• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 1
  • Tagged with
  • 9
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Edition of Richard Bernard's Ruths Recompence

McAlister, Arlene January 2012 (has links)
This thesis consists of annotations and an introduction which constitute an edition of Richard Bernard’s Ruths Recompence (1628). This edition aims to provide a more modern and accurate (though clarified) text than the nineteenth-century edition edited by Alexander Balloch Grosart (1865). It also sets out to offer a more comprehensive interpretation with an emphasis on a subject prominent in Bernard’s commentary passed over in silence by Grosart, that is, the issues relating to women’s conduct raised by Ruth’s approach to Boaz alone by night in Ruth chapter 3. The text of this edition has been produced by applying Optical Character Recognition to a copy of the 1628 edition in my possession. In presenting the text, an editorial policy has been consistently followed, which is described in the Textual Introduction. The main objective is to reproduce the original as closely as possible at the same time as making the work accessible to the modern reader. In the early modern period much was written about women’s conduct and how they ought to behave. Ruths Recompence provides a specifically puritan perspective on this issue. In the introduction, various kinds of literature about women in the early modern period, such as conduct books and lives of women, are surveyed in order to show the context in which Bernard addressed the conduct of Ruth and Naomi. The editorial framework also analyses Bernard’s developing and to some extent censorious evaluation of the women’s behaviour. Another subject relating to women’s conduct addressed, chiefly in the introduction, is breast-feeding. Bernard’s views are related to those expressed by the preceding commentator on Ruth, Edward Topsell, and by a contemporary woman – the Countess of Lincoln. The editorial framework draws on the work of commentators on Ruth preceding Bernard, in the ancient and medieval as well as the early modern periods. This reference to previous commentators is a significant part of the edition because it shows where Bernard’s views are original. In the introduction biographical information about Bernard himself, in particular, and also the earlier commentators is provided. A tradition of commentaries on Ruth is thus depicted. It is argued that Bernard’s significant contribution to this tradition is his application of his own theory of preaching, set out in his The Faithfull Shepheard (first edition 1607), to Ruths Recompence. The present edition interprets various other aspects of the commentary, in particular, those relating to Bernard’s theological position as a puritan clergyman who was involved with separatism early in his career but later published attacks on separatists and conformed uneasily with the Church of England. In the commentary, he criticises Roman Catholicism, and expresses views on providence, predestination and the Anabaptists. These subjects are commented on in the editorial framework. Other subjects to which this edition draws the reader’s attention include Bernard’s repeated reference to hierarchy in society and his admiration of the simple, primitive legal system depicted in Ruth. The introduction concludes with a glance at modern feminist scholars’ writing on Ruth. The present edition aspires to make a contribution to feminist interpretations of the early modern period, and it can be recognised that many of the feminist features perceived in the biblical narrative by modern scholars are far from the concerns of Bernard, who was in most respects a typically patriarchal clergyman of his time.
2

Presentation of culture in English as a foreign language reading textbooks in Japan

Oguro, Yasue 12 May 2008 (has links)
In the midst of debate over the treatment of culture in foreign language education and the increased exposure to culture in the global economy, the knowledge of other cultures is more significant than ever. In order to improve teaching culture, materials have been examined and revised. The purpose of this exploratory study is to describe how culture is addressed in the fourteen high school EFL reading textbooks in Japan, that were approved by the Ministry of Education, Culture, Sports, Science and Technology (MEXT) at the time of this study. In previous studies on EFL textbooks in Japan by Kitao (1979, 1988) and Iwata, Ogawa, Wen, Sakamoto, Takarada, Horio, Muto, and Mogi (2001) among others, the findings included the cultural elements categorized by various criteria, defining topics and types of reading texts and illustrations, classifying the student activities regarding culture, the descriptions of societies represented, the unnatural use of the English language that are edited for grammatical correctness, and the lack of elements that are usually present in the natural course of conversations or in the authentic passages. This study of the reading passages and pre- and post-reading activities was guided by several theories and studies: First, the authentic use of a language reflects the writer's culture (Brown, 1987; Byrnes, 1990; Gilmore, 2004; Honeyfield, 1977; Kramsch, 1993; Lamie, 1998; McKay, 1982; Shrum & Glisan, 2005; Swaffar, 1985), and the culture is reflected in the vocabulary (Sapir, 1949). Second, the readers' own cultural knowledge (C1) should be activated in understanding the culture of others (C2), comparing and contrasting C1 and C2 so that the differences and similarities will be more evident (Byrnes, 1990; Kolb, 1984; Kramsch, 1993; National Standards in Foreign Language Education Project [NSFLEP], 2005). The results show 1) that the reading passages were edited mostly by deleting and altering portions of the originals, and thus the culture was not present as in the original passages, and 2) pre-reading and post-reading activities/questions were literal and not designed to foster cultural understanding. / Ed. D.
3

