• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1887
  • 597
  • 576
  • 417
  • 235
  • 177
  • 57
  • 53
  • 38
  • 26
  • 25
  • 25
  • 24
  • 23
  • 20
  • Tagged with
  • 4763
  • 527
  • 495
  • 488
  • 421
  • 414
  • 375
  • 361
  • 352
  • 339
  • 339
  • 328
  • 316
  • 313
  • 305
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Functions of the Use of English in Advertising: A Content Analysis of Taiwanese Magazines

萩原茂樹, Shigeki Jack Hagihara Unknown Date (has links)
無 / The purpose of this study is; to review literature on bilingual speech and advertising and summarize the functions of the use of English in advertising; and conduct a content analysis to study the functions in print advertisements in two Taiwanese magazines (ViVi and Business Weekly) as well as to find correlations between advertisement attributes (country-of-origin, parts of an ad, product categories, and advertising appeals) and the functions. First, past literature in advertising and linguistics are reviewed. In summary, there are six code-mixing functions of the use of English in advertising in linguistic aspects, which include: 1) Referential Function, 2) Poetic Function, 3) Direct Quotation Function, 4) Reiteration Function, 5) Ease of Expression Function, and 6) Euphemism Function. Then, print advertisements in two Taiwanese magazines (ViVi and Business Weekly) will be analyzed in the content analysis. There are five research questions: 1) To what extent are the functions of the use of English present in print ads in magazines?, 2) Are there any correlations between country-of-origin and the functions?, 3) Are there any correlations between the parts of an ad and the functions?, 4) Are there any correlations between product categories and the functions?, 5) Are there any correlations between advertising appeals and the functions? The content analysis showed that all six functions were present in print advertising in Taiwan, with Ease of Expression Function to be the most frequent one, and Euphemism to be the least. The results also showed that there are correlations between the parts of an ad (slogan, headlines and subheadlines, and body copy) and the functions, but no correlations were found between country-of-origin and the functions, or between advertising appeals and the functions.
32

Qualification of WestinghouseBWR lattice physics methods againstcritical experiments

Landelius, Kim January 2016 (has links)
This thesis is part of a larger qualification effortperformed at Westinghouse Electric Sweden AB of the PHOENIX5 latticephysics code. The aim of the thesis is to validate PHOENIX5 withregards to cold criticality tests performed at the Toshiba NCAfacility in 2010-2011. For this, 26 different models were built torepresent the experiments performed by Toshiba in PHOENIX5. As anindependent reference, models were also built for the probabilisticMonte Carlo code SERPENT. The parameters examined in this thesis arethe criticality of the system, as well as the pin fission rates forselected experiments. Two different PHOENIX5 libraries were utilized,along with a HELIOS library. The results show that there is a Kinf trend between the differentlibraries. Furthermore, a void trend was found. This void trend waspresent for all models, including the SERPENT models. Pin fissionrate predictions give results close to those of the experiments forboth PHOENIX5 libraries. The system also proved sensitive to meshingchanges, as well as for the chosen water reflector width.
33

DECOR : détection et correction des défauts dans les systèmes orientés objet / DECOR : detection and correction of defects in object-oriented systems

