• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 118
  • 29
  • 26
  • 15
  • 10
  • 7
  • 6
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 416
  • 49
  • 46
  • 45
  • 41
  • 41
  • 38
  • 37
  • 33
  • 32
  • 32
  • 31
  • 25
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

Wireless Channel Estimation With Applications to Secret Key Generation

Movahedian, Alireza 14 October 2014 (has links)
This research investigates techniques for iterative channel estimation to maximize channel capacity and communication security. The contributions of this dissertation are as follows: i) An accurate, low-complexity approach to pilot-assisted fast-fading channel estimation for single-carrier modulation with a turbo equalizer and a decoder is proposed. The channel is estimated using a Kalman filter (KF) followed by a zero-phase filter (ZPF) as a smoother. The combination of the ZPF with the KF of the channel estimator makes it possible to reduce the estimation error to near the Wiener bound. ii) A new semi-blind channel estimation technique is introduced for multiple-input-multiple-output channels. Once the channel is estimated using a few pilots, a low-order KF is employed to progressively predict the channel gains for the upcoming blocks. iii) The capacity of radio channels is investigated when iterative channel estimation, data detection, and decoding are employed. By taking the uncertainty in decoded data bits into account, the channel Linear Minimum Mean Square Error (LMMSE) estimator of an iterative receiver with a given pilot ratio is obtained. The derived error value is then used to derive a bound on capacity. It is shown that in slow fading channels, iterative processing provides only a marginal advantage over non-iterative approach to channel estimation. Knowing the capacity gain from iterative processing versus purely pilot-based channel estimation helps a designer to compare the performance of an iterative receiver against a non-iterative one and select the best balance between performance and cost. iv) A Radio channel is characterized by random parameters which can be used to generate shared secret keys by the communicating parties when the channel is estimated. This research studies upper bounds on the rate of the secret keys extractable from iteratively estimated channels. Various realistic scenarios are considered where the transmission is half-duplex and/or the channel is sampled under the Nyquist rate. The effect of channel sampling interval, fading rate and noise on the key rate is demonstrated. The results of this research can be beneficial for the design and analysis of reliable and secure mobile wireless systems. / Graduate / 0544
302

Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects

Mukherjee, Manuj January 2017 (has links) (PDF)
This dissertation is primarily concerned with the communication required to achieve secret key (SK) capacity in a multiterminal source model. The multiterminal source model introduced by Csiszár and Narayan consists of a group of remotely located terminals with access to correlated sources and a noiseless public channel. The terminals wish to secure their communication by agreeing upon a group secret key. The key agreement protocol involves communicating over the public channel, and agreeing upon an SK secured from eavesdroppers listening to the public communication. The SK capacity, i.e., the maximum rate of an SK that can be agreed upon by the terminals, has been characterized by Csiszár and Narayan. Their capacity-achieving key generation protocol involved terminals communicating to attain omniscience, i.e., every terminal gets to recover the sources of the other terminals. While this is a very general protocol, it often requires larger rates of public communication than is necessary to achieve SK capacity. The primary focus of this dissertation is to characterize the communication complexity, i.e., the minimum rate of public discussion needed to achieve SK capacity. A lower bound to communication complexity is derived for a general multiterminal source, although it turns out to be loose in general. While the minimum rate of communication for omniscience is always an upper bound to the communication complexity, we derive tighter upper bounds to communication complexity for a special class of multiterminal sources, namely, the hypergraphical sources. This upper bound yield a complete characterization of hypergraphical sources where communication for omniscience is a rate-optimal protocol for SK generation, i.e., the communication complexity equals the minimum rate of communication for omniscience. Another aspect of the public communication touched upon by this dissertation is the necessity of omnivocality, i.e., all terminals communicating, to achieve the SK capacity. It is well known that in two-terminal sources, only one terminal communicating success to generate a maximum rate secret key. However, we are able to show that for three or more terminals, omnivocality is indeed required to achieve SK capacity if a certain condition is met. For the specific case of three terminals, we show that this condition is also necessary to ensure omnivocality is essential in generating a SK of maximal rate. However, this condition is no longer necessary when there are four or more terminals. A certain notion of common information, namely, the Wyner common information, plays a central role in the communication complexity problem. This dissertation thus includes a study of multiparty versions of the two widely used notions of common information, namely, Wyner common information and Gács-Körner (GK) common information. While evaluating these quantities is difficult in general, we are able to derive explicit expressions for both types of common information in the case of hypergraphical sources. We also study fault-tolerant SK capacity in this dissertation. The maximum rate of SK that can be generated even if an arbitrary subset of terminals drops out is called a fault-tolerant SK capacity. Now, suppose we have a fixed number of pairwise SKs. How should one distribute them amongpairs of terminals, to ensure good fault tolerance behavior in generating a groupSK? We show that the distribution of the pairwise keys according to a Harary graph provides a certain degree of fault tolerance, and bounds are obtained on its fault-tolerant SK capacity.
303

