• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 541
  • 230
  • 69
  • 48
  • 44
  • 41
  • 17
  • 15
  • 14
  • 13
  • 11
  • 7
  • 5
  • 5
  • 4
  • Tagged with
  • 1280
  • 254
  • 249
  • 207
  • 142
  • 137
  • 131
  • 107
  • 96
  • 84
  • 82
  • 78
  • 71
  • 70
  • 69
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

Systematic optimization of yield-enhancing applications in soybeans

Haverkamp, Bryson January 1900 (has links)
Master of Science / Department of Agronomy / Kraig Roozeboom / High soybean [Glycine max.] commodity prices in recent years have led to an increase in use of yield enhancing and protecting products. These products need to be evaluated to determine if the use of multiple inputs has a positive impact on yield and how these inputs interact with agronomic practices. The objectives of this study were to evaluate products individually and collectively in input systems, examine interactions between varieties and input systems (IS), seeding rates (SR) and IS, and row spacing (RS) and IS. Field experiments were conducted at high-yielding locations in Kansas and Minnesota in 2012 to 2014 to meet these objectives. Sixteen treatments consisting of individual inputs and inputs combined in systems were evaluated in one experiment. A second experiment evaluated the variety by IS interaction by constructing 18 treatments from a factorial combination of six glyphosate [N-(phosphonomethyl) glycine] resistant varieties and three IS’s: untreated control (UTC), SOYA (combination of possible yield-enhancing products representative of those currently being marketed), and SOYA minus foliar fungicide (SOYA – foliar F). A third experiment evaluated the SR by IS interaction by constructing 12 treatments from a factorial arrangement of six SR’s and two IS’s: UTC and SOYA. A fourth experiment evaluated the RS by IS interaction by constructing 12 treatments from a factorial arrangement of three RS’s and four IS’s: UTC, fungicide and insecticide seed treatment plus foliar fungicide (STFF), SOYA, and SOYA – foliar F. Very few interactions between IS and agronomic practices were detected in any of the experiments. Varieties had an effect on multiple growth parameters but yield differences were marginal; linear-plateau and non-linear models found that seeding rates that maximized yield in this study were similar to University recommendations; and in general, narrow rows produced the greatest yields. The use of inputs and IS’s typically increased seed mass and yield above the UTC across all experiments. However, given current costs and soybean prices, yield response to IS’s was not great enough to cover the additional costs. Overall, it appears producers would be better served by focusing on agronomic practices rather than implementing input systems.
262

An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus Joubert

Joubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor environments. This proposal is based on two studies suggesting that kriging might be suitable for this application. Both of these studies have shortcomings in supporting this proposal, but their results encourage a more in depth investigation into this. Even though kriging is a geostatistical method developed for geographical interpolation, it has been used successfully in a wide range of other applications as well. This further suggests that kriging might be a versatile method to overcome some of the difficul- ties of existing signal strength estimation methods. Two main types of signal strength estimation are deterministic methods and empirical methods. Deterministic methods are generally very complex and requires input parameters that are difficult to obtain. Empirical methods are known to have low accuracy which makes them unreliable for practical use. Three main investigations are presented in order to evaluate the use of kriging for this application. A sampling plan is proposed as part of a generic application protocol for the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor environments. Kriging is recommended for practical applications, especially where in- sufficient information is available about a building or where time consuming site surveys are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
263

An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus Joubert

Joubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor environments. This proposal is based on two studies suggesting that kriging might be suitable for this application. Both of these studies have shortcomings in supporting this proposal, but their results encourage a more in depth investigation into this. Even though kriging is a geostatistical method developed for geographical interpolation, it has been used successfully in a wide range of other applications as well. This further suggests that kriging might be a versatile method to overcome some of the difficul- ties of existing signal strength estimation methods. Two main types of signal strength estimation are deterministic methods and empirical methods. Deterministic methods are generally very complex and requires input parameters that are difficult to obtain. Empirical methods are known to have low accuracy which makes them unreliable for practical use. Three main investigations are presented in order to evaluate the use of kriging for this application. A sampling plan is proposed as part of a generic application protocol for the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor environments. Kriging is recommended for practical applications, especially where in- sufficient information is available about a building or where time consuming site surveys are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
264

Resource management analysis at the prehospital emergency care unit in north-western Skåne

