• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 53
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 120
  • 26
  • 26
  • 25
  • 24
  • 24
  • 18
  • 16
  • 15
  • 13
  • 11
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Estudo de reações nucleares de interesse astrofísico utilizando o método do cavalo de tróia / Study of nuclear reactions of astrophysics interest through the trojan horse method

Santo, Marcelo Gimenez Del 10 February 2009 (has links)
A Astrofísica Nuclear é a chave para explicar, entre outras coisas, a produção de energia nas estrelas, a evolução estelar e a síntese de elementos químicos e seus isótopos no Universo. Nesses casos, as reações nucleares formam a estrutura principal, cujas seções de choque e taxas de reação precisam ser determinadas com bastante precisão em laboratório. Devido às condições extremas encontradas nas estrelas, o entendimento dos processos nucleares que ocorrem em seus interiores se tornaram um grande desafio para os físicos nucleares teóricos e experimentais. Nos últimos 40 anos, os físicos vem medindo as taxas dessas reações, porém, as incertezas nesses valores são altas em razão das dificuldades experimentais encontradas nas medidas de seção de choque de processos que ocorrem em energias extremamente baixas (região do pico de Gamow). Desta forma, apenas em alguns casos é possível medir diretamente a seção de choque e o comportamento em baixas energias é geralmente extrapolado da região de energias mais altas. Para evitar o procedimento da extrapolação, alguns métodos indiretos estão sendo 5 usados com sucesso nos últimos anos. Em particular, o método do Cavalo de Tróia permite obter o fator astrofísico S(E) de reações nucleares envolvendo partículas carregadas a baixas energias sem necessidade de extrapolação e sem o efeito da blindagem eletrônica. As reações 10B(p,a)7Be e 11B(p,a)8Be são as principais responsáveis pela queima do boro em estrelas do grupo F e G da sequência principal. As respectivas seções de choque já foram obtidas em experimentos diretos anteriores, porém, os dados não chegam na região do pico de Gamow e o comportamento do fator astrofísico é extrapolado de energias mais altas. Neste trabalho, obteve-se o fator astrofísico S(E) das reações 10B(p,a)7Be e 11B(p,a)8Be através do método indireto do Cavalo de Tróia (THM) aplicado às reações de três corpos 2H(10B,a7Be)n e 2H(11B,a8Be)n sem necessidade de extrapolação. O fator astrofísico obtido por meio do THM para a reação 10B(p,a)7Be é duas vezes menor na região do pico de Gamow comparado com estudos diretos anteriores. Para a reação 11B(p,a)8Be foram estudados separadamente os canais a0 e a1 e o fator astrofísico obtido por meio do THM está de acordo com os estudos diretos anteriores. / Nuclear Astrophysics is the key to explain, among other things, the production of energy in stars, stellar evolution and the synthesis of chemical elements and isotopes in the Universe. In such cases, nuclear reactions are the main structure, where cross sections and reaction rates must be determined with reasonable accuracy in the laboratory. Because the extreme conditions found in stars, the understanding of nuclear processes that occur in their interiors have become a big challenge for theoretical and experimental nuclear physicists. In the last 40 years, physicists are getting the rates of these reactions but the uncertainty in these values are high due to difficulties found in the experimental cross section measurements at very low energies (Gamow peak region). Thus, only in some cases it is possible to measure directly the cross section and the behavior at low energies is usually extrapolated from the region of higher energy. To avoid the procedure of extrapolation, some indirect methods are being used successfully in recent years. In particular, the Trojan Horse Method gives the Astrophysics 7 S(E) factor of nuclear reactions involving charged particles at low energies without extrapolation and without electron screening effects. The reactions 10B(p,a)7Be and 11B(p,a)8Be are the main responsible for the burning process of boron inside F and G main sequence stars. The cross sections of these reactions have been obtained in previous direct experiments, but the data did not reach the Gamow peak and the behavior of the S(E) factor is then extrapolated from higher energies. In this work, we extract the S(E) factor for the reactions 10B(p,a)7Be and 11B(p,a)8Be through the indirect Trojan Horse Method (THM) applied to the three body reactions 2H(10B,a7Be)n e 2H(11B,a8Be)n without extrapolation. The astrophysical S(E)-factor for the 10B(p,a)7Be reaction was extracted by means of the THM and it is a factor 2 less in the Gamow peak if compared with previous direct studies. For the 11B(p,a)8Be reaction both a0 e a1 channels were studied by means of the THM and the astrophysical S(E)-factor extracted is in good agreement with direct previous studies.
82