Site-Specific Solid-State NMR Studies of the Protein-Water Interface of Anabaena Sensory Rhodopsin

Ritz, Emily 14 September 2012 (has links)
Solid-state NMR spectroscopy was used to site-specifically investigate the protein-water interface of a seven alpha-helical transmembrane protein, Anabaena sensory rhodopsin (ASR). Water-edited experiments, which employ a T2-filter to select for mobile protons, provided a means to detect residues which appear to be in close contact to water molecules, and to gain insights about the water-protein interface of ASR. First, through the application of Lee-Goldburg homonuclear decoupling, it was determined that polarization transfer across this interface is dominated by through-space interaction mechanisms, as opposed to chemical exchange. A series of two-dimensional experiments were also performed to detect polarization transfer along the backbone and to the sidechains of the protein. Residues located in solvent-accessible regions of the protein, such as the B-C loop, were found to obtain polarization quickly, as expected, and in agreement with previous H/D exchange data. Residues known to be in contact with bound crystal water molecules were also detected. In addition to these, we found new residues which appear to be in contact with water, indicating additional HN-H2O interactions, or additional contacts with bound water molecules. Most of these residues were located beside exchangeable regions of ASR. Sidechains of residues located in the cytoplasmic side of helix F were seen to be in close contact with mobile water molecules, supporting evidence of a hydrophilic chain along the cytoplasmic half of the protein, which is suggested to cause a functional outward tilt of the cytoplasmic half of helix F upon light-activation.
4

Modulation of cholera toxin structure and function by host proteins

Burress, Helen 01 January 2014 (has links)
Cholera toxin (CT) moves from the cell surface to the endoplasmic reticulum (ER) where the catalytic CTA1 subunit separates from the holotoxin and unfolds due to its intrinsic thermal instability. Unfolded CTA1 then moves through an ER translocon pore to reach its cytosolic target. Due to the instability of CTA1, it must be actively refolded in the cytosol to achieve the proper conformation for modification of its G protein target. The cytosolic heat shock protein Hsp90 is involved with the ER-to-cytosol translocation of CTA1, yet the mechanistic role of Hsp90 in CTA1 translocation remains unknown. Potential post-translocation roles for Hsp90 in modulating the activity of cytosolic CTA1 are also unknown. Here, we show by isotope-edited Fourier transform infrared (FTIR) spectroscopy that Hsp90 induces a gain-of-structure in disordered CTA1 at physiological temperature. Only the ATP-bound form of Hsp90 interacts with disordered CTA1, and its refolding of CTA1 is dependent upon ATP hydrolysis. In vitro reconstitution of the CTA1 translocation event likewise required ATP hydrolysis by Hsp90. Surface plasmon resonance (SPR) experiments found that Hsp90 does not release CTA1, even after ATP hydrolysis and the return of CTA1 to a folded conformation. The interaction with Hsp90 allowed disordered CTA1 to attain an active state and did not prevent further stimulation of toxin activity by ADP-ribosylation factor 6, a host cofactor for CTA1. This activity is consistent with its role as a chaperone that refolds endogenous cytosolic proteins as part of a foldosome complex consisting of Hsp90, Hop, Hsp40, p23, and Hsc70. A role for Hsc70 in CT intoxication has not yet been established. Here, biophysical, biochemical, and cell-based assays demonstrate Hsp90 and Hsc70 play overlapping roles in the processing of CTA1. Using SPR we determined that Hsp90 and Hsc70 could bind independently to CTA1 at distinct locations with high affinity, even in the absence of the Hop linker. Studies using isotope-edited FTIR spectroscopy found that, like Hsp90, Hsc70 induces a gain-of-structure in unfolded CTA1. The interaction between CTA1 and Hsc70 is essential for intoxication, as an RNAi-induced loss of the Hsc70 protein generates a toxin-resistant phenotype. Further analysis using isotope-edited FTIR spectroscopy demonstrated that the addition of both Hsc70 and Hsp90 to unfolded CTA1 produced a gain-of-structure above that of the individual chaperones. Our data suggest that CTA1 translocation involves a ratchet mechanism which couples the Hsp90-mediated refolding of CTA1 with extraction from the ER. The subsequent binding of Hsc70 further refolds CTA1 in a manner not previously observed in foldosome complex formation. The interaction of CTA1 with these chaperones is essential to intoxication and this work elucidates details of the intoxication process not previously known.
5