Fossum, Benjamin, Hedborg, Johan January 2016 (has links)
The purpose of this study is to investigate the preparedness at the prehospital emergency care unit in north-western Skåne. Measuring preparedness is important to ensure that the ability to respond on emergency calls is satisfactory. To do this for north-western Skåne historical data from 2015 was extracted from SOS Alarm’s database. It was used to calculate preparedness using workload and coverage as measurements. The workload was calculated by taking the busy periods and comparing them to the ambulances working times. The coverage was calculated by defining neighbouring stations to cover for each station and then finding the amount of hours when there was no ambulance at either station. These calculations show that two of the six stations in north-western Skåne are in need of improvement. To increase the preparedness to a good level resources will have to be added at the liable stations. These resources would be new ambulances. There is a possibility to relocate ambulances from stations within the district but that would lead to a worsened preparedness for the stations which these ambulances belonged to in the first place.
265

AUTONOMOUS GROUND STATION FOR SATELLITE COMMUNICATIONS

Kaiser, Julius A., Herold, Fredrick W. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Employment of the retro-directive technique described in Reference 1 describes a totally Autonomous Ground Station providing hemispheric coverage and continuous tracking. This System establishes communications between the satellite and ground station without human intervention or moving parts. When a satellite is in view, the ground station beacon antenna, using CDMA, enables the desired satellite transmitter and directs its beam to the ground station. The ground station, using the satellite’s transmitted signal, directs it’s receive and transmit arrays to point the ground station beams to the satellite, establishing two-way communications. The process is automatic and provides continuous horizon to horizon tracking.
266

Measurement and Analysis of Radio Wave Coverage in Industrial Environments

Ängskog, Per January 2012 (has links)
Several studies have characterized the path loss properties in industrial environments. However most of them have focused on one frequency, and some two or maximum three frequencies, usually cellular telephone frequencies or the unlicensed ISM bands that are commonly used in various industries. Few, if any, have characterized a larger part of the useable frequency range.This thesis is taking that challenge and investigates the path loss characteristics over a large frequency range, 300 MHz – 3 GHz, in industrial environments. First a measurement system suitable for the harsh environments found in industries is designed and verified. The measurement system is designed as two asynchronous stand-alone units that can be positioned at an arbitrary position to measure the path loss characteristics in any environment without interfering with the normal activities at the location. After that a measurement campaign involving three different types of environments is carried out. The environment types are: first, one highly absorbing – a paper warehouse at a paper mill; second, one highly reflective – a furnace building filled with metal objects and constructions and third, a mine tunnel – located 1 km below the surface of earth which is neither highly reflective nor absorbing but exhibits somewhat wave-guide like characteristics. The environments are shown to have very different behavior when it comes to propagation characteristics. Observations in the first environment reveal an environment that almost cancels out certain frequency bands and only line-of-sight communication is possible, hence no improvement will be achieved if installing systems that take multipath propagation into account, like MIMO. In the second environment reflections are legion; there are so many reflecting surfaces at different angles so any polarization of the signal is almost completely eliminated. Large fading variations were observed.The third environment is the underground mine where signals propagate inside the tunnels like in waveguides. It is shown that there are regions in the spectrum where the path loss dips and that these dips at least partly can be modeled with a simple two-beam propagation model normally used for outdoor propagation over infinite fields. The overall conclusion is that industrial environments are more heterogeneous regarding propagation characteristics than commonly assumed when selecting communication solutions. And that the only way to really know if a radio system will work at a certain location is to measure and characterize the environment.
267

