Spelling suggestions: "subject:"nonoctave"" "subject:"gnuoctave""
21 |
La représentation des femmes dans l’œuvre romanesque et théâtrale d’Octave Mirbeau / The feminine figure in Octave Mirbeau’s novels and playsRodrígues Suárez, Lisa 24 February 2016 (has links)
Cette thèse a pour objet d’étudier le rapport entre la réalité objective des femmes au XIXe siècle et la représentation qu’en donne Octave Mirbeau dans ses œuvres romanesques et théâtrales. L’analyse se divise en trois parties, qui étudient le sujet en partant des aspects les plus concrets de l’écriture de Mirbeau et en allant vers les plus allégoriques. La première partie, intitulée « la femme, entre réalisme et caricature », analyse le degré de réalisme présent dans la construction des personnages féminins, en prenant appui sur différents critères de classification (les catégories sociales, les relations au sein du couple, les transgressions). La deuxième partie, intitulée « Une entreprise de mythification ? », analyse les influences scientifiques, littéraires et philosophiques prégnantes à la fin du XIXe siècle et qui constituent le contexte culturel dans lequel baigne l’écrivain. La troisième partie, « une entreprise symbolique plaçant la femme au cœur des combats politiques de Mirbeau » est un dépassement des questions évoquées précédemment, analysant la création d’un type novateur de féminité. Le but de cette troisième partie est de montrer que la femme incarne une valeur ambivalente, tantôt symbole de la société corrompue, tantôt symbole de liberté et de résistance à cette corruption. Le monde a beaucoup changé ces dernières années et en conclusion des aspects contemporains de la pensée de Mirbeau seront abordés, ainsi que la dimension postmoderne de son univers. / The purpose of this thesis is to study the link between the feminine figure in Octave Mirbeau’s novels and plays and the whole meaning of his work (in particular its political aiming). The key question to be answered is : Is the feminine figure a mimetic representation of the objective reality of late nineteenth century women or does it have a deeper meaning ? The analysis is divided into three parts, and evolves from the most objective to the most symbolic. The first part, entitled « The woman, between realism and caricature » is aimed to analyse the degree of realism that can be found in the construction of feminine figures. In the second part, entitled « A mystification process ? », a further aim is to bring understanging to the influences (scientific, literal and philosofical) that had an impact upon most of the writers in the end of the nineteenth century and Mirbeau in particular, even though his work always remains very personal. The third part, « A symbolic construction placing the woman at the core of Mirbeau’s political fights » goes beyond the questions studied before and analyses how Mirbeau managed to create a new kind of feminity. The objective of this third part is to show that the woman embodies an ambivalente value in Mirbeau’s work, and is at the same time a symbol of the corrupted society and a symbol of freedom and resistance to this same corruption. In recent years, the world has changed a lot and the conclusion of the study is focused on the contemporary aspects of Mirbeau’s world, as well as on the postmodern dimension of his universe.
|
22 |
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case StudyKeating, Corland Gordon 01 January 2014 (has links)
An information system (IS) risk assessment is an important part of any successful security management strategy. Risk assessments help organizations to identify mission-critical IS assets and prioritize risk mitigation efforts. Many risk assessment methodologies, however, are complex and can only be completed successfully by highly qualified and experienced security experts. Small-sized organizations, including small-sized colleges and universities, due to their financial constraints and lack of IS security expertise, are challenged to conduct a risk assessment. Therefore, most small-sized colleges and universities do not perform IS risk assessments, which leaves the institution's data vulnerable to security incursions. The negative consequences of a security breach at these institutions can include a decline in the institution's reputation, loss of financial revenue, and exposure to lawsuits.
The goal of this research is to address the challenge of conducting IS risk assessments in small-sized colleges and universities by validating the use of the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro risk assessment methodology at a small-sized university. OCTAVE Allegro is a streamlined risk assessment method created by Carnegie Mellon University's Software Engineering Institute. OCTAVE Allegro has the ability to provide robust risk assessment results, with a relatively small investment in time and resources, even for those organizations that do not have extensive risk management expertise.
