Siga este enlace para ver otros tipos de publicaciones sobre el tema: XAML.

Tesis sobre el tema "XAML"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "XAML".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Eriksson, Joakim. "Skillnader mellan Windows 8 applikationer byggda med XAML respektive HTML5". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217090.

Texto completo
Resumen
Microsoft launched a new operating system, Windows 8, during 2012. An interesting feature for Windows 8 is that applications can be developed using different programming languages but still provide the same functionality regardless of the language used. Two combinations of programming languages are: XAML with C# and HTML with JavaScript. This thesis examines if there are any advantages or disadvantages when choosing a specific combination of languages to develop Windows 8 applications with. An application has been developed and analyzed for the SwedishTransport Agency during the thesis project.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

О, Петренко С. "ОСОБЛИВОСТІ ПРОГРАМНОЇ РЕАЛІЗАЦІЇ 3D-ЕФЕКТІВ ЗАСОБАМИ ПІДСИСТЕМИ WPF". Thesis, Київ, Національний авіаційний університет, 2015. http://er.nau.edu.ua/handle/NAU/19279.

Texto completo
Resumen
Windows Presentation Foundation (WPF) являє собою широкий API-інтерфейс для створення настільних графічних програм, які мають різноманітний дизайн і інтерактивність. Його функціональні можливості в області 3-D дозволяють розробникам малювати, перетворювати і анімувати тривимірну графіку як в розмітці, так і в процедурному коді. Розробники можуть поєднувати графіку 2-D і 3-D для створення багатофункціональних елементів управління, підвищення зручності роботи з інтерфейсом програми. Підтримка 3-D в WPF не передбачає надання повнофункціональної платформи для створення ігор, а дозволяє створювати багатофункціональні програми з елементами 3D.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Jutterström, Jenny. "Prototype of a Fragmented Document Editor". Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-9488.

Texto completo
Resumen

Signifikant Svenska AB supplies an information system called Assert, developed to facilitate the aftermarket sales in the manufacturing and subcontractor domains. The information system offers companies and organizations the possibility to gather their product information in a joint database in order to increase the information availability and distribution.

The management of the documents is an important part of the customer need and can be improved in order to also support document maintenance directly in Assert. At the moment, users only have the possibility to add and view documents in the database. By also providing users the possibility to create documents, update document contents, effectively reuse document sections and ease the translation of documents within Assert, the document management will be better facilitated.

The purpose of this thesis is to develop a prototype which shows the concept and benefits when providing the possibility to share document contents between several documents. The prototype is developed in C#/WPF and provides a word processor with features to reuse document contents and translation management.

Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Björklund, Thomas y Christer Wahlund. "GIS-IMPLEMENTATION AV BING MAPS TILL WINDOWS 8 OCH WINDOWS PHONE 8". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-21978.

Texto completo
Resumen
This thesis has been performed at consulting firm Sweco Position in Jönköping. The thesis is divided into two main sections: theoretical and practical. The theoretical section contains an investigation into the possibilities of implementing a geographical information system (GIS) for administrations of wells with the integration of Bing Maps for Windows 8 and Windows Phone 8. The practical work comprises the development of a prototype for Windows 8 and Windows Phone 8. The students review the Model-View-ViewModel-pattern on a theoretical basis, compares the differences between Windows 8 Pro and Windows RT. The thesis also contains and investigation into the pros and cons of a web based application compared to a native one. The result of the thesis will be comprised of a GIS-service developed in C# in co-operation with XAML with the options of saving data locally and a WMS-based service layer for Windows 8 and Windows Phone 8.
Detta examensarbete har utförts på konsultbolaget Sweco Position i Jönköping. Arbetet har varit uppdelat i två större delar: teoretiskt och praktiskt arbete. Teoretiska delen omfattade en utredning kring möjligheterna att implementera ett geografiskt informationssystem (GIS) för administration av brunnar med hjälp av Bing Maps tillsammans med Windows 8 och Windows Phone 8. Praktiska arbetet omfattade skapandet av en prototyp till Windows Phone 8 och Windows 8. Studenterna går bland annat genom Model-View-ViewModel-mönstret på en teoretisk nivå, beskriver skillnaderna mellan Windows 8 Pro och Windows RT. Ett utredande om för och nackdelar vid utveckling av webbaserade applikationer och native-applikationer. Resultatet av examensarbetet kommer innefatta en GIS-lösningen utvecklad i C# i samverkan med XAML och omfatta lokalt sparad data med WMS-tjänst baserad interaktion till Windows 8 och Windows Phone 8.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Bürger, Michal. "Technologie Silverlight a její praktické využití". Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-7523.

Texto completo
Resumen
This diploma thesis brings a look at the relatively new technology Microsoft Silverlight, which is a new platform for developing Rich Internet Applications (RIA). It contains features and principles of Silverlight technology in a context of several other technologies. As a part of this work, there is a practical project developed in Microsoft Silverlight 2.0, which is used as a demonstration of described principals and techniques in a theoretical part. The goal of this work is to provide the best possible and complete description of Silverlight's features, advantages, but also limitations. In the thesis there can be also found comparisons with related technology Microsoft Windows Presentation Framework (WPF) and also with other competitors on a RIA market.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Rak, Jan. "SCADA systém stanic pro kontrolu těsnosti". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316379.

Texto completo
Resumen
The goal of this thesis is to develop SCADA/HMI system for stations on leak test. The software will be able to communicate with the station via the OCP server, by which the control station and store measured data. For this purpose, it was used more fiber processing, as for the actual communication, as well as to run the program and work with databases to store the results. The resulting program will be placed on the personal computer, which is part of the station to check for leaks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Balga, Ondřej. "HMI pro BECKHOFF TWINCAT 3". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377027.

Texto completo
Resumen
This thesis deals with the creation of HMI in the C # programming language for BECKHOFF TWINCAT 3. In the theoretical part, the thesis focuses on description of .NET framework, WPF, MVVM, Prism and software tools used in the thesis. The following chapter focuses on creating a development environment and a runtime. All functionalities and capabilities of the created application are described. The created development environment and runtime are used and demonstrated on the sample solution.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Tollerud, Ian. "Online 3D presentationer : Vilken teknik är mest lämplig idag för små och medelstora företag?" Thesis, University of Gävle, Department of Mathematics, Natural and Computer Sciences, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-142.

Texto completo
Resumen

Denna rapport beskriver och undersöker olika sätt att använda online 3D i webbpresentationer. 3D ställs emot vad som ibland brukar kallas 2,5D (Man fotograferar en produkt ur olika vinklar för att få en serie med bilder som kan ge en fiktiv 3D upplevelse). Rapporten ger bakgrund och historia över online 3D teknologi, ger en översikt över marknaden för online produktpresentationer idag och försöker ge en ögonblicksbild av situationen i andra kvartalet 2007 över en snabb föränderlig marknad. Fyra olika 3D system ställs mot varandra med hjälp av praktiska kodexempel och avslutas med en helhetslösning för dynamisk generering av webbsidor. Målgruppen är programmerare och webbutvecklare som tar fram material för små och medelstora företag.

Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Larsson, Fredrik y Fredrik Falkesand. "Övervakningsapplikation för Windows 8 surfplatta". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-21513.

Texto completo
Resumen
I dagsläget finns inget system som övervakar en tullstation utan att man måste vara på plats på kontoret eller stationen. Denna rapport handlar om utvecklingen av en övervaknings applikation i Windows 8 store app miljö på uppdrag av Combitech AB mot kunden Kapsch TrafficCom. Applikationen utvecklades mot en Windows 8 surfplatta för att kunna övervaka en tullstation. Användargränssnitt är utvecklat i XAML och dess logik i C#. Onion Architecture har används för att bygga upp arkitekturen i applikationen. Resultatet av examensarbetet blev en fungerande prototyp av en övervaknings applikationen till en Windows 8 surfplatta, där innehållet genereras av en simulator. Applikationen visar användaren information om en specifik tullstation, exempelvis passager och event.
Today is there no system that monitors a tolling station without the need to be at the office or the tolling station. This report concerns the development of a monitoring application to Windows 8 store app environment on behalf of Combitech AB towards the customer Kapsch TrafficCom. The application was developed for a Windows 8 tablet to monitor a tolling station. The user interface was developed in XAML and its logic in C#. Onion Architecture has been used to build the architecture for the application. The result of this thesis was a working prototype of a monitoring application for Windows 8 tablet, where the content is generated by a simulator. The application displays information for the user about a specific tolling station, for example passages and events.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Kouba, Petr. "Technologie Silverlight". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219002.

Texto completo
Resumen
The diploma thesis is focused on Silverlight technology, possibilities of running and application developments. Next Windows Presentation Foundation is introduced, which Silverlight technology results from, and the principal of creation user interface in XAML. Data bindings are used for the information presentation gained from web services. Concept called Windows Communication Foundation enables relatively easy application development gaining data from different resources through web services. Principals of communication with web services based on SOAP and REST architecture are described. An application for observing current stock exchanges information was developed on the base of previous studies. The application consists of server and client side. The server side obtains data from resources which are free available. These data are published through web services. Silverlight client gets data from web services and presents them to users. User settings are stored on server in database. ADO.NET Entity Framework and Domain Service are used for the access to the database.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Klockare, Sofi. "Responsive design in Windows 8 applications". Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96665.