Automated coverage calculation and test case generation

Morrison, George Campbell 03 1900 (has links)
Thesis (MScEng)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: This research combines symbolic execution, a formal method of static analysis, with various test adequacy criteria, to explore the e ectiveness of using symbolic execution for calculating code coverage on a program's existing JUnit test suites. Code coverage is measured with a number of test adequacy criteria, including statement coverage, branch coverage, condition coverage, method coverage, class coverage, and loop coverage. The results of the code coverage calculation is then used to automatically generate JUnit test cases for areas of a program that are not su ciently covered. The level of redundancy of each test case is also calculated during coverage calculation, thereby identifying fully redundant, and partially redundant, test cases. The combination of symbolic execution and code coverage calculation is extended to perform coverage calculation during a manual execution of a program, allowing testers to measure the e ectiveness of manual testing. This is implemented as an Eclipse plug-in, named ATCO, which attempts to take advantage of the Eclipse workspace and extensible user interface environment to improve usability of the tool by minimizing the user interaction required to use the tool. The code coverage calculation process uses constraint solving to determine method parameter values to reach speci c areas in the program. Constraint solving is an expensive computation, so the tool was parallellised using Java's Concurrency package, to reduce the overall execution time of the tool. / AFRIKAANSE OPSOMMING: Hierdie navorsing kombineer simboliese uitvoering, 'n formele metode van statiese analise, met verskeie toets genoegsaamheid kriteria, om die e ektiwiteit van die gebruik van simboliese uitvoer te ondersoek vir die berekening van kode dekking op 'n program se bestaande JUnit toets stelle. Kode dekking word gemeet deur verskeie toets genoegsaamheid kriteria, insluited stelling dekking, tak dekking, kondisie dekking, metode dekking, klas dekking, en lus dekking. Die resultate van die kode dekking berekeninge word dan gebruik om outomaties JUnit toets voorbeelde te genereer vir areas van 'n program wat nie doeltre end ondersoek word nie. Die vlak van oortolligheid van elke toets voorbeeld word ook bereken gedurende die dekkingsberekening, en daardeur word volledig oortollige, en gedeeltelik oortollige, toets voorbeelde identi seer. Die kombinasie van simboliese uitvoer en kode dekking berekening is uitgebrei deur die uitvoer van dekking berekeninge van 'n gebruiker-beheerde uitvoer, om sodoende kode dekking van 'n gebruiker-beheerde uitvoer van 'n program te meet. Dit laat toetsers toe om die e ektiwiteit van hulle beheerde uitvoer te meet. Bogenoemde word ge mplimenteer as 'n Eclipse aanvoegsel, genaamd ATCO, wat poog om voordeel te trek vanuit die Eclipse werkspasie, en die uitbreibare gebruiker oordrag omgewing, om die bruikbaarheid van ATCO te verbeter, deur die vermindering van die gebruiker interaksie wat benodig word om ATCO te gebruik. Die kode dekking berekeningsproses gebruik beperking oplossing om metode invoer waardes te bereken, om spesi eke areas in die program te bereik. Beperking oplossing is 'n duur berekening, so ATCO is geparalleliseer, met behulp van Java se Concurrency pakket, om die algehele uitvoer tyd van die program te verminder.
268

Reliable and Secure Geocasting in VANETs

Prado Bernia, Antonio 19 September 2012 (has links)
Current geocasting algorithms for VANETs are being designed to enable either private or reliable communications, but not both. Existing algorithms preserve privacy by minimizing the information used for routing, and sacrifice message delivery success. On the other hand, reliable protocols often store node information that can be used to compromise a vehicle's privacy. We have designed two private and reliable geocasting protocols for VANETs that ensure confidentiality. One is a probabilistic algorithm that uses direction-based dissemination, while the other is a deterministic algorithm that uses transmission-coverage dissemination. To preserve privacy, we create unlinkable and pseudonymous channels of communication with geocasting. For encryption and authentication, we use a public key technique. Our probabilistic forwarding model depends on message rate and cumulative payload, as well as the value of the angle of spreading of the direction-based scheme. To reduce message duplication, we apply dynamic traffic restriction and probabilistic forwarding techniques. The deterministic forwarding algorithm delays forwarding messages based on its uncovered transmission area after neighbouring nodes have broadcast the message. We prove that both algorithms ensure node privacy with appropriate message encryption security, and we ran simulations to demonstrate that both meet the message delivery requirements. From the gathered data, we observe that both algorithms behave differently depending on the scenario, with node density affecting the deterministic algorithm, while the angle of spreading does have a significant impact on the probabilistic protocol.
269

Applying Lakoff's frames to changes in political media and congressional policymaking

Kritzer, Kristopher M. January 2009 (has links)
This thesis is a case study applying George Lakoff’s theories regarding frames to a specific series of legislation dealing with immigration. First, literature is examined regarding changes in Congress and media and the relationship between the two. George Lakoff’s theories on framing are discussed, playing special attention to the familial models and biconceptualism. The case study regards immigration reform legislation that was attempted to pass through Congress in 2007, specifically the Comprehensive Immigration Reform Act of 2007 and the STRIVE Act. The application of Lakoff’s theories to this case study aids in further understanding the link between politics and communication and the importance of persuasion in a political setting. / Department of Political Science
270

Dissecting social robotics discourse : an examination of the drift towards living with and for machines

Russett, Preston C. 09 July 2011 (has links)
Sociable robots are increasing in complexity, popularity, and visibility. With the rapid diffusion of digital technologies in contemporary cultures, there is often limited time for critical reflection. The purpose of this thesis is to critically dissect an evolving technology, social robotics, as it begins entering more and more modern contexts. Using an eclectic approach, this research examines social robotics discourse across The New York Times (from 1986 to 2010) and popular fiction. Specifically, this thesis analyzes the media promoted appeal of social robotics, how social robotics are being presented to a general and specific audience, and evaluates how popular discourse on social robotics might be changing perceptions of communication and humanity. This research serves as a starting point for ongoing research into how new technologies and discourse on new technologies change, and attempt to influence, people and culture. / Introduction and justification -- Lit. review of sociable robots : the past, the present and the future -- Methods for analysis -- Critical analysis of social robotics and social robotics discourse -- Discussion. / Department of Telecommunications

Page generated in 0.1388 seconds