Moha, Naouel 26 August 2008 (has links)
Les défauts de code et de conception sont des problèmes d'implémentation et de conception qui proviennent de "mauvais" choix conceptuels récurrents. Ces défauts ont pour conséquence de freiner le développement et la maintenance des systèmes en les rendant plus difficiles à maintenir et évoluer. Une détection et une correction semi-automatiques sont donc des facteurs clefs pour faciliter les phases de maintenance et d'évolution. Des techniques et outils ont été proposés dans la littérature à la fois pour la détection et la correction des défauts. Les techniques de détection proposées consistent principalement à définir des règles pour détecter les défauts et à les appliquer sur le code source d'un système. Quant aux techniques de correction, elles consistent à appliquer de façon automatique des refactorisations dans le code source du système analysé afin de le restructurer de manière à corriger les défauts. Cependant. la phase qui consiste à identifier les restructurations est réalisée manuellement par les ingénieurs logiciels. Ainsi, il n'est pas possible de corriger directement et automatiquement les défauts détectés. Ce problème est dû au fait que la détection et la correction des défauts sont traitées de façon isolée. Ainsi, nous proposons DECOR, une méthode qui englobe et définit toutes les étapes nécessaires pour la détection et la correction des défauts de code et de conception. Cette méthode permet de spécifier des règles de détection à un haut niveau d'abstraction et de suggérer des restructurations de code afin d'automatiser la correction des défauts. Nous appliquons et validons notre méthode sur des systèmes libres orientés objet afin de montrer que notre méthode permet une détection précise et une correction adaptée des défauts. / Code and design smells are implementation and design problems that come from "poor" recurring. design choices. They may hinder development and maintenance of systems by maklng them hard for software englneers to cha~ge and evolve. A semiautomatic detection and correction are thus key factors to ease the maintenance. and evolutlon stages. Techniques and tools have been proposed in the literature both for the detection and correctlon of defects. The detection techniques proposed consist mainly in defining rules for detectlng defects and applying them to the source code of a system. As for the correction techniques, they conslst ln applying automatlcally refactorings ln the source code of the system analysed to restructure it and correct the defects. However, software englneers. have to identify manually how the system must be restructured. Thus, it is not possible to correct directly and automatlcally the defects detected. This problem is due to the fact that the detectlon and the correction of defects are treated independently. Thus, we propose DECOR, amethod that encompasses and defines ail steps necessary for the detection and correction of code and design defects. This method allows software engineers to speclfy detect!on rules at a high level of abstraction and to obtain automatically suggestions for code restructuring. We app!y and valldate our method on open-source object-oriented systems to show that our method allows a precise detectlon and a suiltable correction of defects
34

Mobile, intelligent and autonomous policing tools and the law

Abel, Wiebke January 2013 (has links)
This thesis resolves around problems arising for the existing legal framework from the use of novel software-­‐based policing tools during criminal investigations. The increasing dependence on information and communication technologies and the Internet means that more aspects of people’s lives move online, and crime follows them. This has triggered the development of innovative, autonomous investigative technologies that are increasingly replacing human officers for the policing of the online sphere. While only recently discussions of the legal status of embodied and unembodied robotical devices have gained more widespread attention, discussions of the legal status of autonomous agent technology are not new. They have focussed however in the past on applications in the private domain, enabling contract formation online. No systematic study has so far been carried out that looks at the use of autonomous agent technology when deployed by state actors, to fulfil core state functions. This thesis starts with the hypothesis that the use of automated, intelligent devices to replicate core police functions in the online world will increase in the future. Looking at first emerging technologies, but with an eye towards future deployment of much more capable software tools that fulfil policing functions on the Internet, this thesis looks at the challenges this poses for regulators and software developers. Based on extensive qualitative research interviews with stakeholders from two different jurisdictions (Germany & UK) this thesis finds that these novel policing technologies challenge existing legal frameworks, which are still premised on the parameters of the offline world. It therefore develops an alternative governance model for these policing tools, which enables their law-­‐compliant use and prevents rights violations of suspects. In doing so it draws upon both worlds, the technical and the legal, while also incorporating the empirical research results from the interviews with experts. The first part of this thesis analyses the technical foundations of these software-­‐based policing tools. Here, one of the key findings is that the current governance system focuses on ex-­‐ante authorisation of very specific, individual software tools without developing a systematic classification. This contradicts the principle of sustainable law making. To overcome this piecemeal approach, as a first contribution to existing research this work defines a new class of investigative technologies – mobile, intelligent and autonomous (MIA) policing tools ‐ based on the findings of the technical analysis. Identifying such a natural class of present and future technologies that pose the same type of legal issues should facilitate the sustainable governance of these new policing tools. The second part of this thesis analyses two specific legal issues: cross-­jurisdictional investigations and the evidentiary value of the seized data. These issues were identified as most pressing by the experts interviewed for this work. This analysis reveals that investigative activities of MIA tools are potentially in conflict with international law principles and criminal procedure law. In order to gain legitimacy, these new policing tools need to operate within the parameters of the existing legal framework. This thesis argues that given the unique technical capabilities of MIA tools, the primary approach to achieving this is to assign legal responsibility to these tools. The third part of this thesis develops a novel governance approach to ensure that MIA tools operate within the parameters of the legal framework, and therefore obtain legitimacy and relevance, also with regard to the investigative results. This approach builds on existing research identifying code as a regulatory modality and contributes to the field of legal theory. It constitutes a solution for the governance problems of MIA tools, however, it requires currently lacking collaboration among stakeholders and cross-­disciplinary research.
35

