm, where previous work has high computations for dynamic secret sharing. SurvSec includes compromised nodes detection protocol against collaborative work of attackers working at the same time where previous works have been inefficient against collaborative work of attackers working at the same time. SurvSec includes a key management scheme for homogenous WSN, where previous works assume heterogeneous WSN using High-end Sensor Nodes (HSN) which are the best target for the attackers. SurvSec includes efficient encryption architecture against quantum computers with a low time delay for encryption and decryption, where previous works have had high time delay to encrypt and decrypt large data size, where AES-256 has 14 rounds and high delay. SurvSec consists of five components, which are: 1. A Hierarchical Data Storage and Data Recovery System. 2. Security for the Stored Data using a new dynamic secret sharing algorithm. 3. A Compromised-Nodes Detection Algorithm at the first stage. 4. A Hybrid and Dynamic Key Management scheme for homogenous network. 5. Powerful Encryption Architecture for post-quantum computers with low time delay. In this thesis, we introduce six new contributions which are the followings: 1. The development of the new security architecture called Surveillance Security (SurvSec) based on distributed Security Managers (SMs) to enable distributed network security and distributed secure storage. 2. The design of a new dynamic secret sharing algorithm to secure the stored data by using distributed users tables. 3. A new algorithm to detect compromised nodes at the first stage, when a group of attackers capture many legitimate nodes after the base station destruction. This algorithm is designed to be resistant against a group of attackers working at the same time to compromise many legitimate nodes during the base station failure. 4. A hybrid and dynamic key management scheme for homogenous network which is called certificates shared verification key management. 5. A new encryption architecture which is called the spread spectrum encryption architecture SSEA to resist quantum-computers attacks. 6. Hardware implementation of reliable network recovery from BS failure. The description of the new security architecture SurvSec components is done followed by a simulation and analytical study of the proposed solutions to show its performance.
403

The liability of trade unions for conduct of their members during industrial action

Mlungisi, Ernest Tenza 18 September 2017 (has links)
South Africa has been experiencing a number of violent strikes by trade unions in recent times. The issue is not only to hold unions liable for damage caused during strikes, but also to reduce the number of violent strikes. This study investigates if victims of such violence can hold trade unions liable for the violent acts committed by their members during industrial action. The Labour Relations Act, 66 of 1995 (LRA) makes provision for the dismissal of employees who commit misconduct during an unprotected strike. It also provides the remedy of an interdict and a claim for just and equitable compensation which can be made against the union, during an unprotected strike. It is further possible to hold the union together with its members liable for damages in terms of the Regulation of Gatherings Act, 205 of 1993 (RGA). The study argues that a strike or conduct in furtherance of a strike that becomes violent could lose protection and the trade union should consequently be held liable, in terms of the LRA and/ or the RGA, for damages caused by its members. This study investigates the position in Canada, Botswana and Australia to determine if there could be any other basis upon which to hold trade union liable for the conduct of its members. The study recommends that the common law doctrine of vicarious liability should be developed by the courts to allow trade unions to be held liable for damages caused by members during violent industrial action. Policy considerations and changing economic conditions and the nature of strikes in the Republic favours the expansion of the doctrine of vicarious liability to trade union member relationship. / Mercantile Law / LL. D.
404

Confidentialité et prévention de la criminalité financière : étude de droit comparé / Confidentialy and financial crime prevention

