• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3253
  • 781
  • 482
  • 414
  • 408
  • 156
  • 124
  • 69
  • 58
  • 46
  • 36
  • 33
  • 31
  • 28
  • 28
  • Tagged with
  • 7209
  • 1155
  • 1007
  • 902
  • 703
  • 667
  • 624
  • 573
  • 539
  • 437
  • 387
  • 384
  • 355
  • 350
  • 345
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

Advanced power saving technologies for UHF band active RFID systems.

January 2006 (has links)
Wei Dacheng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references. / Abstracts in English and Chinese. / Table of Contents --- p.VIII / List of Tables --- p.XI / List of Figures --- p.XII / List of Abbreviations --- p.XV / Chapter Chapter 1 --- Introduction / Chapter 1.1 --- Introduction to RFID system --- p.1 / Chapter 1.2 --- Why we choose Active RFID system --- p.4 / Chapter 1.3 --- Objective of the research --- p.6 / Chapter 1.3.1 --- Requirement analysis --- p.7 / Chapter 1.3.2 --- Selection of RFID system and standard --- p.8 / Chapter 1.4 --- Original contribution of this dissertation --- p.9 / Chapter 1.5 --- Organization of the dissertation --- p.9 / Reference --- p.10 / Chapter Chapter 2 --- Implementation of An Active RFID System / Chapter 2.1 --- RFID System hardware design and related protocol --- p.1 / Chapter 2.2 --- Introduction to ISO 18000-7 --- p.7 / Chapter 2.3 --- Microcontroller specification --- p.12 / Chapter 2.4 --- RF model specifications --- p.14 / Chapter 2.5 --- Communication between a PC and a Reader --- p.15 / Chapter 2.6 --- Programming --- p.16 / Chapter 2.6.1 --- Procedure sequences of Reader and Tag --- p.17 / Chapter 2.6.2 --- Sequence of data transmission and reception --- p.24 / Chapter 2.6.3 --- CRC implementation --- p.28 / Chapter 2.7 --- Testing result --- p.31 / Reference --- p.35 / Chapter Chapter 3 --- Novel Power Saving Methods for an Active RFID System / Chapter 3.1 --- Some drawbacks of the existing Active RFID protocol --- p.1 / Chapter 3.1.1 --- Power consumption problem --- p.1 / Chapter 3.1.2 --- Multi-Reader problem --- p.9 / Chapter 3.2 --- Solutions of the Multi-Reader problem and power saving problem --- p.10 / Chapter 3.2.1 --- A solution to the power saving problem --- p.11 / Chapter 3.2.2 --- A solution to the Multi-Reader problem --- p.16 / Reference --- p.21 / Chapter Chapter 4 --- A Probe-fed Compact Half-wave Length Dipole Antenna for Active RFID System / Chapter 4.1 --- Requirement of an antenna for Active RFID system --- p.1 / Chapter 4.2 --- A probe-fed half-wave length dipole EE shape antenna for metallic object application --- p.2 / Chapter 4.3 --- Electromagnetic simulation results --- p.5 / Chapter 4.4 --- Operating principle analysis --- p.9 / Chapter 4.5 --- Using V shape structure to increase the bandwidth --- p.19 / Chapter 4.6 --- Prototyping and measurement results --- p.22 / Chapter 4.7 --- Conclusion --- p.28 / Reference --- p.29 / Chapter Chapter 5 --- Conclusion
322

A comparative study on large multivariate volatility matrix modeling for high-frequency financial data