Approche juridique de la télémédecine : entre droit commun et règles spécifiques / Legal Approach of Telemedicine between Common Law and Specific Provisions

Langard, Stéphanie 15 December 2012 (has links)
La télémédecine est définie comme l'utilisation des technologies de l'information et de la communication dans la pratique médicale. Expérimentée depuis quelques années dans notre système de santé, elle est aujourd'hui considérée comme une réponse moderne aux problématiques actuelles : vieillissement de la population, inégalités d'accès à l'offre de soins, désertification médicale, etc. A la demande des acteurs de santé, le législateur a organisé le cadre juridique de la télémédecine par la loi n° 2009-879 du 21 juillet 2009 portant réforme de l'hôpital et relative aux patients, à la santé et aux territoires, incorporée dans le Code de la santé publique. La télémédecine est désormais encadrée par des règles distinctes : règles propres à l'acte de télémédecine et règles propres à l'activité de télémédecine. Puisque la télémédecine consiste en la pratique d'un acte médical par le biais des technologies de l'information et de la communication, elle nécessite, outre le respect des règles de droit commun de l'acte médical, le respect des dispositions propres aux technologies de l'information et de la communication. Ainsi, coexistent des dispositions de droit commun et des dispositions spécifiques. Entre droit commun et dispositions spécifiques, l'encadrement de la télémédecine s'adapte-t-il aux exigences de la pratique médicale ? / Telemedicine allows use of information and telecommunication technologies in medical practice. Tried and tested in recent years by our health care system, it is considered as a modern means to current challenges: aging population, unequal access to health care delivery, medical desertification, etc. On health actors' request, the legislator has organized a legal framework for telemedicine by law n ° 2009-879 of 21 July 2009 reforming hospital system, and related to patients, to health care system and applicable in all territories, it is also embedded in the public health code. Telemedicine is governed by separate rules: those related to telemedicine's acts and those related to telemedicine's activity. Given the fact that telemedicine is based on medical procedures practiced through information and telecommunication technologies, it has to be regulated by ordinary laws rules on medical procedures as well as information and telecommunication technologies'rules. Thus, ordinary law rules and specific provisions currently coexist. Between ordinary law rules and specific provisions, does the telemedicine framework really fit with medical procedure?s requirements ?
304

Harry Potter Joan K. Rowling, The Secret of Platform 13 Evy Ibbotson a Groosham Grange a Return to Groosham Grange: the Unholy Grail Anthony Horowitze: srovnávací analýza obrazu jiného světa / Rowling´s Harry Potter, Ibbotson´s Platform and Horowitze´s Groosham Grange: a Comparative Analysis of the Other-World Theme

NAGYOVÁ, Helena January 2018 (has links)
This diploma thesis deals with the comparison of three literary works, namely Harry Potter series by Joanne Kathleen Rowling, The Secret of Platform 13 by Eva Ibbotson, Groosham Grange and Return to Groosham Grange: The Unholy Grail by Anthony Horowitz. The aim of the theoretical part is to outline the theory of fantasy and also the lives of the three above mentioned authors. The rites of passage and the Gothic tradition are also included in the first, theoretical, part. The aim of the interpretation is to compare the following themes occurring in the discussed works: the journey to the world of fantasy, the picture of the other world and the hero and his opposite. The summary attempts to prove that the discussed works have different messages. In particular, Rowling focuses on morality, Horowitz deals with farce and Ibbotson concentrates on humour.
305

Padre Miguelinho :o intelectual, o professor, o revolucion?rio - vozes que se fazem ouvir