Bègue, Guillaume 16 June 2016 (has links)
La tendance contemporaine vers plus de transparence dans la vie des affaires illustre une désaffection générale pour toute forme de confidentialité. Toutefois, cette dernière bénéficie de traductions juridiques dont les sources lui confèrent une indéniable légitimité. Cette observation doit amener à reconnaître l'existence d'un "principe de confidentialité". La rencontre des normes sur la prévention de la criminalité financière avec le principe de confidentialité est source d'insécurité juridique, non seulement pour les professionnels assujettis aux obligations de lutte anti-blanchiment et contre le financement du terrorisme, mais également pour tous les individus dont les données son traitées dans ce cadre. Ces deux blocs de normes aux logiques contradictoires tendant pourtant vers des objectifs communs : le respect des droits fondamentaux. Néanmoins, les excès liés à l'utilisation potentiellement illicite des outils juridiques offerts par l'un, et les défauts des dispositions constituant l'autre, font obstacle à l'application efficace et mesurée du droit. Cette étude se propose d'analyser ces principes antagonistes pour mieux envisager leur équilibre latent au moyen de solutions préservant leurs intérêts propres et concourant à l'amélioration de la sécurité juridique. Dans cette optique, l'exercice de droit comparé permet de parfaire l'interprétation des obligations de vigilance tout en plaidant la réhabilitation du principe de confidentialité. Il témoigne de l'émergence d'un véritable "droit du blanchiment", et en particulier de son volet préventif qui occupe désormais une place prépondérante dans le domaine de la régulation bancaire et financière. / The recent trend towards transaprency in business highlights a more global disenchantment with the concept of secrecy. The concept of secrecy benefits from various legal expressions whose origins give it as undisputable legitimacy. This observation leads us to recognise the existence of a "Principle of confidentiality". The clash betxeen the rules of Financial Crime prevention and this principle of confidentiality is causing legal uncertainty not only for professional subject to Anti-money laundering and counter-terrorism financing regulations but also gor persons whose data is being processed. These two sets of conflicting rules nevertheless share a common goal, namely to ensure respect for fundamental rights. Notwithstanding this, both the risk of abuse of legal instruments offered by one set for illegitimate purposes and the shortcomings attached to the other set potentially hinder the efficient and reasonable use of Law. This study aims at analysing antagonistic principles to reach a certain balance by applying solutions which preserve their respective interests and contribute to legal certainty. In this regard, the comparative law analysis helps better interpret customer due diligence measures whilst rehabilitating the arguments in favour of the principle of confidentiality. This shows the development of e genuine AML/CFT Law and in particular its preventive aspects that form a major part of the Banking and Financial Regulations.
405

Robust Optimization of Private Communication in Multi-Antenna Systems / Robuste Optimierung abhörsicherer Kommunikation in Mehrantennensystemen

Wolf, Anne 06 September 2016 (has links) (PDF)
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years. We analyze two physical-layer approaches that can ensure the secret transmission of private information in wireless systems in presence of an eavesdropper. One is the direct transmission of the information to the intended receiver, where the transmitter has to simultaneously ensure the reliability and the secrecy of the information. The other is a two-phase approach, where two legitimated users first agree on a common and secret key, which they use afterwards to encrypt the information before it is transmitted. In this case, the secrecy and the reliability of the transmission are managed separately in the two phases. The secrecy of the transmitted messages mainly depends on reliable information or reasonable and justifiable assumptions about the channel to the potential eavesdropper. Perfect state information about the channel to a passive eavesdropper is not a rational assumption. Thus, we introduce a deterministic model for the uncertainty about this channel, which yields a set of possible eavesdropper channels. We consider the optimization of worst-case rates in systems with multi-antenna Gaussian channels for both approaches. We study which transmit strategy can yield a maximum rate if we assume that the eavesdropper can always observe the corresponding worst-case channel that reduces the achievable rate for the secret transmission to a minimum. For both approaches, we show that the resulting max-min problem over the matrices that describe the multi-antenna system can be reduced to an equivalent problem over the eigenvalues of these matrices. We characterize the optimal resource allocation under a sum power constraint over all antennas and derive waterfilling solutions for the corresponding worst-case channel to the eavesdropper for a constraint on the sum of all channel gains. We show that all rates converge to finite limits for high signal-to-noise ratios (SNR), if we do not restrict the number of antennas for the eavesdropper. These limits are characterized by the quotients of the eigenvalues resulting from the Gramian matrices of both channels. For the low-SNR regime, we observe a rate increase that depends only on the differences of these eigenvalues for the direct-transmission approach. For the key generation approach, there exists no dependence from the eavesdropper channel in this regime. The comparison of both approaches shows that the superiority of an approach over the other mainly depends on the SNR and the quality of the eavesdropper channel. The direct-transmission approach is advantageous for low SNR and comparably bad eavesdropper channels, whereas the key generation approach benefits more from high SNR and comparably good eavesdropper channels. All results are discussed in combination with numerous illustrations. / Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt. In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert. Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert. Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert.
406

SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure

Megahed, Mohamed Helmy Mostafa January 2014 (has links)
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BSs, an adversary can still destroy them. The new BS cannot trust the deployed sensor nodes. Also, previous works lack both the procedures to ensure network reliability and security during BS failure such as storing then sending reports concerning security threats against nodes to the new BS and the procedures to verify the trustworthiness of the deployed sensing nodes. Otherwise, a new WSN must be re-deployed which involves a high cost and requires time for the deployment and setup of the new WSN. In this thesis, we address the problem of reliable recovery from a BS failure by proposing a new security architecture called Surveillance Security (SurvSec). SurvSec continuously monitors the network for security threats and stores data related to node security, detects and authenticates the new BS, and recovers the stored data at the new BS. SurvSec includes encryption for security-related information using an efficient dynamic secret sharing algorithm, where previous work has high computations for dynamic secret sharing. SurvSec includes compromised nodes detection protocol against collaborative work of attackers working at the same time where previous works have been inefficient against collaborative work of attackers working at the same time. SurvSec includes a key management scheme for homogenous WSN, where previous works assume heterogeneous WSN using High-end Sensor Nodes (HSN) which are the best target for the attackers. SurvSec includes efficient encryption architecture against quantum computers with a low time delay for encryption and decryption, where previous works have had high time delay to encrypt and decrypt large data size, where AES-256 has 14 rounds and high delay. SurvSec consists of five components, which are: 1. A Hierarchical Data Storage and Data Recovery System. 2. Security for the Stored Data using a new dynamic secret sharing algorithm. 3. A Compromised-Nodes Detection Algorithm at the first stage. 4. A Hybrid and Dynamic Key Management scheme for homogenous network. 5. Powerful Encryption Architecture for post-quantum computers with low time delay. In this thesis, we introduce six new contributions which are the followings: 1. The development of the new security architecture called Surveillance Security (SurvSec) based on distributed Security Managers (SMs) to enable distributed network security and distributed secure storage. 2. The design of a new dynamic secret sharing algorithm to secure the stored data by using distributed users tables. 3. A new algorithm to detect compromised nodes at the first stage, when a group of attackers capture many legitimate nodes after the base station destruction. This algorithm is designed to be resistant against a group of attackers working at the same time to compromise many legitimate nodes during the base station failure. 4. A hybrid and dynamic key management scheme for homogenous network which is called certificates shared verification key management. 5. A new encryption architecture which is called the spread spectrum encryption architecture SSEA to resist quantum-computers attacks. 6. Hardware implementation of reliable network recovery from BS failure. The description of the new security architecture SurvSec components is done followed by a simulation and analytical study of the proposed solutions to show its performance.
407

L'autonomie de la volonté et ses limites en droit patrimonial de la famille : analyse de droit comparé franco-libanais / The autonomy of the will