The indebtedness of Chaucer's Troilus and Criseyde to Guido delle Colonne's Historia trojana

Hamilton, George L. January 1903 (has links)
Thesis (Ph. D.)--Columbia University, 1903.
83

The indebtedness of Chaucer's Troilus and Criseyde to Guido delle Colonne's Historia trojana

Hamilton, George L. January 1903 (has links)
Thesis (Ph. D.)--Columbia University, 1903.
84

Techniques de Test Pour la Détection de Chevaux de Troie Matériels en Circuits Intégrés de Systèmes Sécurisés / Testing Techniques for Detection of Hardware Trojans in Integrated Circuits of Trusted Systems

Acunha guimarães, Leonel 01 December 2017 (has links)
La mondialisation et la déverticalisation des métiers du semi-conducteur a mené cette industrie à sous-traiter certaines étapes de conception et souvent la totalité de la fabrication. Au cours de ces étapes, les circuits intégrés (CIs) sont vulnérables à des altérations malignes : les chevaux de Troie matériels (HTs). Dans les applications sécuritaires, il est important de garantir que les circuits intégrés utilisés ne soient pas altérés par de tels dispositifs. Afin d'offrir un niveau de confiance élevé dans ces circuits, il est nécessaire de développer de nouvelles techniques de test pour détecter les HTs, aussi légers et furtifs soient-ils. Cette thèse étudie les menaces et propose deux approches originales de test post-fabrication pour détecter des HTs implantés après synthèse. La première technique exploite des capteurs de courant incorporés au substrat (BBICS), originalement conçus pour identifier les défauts transitoires dans les CIs. Dans notre cas, ils fournissent une signature numérique obtenue par analyse statistique permettant de détecter tout éventuel HT, même au niveau dopant. La deuxième proposition est une méthode non intrusive pour détecter les HTs dans les circuits asynchrones. Cette technique utilise la plateforme de test du circuit et ne requiert aucun matériel supplémentaire. Elle permet la détection de HTs dont la surface est inférieure à 1% de celle du circuit. Les méthodes et les techniques-,- mises au point dans cette thèse-,- contribuent donc à réduire la vulnérabilité des CIs aux HTs soit par adjonction d'un capteur (BBICS), soit en exploitant les mécanismes de test s'il s'agit de circuits asynchrones. / The world globalization has led the semiconductor industry to outsource design and fabrication phases, making integrated circuits (ICs) potentially more vulnerable to malicious modifications at design or fabrication time: the hardware Trojans (HTs). New efficient testing techniques are thus required to disclose potential slight and stealth HTs, and to ensure trusted devices. This thesis studies possible threats and proposes two new post-silicon testing techniques able to detect HTs implanted after the generation of the IC netlist. The first proposed technique exploits bulk built-in current sensors (BBICS) -- which are originally designed to identify transient faults in ICs -- by using them as testing mechanisms that provide statistically-comparable digital signatures of the devices under test. With only 16 IC samples, the testing technique can detect dopant-level Trojans of zero-area overhead. The second proposition is a non-intrusive technique for detection of gate-level HTs in asynchronous circuits. With this technique, neither additional hardware nor alterations on the original test set-up are required to detect Trojans smaller than 1% of the original circuit. The studies and techniques devised in this thesis contribute to reduce the IC vulnerability to HT, reusing testing mechanisms and keeping security features of original devices.
85

La lutte contre la cybercriminalité au regard de l’action des États / The fight against cyber crime under state action

Boos, Romain 09 December 2016 (has links)
Le XXIe siècle voit la consécration des technologies numériques comme la fin du Moyen Âge a vu celle de l’imprimerie. L’ère numérique ignore désormais toutes les frontières. Elle permet l’accès à la culture et à la connaissance, favorise les échanges entre les personnes. Elle rend possible la constitution d’une économie en ligne et rapproche le citoyen de son administration. Les technologies numériques sont porteuses d’innovation et de croissance, en même temps qu’elles peuvent aider ou accélérer le développement des pays émergents. Mais un certain pessimisme vient tempérer cette approche idéaliste. Tous les progrès génèrent aussi de nouvelles fragilités et vulnérabilités propices aux menaces ou aux risques, car ils aiguisent l’imagination des criminels. La cybercriminalité est désormais une réalité. Elle est d’autant plus dangereuse qu’elle pénètre au sein des familles, là où la délinquance ordinaire n’avait pas accès jusqu’à présent. Dès lors, cette nouvelle forme de criminalité laisse apparaître comme une évidence, l'adaptation du système judiciaire. En effet, face à ces atteintes, il existe bel et bien des lois qui sont d'ores et déjà appliquées à l’Internet. Mais sont-elles réellement efficaces ? Dans le même sens, la coopération interétatique est-elle également suffisante pour lutter efficacement contre la cybercriminalité ? Ainsi, il importe de se demander si dans notre société moderne, le cadre normatif et la coopération institutionnelle tant européenne qu'internationale, sont suffisants et efficaces pour sanctionner les infractions cybercriminelles ? / The twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences.
86

