• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 472
  • 197
  • 186
  • 87
  • 50
  • 33
  • 10
  • 8
  • 8
  • 8
  • 7
  • 5
  • 5
  • 4
  • 4
  • Tagged with
  • 1308
  • 161
  • 138
  • 113
  • 104
  • 103
  • 99
  • 98
  • 96
  • 91
  • 81
  • 79
  • 78
  • 77
  • 73
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
361

Utvärdering av HyperLynx Signal Integrity genom jämförelse av simulerade och uppmätta signaler / Evaluation of HyperLynx Signal Integrity by comparing simulated signals with measured signals

Forsberg, Alexander January 2013 (has links)
Simulering är en viktig del av utvecklingsarbetet för nya datorkort hos Centre of Excellence - Computers på Saab AB i Jönköping. Ju tidigare i utvecklingsarbetet som defekter och svagheter hos designen hittas desto enklare och mindre kostsamma blir ändringarna att införa. På CoE används simulerings och analysverktyget HyperLynx från Mentor Graphics för att simulera alla kritiska nät. På så sätt kan svagheter hos en design hittas redan innan prototypstadiet. För att simulatorn ska vara användbar krävs dock en kunskap om hur dess resultat korrelerar med verkligheten. Det leder till den övergripande frågeställningen för detta arbete, hur väl överensstämmer HyperLynx simuleringsresultat med verkligheten? Frågeställningen besvarades genom att jämföra simuleringsresultat med motsvarande uppmätta signaler på ett testkort. Resultaten visar att HyperLynx håller en mycket god kvalitet. För signalen i helhet överensstämmer kurvformerna väl både när det gäller vilka reflektioner som bildas och timingen för reflektionerna. Enda genomgående skillnaden mellan simuleringarna och mätningarna visar på något för små amplituder för de simulerade reflektionerna. / Simulations are an important part of the process of designing new computer boards at the Centre of Excellence - Computers at Saab AB in Jönköping. The earlier problems and weaknesses in the design can be found during the design process the less time and money it will take to fix them. The engineers at CoE uses HyperLynx, an analysis and simulation software from Mentor Graphics, to simulate all the critical nets at the board. By doing so, the majority of the problems can be fixed before the prototyping stage. However, the engineers need to know how the simulated signals relate to real signals if the simulator is to be useful. Therefore the question to be answered in this study is how well does the simulated signals in HyperLynx imitate real signals? The question was answered by comparing simulated signals with measurements of corresponding signals on a test board. Overall the shapes of the signals are matching for both which reflections occurs and the timing of the reflections. The only noticeable difference found throughout the study is a slightly smaller amplitude of the reflections for the simulated signals compared to the corresponding measured signal. Due to these results, HyperLynx can be considered a high quality simulator.
362

The “Twice-Looted” Archives: Giving Voice to the Long-Silenced Witnesses of World War II

Rosenthal, Jessica S 01 April 2013 (has links)
The “twice-looted” archives refer to a vast body of documents that were looted by Nazi agencies during, and again by Soviet Army units immediately following World War II. The archives were taken in the context of the two most intensive programs of cultural heritage looting in modern history. Their fate remained unknown until the fall of the Soviet Union in 1991. Since then, many efforts have been made to return the documents to their original owners. However, significant obstacles have hindered restitution, leaving a large body of foreign archives in Russia. By connecting the history and current status of the “twice-looted” archives to archival theory and ethical principles on cultural heritage property, this thesis provides a foundation from which to approach archival restitution. The analysis of recent additions to archival theory provides new understandings of archival meaning that may facilitate the restitution of archives displaced by war. Reviewing the details of the archives’ successive seizures leading to their extended residency in the secret “Special Archive” (TsGOA) and discussing restitution developments on national and international levels reveals how exploitation of archives during war violates archival principles. Concluding with specific case studies further illustrates the complex nature of archives and archival meaning and its significance for archival restitution. These discussions reveal the damages that result when archives become targets of war. This in turn, encourages respect for archives and brings attention to the necessity of safeguarding archival heritage.
363

A Model for Managing Data Integrity

Mallur, Vikram 22 September 2011 (has links)
Consistent, accurate and timely data are essential to the functioning of a modern organization. Managing the integrity of an organization’s data assets in a systematic manner is a challenging task in the face of continuous update, transformation and processing to support business operations. Classic approaches to constraint-based integrity focus on logical consistency within a database and reject any transaction that violates consistency, but leave unresolved how to fix or manage violations. More ad hoc approaches focus on the accuracy of the data and attempt to clean data assets after the fact, using queries to flag records with potential violations and using manual efforts to repair. Neither approach satisfactorily addresses the problem from an organizational point of view. In this thesis, we provide a conceptual model of constraint-based integrity management (CBIM) that flexibly combines both approaches in a systematic manner to provide improved integrity management. We perform a gap analysis that examines the criteria that are desirable for efficient management of data integrity. Our approach involves creating a Data Integrity Zone and an On Deck Zone in the database for separating the clean data from data that violates integrity constraints. We provide tool support for specifying constraints in a tabular form and generating triggers that flag violations of dependencies. We validate this by performing case studies on two systems used to manage healthcare data: PAL-IS and iMED-Learn. Our case studies show that using views to implement the zones does not cause any significant increase in the running time of a process.
364

