• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 81
  • 20
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 144
  • 40
  • 33
  • 31
  • 31
  • 23
  • 15
  • 14
  • 11
  • 10
  • 10
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

A woman's good works the life of Inez Jessie Turner Baskin and her fight for civil and human rights in the Cradle of the Confederacy /

Rabey, Jennifer Ann. Carter, David C. January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Includes bibliographic references (p.87-89).
72

Color and credibility Eisenhower, the U.S. Information Agency, and race, 1955-57 /

Grimm, Kevin E. January 2008 (has links)
Thesis (M.A.)--Ohio University, June, 2008. / Title from PDF t.p. Includes bibliographical references.
73

A residential school for the mentally retarded children of Montgomery County, Maryland

Uhrich, Dolores Joan 04 May 2010 (has links)
Master of Science
74

Valeurs centrales et valeurs au bord de la bande critique de fonctions L automorphes / Central Values and Values At the Edge of the Critical Strip of Automorphic L-functions

Xiao, Xuanxuan 06 May 2015 (has links)
Cette thèse, constitué en trois parties, est consacrée à l'étudie des valeurs spéciales de fonctions L automorphes. La première partie contient un survol rapide de la théorie des formes modulaires et des fonctions L de puissance symétrique associées qui est nécessaire dans la suite. Dans la seconde partie, nous nous concentrons sur les valeurs centrales, par l'étude des moments intégraux dans petit intervalle, pour les fonctions L automorphes. On prouve la conjecture de Conrey et al. et donne l'ordre exact pour les moments sous l'hypothèse de Riemann généralisée. La troisième partie présente des travaux sur les valeurs en s=1 de la fonction L de puissance symétrique en l'aspect de niveau-poids. On généralise et/ou améliore les résultats sur l'encadrement de la fonction L de puissance symétrique, la conjecture de Montgomery-Vaughan et également la fonction de répartition. Une application des valeurs extrêmes sur la distribution des coefficients des formes primitives concernant la conjecture de Sato-Tate est donnée / Special values of automorphic L-functions are considered in this work in three parts. In the first part, elementary information about automorphic forms and associated symmetric power L-functions, which will be very useful in the following parts, is introduced. In the second part, we study the central values, in the form of higher moment in short interval, of automorphic L-functions and give a proof for the conjecture of Conrey et al. to get the sharp bound for the moment under Generalized Riemann Hypothesis. In the last part, values of automorphic L-functions at s=1 are considered in level-weight aspect. We generalize and/or improve related early results about the bounds of values at s=1, the Montgomery-Vaughan's conjecture and distribution functions. As an application of our results on extreme values, the distribution of coefficients of primitive forms concerning the Sato-Tate conjecture is studied
75

Stratigraphy and deposition of the Price Formation coals in Montgomery and Pulaski Counties, Virginia

Brown, K. Elizabeth January 1983 (has links)
The conclusion of this investigation, based on field mapping and measured sections, is the Price Formation was deposited on a high-energy shoreline. Sediments for the shoreline were initially transported from a northern deltaic source. The Cloyd Conglomerate Member represents offshore barrier bars, while the Lower Price unit was deposited in a lagoon behind the bars. At the top of the Lower Price unit, the "marker bed" sandstone includes sedimentary features of marine and fluvial origin. This sandstone is interpreted as a delta-front sand, reworked from distributary mouth bars. The Langhorn and Merrimac coal seams were deposited in swamps formed across the sandstone. / Master of Science
76

The British way of war in North West Europe 1944-45 : a study of two infantry divisions

