• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 235
  • 176
  • 110
  • 50
  • 25
  • 16
  • 10
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 747
  • 262
  • 173
  • 156
  • 154
  • 94
  • 81
  • 80
  • 78
  • 73
  • 64
  • 57
  • 52
  • 49
  • 47
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
721

Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security / Pile-ou-face et mise-en-gage de bit quantique : bornes optimales, constructions pratiques et sécurité calculatoire

Chailloux, André 24 June 2011 (has links)
L'avènement de l'informatique quantique permet de réétudier les primitives cryptographiques avec une sécurité inconditionnelle, c'est à dire sécurisé même contre des adversaires tout puissants. En 1984, Bennett et Brassard ont construit un protocole quantique de distribution de clé. Dans ce protocole, deux joueurs Alice et Bob coopèrent pour partager une clé secrète inconnue d'une tierce personne Eve. Ce protocole a une sécurité inconditionnelle et n'a pasd'équivalent classique.Dans ma thèse, j'ai étudié les primitives cryptographiques à deux joueurs où ces joueurs ne se font pas confiance. J'étudie principalement le pile ou face quantique et la mise-en-gage quantique de bit. En informatique classique, ces primitivessont réalisables uniquement avec des hypothèses calculatoires, c'est-à-dire en supposant la difficulté d'un problème donné. Des protocoles quantiques ont été construits pour ces primitives où un adversaire peut tricher avec une probabilité constante strictement inférieure à 1, ce qui reste impossible classiquement. Néanmoins, Lo et Chau ont montré l'impossibilité de créer ces primitives parfaitement même en utilisant l'informatique quantique. Il reste donc à déterminer quelles sont les limites physiques de ces primitives.Dans une première partie, je construis un protocole quantique de pile ou face où chaque joueur peut tricher avec probabilité au plus 1/racine(2) + eps pour tout eps > 0. Ce résultat complète un résultat de Kitaev qui dit que dans un jeu de pile ou face quantique, un joueur peut toujours tricher avec probabilité au moins 1/racine(2). J'ai également construit un protocole de mise-en-gage de bit quantique optimal où un joueur peut tricher avec probabilité au plus 0,739 + eps pour tout eps > 0 puis ai montré que ce protocole est en fait optimal. Finalement, j'ai dérivé des bornes inférieures et supérieures pour une autre primitive: la transmission inconsciente, qui est une primitive universelle.Dans une deuxième partie, j'intègre certains aspects pratiques dans ces protocoles. Parfois les appareils de mesure ne donnent aucun résultat, ce sont les pertes dans la mesure. Je construis un protocole de lancer de pièce quantique tolérant aux pertes avec une probabilité de tricher de 0,859. Ensuite, j'étudie le modèle dispositif-indépendant où on ne suppose plus rien sur les appareils de mesure et de création d'état quantique.Finalement, dans une troisième partie, j'étudie ces primitives cryptographiques avec un sécurité computationnelle. En particulier, je fais le lien entre la mise en gage de bit quantique et les protocoles zero-knowledge quantiques. / Quantum computing allows us to revisit the study of quantum cryptographic primitives with information theoretic security. In 1984, Bennett and Brassard presented a protocol of quantum key distribution. In this protocol, Alice and Bob cooperate in order to share a common secret key k, which has to be unknown for a third party that has access to the communication channel. They showed how to perform this task quantumly with an information theoretic security; which is impossible classically.In my thesis, I study cryptographic primitives with two players that do not trust each other. I study mainly coin flipping and bit commitment. Classically, both these primitives are impossible classically with information theoretic security. Quantum protocols for these primitives where constructed where cheating players could cheat with probability stricly smaller than 1. However, Lo, Chau and Mayers showed that these primitives are impossible to achieve perfectly even quantumly if one requires information theoretic security. I study to what extent imperfect protocols can be done in this setting.In the first part, I construct a quantum coin flipping protocol with cheating probabitlity of 1/root(2) + eps for any eps > 0. This completes a result by Kitaev who showed that in any quantum coin flipping protocol, one of the players can cheat with probability at least 1/root(2). I also constructed a quantum bit commitment protocol with cheating probability 0.739 + eps for any eps > 0 and showed that this protocol is essentially optimal. I also derived some upper and lower bounds for quantum oblivious transfer, which is a universal cryptographic primitive.In the second part, I study some practical aspects related to these primitives. I take into account losses than can occur when measuring a quantum state. I construct a Quantum Coin Flipping and Quantum Bit Commitment protocols which are loss-tolerant and have cheating probabilities of 0.859. I also construct these primitives in the device independent model, where the players do not trust their quantum device. Finally, in the third part, I study these cryptographic primitives with information theoretic security. More precisely, I study the relationship between computational quantum bit commitment and quantum zero-knowledge protocols.
722