Texto completo
Resumen
Responsive design is a common expression at the web today. This thesis was about learning about responsive web design in order to apply it to Windows 8 applications created in C# and XAML. The purpose of this thesis was to learn if responsive design can be used in such applications. This was done by first learning about responsive design through a literature study about responsive web design and then specifying responsive application design. How responsive design can be used in applications was found through research and creation of an example application. No literature was found about responsive design for Windows 8 applications in C# and XAML and therefore most of the results came from own ideas and partly solutions found on different forums. The thesis was performed at Infor in Kista. The example application was a social application which was connected to a social web service developed by Infor. Responsive web design is a technique used for making webpages adapt to the size and resolution of the viewport. This is done by creating a structured, fluid layout by using a flexible grid and flexible images. Media queries are used to set up different states for presenting the page in different ways for different sizes and resolutions of the viewport. In the different states parts of the content can for example be hidden or styled. The number of columns of information can also be set to adapt to make the page easier to view. Responsive design for applications should make the layout of the application adapt to fit the application window of the device used depending on its resolution. One way to specify a responsive design for Windows 8 applications could be to create only one application which could be used on all different Windows 8 platforms, such as phones, tablets and computers. It is probably not possible today to create this one application for different Windows 8 platforms. Another way of specifying responsive design for application is to create a responsive user interface which could be shared and used in the different Windows 8 applications. The latter was the chosen definition for this thesis. The scope of this thesis was limited to only research for responsive design in Windows Store apps and Windows Phone 8 applications. Windows Phone 8 applications are applications used on smartphones with Windows Phone 8 as operating system while Windows Store applications are used on computers with Windows 8 as operating system. Other Windows 8 devices were not included in this thesis. The final conclusion of this thesis was that although it is complicated to use responsive application design it can be used for most of the user interface. A responsive user interface for the applications can be created separately, but some parts of the application pages cannot be shared between the different platforms. This results in a mostly responsive sharable user interface.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Dvořák, Marek. "Návrh a implementace mobilní aplikace pro platformu Microsoft Windows". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-234789.

Texto completo
Resumen
This thesis describes the process of development of mobile application on the Microsoft Windows platform. The described process covers all stages from the analysis of the target market through design and development of the application to the plan of publishing the app in the Windows Store. Development of the mobile part of Windows 8.1 Universal App using the C# programming language and XAML markup language is integral part of this thesis.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Kvarnström, Dan y Mathias Jonsson. "Framtidens meny för ett IT-system". Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1357.

Texto completo
Resumen

The mission was to create a prototype of a menu system for the company

System Andersson AB. The instructions were that it has to be as interesting and

modern now as in 20 years. We had to look at technology from the cutting edge

of development to make our prototype survive in the future. Windows

Presentation Foundation (WPF) was the technique we focused on. There are

only a few applications that take advantage of WPF today, but it is predicted

that WPF will be the next generation method for developing applications to the

Windows platform.

To make our menu visually appealing, easy to use and at the same time

functional, we followed the clear path and guidelines that are available in

interaction design. Those guidelines tell us how the design process should be

executed. Through usage of the six basic ideas of interaction design and taken

the principles of richer user experience further, we were able to build a menu

system that will be as modern in 20 years as it is now. We took the thoughts of

physical design into account to make the menu understandable and easy to use.


Examensarbetets uppdrag var att skapa en prototyp av ett menysystem åt

System Andersson AB, som enligt instruktioner ska vara intressant och

modernt, även om 20 år. För att lyckas med detta tittade vi på "cutting edge" av

vad som används idag för att inte systemet skulle riskera att bli föråldrat i

framtiden. Tekniken som vi undersökte och använde oss av var Windows

Presentation Foundation (WPF). I dagsläget är det endast ett fåtal applikationer

som använder WPF men utvecklingsmetoden spås vara morgondagens sätt att

programmera windowsapplikationer.

För att vår meny skulle bli estetiskt tilltalande, enkel att använda och samtidigt

funktionell så finns det inom interaktionsdesign klara riktlinjer om hur

designutvecklingen bör gå till väga. Genom att nyttja de sex grundtankarna: att

ett system ska vara effektivt, ha hög verkningsgrad, säkert att använda, vara

användbart, enkelt att förstå samt okomplicerat; i designen och att bygga vidare

med principerna så anser vi att vi har kunnat åstadkomma ett menysystem som

kommer att se lika intressant och modern ut om 20 år som det gör nu. För att

menyn skulle uppfylla de sex grundtankarna, bland annat att vara klart

förståelig och enkel att använda så använde vi oss av de tankar och teorier som

framgår i fysisk design.

Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Pelatti, Simone. "Progettazione e realizzazione di un sistema di eye-tracking per la generazione di contenuti in realtà aumentata in torre di controllo". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19049/.

Texto completo
Resumen
Nel presente elaborato viene analizzato lo stato attuale delle tecnologie di Augmented Reality nelle strutture di controllo del traffico aereo. Viene inoltre valutata l'efficacia dello stimolo visivo stereoscopico per distanze tipiche del controllo del traffico aereo, risultando una fonte importante di informazione, specialmente in condizioni in cui altre fonti manchino. Per fornire contenuti AR più consistenti, è opportuno quindi generarli in forma binoculare, per lo sviluppo della quale è necessario conoscere la posizione degli occhi dell'operatore. Viene quindi approntato un sistema di tracking degli occhi tramite il dispositivo Microsoft Kinect(R), per il quale è sviluppato in C# e XAML l'applicativo software KET - Kinect HD Eye Tracking, che identifica e restituisce le coordinate di occhi e punta del naso. I valori sono, quindi, inviati tramite socket per essere utilizzati dal generatore di contenuti AR. Per verificare la bontà delle misure individuate, sono svolte prove sperimentali in cui è misurata la distanza interoculare di alcuni volontari, sia tramite KET sia con metro a nastro fisico. I dati delle prove mostrano un'ottima precisione del sistema KET, con errore relativo minore del 5%. Compare altresì come le misure siano meno precise in zone più vicine al dispositivo Kinect(R): si ipotizza che questo dipenda dalla natura della TOF-Camera del dispositivo stesso. Sono infine proposte delle migliorie future per il software KET.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Ingr, Michal. "Mobilní aplikace pro administraci CMS". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318324.

Texto completo
Resumen
The master's thesis describes the designing and developing mobile application for remote management of Kentico CMS/EMS system via REST interface. The thesis emphasized agile approaches to development, especially Test-Driven Development and automated testing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Kalina, Michal. "PC aplikace pro návrh animačních scénářů pro animované funkce světlometů". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316382.

Texto completo
Resumen
This thesis deals with design and creation of user-friendly computer application, which is in the simple and intuitive way capable of creating animation scripts for animated features of headlamps and tail lamps used in automotive industry. Part of this solution is visualization of these scripts using miniature computer Raspberry PI and suitable diplay device.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Popelka, Karel. "Aplikace s vkládáním virtuálních předmětů do záběru kamery". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255339.

Texto completo
Resumen
The aim of this project is to design an application for mobile platform which can insert virtual objects to camera shots without disturbing the scene. The application is implemented on Windows 8.1 and Windows Phone 8.1 platforms. The scene rendering is done in DirectX with C++ programming language and the user interface is created in XAML. This text describes the relevant fundamentals of augmented reality and the selected platform and it describes advanced programming techniques such as asynchronous resources loading or advanced post processing rendering techniques. The result of this project is a mobile application for inserting a virtual object with its shadow to camera shot. It is possible to set some aspects of the light and take a picture with the virtual object in high resolution.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Hortvík, Martin. "Automatické zjištování rozměrových změn betonových směsí při tuhnutí". Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2017. http://www.nusl.cz/ntk/nusl-320109.

Texto completo
Resumen
This diploma thesis deals with the design and implementation of a desktop application designed to determine the dimensional changes of concrete mixtures during solidification. The work includes implementation of the server portal for real-time data evaluation. The introductory part deals with the analysis of the measurement task and the original solution, as well as the specification of the new application and its deployment in real operation. The next part of the thesis describes current software technologies used in the development of desktop and server applications. The design and implementation of both parts of the solution is a major part of the work. In the last part, the real-time functionality test of the application is presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Mbanaso, Uche Magnus. "Privacy trust access control infrastructure using XACML". Thesis, University of Salford, 2009. http://usir.salford.ac.uk/26805/.

Texto completo
Resumen
The use of personal, sensitive information, such as privileges and attributes, to gain access to computer resources in distributed environments raises an interesting paradox. On one hand, in order to make the services and resources accessible to legitimate users, access control infrastructure requires valid and provable service clients' identities or attributes to make decisions. On the other hand, the service clients may not be prepared to disclose their identity information or attributes to a remote party without determining in advance whether the service provider can be trusted with such sensitive information. Moreover, when clients give out personal information, they still are unsure of the extent of propagation and use of the information. This thesis describes an investigation of privacy preserving options in access control infrastructures, and proposes a security model to support the management of those options, based on extensible Access Control Markup Language (XACML) and Security Access Markup Language (SAML), both of which are OASIS security standards. Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no negotiation between the client and the service provider. As access control management systems lean towards being user-centric or federated, unilateral approaches can no longer adequately preserve the client's privacy, particularly where communicating parties have no pre-existing trust relationship. As a result, a unified approach that significantly improves privacy and confidentiality protection in distributed environments was considered. This resulted in the development of XACML Trust Management Authorization Infrastructure (XTMAI) designed to handle privacy and confidentiality mutually and simultaneously using the concept of Obligation of Trust (OoT) protocol. The OoT enables two or more transaction parties to exchange Notice of Obligations (NoB) (obligating constraints) as well as Signed Acceptance of Obligation (SAO), a proof of acceptance, as security assurances before exchange of sensitive resources.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Kasinath, Gautham. "Fine grained access control of ODF documents using XACML". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/276.

