998 resultados para Key, Emil, 1822-1892.
Resumo:
Written by William Rufus Perkins this book is the history of the Trappist Abbey of New Melleray in Dubuque County, Iowa. New Melleray is a Cistercian (Trappist) monastery located in the rolling farmland south of Dubuque
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
Although sleep is defined as a behavioral state, at the cortical level sleep has local and use-dependent features suggesting that it is a property of neuronal assemblies requiring sleep in function of the activation experienced during prior wakefulness. Here we show that mature cortical cultured neurons display a default state characterized by synchronized burst-pause firing activity reminiscent of sleep. This default sleep-like state can be changed to transient tonic firing reminiscent of wakefulness when cultures are stimulated with a mixture of waking neurotransmitters and spontaneously returns to sleep-like state. In addition to electrophysiological similarities, the transcriptome of stimulated cultures strikingly resembles the cortical transcriptome of sleep-deprived mice, and plastic changes as reflected by AMPA receptors phosphorylation are also similar. We used our in vitro model and sleep-deprived animals to map the metabolic pathways activated by waking. Only a few metabolic pathways were identified, including glycolysis, aminoacid, and lipids. Unexpectedly large increases in lysolipids were found both in vivo after sleep deprivation and in vitro after stimulation, strongly suggesting that sleep might play a major role in reestablishing the neuronal membrane homeostasis. With our in vitro model, the cellular and molecular consequences of sleep and wakefulness can now be investigated in a dish.
Resumo:
Through an act of the Iowa Legislature, the Violator Program came into existence some 20 years ago, the purpose of which was to provide an alternative to long-term imprisonment for those offenders whose probation/parole had been suspended. This 4-6 month program is currently administered at three locations: Luster Heights, Newton Correctional Release Center,and the Iowa Correctional Institution for Women.
Resumo:
What we do: Since 1892, the Iowa Geological and Water Survey (IGWS) has provided earth, water, and mapping science to all Iowans. We collect and interpret information on subsurface geologic conditions, groundwater and surface water quantity and quality, and the natural and built features of our landscape. This information is critical for: Predicting the future availability of economic water supplies and mineral resources. Assuring proper function of waste disposal facilities. Delineation of geologic hazards that may jeopardize property and public safety. Assessing trends and providing protection of water quality and soil resources. Applied technical assistance for economic development and environmental stewardship. Our goal: Providing the tools for good decision making to assure the long-term vitality of Iowa’s communities, businesses, and quality of life. Information and technical assistance are provided through web-based databases, comprehensive Geographic Information System (GIS) tools, predictive groundwater models, and watershed assessments and improvement grants. The key service we provide is direct assistance from our technical staff, working with Iowans to overcome real-world challenges. This report describes the basic functions of IGWS program areas and highlights major activities and accomplishments during calendar year 2011. More information on IGWS is available at http://www.igsb.uiowa.edu/.