Microstructural and chemical behaviour of irradiated graphite waste under repository conditions

Hagos, Bereket Abrha January 2013 (has links)
A procedure to evaluate the leaching properties of radionuclides from irradiated graphite waste has been developed by combining ANSI 16.1 (USA) and NEN 7345 (Netherlands) standardised diffusion leaching techniques. The ANSI 16.1 standard has been followed to the acquire the leachates and to determine the leach rate/ diffusion coefficient and NEN 7345 standard technique has been used to determine the diffusion mechanism of radionuclides. The investigation employs simulated Drigg groundwater as a leachant using semi-dynamic technique for the production of leachate specimens. From gamma spectroscopy analysis the principal radionuclides present in terms of activity were 60Co, 137Cs, 134Cs, 155Eu, 133Ba and 46Sc. The dominant radionuclides are 60Co, 134Cs and 133Ba which together account for about 91 % of the total activity. The 91 % can be broken down into 73.4 % 60Co, 9.1 % 134Cs and 8.1 % 133Ba. Analysis of total beta and total beta without tritium activity release from Magnox graphite was measured using liquid scintillating counting. Preliminary results show that there is an initial high release of activity and decreases when the leaching period increases. This may be due to the depletion of contaminants which were absorbed by the internal pore networks and the surface. During the leaching test approximately 275.33 ± 18.20 Bq of 3H and 106.26 ± 7.01 Bq of 14C was released into the leachant within 91 days. Irradiation induced damages to the nuclear graphite crystal structure have been shown to cause disruption of the bonding across the basal planes. Moreover, the closures of Mrozowski cracks have been observed in nuclear graphite, the bulk property are governed by the porosity, in particular, at the nanometre scale. Therefore, knowledge of the crystallite structure and porosity distribution is very important; as it will assist in understand the affects of irradiated damage and location and the mechanism of the leaching of radionuclides. The work reported herein contributed several key findings to the international work on graphite leaching to offer guidance leading toward obtaining leaching data in the future: (a) the effective diffusion coefficient for 14C from graphite waste has been determined. The diffusion process for 14C has two stages resulting two different values of diffusion coefficient, i.e., for the fast and slow components; (b) the controlling leaching mechanism for 3H radionuclide from graphite is shown to be surface wash–off; and for that of 14C radionuclide the initial controlling leaching mechanism is surface wash-off following by diffusion which is the major transport mechanism ; (c) The weight loss originates from the open pore structure which has been opened up by radiolytic oxidation; at the higher weight losses much of the closed porosity in the graphite has been opened. The investigation indicates that weigh loss has a major influence on the leaching of elements from the irradiated graphite; and (d) the analysis of the pores in nuclear graphite can be categorised into three types. These three types of pores are: (1) small pores narrow which are slit-shaped pores in the binder phase or matrix, (2) gas evolution pores or gas entrapment pores within the binder phase or matrix and (3) lenticular pores which are large cracks within the filler particles. It is shown in this thesis that by using tomography to study the morphology of the different pores coupled with the distribution of impurities an understanding of the role of porosity in leaching is possible.
723

Two-player interaction in quantum computing : cryptographic primitives & query complexity / Interaction à deux joueurs en informatique quantique : primitives cryptographiques et complexité en requêtes

