• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 101
  • 60
  • 20
  • 10
  • 6
  • 5
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 263
  • 210
  • 130
  • 89
  • 60
  • 49
  • 48
  • 43
  • 41
  • 33
  • 28
  • 27
  • 24
  • 22
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Implementation of real-time DIS H.264 Encoder for Airborne Recorder

Nam, Ju-Hun, Kim, Seong-Jong, Kim, Sung-Min, Lee, Nam-Sik, Kim, Jin-Hyung 10 1900 (has links)
ITC/USA 2012 Conference Proceedings / The Forty-Eighth Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2012 / Town and Country Resort & Convention Center, San Diego, California / When developing a video compression system in black box for aircraft, it is necessary to consider the characteristic of the images and the surrounding environment. The images captured in and out of aircraft have excessive movement-related issues, which make the results difficult to analyze and interpret. Failure to remove the tremors in the video component inevitably leads to poor compression efficiency and degrades the video imaging performance in the airborne black box. Therefore, it is necessary to develop a Compression System which can stabilize the video-image and efficiently utilize high compression recording for aircraft without special hardware. Based on the current situation, we suggest a real-time electronic video stabilization algorithm for airborne recorder which recovers shaky images simply and efficiently to work beside a developed stabilization system based on the H.264 Encoder using DSP.
42

Medieval English Benedictine liturgy : studies in the formation, structure, and content of the monastic votive office, c. 950-1540

Harper, Sally January 1989 (has links)
By comparison with its secular counterpart, the liturgy of English medieval monasteries has received little attention. This thesis explores one aspect of the liturgy of some of the wealthiest and most influential foundations in England - the Benedictine houses. It covers the formation and proliferation of 'votive' observances, recited as additions to or replacements for the major calendar observances. Evidence is drawn from over fifty manuscripts, dating from the Benedictine reform of the tenth century to the eve of the Dissolution in the sixteenth century. Some thirty monasteries are represented, with particular reference to the practices of Winchester, St Albans, Worcester and St Mary's, York. Part One examines the precedent for appended observances in The Rule of St Benedict (c.540), and the interpretation of this document by the Carolingian reformer Benedict of Aniane (c.750-821). Votive practices in the first English monastic customary, Regularis Concordia (c.970), and other devotional sources of a similar date are analysed. Part Two deals with the proliferation of three major observances after the Conquest - the daily votive office, recited as an appendage to the regular hours, the weekly commemorative office, which served as a replacement for the ferial office, and the independent antiphon (in particular Salve regina), recited or sung after Compline. The structure, adoption and devotional characteristics of each observance are examined, with particular reference to the predominantly Marian bias of much of the repertory. The second volume contains liturgical texts and related analytical tables, a descriptive catalogue of sources, transcriptions of Marian antiphons from the Worcester Antiphoner (c. 1230) and a comparison of eight versions of Salve regina.
43

Der Ausbruch des ersten Punischen Krieges ...

Meyer, Paul August Friedrich, January 1900 (has links)
Inaug.-diss.-Berlin.
44

Der Ausbruch des ersten Punischen Krieges ...

Meyer, Paul August Friedrich, January 1900 (has links)
Inaug.-diss.-Berlin.
45

Der erste punische Krieg im Lichte der Livianischen Tradition

Schermann, Max, January 1905 (has links)
Inaug.-diss.--Tübingen. / Lebenslauf.
46

Baptism in nonconformist theology, 1820-1920, with special reference to the Baptists

Perkin, James Russell Conway January 1955 (has links)
No description available.
47

Digital Surveillance Based on Video CODEC System-on-a-Chip (SoC) Platforms

Zhao, Wei 04 November 2010 (has links)
Today, most conventional surveillance networks are based on analog system, which has a lot of constraints like manpower and high-bandwidth requirements. It becomes the barrier for today’s surveillance network development. This dissertation describes a digital surveillance network architecture based on the H.264 coding/decoding (CODEC) System-on-a-Chip (SoC) platform. The proposed digital surveillance network architecture includes three major layers: software layer, hardware layer, and the network layer. The following outlines the contributions to the proposed digital surveillance network architecture. (1) We implement an object recognition system and an object categorization system on the software layer by applying several Digital Image Processing (DIP) algorithms. (2) For better compression ratio and higher video quality transfer, we implement two new modules on the hardware layer of the H.264 CODEC core, i.e., the background elimination module and the Directional Discrete Cosine Transform (DDCT) module. (3) Furthermore, we introduce a Digital Signal Processor (DSP) sub-system on the main bus of H.264 SoC platforms as the major hardware support system for our software architecture. Thus we combine the software and hardware platforms to be an intelligent surveillance node. Lab results show that the proposed surveillance node can dramatically save the network resources like bandwidth and storage capacity.
48