Jiang, Dongchen 30 April 2015 (has links)
Modeling and forecasting the volatilities of high-frequency data observed on the prices of financial assets are vibrant research areas in econometrics and statistics. However, most of the available methods are not directly applicable when the number of assets involved is large, due to the lack of accuracy in estimating high-dimensional matrices. This paper compared two methodologies of vast volatility matrix estimation for high-frequency data. One is to estimate the Average Realized Volatility Matrix and to regularize it by banding and thresholding. In this method, first we select grids as pre-sampling frequencies,construct a realized volatility matrix using previous tick method according to each pre-sampling frequency and then take the average of the constructed realized volatility matrices as the stage one estimator, which we call the ARVM estimator. Then we regularize the ARVM estimator to yield good consistent estimators of the large integrated volatility matrix. We consider two regularizations: thresholding and banding. The other is Dynamic Conditional Correlation(DCC) which can be estimated for two stage, where in the rst stage univariate GARCH models are estimated for each residual series, and in the second stage, the residuals are used to estimate the parameters of the dynamic correlation. Asymptotic theory for the two proposed methodologies shows that the estimator are consistent. In numerical studies, the proposed two methodologies are applied to simulated data set and real high-frequency prices from top 100 S&P 500 stocks according to the trading volume over a period of 3 months, 64 trading days in 2013. From the perfomances of estimators, the conclusion is that TARVM estimator performs better than DCC volatility matrix. And its largest eigenvalues are more stable than those of DCC model so that it is more approriable in eigen-based anaylsis.
323

A theory of RFID anti-collision mechanisms. / CUHK electronic theses & dissertations collection

January 2010 (has links)
Due to the recent advances in semiconductor technology, the Radio Frequency Identification (RFID) technology is approaching the critical point for inventory application in global supply chain logistics. Its unique advantage to identify multiple tags simultaneously can remove large amount of labor-intensive scanning for inventory control and checkout process. To realize multiple-tag-identification, the tag collision problem, which is due to the signal collision of simultaneous transmission by multiple tags, needs to be solved. / Over the years, many different RFID systems and anti-collision algorithms were proposed, but a uniform theory which fully analyzes the anti-collision system is still lacking. Most of the previous work treated the RFID system as a special kind of Random Access (RA) system and designed anti-collision algorithms to maximize the temporary throughput. In this thesis, we provide a theoretical framework for the RFID anti-collision system. We differentiate the RFID system with the RA system and propose a general model for all types of the RFID systems. We also provide a general method for algorithm optimization in different RFID systems. As special examples, we analyze some popular RFID systems and derive the optimal algorithms under the system constraints. These optimal results are verified by computer simulation. / Zhu, lei. / Adviser: Tak-shing Peter Yum. / Source: Dissertation Abstracts International, Volume: 73-03, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (leaves 152-156). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
324

Monolithic frequency filter designs based on a sampled-data analogue wave filter approach

Reekie, Henry M. January 1981 (has links)
Frequency filters are widely used in communications systems today. Historically they have been constructed from inductors, capacitors and resistors and such circuits are well understood. However they suffer from the disadvantages of large physical size and high cost. A monolithic realisation of frequency filters would greatly reduce the cost of systems in which filters are used and would increase their reliability in hostile environments. In this thesis a novel approach to the realisation of sampled-data monolithic frequency filters is presented. The method is based on the use of sampled analogue signals and is related to the wave digital filter in its design techniques. The eventual monolithic realisation in NMOS technology is in the form of a switched-capacitor structure. While the main body of the research is concerned with the implementation of filters which are based on distributed prototype networks, some work on integratable filters which are based on lumped element prototypes is also presented. For either type the design model is exact and the resulting filter is optimally insensitive to parameter variations. The filters are implemented using a technique which ensures that performance is limited by capacitor ratios, which are moderate as compared with alternative published approaches. A prototype integrated circuit suitable for use in the audio frequency band has been designed to demonstrate the validity of the approach for the filters based on distributed prototypes and contains. filters of third, fifth and seventh order. Results are presented for these filters and also for a pseudobandpass filter which uses the periodicity of the prototype distributed network. The seventh order filter had a cut-off frequency of one eighth of the filter sample rate and achieved a stop band attenuation of well over 70dB An implemetation of a wave filter based on a lumped element prototype is also described and results are presented. This work is expected to form the basis of a novel implemetation of bandpass filters. The responses achieved for all the wave filters constructed show excellent agreement with the theory.
325

Session reliability and capacity allocation in dynamic spectrum access networks.

