• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 767
  • 229
  • 138
  • 95
  • 30
  • 29
  • 19
  • 16
  • 14
  • 10
  • 7
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 1615
  • 591
  • 342
  • 248
  • 246
  • 235
  • 191
  • 187
  • 177
  • 169
  • 168
  • 160
  • 143
  • 135
  • 132
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
791

The Development of UN Peacekeeping: A study of human security and robustness in peacekeeping then and now

Sävström, Liv January 2011 (has links)
United Nations (UN) peacekeeping principles affect all peacekeeping, thus it is important to under-stand their development. Many important changes in peacekeeping concern robustness and human security. This paper investigates developments in these two areas and their interrelation by means of a literature review, document analysis and case studies of two contemporary UN peacekeeping mis-sions. It identifies three generations in UN peacekeeping marked by changes in human security and robustness and relates these changes to the concept of sovereignty. Further, it identifies human secu-rity as the main motivation behind increasingly robust UN peacekeeping and finds that robust peacekeeping can, but does not necessarily, lead to greater human security.
792

Robust Estimation of Autoregressive Conditional Duration Models

El, Sebai S Rola 10 1900 (has links)
<p>In this thesis, we apply the Ordinary Least Squares (OLS) and the Generalized Least Squares (GLS) methods for the estimation of Autoregressive Conditional Duration (ACD) models, as opposed to the typical approach of using the Quasi Maximum Likelihood Estimation (QMLE).</p> <p>The advantages of OLS and GLS as the underlying methods of estimation lie in their theoretical ease and computational convenience. The latter property is crucial for high frequency trading, where a transaction decision needs to be made within a minute. We show that both OLS and GLS estimates are asymptotically consistent and normally distributed. The normal approximation does not seem to be satisfactory in small samples. We also apply Residual Bootstrap to construct the confidence intervals based on the OLS and GLS estimates. The properties of the proposed methods are illustrated with intensive numerical simulations as well as by a case study on the IBM transaction data.</p> / Master of Science (MSc)
793

Linear Robust Control in Indirect Deformable Object Manipulation

Kinio, Steven C. January 2013 (has links)
<p>Robotic platforms have several characteristics such as speed and precision that make them enticing for use in medical procedures. Companies such as Intuitive Medical and Titan Medical have taken advantage of these features to introduce surgical robots for minimally invasive procedures. Such robots aim to reduce procedure and patient recovery times. Current technology requires platforms to be master-slave manipulators controlled by a surgeon, effectively converting the robot into an expensive surgical tool. Research into the interaction between robotic platforms and deformable objects such as human tissue is necessary in the development of autonomous and semi-autonomous surgical systems. This thesis investigates a class of robust linear controllers based on a worst case performance measure known as the $H_{\infty}$ norm, for the purpose of performing so called Indirect Deformable Object Manipulation (IDOM). This task allows positional regulation of regions of interest in a deformable object without directly interacting with them, enabling tasks such as stabilization of tumors during biopsies or automatic suturing. A complete approach to generating linear $H_{\infty}$ based controllers is presented, from derivation of a plant model to the actual synthesis of the controller. The introduction of model uncertainty requires $\mu$ synthesis techniques, which extend $H_{\infty}$ designs to produce highly robust controller solutions. In addition to $H_{\infty}$ and $\mu$ synthesis designs, the thesis presents an approach to design an optimal PID controller with gains that minimize the $H_{\infty}$ norm of a weighted plant. The three control approaches are simulated performing set point regulation in $\text{MATLAB}^{TM}$'s $simulink$. Simulations included disturbance inputs and noises to test stability and robustness of the approaches. $H_{\infty}$ controllers had the best robust performance of the controllers simulated, although all controllers simulated were stable. The $H_{\infty}$ and PID controllers were validated in an experimental setting, with experiments performed on two different deformable synthetic materials. It was found that $H_{\infty}$ techniques were highly robust and provided good tracking performance for a material that behaved in a relatively elastic manner, but failed to track well when applied to a highly nonlinear rubber compound. PID based control was outperformed by $H_{\infty}$ control in experiments performed on the elastic material, but proved to be superior when faced with the nonlinear material. These experimental findings are discussed and a linear $H_{\infty}$ control design approach is proposed.</p> / Master of Applied Science (MASc)
794

