• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 3
  • Tagged with
  • 12
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Landscapes of national non-identity : landscape, race and national identity in contemporary Britain

Kinsman, Philip January 1995 (has links)
No description available.
2

Oregon Territorial Governor John Pollard Gaines: A Whig Appointee in a Democratic Territory

Huit, Katherine Louise 07 May 1996 (has links)
In 1846 negotiations between Great Britain and the United States resulted in the end of the Joint Occupancy Agreement and the Pacific Northwest became the property of the United States. Nineteenth Century Oregon represented a new beginning for many citizens of the United States and around the world. The settlers arriving in the Oregon Country consisted of a hardy, self reliant, breed; yet they sought the protection of the United States government from Native Americans living in the region and from Great Britain's Hudson's Bay Company. When Oregon became a territory, in 1848, the pioneers struggled to preserve their independence. They resented federally appointed officials sent to govern them by the United States Government. Governor John Pollard Gaines, the subject of this study, came to Oregon as a federally appointed official. Previous studies of the Oregon Territorial Government have examined in detail the marked conflict between the political parties of the Oregon Territory. Before 1850 Oregon did not have two distinct political parties. Governor Gaines, a Whig, acted as a catalyst for the birth of a strong Democratic party in Oregon. On the federal level the Whig and Democratic parties had been at odds since the time of Andrew Jackson. The Whigs were proponents of economic progress contained within a social and political framework. Whigs promoted individual and national independence; Democrats promoted the dependence cf one class upon another. Whigs believed the pursuit of individual liberty and national prosperity depended upon an active government representative of its citizens' interests. This study examines "home rule" Democrats, their treatment of Governor Gaines, and the ramifications of the Governor's reactions at a local and federal level. As a federally appointed official sent to govern the distant Oregon Territory, Gaines endured abuse from "home rule" citizens. Conclusions drawn from this study demonstrate that Gaines's affiliation with the Whig party is secondary to his being an "outsider." His treatment as governor would not have been much different if he had been a Democrat sent to the Territory by the federal government.
3

Comparison of prices of life insurances using different mortality rates models

Straß, Belinda January 2018 (has links)
Capturing mortality became a crucial modelling problem throughout the years due to the raising demand of life insurances and annuities. Fitting three models, namely, logistic, Heligman– Pollard HP4 and power–exponential model, to real life data shows that latter two models represent the actual data quite well. Pricing a term life insurance and a whole life annuity, implemented using the MATLAB software, based on these models ends in the result that the Heligmann–Pollard HP4 model is the less preferable model, in perspective of an insured, than the logistic or power–exponential ones.
4

Characterizing the populaton biology and life history of Speyeria adiaste clemencei

Zaman, Khuram 01 January 2014 (has links)
In this thesis, the life history and population biology of an endemic and declining California butterfly, Speyeria adiaste clemencei (Comstock, 1925) is described from Chews Ridge, Monterey Co., CA. S. a. clemencei can be successfully reared on commercially available Viola spp., facilitating captive rearing for restoration. Larvae of S. adiaste can be distinguished morphologically from sympatric S. callippe and S. coronis larvae based upon coloration of the dorsal and dorsolateral scoli, head capsule coloration, and coloration of setae, facilitating identification in the field. Adequate access to nectar sources throughout the flight period, especially during drought years, as well as host plant density and distribution, are critical aspects for maintaining viable S. a. clemencei populations. To gain a better understanding of its population biology, three seasons of weekly Pollard walk counts and two seasons of mark recapture (MR) were conducted. The population declined during the study period, which may be associated with decreasing rainfall. MR estimates were very strongly correlated with weekly Pollard walk counts. Differences in habitat use between the sexes were observed, with males showing a slight preference for ridge over meadow plots, whereas females preferred meadow plots containing Viola host plants. Analysis of survival and dispersal indicated this species is relatively short-lived with low dispersal ability, two traits associated with its life history that have important implications for re-colonization dynamics and population structure.
5

The Origins of the Lost Cause of the Confederacy

Powell, Soren Anthony 24 April 2023 (has links)
No description available.
6

Design Methods for Cryptanalysis

Judge, Lyndon Virginia 24 January 2013 (has links)
Security of cryptographic algorithms relies on the computational difficulty of deriving the secret key using public information. Cryptanalysis, including logical and implementation attacks, plays an important role in allowing the security community to estimate their cost, based on the computational resources of an attacker. Practical implementations of cryptanalytic systems require complex designs that integrate multiple functional components with many parameters. In this thesis, methodologies are proposed to improve the design process of cryptanalytic systems and reduce the cost of design space exploration required for optimization. First, Bluespec, a rule-based HDL, is used to increase the abstraction level of hardware design and support efficient design space exploration. Bluespec is applied to implement a hardware-accelerated logical attack on ECC with optimized modular arithmetic components. The language features of Bluespec support exploration and this is demonstrated by applying Bluespec to investigate the speed area tradeoff resulting from various design parameters and demonstrating performance that is competitive with prior work. This work also proposes a testing environment for use in verifying the implementation attack resistance of secure systems. A modular design approach is used to provide separation between the device being tested and the test script, as well as portability, and openness. This yields an open-source solution that supports implementation attack testing independent of the system platform, implementation details, and type of attack under evaluation. The suitability of the proposed test environment for implementation attack vulnerability analysis is demonstrated by applying the environment to perform an implementation attack on AES. The design of complex cryptanalytic hardware can greatly benefit from better design methodologies and the results presented in this thesis advocate the importance of this aspect. / Master of Science
7

Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem

Yoshida, Kayo January 2009 (has links)
The Boneh-Boyen signature scheme is a short signature scheme which is provably secure in the standard model under the q-Strong Diffie-Hellman (SDH) assumption. The primary objective of this thesis is to examine the relationship between the Boneh-Boyen signature scheme and SDH. The secondary objective is to survey surrounding topics such as the generic group model, related signature schemes, intractability assumptions, and the relationship to identity-based encryption (IBE) schemes. Along these lines, we analyze the plausibility of the SDH assumption using the generic bilinear group model. We present the security proofs for the Boneh-Boyen signature scheme, with the addition of a small improvement in one of the probability bounds. Our main contribution is to give the reduction in the reverse direction; that is, to show that if the SDH problem can be solved then the Boneh-Boyen signature scheme can be forged. This contribution represents the first known proof of equivalence between the SDH problem and Boneh-Boyen signatures. We also discuss the algorithm of Cheon for solving the SDH problem. We analyze the implications of Cheon's algorithm for the security of the Boneh-Boyen signature scheme, accompanied by a brief discussion on how to counter the attack.
8

Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem

Yoshida, Kayo January 2009 (has links)
The Boneh-Boyen signature scheme is a short signature scheme which is provably secure in the standard model under the q-Strong Diffie-Hellman (SDH) assumption. The primary objective of this thesis is to examine the relationship between the Boneh-Boyen signature scheme and SDH. The secondary objective is to survey surrounding topics such as the generic group model, related signature schemes, intractability assumptions, and the relationship to identity-based encryption (IBE) schemes. Along these lines, we analyze the plausibility of the SDH assumption using the generic bilinear group model. We present the security proofs for the Boneh-Boyen signature scheme, with the addition of a small improvement in one of the probability bounds. Our main contribution is to give the reduction in the reverse direction; that is, to show that if the SDH problem can be solved then the Boneh-Boyen signature scheme can be forged. This contribution represents the first known proof of equivalence between the SDH problem and Boneh-Boyen signatures. We also discuss the algorithm of Cheon for solving the SDH problem. We analyze the implications of Cheon's algorithm for the security of the Boneh-Boyen signature scheme, accompanied by a brief discussion on how to counter the attack.
9

Comparison of mortality rate forecasting using the Second Order Lee–Carter method with different mortality models

Sulemana, Hisham January 2019 (has links)
Mortality information is very important for national planning and health of a country. Mortality rate forecasting is a basic contribution for the projection of financial improvement of pension plans, well-being and social strategy planning. In the first part of the thesis, we fit the selected mortality rate models, namely the Power-exponential function based model, the ModifiedPerks model and the Heligman and Pollard (HP4) model to the data obtained from the HumanMortality Database [22] for the male population ages 1–70 of the USA, Japan and Australia. We observe that the Heligman and Pollard (HP4) model performs well and better fit the data as compared to the Power-exponential function based model and the Modified Perks model. The second part is to systematically compare the quality of the mortality rate forecasting using the second order Lee–Carter method with the selected mortality rate models. The results indicate that Power-exponential function based model and the Heligman and Pollard (HP4) model gives a more reliable forecast depending on individual countries.
10

Vybrané metodické přístupy k tvorbě regionální populační prognózy: případová studie na úrovni Jihočeského kraje / Selected Methodical Approaches to Regional Population Forecast: A case study in the South Bohemian Region

Říha, Vojtěch January 2017 (has links)
Selected Methodical Approaches to Regional Population Forecast: A case study in the South Bohemian Region Abstract The aim of this thesis is to introduce selected methodological approaches to population forecasts, focusing on the regional level and considering different lengths of time series. Specific procedures are applied to create a population forecast for the South Bohemian Region. In the theoretical part of this thesis, the stages of population forecasts processing are determined. The Cohort Component method with migration, which can be used to create population forecast, is characterized. Another part describes selected analytical models and functions for partial mortality, fertility and migration forecasts, including Indirect estimation of net migration. To extrapolate parameters, selected trending functions and the Box-Jenkins methodology are characterized in the part of the time series analysis. The analytical part of this thesis focuses on the creation of the South Bohemian Region forecast from short initial time series and long initial time series. From short initial time series, the partial forecast of mortality is analyzed by the Heligman-Pollard model, the partial forecast of fertility is analyzed by the Beta function and the partial forecast of migration is analyzed by 25%, 50% and 75%...

Page generated in 0.0461 seconds