January 2008 (has links)
Li, Kin Fai. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 95-99). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction / Motivation --- p.1 / Chapter 2 --- Literature Review --- p.7 / Chapter 2.1 --- Introduction --- p.7 / Chapter 2.2 --- Dynamic Spectrum Access Networks --- p.8 / Chapter 2.3 --- Reliability --- p.10 / Chapter 2.3.1 --- Reliability in Wireless Networks --- p.10 / Chapter 2.3.2 --- Reliability in Wireline Networks --- p.11 / Chapter 2.4 --- Capacity Planning in Wireless Mesh Networks --- p.14 / Chapter 2.4.1 --- Interference Model --- p.14 / Chapter 2.4.2 --- Link Capacity Constraint --- p.15 / Chapter 2.4.3 --- Feasible Path --- p.16 / Chapter 2.4.4 --- Optimal Capacity Allocation in DSA Net- works and Wireless Mesh Networks --- p.16 / Chapter 2.5 --- Chapter Summary --- p.18 / Chapter 3 --- Lifetime Aware Routing without Backup --- p.19 / Chapter 3.1 --- Introduction --- p.19 / Chapter 3.2 --- System Model --- p.20 / Chapter 3.3 --- Lifetime Distribution of a Path without Backup Protection --- p.22 / Chapter 3.3.1 --- Exact Lifetime Distribution --- p.23 / Chapter 3.3.2 --- The Chain Approximation --- p.24 / Chapter 3.4 --- Route Selection without Backup Protection --- p.26 / Chapter 3.4.1 --- NP-Hardness of Finding Maximum Lifetime Path --- p.26 / Chapter 3.4.2 --- The Minimum Weight Algorithm --- p.28 / Chapter 3.4.3 --- Greedy Algorithm --- p.28 / Chapter 3.4.4 --- GACA - The Greedy Algorithm using the Chain Approximation --- p.32 / Chapter 3.5 --- Simulation Results --- p.33 / Chapter 3.5.1 --- Tightness of the Chain Approximation Bound for Vulnerable Area --- p.33 / Chapter 3.5.2 --- Comparison between Greedy and GACA using Guaranteed Lifetime --- p.36 / Chapter 3.5.3 --- Factors impacting the performance of GACA --- p.37 / Chapter 3.6 --- Chapter Summary --- p.43 / Chapter 4 --- Prolonging Path Lifetime with Backup Channel --- p.44 / Chapter 4.1 --- Introduction --- p.44 / Chapter 4.2 --- Non-Shared Backup Protection --- p.45 / Chapter 4.2.1 --- Lifetime of a Path with Non-Shared Backup --- p.45 / Chapter 4.2.2 --- Route Selection for paths with Non-Shared Backup --- p.46 / Chapter 4.3 --- Shared Backup Protection --- p.47 / Chapter 4.3.1 --- Sharing of Backup Capacity --- p.48 / Chapter 4.3.2 --- Lifetime of a Path with Shared Backup --- p.48 / Chapter 4.3.3 --- Route Selection for paths with Shared Backup --- p.50 / Chapter 4.4 --- Simulation Results --- p.50 / Chapter 4.4.1 --- Tightness of Failure Probability Upper Bound for Backup Protection --- p.51 / Chapter 4.4.2 --- Comparison between the Shared Backup and Non Shared Backup schemes --- p.53 / Chapter 4.5 --- Chapter Summary --- p.54 / Chapter 5 --- Finding Capacity-Feasible Routes --- p.55 / Chapter 5.1 --- Introduction --- p.55 / Chapter 5.2 --- Constructing an Edge graph --- p.56 / Chapter 5.3 --- Checking Capacity Feasibility under each Protec- tion Scheme --- p.58 / Chapter 5.3.1 --- No Backup Protection --- p.59 / Chapter 5.3.2 --- Non-Shared Backup Protection --- p.59 / Chapter 5.3.3 --- Shared Backup Protection --- p.60 / Chapter 5.4 --- Chapter Summary --- p.62 / Chapter 6 --- Performance Evaluations and Adaptive Protec- tion --- p.63 / Chapter 6.1 --- Introduction --- p.63 / Chapter 6.2 --- Tradeoffs between Route Selection Algorithms --- p.64 / Chapter 6.3 --- Adaptive Protection --- p.66 / Chapter 6.3.1 --- Route Selection for Adaptive Protection --- p.67 / Chapter 6.3.2 --- Finding a Capacity-Feasible Path for Adaptive Protection --- p.68 / Chapter 6.4 --- Comparison between No Protection and Adaptive Protection --- p.69 / Chapter 6.5 --- Chapter Summary --- p.71 / Chapter 7 --- Restoration Capacity Planning and Channel Assignment --- p.72 / Chapter 7.1 --- Introduction --- p.72 / Chapter 7.2 --- System Model --- p.74 / Chapter 7.2.1 --- Channel Assignment Model --- p.74 / Chapter 7.2.2 --- Presence of Primary Users --- p.75 / Chapter 7.2.3 --- Link Flow Rates --- p.76 / Chapter 7.2.4 --- Problem Formulation --- p.77 / Chapter 7.3 --- Simulation Results --- p.79 / Chapter 7.3.1 --- "Comparison between ""Shared Backup"" and “No Restore Plan"" using Guarantee Percentage and Reduced Capacity" --- p.80 / Chapter 7.3.2 --- Comparison using Traffic Demand Scaling Factor g and Guarantee Fraction p --- p.81 / Chapter 7.3.3 --- Comparison between Optimal Channel Assignment and Random Channel Assignment --- p.84 / Chapter 7.4 --- Chapter Summary --- p.86 / Chapter 8 --- Conclusion and Future Works --- p.87 / Chapter A --- Proof of Theorem (3.1) in Chapter3 --- p.90 / Chapter B --- Proof of Theorem (4.1) in Chapter4 --- p.92 / Bibliography --- p.95
326