Texto completo
Resumen
Whilst existing research addresses protection or information contained in generic XML formats, none address the protection of information in document formats based on XML. This research addresses this void by suggesting an innovative scheme to protect contents of ODF documents using the XACML access control model. This study is significant to those conducting studying mechanisms of document security, members of the standardization community and information security providers of enterprises. The study conducted in this research may also have commercial value as a product developed to secure ODF document contents.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Mizani, Mehrdad Alizadeh. "An Xacml Based Framework For Structured Patient Privacy Policy (s3p)". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607695/index.pdf.

Texto completo
Resumen
The emergence of electronic healthcare have caused numerous changes in both substantive and procedural aspects of healthcare processes. Such changes have introduced new risks to patient privacy and information confidentiality. Traditional privacy policies fall too short to respond to privacy needs of patients in electronic healthcare. Structured and enforceable policies are needed in order to protect patient privacy in modern healthcare with its cross organizational information sharing and decision making. Structured Patient Privacy Policy (S3P) is a framework for a formalized and enforceable privacy policy in healthcare. S3P contains a prototype implementation of a structured and enforceable privacy policy based on eXtensible Access Control Markup Language (XACML). By simulating healthcare scenarios, S3P provides a means for experts from different professional backgrounds to assess the effect of policies on healthcare processes and to reach ethically sound privacy policies suitable for electronic healthcare.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Affonso, Ana Maria Ramo Y. "O corpo do xamã e a passagem de Carlos Castaneda". Universidade Federal de Minas Gerais, 2008. http://hdl.handle.net/1843/VCSA-7EKJ7B.

Texto completo
Resumen
In the present dissertation, we reflect about the anthropological practice and the impact of Carlos Castaneda´s work in the relation between science and magic that anthropology (among other things) represents. Castaneda knows the impossibility to explain don Juan´s knowledge, the shaman that is his .informant. (and his master), out of his own terms, and this is why the Carlos Castaneda´s anthropology comes to shake the scientific explanation of magic. Don Juan´s words overflow Castaneda´s anthropologic text and come to us with a strength that has enchanted thousands of readers, inside and outside anthropology. But, what do they say? What is the message that Castaneda passes and that had so much impact when published his books? In the context of a reflection about magic, shamanism, witchcraft or sorcery, we will try to render an academic tribute to whom has changed the anthropological knowledge and practice in the seventies: don Juan Matus.
Na presente dissertação, refletimos a respeito da prática antropológica e do impacto da obra de Castaneda na relação entre ciência e magia que a antropologia (entre outras coisas) representa. Castaneda sabe da impossibilidade de explicar o conhecimento de don Juan, o xamã que é seu .informante. (e seu mestre), fora de seus próprios termos, e é por isso que a antropologia de Carlos Castaneda vem abalar a explicação científica da magia. As palavras de don Juan transbordam o texto antropológico de Castaneda e chegam até nós com uma força que encantou milhares de leitores, dentro e fora da antropologia. Mas, o que dizem? Qual é o recado que Castaneda transmite e que teve tanto impacto quando se publicaram seus livros? No contexto de uma reflexão sobre a magia, o xamanismo, a bruxaria ou a feitiçaria, tentaremos prestar uma homenagem acadêmica a quem modificou o saber e a prática antropológica nos anos 70: don Juan Matus.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

St-Martin, Michel. "A Verified Algorithm for Detecting Conflicts in XACML Access Control Rules". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20539.

Texto completo
Resumen
The goal of this thesis is to find provably correct methods for detecting conflicts between XACML rules. A conflict occurs when one rule permits a request and another denies that same request. As XACML deals with access control, we can help prevent unwanted access by verifying that it contains rules that do not have unintended conflicts. In order to help with this, we propose an algorithm to find these conflicts then use the Coq Proof Assistant to prove correctness of this algorithm. The algorithm takes a rule set specified in XACML and returns a list of pairs of indices denoting which rules conflict. It is then up to the policy writer to see if the conflicts are intended, or if they need modifying. Since we will prove that this algorithm is sound and complete, we can be assured that the list we obtain is complete and only contains true conflicts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Braga, Karina Rachel Guerra. "Modelando xam?s:o caso da tenda do suor". Universidade Federal do Rio Grande do Norte, 2010. http://repositorio.ufrn.br:8080/jspui/handle/123456789/12265.

Texto completo
Resumen
Made available in DSpace on 2014-12-17T13:54:47Z (GMT). No. of bitstreams: 1 KarinaRGB_DISSERT.pdf: 2033261 bytes, checksum: 74c6a5ea267da325e949b320c7526009 (MD5) Previous issue date: 2010-09-03
Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior
Este trabalho focaliza o fluxo do conhecimento xam?nico nos centros urbanos, que ? sustentado por uma rede de intera??o a que intitulo de circuito neoxam?nico. Os grupos praticantes do denominado xamanismo urbano, ou neoxamanismo, constituem um segmento do fen?meno Nova Era. N?o o considero um trabalho de religi?o, mas, uma pesquisa sobre um caso peculiar, sobre tradu??o de rituais ind?genas e seus atores no meio urbano. Focalizo as redes globais que os ligam a ind?genas da aldeia e o interc?mbio de saberes pr?ticos e simb?licos, formando uma linhagem de modeladores, alimentada pela centralidade do conhecimento e na tradu??o de rituais e pr?ticas de cura. A cosmologia ind?gena ? vivenciada na metr?pole como modo de vida atrav?s de viv?ncias em rituais tornando global o local. A partir da atua??o desses atores evidencio quest?es como tradu??o, modelagem e poder pessoal. O trabalho de pesquisa, a aprendizagem e o fluxo de rela??es que formam um jogo de constitui??o de poder das autoridades neoxam?nicas. Busquei principalmente situa??es nos eventos de xamanismo urbano organizados por Sthan Xanni?, no Rio de Janeiro, S?o Paulo e Minas Gerais principalmente
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Rosa, William Domingo. "Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML)". ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/914.

Texto completo
Resumen
The eXtensible Access Control Markup Language (XACML) is allowing enterprises to implement a standard way of access control to their resources. Security administrators no longer need to duplicate their efforts in writing multiple policies for different resources since a XACML policy can be applied to multiple resources. Companies such as IBM, Sun Microsystems, Oracle, and Cisco are already providing integration of XACML in their products. Although the introduction of XACML has provided enterprises with a better approach of commonly realizing access control, there are still inconsistencies that policy administrators need to be aware of. This thesis identifies some of the inconsistencies in XACML today and introduces a new tool that can be used to visualize some of those inconsistencies. This new tool could be used by a policy administrator to visualize possible conflicting data among a set of policies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Semenski, Vedran. "An ABAC framework for IoT applications based on the OASIS XACML standard". Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18493.

Texto completo
Resumen
Mestrado em Engenharia de Computadores e Telemática
A IoT (Internet of Things) é uma área que apresenta grande potencial mas embora muitos dos seus problemas já terem soluções satisfatórias, a segurança permanece um pouco esquecida, mantendo-se um como questão ainda por resolver. Um dos aspectos da segurança que ainda não foi endereçado é o controlo de acessos. O controlo de acesso é uma forma de reforçar a segurança que envolve avaliar os pedidos de acesso a recursos e negar o acesso caso este não seja autorizado, garantindo assim a segurança no acesso a recursos críticos ou vulneráveis. O controlo de Acesso é um termo lato, existindo diversos modelos ou paradigmas possíveis, dos quais os mais significativos são: IBAC (Identity Based Access Control), RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control). Neste trabalho será usado o ABAC, já que oferece uma maior flexibilidade comparativamente a IBAC e RBAC. Além disso, devido à sua natureza adaptativa o ABAC tem maior longevidade e menor necessidade de manutenção. A OASIS (Organization for the Advancement of Structured Information Standards) desenvolveu a norma XACML (eXtensible Access Control Markup Language) para escrita/definição de políticas de acesso e pedidos de acesso, e de avaliação de pedidos sobre conjuntos de políticas com o propósito de reforçar o controlo de acesso sobre recursos. O XACML foi definido com a intenção de que os pedidos e as políticas fossem de fácil leitura para os humanos, garantindo, porém, uma estrutura bem definida que permita uma avaliação precisa. A norma XACML usa ABAC. Este trabalho tem o objetivo de criar uma plataforma de segurança que utilize os padrões ABAC e XACML que possa ser usado por outros sistemas, reforçando o controlo de acesso sobre recursos que careçam de proteção, e garantindo acesso apenas a sujeitos autorizadas. Vai também possibilitar a definição fina ou granular de regras e pedidos permitindo uma avaliação com maior precisão e um maior grau de segurança. Os casos de uso principais são grandes aplicações IoT, como aplicações Smart City, que inclui monitorização inteligente de tráfego, consumo de energia e outros recursos públicos, monitorização pessoal de saúde, etc. Estas aplicações lidam com grandes quantidades de informação (Big Data) que é confidencial e/ou pessoal. Existe um número significativo de soluções NoSQL (Not Only SQL) para resolver o problema do volume de dados, mas a segurança é ainda uma questão por resolver. Este trabalho vai usar duas bases de dados NoSQL: uma base de dados key-value (Redis) para armazenamento de políticas e uma base de dados wide-column (Cassandra) para armazenamento de informação de sensores e informação de atributos adicionais durante os testes.
IoT (Internet of Things) is an area which offers great opportunities and although a lot of issues already have satisfactory solutions, security has remained somewhat unaddressed and remains to be a big issue. Among the security aspects, we emphasize access control. Access Control is a way of enforcing security that involves evaluating requests for accessing resources and denies access if it is unauthorised, therefore providing security for vulnerable resources. Access Control is a broad term that consists of several methodologies of which the most significant are: IBAC (Identity Based Access Control), RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control). In this work ABAC will be used as it offers the most flexibility compared to IBAC and RBAC. Also, because of ABAC's adaptive nature, it offers longevity and lower maintenance requirements. OASIS (Organization for the Advancement of Structured Information Standards) developed the XACML (eXtensible Access Control Markup Language) standard for writing/defining requests and policies and the evaluation of the requests over sets of policies for the purpose of enforcing access control over resources. It is defined so the requests and policies are readable by humans but also have a well defined structure allowing for precise evaluation. The standard uses ABAC. This work aims to create a security framework that utilizes ABAC and the XACML standard so that it can be used by other systems and enforce access control over resources that need to be protected by allowing access only to authorised subjects. It will also allow for fine grained defining of rules and requests for more precise evaluation and therefore a greater level of security. The primary use-case scenarios are large IoT applications such as Smart City applications including: smart traffic monitoring, energy and utility consumption, personal healthcare monitoring, etc. These applications deal with large quantities (Big Data) of confidential and/or personal data. A number of NoSQL (Not Only SQL) solutions exist for solving the problem of volume but security is still an issue. This work will use two NoSQL databases. A key-value database (Redis) for the storing of policies and a wide-column database (Cassandra) for storing sensor data and additional attribute data during testing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Toktar, Emir. "Controle de admissão de RSVP utilizando XACML / Emir Toktar ; orientador, Edgar Jamhour". reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2003. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=2258.