The successful use of OCTAVE Allegro was validated using a case study that documented the process and outcome of conducting a risk assessment at George Fox University (GFU), a small-sized, private university located in Newberg, Oregon. GFU has the typical constraints of other small-sized universities; it has a relatively small information technology staff with limited expertise in conducting IS risk assessments and lacks a dedicated IS risk manager. Nevertheless, OCTAVE Allegro was relatively easy for GFU staff to understand, provided GFU with the ability to document the security requirements of their IS assets, helped to identify and evaluate IS security concerns, and provided an objective way to prioritize IS security projects. Thus, this research validates that OCTAVE Allegro is an appropriate and effective IS risk assessment method for small-sized colleges and universities.
|
23 |
Modelo de gestión de riesgos de seguridad de la información para pymes en el Perú / Information security risk management model for Peruvian SMEsGarcía Porras, Johari Chris, Huamani Pastor, Sarita Cecilia 18 June 2019 (has links)
Actualmente, toda empresa debería tener el conocimiento de qué tan importante es y cómo debe tratarse la información para su negocio, ya que es uno de sus activos más importante. Lamentablemente, no todas tienen claro su valor, exponiéndose a grandes pérdidas. Según un estudio de EY, el 41% de empresas consideran que poseen probidades mínimas para detectar un ataque sofisticado. El motivo principal son las restricciones presupuestarias y la falta de recursos especializados.
Para proteger la información, las empresas deben determinar su exposición al riesgo, lo recomendable es emplear metodologías, marcos de referencia o estándares de análisis de riesgo de seguridad de la información. Este proyecto consiste en implementar un modelo de gestión de riesgos de seguridad de la información para Pymes, integrando la metodología OCTAVE-S y la norma ISO/IEC 27005. Se abarca el análisis de las metodologías y normas de gestión de riesgos, el diseño del modelo de gestión de riesgos de seguridad de la información, la validación del modelo en una Pyme en el proceso de ventas.
La integración proporciona una identificación oportuna y eficaz de los riesgos del enfoque cualitativo y permite aprovechar los valores identificados para los activos del enfoque cuantitativo. Asimismo, permite identificar los principales riesgos valorizándolos, para luego proceder a un tratamiento de acuerdo a las necesidades de la empresa. Se espera que este modelo ayude en la gestión de riesgos de seguridad de la información dentro de las Pymes, para poder reducir el impacto de riesgos a los que pueden estar expuestas. / Nowadays, every company should be aware of the importance and the way business information should be treated since it is one of their most important assets. Unfortunately, not all are sure about their actual value, and so, they may be exposed to large losses. According to EY, 41% of companies consider that they have minimum probabilities to detect a sophisticated attack. The main reason that hinders the effectiveness of information security is due to budgetary restrictions and the lack of specialized resources.
To protect the information, companies must determine their risk exposure, for which it’s advisable to use methodologies, reference frameworks or standards for information security risk analysis. This project consists on implementing an information security risk management model for SMEs, integrating the OCTAVE-S methodology and the ISO/IEC 27005 standard. This covers the analysis of methodologies and risk management standards, the design of the information security risk management model, the validation of the model in a SME in the sales process.
This integration provides a timely and effective identification of the risks of the qualitative approach and makes it possible to take advantage of the values identified for the assets of the quantitative approach. Furthermore, this allows identifying the main information security risks by rating and treating them according to the needs of the company. It’s expected that this model will help in the management of information security risks within SMEs, in order to reduce the impact of risks to which they may be exposed. / Tesis
|
24 |
Geometric Tolerancing of Cylindricity Utilizing Support Vector RegressionLee, Keun Joo 01 January 2009 (has links)
In the age where quick turn around time and high speed manufacturing methods are becoming more important, quality assurance is a consistent bottleneck in production. With the development of cheap and fast computer hardware, it has become viable to use machine vision for the collection of data points from a machined part. The generation of these large sample points have necessitated a need for a comprehensive algorithm that will be able to provide accurate results while being computationally efficient. Current established methods are least-squares (LSQ) and non-linear programming (NLP). The LSQ method is often deemed too inaccurate and is prone to providing bad results, while the NLP method is computationally taxing. A novel method of using support vector regression (SVR) to solve the NP-hard problem of cylindricity of machined parts is proposed. This method was evaluated against LSQ and NLP in both accuracy and CPU processing time. An open-source, user-modifiable programming package was developed to test the model. Analysis of test results show the novel SVR algorithm to be a viable alternative in exploring different methods of cylindricity in real-world manufacturing.