Devine, Louis Paul January 2014 (has links)
This thesis will examine the British way of war as experienced by two British Infantry Divisions - the 43rd ‘Wessex’ and 53rd ‘Welsh’ - during the Overlord campaign in North West Europe in 1944 and 1945. The main locus of research centres on the fighting components of those divisions; the infantry battalions and their supporting regiments. In order to understand the way the British fought this part of the war, the thesis will consider the British Army’s history since 1918: its level of expertise at the end of the First World War; the impact of inter-war changes, and the experience of the early part of the Second World War, as these factors were fundamental in shaping how the British Army operated during the period covered in this study. These themes will be considered in the first chapter. The following seven chapters will study each of the two infantry divisions in turn, to maintain a chronological order. This is so that the experiences of each division can be examined in a logical way, from their initial experiences of combat in late June 1944 through to March 1945. Naturally, their major battles will be considered but so will their minor engagements and day-to-day experiences, as this will give a good, detailed, overview of each division’s campaign. This layout of chapters is also convenient for allowing comparisons between the two divisions as the campaign progressed. This thesis contains several strands of enquiry which will consider how Montgomery’s prosecution of the war actually translated to the smaller units of the division (the battalions, 4 companies, platoons and sections). The historiography for this campaign tends to suggest that the British Army fought the war in a cautious way, and that this approach was characterised by the use of overwhelming material superiority and rehearsed set piece attacks; tactics that were designed not only to destroy the enemy, but also to avoid the heavy casualties of the major battles of the First World War; a factor that was perceived to be vital to the maintenance of fragile infantry morale. Although the basic premise of a ‘cautious’ British way of war is generally accepted (along with its attendant emphasis on consolidation of objectives rather than exploitation of opportunities, and a reliance on adherence to lengthy orders), this study will conclude that the way the war was fought at sub-divisional levels was frequently at a pace that did not allow for such caution. Instead, it was characterised by command pressure to achieve results quickly, hasty planning and a reliance on massive artillery and mortar contributions to compensate for deficiencies in anti-tank and armoured support. This thesis will further conclude that a conscious policy of casualty conservation appears not to have been a priority at divisional command level, but was instead a consideration for company, platoon and section commanders and the men that they led.
77

Suivre Dieu, servir le roi : la noblesse protestante bas-normande, de 1520 au lendemain de la Révocation de l'édit de Nantes / Worship God and serve the King : The Norman protestant Nobility, from 1520 to the abolition of the Edict of Nantes in 1685

Le Touzé, Isabelle 15 September 2012 (has links)
Aux trois moments que constituent d’abord la décennie 1550, temps fort de la conversion nobiliaire au protestantisme, puis le temps des affrontements religieux de 1560 à 1598, et enfin celui de la fondation de l’absolutisme, à quelle fidélité le gentilhomme réformé doit-il consentir en ces temps d’incertitudes où désormais l’unité religieuse n’existe plus ? Obéit-il à une fidélité confessionnelle dictée par sa conscience ou à une exigence politique et relationnelle qui le lie naturellement, et à son seigneur, et à son roi ? Si le noble de foi réformée ne ressent pas au XVIe siècle de contradiction entre les deux sphères, celle du politique et celle du religieux : il n’a pas en effet le sentiment de se couper de son roi, en combattant dans les rangs de l’armée protestante, bien au contraire. Progressivement la distance se creuse vis-à-vis de ces seigneurs, et on perçoit alors l’extrême liberté des attaches politiques qui les lient au chef de parti. Mais la revendication d’une liberté irrépressible n’est rendue possible que par une stratégie mise en place de longue date par ces nobles protestants. Celle-ci repose d’abord et surtout sur une base solide et indéfectible, une nébuleuse d’amis et de parents. La proximité avec l’Angleterre et la Cour d’Elisabeth facilite également cette attitude distancée. Enfin, au XVIIe siècle, elle s’appuie aussi sur le véritable bouclier qu’a pu représenter l’édit de Nantes pour la noblesse ; ce dernier permet l’établissement d’un culte de fief et les protestants nobles chercheront à exploiter tous les ressorts juridiques du texte pour préserver leur foi intacte. Les alliances matrimoniales et l’action des femmes, filles ou épouses, serviront à la consolidation de la foi réformée. Alors que la répression, ciblée sur quelques individus, n’épargne pas le second ordre, certains nobles chercheront à trancher le dilemme soumission par la conversion ou désobéissance par l’exil, en dissociant les deux services, en refusant de choisir entre Dieu et le roi. / The important steps of French nobility: At first, 1550: part of the French nobility chooses to Protestantism. Then, 1560 and 1598: the French Religious Civil Wars. Finally, it was the start of Absolute Monarchy. When the unity of the Faith no longer existed, the choice of the French nobility was either to be faithful to the King or to god. Therefore, there were a gap between the religious faith and the political loyalties to the King. At first, the French nobles kept trusting their King, but a certain misunderstanding started to develop and the nobles gradually chose freedom over their loyalty to the French King. England’s proximity and Elisabeth 1st’s Court help them keep their distance with the King. They could rely on too their friends and family and parents to keep their faith alive, and the Edict of Nantes re-established the French nobility’s civil and religious rights. However the persecution of the Protestant did already start. Therefore many French Protestants nobles chose exile. Otherwise they were banished by the French Kingdom. Some of them hid their real faith, refusing to have to choose between their God and their king.
78