QoS-aware adaptive call admission control in multiuser OFDM wireless network.

January 2008 (has links)
Yu, Xi. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 46-49). / Abstracts in English and Chinese. / Acknowledgement --- p.i / Abstract --- p.ii / Chapter Chapter 1 --- Introduction and Background --- p.1 / Chapter 1.1 --- Background --- p.3 / Chapter 1.1.1 --- Brief Review of CAC --- p.3 / Chapter 1.1.2 --- Dynamic Sub-carrier Allocation in Multi-user OFDM Wireless Network --- p.6 / Chapter 1.2 --- Problem Statement --- p.11 / Chapter 1.3 --- The Organization of The Thesis --- p.12 / Chapter Chapter2 --- System Model and Call Admission Control Framework --- p.13 / Chapter 2.1 --- System setup --- p.13 / Chapter 2.2 --- The CAC Strategy Framework --- p.14 / Chapter Chapter 3 --- QoS-aware Adaptive Call Admission Control´ؤStep One: The QoS-Provisioning CAC --- p.18 / Chapter 3.1 --- Problem Formulation --- p.19 / Chapter 3.2 --- Optimal Condition Analysis --- p.21 / Chapter 3.3 --- Throughput Estimation Algorithm --- p.22 / Chapter 3.4 --- QoS-Provisioning CAC --- p.25 / Chapter 3.5 --- Performance Evaluation --- p.26 / Chapter Chapter 4 --- QoS-aware Adaptive Call Admission Control´ؤStep Two: Average Revenue Maximization CAC --- p.30 / Chapter 4.1 --- Semi-Markov Decision Process --- p.30 / Chapter 4.2 --- Investigation of Algorithms for SMDP --- p.34 / Chapter 4.3 --- The Average Revenue Maximum CAC --- p.37 / Chapter 4.4 --- Performance Evaluation --- p.40 / Chapter Chapter 5 --- Conclusion and Future Work --- p.44 / Bibliography --- p.46
327

The Development of an ESP Vocabulary Study Guidefor the Utah State Driver Handbook

