Essays about: "b to b"

Showing result 1 - 5 of 1180 essays containing the words b to b.

  1. 1. Does swapping the race and gender of Communicators affect perspectives on Leadership & Securitization? Donald Trump and how people feel about his words coming out of other peoples mouths.

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Enrique Carrion; [2017-10-26]
    Keywords : Securitization; Leadership; Ethnodrama; Symbolic Interaction; Donald Trump;

    Abstract : The purpose of this paper is to delve further into the social experiment undertaken by associate professor of economics and political science at Insead, Maria Guadalupe, and associate Professor of Educational theater at New York University Joe Salvatore, in their breakthrough ethnodrama gender swapping study titled “Her Opponent”, and see if through a quantitative analysis it showed us similar results, when the dynamics of not only gender swapping, but also race swapping were applied. The present research examines the perception of Donald Trump through the interpretive guides and theoretical lenses of Symbolic Interaction Theory, Communication leadership, Critical Theory of Communication in Organizations, and Securitization theory, to see if what Donald Trump says and his ideologies would be perceived differently, if what he says was stated by individuals of a different gender and/or race. READ MORE

  2. 2. Open Source Security Token for Linux

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustav ElinÖrtenberg ChristofferRoxbergh Adam Mathiesen JohanFredriksson Ben Mohammad; [2017-08-10]
    Keywords : FPGA; Linux; Open source; OpenSSL; PAM; RSA; Security; Twofactor; ;

    Abstract : The project investigates and implements a two-factor authentication system utilizingthe RSA cryptography scheme. The system consists of an FPGA security token anda PAM module for Linux. Two similar solutions were made, one air-gapped witha shorter key (version A), whereas the other communicated over USB (version B). READ MORE

  3. 3. CO and CO2 Detection for Catalysis Diagnosis by Means of PLIF

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Förbränningsfysik

    Author : Sebastian Pfaff; [2017]
    Keywords : plif; laser diagnostics; catalysis; carbon monoxide; carbon dioxide; palladium; planar laser induced fluorescence; Physics and Astronomy;

    Abstract : In order to fully understand the underlying processes of catalysis, it is vital to combine measurements of the catalyst surface, where the reaction occurs, with measurements of the gas concentration close to the catalyst. We have developed a convenient setup, which uses a single laser system to visualise the gas surrounding a working catalyst in situ at realistic operating conditions. READ MORE

  4. 4. Post-quantum algorithms for digital signing in Public Key Infrastructures

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Mikael Sjöberg; [2017]
    Keywords : Post-quantum algorithms; Digital signature algorithms; Public Key Infrastructures;

    Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE

  5. 5. Nonlinear Regression of Power-Exponential Functions : Experiment Design for Curve Fitting

    University essay from Mälardalens högskola/Utbildningsvetenskap och Matematik

    Author : Tshering Denka; [2017]
    Keywords : Curve fitting; Power exponential functions; Design; Chebyshev node; Equidistant design;

    Abstract : This thesis explores how to best choose data when curve fitting using power exponential functions. The power exponential functions used are μ(b; x)=(xe1-x)b and Φ(ρ; x)=((1-x)ex)ρ . We use a number of designs such as the equidistant design, the Chebyshev design and the the D-optimal design to compare which design gives the best fit. READ MORE