Arej-Saade, Nadim 25 July 2013 (has links)
La théorie de l’autonomie de la volonté est une théorie philosophique et juridique ancienne qui intéresse toutes les matières du droit. Elle est comparée par Gounot à « la pierre angulaire de tout l’édifice juridique ».Notre étude porte sur sur le principe d’autonomie de la volonté, ses effets et ses limites en droit patrimonial de la famille. Le droit patrimonial de la famille, qui se trouve à l’intersection du droit des contrats, du droit des biens et du droit de la famille, est concerné de près par cette théorie. Si le mouvement actuel du droit tend vers l’octroiement, aux familles et aux individus, de plus de liberté dans la gestion de leurs biens, se pose alors les questions de savoir quelles sont les limites actuelles a cette théorie après les dernières réformes en France, notamment celle du 23 juin 2006 ? Quels sont les composants actuels de l’ordre public familial ? Et que reste-t-il des anciennes limites et prohibitions ?La comparaison, sous l’angle de l’autonomie de la volonté, de deux systèmes juridiques parents mais différents nous offre une vue plus objective des besoins des familles au Liban et en France.Il s’agit à notre sens de ne plus penser et baser les réformes nécessaires dans chacun de ces deux pays sur la théorie de l’autonomie de la volonté ou sur celle de l’utile et du juste, mais plutôt de penser et baser les réformes nécessaires sur les vrais besoins des familles et des individus selon chaque société. / Autonomy of the will – French-Lebanese comparative law – Autonomy of the will in the patrimonial family law – Autonomy of the will's reach – French patrimonial family law – Lebanese patrimonial family law – Donations in Lebanese law – Donations in French law – Estate law – French estate law – Lebanese estate law – estate law for the non-Muslims in Lebanon – estate law for Muslims in Lebanon – Matrimonial regimes law – French matrimonial regimes law – Lebanese matrimonial regimes law – Change of matrimonial regimes – Marriage – Marriage in France – PACS – Concubinage – Marriage in Lebanon – Religious marriage in Lebanon – Civil marriage in Lebanon – Lebanese personal status – the limits of the autonomy of the will – French estate public order – French matrimonial public order – Lebanese estate public order – Lebanese matrimonial public order – Inheritance reserved portion in French law – Inheritance reserved portion in Lebanese law – Prohibition of pacts on future succession in French law - Prohibition of pacts on future succession in Lebanese law – Gradual end residual donations – Banking secrecy in Lebanon – TRUST – Disguise – Life-insurance – Matrimonial benefits – Irrevocable mandate in Lebanese law – Posthumous mandate – Civil real estate company.
408

Robust Optimization of Private Communication in Multi-Antenna Systems

Wolf, Anne 02 June 2015 (has links)
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years. We analyze two physical-layer approaches that can ensure the secret transmission of private information in wireless systems in presence of an eavesdropper. One is the direct transmission of the information to the intended receiver, where the transmitter has to simultaneously ensure the reliability and the secrecy of the information. The other is a two-phase approach, where two legitimated users first agree on a common and secret key, which they use afterwards to encrypt the information before it is transmitted. In this case, the secrecy and the reliability of the transmission are managed separately in the two phases. The secrecy of the transmitted messages mainly depends on reliable information or reasonable and justifiable assumptions about the channel to the potential eavesdropper. Perfect state information about the channel to a passive eavesdropper is not a rational assumption. Thus, we introduce a deterministic model for the uncertainty about this channel, which yields a set of possible eavesdropper channels. We consider the optimization of worst-case rates in systems with multi-antenna Gaussian channels for both approaches. We study which transmit strategy can yield a maximum rate if we assume that the eavesdropper can always observe the corresponding worst-case channel that reduces the achievable rate for the secret transmission to a minimum. For both approaches, we show that the resulting max-min problem over the matrices that describe the multi-antenna system can be reduced to an equivalent problem over the eigenvalues of these matrices. We characterize the optimal resource allocation under a sum power constraint over all antennas and derive waterfilling solutions for the corresponding worst-case channel to the eavesdropper for a constraint on the sum of all channel gains. We show that all rates converge to finite limits for high signal-to-noise ratios (SNR), if we do not restrict the number of antennas for the eavesdropper. These limits are characterized by the quotients of the eigenvalues resulting from the Gramian matrices of both channels. For the low-SNR regime, we observe a rate increase that depends only on the differences of these eigenvalues for the direct-transmission approach. For the key generation approach, there exists no dependence from the eavesdropper channel in this regime. The comparison of both approaches shows that the superiority of an approach over the other mainly depends on the SNR and the quality of the eavesdropper channel. The direct-transmission approach is advantageous for low SNR and comparably bad eavesdropper channels, whereas the key generation approach benefits more from high SNR and comparably good eavesdropper channels. All results are discussed in combination with numerous illustrations. / Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt. In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert. Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert. Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert.
409