Texto completo
Resumen
Dissertação (mestrado) - Pontifícia Universidade Católica do Paraná, Curitiba, 2003
Inclui bibliografias
O avanço tecnológico determinou o surgimento de novas aplicações sobre a Internet, sendo necessário a garantia de serviços prestados aos usuários através de um efetivo controle dos recursos disponíveis da rede de computadores. O acesso à rede com garantia
The technological advance determined the sprouting of new applications on the Internet, being necessary to the guarantee of services given to the users through an effective control of the available resources of the computer network. The access to the net
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Hendricks, Mona. "Remaking /Xam narratives in a post-apartheid South Africa". Thesis, University of the Western Cape, 2010. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_4856_1361369794.

Texto completo
Resumen

Public history has become a dynamic new field of study in South African historiography during the post-apartheid period. As a field of applied history, it has been engaged with analysing the highly contested nature of knowledge production across a wide range of public sites. These include museums, art galleries, archaeological digs, theme-parks, shopping malls, tourist attractions and heritage sites. The wider national cultural and political challenge has been that of working towards restoration, healing, and reparation in the wake of a colonial and apartheid history marked by particularly acute brutality and dispossession. This thesis analyses the attempts of one public institution, the Iziko South African Museum, to negotiate the remaking of public history in the post-apartheid period. Unlike some of the newer sites of cultural production, such as the Cape Town Waterfront and the West Coast cultural village of !Kwa-ttu, the South African Museum has a century-long history of complicity in generating images of racial and cultural others, notably Khoisan communities. The thesis begins by exploring this history and the ways in which the South African Museum has tried to come to terms with this legacy in its post-apartheid policies: firstly, in the discussions and debates around the closing of the Bushman diorama (2001), and secondly, in the creation of a new exhibition on San rock art which draws extensively on the Bleek-Lloyd Collection (/Qe: The Power of Rock Art. Ancestors, Rain-making and Healing, 2003 to the present). The Iziko South African Museum has not been successful in its attempts to meet the challenge of coming to terms with its history of collecting human remains and creating body casts and putting them on display. I argue that the measures it has introduced over the last twenty two years, including the &lsquo
revision of the Bushman diorama exhibition&rsquo
(1988-89), to Miscast (1996), and the 
closure 
of the diorama (2001), are little more than window-dressing and staged productions, with lip-service being paid to transformation. In the place of the effective opening out of debate and discussion about the Museum&rsquo
s history of racial scientific research, we have seen the presentation of a new framework of knowledge about Khoisan communities through the &lsquo
lens of rock art 
research&rsquo
and the Bleek-Lloyd-/Xam records. I see these as a way of sanitising the story about colonialism and apartheid. In making these arguments I draw upon a number of scholarly works by academics involved in public and visual history
recent literature on trauma narratives
Foucauldian discourse
and newspaper.

Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Sousa, Alysson Ericeira. "A PERFORMANCE DO CONTADOR DE HISTÓRIA CONTEMPORÂNEO: a experiência do grupo Xama Teatro". Universidade Federal do Maranhão, 2014. http://tedebc.ufma.br:8080/jspui/handle/tede/12.

Texto completo
Resumen
Made available in DSpace on 2016-08-16T18:10:22Z (GMT). No. of bitstreams: 1 DISSERTACAO_ALYSSON ERICEIRA SOUSA.pdf: 1539068 bytes, checksum: 07139af5bf6cb0b88568f04c4f031d9e (MD5) Previous issue date: 2014-01-31
Aiming to comprehend the issues related to the storyteller s performance on contemporary days, this essay analyzes the experience of XamaTeatro group, having as a reference the spectacle A carroça é nossa . In order for that, it is discussed about the historical path that has led to disappearance and resurgence of storytellers on urban centers, taking in consideration the concepts of memory, tradition and modernity as well as the studies concerning performance, performativity and theatricality on contemporary scene. The essay results from a qualitative investigation based on a narrative research on which I analyze the training laboratories and the spectacles performed by this research s object group.
Visando a compreender as questões relacionadas à performance do contador de histórias na contemporaneidade, o trabalho analisa a experiência do grupo Xama Teatro, tendo como referência o espetáculo A carroça é nossa. Para tanto, discorre sobre o percurso histórico que levou ao desaparecimento e ao ressurgimento dos contadores de histórias nos centros urbanos, levando em consideração os conceitos de memória, tradição e modernidade, assim como os estudos sobre performance, performatividade e teatralidade na cena contemporânea. O trabalho é resultado de uma investigação qualitativa com base na pesquisa narrativa em que analiso os laboratórios de formação e os espetáculos realizados pelo grupo objeto da pesquisa.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Uttha, Worachet. "Etude des politiques de sécurité pour les applications distribuées : le problème des dépendances transitives : modélisation, vérification et mise en oeuvre". Thesis, Aix-Marseille, 2016. http://www.theses.fr/2016AIXM4044/document.

Texto completo
Resumen
Le contrôle d’accès est un ingrédient fondamental de la sécurité des systèmes d’information. Depuis les années 70, les travaux dans ce domaine ont apporté des solutions aux problèmes de confidentialités des données personnelles avec applications à différents environnements. Parmi les modèles de contrôle d’accès, nous nous intéressons au modèle basé sur les organisations (OrBAC) et nous en proposons une extension adaptée aux contextes distribués tels que les services web. Cette extension est capable de gérer les demandes d’accès transitifs. Ce cas peut se produire quand un service doit appeler un autre service qui peut avoir besoin d’en invoquer à son tour un ou plusieurs autres pour satisfaire la demande initiale. Nous appelons D-OrBAC (Distributed Organisation Based Access Control), l'extension du modèle OrBAC avec une notion de procuration représentée par un graphe de délégation, qui nous permet de représenter les accords entre les différentes organisations impliquées dans la chaîne d’invocations de services, et de garder la trace des autorisations transitives. Nous proposons aussi une technique d’analyse basée sur Datalog permettant de simuler des scénarios d’exécution et de vérifier l’existence de situations non sécurisées. Nous utilisons ensuite des techniques de réécriture pour assurer que la politique de sécurité spécifiée via le modèle D-OrBAC respecte les propriétés importantes telles que terminaison et consistance. Enfin, nous implémentons pour un cas d’étude, le mécanisme d’évaluation des demandes d’accès selon la norme XACML afin de montrer que notre solution est capable de fournir à la fois la fonctionnalité désirée et la sécurité nécessaire pour le système
The access control is a fundamental ingredient of computer security. Since the 70s, the research in this area has provided many solutions to the privacy issue of personal data with applications to different environments (operating systems, databases, etc.). Among many access control models, we are interested in the model based on organisations (OrBAC) and we propose an extension adapted to distributed environments such as web services. This extended model is able, in particular, to handle access transitive requests. This situation can occur when a service has to call another service that may need to invoke in turn one or more services to meet the initial demand.We call D-OrBAC (Distributed Organisation Based Access Control), the extension of OrBAC model with a notion of delegation represented by a delegation graph. This graph allows us to represent agreements between the different organisations involved in the chain of service invocations, and to keep track of transitive authorisations. We also propose an analytical technique based on Datalog that allows us to simulate execution of scenarios and to check for the existence of unsafe situations.Thereafter, we use rewriting techniques to ensure that the security policy specified via our D-OrBAC model complies with important properties such as termination and consistency. Finally, we implement for a case study, the mechanism of access request evaluations according to the XACML on the WSO2 Identity Server platform to show that our solution is able to provide both the desired functionality and the security for the system
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Vasconcelos, Gisele Soares de. "Ator-contador: a voz que canta, fala e conta nos espetáculos do Grupo Xama Teatro". Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/27/27156/tde-22092016-143149/.