Early Dual Grid Voltage Integrity Verification

Avci, Mehmet 14 December 2010 (has links)
As part of power distribution network verification, one should check if the voltage fluctuations exceed some critical threshold. The traditional simulation-based solution to this problem is intractable due to the large number of possible circuit behaviors. This approach also requires full knowledge of the details of the underlying circuitry, not allowing one to verify the power distribution network early in the design flow. In this work, we consider the power and ground grids together (i.e. dual grid) and formulate the problem of computing the worst-case voltage fluctuations of the dual grid under the framework of current constraints. Then, we present a solution technique in which tight lower and upper bounds on worst-case voltage fluctuations are computed via linear programs. Experimental results indicate that the proposed technique results in errors in the range of a few mV . We also present extensions to single grid (i.e. only power grid) verification techniques.
365

Professional Integrity and the Dilemma in Physician-Assisted Suicide (PAS)

Echewodo, Christian Chidi January 2004 (has links)
There is no stronger or more enduring prohibition in medicine than the rule against the killing of patients by doctors. This prohibition is rooted in some medical codes and principles. Out standing among the principles surrounding these prohibitions are the principles of beneficence and non-maleficience. The contents of these principles in a way mark the professional integrity of the physician. But the modern approach to health care services pulls a demand for the respect of the individual right of self-determination. This demand is now glaring in almost all the practices pertaining to health care services. In end of life decisions, this modern demand is found much in practices like physician- assisted suicide and euthanasia. It demands that the physician ought to respect the wish and choice of the patient, and so, must assist the patient in bringing about his or her death when requested. In such manner, this views the principle of autonomy as absolute and should not be overridden in any circumstance. However, the physician on his part is part of the medical profession that has integrity to protect. This integrity in medical profession which demands that the physician works only towards the health care of the patient and to what reduces diseases and deaths often go contrary to this respect for individual autonomy. Thus faced with such requests by patients, the physician always sees his integrity in conflict with his demand to respect the autonomous choice of the patient and so has a dilemma in responding to such requests. This is the focus of this work,"Professional Integrity and the Dilemma in Physician- Assisted Suicide" However, the centre of my argument in this work is not merely though necessary to develop general arguments for or against the general justification of PAS, but to critically view the role played by the physicians in assisting the death of their patients as it comes in conflict with the medical obligation and integrity. Is it morally right, out rightly wrong or in certain situation permissible that physicians respond positively to the request of the patients for PAS? This is the overarching moral problem in the morality of physician- assisted suicide, and this work will consider this in line with the main problem in the work “the dilemma of professional physicians in the assistance of suicide.
366

Early Dual Grid Voltage Integrity Verification

Avci, Mehmet 14 December 2010 (has links)
As part of power distribution network verification, one should check if the voltage fluctuations exceed some critical threshold. The traditional simulation-based solution to this problem is intractable due to the large number of possible circuit behaviors. This approach also requires full knowledge of the details of the underlying circuitry, not allowing one to verify the power distribution network early in the design flow. In this work, we consider the power and ground grids together (i.e. dual grid) and formulate the problem of computing the worst-case voltage fluctuations of the dual grid under the framework of current constraints. Then, we present a solution technique in which tight lower and upper bounds on worst-case voltage fluctuations are computed via linear programs. Experimental results indicate that the proposed technique results in errors in the range of a few mV . We also present extensions to single grid (i.e. only power grid) verification techniques.
367

Global Semantic Integrity Constraint Checking for a System of Databases

Madiraju, Praveen 09 August 2005 (has links)
In today’s emerging information systems, it is natural to have data distributed across multiple sites. We define a System of Databases (SyDb) as a collection of autonomous and heterogeneous databases. R-SyDb (System of Relational Databases) is a restricted form of SyDb, referring to a collection of relational databases, which are independent. Similarly, X-SyDb (System of XML Databases) refers to a collection of XML databases. Global integrity constraints ensure integrity and consistency of data spanning multiple databases. In this dissertation, we present (i) Constraint Checker, a general framework of a mobile agent based approach for checking global constraints on R-SyDb, and (ii) XConstraint Checker, a general framework for checking global XML constraints on X-SyDb. Furthermore, we formalize multiple efficient algorithms for varying semantic integrity constraints involving both arithmetic and aggregate predicates. The algorithms take as input an update statement, list of all global semantic integrity constraints with arithmetic predicates or aggregate predicates and outputs sub-constraints to be executed on remote sites. The algorithms are efficient since (i) constraint check is carried out at compile time, i.e. before executing update statement; hence we save time and resources by avoiding rollbacks, and (ii) the implementation exploits parallelism. We have also implemented a prototype of systems and algorithms for both R-SyDb and X-SyDb. We also present performance evaluations of the system.
368