In Vitro Characterization of Unmodified and Pyroglutamylated Alzheimer's Amyloid beta peptide

Matos, Jason 01 January 2014 (has links)
Plaques of amyloid β peptide (Aβ) are a hallmark trait of Alzheimer’s disease (AD). However, the precise role of Aβ aggregates is not well understood. Recent studies have identified that naturally occurring N-terminal truncation and pyroglutamylation of Aβ significantly increases its neurotoxicity by an unknown mechanism. Content of pyroglutamylated Aβ (pE-Aβ) in AD brains has been shown to reach up to 50% of total Aβ. Modified pE-Aβ co-aggregates with Aβ by a seeding mechanism and forms structurally distinct and highly toxic oligomers. We studied structural transitions of the full-length Aβ1-42, its pyroglutamylated form AβpE3-42, their 9:1 (Aβ1-42/AβpE3-42) and 1:1 molar combinations. Transmission electron microscopy was used to directly visualize the fibrils of the samples in a buffer mimicking physiological environment. Atomic force microscopy measurements were done to determine rate of second nucleation events in fibrils. Thioflavin-T fluorescence indicated that low ionic strength suppressed the aggregation of AβpE3-42 but promoted that of Aβ1-42, suggesting different paths of fibrillogenesis of unmodified Aβ and pE- Aβ. Interestingly, AβpE3-42 at only 10% significantly facilitated the fibrillization of Aβ1-42 at near-physiological ionic strength but had little effect at low salt. Circular dichroism and Fourier transform infrared (FTIR) spectroscopy were used to characterize the structural transitions during fibrillogenesis. In aqueous buffer, both unmodified Aβ and pE-Aβ peptides adopted parallel intermolecular β-structure. Interestingly, AβpE3-42 contained lower β-sheet content than 13C-Aβ1-42, while retaining significantly larger fractions of α-helical and turn structures. Structural details of Aβ and pE-Aβ combinations were unveiled by isotope-edited FTIR spectroscopy, using 13C-labeled Aβ1-42 and unlabeled AβpE3-42. When exposed to environmental humidity, AβpE3-42 not only maintained an increased fraction of α-helix but also was able to reverse 13C-Aβ1-42 β-sheet structure. These data provide a novel structural mechanism for pE-Aβ hypertoxicity; pE-Aβ undergoes faster nucleation due to its increased hydrophobicity, thus promoting formation of smaller, hypertoxic oligomers of partial α-helical structure.
6

New NMR methods for mixture analysis

Hernandez Cid, Aaron January 2017 (has links)
This thesis is focussed on the investigation of matrices for matrix-assisted diffusion-ordered spectroscopy (MAD). Diffusion-ordered spectroscopy (DOSY) is a family of experiments where the resonances in the chemical shift dimension are further dispersed in an extra dimension according to diffusion coefficient. A typical DOSY spectrum shows one single diffusion coefficient for all the resonances coming from one single species. However, If two or more resonances overlap, the diffusion resolution of the DOSY spectrum is compromised and a spurious diffusion coefficient results, intermediate between the species. In case of signal overlap, the use of more advanced processing methods aids to separate two analytes that differ by at least 30% in diffusion coefficient. In practice, many mixtures contain species of similar diffusion coefficients whose resonances overlap in the chemical shift dimension. The addition of co-solutes can modify the chemical environment (matrix), with which different analytes interact to different extents, and enhance the diffusion resolution of DOSY. However, the addition of co-solutes can risk the benefits of DOSY by increasing the probability of signal overlap. Signal overlap in MAD is avoided by using a 1H NMR-invisible surfactant such as sodium perfluorooctanoate (NaPFO), which has replaced each proton by a fluorine atom. PFO micelles are a tunable matrix which allows the separation of analytes via coulombic interactions by adjusting the pH. Differences in diffusion coefficient in NaPFO solution can be analysed using a modified Lindman's law to model the diffusion coefficient as a function of pH. The model rationalises the binding constants of analytes to PFO micelles with good accuracy, subject to the spectral data quality. Another alternative to resolve diffusion coefficients using the invisible MAD approach is by means of a commercially available alkyl surfactant like cetyltrimethylammonium bromide (CTAB). CTAB in high ionic strength solution forms worm-like micelles whose resonances can be filtered out from the final DOSY spectrum. CTAB worm-like micelles have short transverse relaxation times compared to all of the analytes in the mixture. If a transverse relaxation filter is positioned at the beginning of a standard DOSY pulse sequence, as in PROJECT-Oneshot, the strong CTAB signals vanish and leave behind only the analyte resonances and hence avoid signal overlap. Finally, the use of bovine serum albumin (BSA) as a potential invisible matrix, using a similar approach to CTAB worm-like micelles is investigated, using a relaxation-weighted DOSY pulse sequence to suppress most of the BSA background signal (at a cost in analyte signal to noise ratio). An alternative to suppress most of the BSA background and preserve most of the analyte signal is by means of mild transverse relaxation filtration and spectral editing to obtain an edited DOSY spectrum that shows only the analyte signals. Nonetheless, it is a shame that useful MAD results can only be obtained under a narrow set of conditions: i) different mole ratios BSA: analyte to aid diffusion resolution, ii) mild T2 filtration to improve analyte signal to noise ratio and iii) spectral editing to remove residual BSA background.
7