Magnin, Loïck 05 December 2011 (has links)
Cette thèse étudie deux aspects d'interaction entre deux joueurs dans le modèle du calcul et de la communication quantique.Premièrement, elle étudie deux primitives cryptographiques quantiques, des briques de base pour construire des protocoles cryptographiques complexes entre deux joueurs, comme par exemple un protocole d'identification. La première primitive est la ``mise en gage quantique". Cette primitive ne peut pas être réalisée de manière inconditionnellement sûre, mais il possible d'avoir une sécurité lorsque les deux parties sont soumis à certaines contraintes additionnelles. Nous étudions cette primitive dans le cas où les deux joueurs sont limités à l'utilisation d'états et d'opération gaussiennes, un sous-ensemble de la physique quantique central en optique, donc parfaitement adapté pour la communication via fibres optiques. Nous montrons que cette restriction ne permet malheureusement pas la réalisation de la mise en gage sûre. Pour parvenir à ce résultat, nous introduisons la notion de purification intrinsèque, qui permet de contourner l'utilisation du théorème de Uhlman, en particulier dans le cas gaussien. Nous examinons ensuite une primitive cryptographique plus faible, le ``tirage faible à pile ou face'', dans le modèle standard du calcul quantique. Carlos Mochon a donné une preuve d'existence d'un tel protocole avec un biais arbitrairement petit. Nous donnons une interprétation claire de sa preuve, ce qui nous permet de la simplifier et de la raccourcir grandement.La seconde partie de cette thèse concerne l'étude de méthodes pour prouver des bornes inférieures dans le modèle de la complexité en requête. Il s'agit d'un modèle de complexité central en calcul quantique dans lequel de nombreux résultats majeurs ont été obtenus. Dans ce modèle, un algorithme ne peut accéder à l'entrée uniquement en effectuant des requêtes sur chacun des bits de l'entrée. Nous considérons une extension de ce modèle dans lequel un algorithme ne calcule pas une fonction, mais doit générer un état quantique. Cette généralisation nous permet de comparer les différentes méthodes pour prouver des bornes inférieures dans ce modèle. Nous montrons d'abord que la méthode par adversaire ``multiplicative" est plus forte que la méthode ``additive". Nous montrons ensuite une réduction de la méthode polynomiale à la méthode multiplicative, ce qui permet de conclure à la supériorité de la méthode par adversaire multiplicative sur toutes les autres méthodes. Les méthodes par adversaires sont en revanche souvent difficiles à utiliser car elles nécessite le calcul de normes de matrices de très grandes tailles. Nous montrons comment l'étude des symétries d'un problème simplifie grandement ces calculs. Enfin, nous appliquons ces formules pour prouver la borne inférieure optimale du problème INDEX-ERASURE un problème de génération d'état quantique lié au célèbre problème GRAPH-ISOMORPHISM. / This dissertation studies two different aspects of two-player interaction in the model of quantum communication and quantum computation.First, we study two cryptographic primitives, that are used as basic blocks to construct sophisticated cryptographic protocols between two players, e.g. identification protocols. The first primitive is ``quantum bit commitment''. This primitive cannot be done in an unconditionally secure way. However, security can be obtained by restraining the power of the two players. We study this primitive when the two players can only create quantum Gaussian states and perform Gaussian operations. These operations are a subset of what is allowed by quantum physics, and plays a central role in quantum optics. Hence, it is an accurate model of communication through optical fibers. We show that unfortunately this restriction does not allow secure bit commitment. The proof of this result is based on the notion of ``intrinsic purification'' that we introduce to circumvent the use of Uhlman's theorem when the quantum states are Gaussian. We then examine a weaker primitive, ``quantum weak coin flipping'', in the standard model of quantum computation. Mochon has showed that there exists such a protocol with arbitrarily small bias. We give a clear and meaningful interpretation of his proof. That allows us to present a drastically shorter and simplified proof.The second part of the dissertation deals with different methods of proving lower bounds on the quantum query complexity. This is a very important model in quantum complexity in which numerous results have been proved. In this model, an algorithm has restricted access to the input: it can only query individual bits. We consider a generalization of the standard model, where an algorithm does not compute a classical function, but generates a quantum state. This generalization allows us to compare the strength of the different methods used to prove lower bounds in this model. We first prove that the ``multiplicative adversary method'' is stronger than the ``additive adversary method''. We then show a reduction from the ``polynomial method'' to the multiplicative adversary method. Hence, we prove that the multiplicative adversary method is the strongest one. Adversary methods are usually difficult to use since they involve the computation of norms of matrices with very large size. We show how studying the symmetries of a problem can largely simplify these computations. Last, using these principles we prove the tight lower bound of the INDEX-ERASURE problem. This a quantum state generation problem that has links with the famous GRAPH-ISOMORPHISM problem.
724

De l'étude fondamentale d’hydrates d’acide fort par spectroscopie de vibration et de relaxation à l'application de leur super-conductivité protonique pour le développement d'une micropile à combustible / From the fundamental investigation of strong acid hydrates by means of vibration and relaxation spectroscopy to the application of their superprotonic conductivity for the development of a micro-fuel cell.