Moreira, Keila Cruz 03 October 2005 (has links)
Made available in DSpace on 2014-12-17T14:35:59Z (GMT). No. of bitstreams: 1 KeilaCM.pdf: 745384 bytes, checksum: 6af15de9d32235f8a4e658841e1facc4 (MD5) Previous issue date: 2005-10-03 / Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior / This research work worries in building the history of the natalense priest Miguel Joaquim of Almeida Castro, Miguelinho, I don't just eat one of the heroes and martyrs of the Revolution From Pernambuco of 1817, as bill the traditional history, but also the educated man, the intellectual and the admired teacher. The studied period understands the beginning of the century XIX, when priest Miguelinho comes back to Brazil, coming of Portugal, to assume teacher's occupation in the Seminar of Olinda, and it ends in the year of 1817, marked by the Revolution From Pernambuco, one of the most important movements in the fight for the liberation of Brazil of the Portuguese domain. Miguelinho, one of the leaders of the Revolution, that also reached the provinces of Para?ba and of Rio Grande do Norte, it was executed by the real troops. Like this, he tries to understand the Priest's conflicting relationship, while representative clergyman, of a Church that almost obtained a religious monopoly, and your ideals per centuries more gone back to a social and economical order of Illumines, that even certain point condemned the attitude of the own Church. The objective, then, is to understand through the path of priest's Miguelinho life, not only the intellectual, the teacher and the revolutionary, but the representation of your political and pedagogic-educational ideas in a die historical moment and the creation of the republican myth, looking for the plurality of an universe that seeks, per times, to flee of our theoretical context / Este trabalho de pesquisa preocupa-se em construir a hist?ria do natalense padre Miguel Joaquim de Almeida Castro, o Miguelinho, n?o apenas como um dos her?is e m?rtires da Revolu??o Pernambucana de 1817, como conta a hist?ria tradicional, mas tamb?m o homem culto, o intelectual e o professor admirado. O per?odo estudado compreende o in?cio do s?culo XIX, quando padre Miguelinho retorna ao Brasil, vindo de Portugal, para assumir a doc?ncia no Semin?rio de Olinda, e conclui no ano de 1817, marcado pela Revolu??o Pernambucana, um dos mais importantes movimentos na luta pela liberta??o do Brasil do dom?nio portugu?s. Miguelinho, um dos l?deres da Revolu??o, que tamb?m atingiu as prov?ncias da Para?ba e do Rio Grande do Norte, foi executado pelas tropas reais. Assim, procura-se compreender a rela??o conflituosa do Padre, enquanto representante cl?rigo, e seus ideais mais voltados para uma ordem social e econ?mica do Iluminismo, que at? certo ponto condenava a atitude da pr?pria Igreja. O objetivo, ent?o, ? compreender atrav?s da trajet?ria de vida do padre Miguelinho, n?o s? o intelectual, o professor e o revolucion?rio, mas a representa??o de suas id?ias pol?ticas e pedag?gico-educacionais em um dado momento hist?rico e a cria??o do mito republicano, buscando a pluralidade de um universo que procura, por vezes, fugir de nosso arcabou?o te?rico
306

Où sont les murs? : questionnement sur les pratiques quotidiennes de l'enfermement en télé-réalité

Wibaux, Chloé 08 1900 (has links)
No description available.
307

À espreita de \'súditos do eixo\' - para a história social dos imigrantes japoneses e a situação do português paulista do século XX / On the lookout for \'súditos do eixo\' - to the social history of japanese immigrants and the situation of the portuguese from São Paulo in the twentieth century

