• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 4
  • 1
  • 1
  • 1
  • Tagged with
  • 14
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Ventilace tlakové obálky reaktoru GFR / Heat transfer in the pressure cover of the GFR reactor

Koryčanský, Roman January 2014 (has links)
This paper describes the design of the ventilation pressure cover of the demonstrator GFR. The first part is a brief research project GFR and the effects of temperature on the inside structures. In the following part is calculated balance heat losses within the pressure cover for three cases: non-insulated, fully-insulated and partially insulated surface of the reactor. The following is a design of a heat sink for partially insulated surface.
12

Ritual, Sermon, and Prophecy for Bass and Orchestra

Underwood, William L. (William Lee), 1940- 05 1900 (has links)
This composition is a symphonic setting of three original poems within the confines of an expanded sonata-allegro form and is an approximately twenty-two minutes in duration. The three poems are designed with certain cyclic implications which are related formally to the recurrence of musical ideas. The main application of this plan is found in the duality of formal roles assigned to each of the three major sectional divisions of the work. This is an expanded sonata-allegro, but each section (exposition, development, and recapitulation) is enlarged and individualized to the point of becoming a complete movement in itself. Each is intended to have the internal formal capacity to stand alone and at the same time serve as a section part of the whole. Formal unity is established without excessive dependence upon the poems, as both the music and the texts are formally evolved from the principles of sonata-allegro procedures. The poems were written specifically for this musical setting by the composer and are as an integral part of the compositional process itself; however, the poetry is didactic in purpose and is something of a jeremiad. Each poem relates principally to one of three aspects of existence: a ritual of history, a sermon for the present, and a prophecy of the future.
13

In pursuit of a perfect system : Balancing usability and security in computer system development

Matras, Omolara January 2015 (has links)
Our society is dependent on information and the different technologies and artifacts that gives us access to it. However, the technologies we have come to depend on in different aspects of our lives are imperfect and during the past decade, these imperfections have been the target of identity thieves, cyber criminals and malicious persons within and outside the organization. These malicious persons often target networks of organizations such as hospitals, banks and other financial organizations. Access to these networks are often gained by sidestepping security mechanisms of computer-systems connected to the organization’s network. Often, the goal of computer-systems security mechanisms is to prevent or detect threats; or recover from an eventual attack. However, despite huge investments in IT-security infrastructure and Information security, over 95% of banks, hospitals and government agencies have at least 10 malicious infections bypass existing security mechanisms and enter their network without being detected. This has resulted in the loss of valuable information and substantial sums of money from banks and other organizations across the globe. From early research in this area, it has been discovered that the reason why security mechanisms fail is because it is often used incorrectly or not used at all.  Specifically, most users find the security mechanisms on their computers too complicated and they would rather not use it. Therefore, previous research have focused on making computer-systems security usable or simplifying security technology so that they are “less complicated” for all types users, instead of designing computers that are both usable and secure. The problem with this traditional approach is that security is treated as an “add-on” to a finished computer-system design. This study is an attempt to change the traditional approach by adjusting two phases of a computer-system design model to incorporate the collection of usability as well as security requirements. Guided by the exploratory case study research design, I gained new insights into a situation that has shocked security specialists and organizational actors alike. This study resulted in the creation of a methodology for designing usable and secure computer-systems. Although this method is in its rudimentary stage, it was tested using an online questionnaire. Data from the literature study was sorted using a synthesis matrix; and analyzed using qualitative content analysis. Some prominent design and security models and methodologies discussed in this report include User-Centered System Design (UCSD), Appropriate and Effective Guidance for Information Security (AEGIS) and Octave Allegro. / Vårt samhälle är beroende av information och olika tekniker och artefakter som ger oss tillgång till den. Men tekniken vi förlitar oss på i olika aspekter av våra liv är ofullkomliga och under det senaste decenniet, har dessa brister varit föremål för identitetstjuvar, cyberbrottslingar och illvilliga personer inom och utanför organisationen. Dessa illvilliga personer riktar ofta sig till nätverk av organisationer såsom sjukhus, banker och andra finansiella organisationer. Tillgång till dessa nätverk uppnås genom att kringgå säkerhetsmekanismer av datorsystem anslutna till organisationens nätverk.   Målet med datorsystemsäkerhet är att förhindra eller upptäcka hot; eller återhämta sig från eventuella attacker. Trots stora investeringar i IT-säkerhet infrastruktur och informationssäkerhet, över 95 % av banker, sjukhus och myndigheter har minst 10 skadliga infektioner kringgå befintliga säkerhetsmekanismer och träda in i sitt nätverk utan att upptäckas. Detta har lett till förlust av värdefulla informationer och stora summor av pengar från banker och andra organisationer över hela världen. Från tidigare forskning inom detta område, har det visat sig att anledningen till att säkerhetsmekanismer misslyckas beror ofta på att den används på ett felaktigt sätt eller används inte alls. I synnerhet menar de flesta användare att säkerhetsmekanismer på sina datorer är alltför komplicerat. Därför har tidigare forskning fokuserat på att göra datorsystemsäkerhet användbar så att den är "mindre komplicerat" för alla typer av användare, i stället för att designa datorer som både är användbara och säkra. Problemet med detta traditionella synsätt är att säkerheten behandlas som ett "tillägg" till en färdig datorsystemdesign.   Denna studie är ett försök att ändra det traditionella synsättet genom att justera två faser av en datorsystemdesign modell för att integrera insamlingen av användbarhets- samt säkerhetskrav. Styrd av den explorativ fallstudie forskningsdesignen, fick jag nya insikter i en situation som har gäckat säkerhetsspecialister och organisatoriska aktörer. Denna studie resulterade i skapande av en designmetodik för användbara och säkra datorsystem. Även om denna metod är ännu i sin rudimentära fas, testades den med hjälp av en webbenkät. Data från litteraturstudien sorterades med hjälp av en syntesmatris; och analyserades med kvalitativ innehållsanalys. Några framstående design- och säkerhetsmodeller samt metoder som diskuterades i denna uppsats inkludera Användarcentrerad System Design (UCSD), Ändamålsenligt och Effektivt Vägledning för Informationssäkerhet (AEGIS) och Octave Allegro.
14

Rebecca Clarke: A Viola Duo Transcription of the Prelude, Allegro, and Pastorale

Stevens, Daniel Brent 08 1900 (has links)
Throughout centuries of great classical music, many viola compositions have been crafted from a wealth of literature for instruments of similar range. Clarinet, violin, and cello concerti and ensemble literature often adapt into challenging literature for the viola. In November 2009, Oxford Music Publishing gave me permission to transcribe and perform the Prelude, Allegro, and Pastorale by Rebecca Clarke in New York's famed Carnegie Hall - Weill Recital Hall. This dissertation explains the process by which I transcribed the Prelude, Allegro, and Pastorale from an original Bb-clarinet/viola duo, to a new arrangement for two violas (approved by Oxford Music Press arrangement license #7007940), and discusses challenges faced throughout the transcription process.

Page generated in 0.0448 seconds