The art of post-truth in quantum cryptography

Zafar Jafarzadeh, Sara 01 1900 (has links)
L’établissement de clé quantique (abrégé QKD en anglais) permet à deux participants distants, Alice et Bob, d’établir une clé secrète commune (mais aléatoire) qui est connue uniquement de ces deux personnes (c’est-à-dire inconnue d’Ève et de tout autre tiers parti). La clé secrète partagée est inconditionnellement privée et peut être plus tard utilisée, par Alice et Bob, pour transmettre des messages en toute confidentialité, par exemple sous la forme d’un masque jetable. Le protocole d’établissement de clé quantique garantit la confidentialité inconditionnelle du message en présence d’un adversaire (Ève) limité uniquement par les lois de la mécanique quantique, et qui ne peut agir sur l’information que se partagent Alice et Bob que lors de son transit à travers des canaux classiques et quantiques. Mais que se passe-t-il lorsque Ève a le pouvoir supplémentaire de contraindre Alice et/ou Bob à révéler toute information, jusqu’alors gardée secrète, générée lors de l’exécution (réussie) du protocole d’établissement de clé quantique (éventuellement suite à la transmission entre Alice et Bob d’un ou plusieurs messages chiffrés classique à l’aide de cette clé), de manière à ce qu’Ève puisse reproduire l’entièreté du protocole et retrouver la clé (et donc aussi le message qu’elle a chiffré) ? Alice et Bob peuvent-ils nier la création de la clé de manière plausible en révélant des informations mensongères pour qu’Ève aboutisse sur une fausse clé ? Les protocoles d’établissement de clé quantiques peuvent-ils tels quels garantir la possibilité du doute raisonnable ? Dans cette thèse, c’est sur cette énigme que nous nous penchons. Dans le reste de ce document, nous empruntons le point de vue de la théorie de l’information pour analyser la possibilité du doute raisonnable lors de l’application de protocoles d’établissement de clé quantiques. Nous formalisons rigoureusement différents types et degrés de doute raisonnable en fonction de quel participant est contraint de révéler la clé, de ce que l’adversaire peut demander, de la taille de l’ensemble de fausses clés qu’Alice et Bob peuvent prétendre établir, de quand les parties doivent décider de la ou des clés fictives, de quelle est la tolérance d’Ève aux événements moins probables, et du recours ou non à des hypothèses de calcul. Nous définissons ensuite rigoureusement une classe générale de protocoles d’établissement de clé quantiques, basée sur un canal quantique presque parfait, et prouvons que tout protocole d’établissement de clé quantique appartenant à cette classe satisfait la définition la plus générale de doute raisonnable : à savoir, le doute raisonnable universel. Nous en fournissons quelques exemples. Ensuite, nous proposons un protocole hybride selon lequel tout protocole QKD peut être au plus existentiellement déniable. De plus, nous définissons une vaste classe de protocoles d’établissement de clé quantiques, que nous appelons préparation et mesure, et prouvons l’impossibilité d’instiller lors de ceux-ci tout degré de doute raisonnable. Ensuite, nous proposons une variante du protocole, que nous appelons préparation et mesure floues qui offre un certain niveau de doute raisonnable lorsque Ève est juste. Par la suite, nous proposons un protocole hybride en vertu duquel tout protocole d’établissement de clé quantique ne peut offrir au mieux que l’option de doute raisonnable existentiel. Finalement, nous proposons une variante du protocole, que nous appelons mono-déniable qui est seulement Alice déniable ou Bob déniable (mais pas les deux). / Quantum Key Establishment (QKD) enables two distant parties Alice and Bob to establish a common random secret key known only to the two of them (i.e., unknown to Eve and anyone else). The common secret key is information-theoretically secure. Later, Alice and Bob may use this key to transmit messages securely, for example as a one-time pad. The QKD protocol guarantees the confidentiality of the key from an information-theoretic perspective against an adversary Eve who is only limited by the laws of quantum theory and can act only on the signals as they pass through the classical and quantum channels. But what if Eve has the extra power to coerce Alice and/or Bob after the successful execution of the QKD protocol forcing either both or only one of them to reveal all their private information (possibly also after one or several (classical) ciphertexts encrypted with that key have been transmitted between Alice and Bob) then Eve could go through the protocol and obtain the key (hence also the message)? Can Alice and Bob deny establishment of the key plausibly by revealing fake private information and hence also a fake key? Do QKD protocols guarantee deniability for free in this case? In this Thesis, we investigate this conundrum. In the rest of this document, we take an information-theoretic perspective on deniability in quantum key establishment protocols. We rigorously formalize different levels and flavours of deniability depending on which party is coerced, what the adversary may ask, what is the size of the fake set that surreptitious parties can pretend to be established, when the parties should decide on the fake key(s), and what is the coercer’s tolerance to less likely events and possibly also computational assumptions. We then rigorously define a general class of QKD protocols, based on an almost-perfect quantum channel, and prove that any QKD protocol that belongs to this class satisfies the most general flavour of deniability, i.e.,universal deniability. Moreover, we define a broad class of QKD protocols, which we call prepare-and-measure, and prove that these protocols are not deniable in any level or flavour. Moreover, we define a class of QKD protocols, which we refer to as fuzzy prepare-andmeasure, that provides a certain level of deniability conditioned on Eve being fair. Furthermore, we propose a hybrid protocol under which any QKD protocol can be at most existentially deniable. Finally, we define a class of QKD protocols, which we refer to as mono-deniable, which is either Alice or Bob (but not both) deniable.
8