Texto completo
Resumen
O trabalho analisa os processos criativos da escritura do texto e escritura do corpo na rapsódia Minha Mãe Preta e nos espetáculos A Carroça é Nossa, A Besta Fera e As Três Fiandeiras, do grupo Xama Teatro. O grupo, com sede em São Luís, Maranhão, desenvolve seus espetáculos tendo como ponto de partida a arte de narrar. Nas produções artísticas do grupo ganha destaque a figura do ator-contador: aquele que canta, conta e fala, que reveza o narrador e a personagem, a primeira e a terceira pessoa. O ator-contador constrói seus passos a partir dos rastros dos rapsodos e griots, do sujeito épico, dos brincantes e narradores anônimos. Com o pé fincado na memória, na tradição e na oralidade, ele fala de si e também fala do outro; com o poder da palavra mescla histórias reais e ficcionais. Para a manifestação da figura do ator-contador são necessárias algumas condições. Entre elas: o uso de uma voz que evoca elementos ausentes; o pensamento do neutro que produz o espaçamento entre a fala e a ação; a noção do espectador como público-ouvinte; o uso de uma fala direta para o público; a criação autoral de obras com textos de vocação oral; a escrita de uma dramaturgia híbrida que mescla os modos épico, lírico e dramático; a inserção do dramaturgo-contador no processo de criação, de forma conjugada com os atores-contadores.
This research paper analyzes the creative processes of both text and body writings of the rhapsody Minha Mãe Preta (My Black Mother), and the presentations A Carroça é Nossa (The Cartwheel is Ours), A Besta Fera (The Stupid Beast), and As Três Fiandeiras (The Three Spinners). The Xama Teatro Group, established in the city of São Luís, in the State of Maranhão, develops its presentations having the art of narrating as its starting point. In its artistic productions, the character of the actor-storyteller stands out: he is the one that sings, tells stories and talks, switching from the persona to the narrator, from the first to the third person. The actor-storyteller builds up his steps as from the path of rapsodos and griots, from the epic subject, from the brincantes (players), and from the anonym narrators. With his foot planted in memory, tradition and orality, he speaks of himself and also speaks of others, combining both real and fictional stories. In order to manifest the character of the actor-storyteller, some settings are necessary. Among them: the use of a voice that evokes missing elements; the neutral thought that produces the spacing between speech and action; the notion of the observer being the public listener; the use of a direct speech to the public; the authorial creation of works with oral vocation texts; the writing of a hybrid dramaturgy that mixes the epic, lyric and dramatic modes; the insertion of the playwright-storyteller in the creation process, in a conjugated way with actors-storytellers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Johansson, Anna y Christina Bäck. "Produktionsplaneringsrutiner för manuella svetsresurser". Thesis, University West, Department of Technology, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-795.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Brechlerová, Dagmar. "XML bezpečnost a její uplatnění v univerzitním informačním prostředí". Doctoral thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3739.

Texto completo
Resumen
XML security je komplexem bezpečnostních řešení, která spojují rysy XML a internetu k řešení bezpečnosti zejména v rozsáhlých počítačových sítích. XML security se velmi dynamicky rozvíjí, v současnosti jsou některé části (podpis, šifrování) již ve fázi konečného vývoje, jiné stále procházejí velmi rychlým vývojem, který je velmi obtížné sledovat. Hlavním cílem práce bylo kriticky zmapovat oblast XML security, popsat výhody, zápory i rizika proti jiným bezpečnostním řešením, a navrhnout některé možnosti použití v univerzitním informačním systému.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Alissa, Khalid Adnan A. "Authorisation management in business process environments: An authorisation model and a policy model". Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/88962/1/Khalid%20Adnan%20A_Alissa_Thesis.pdf.

Texto completo
Resumen
This thesis provides two main contributions. The first one is BP-TRBAC, a unified authorisation model that can support legacy systems as well as business process systems. BP-TRBAC supports specific features that are required by business process environments. BP-TRBAC is designed to be used as an independent enterprise-wide authorisation model, rather than having it as part of the workflow system. It is designed to be the main authorisation model for an organisation. The second contribution is BP-XACML, an authorisation policy language that is designed to represent BPM authorisation policies for business processes. The contribution also includes a policy model for BP-XACML. Using BP-TRBAC as an authorisation model together with BP-XACML as an authorisation policy language will allow an organisation to manage and control authorisation requests from workflow systems and other legacy systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Ysasi, Alonso Alejandro. "La obra gráfica de Pedro Quetglas “Xam” (1915-2001): la riqueza de un patrimonio". Doctoral thesis, Universitat de les Illes Balears, 2014. http://hdl.handle.net/10803/284394.

Texto completo
Resumen
És una investigació, anàlisis, i aproximació a l’obra gràfica de l’artista mallorquí, del segle XX, Pere Quetglas, conegut pel pseudònim de “Xam”. La seva activitat s'ha sistematitzat sobre la base la biografia, tècniques treballades i el seu entorn. Xam, es va exercitar en la caricatura, el dibuix, el cartell, el gravat xilogràfic, la pintura, els monotips, la serigrafia i en el gravat calcogràfic. Del conjunt de tota la seva producció l’autor se centra en l'obra gràfica produïda a partir de 1944, quan pot datar-se la seva primera xilografia, i la seva defunció, l’any 2001, en el qual realitza la seva última litografia. El treball s'insereix en un àmbit sense tradició immediata sobre l'obra gràfica a Mallorca, pràcticament desapareguda després de la important impremta Guasp. S'han pogut documentar més de 400 matrius. Alhora, s'han treballat les estampacions d'aquestes, que ascendeixen a 600 estampes calcogràfiques, xilogràfiques, serigràfiques i litogràfiques.
Es una investigación, análisis, y aproximación a la obra gráfica del artista mallorquín, del siglo XX, Pedro Quetglas, conocido por el seudónimo de “Xam”. Su actividad se ha sistematizado en base a la biografía, técnicas trabajadas y a su entorno. Xam, se ejercitó en la caricatura, el dibujo, el cartel, el grabado xilográfico, la pintura, los monotipos, la serigrafía y en el grabado calcográfico. Del conjunto de toda su producción se centra en la obra gráfica producida a partir de 1944, cuando puede datarse su primera xilografía, y su fallecimiento, en 2001, en el cual realiza su última litografía. La tarea se inserta en un ámbito sin tradición inmediata sobre la obra gráfica en Mallorca, prácticamente desaparecida tras la importante imprenta Guasp. Se han podido documentar más de 400 matrices. A su vez, se han trabajado las estampaciones de estas, que ascienden a 600 estampas calcográficas, xilográficas, serigráficas y litográficas.
The thesis is research, analysis and approach to the graphic work of the Majorcan artist of the 20th century, Pedro Quetglas, known by his pseudonym "Xam". Xam worked in several art fields, such as caricature, drawing, designing and painting posters, woodcut, painting, monotype, serigraphy and calcography engraving. From the sum of his work the thesis is centred in the graphic work produced between 1944, when we can date the first xylography, and his death, 2001, when he finished his last lithography. The task was inserted in a field without immediate tradition on the graphic work in Mallorca, which practically went missing after the important Guasp printing house closed down. It has been possible to document more than 400 blocks and, at the same time, the prints of those which add up to 600 prints on chalcography, xylography, serigraphy and lithography.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Rore, Guajardo Marisa del Carmen. "Estudio del endurecimiento en aleaciones Cu-xAl-xNi,CON x=3,5 y 7% at". Tesis, Universidad de Chile, 2012. http://www.repositorio.uchile.cl/handle/2250/111356.

Texto completo
Resumen
Ingeniera Civil Mecánica
Las aleaciones ternarias Cu-Al-Ni, presentan en el extremo rico en Cu, una solución sólida α de estructura fcc, donde el Al y Ni ocupan posiciones de sustitución. Es sabido que las aleaciones Cu-Al-Ni de estructura inicial fase α, no necesariamente al equilibrio, endurecen por recocido. Durante el desarrollo de esta investigación, año 1994, al revisar la literatura, se encuentra que la mayor parte de las investigaciones originales, respecto al endurecimiento por recocido de las aleaciones Cu-Al-Ni, son previas al año 1950, sin el uso de Microscopía Electrónica de Transmisión (TEM), sino basadas principalmente en análisis por Microscopía Óptica. Una investigación (CANMET, 1977), utiliza Microscopía Óptica, Extracción Química y Microsonda Electrónica. La motivación de este trabajo, es estudiar el endurecimiento por recocido de tres aleaciones ternarias Cu-xAl-xNi, con x = 3, 5 y 7% at., de estructura inicial monofásica α, con técnicas de análisis por Microdureza Vickers (100 g), Microscopía Óptica, agregando la técnica de Microscopía Electrónica de Transmisión TEM. Particularmente, en este trabajo, es de interés verificar si tal endurecimiento se debe principalmente a precipitado de una o más fases, precipitado de partículas finas Ni3Al o precipitado de NiAl, entre otros posibles mecanismos. Debido al tamaño de los precipitados que se trate, la técnica de TEM es aquí realmente necesaria para correlacionar las propiedades y microestructura. Mediante observaciones de TEM sobre la muestra, la Imagen obtenida, permite buscar defectos cristalográficos, como dislocaciones y su comportamiento, y con el Diagrama Difracción de electrones, realizar el análisis radiocristalográfico para identificar las distintas fases cristalinas presentes en la muestra, comparando el Diagrama de la muestra con los Diagramas Patrón clasificados sistémicamente en el atlas publicado por la A.S.T.M. Para los recocidos se consideran tiempos de 1 y 3 h, y temperaturas entre 200 y 800 C. La aleación con x= 3 % at no endurece ni presenta modificaciones en su estructura. Las aleaciones con x= 5 y 7 %at si exhiben endurecimiento por recocido; en cada gráfico Dureza versus Temperatura de Recocido, se observa un máximo de dureza para temperaturas de 550-600 [C]. Este endurecimiento se puede asociar, mediante TEM, a la precipitación de finas partículas esféricas de la fase Ni3Al, con un diámetro medio de 0,02-0,03 μm. Nuestros resultados permiten también ayudar a precisar la ubicación del límite α/α + Ni3Al en el diagrama de equilibrio Cu-Ni-Al a 600C. Los resultados obtenidos serán relevantes para motivar y proponer recomendaciones para continuar el desarrollo de esta línea de investigación, para posteriores investigaciones del endurecimiento en aleaciones Cu-Al-Ni, mediante técnicas de análisis de TEM y Difracción de Rayos X, entre otras, y ampliar el campo de aplicación de estas aleaciones.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Abakar, Mahamat Ahmat. "Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public". Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.