Mirrors And Vanities

Salas, Leslie 01 January 2013 (has links)
Mirrors and Vanities is a multi-modal collection which showcases the diversity of working in long and short storytelling forms. Featured in this thesis are fiction, nonfiction, graphic narrative, and screenplay. Using unconventional approaches to storytelling in order to achieve emotional resonance with the audience while maintaining high standards for craft, these stories and essays explore the costs inherent to the subtle nuances of interpersonal relationships. The fiction focuses on the complications of characters keeping secrets. A husband discovers the truth behind his wife’s miscarriage. A girl visits her fiancé in purgatory. A boy crosses a line and loses his best friend. Meanwhile, the nonfiction centers on self-discovery and gender roles associated with power struggles. A schizophrenic threatens to ruin my mother’s wedding. I rediscover my relationship with my father through food writing. Sword-work teaches me to fail and succeed at making martial art. The title work of the thesis is a collaged story highlighting the tribulations of a physicist fixated on recovering his lost love by manipulating the multiverse. The multi-modal format implicates the nebulosity of physics theories and how different aspects of the narrative can be presented in various formats to best suit the nature of the storytelling. Through the interactions of characters in mundane and extraordinary circumstances, the works in this thesis examine the consequences of choice, the contrast between reality and expectation, coming of age, and the Truth of narrative.
410

Flux internationaux de capitaux et secret bancaire

Keufak Tameze, Hugues Magloire 29 November 2013 (has links)
Symbole de protection des libertés individuelles, le secret bancaire est perçu par les profanes, avec le développement de la criminalité financière transfrontalière, comme étant un élément qui favorise les fraudes, le blanchiment de capitaux, le financement du terrorisme ainsi que l’évasion fiscale. L’analyse juridique de cette institution nous montre qu’elle est l’élément le plus important de la réussite des opérations ayant pour but les flux internationaux de capitaux, et un facteur qui stimule la réussite économique et la mondialisation. La réglementation et la régulation des flux internationaux de fonds par un certain nombre de législations éparses et variées modifie considérablement la notion du secret bancaire. Une des caractéristiques fondamentales de ce bouleversement est qu’il institue des liens entre les différents opérateurs qui interviennent dans le contrat. Le contrôle de cette opération pousse les Etats à mutualiser leurs efforts et à se mettre ensemble en vue de défendre leurs intérêts financiers respectifs à travers la lutte contre les flux de capitaux illicites. Par ailleurs, la défense de ces intérêts financiers entraine incontestablement la redéfinition substantielle des missions du banquier d’une part, notamment sa façon de percevoir la relation avec la clientèle, de recueillir et d’échanger des informations, ainsi que la coopération avec les autorités publiques et de contrôle internes et internationales. D’autre part, on note du fait de cet élargissement de missions du banquier, une extension des risques pénaux à l’égard de ce dernier. Cependant, la dilution du secret bancaire à l’échelle internationale tant pour des nécessités contractuelles, que pour les nécessités de la lutte contre la criminalité entraine des dérives importantes se manifestant à travers le manque de stratégies adaptées permettant d’éviter dangers et de réagir en cas d’atteinte aux droits de l’Homme. D’où la nécessité de redéfinir un nouveau cadre juridique qui permet non seulement de limiter les atteintes au secret bancaire et aux droits de l’Homme, mais aussi, oblige les différents intervenants dans la chaine des transferts internationaux de fonds, «de jouer aux mêmes règles du jeu», d’être tributaires de mêmes droits, et surtout des mêmes obligations. C’est à ce prix et à ce prix seulement, que le secret bancaire pourra être réhabilité en tant qu’institution fondamentale / The regulation of the international flows of fund by a number of scattered and varied legislations modifies considerably the notion of the bank secrecy. One of the fundamental characteristics of this upheaval is that it establishes links between the various operators who intervene in the contract. The control of this operation urges States to mutualize their efforts and to put itself together to defend their respective financial interests through the fight against the illicit capital flows. Besides, the defense of these financial interest conduct unmistakably the substancial redefining of the banker on one hand, in particular the way it perceives the relation with the clientele, of collects and of exchanges information, as well as the cooperation with the public authorities and control internal and international. On the other hand, we note because of this extension of missions of the banker, an extension of the penal risks towards him.

Page generated in 0.0758 seconds