Transmitter adaptation for CDMA systems.

January 2000 (has links)
Kwan Ho-yuet. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 84-[87]). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- An Overview on Transmitter Optimization --- p.1 / Chapter 1.1.1 --- Transmitter Precoding Methods --- p.2 / Chapter 1.1.2 --- Chip Waveform Optimization --- p.3 / Chapter 1.1.3 --- Signature Sequence Adaptation --- p.3 / Chapter 1.2 --- Receiver Optimization --- p.5 / Chapter 1.3 --- Nonlinear Optimization with Constraints --- p.6 / Chapter 1.3.1 --- Lagrange Multiplier Methods --- p.6 / Chapter 1.3.2 --- Penalty Function Methods --- p.7 / Chapter 1.4 --- Outline of Thesis --- p.8 / Chapter 2 --- Transmitter Adaptation Scheme for AWGN Channels --- p.10 / Chapter 2.1 --- Introduction --- p.10 / Chapter 2.2 --- System Model --- p.12 / Chapter 2.3 --- Adaptation Algorithm --- p.13 / Chapter 2.3.1 --- Receiver optimization --- p.14 / Chapter 2.3.2 --- Single-user transmitter optimization --- p.18 / Chapter 2.3.3 --- Decentralized transmission scheme --- p.20 / Chapter 2.4 --- Modification of the sequence adaptation algorithm --- p.25 / Chapter 2.5 --- Performance Evaluation --- p.28 / Chapter 2.5.1 --- Performance of the decentralized scheme --- p.28 / Chapter 2.5.2 --- System Capacity with Target SNR Constraints --- p.29 / Chapter 2.5.3 --- Performance of modified sequences --- p.31 / Chapter 2.6 --- Summary --- p.33 / Chapter 3 --- Transmitter Adaptation Schemes for Rayleigh Fading Channels --- p.34 / Chapter 3.1 --- Introduction --- p.34 / Chapter 3.2 --- Sequence Adaptation for MC-CDMA Systems --- p.36 / Chapter 3.2.1 --- Multi-sequence MC-CDMA systems --- p.36 / Chapter 3.2.2 --- Single Sequence MC-CDMA systems --- p.41 / Chapter 3.2.3 --- Performance Evaluation --- p.45 / Chapter 3.3 --- Sequence Adaptation for Wideband CDMA System in Fading Channels --- p.50 / Chapter 3.3.1 --- System Model and Algorithm Development --- p.50 / Chapter 3.3.2 --- Performance Evaluation --- p.56 / Chapter 3.4 --- Summary --- p.60 / Chapter 4 --- Practical Issues on Sequence Adaptation --- p.61 / Chapter 4.1 --- Introduction --- p.61 / Chapter 4.2 --- Preliminary --- p.62 / Chapter 4.3 --- Sequence Adaptation Algorithm with Perfect Estimation of SNR --- p.63 / Chapter 4.4 --- Performance Evaluation --- p.68 / Chapter 4.4.1 --- Typical Behaviour Analysis --- p.71 / Chapter 4.4.2 --- Average Performance Analysis --- p.72 / Chapter 4.5 --- Sequence Adaptation Algorithm with imperfect estimation of pre- vious state SNR --- p.75 / Chapter 4.6 --- Performance Evaluation --- p.77 / Chapter 4.7 --- Summary --- p.79 / Chapter 5 --- Conclusions and Future Works --- p.81 / Chapter 5.1 --- Conclusions --- p.81 / Chapter 5.2 --- Future Works --- p.83 / Bibliography --- p.84
36

Optimal CDMA spreading code allocation.