Efficient and robust resource allocation for network function virtualization

Sallam, Gamal January 2020 (has links)
With the advent of Network Function Virtualization (NFV), network services that traditionally run on proprietary dedicated hardware can now be realized using Virtual Network Functions (VNFs) that are hosted on general-purpose commodity hardware. This new network paradigm offers a great flexibility to Internet service providers (ISPs) for efficiently operating their networks (collecting network statistics, enforcing management policies, etc.). However, introducing NFV requires an investment to deploy VNFs at certain network nodes (called VNF-nodes), which has to account for practical constraints such as the deployment budget and the VNF-node limited resources. While gradually transitioning to NFV, ISPs face the problem of where to efficiently introduce NFV; here, we measure the efficiency by the amount of traffic that can be served in an NFV-enabled network. This problem is non-trivial as it is composed of two challenging subproblems: 1) placement of VNF-nodes; 2) allocation of the VNF-nodes' resources to network flows. These two subproblems must be jointly considered to satisfy the objective of serving the maximum amount of traffic. We first consider this problem for the one-dimensional setting, where all network flows require one network function, which requires a unit of resource to process a unit of flow. In contrast to most prior work that often neglects either the budget constraint or the resource allocation constraint, we explicitly consider both of them and prove that accounting for them introduces several new challenges. Specifically, we prove that the studied problem is not only NP-hard but also non-submodular. To address these challenges, we introduce a novel relaxation method such that the objective function of the relaxed placement subproblem becomes submodular. Leveraging this useful submodular property, we propose two algorithms that achieve an approximation ratio of $\frac{1}{2}(1-1/e)$ and $\frac{1}{3}(1-1/e)$ for the original non-relaxed problem, respectively. Next, we consider the multi-dimensional setting, where flows can require multiple network functions, which can also require a different amount of each resource to process a unit of flow. To address the new challenges arising from the multi-dimensional setting, we propose a novel two-level relaxation method that allows us to draw a connection to the sequence submodular theory and utilize the property of sequence submodularity along with the primal-dual technique to design two approximation algorithms. Finally, we perform extensive trace-driven simulations to show the effectiveness of the proposed algorithms. While the NFV paradigm offers great flexibility to network operators for efficient management of their networks, VNF instances are typically more prone to error and more vulnerable to security threats compared with dedicated hardware devices. Therefore, the NFV paradigm also poses new challenges concerning failure resilience. That has motivated us to consider robustness with respect to the class of sequence submodular function maximization problem, which has a wide range of applications, including those in the NFV domain. Submodularity is an important property of set functions and has been extensively studied in the literature. It models set functions that exhibit a diminishing returns property, where the marginal value of adding an element to a set decreases as the set expands. This notion has been generalized to considering sequence functions, where the order of adding elements plays a crucial role and determines the function value; the generalized notion is called sequence (or string) submodularity. In this part of the dissertation, we study a new problem of robust sequence submodular maximization with cardinality constraints. The robustness is against the removal of a subset of elements in the selected sequence (e.g., due to malfunctions or adversarial attacks). Compared to robust submodular maximization for set function, new challenges arise when sequence functions are concerned. Specifically, there are multiple definitions of submodularity for sequence functions, which exhibit subtle yet critical differences. Another challenge comes from two directions of monotonicity: forward monotonicity and backward monotonicity, both of which are important to proving performance guarantees. To address these unique challenges, we design two robust greedy algorithms: while one algorithm achieves a constant approximation ratio but is robust only against the removal of a subset of contiguous elements, the other is robust against the removal of an arbitrary subset of the selected elements but requires a stronger assumption and achieves an approximation ratio that depends on the number of the removed elements. Finally, we consider important problems that arise in the production networks, where packets need to pass through an ordered set of network functions called Service Function Chains (SFC) before reaching the destination. We study the following problems: (1) How to find an SFC-constrained shortest path between any pair of nodes? (2) What is the achievable SFC-constrained maximum flow? We propose a transformation of the network graph to minimize the computational complexity of subsequent applications of any shortest path algorithm. Moreover, we formulate the SFC-constrained maximum flow problem as a fractional multicommodity flow problem and develop a combinatorial algorithm for a special case of practical interest. / Computer and Information Science
795

Estimation of the linkage matrix in O-GARCH model and GO-GARCH model

Zheng, Lingyu January 2010 (has links)
We propose new estimation methods for the factor loading matrix in modeling multivariate volatility processes. The key step of the methods is based on the weighted scatter estimators, which does not involve optimizing any objective function and was embedded with robust estimation properties. The method can therefore be easily applied to high-dimensional systems without running into computational problems. The estimation is proved to be consistent and the asymptotic distribution is derived. We compare the performance with other estimation methods and demonstrate its superiority when using both simulated data as well as real-world case studies. / Statistics
796