|
25 |
Instalace a konfigurace Octave výpočetního clusteru / Installation and configuration of Octave computation clusterMikulka, Zdeněk January 2014 (has links)
This diploma thesis contains detailed design of high-performance cluster, primarely focused for parallel computing in Octave application. Each of component of this cluster is described along with instructions for installation and configuration. Cluster is based on GNU/Linux operating system and Message Parsing Interface. Design alllows implementation of this cluster in computers of schoolroom with active lessons.
|
26 |
Proposed Revisions to Procedures for Testing and Evaluating Radiating Noise Sources from Small Firearms, including the ANSI/ASA S12.42-2010 ProcedureSarray, Sadreddine 26 May 2020 (has links)
The escalating cost of claims for Noise Induced Hearing Loss (NIHL) in the Canadian Armed Forces (CAF) supports the need to review and upgrade current hearing conservation practices.
The rise of these escalating costs and the need to protect the military personnel when training in extreme noise conditions has initiated an engineering investigation within the Department of National Defence (DND) and in collaboration with the University of Ottawa, to review the existing standards in the field of hearing protection test and evaluation, to propose technical recommendations and to identify the possible technical problems and gaps impacting the quality of the existing procedures.
This study dealt with the estimation of the protection capability of Hearing Protection Devices (HPDs) in the case of high-level impulse noise from small firearms weapons that are a particularly damaging source of noise in military environments, representing an important cause of NIHL.
Testing and evaluation based on a system engineering approach have been used in this work introducing:
- A new testing approach, based on ANSI/ASA S12.42-2010, for testing HPDs when the impulse noise is generated by a small firearm; - A new evaluation approach for HPD performance, introducing a characterization approach using a sub-band analysis for dealing with impulse noise generated by a small firearm.
The effectiveness of HPDs, taking into account the physiological human limitations induced by Bone Conduction (BC), is computed by using an innovative method attempting to better prevent the risk of NIHL when using small firearms.
|
27 |
Instalace a konfigurace Octave výpočetního clusteru / Installation and configuration of Octave computation clusterMikulka, Zdeněk January 2014 (has links)
This diploma thesis contains detailed design of high-performance cluster, primarely focused for parallel computing in Octave application. Each of component of this cluster is described along with instructions for installation and configuration. Cluster is based on GNU/Linux operating system and Message Parsing Interface. Design alllows implementation of this cluster in computers of schoolroom with active lessons.
|
28 |
Real-Time Video Object Detection with Temporal Feature AggregationChen, Meihong 05 October 2021 (has links)
In recent years, various high-performance networks have been proposed for single-image object detection. An obvious choice is to design a video detection network based on state-of-the-art single-image detectors. However, video object detection is still challenging due to the lower quality of individual frames in a video, and hence the need to include temporal information for high-quality detection results. In this thesis, we design a novel interleaved architecture combining a 2D convolutional network and a 3D temporal network. We utilize Yolov3 as the base detector. To explore inter-frame information, we propose feature aggregation based on a temporal network. Our temporal network utilizes Appearance-preserving 3D convolution (AP3D) for extracting aligned features in the temporal dimension. Our multi-scale detector and multi-scale temporal network communicate at each scale and also across scales. The number of inputs of our temporal network can be either 4, 8, or 16 frames in this thesis and correspondingly we name our temporal network TemporalNet-4, TemporalNet-8 and TemporalNet-16. Our approach achieves 77.1\% mAP (mean Average Precision) on ImageNet VID 2017 dataset with TemporalNet-4, where TemporalNet-16 achieves 80.9\% mAP which is a competitive result on this video object detection benchmark. Our network is also real-time with a running time of 35ms/frame.
|
29 |
The Effect of Octave and Timbre Combinations on Undergraduate Band Members' Perception of PitchSteinbrunner, Clinton M. 28 August 2019 (has links)
No description available.
|
30 |
Taking Notes: Generating Twelve-Tone Music with MathematicsMolder, Nathan 01 May 2019 (has links) (PDF)
There has often been a connection between music and mathematics. The world of musical composition is full of combinations of orderings of different musical notes, each of which has different sound quality, length, and em phasis. One of the more intricate composition styles is twelve-tone music, where twelve unique notes (up to octave isomorphism) must be used before they can be repeated. In this thesis, we aim to show multiple ways in which mathematics can be used directly to compose twelve-tone musical scores.
|
Page generated in 0.033 seconds