• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 27
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Heterogeneous Multiscale Change-Point Inference and its Application to Ion Channel Recordings

Pein, Florian 20 October 2017 (has links)
No description available.
22

Alokace karotenoidů a redoxní homeostáza u ptáků / Carotenoid allocation and redox homeostasis in birds

Mojžišová, Kateřina January 2015 (has links)
In many species carotenoid-based ornaments plays fundamental role in sexual selection. It is believed that carotenoid-based ornaments act as indicators of individual quality and condition during mate-choice, as associations between their expression, individual fintess and various condition indicators were observed. Despite the long-term research, mechanisms ensuring signalling honesty remain unknown. Currently, the most accepted hypothesis suggests antioxidant properties of carotenoids, and, therefore, a trade-off between their allocation to ornamentation or defence against free radicals. The antioxidant function of carotenoids in vivo was challenged in birds, however, and alternative hypotheses were proposed, assuming either carotenoid loss due to free-radical oxidation, or harmful (pro- oxidant) effects of high carotenoid levels in the body, or interconnection of metabolic pathways for both, the carotenoid conversion and homeostatic control of mitochondrial respiration and redox state. These hypotheses assume differing allocation of carotenoids under elevated oxidative stress, which we tested using experimental manipulations of oxidative state and carotenoid intake in adult male zebra finches (Taeniopygia guttata). The results are inconsistent with all the alternative hypotheses, but partly...
23

Signaling and Communication in the Breeding Behavior of the Lesser Prairie-Chicken (Tympanuchus pallidicinctus)

Gould, Geoffrey Michael January 2020 (has links)
No description available.
24

Salesiánský preventivní systém a skauting / The Salesian Preventive System and Scouting

MUSIL, Jan January 2012 (has links)
The thesis compares two educational systems: the Salesian preventive system of John Bosco and Scouting. It presents the personality of the founders, than characterizes the recipients, mission, principles, aims, methods and tools of these educational systems. This comparison focuses on the moral values, virtues and value attitudes advenced by the systems. The thesis looks for elements which the two education systems sharediffer in and attempts to highlight those elements which could be mutually inspirative in the pursuit of the ideal of integral education of a young person.
25

Construction of Secure and Efficient Private Set Intersection Protocol

Kumar, Vikas January 2013 (has links) (PDF)
Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client) learns the intersection while other party (server) learns nothing. Motivated by some interesting practical applications, several provably secure and efficient PSI protocols have appeared in the literature in recent past. Some of the proposed solutions are secure in the honest-but-curious (HbC) model while the others are secure in the (stronger) malicious model. Security in the latter is traditionally achieved by following the classical approach of attaching a zero knowledge proof of knowledge (ZKPoK) (and/or using the so-called cut-and-choose technique). These approaches prevent the parties from deviating from normal protocol execution, albeit with significant computational overhead and increased complexity in the security argument, which includes incase of ZKPoK, knowledge extraction through rewinding. We critically investigate a subset of the existing protocols. Our study reveals some interesting points about the so-called provable security guarantee of some of the proposed solutions. Surprisingly, we point out some gaps in the security argument of several protocols. We also discuss an attack on a protocol when executed multiple times between the same client and server. The attack, in fact, indicates some limitation in the existing security definition of PSI. On the positive side, we show how to correct the security argument for the above mentioned protocols and show that in the HbC model the security can be based on some standard computational assumption like RSA and Gap Diffie-Hellman problem. For a protocol, we give improved version of that protocol and prove security in the HbC model under standard computational assumption. For the malicious model, we construct two PSI protocols using deterministic blind signatures i.e., Boldyreva’s blind signature and Chaum’s blind signature, which do not involve ZKPoK or cut-and-choose technique. Chaum’s blind signature gives a new protocol in the RSA setting and Boldyreva’s blind signature gives protocol in gap Diffie-Hellman setting which is quite similar to an existing protocol but it is efficient and does not involve ZKPoK.
26