January 2004 (has links)
Pun Siu Yi. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 126-128). / Abstracts in English and Chinese. / List of Figure / List of Table / Chapter 1 --- Introduction --- p.11 / Chapter 2 --- Capacity of Single-Cell S-CDMA System --- p.15 / Chapter 2.1 --- Preliminary --- p.16 / Chapter 2.1.1 --- Information measure --- p.16 / Chapter 2.1.2 --- Capacity of a channel --- p.20 / Chapter 2.1.3 --- Capacity of multiple access Gaussian DS-CDMA channel --- p.22 / Chapter 2.2 --- Evaluation of the sum capacity for selected sequence sets --- p.26 / Chapter 2.2.1 --- Walsh Code --- p.28 / Chapter 2.2.2 --- M-Sequence --- p.34 / Chapter 2.2.3 --- Binary Almost Perfect Sequence --- p.42 / Chapter 2.3 --- Asymptotic Upper Bound of the sum capacity for 2 sequence sets --- p.50 / Chapter 2.3.1 --- Upper Bound of the sum capacity for selected sequence sets --- p.50 / Chapter 2.3.2 --- Asymptotic Upper Bound --- p.52 / Chapter 2.4 --- Optimal dynamic code allocation scheme for ad-hoc S-CDMA System --- p.62 / Chapter 2.4.1 --- Ad-hoc S-CDMA System --- p.62 / Chapter 2.4.2 --- Code Allocation Scheme --- p.63 / Chapter 2.4.3 --- Proof of Optimality --- p.66 / Chapter 3 --- Simulation of code adaptation schemes for mobile CDMA System --- p.72 / Chapter 3.1 --- Introduction of mobile CDMA System --- p.72 / Chapter 3.2 --- Simulation of code adaptation scheme --- p.77 / Chapter 3.2.1 --- System Model --- p.77 / Chapter 3.2.2 --- Description of 3 schemes --- p.78 / Chapter 3.2.3 --- Simulation Results --- p.96 / Conclusion and Future Work --- p.108 / Appendix --- p.110 / Bibliography --- p.126
37

Multilingualism in Sindh, Pakistan : the functions of code-switching used by educated, multilingual Sindhi women and the factors driving its use

Panhwar, Farida Yasmin Ali Nawaz January 2018 (has links)
The present study explores the functions of code-switching and the factors which motivate speakers to use it in the context of informal conversations among educated, multilingual Sindhi women at four colleges in Hyderabad and Kotri, Pakistan. Following on from such scholars as Blom and Gumperz (1972), Gumperz (1982), Myers-Scotton (1993a), Poplack (1980), this study uses a qualitative methodology consisting of audio recordings of informal interactions, the questionnaires filled in by the participants, which reveal their demographic information and observation notes by the researcher during the audio recordings. The data is then analysed using an interpretive approach. The findings provide evidence that code-switching is employed as a language strategy to achieve particular social goals. Multilingual code-switching into Sindhi, Urdu and English and a few instances of Arabic and other local languages provide sufficient evidence of participants' linguistic competence. The majority of participants use Sindhi as their L1 and English as their preferred language for code-switching. However, some participants who are Sindhi by ethnicity but acquired Urdu (their academic language) as their L1 predominantly use Urdu. The findings suggest that the participants use code switching to achieve particular social goals, such as to construct multiple identities, to express anger and humour, to discuss taboo issues and for specific textual functions such as recycling, self-repair, quotation, and idiomatic expressions. In the current study, the motivational extra-linguistic factors for the use of code-switching are historical-socio-economic factors, participants' social networks, conversational topics, and the social status of their interlocutor(s). The intra-linguistic factors consist of speakers' expression of their emotions and their linguistic competence. The most significant factor involved in the presence and absence of the use of codeswitching is the socioeconomic status of the participants. The results show the use of a huge number of English loanwords to fill lexical gaps which exist in Sindhi and Urdu. However, some instances of core borrowing (widespread borrowing in presence of equivalent in native language) from English are also used.
38