A Conductor's Guide to Lionel Daunais's Figures de danse

Murray, Brian C. (Brian Clark) 05 1900 (has links)
Lionel Daunais was an eminent and beloved 20th-century Québécois musician who contributed greatly to the performing arts in Canada. Through his work with the Trio Lyrique, Les Variétés Lyriques, and his numerous compositions, he wielded a potent sphere of influence on the Canadian musical landscape. Lionel Daunais's compositions constitute a significant oeuvre, comprising solo vocal works, song cycles, folksong arrangements, individual choral works, and multi-movement choral works. Marked by irresistible wit, the melodicism of French mélodie, and the absolute eminence of the text, Figures de danse is his most well-known multi-movement choral work. Daunais penned the earliest extant version of Figures de danse in 1947, however, the work emerged into Québec's choral scene in the mid-1970s via the establishment of the Alliance des Chorales du Québec. This set of tragicomic caricatures, which sets beautiful choral and piano writing to clever—and sometimes hilariously nonsensical—texts by Daunais himself, is accessible for performance by youth choirs, community choirs, university choirs, and professional choirs alike. Unfortunately, various factors (e.g. the separation of the choral and piano scores, local references, and score errors) often stymie its performance. The purpose of this dissertation is to ameliorate these challenges via a conductor's guide and to advocate for the performance of Daunais's chef-d'oeuvre.
9

An examination of major works for wind band: “National emblem march” by Edwin Eugene Bagley ed. by Frederick Fennell, “On an American spiritual” by David Holsinger, “Portraits” by Jim Colonna, “Serenade, Op. 22 (c)” by Derek Bourgeois.

Bistline, Michael E. January 1900 (has links)
Master of Music / Department of Music / Frank C. Tracz / The following report is an in depth research and analysis project based on the graduation requirement for a Masters in Music Degree from Kansas State University. The product of this project was a conducting recital performed by Michael E. Bistline with the Union High School Concert Band. This performance was held on May 5, 2009 in Matt Auditorium at Union High School. The repertoire included National Emblem March by E.E. Bagley/edited by Frederick Fennell, On An American Spiritual by David Holsinger, Portraits by Jim Colonna, and Serenade Op. 22 (c) by Derek Bourgeois. The theoretical, historical and technical analyses of this project was collected using the Unit of the Teacher Resource Guide, developed by Richard Miles and the Macro, Micro, Macro score analysis form developed by Dr. Frank Tracz. This report also includes documentation of the planning and evaluation of each rehearsal.

Page generated in 0.0536 seconds