Tackling Jim Crow: Segregation on the College Gridiron Between 1936-1941

Gregg, Kevin Callaway January 2005 (has links)
Thesis advisor: James O'Toole / This thesis examines the extent of Jim Crow segregation in college football in the era immediately preceding World War II by focusing on three black stars: Wilmeth Sidat-Singh of Syracuse, Lou Montgomery of Boston College, and Leonard Bates of New York University. Sidat-Singh was passed off by Syracuse as a Hindu before his real ethnicity was revealed. Montgomery was benched by his Catholic university on six separate occasions, including two bowl games. Bates was the beneficiary of a massive student protest for his inclusion, but ultimately was benched by the supposedly liberal NYU. These benchings of northern players against southern teams shows the degrees the south went to in order to impose segregation on every level of society. Perhaps more importantly it shows how willing northern schools were to acquiesce to these southern demands in favor of expediency. / Thesis (BA) — Boston College, 2005. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: History. / Discipline: College Honors Program.
79

Modular Exponentiation on Reconfigurable Hardware

Blum, Thomas 03 September 1999 (has links)
"It is widely recognized that security issues will play a crucial role in the majority of future computer and communication systems. A central tool for achieving system security are cryptographic algorithms. For performance as well as for physical security reasons, it is often advantageous to realize cryptographic algorithms in hardware. In order to overcome the well-known drawback of reduced flexibility that is associated with traditional ASIC solutions, this contribution proposes arithmetic architectures which are optimized for modern field programmable gate arrays (FPGAs). The proposed architectures perform modular exponentiation with very long integers. This operation is at the heart of many practical public-key algorithms such as RSA and discrete logarithm schemes. We combine two versions of Montgomery modular multiplication algorithm with new systolic array designs which are well suited for FPGA realizations. The first one is based on a radix of two and is capable of processing a variable number of bits per array cell leading to a low cost design. The second design uses a radix of sixteen, resulting in a speed-up of a factor three at the cost of more used resources. The designs are flexible, allowing any choice of operand and modulus. Unlike previous approaches, we systematically implement and compare several versions of our new architecture for different bit lengths. We provide absolute area and timing measures for each architecture on Xilinx XC4000 series FPGAs. As a first practical result we show that it is possible to implement modular exponentiation at secure bit lengths on a single commercially available FPGA. Secondly we present faster processing times than previously reported. The Diffie-Hellman key exchange scheme with a modulus of 1024 bits and an exponent of 160 bits is computed in 1.9 ms. Our fastest design computes a 1024 bit RSA decryption in 3.1 ms when the Chinese remainder theorem is applied. These times are more than ten times faster than any reported software implementation. They also outperform most of the hardware-implementations presented in technical literature."
80

Versatile Montgomery Multiplier Architectures

Gaubatz, Gunnar 30 April 2002 (has links)
Several algorithms for Public Key Cryptography (PKC), such as RSA, Diffie-Hellman, and Elliptic Curve Cryptography, require modular multiplication of very large operands (sizes from 160 to 4096 bits) as their core arithmetic operation. To perform this operation reasonably fast, general purpose processors are not always the best choice. This is why specialized hardware, in the form of cryptographic co-processors, become more attractive. Based upon the analysis of recent publications on hardware design for modular multiplication, this M.S. thesis presents a new architecture that is scalable with respect to word size and pipelining depth. To our knowledge, this is the first time a word based algorithm for Montgomery's method is realized using high-radix bit-parallel multipliers working with two different types of finite fields (unified architecture for GF(p) and GF(2n)). Previous approaches have relied mostly on bit serial multiplication in combination with massive pipelining, or Radix-8 multiplication with the limitation to a single type of finite field. Our approach is centered around the notion that the optimal delay in bit-parallel multipliers grows with logarithmic complexity with respect to the operand size n, O(log3/2 n), while the delay of bit serial implementations grows with linear complexity O(n). Our design has been implemented in VHDL, simulated and synthesized in 0.5μ CMOS technology. The synthesized net list has been verified in back-annotated timing simulations and analyzed in terms of performance and area consumption.

Page generated in 0.0575 seconds