Desplanche, Sarah 05 October 2018 (has links)
Les piles à combustible (PAC) utilisant l’hydrogène comme vecteur, possèdent de bons rendements énergétiques et ne produisent aucun gaz à effet de serre. Elles se présentent donc aujourd’hui comme une solution propre et efficace. Cette alternative pourrait ainsi devenir un substitut possible aux hydrocarbures et pallier l’intermittence de certaines énergies renouvelables.Il existe différents types de PAC se distinguant principalement par la nature de l’électrolyte qui compose leur membrane échangeuse de protons. Utiliser les clathratehydrates d’acide fort comme électrolyte solide représente une alternative peu explorée à ce jour. Ces systèmes sont des solides cristallins nanoporeux constitués d’un réseau hôte de molécules d’eau formant des cavités nanométriques et encapsulant des molécules invitées.Dans le cas de clathrate hydrates d’acide fort, le confinement d’acides au sein des cages aqueuses génère des excès de protons délocalisés le long de leur réseau aqueux. A température ambiante, ces clathrate hydrates présentent alors une excellente conductivité protonique, plus élevée que celle des membranes de PACs actuellement utilisées. L’objectif de ce doctorat a été d’élaborer un électrolyte à base de clathrate hydrate d’acide hexafluorophosphorique (un des meilleurs conducteurs connus de cette classe de systèmes)sur la base d’une approche physico-chimique fondamentale, et de développer un montage miniaturisé de PAC intégrant ce nouvel électrolyte.A un niveau fondamental, il a été nécessaire de comprendre les facteurs régissant la conductivité protonique élevée de ces systèmes et en particulier, le lien existant entre la conductivité et le nombre d’hydratation (rapport molaire eau/acide dans le clathrate). Les mécanismes microscopiques mis en jeu ont été étudiés en s’appuyant sur la spectroscopie et l’imagerie Raman, complétées par des expériences de résonance magnétique nucléaire, de diffraction des rayons X et de spectroscopie d’impédance électrochimique. Un ensemble d’informations structurales (type de clathrate formé, transition de phase et stabilité thermodynamique), dynamiques (modes de vibration, diffusion des protons et cinétique) et chimiques (inclusion d’impuretés fluorées) a ainsi été obtenu. En tant que sonde sélective et locale, la technique de diffusion Raman a apporté des informations uniques. Elle a permis de sonder les interactions acides-cages, de proposer un protocole expérimental permettant de contrôler le nombre d’hydratation et également, de révéler pour la première fois une microstructuration du clathrate hydrate observée uniquement au-dessus d’un seuil d’hydratation. Ces propriétés physico-chimiques ont été corrélées aux mesures de conductivité, permettant de comprendre l’impact du nombre d’hydratation et des impuretés chimiques sur les performances de l’électrolyte solide. L’ensemble de ces résultats a permis d’aboutir à un développement technologique original. Une nouvelle micropile à combustible utilisant des clathrate hydrates d’acide hexafluorophosphorique comme électrolyte a été conçue. Ce développement offre ainsi une PAC aux performances comparables aux PACs actuellement disponibles et fonctionnant de la température ambiante à des températures négatives. / Fuel cells (FC) using hydrogen possess very good energy performance and produce no greenhouse gases. It presents itself today as a clean and efficient solution. This alternative could then become a possible substitute for fossil fuels and palliate for the intermittency ofcertain renewable energies.There are various types of FC, mainly distinguished by the nature of the electrolyte that composes their proton exchange membrane. Using strong acid clathrate hydrates as solid electrolyte represents an alternative for which very little is known nowadays. These systems are nanoporous crystalline solids consisting of a water host network forming nanometric cavities encapsulating guest molecules. In the case of strong acid clathrate hydrates, the confinement of acidic species within the aqueous cages generates proton excess that isdelocalized along their aqueous network. At room temperature, these clathrate hydrates have then excellent proton conductivity, which is higher than that of the FCs membranes currently used. The objective of this PhD was to develop an electrolyte based on hexafluorophosphoricacid clathrate hydrate (one of the best-known conductors of this class of system) on the basisof a fundamental physico-chemical approach, and to develop a miniaturized FC assemblyincorporating this new electrolyte.At a fundamental level, it was necessary to understand the driving factors responsible for the super-protonic conductivity of these systems and in particular, the relationship between the conductivity and the hydration number (i.e. water to acid molar ratio in the clathrate). The microscopic mechanisms have been studied by means of Raman spectroscopy and imaging, supplemented by nuclear magnetic resonance, X-ray diffraction and electrochemical impedance spectroscopy experiments. A set of results concerning the structure (clathrate type, phase transition and thermodynamic stability), the dynamics (vibrational modes, proton diffusion and kinetics) and the chemistry (inclusion of fluorinated impurities) has thus been obtained. As a selective and microscopic probe, the Raman scattering technique provided unique information. It allowed to probe the acid-cages interactions, to propose an experimental protocol monitoring the hydration number and also,to reveal, for the first time, a microstructuration of the clathrate hydrate only observed abovea hydration threshold. These physico-chemical properties have been correlated with the conductivity measurements, making it possible to understand the impact of the hydration number and of the chemical impurities onto the electrochemical performances of the solid electrolyte. All these results led to an original technological development. A new micro-fuel cell using hexafluorophosphoric acid hydrates as the electrolyte has been designed. This development offers a FC with performances comparable to the FCs currently available and operating from room temperature to negative temperatures.
725