Texto completo
Resumen
Dans un environnement ouvert tel que l'Internet, les interlocuteurs sont parfois inconnus et toujours dématérialisés. Les concepts et les technologies de la confiance numérique et de la sécurité informatique doivent se combiner pour permettre un contrôle d'accès en environnement ouvert. Dans nos travaux, nous nous proposons d'étudier les concepts majeurs de cette problématique, puis de concevoir, et enfin de développer un système fonctionnel, basé sur des standards du contrôle d'accès, pour un environnement ouvert et appliqué à l'Internet. Plus précisément, notre étude consiste à mettre en œuvre une architecture de contrôle d'accès basée sur la confiance numérique. L'élément central de cette architecture est l'environnement utilisateur très riche et déployé en ligne. Cet environnement est doté de trois modules principaux qui permettent à l'utilisateur de mener à bien ses transactions. Ces modules sont le module d'analyse de règlements, le module de récupération de données et le module de validation de règlements. Nous avons élaborés des algorithmes utilisés dans ces modules. L'usage est le suivant. L'utilisateur demande un service à un fournisseur de services, celui-ci analyse la requête de l'utilisateur et extrait le règlement à partir de la base des règles de contrôle d'accès. Cette architecture est conçue à l'aide de modèles de contrôle d'accès basé sur les attributs et le langage XACML. Ce règlement contient des conditions à satisfaire par l'utilisateur pour obtenir le droit d'accès à la ressource demandée. Le module d'analyse de règlement permet à l'utilisateur d'analyser le règlement reçu du fournisseur de service. Cette analyse consiste à vérifier à l'aide d'un algorithme la disponibilité de ses informations auprès de ses sources d'information d'identité de confiance pour le fournisseur de services. Le module de récupération de données permet ensuite à l'utilisateur de récupérer ses certificats. Le module de validation lui permet de tester qu'il satisfait le règlement grâce aux certificats. Si le règlement est satisfait l'utilisateur diffuse ses certificats au fournisseur de service. La conception de ce système repose sur un ensemble de brique technologiques étudiées et décrites dans ces travaux. Ce document débute par une étude des différents cas d'usage dans le domaine des transactions en ligne. Cette étude permet de mettre en évidence la problématique de la gestion des identités numériques en environnement ouvert. Les organisations virtuelles, la notion de partenariat et la confiance sont des éléments clés qui entrent dans la conception des systèmes de contrôle d'accès basé sur la confiance. Une première étude d'un ensemble de modèles de contrôle d'accès nous permet de dégager le modèle ABAC et le langage XACML pour la conception de notre système. Dans un second temps, nous concevons le modèle de données de notre système de contrôle d'accès distribué et nous présentons et évaluons les algorithmes clés. Ensuite, nous concevons une architecture protocolaire satisfaisant les besoins d'interopérabilité entre les différentes entités impliquées. Il s'agit de protocoles permettant d'établir une session auprès d'un système, permettant de véhiculer un règlement de contrôle d'accès et permettant d'obtenir et de diffuser des informations entre tiers de confiance. La dernière partie est consacrée à l'implémentation réalisée en langage python et en utilisant le " framework " de développement Web Django
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Bhatia, Nupur. "Policy Management in Context-Aware Networks". Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92015.

Texto completo
Resumen
The Ambient Network (AN) Project is part of the European Commission’s 6th Framework Programme and aims to enable cooperation between heterogeneous networks, using current and future wireless technologies, minimising the effort of mobile users to gain access to the services that they are interested in - irrespective of their location or the network they are currently using. Because of the highly mobile nature of users and a demand for instant and dynamic access to services, these networks have to be composed ‘on the fly’ without any pre-configurations. The use of context information in AN can remove the need for pre-configuration of networks, hence making them autonomic. However, a concern exists that the free and uncontrolled dissemination of context information could breech the privacy of the participants. It is extremely important to address these privacy issues in order to control who has access to what context information. This control can be achieved through the use of well defined policies. This creates a requirement for a framework in the ContextWare architecture for protecting context information. This masters thesis project is part of an effort to create a policy based infrastructure for authorisation of access to network context information within the AN. The thesis investigates, models, and designs an architecture for a policy management system based on OASIS XACML, that creates an extension to the architecture for management of context information in the AN. In addition to a policy management architecture within an AN, a policy management architecture for composing ANs is also created. To facilitate the transfer of requests and policies, the thesis creates a Policy Management Protocol. The designed architecture was then implemented to create a proof of concept. The designed architecture and protocol were evaluated by running tests on the prototype. The measurements from the tests are analysed and presented in this thesis. The analysis of the experimental data indicates that a policy management system is both feasible and practical. The results show that the delay overhead caused by introducing policy management in a distributed context provisioning system, ranges from 1.7% in a system without load to 6% in a worst case scenario. The throughput of the policy management system is 15 requests per second under load.
Ambient Network är ett EU-finansierat project inom det 6:e ramprogrammet.Projektets mål är att möjliggöra samarbete mellan heterogena nätverk, som använderbåde dagens men även framtidens trådlösa teknologier, för att minimeraslutanvändarens insats för att nå den tjänst de är intresserade av – oberoende av platseller vilket nätverk de använder. På grund av den stora delen av mobila användaresom kräver omedelbar och dynamisk tillgång till tjänster måste dessa nätverk gåsamman ’on the fly’ utan tidigare konfigurering.Användningen av context information i Ambient Networks kan elmininera behovet avförkonfigurering av nätverk, följaktligen blir de då autonoma. Dock, ett problem somuppkommer med detta är att den fria och okontrollerade spridningen av contextinformation bryter integriteten för deltagarna. Det är väldigt viktigt att ta itu med dettaproblem för att kunna kontrollera vilka som har tillgång till vilken contextinformation. Den här kontrollen kan uppnås genom väldefinierade policies. Dettaskapar ett behov av ett ramverk inom ContextWare arkitekturen för att skydda dentillgängliga context informationen. Den här uppsatsen är en del i ansträngningen att skapa en policy baserad infrastrukturför attestering av tillgång till context information inom Ambient Networks. Uppsatsenundersöker och designar en arkitektur för ett policy handhavande system som ärbaserat på OASIS XACML, den bygger vidare på arkitekturen för handhavande avcontext information i Ambient Networks. Utöver policy hantering inom ett ambientnetwork skapas också policy hantering mellan ambient networks när de förenas. Denframtagna arkitekturen är därefter implementerad för att visa på konceptets hållbarhet. En sammanslagning av två policy handhavande system när två nätverk slås ihop ärbehandlat endast i teorin, det är inte implementerat. Designen utvärderas genom att köra test på den implementerade versionen ochdärefter analysera och visa resultaten i rapporten. Dessa test innehåller mätningar avfördröjningen av en enda begäran samt flera, responstiden i ett system med policyhanteringjämfört med utan samt prestandan i ett policy-hanteringssystem med en litenmängd policies jämfört med en större mängd policies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Staphorst, Luan. "Die wond sê dit aan my: die morele wêreldbeskouing van die |xam as eko-morele fenomenologie". University of the Western Cape, 2020. http://hdl.handle.net/11394/8180.

Texto completo
Resumen
Magister Artium - MA
Despite the loss of speakers of |xam, one of the 28 Khoisan languages once spoken across Southern Africa, a part of the heritage of these speakers can be found in predominantly two archives: that of Wilhelm H. I. Bleek and Lucy Lloyd (1911) and Gideon R. von Wielligh (1919-1921). The archives form the heart of Bushman* Studies, and has long since received attention in, amongst others, anthropology, literature, and linguistics. This study presents an investigation into the ethical views of the |xam, an investigation which, with the single exception of the studies of Antjie Krog (2004-), has not been undertaken in a philosophical tradition. Through a comparative study of texts across archival boundaries, I engage critically with the ethical views of the |xam, specifically the phenomenological nature of these views. To this end, I use the hermeneutical approach in African philosophy, an approach which focuses on identifying and analysing concepts in texts. The approach to ‘reading’ |xam texts remains, however, a burning issue, and the limit to which disciplinary boundaries are appropriate, is debatable (Wessels 2010). Consequently, and as a result of the relative density of the available texts, insights from anthropology, literature, linguistics and rock art are incorporated within the comparative study. I secondly bring the ethical views which are identified through the comparative analysis into conversation with the dominant ethical framework in African philosophy, namely Ubuntu. Where Ubuntu as been ‘read’ through various lenses (Van Niekerk 2013), a phenomenological approach is absent. Further, where Ubuntu, African ethics broadly, is generally regarded as humanist, a salient ecological consciousness is present in the |xam views. A comparison between Ubuntu and the |xam views therefore deepens the discourse around African ethics in general, and further provides insights into the unique nature of the ethical views of the |xam in particular. Through this I attempt to add value both to Bushman Studies and African philosophy, whilst highlighting an important voice unique to Africa which could be added to the burning discussion around ecological decay in the time of the Anthropocene.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Nishino, Yoichi, Takahiro Sugiura, Suguru Tanaka, Yuko Tamada, Yusuke Sandaiji, Hidetoshi Miyazaki, Manabu Inukai et al. "Soft X-ray photoemission study of thermoelectric alloys Fe2−x−yIryV1+xAl and Fe2−xV1+x−yTiyAl". Elsevier, 2011. http://hdl.handle.net/2237/20776.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

McGranaghan, Mark. "Foragers on the frontiers : the |Xam Bushmen of the Northern Cape, South Africa, in the nineteenth century". Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:5d935fc4-648d-427b-8ac0-c134c1e3e755.