´Wissenskleptomanie` - Plagiat ist eine Straftat

Toro, Alfonso de 28 October 2022 (has links)
Plagiate nenne ich „Wissenskleptomanie“, weil sie auf der Tagesordnung sind und die Art und Weisen lässt sich an Dreistigkeit, Unverfrorenheit und Schamlosigkeit kaum noch übertreffen. Die Kunst des Plagiats beginnt bereits im Studium beim Verfassen von Seminar- und Abschlussarbeiten. Die Verrohung der akademischen ehrlichen Praxis ist durch Raffinesse, sehr überlegte und höchst bewusste Vorgehensweisen. Obwohl das Plagiat eine Straftat darstellt, werden die Plagiatsmethoden immer perfider, obwohl das korrekte Zitieren den Studierenden seit Jahrzehnten an allen seriösen Instituten deutscher Universitäten beigebracht wird. Von einer Kultur der Ehrlichkeit ist man massiv zu einer „Plagiatsunkultur“ bzw. zu einer „Plagiatskultur“, mit „Doppelplagiaten“ und „Fortgesetztenplagiaten“ übergegangen. Es werden mögliche Gründe der Plagiatskultur, wie mangende Aufsicht und Kompetenz von Betreuern:innen, Fachgutachter:innen, Promotionskommissionen und Fakultäten, beschrieben. Letztlich sind die Sitten soweit runter Gefahren, dass Plagiate nicht nur der Gesellschaft nicht interessieren, sondern auch den Fakultäten. / I call plagiarism “knowledge kleptomania” because it is the order of the day and the ways and means can hardly be surpassed in audacity, impudence and shamelessness. The art of plagiarism begins at university when writing seminar papers and theses. The rutalization of academic honest practice is through sophistication, very deliberate and highly conscious procedures. Although plagiarism is a criminal offence, plagiarism methods are becoming more and more perfidious, even though correct citation has been taught to students for decades at all reputable institutes of German universities. There has been a massive shift from a culture of honesty to a “plagiarism unculture” or a “plagiarism culture”, with “double plagiarism” and “continued plagiarism”. Possible reasons for the culture of plagiarism are described, such as a lack of supervision and competence on the part of supervisors, peer reviewers, doctoral committees and faculties. Ultimately, the mores are so far down that plagiarism is not only of no interest to society, but also to the faculties. / Llamo al plagio 'cleptomanía del conocimiento' porque está a la orden del día y los modos y maneras difícilmente pueden ser superados en audacia, descaro y desvergüenza. El arte del plagio comienza en la universidad cuando se escriben trabajos de seminario y tesis. El embrutecimiento de la práctica de la honestidad académica se realiza mediante procedimientos sofisticados, muy deliberados y muy conscientes. Aunque el plagio es un delito penal, los métodos de plagio son cada vez más pérfidos, a pesar de que la citación correcta se enseña a los estudiantes desde hace décadas en todos los institutos reputados de las universidades alemanas. Se ha pasado de una cultura de la honestidad a una 'incultura del plagio' o a una 'cultura del plagio', con el 'doble plagio' y el 'plagio continuado'. Se describen las posibles razones de la cultura del plagio, como la falta de supervisión y competencia por parte de los supervisores, los revisores, los comités de doctorado y las facultades. Al final, las costumbres han bajado tanto que el plagio no sólo no interesa a la sociedad, sino tampoco a las facultades. / J’appelle le plagiat « kleptomanie du savoir » parce qu’il est à l’ordre du jour et que la manière dont il est commis ne peut guère être surpassée en termes d’audace, d’insolence et d’impudeur. L’art du plagiat commence dès les études, lors de la rédaction des travaux de séminaire et de fin d’études. La brutalisation de la pratique académique honnête est due à la sophistication, à des procédés très réfléchis et hautement conscients. Bien que le plagiat soit un délit, les méthodes de plagiat sont de plus en plus perfides, bien que la citation correcte soit enseignée aux étudiants depuis des décennies dans tous les instituts sérieux des universités allemandes. D’une culture de l’honnêteté, on est passé massivement à une « inculture du plagiat » ou à une « culture du plagiat », avec des « plagiats doubles » et des « plagiats continus ». Les raisons possibles de la culture du plagiat, comme le manque de surveillance et de compétence des directeurs de thèse, des experts, des commissions de promotion et des facultés, sont décrites. En fin de compte, les mœurs ont tellement baissé que le plagiat n’intéresse pas seulement la société, mais aussi les facultés.
27

Information on a default time : Brownian bridges on a stochastic intervals and enlargement of filtrations / Information sur le temps de défaut : ponts browniens sur des intervalles stochastiques et grossissement de filtrations

Bedini, Matteo 12 October 2012 (has links)
Dans ce travail de thèse le processus d'information concernant un instant de défaut τ dans un modèle de risque de crédit est décrit par un pont brownien sur l'intervalle stochastique [0, τ]. Un tel processus de pont est caractérisé comme plus adapté dans la modélisation que le modèle classique considérant l'indicatrice I[0,τ]. Après l'étude des formules de Bayes associées, cette approche de modélisation de l'information concernant le temps de défaut est reliée avec d'autres informations sur le marché financier. Ceci est fait à l'aide de la théorie du grossissement de filtration, où la filtration générée par le processus d'information est élargie par la filtration de référence décrivant d'autres informations n'étant pas directement liées avec le défaut. Une attention particulière est consacrée à la classification du temps de défaut par rapport à la filtration minimale mais également à la filtration élargie. Des conditions suffisantes, sous lesquelles τ est totalement inaccessible, sont discutées, mais également un exemple est donné dans lequel τ évite les temps d'arrêt, est totalement inaccessible par rapport à la filtration minimale et prévisible par rapport à la filtration élargie. Enfin, des contrats financiers comme, par exemple, des obligations privée et des crédits default swaps, sont étudiés dans le contexte décrit ci-dessus. / In this PhD thesis the information process concerning a default time τ in a credit risk model is described by a Brownian bridge over the random time interval [0, τ]. Such a bridge process is characterised as to be a more adapted model than the classical one considering the indicator function I[0,τ]. After the study of related Bayes formulas, this approach of modelling information concerning the default time is related with other financial information. This is done with the help of the theory of enlargement of filtration, where the filtration generated by the information process is enlarged with a reference filtration modelling other information not directly associated with the default. A particular attention is paid to the classification of the default time with respect to the minimal filtration but also with respect to the enlarged filtration. Sufficient conditions under which τ is totally inaccessible are discussed, but also an example is given of a τ avoiding the stopping times of the reference filtration, which is totally inaccessible with respect to its own filtration and predictable with respect to the enlarged filtration. Finally, common financial contracts like defaultable bonds and credit default swaps are considered in the above described settings.

Page generated in 0.0569 seconds