Patricia Elisa Kuniko Kondo Komatsu 25 October 2010 (has links)
Este trabalho, que se vincula ao Projeto Temático História do Português Paulista (USP/FAPESP), tem o objetivo de apresentar os resultados da pesquisa sobre a história social dos imigrantes japoneses em São Paulo e aspectos do português paulista da primeira metade do século XX. Durante a pesquisa, realizou-se à constituição do corpus, ao estudo da história social que seria de fundo para a produção escrita que se refere à proibição de estrangerismo em território nacional e à identificação dos gêneros textuais que integram os dossiês. O pano de fundo desta dissertação começa com a adesão do Brasil à Segunda Guerra Mundial, pois a preocupação com os estrangeiros, principalmente com alemães, italianos e japoneses, aumentou. Neste sentido, em primeiro de outubro de 1942, foi decretada a lei federal que definia os crimes contra a segurança do Estado para os tempos de guerra (Decreto nº 4.766), o que deu início a investigações sobre imigrantes. A partir dos dossiês derivados dessas investigações, constituí um corpus de 394 dossiês gerados pelo DEOPS e DOPS/SP selecionados pelo critério da nacionalidade do investigado, qual seja, japonesa. Os súditos do eixo, forma pejorativa pelo qual os policiais tratavam os cidadãos japoneses, passaram a ser investigados com muito mais rigor. Durante essa época, os japoneses eram detidos pelos policias pelo simples fato de se comunicarem japonês. Além disso, as investigações mencionadas nos documentos são relativas à proibição do ensino da língua japonesa, pois todas as escolas estrangeiras foram fechadas e também as associações onde esses estrangeiros se reuniam para lazer e atividades festivas. O fato mais triste será verificado com os conflitos entre os próprios japoneses na colônia paulista. Surgiu uma facção chamada Shindô-renmei, cujos membros foram indiciados como sabotadores de plantações de menta e do cultivo do bicho da seda, que contribuíam com a grandeza da economia brasileira. Esse é o recorte expositivo deste trabalho: apresentar a história social que fundou a necessidade de se organizarem dossiês a respeito de japoneses e, a reboque disso, identificar o material de pesquisa para o estudo do português culto paulista organizado por gêneros textuais. No aspecto linguístico, recolhem-se qualificadores relativos a japoneses como forma de reconhecer algum tipo de preconceito sobre esses imigrantes. Ainda, nesse quesito linguístico, abordam-se questões relativas à ortografia, que se mostrava, então, muito instável, já que uma última mudança ortográfica fora imposta em 1943, período de produção dos documentos analisados. / This work, which is linked to the Thematic Project History of the Portuguese Language from São Paulo (USP/FAPESP), aims to present the results of research about the social history of Japanese immigrants in São Paulo and Portuguese Language aspects on the first half-century XX. During the research, there was the formation of the corpus, the study of social history which would be responsible for producing writing that refers to the prohibition of foreigness and the identification of genres that make up the dossiers. The background of this thesis begins with the adhesion of Brazil on the Second World War, since a concern with the foreigners, mainly German, Italian and Japanese people, has increased. In this sense, the first of October 1942, was enacted federal law defining crimes against state security on the times of war (Law Decree No. 4766), which initiated investigations on immigrants. The files derived from such research constitutes a corpus of 394 files generated by DEOPS and DOPS / SP selected by the criterion of nationality of the investigated people, namely, Japanese. The súditos do eixo, a pejorative way by which the police treated the Japanese citizens, began to be investigated more thoroughly. During this time, the Japanese were detained by police for the simple fact of communicating Japanese. In addition, investigations are mentioned in documents relating to the prohibition of teaching the Japanese language, so all foreign schools were also closed and associations where these foreigners gathered for leisure and festive activities. The saddest fact is verified with the conflicts between the Japanese themselves in the \'colony\' of São Paulo. The Shindo-Renmei had appeared and its members were called saboteurs because they were exterminating plantations and cultivation of the silkworm, products which contributed to the greatness of the Brazilian economy. This is the objective of this dissertation: to present the social history from documents about Japanese people and also identify the informations about the Standard Portuguese language of São Paulo. In the linguistic aspect, the qualifiers and the ortographic used in the documents, since a recent change of correct writting was imposed on 1943, during the production of documents reviewed.
308

A proteção internacional do segredo industrial / The international protection of trade secret