Estudo de reações nucleares de interesse astrofísico utilizando o método do cavalo de tróia / Study of nuclear reactions of astrophysics interest through the trojan horse method

Marcelo Gimenez Del Santo 10 February 2009 (has links)
A Astrofísica Nuclear é a chave para explicar, entre outras coisas, a produção de energia nas estrelas, a evolução estelar e a síntese de elementos químicos e seus isótopos no Universo. Nesses casos, as reações nucleares formam a estrutura principal, cujas seções de choque e taxas de reação precisam ser determinadas com bastante precisão em laboratório. Devido às condições extremas encontradas nas estrelas, o entendimento dos processos nucleares que ocorrem em seus interiores se tornaram um grande desafio para os físicos nucleares teóricos e experimentais. Nos últimos 40 anos, os físicos vem medindo as taxas dessas reações, porém, as incertezas nesses valores são altas em razão das dificuldades experimentais encontradas nas medidas de seção de choque de processos que ocorrem em energias extremamente baixas (região do pico de Gamow). Desta forma, apenas em alguns casos é possível medir diretamente a seção de choque e o comportamento em baixas energias é geralmente extrapolado da região de energias mais altas. Para evitar o procedimento da extrapolação, alguns métodos indiretos estão sendo 5 usados com sucesso nos últimos anos. Em particular, o método do Cavalo de Tróia permite obter o fator astrofísico S(E) de reações nucleares envolvendo partículas carregadas a baixas energias sem necessidade de extrapolação e sem o efeito da blindagem eletrônica. As reações 10B(p,a)7Be e 11B(p,a)8Be são as principais responsáveis pela queima do boro em estrelas do grupo F e G da sequência principal. As respectivas seções de choque já foram obtidas em experimentos diretos anteriores, porém, os dados não chegam na região do pico de Gamow e o comportamento do fator astrofísico é extrapolado de energias mais altas. Neste trabalho, obteve-se o fator astrofísico S(E) das reações 10B(p,a)7Be e 11B(p,a)8Be através do método indireto do Cavalo de Tróia (THM) aplicado às reações de três corpos 2H(10B,a7Be)n e 2H(11B,a8Be)n sem necessidade de extrapolação. O fator astrofísico obtido por meio do THM para a reação 10B(p,a)7Be é duas vezes menor na região do pico de Gamow comparado com estudos diretos anteriores. Para a reação 11B(p,a)8Be foram estudados separadamente os canais a0 e a1 e o fator astrofísico obtido por meio do THM está de acordo com os estudos diretos anteriores. / Nuclear Astrophysics is the key to explain, among other things, the production of energy in stars, stellar evolution and the synthesis of chemical elements and isotopes in the Universe. In such cases, nuclear reactions are the main structure, where cross sections and reaction rates must be determined with reasonable accuracy in the laboratory. Because the extreme conditions found in stars, the understanding of nuclear processes that occur in their interiors have become a big challenge for theoretical and experimental nuclear physicists. In the last 40 years, physicists are getting the rates of these reactions but the uncertainty in these values are high due to difficulties found in the experimental cross section measurements at very low energies (Gamow peak region). Thus, only in some cases it is possible to measure directly the cross section and the behavior at low energies is usually extrapolated from the region of higher energy. To avoid the procedure of extrapolation, some indirect methods are being used successfully in recent years. In particular, the Trojan Horse Method gives the Astrophysics 7 S(E) factor of nuclear reactions involving charged particles at low energies without extrapolation and without electron screening effects. The reactions 10B(p,a)7Be and 11B(p,a)8Be are the main responsible for the burning process of boron inside F and G main sequence stars. The cross sections of these reactions have been obtained in previous direct experiments, but the data did not reach the Gamow peak and the behavior of the S(E) factor is then extrapolated from higher energies. In this work, we extract the S(E) factor for the reactions 10B(p,a)7Be and 11B(p,a)8Be through the indirect Trojan Horse Method (THM) applied to the three body reactions 2H(10B,a7Be)n e 2H(11B,a8Be)n without extrapolation. The astrophysical S(E)-factor for the 10B(p,a)7Be reaction was extracted by means of the THM and it is a factor 2 less in the Gamow peak if compared with previous direct studies. For the 11B(p,a)8Be reaction both a0 e a1 channels were studied by means of the THM and the astrophysical S(E)-factor extracted is in good agreement with direct previous studies.
87

Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems

Dubell, Michael, Johansson, David January 2013 (has links)
Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet. I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket. Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt. Slutsatsen är att endast brandväggar och antivirusprogram inte ger ett fullgott skydd.
88

Utilisation de la stratégie du cheval de Troie pour lutter contre Pseudomonas aeruginosa : synthèses et propriétés biologiques de conjugués sidérophores-antibiotiques / Use of the Trojan horse strategy against Pseudomonas aeruginosa : syntheses and biological properties of siderophore-antibiotic conjugates

Paulen, Aurélie 07 April 2017 (has links)
La découverte de stratégies thérapeutiques innovantes contre les bactéries pathogènes est cruciale. Le fer est essentiel pour la prolifération bactérienne et les bactéries pathogènes excrètent des molécules organiques de faible poids moléculaire, appelées sidérophores, pour acquérir le fer(III). Les systèmes d’acquisition de fer sidérophores-dépendants sont transmembranaires et peuvent être utilisés comme des portes d’entrée pour faire pénétrer des conjugués sidérophores-antibiotiques dans la bactérie dans le cadre d’une stratégie dite du cheval de Troie. Nous avons synthétisé des conjugués constitués d’analogues des sidérophores pyochéline, aminochéline ou azotochéline couplés à des oxazolidinones antibiotiques. Dans la majorité de nos approches la liaison entre le sidérophore et l’antibiotique est le résultat d’une réaction de chimie click. La synthèse et les propriétés biologiques des vecteurs et des conjugués synthétisés sont présentées dans ce manuscrit. / Constant discovery of innovative therapeutic strategies against pathogenic bacteria is crucial. Iron is essential for bacterial proliferation since it is integrated in the active site of essential enzymes. Many pathogenic bacteria excrete low molecular weight secondary metabolites called siderophores in order to promote iron (III) acquisition. Transmembrane siderophore-dependent iron uptake systems can be used as gates by siderophore-antibiotic conjugates. In this context, we synthesized conjugates between analogs of pyochelin, aminochelin or azotochelin with oxazolidinones antibiotics. In this project many of the conjugation between vectors and antibiotics were the result of click chemistry reactions even the use of peptidic bonds was also explored. Synthesis and biological properties of conjugates and vectors are presented in this manuscript.
89

Progress and economy: the clash of values over Oregon's Trojan Nuclear Plant

Nipper, Gregory 01 January 2005 (has links)
From 1976 to 1992 Portland General Electric (PGE) -- a private utility based in Portland, Oregon -- operated the Trojan Nuclear Plant near Rainier, Oregon, on the bank of the Columbia River. Trojan was the first commercial nuclear facility in the Pacific Northwest and was the largest such facility in U.S. history. From its origins, Trojan was the focus of growing conflict over atomic energy facilities and their environmental effects, risks, and costs. This thesis traces the history of Trojan, including the conditions in which PGE decided to build the plant as well as the changing conditions in which the environmental movement in Oregon worked to impact the operation of Trojan and the development of further atomic energy facilities in the region. Two sets of values, largely endemic to the region, came into conflict in the debate over Trojan: one which valued preservation of vital natural systems over all else, and another that elevated technological progress to supreme importance in achieving the ultimate social good. Supporters of Trojan and anti-nuclear activists both viewed misinformation about nuclear power as one of the central problems in the way that Oregon residents viewed nuclear power. Although there were many loyal supporters of Trojan, particularly in Columbia County, there were also a great number who viewed the technology cautiously. While both PGE and nuclear opponents worked diligently to sway public opinion, many activists did so by attempting to uncover and publicize hidden information about the design and operation of Trojan, and the nuclear fuel cycle in general. This included efforts throughout the plant's lifetime to develop opportunities for intervention in administrative proceedings, government hearings, and other arenas which often discourage citizen involvement. Related to the public debate over Trojan were ongoing operational difficulties and changing economic conditions, which contributed to the decision PGE announced in 1993 that Trojan would be permanently shut down. This study is based primarily on coverage from newspapers and periodicals, new and extant oral history interviews, documents from the personal files of activists, as well as various archival materials associated with PGE, activist groups, and government agencies.
90

Hardware Security and VLSI Design Optimization

Xue, Hao January 2018 (has links)
No description available.

Page generated in 0.0376 seconds