Senior education students' understandings of academic honesty and dishonesty

Bens, Susan Laura 27 September 2010
Academic dishonesty has been widely reported to be a prevalent occurrence among university students and yet little research has been done to explore, in depth, the meanings the phenomenon holds for students. In response to this gap in research, the purpose of this study was to discover senior Education students understandings of academic honesty and dishonesty. A naturalistic research design was employed and the data were the verbatim discussions of five groups of senior Education degree program students from two western Canadian universities.<p> Findings were focused on the substantive, structural, and future applicability in students understandings. Essential elements of academic dishonesty appearing in students understandings were existence of rules, intent to break those rules, and resulting unearned grade advantages. These elements were extrapolated to serve as a baseline definition of academic dishonesty and as principles of culpability. Numerous situational considerations were volunteered by students that described enticements, deterrents, and beliefs about likelihoods associated with academic honesty and dishonesty. These considerations served as structures for the contemplation of risk that appeared prevalent in students understandings. Future applicability in students understandings was centred on expectations for teaching and professionalism. As teachers, students expected to need to respond to and prevent academic dishonesty. When working in a professional environment, they expected little need to acknowledge sources and a more collaborative climate overall that, for them, meant concerns for academic dishonesty had less relevance. Students expectations suggested rules for teaching and they contrasted the environments experienced as students with those anticipated as teachers.<p> The findings of this study were integrated to suggest students vision of a system for academic honesty that bears some similarity to a moral system. Also extrapolated were four metaphors for the roles of students in the university related to concerns for academic dishonesty: student as subject, student as moral agent, student as trainee, and student as competitor. Implications for higher education policy development and communication were based on students focus on grades and students sense of subculture for academic honesty and dishonesty. Students deference to the authority of the professor suggested implications for instructional practice. A lack of monitoring of students and professors behaviours related to academic honesty and dishonesty had implications for administrative practice in terms of fostering norms for academic integrity. A model for discernment of the student voice is proposed for student concerns appearing to be most freely and richly explored in a discussion among students. Recommendations for approaches to future research of this nature and for research questions and student populations bring the dissertation to a close.
369

A Model for Managing Data Integrity

Mallur, Vikram 22 September 2011 (has links)
Consistent, accurate and timely data are essential to the functioning of a modern organization. Managing the integrity of an organization’s data assets in a systematic manner is a challenging task in the face of continuous update, transformation and processing to support business operations. Classic approaches to constraint-based integrity focus on logical consistency within a database and reject any transaction that violates consistency, but leave unresolved how to fix or manage violations. More ad hoc approaches focus on the accuracy of the data and attempt to clean data assets after the fact, using queries to flag records with potential violations and using manual efforts to repair. Neither approach satisfactorily addresses the problem from an organizational point of view. In this thesis, we provide a conceptual model of constraint-based integrity management (CBIM) that flexibly combines both approaches in a systematic manner to provide improved integrity management. We perform a gap analysis that examines the criteria that are desirable for efficient management of data integrity. Our approach involves creating a Data Integrity Zone and an On Deck Zone in the database for separating the clean data from data that violates integrity constraints. We provide tool support for specifying constraints in a tabular form and generating triggers that flag violations of dependencies. We validate this by performing case studies on two systems used to manage healthcare data: PAL-IS and iMED-Learn. Our case studies show that using views to implement the zones does not cause any significant increase in the running time of a process.
370

Evaluación de la integridad estructural de componentes sometidos a condiciones de bajo confinamiento

Cicero González, Sergio 16 March 2007 (has links)
En esta Tesis Doctoral se analiza el fenómeno de la pérdida de confinamiento en el plano de aplicación de la carga de componentes industriales y estructuras. El análisis ordinario propuesto por la mecánica de la fractura no tiene en cuenta este fenómeno, dando lugar a resultados que en muchos casos son excesivamente conservadores.Los orígenes de la pérdida de confinamiento son diversos, destacando la superficialidad del defecto, el predominio de cargas de tracción y el efecto entalla. Las distintas teorías existentes analizan estos fenómenos de forma independiente.Este trabajo propone un modelo global justificado teóricamente que analiza de forma conjunta las diferentes fuentes de pérdida de confinamiento. Con objeto de validarlo, se presentan los resultados del programa experimental realizado al efecto y, posteriormente, se comparan dichos resultados con las predicciones del modelo. / This Doctorate Thesis analyses the phenomenon of the loss of constraint on the load application plane on industrial components and structures. The ordinary assessments proposed by the Fracture Mechanics Theory do not take into account this phenomenon, giving many times overconservative results.Two clearly distinct sources of low constraint are distinguished: that caused by the predominance of tensile loads and shallow defects and that produced by the notch effect. Both types of loss of constraint have been analysed by several authors, but in a rather disjointed way and without a global focus that might allow cases in which both situations arise simultaneously to be analysed.This work proposes an overall constraint procedure, theoretically justified, that allows analysing situations where the different sources of constraint coexist. Also, the results of the validation experimental programme are presented and compared to the predictions of the model.

Page generated in 0.0667 seconds