Galerie letecké techniky a tradic letectví na letišti Medlánky v Brně / Gallery aviation technology and traditions of aviation at the airport Medlánky in Brno

Blahová, Dagmar January 2016 (has links)
This thesis describes design gallery of aviation technology and traditions at the airport in Brno Part of my thesis is focused on urban solution of area layout its interconnections with near districts “Komín“ and “Medlánky“. There is new pedestrian, cycling paths, operational and logistic roads inside the complex layout. This design supposed to keep the two existing historic hangars and demolishing remaining buildings with subsequent completion of necessary objects. Priority and the main idea is to keep compositional and visual axis to ensure visual contact with all airport operational parts to ease of orientation. According to this principle is mass and platform solved with object “gallery”. This object in addition to the exhibition space is also used for administration and operation department of the gallery. In separate part there is ensured catering in form of restaurant with associated technical, operational and sanitary facilities. The gallery is designed to visually and physically separate section used by pilots and airport vehicles from visitors to avoid dangerous situation. Other buildings I have designed in my project are “the clubhouse”, airport administration, emergency accommodation, social activity space mainly designed for aircraft-model pilots and the air traffic control tower. These objects creates border between premises restricted for aero club and visitors.
726

Polyfunkční dům Prudký - stavebně technologický projekt / Multifunctional house Prudký - construction technology project

Kaláb, Ondřej January 2018 (has links)
The aim of this Diploma Thesis is constructionally - technological solution of the rough construction of polyfunctional house on the corner of Bánskobystrická and Medlánecká streets in Brno Řečkovice. In the Diploma Thesis I will deal with the plan of the work procedure of the execution of roof construction layers, machine sets, itemized budget, construction schedule, construction site equipment, inspection and testing plan, ecology and transport relations related to the construction. I would like to point out the complication of the construction with a lack of space because the construction is in the area of Brno Řečkovice. The plan of construction execution was more difficult due to lack of space for storage of materials and machinery handling.
727

Nosná železobetonová konstrukce bytového domu / Load bearing reinforced concrete structure of apartment house

Ruber, Lukáš January 2018 (has links)
The subject of this diploma thesis is the design of the underground parts of the building. Part of this thesis is to comapare alternative designs and subsequentli evaluate the interaction of the upper structure with subsoil and pile fundantion. A detailed static assessment and implementation documentation is then prepared for the selected variant. The design of the base plate and reinforced concrete walls of the underground section are designed with respect to the crack width according to the principles for designing the white box. The theoretical part contains principles for designing and implementing a white box and evaluating design variants.
728

Mostní nadjezd přes dálnici / Overpass bridge across the highway

Černý, Pavel January 2020 (has links)
The topic of this thesis is detailed design of the supporting structure of a bridge. Three variants are designed. The structure is designed as a single beam bridge of 6 spans. The calculation of load efects make in software MidasCivil 2019 and Scia Engineer 18.1. The subject of the expertise of the structure is service limit state and ultimate limit state. For evaluation of cross sections is used MS Excel. Both design and relevant drawing documentation of the bridge deck and substructure. The design and assessment are according to the europien standards.
729

Moderní poliklinika / Modern Health Center

Juračková, Edita January 2013 (has links)
Subject of master's thesis is project of health centre in Brno. The building is constructed as a frame of reinforced concrete with four above-ground floors. The building is based on square individual footing and uncased piles. Building envelopes consists of supporting part and thermally isulated part. Supporting part is made of earated concrete block Ytong. Thermally isulated part is made of thermal insulation polystyrene and Kingspan panel facade cladding. Building is roofed with vegetative promenade flat roof with 3-meters-high trees. Part of master's thesis is also a static desing of reinforced concrete components, fire-safety solving and thermal-technical evaluation og building.
730

Centrum výzkumných institutů a doktorských studií v Brně - příprava a organizace výstavby / The Centre Research Institutes and Doctoral Studies in Brno – Project Planning and Management

Hejna, Vladimír January 2014 (has links)
The technological project deals with processing of materials and documentation for the preparation and realization of the new building Center research institutes and doctoral studies in Brno Poříčí. The project includes technical report which closely provides basic information about the building and used technologies. Due to complicated underlying conditions the project is focused on usage of bracing of foundation pits. The project contains also control and test plans including graphical attachments.

Page generated in 0.0616 seconds