Texto completo
Resumen
This thesis constructs an ethnography for the nineteenth century ǀXam Bushmen of the Northern Cape Province of South Africa, known primarily through a nineteenth century manuscript collection of oral narrative (the Bleek-Lloyd archive), which has, over the past twenty-five years, increasingly become the focus of scholarly attention, mined for insights about the cultural world of southern Bushman societies. It draws on the Bleek-Lloyd archive to produce a detailed ethnographic case study, focusing on the ideological and ontological concepts that underpinned the differentiation of ǀXam society. Firstly, the thesis situates the archive and ǀXam society within their particular environmental and historical contexts, providing valuable supplementary information that informs readings of the narratives. By producing a fully searchable transcription of the entirety of the archive, paying close attention to emic terminology, and examining the recurrence of thematic associations of this phraseology throughout the narratives, the analysis explores the constitution of ǀXam ‘personhood’ and examines the extent to which the ‘hunter-gatherer’ category forms a useful heuristic for understanding ǀXam society, with a particular focus on models of the ‘animic ontology’. The ǀXam deployed a series of positively and negatively evaluated traits in the creation of dimensions of authority, obligation, and social responsibility, embedded in particular social identities; central to these constructions and to the differentiation of these identities were the techniques and resources of ǀXam subsistence practices, salient in the production of admirable (socially-responsible hunters), reprehensible (antagonistic ‘beasts of prey’), and more ambiguous (ǃgi:tǝn ritual specialists) identities. Recognising this internal differentiation, the thesis outlines ǀXam ‘subsistence strategies’ and suggests they should be defined broadly to include their contacts and interactions with non-ǀXam groups, with domesticated animals, and with the novel material culture of the colonial period; these interactions were a consequence of their ‘hunter-gatherer’ strategies rather than a negation of them. Such strategies generated experiences that reinforced and reconstituted ǀXam ideological frameworks, incorporating the dynamics of the nineteenth century ‘frontier’ scenario and provided avenues for social change that ultimately led to the collapse of independent hunter-gatherer lifeways, and to the adoption of strategies that incorporated ǀXam individuals within rural and urban ‘Coloured’ populations of the Northern Cape; placing the ǀXam in a comparative colonial context, the thesis stresses the wider relevance of this particular ethnography for understanding hunter-gatherer engagements with food-producing, state-level societies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Kalibjian, Jeffrey R. "THE IMPACT OF XML SECURITY STANDARDS ON MANAGING POST PROCESSED TELEMETRY DATA". International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606667.

Texto completo
Resumen
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
Today many organizations use the Secure Sockets Layer protocol (SSL, now known as TLS, or Transport Layer Security) to secure post processed telemetry data transmitted over internal or external Internet Protocol (IP) networks. While TLS secures data traveling over a network, it does not protect data after it reaches its end point. In the Open Systems Interconnection (OSI) layer model, TLS falls several layers below the application category. This implies that applications utilizing data delivered by TLS have no way of evaluating whether data has been compromised before TLS encryption (from a source), or after TLS decryption (at the destination). This security “gap” can be addressed by adoption of a security infrastructure that allows security operations to be abstracted at an OSI application level.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Lima, Paulo Ricardo Barbieri Dutra. "SGPCA SISTEMA GERENCIADOR DE POLÍTICAS DE CONTROLE DE ACESSO". Universidade Federal de Santa Maria, 2008. http://repositorio.ufsm.br/handle/1/8050.

Texto completo
Resumen
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Information is the most precious assets to organizations; hence it is necessary to have mechanisms to protect it and to make it available only to whom have factual permission to use it. Considering the need for protection of the information in organizations it is proposed in this work a system to manage access control policies which can be easily used, that is, it does not require any knowledge of policies codification language. Further, as the creation of new policies could generate conflicts with existent ones, this work also proposes algorithms which manage automatically, in a period of policies creation, the control of some kinds of conflicts, such as interest conflicts. As result, we have offer a Access Control Police Management System that enable that the process of generation and editing policies occurs easily and without conflicts. The reference model used in this work refers to health organizations; however this study can be applied in other fields.
A informação é o bem mais valioso para as organizações, logo deve-se ter mecanismos para que ela possa ser bem protegida e que seja disponível somente para quem tem real permissão de utilizá-la. Dado esta necessidade de proteção da informação nas organizações, propõe-se neste trabalho um sistema de gerenciamento de políticas de controle de acesso, que possa ser utilizado de forma facilitada, ou seja, não requerendo conhecimento de linguagem de codificação de políticas. Adicionalmente, como a criação de novas políticas pode gerar conflitos com as já existentes, este trabalho propõe também algoritmos que gerenciam automaticamente, em tempo de criação das políticas, o controle de alguns tipos de conflitos, tais como conflitos de interesse. Como resultado tem-se um Sistema Gerenciador de Políticas de Controle de Acesso que possibilita que o processo de geração e edição de políticas ocorra de maneira facilitada e sem conflitos. O modelo de referência utilizado neste trabalho refere-se no âmbito de organizações da saúde, mas o estudo realizado pode ser utilizado em outras áreas.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Sebahi, Samir. "Monitoring business process compliance : a view based approach". Thesis, Lyon 1, 2012. http://www.theses.fr/2012LYO10032/document.

Texto completo
Resumen
De nos jours, les processus métiers permettent une automatisation croissante des tâches et des interconnexions complexes au sein du même système et entre différents systèmes, ce qui est particulièrement facilité par l'émergence des services Web. Dans ce contexte, les tâches de spécification et de vérification de la conformité pendant l’exécution deviennent particulièrement intéressantes. Dans cette thèse, on s’intéresse à deux aspects, le monitoring et la sécurité dans le contexte de l’Architecture Orienté Service (SOA). Ainsi, nous proposons une approche fondée sur le concept de vue et une plateforme qui vise le monitoring de la conformité des processus métiers pendant leur exécution. Ainsi, nous avons développé un langage de monitoring appelé BPath, qui est un langage basé sur XPath, qui offre entre autres, la possibilité de spécifier et de vérifier des propriétés de la logique temporelle linéaire et hybride, des requêtes visant à évaluer des indicateurs quantitatifs sur l’exécution d’un processus métier, ceci dans le but de détecter toute violation des règles de conformité pendant l’exécution.Une des préoccupations spécifiques du monitoring de la conformité pour les environnements basés sur SOA est la sécurité. Ainsi, nous proposons une architecture de sécurité fondée sur des langages dédiés (DSL) pour SOA. Nous avons particulièrement développé une DSL graphique pour faciliter la spécification et la génération des contrôles d’accès. Nos approches sont mises en œuvre et intégrés dans une plateforme développée dans le cadre du projet Européen COMPAS qui vise à assurer la conformité de bout en bout dans les environnements basés sur SOA
Nowadays, business processes allow more automation of tasks and complex interconnections within the same system and across different systems, which is particularly facilitated by the emergence of Web services. In this context, the tasks of specifying and checking compliance at runtime become particularly challenging.In this thesis, our goal is twofold: monitoring and security in the context of Service Oriented Architecture (SOA). Thus, we proposed a view-based monitoring approach and a framework that target monitoring of business process compliance at runtime. Our monitoring framework aims to offer an easy way to specify properties to be monitored and to facilitate its integration with SOA based environments. Thus, we have developed a new monitoring language called BPath, which is an XPath-based language that offers among others, the ability to express and to check temporal and hybrid logic properties at runtime, making the execution of business processes visible by expressing and evaluating quantitative indicators, in order to detect any compliance violation at runtime. A specific compliance monitoring concern in SOA based environment is security, which is also an important aspect for companies willing to give access to some of their resources over the Web. Thus, we proposed a domain specific language (DSL) based architecture for ensuring security in SOA environments. We particularly focused on access control by proposing a graphical language to facilitate the specification and generation of access control policies.Our approaches are implemented and integrated within a complete end to end compliance framework developed within the COMPAS project
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Alpay, Erdem. "Patient Privacy And Consent Management In Ehealth". Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614525/index.pdf.

Texto completo
Resumen
Health information of patients are preserved either in Electronic Health Records (EHR) repositories which are generally managed in national level or in local hospital systems. However, the real owners of the data are always the patients themselves, without depending where or by whom the data is preserved. Patients should have the rights to permit or deny the access of modification of their information to whoever they want. Here comes the concept of Consent. Consent means provision of approval or agreement, after thoughtful consideration. Decisions of patients about sharing their information are collected and preserved in consent documents. These consent documents can be stored in different formats. The eXtensible Access Control Markup Language (XACML) defines the policy language for this purpose. Also there is another language defined by XACML called Request/Response Language for creating request to access information and response to reply requests. Even though XACML is the most appropriate standard for conserving consent documents, it has some weak points when used in practical systems. In the first part of this study, a new model based on XACML is designed. This model is easily convertable to XACML and vice versa. Then a Consent Management tool is designed using the new model. This tool has two parts, Basic Consent Editor and Consent Manager. Basic Consent Editor is aiming to provide a practical user interface for creating and managing consent documents. Consent Manager on the other hand plays a decision mechanism role which handle requests and create decision responses according to already created consent documents. In this study, three different tools are implemented based on the Consent Management tool, each for different purposes on different projects. Throughout these implementations, usability and possible extensibility of Consent Management tool is analysed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Moreau, Stéphane. "Structure de la phase metastable zr 1 xal xo 2 x / 2 elaboree par voie chimique : effet de la synthese". Orléans, 1999. http://www.theses.fr/1999ORLE2016.

