• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 4
  • 2
  • 1
  • 1
  • Tagged with
  • 24
  • 24
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Following the evolution of metastable glassy states under external perturbations : compression and shear-strain / Suivre l'évolution des états vitreux sous perturbations extérieures : compression et cisaillement

Rainone, Corrado 21 December 2015 (has links)
On considère l'évolution adiabatique des états vitreux sous perturbations extérieures. Bien que le formalisme que nous utilisons soit très général, nous nous concentrons ici sur les sphères dures en dimension infinie où une analyse exacte est possible. Nous considérons perturbations de la frontière, notamment compression ou cisaillement simple et nous calculons la réponse des états vitreux à ces perturbations : pression et contrainte de cisaillement. Nous constatons un dépassement des deux quantités avant que l'état vitreux ne devienne instable à un point spinodal, où il fond dans le liquide (ou cède). Nous estimons également la limite d'élasticité du verre. Enfin, nous étudions la stabilité des bassins vitreux vers la rupture en sous-bassins, correspondant à une transition de Gardner. Nous constatons que près de la transition dynamique, les verres subissent une transition de Gardner après une perturbation infinitésimale. Nous étudions ensuite le régime de haute pression et haut cisaillement au-delà de la transition de Gardner. / We consider the adiabatic evolution of glassy states under external perturbations. Although the formalism we use is very general, we focus here on infinite-dimensional hard spheres where an exact analysis is possible. We consider perturbations of the boundary, i. e. compression or (volume preserving) shear-strain, and we compute the response of glassy states to such perturbations: pressure and shear-stress. We find that both quantities over shoot before the glass state becomes unstable at a spinodal point where it melts into a liquid (or yields). We also estimate the yield stress of the glass. Finally, we study the stability of the glass basins towards breaking into sub-basins, corresponding to a Gardner transition. We find that close to the dynamical transition, glasses undergo a Gardner transition after an infinitesimal perturbation. We then study the high-pressure and high-strain regime beyond the Gardner transition.
22

Intrusion detection techniques in wireless local area networks

Gill, Rupinder S. January 2009 (has links)
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
23

Role armády ve státě v čase přechodu k demokracii : případová studie civilně-vojenských vztahů v Egyptě / Role of the army in the state at the time of transition : case study of civil-military relations in Egypt

Šťastná, Ema January 2015 (has links)
In connection with the events of the Arab Spring in 2011, the region of northern Africa in particular underwent significant political changes. One of the states in which widespread protests caused the overturn of the authoritarian regime and subsequently established the democratization process was also Egypt, whose case is profoundly analysed in the second part of the thesis. Generally speaking, the thesis is concerned with the analysis of civil-military relations in states characterized by the low political culture. In the first place, it focuses on societies undergoing democratization process where the military traditionally maintains strong position within the state and hence often assumes the role of the leader of the transition. Therefore, the principal objective of the analysis constitutes the role of the army at the time of transition to democracy. At the same time, the thesis poses three research questions aiming partly at the military position, partly at the motives determining the willingness of the military to intervene. In the second part, the thesis analyses the given case through five defined factors which it subsequently examines in two levels: conceptual and interventionist. The goal of the thesis it to explain which factors determine strong position of the army in given praetorian...
24

Pathways, Networks and Therapy: A Boolean Approach to Systems Biology

Layek, Ritwik 2012 May 1900 (has links)
The area of systems biology evolved in an attempt to introduce mathematical systems theory principles in biology. Although we believe that all biological processes are essentially chemical reactions, describing those using precise mathematical rules is not easy, primarily due to the complexity and enormity of biological systems. Here we introduce a formal approach for modeling biological dynamical relationships and diseases such as cancer. The immediate motivation behind this research is the urgency to find a practicable cure of cancer, the emperor of all maladies. Unlike other deadly endemic diseases such as plague, dengue and AIDS, cancer is characteristically heterogenic and hence requires a closer look into the genesis of the disease. The actual cause of cancer lies within our physiology. The process of cell division holds the clue to unravel the mysteries surrounding this disease. In normal scenario, all control mechanisms work in tandem and cell divides only when the division is required, for instance, to heal a wound platelet derived growth factor triggers cell division. The control mechanism is tightly regulated by several biochemical interactions commonly known as signal transduction pathways. However, from mathematical point of view, these pathways are marginal in nature and unable to cope with the multi-variability of a heterogenic disease like cancer. The present research is possibly one first attempt towards unraveling the mysteries surrounding the dynamics of a proliferating cell. A novel yet simple methodology is developed to bring all the marginal knowledge of the signaling pathways together to form the simplest mathematical abstract known as the Boolean Network. The malfunctioning in the cell by genetic mutations is formally modeled as stuck-at faults in the underlying Network. Finally a mathematical methodology is discovered to optimally find out the possible best combination drug therapy which can drive the cell from an undesirable condition of proliferation to a desirable condition of quiescence or apoptosis. Although, the complete biological validation was beyond the scope of the current research, the process of in-vitro validation has been already initiated by our collaborators. Once validated, this research will lead to a bright future in the field on personalized cancer therapy.

Page generated in 0.0864 seconds