• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 3
  • Tagged with
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Deciphering and Expending Clostridium formicoaceticum Metabolism Based on Whole Genome Sequencing

Bao, Teng January 2016 (has links)
No description available.
2

Deciphering Unwritten Rules : Patients, relatives and nurses in palliative cancer care

Sandgren, Anna January 2010 (has links)
This thesis focuses on palliative cancer care in acute care hospitals and home care settings. The overall aim was to generate a grounded theory explaining the latent patterns of behavior of patients, relatives and nurses. The thesis includes one population-based study with cross-sectional design and four classic grounded theory studies. Study I was conducted in two acute care hospitals. In this 5-year follow-up study, the proportion of hospitalized palliative cancer patients had decreased. The patients were older with more symptoms and care needs per patient. In both years, the most common symptoms were pain and deterioration and the most common cancer sites were prostate and colorectal. The results showed that associations between symptoms, care needs and cancer site were mostly weak. In study II, striving for emotional survival emerged as the pattern of behavior through which nurses in acute care hospitals deal with their main concern, the risk of being emotionally overloaded. Striving for emotional survival involves emotional shielding, emotional processing and emotional postponing. In study III, doing good care emerged as the pattern of behavior through which nurses in home care deal with their main concern, their desire to give good care. Doing good care involves three different caring behaviors: anticipatory caring, momentary caring and stagnated caring.     In study IV, living on hold emerged as the pattern of behavior through which patients and relatives deal with their main concern, being put on hold. Living on hold involves three modes: fighting, adjusting and surrendering. The overall theory, deciphering unwritten rules, explains how patients, relatives and nurses are dealing with the uncertainty of how to act and behave.   Deciphering unwritten rules involves figuring out, deliberating, maneuvering and evaluating. In conclusion, this thesis demonstrates the complexities of palliative cancer care and the importance of knowledge, resources and counseling. Patients should be cared for at the right care level according to their care needs and the care focus should be on treating symptoms irrespective of the diagnosis. The palliative care approach therefore needs to be implemented in all caring contexts with dying people.
3

Rekonstrukce webmailového provozu / Webmail Traffic Reconstruction

Slivka, Miroslav January 2015 (has links)
Webmail applications are very popular these days. Besides typical usage, thanks to ciphered communication, they can be used for malicious activity like confidential data loss. This thesis discusses webmail events detection based on common webmail signatures in captured network traffic. Also there will be discussed SSL/TLS interception and decryption for further data analysis. The modules in this thesis are designed and implemented for Netfox.Framework forensics analysis tool. The Netfox project is developed at FIT BUT under security research project SEC6NET.
4

Mediating between the Religious World and the Masses: Picture Deciphering by the Itinerant Nuns of Kumano

Saka, Chihiro 03 July 2013 (has links)
Kumano bikuni (the Buddhist nuns of Kumano) are itinerant female religious performers who were particularly active between the 16th and 18th centuries in Japan. Travelling across the country, they promoted the syncretic belief of the Kumano mountains, popular pilgrimage sites that have attracted a variety of people regardless of class, gender, and religious affiliation. To raise funds for temples and shrines there, they performed etoki (literally, picture deciphering) that addressed the everyday concerns of the masses, and especially women. Conceptualizing Kumano bikuni as mediators who bridged the religious world and the masses, this thesis examines how Kumano bikuni reflected perspectives of the audience at etoki performance and responded to diverse interests of different groups. / Graduate / 0320 / 0332 / 0453 / chihiro_620@hotmail.com
5

Knihovna algoritmů pro šifrování textu / Library of Algorithms for Text Ciphering

Vozák, Petr January 2011 (has links)
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text ciphering. The presented paper describes at first basic theoretical background of cryptology and basic distribution of cryptographic algorithms. Then it describes a brief history of encryption from beginning to present. Theoretical description of ciphering methods and its implementation details are discussed here. All basic types of conventional encryption algorithms and also some modern ciphering methods are included; these are substitution, transposition, steganographic or combinations encryption systems. The result of this thesis is the library of algorithms for text ciphering in Java with a sample application, which demonstrates its funcionality.
6

Návrh hardwarového šifrovacího modulu / Design of hardware cipher module

Bayer, Tomáš January 2009 (has links)
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective is to make clear the essence of the algorithms’ behavior. When describing some more difficult algorithms the block scheme is added. At the end of each algorithm’s description the example of practical usage is written. The chapter no. five discusses the hardware implementation. Hardware and software implementation is compared from the practical point of view. Several design instruments are described and different hardware design programming languages with their progress, advantages and disadvantages are mentioned. Chapter six discourses the hardware implementation design of chosen ciphers. Concretely the design of stream cipher with pseudo-random sequence generator is designed in VHDL and also in Matlab. As the second design was chosen the block cipher GOST, which was designed in VHDL too. Both designs were tested and verified and then the results were summarized.

Page generated in 0.0832 seconds