Comparison of Normalization Methods in Microarray Analysis

Yang, Rong 04 1900 (has links)
<p> DNA microarrays can measure the gene expression of thousands of genes at a time to identify differentially expressed genes. The Affymetrix GeneChip system is a platform for the high-density oligonucleotide microarray to measure gene expression using hundreds of thousands of 25-mer oligonucleotide probes.</p> <p> To deal with Affymetrix microarray data, there are three stages of preprocessing to produce gene expression measurements/values. These are background correction, normalization and summarization. At each stage, numerous methods have been developed.</p> <p> Our study is based on Affymetrix MG_U74Av2 chip with 12488 probe sets. Two strains of mice called NOR and NOR.NOD_Idd4/11 mouse are hybridized for the experiment. We apply a number of commonly used and state-of-art normalization methods to the data set, thus compute the expression measurements for different methods. The major methods we discuss include Robust Multi-chip Average (RMA), MAS 5.0, GCRMA, PLIER and dChip.</p> <p> Comparisons in terms of correlation coefficient, pairwise expression measures plot, fold change and Significance Analysis of Microarray (SAM) are conducted.</p> / Thesis / Master of Science (MSc)
797

Acceleration Methods of Discontinuous Galerkin Integral Equation for Maxwell's Equations

Lee, Chung Hyun 15 September 2022 (has links)
No description available.
798

A robust optimization approach for active and reactive power management in smart distribution networks using electric vehicles

Pirouzi, S., Agahaei, J., Latify, M.A., Yousefi, G.R., Mokryani, Geev 07 July 2017 (has links)
Yes / This paper presents a robust framework for active and reactive power management in distribution networks using electric vehicles (EVs). The method simultaneously minimizes the energy cost and the voltage deviation subject to network and EVs constraints. The uncertainties related to active and reactive loads, required energy to charge EV batteries, charge rate of batteries and charger capacity of EVs are modeled using deterministic uncertainty sets. Firstly, based on duality theory, the max min form of the model is converted to a max form. Secondly, Benders decomposition is employed to solve the problem. The effectiveness of the proposed method is demonstrated with a 33-bus distribution network.
799

Vision Based Guidance and Flight Control in Problems of Aerial Tracking

Stepanyan, Vahram 06 October 2006 (has links)
The use of visual sensors in providing the necessary information for the autonomous guidance and navigation of the unmanned-air vehicles (UAV) or micro-air vehicles (MAV) applications is inspired by biological systems and is motivated first of all by the reduction of the navigational sensor cost. Also, visual sensors can be more advantageous in military operations since they are difficult to detect. However, the design of a reliable guidance, navigation and control system for aerial vehicles based only on visual information has many unsolved problems, ranging from hardware/software development to pure control-theoretical issues, which are even more complicated when applied to the tracking of maneuvering unknown targets. This dissertation describes guidance law design and implementation algorithms for autonomous tracking of a flying target, when the information about the target's current position is obtained via a monocular camera mounted on the tracking UAV (follower). The visual information is related to the target's relative position in the follower's body frame via the target's apparent size, which is assumed to be constant, but otherwise unknown to the follower. The formulation of the relative dynamics in the inertial frame requires the knowledge of the follower's orientation angles, which are assumed to be known. No information is assumed to be available about the target's dynamics. The follower's objective is to maintain a desired relative position irrespective of the target's motion. Two types of guidance laws are designed and implemented in the dissertation. The first one is a smooth guidance law that guarantees asymptotic tracking of a target, the velocity of which is viewed as a time-varying disturbance, the change in magnitude of which has a bounded integral. The second one is a smooth approximation of a discontinuous guidance law that guarantees bounded tracking with adjustable bounds when the target's acceleration is viewed as a bounded but otherwise unknown time-varying disturbance. In both cases, in order to meet the objective, an intelligent excitation signal is added to the reference commands. These guidance laws are modified to accommodate measurement noise, which is inherently available when using visual sensors and image processing algorithms associated with them. They are implemented on a full scale non-linear aircraft model using conventional block backstepping technique augmented with a neural network for approximation of modeling uncertainties and atmospheric turbulence resulting from the closed-coupled flight of two aerial vehicles. / Ph. D.
800