Brown, Kirsten M 01 December 2015 (has links)
This thesis project details research conducted and the method employed to create a tool for acquiring the technical vocabulary from the Utah Driver Handbook. Technical terms were compiled into a vocabulary tool for English as a Second Language (ESL) learners. ESL programs within the state have noted the need for materials to help learners acquire this vocabulary. The tool will assist ESL learners preparing for the written driving exam by reinforcing the vocabulary through various iterations, including flash cards, simplified definitions, and an L1 gloss. Learners preparing for the exam will be able to study difficult vocabulary terms using the tool. The tool includes flashcards containing definitions and images, a list of terms with simplified learner definitions, and a list of terms in English with their Spanish equivalent. The tool was created with the intent of providing learners with the ability to revisit difficult terms in a number of ways (i.e. Quizlet, images, simplified definitions, and an L1 gloss). The intended outcome of this research is that the tool will be useful to ESL learners preparing for the written driving exam and be made applicable to learners in other settings.
328

Threshold improvement in F-M detection by use of feedback

Hamilton, Alan Robert 01 July 1961 (has links)
No description available.
329

Application of principles from motor-learning theory to the studio voice lesson: effects of feedback frequency on retention of classical singing technique

Maxfield, Lynn Milo 01 May 2011 (has links)
Over the past several decades, cognitive and behavioral scientists have been researching the most effective practices for training muscles to produce specific movements consistently and accurately. That research has led to relatively wide acceptance of several best practices for the training of motor skills. One such practice is the reduction in the frequency with which augmented (external) feedback is provided by the instructor/trainer during skill-acquisition. This theory of low-frequency feedback has been examined by research in a wide variety of fields ranging from exercise and sport to voice therapy and rehabilitation. Prior to the study reported here, however, this theory had not been applied the acquisition of vocal skills associated with classical singing techniques. The current research consisted of an alternating treatment single-subject study, which was conducted on a college campus over the course of a 15-week semester. 8 college voice students (3 male and 5 female) ranging in age from 18 to 25 participated in voice lessons provided by the researcher and aimed at improving the overall quality of the voices of the participants. Over the course of the15 weeks, the instructor alternated between providing a high-frequency feedback (HFF) instruction condition and a low-frequency feedback (LFF) instruction condition. At the beginning of each session, a vocal sample was recorded to test the retention of the skills trained in the previous lesson. Those recordings were evaluated by a panel of five college voice instructors who provided a numerical score (out of a possible 100 pts.) for each sample on the basis of tone quality, breath management, and intonation. The results of this study indicated that three of the eight subjects retained more vocal skill ability during the HFF phases of the study, while the remaining five subjects retained less vocal skill ability during the HFF phases of the study. It was also seen that the three subjects who responded favorably to the HFF instruction condition were also those whose scores were higher throughout the duration of the study. These findings would appear to indicate that an HFF instruction condition may be more beneficial to more experienced or more skilled singers, while an LFF instruction condition may be more beneficial to more novice singers. In the final chapter of this report, several modifications to this study are suggested along with suggestions for future research regarding the application of other principles from motor-learning theory to the acquisition of new vocal skills.
330

Argumentativní konektory v češtině a ve španělštině (srovnávací analýza) / Argumentative Connectors in Czech and Spanish: Comparative Analysis

FROŇKOVÁ, Tereza January 2019 (has links)
The aim of this Master's Thesis is the study of frequency of contraargumentative connectors in Spanish, based on the quantitative analysis of these cohesive devices in argumentative texts. The theoretical part follows and draws from the works of renowned Spanish linguists and introduces the reader to the issue of discourse markers. Thus, different proposals for its definition and classification are taken in consideration, then are described the fundamental characteristics of the contraargumentative connectors. These are examined later in the practical part. Divided into chapters it offers focus on the quantitative analysis of the connectors in three corpuses which are comprised of judgments, academic writings and editorials. For greater clarity, analyses are accompanied by graphs and frequency tables. A Czech summary is added at the end of this investigation.

Page generated in 0.0262 seconds