Support à la rénovation d'une architecture logicielle patrimoniale : un cas réel chez Thales Land and Air Systems / Support for the renovation of a legacy software architecture : a real case at Thales Land and Air Systems

Govin, Brice 26 June 2018 (has links)
Les entreprises accordent énormément d'importance à identifier des démarches automatisées et réplicables pour résoudre leurs problèmes. Ce constat s'applique aussi au démarche de rénovation d'architecture logicielle. Au sein d'une grande entreprise, nous avons intégré l'équipe chargée de réaliser la rénovation de l'architecture d'un logiciel. Nous avons étudié la démarche informelle suivie par cette équipe afin d'en proposer une généralisation et des outils facilitant son automatisation et sa réplication à d'autres projets. La plupart des solutions proposées dans la littérature ne peuvent s'appliquer à ce projet, du fait de leur caractère manuel, de leurs contraintes particulières ou de leur manque d'application sur des cas réels. Toutefois, nous avons identifié que le Reflexion Model, la recherche d’information et le regroupement statistique peuvent s'y appliquer. Nous avons alors proposé une nouvelle démarche structurée qui se base sur une adaptation du Reflexion Model et sur la démarche réalisée par l'entreprise. Notre démarche utilise cinq critères permettant l'allocation du code source existant à l'architecture du logiciel rénové. Nous avons montré que l'application de nos critères d'allocation donne des résultats satisfaisants au contraire de la recherche d’information et du regroupement. Enfin, pour répondre au besoin d'automatisation, nous avons défini ce que nous appelons des opérateurs. Ils se basent sur les activités que nous avons identifiées dans le travail des ingénieurs de l’entreprise. Nous avons montré que ces opérateurs permettraient de répliquer entièrement notre démarche structurée autorisant ainsi son application efficace sur d'autres projets. / Companies attach great importance to identifying automated and replicable approaches to solving their problems. This observation also applies to the software architecture renovation process. Within a large company, we joined the team in charge of renovating the software architecture. We studied the informal approach followed by this team in order to propose a generalization and tools facilitating its automation and its replication to other projects. Most of the solutions proposed in the literature cannot be applied to this project because of their manual nature, their particular constraints or their lack of application to real cases. However, we have identified that the Reflexion Model, information retrieval and statistical grouping may apply. We then proposed a new structured approach based on an adaptation of the Reflexion Model and on the approach developed by the company. Our approach uses five criteria to allocate existing source code to the architecture of the renovated software. We have shown that the application of our allocation criteria gives satisfactory results as opposed to seeking information and grouping. Finally, to meet the need for automation, we have defined what we call operators. They are based on the activities we have identified in the work of the company's engineers. We have shown that these operators would allow us to fully replicate our structured approach, thus allowing its effective application on other projects.
39

A computer compatible pulse code modulated data acquisition system

Rehn, Peter Francis. January 1970 (has links) (PDF)
No description available.
40

Turbo-coded OCC-CDMA with spatial diversity for wireless mobile communications

Tjahjadi, Aldo 04 November 2002 (has links)
Turbo codes have been used successfully for error correction in digital communications, however, their application to wireless mobile communications is still a fresh research topic. The objective of this thesis is to present a new solution that involves the usage of turbo codes, spatial diversity, and orthogonal complementary codes in a CDMA spread spectrum system in order to deliver good performance in a fading environment at low signal-to-noise ratios. The results of the research that was performed to write this thesis are presented in a modular and progressive fashion. That is, the design of a basic turbo-coded system in additive white Gaussian noise (AWGN) is developed first in order to get a good understanding of its potential in a wireless communication environment. Then the basic system design is expanded to include fading channel characteristics and multiple access spread spectrum capabilities using classical code division multiple access (CDMA) techniques. Finally, orthogonal complementary codes are used in lieu of traditional spreading codes and spatial diversity is introduced to maximize system performance. / Graduation date: 2003

Page generated in 0.0533 seconds