On the Security and Reliability of Fixed-Wing Unmanned Aircraft Systems

Muniraj, Devaprakash 20 September 2019 (has links)
The focus of this dissertation is on developing novel methods and extending existing ones to improve the security and reliability of fixed-wing unmanned aircraft systems (UAS). Specifically, we focus on three strands of work: i) designing UAS controllers with performance guarantees using the robust control framework, ii) developing tools for detection and mitigation of physical-layer security threats in UAS, and iii) extending tools from compositional verification to design and verify complex systems such as UAS. Under the first category, we use the robust H-infinity control approach to design a linear parameter-varying (LPV) path-following controller for a fixed-wing UAS that enables the aircraft to follow any arbitrary planar curvature-bounded path under significant environmental disturbances. Three other typical path-following controllers, namely, a linear time-invariant H-infinity controller, a nonlinear rate-tracking controller, and a PID controller, are also designed. We study the relative merits and limitations of each approach and demonstrate through extensive simulations and flight tests that the LPV controller has the most consistent position tracking performance for a wide array of geometric paths. Next, convex synthesis conditions are developed for control of distributed systems with uncertain initial conditions, whereby independent norm constraints are placed on the disturbance input and the uncertain initial state. Using this approach, we design a distributed controller for a network of three fixed-wing UAS and demonstrate the improvement in the transient response of the network when switching between different trajectories. Pertaining to the second strand of this dissertation, we develop tools for detection and mitigation of security threats to the sensors and actuators of UAS. First, a probabilistic framework that employs tools from statistical analysis to detect sensor attacks on UAS is proposed. By incorporating knowledge about the physical system and using a Bayesian network, the proposed approach minimizes the false alarm rates, which is a major challenge for UAS that operate in dynamic and uncertain environments. Next, the security vulnerabilities of existing UAS actuators are identified and three different methods of differing complexity and effectiveness are proposed to detect and mitigate the security threats. While two of these methods involve developing algorithms and do not require any hardware modification, the third method entails hardware modifications to the actuators to make them resilient to malicious attacks. The three methods are compared in terms of different attributes such as computational demand and detection latency. As for the third strand of this dissertation, tools from formal methods such as compositional verification are used to design an unmanned multi-aircraft system that is deployed in a geofencing application, where the design objective is to guarantee a critical global system property. Verifying such a property for the multi-aircraft system using monolithic (system-level) verification techniques is a challenging task due to the complexity of the components and the interactions among them. To overcome these challenges, we design the components of the multi-aircraft system to have a modular architecture, thereby enabling the use of component-based reasoning to simplify the task of verifying the global system property. For component properties that can be formally verified, we employ results from Euclidean geometry and formal methods to prove those properties. For properties that are difficult to be formally verified, we rely on Monte Carlo simulations. We demonstrate how compositional reasoning is effective in reducing the use of simulations/tests needed in the verification process, thereby increasing the reliability of the unmanned multi-aircraft system. / Doctor of Philosophy / Given the safety-critical nature of many unmanned aircraft systems (UAS), it is crucial for stake holders to ensure that UAS when deployed behave as intended despite atmospheric disturbances, system uncertainties, and malicious adversaries. To this end, this dissertation deals with developing novel methods and extending existing ones to improve the security and reliability of fixed-wing UAS. Specifically, we focus on three key areas: i) designing UAS controllers with performance guarantees, ii) developing tools for detection and mitigation of security threats to sensors and actuators of UAS, and iii) extending tools from compositional verification to design and verify complex systems such as UAS. Pertaining to the first area, we design controllers for UAS that would enable the aircraft to follow any arbitrary planar curvature-bounded path under significant atmospheric disturbances. Four different controllers of differing complexity and effectiveness are designed, and their relative merits and limitations are demonstrated through extensive simulations and flight tests. Next, we develop control design tools to improve the transient response of multi-mission UAS networks. Using these tools, we design a controller for a network of three fixed-wing UAS and demonstrate the improvement in the transient response of the network when switching between different trajectories. As for the contributions in the second area, we develop tools for detection and mitigation of security threats to the sensors and actuators of UAS. First, we propose a framework for detecting sensor attacks on UAS. By judiciously using knowledge about the physical system and techniques from statistical analysis, the framework minimizes the false alarm rates, which is a major challenge in designing attack detection systems for UAS. Then, we focus on another important attack surface of the UAS, namely, the actuators. Here, we identify the security vulnerabilities of existing UAS actuators and propose three different methods to detect and mitigate the security threats. The three methods are compared in terms of different attributes such as computational demand, detection latency, need for hardware modifications, etc. In regard to the contributions in the third area, tools from compositional verification are used to design an unmanned multi-aircraft system that is tasked to track and compromise an aerial encroacher, wherein the multi-aircraft system is required to satisfy a global system property pertaining to collision avoidance and close tracking. A common approach to verifying global properties of systems is monolithic verification where the whole system is analyzed. However, such an approach becomes intractable for complex systems like the multi-aircraft system considered in this work. We overcome this difficulty by employing the compositional verification approach, whereby the problem of verifying the global system property is reduced to a problem of reasoning about the system’s components. That being said, even formally verifying some component properties can be a formidable task; in such cases, one has to rely on Monte Carlo simulations. By suitably designing the components of the multi-aircraft system to have a modular architecture, we show how one can perform focused component-level simulations rather than conduct simulations on the whole system, thereby limiting the use of simulations during the verification process and, as a result, increasing the reliability of the system.

Page generated in 0.0292 seconds