The first campaigns in Spain

Kerr, Mary Elizabeth January 1969 (has links)
This thesis considers one theatre of the Second Punic War for a limited number of years. The period of the Spanish theatre extends from the beginning of Hannibal's career in 221 B.C. until the deaths of Gnaeus and Publius Scipio in 211 B.C. The following chronology is adopted: 237 - Hamilcar begins the reconquest of Spain. 231 - A Roman embassy visits Hamilcar; an agreement is reached between Saguntum and Rome. 229 - Hamilcar dies; Hasdrubal acclaimed commander. 226 - The Ebro treaty. 222/221- Hasdrubal murdered; Hannibal new leader in Spain. 220 - Roman political intervention at Saguntum. 219 - Hannibal attacks and captures Saguntum. 218 - War declared between Rome and Carthage. 218 - Hannibal marches overland from New Carthage to northern Italy. Publius to Spain to meet Hannibal; turns back at Rhone River; sends Gnaeus and troops to Spain. 217 - Romans victorious at sea off mouth of Ebro. Publius’ command in Spain extended; Romans obtain hostages from Saguntum. 216 - Hasdrubal occupied in south; minor Roman advances south of Ebro. 215 - Siege of Ibera. 214 - Romans recover Saguntum. 213-211- Gradual Roman advance into Carthaginian territory. 211 - Death of Scipios; retreat of Romans to Ebro River. / Arts, Faculty of / Classical, Near Eastern and Religious Studies, Department of / Graduate
49

Protection of Scalable Video by Encryption and Watermarking / Protection des Vidéos Hiérarchiques par Cryptage et Tatouage

Shahid, Muhammad Zafar Javed 08 October 2010 (has links)
Le champ du traitement des images et des vidéos attire l'attention depuis les deux dernières décennies. Ce champ couvre maintenant un spectre énorme d'applications comme la TV 3D, la télé-surveillance, la vision par ordinateur, l'imagerie médicale, la compression, la transmission, etc. En ce début de vingt et unième siècle nous sommes témoins d'une révolution importante. Les largeurs de bande des réseaux, les capacités de mémoire et les capacités de calcul ont été fortement augmentés durant cette période. Un client peut avoir un débit de plus de 100~mbps tandis qu'un autre peut utiliser une ligne à 56~kbps. Simultanément, un client peut avoir un poste de travail puissant, tandis que d'autres peuvent avoir juste un téléphone mobile. Au milieu de ces extrêmes, il y a des milliers de clients avec des capacités et des besoins très variables. De plus, les préférences d'un client doivent s'adapter à sa capacité, par exemple un client handicapé par sa largeur de bande peut être plus intéressé par une visualisation en temps réel sans interruption que d'avoir une haute résolution. Pour y faire face, des architectures hiérarchiques de codeurs vidéo ont été introduites afin de comprimer une seule fois, et de décomprimer de différentes manières. Comme la DCT n'a pas la fonctionnalité de multi-résolution, une architecture vidéo hiérarchique est conçue pour faire face aux défis des largeurs de bande et des puissances de traitement hétérogènes. Avec l'inondation des contenus numériques, qui peuvent être facilement copiés et modifiés, le besoin de la protection des contenus vidéo a pris plus d'importance. La protection de vidéos peut être réalisée avec l'aide de trois technologies : le tatouage de méta-données et l'insertion de droits d'auteur, le cryptage pour limiter l'accès aux personnes autorisées et la prise des empreintes digitales active pour le traçage de traître. L'idée principale dans notre travail est de développer des technologies de protection transparentes à l'utilisateur. Cela doit aboutir ainsi à un codeur vidéo modifié qui sera capable de coder et d'avoir un flux de données protégé. Puisque le contenu multimédia hiérarchique a déjà commencé à voir le jour, algorithmes pour la protection indépendante de couches d 'amélioration sont également proposées. / Field of image and video processing has got lot of attention during the last two decades. This field now covers a vast spectrum of applications like 3D TV, tele-surveillance, computer vision, medical imaging, compression, transmission and much more. Of particular interest is the revolution being witnessed by the first decade of twenty-first century. Network bandwidths, memory capacities and computing efficiencies have got revolutionized during this period. One client may have a 100~mbps connection whereas the other may be using a 56~kbps dial up modem. Simultaneously, one client may have a powerful workstation while others may have just a smart-phone. In between these extremes, there may be thousands of clients with varying capabilities and needs. Moreover, the preferences of a client may adapt to his capacity, e.g. a client handicapped by bandwidth may be more interested in real-time visualization without interruption than in high resolution. To cope with it, scalable architectures of video codecs have been introduced to 'compress once, decompress many ways' paradigm. Since DCT lacks the multi-resolution functionality, a scalable video architecture is designed to cope with challenges of heterogeneous nature of bandwidth and processing power. With the inundation of digital content, which can be easily copied and modified, the need for protection of video content has got attention. Video protection can be materialized with help of three technologies: watermarking for meta data and copyright insertion, encryption to restrict access to authorized persons, and active fingerprinting for traitor tracing. The main idea in our work is to make the protection technology transparent to the user. This would thus result in a modified video codec which will be capable of encoding and playing a protected bitstream. Since scalable multimedia content has already started coming to the market, algorithms for independent protection of enhancement layers are also proposed.
50

De Belli punici primi scriptorum fontibus

Neuling, Johann. January 1873 (has links)
Inaug.-dis.--Gottingen. / Includes bibliographical references.

Page generated in 0.0155 seconds