Daniela Marcos Barone 26 May 2009 (has links)
A importância da proteção à propriedade industrial foi deflagrada com o advento da Revolução Industrial e, posteriormente, com a Revolução Francesa. A proteção internacional à propriedade industrial teve origem na França, em 1883, com a Convenção da União de Paris para a Proteção da Propriedade Industrial (CUP), na qual foi estabelecido o tratamento jurídico para as patentes, marcas, bem como a obrigatoriedade aos países da União de assegurar proteção efetiva contra a concorrência desleal, nos termos de seu artigo 10 bis, parágrafo 1º. Todavia, somente no bojo do Agreement on Trade-Related Aspects of Intellectual Property Rights - TRIPS, o segredo industrial encontrou proteção internacional efetiva, por meio das normas de repressão à concorrência desleal, conforme dispõe o artigo 39 do referido Acordo. Assim, cumpre analisar, a partir do respectivo regime de proteção internacional, qual o conceito, a natureza jurídica, o regime jurídico e a finalidade de proteção do segredo industrial. Para tanto, é preciso ter em mente a natureza imaterial do segredo industrial, os requisitos exigidos para que seja protegido, o regime jurídico e estrutura do TRIPS e o fundamento constitucional de proteção à propriedade industrial, ao qual vincula-se o interesse social e o desenvolvimento tecnológico e econômico do Brasil. / The relevance of industrial property protection was carried out by the Industrial Revolution and, lately, by the French Revolution. The international protection to the industrial property had been originated in France, in 1883, with the adoption of the Union of Paris Convention for the Protection of Industrial Property, in which the legal treatment to patents and trademarks was set forth, as well as the obligation to the countries of the Union to make the protection against the unfair competition effective, pursuant to the article 10 bis, paragraph 1st of such Convention. However, only in the Agreement ontTrade-Related Aspects of Intellectual Property Rights - TRIPS, the trade secret has found effective international legal protection through the rules agaisnt unfair competition, in accordance with the article 39 of the referred Agreement. Thus, it is necessary to analize the definition, the legal nature, the legal regime and the aim of protection of trade secret from the respective regime of international protection. In this connection, it is important to emphasize the innmaterial nature of the trade secret and the requirements for its legal protection, the legal regime and the structure of the TRIPS and the industrial property constitutional fundament for its protection, which is connected to the social interest and the Brazilian technological and economic developement.
309

PHYSICAL LAYER SECURITY USING PSEUDO-RANDOM SEQUENCE KEY GENERATION

Arolla, Srihari, Gurrala, Naga Venkata Sai Teja January 2018 (has links)
Nowadays, network security plays a major role in the field of wireless communications. Wired networks propagate electrical signals or pulses through cables. Whereas wireless signals propagate through the air. If wireless networks are left open and exposed to the outside world, there are high chances of being misused by others. The intruders take advantage of this, to intercept the wireless signals. This is the reason why an extra level of security is required for wireless networks. The physical layer is one of the important layers of the Open System Interconnection (OSI) model which plays an important role in the network’s physical connections like wireless transmission, cabling, connections etc. The physical layer supports the bit-level transmission between various devices by connecting to the physical medium for synchronized communication.In this thesis, a method is studied for exchanging secret key [1] bits using a pseudo-random sequence generator based on Frequency Division Duplex (FDD) systems. The principle of this method is to generate a secret key in a manner that produces low correlation at the intruder. By uniquely relating the secret key bits to the channel in a private version of the universal codebook, a robust key exchange between the transmitter and the receiver is then performed.
310

Nyau masquerade performance : shifting the imperial gaze

Guhrs, Tamara January 2000 (has links)
Nyau Masquerades have been studied by missionaries, anthropologists and religious specialists, but have seldom been documented by theatre and performance specialists. This dissertation argues for the acceptance of Ny au performance as a contemporary world theatre form rooted in tradition. Charting the uneasy relationship between the Nyau and those who have sought to record their performances, the author delineates a vivid dramaturgy of this art form. In doing so, the boundaries of what define theatre as it has traditionally been understood in dominant discourses are made more fluid. Nyau performances have been affected by Colonial processes in varied ways. They were banned by the former government of Northern Rhodesia and severely censored by Catholic Mission teachings in the former Nyasaland. Other forms of vilification have been more subtle. Information about performance in Africa has often been collected and arranged in ways which limit the understanding of these genres. Images of Africa which cluster around the notion of the 'Primitive Other' have enabled a representation of Ny au masking as a superstitious and outdated practice with no relevance for contemporary Africa. This work calls for a new examination of the Nyau, through the lens of local discourse as well as contemporary global understandings of performance. Chapter One examines the issue of primitivism and the ways in which Africa has historically been posited as the exotic Other to Europe. Chapter Two examines the Nyau ih terms of specific dramaturgical elements, adjusting previous misconceptions surrounding the theatr~ forms of Chewa and Nyanja people. Chapter Three is devoted to a discussion of space in ritual theatre and Nyau performance, while Chapter Four explores masking and questions of transformation and liminality. In conclusion, it is seen that the use of the mask is a metaphor for the suspension of rigid boundaries separating subject/object, self/other, ritual/theatre, a suspension which needs to take place before an enriched understanding of performance in Africa can be reached.

Page generated in 0.05 seconds