Texto completo
Resumen
La cristallisation de poudres amorphes d'oxydes mixtes elaborees a partir de precurseurs liquides intervient souvent a des temperatures (400\c-900\c) pour lesquelles la diffusion est tres limitee. Elle peut conduire par exemple a des phases metastables ou a une extension des domaines de solutions solides. Dans le cas de la zircone, ce mode d'elaboration permet l'obtention de solutions solides etendues a temperature ambiante avec des dopants de taille tres inferieure a zr 4 +. L'etude du systeme zro 2-al 2o 3 a ete entreprise afin de montrer l'influence de la synthese des precurseurs amorphes sur la limite de solubilite de al 2o 3 dans l'oxyde de zirconium et de mieux comprendre les mecanismes de stabilisation de la zircone par un cation de taille reduite comme al 3 +. La solution solide metastable zr 1 xal xo 2 x / 2 a ete obtenue par cristallisation de precurseurs amorphes synthetises par precipitation et atomisation. L'extension du domaine de solution solide est fonction de la synthese. Le comportement a la cristallisation de ces precurseurs a pu etre correle a l'environnement local de l'aluminium. La diffraction des rayons x et la spectroscopie raman ont mis en evidence une symetrie de type quadratique pour cette solution solide. De plus, les spectroscopies d'absorption x (exafs du zirconium) et de rmn (mas et multi-quanta mas 2 7al) ont ete mise en uvre afin de determiner la structure locale autour des cations zr 4 + et al 3 + et de preciser la localisation des lacunes d'oxygene. L'etude du systeme ternaire zro 2-y 2o 3-al 2o 3 a permis de montrer l'effet de la presence d'un cation de grande taille comme y 3 + sur la repartition des lacunes et la distribution des cations al 3 + dans la structure. Enfin, l'etude complementaire des systemes zro 2-fe 2o 3 et zro 2-ga 2o 3 a montre une difference de comportement du cation al 3 + par rapport a des cations de taille analogue comme fe 3 + et ga 3 +.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Seelam, Uma Maheswara. "STRUCTURAL CHARACTERIZATION OF SPUTTER-DEPOSITED SS304+XAL (X = 0, 4, 7 AND 10 WT.%) COATINGS AND MECHANICALLY MILLED TI, ZR AND". Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3527.

Texto completo
Resumen
Study of the metastable phases obtained by non-equilibrium processing techniques has come a long way during the past five decades. New metastable phases have often given new perspectives to the research on synthesis of novel materials systems. Metastable materials produced by two non-equilibrium processing methods were studied for this dissertation- 304-type austenitic stainless steel (SS304 or Fe-18Cr-8Ni)+aluminum coatings produced by plasma enhanced magnetron sputter-deposition (PEMS) and nanocrystalline Ti, Zr and Hf powders processed by mechanical milling (MM). The objective of the study was to understand the crystallographic and microstructural aspects of these materials. Four SS304+Al coatings with a nominal Al percentages of 0, 4, 7 and 10 wt.% in the coatings were deposited on an SS304 substrate by PEMS using SS304 and Al targets. The as-deposited coatings were characterized by x-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM) and three-dimensional atom probe microscopy (3DAP). Surface morphology and chemical analysis were studied by SEM. Phase identification was carried out by XRD and TEM. The microstructural features of all the coatings, as observed in the TEM, consisted of columnar grains with the columnar grain width (a measure of grain size) increasing with an increase in the Al content. The coatings had grains with average grain sizes of about 100, 290, 320 and 980 nm, respectively for 0, 4, 7 and 10 wt.% Al. The observed grain structures and increase in grain size were related to substrate temperature during deposition. XRD results indicated that the Al-free coating consisted of the non-equilibrium ferrite and sigma phases. In the 4Al, 7Al and 10Al coatings, equilibrium ferrite and B2 phases were observed but no sigma phase was found. In 10Al coating, we were able to demonstrate experimentally using 3DAP studies that NiAl phase formation is preferred over the FeAl phase at nano scale. During mechanical milling of the hexagonal close packed (HCP) metals Hf, Ti and Zr powders, unknown nanocrystalline phases with face centered cubic (FCC) structure were found. The FCC phases could be either allotropes of the respective metals or impurity stabilized phases. However, upon MM under high purity conditions, it was revealed that the FCC phases were impurity stabilized. The decrease in crystallite size down to nanometer levels, an increase in atomic volume, lattice strain, and possible contamination were the factors responsible for the transformation.
Ph.D.
Department of Mechanical, Materials and Aerospace Engineering;
Engineering and Computer Science
Materials Science & Engr PhD
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

KENTZINGER, EMMANUEL. "Ordre et mobilite atomique dans les alliages cubiques centres : diffusion de neutrons dans fe#1#-#xal#x et simulations monte-carlo". Université Louis Pasteur (Strasbourg) (1971-2008), 1996. http://www.theses.fr/1996STR13113.

Texto completo
Resumen
Pour comprendre l'interdependance de l'ordre et de la mobilite atomique dans les alliages et composes intermetalliques ordonnes sur un reseau cubique centre (phases b2 et do#3), une etude experimentale de l'ordre local et des enthalpies de migration par diffusion diffuse et inelastique de neutrons a ete entreprise dans le systeme fe#1#-#xal#x en fonction de la concentration (x = 0. 2, 0. 25, 0. 3) et de la temperature (300 k a 1373 k). Pour modeliser cette interdependance, des simulations monte carlo (mc) des cinetiques de mise en ordre a longue distance ont ete effectuees dans les phases b2 et do#3. Les energies d'interaction de paires effectives (eip) ont ete obtenues dans fe#7#5al#2#5 a 1373 k par une analyse dans l'espace reciproque de l'intensite de diffusion diffuse due a l'ordre a courte distance suivant la methode de variation des amas. La valeur obtenue pour l'eip entre premiers voisins sera un des parametres d'entree du modele mc developpe pour la structure do#3. Les enthalpies de migration (h#m) ont ete deduites de la determination des spectres de phonons. Elles decroissent avec la concentration (minimum a la stoechiometrie fe#3al) et la temperature, mais semblent peu sensibles a l'etat d'ordre. L'effet de l'ordre sur h#m n'apparait clairement que lors d'une discussion comparative dans le cadre du modele monte carlo des valeurs de h#m pour deux composes fe#3al et fe#3si de stabilites differentes. Ce modele, qui montre une forte contribution des eip a l'enthalpie de migration tant dans la phase b2 que do#3, contribution d'autant plus elevee que la concentration de lacunes est faible, permet en outre d'interpreter d'autres resultats experimentaux tels que l'augmentation de l'enthalpie d'activation (h#a) de la diffusion avec la mise en ordre b2 dans les alliages feco ou fe#3al ou encore la decroissance de h#a avec les ecarts a la stoechiometrie dans feal b2
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Seelam, Uma Maheswara Rao. "Structural characterization of sputter-deposited SS304+xAl (x = 0, 4, 7 and 10 wt.%) coatings and mechanically milled Ti, Zr and Hf powders". Orlando, Fla. : University of Central Florida, 2010. http://purl.fcla.edu/fcla/etd/CFE0003161.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

HANNA, BAKRAJI ELIAS. "Etude de la position des atomes d'oxygene dans le reseau de ga#1#xal#xas prepare par epitaxie en phase vapeur a partir d'organometalliques". Paris 11, 1990. http://www.theses.fr/1990PA112074.

Texto completo
Resumen
Nous avons etudie la localisation de l'impurete oxygene dans des couches minces de ga#1##xal#xas preparees par epitaxie en phase vapeur a partir de composes organometalliques (arsine, trimethylaluminium, trimethylgallium). La concentration totale en oxygene a ete mesuree par activation avec des helions 3 d'energie 3 mev et suivant la reaction nucleaire #1#6o(#3he,p)#1#8f. Cette concentration varie entre quelques ppm (en poids) et quelques dizaines de ppm; elle augmente avec le pourcentage d'aluminium dans la couche. A pourcentage d'aluminium fixe, elle ne varie que peu avec le debit d'arsine. La position des atomes d'oxygene dans le reseau de ga#1##xal#xas a ete determinee en combinant l'activation par les helions 3, avec la canalisation de ces particules dans le reseau cristallin de la couche. Nous avons observe qu'a concentration d'aluminium fixee, la proportion d'atomes d'oxygene en position interstitielle augmente avec le de it d'arsine et qu'a debit d'arsine fixe, elle augmente avec la concentration totale en oxygene. Ce phenomene est explique en faisant l'hypothese que l'oxygene se place d'abord sur des sites d'arsenic inoccupes (cas d'un faible debit d'arsine). Ensuite, ce sont les sites interstitiels qui sont occupes par l'oxygene. Enfin, une methode experimentale de mesure des pouvoirs d'arret en canalisation a ete mise au point. Nous avons montre qu'a 3 mev, la perte d'energie des penetrant dans un reseau cristallin de gaas en posdition aleatoire est superieure d'environ 30% a celle observee avec unc cristal en position de canalisation suivant une direction <100>. Ces resultats restent a exploiter dans de futures experiences combinant canalisation et reactions nucleaires
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía