• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 2
  • 2
  • 1
  • Tagged with
  • 14
  • 14
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Diversidade morfológica e molecular em Piper (Piperaceae) em um fragmento de Floresta Atlântica

CHRIST, J. A. 18 July 2016 (has links)
Made available in DSpace on 2018-08-01T22:57:27Z (GMT). No. of bitstreams: 1 tese_10050_Dissertação Final Jheniffer Abeldt Christ.pdf: 4205692 bytes, checksum: bb75f5e1f3cba4f4b50b5af527d2d346 (MD5) Previous issue date: 2016-07-18 / Marcadores moleculares de DNA constituem uma alternativa ao uso de caracteres morfológicos para a distinção de espécies, dado que estes podem depender dos aspectos relacionados à fenologia ou serem variáveis em relação ao ambiente. Neste trabalho é apresentado um método que se baseia em fingerprinting de transferibilidade de marcadores microssatélites baseado na ausência ou presença da amplificação. Primers (51) desenvolvidos para quatro espécies de Piper foram testados para 16 espécies nativas nativas da Floresta Atlântica. Os dados moleculares e morfológicos foram submetidos a análise de agrupamento, segida de teste de nitidez de grupos. Um Heat map foi aplicado ao agrupamento. Uma árvore de regressão foi aplicada aos dados moleculares. Dos primers utilizados, 45 foram transferidos para no mínimo quatro espécies. Os dados moleculares foram mais eficientes em detectar grupos nítidos comparado aos dados morfológicos. Grupos de espécies delimitadas por um conjunto de caracteres morfológicos compartilhados foram diferenciadas com base nos dados moleculares. Espécies morfologicamente semelhantes podem ou não ser relacionadas do ponto de vista molecular. Nove primers se mostraram explicativos para identificar as 16 espécies estudadas. A técnica de fingerprinting de transferibilidade utilizada neste estudo demonstrou ser útil tanto à delimitação quanto para a identificação das espécies.
2

Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping

Thomas, Andrew Scott 01 December 2019 (has links)
A common method of connecting to the internet is a wireless network. These networks can be monitored to discover the area of their coverage, but commercial receivers don't always provide the most accurate results. A software-defined radio was programmed to sniff wireless signals and tested against a commercial receiver and the results were compared. The results suggest that the software-defined radio performs at least as well as the commercial receiver in distance measurements and significantly better in samples taken per minute. It was determined that the software-defined radio is a viable replacement for a commercial receiver in 3D heat mapping.
3

Visualization and Unsupervised Pattern Recognition in Multidimensional Data Using a New Heuristic for Linear Data Ordering

Aliyev, Denis Aliyevich 30 November 2016 (has links)
No description available.
4

Definición de Políticas de Marketing Georeferenciado para un Supermercado Mayorista

Lazo Méndez, Gabriela Catalina January 2011 (has links)
El Customer Relationship Management permite caracterizar a los distintos consumidores de un negocio para así aplicar medidas de marketing focalizado. El marketing georeferenciado enriquece la información disponible considerando la ubicación geográfica de este consumidor para identificar comportamientos de compra asociados a esta dimensión. El objetivo general de este trabajo, se enmarca en ambos temas. Busca modelar la relación entre la ubicación geográfica y la demanda de un cliente en un supermercado mayorista, estimando su monto y frecuencia en la sala permitiendo identificar dónde viven los mejores clientes, dónde están quienes pueden aumentar su valor y la ubicación de las áreas donde la competencia está afectando más las ventas. El análisis se hace en 2 locales, estudiando a 3.000 clientes en la sala de Maipú y 2.000 en Temuco aproximadamente. Se trabaja con las compras realizadas entre el 2008 y 2010, para graficar en mapas la intensidad de las variables: densidad de clientes, monto y frecuencia, identificándose barrios donde se dan comportamientos de compra particulares. Posteriormente se comparan estimaciones de demanda hechas con regresiones geográficas ponderadas (GWR) y se comparan los resultados con una regresión lineal (LR). Los resultados indican que pese a que LR y la GWR tuvieron bondades de ajuste y MAPEs muy parecidos (R2 sobre 0.5 y MAPE bordeando incluso el 50%), la GWR identifica mejor los locales de la competencia que reducen las ventas del mayorista, identificando 8 salas contra sólo 3 que arrojó el método lineal para un local. La GWR además sugiere que la competencia tiene mayor efecto en disminuir las visitas de los clientes en otra sala, más que quitar monto de ventas, dado que la persona ya asistió. Respecto al efecto de la ubicación en la frecuencia, se encontró que no existe correlación, habiendo entre 2 y 4 visitas mensuales en la mayoría de los casos sin importar distancia ni ubicación. El monto sí resultó estar relacionado con los barrios de residencia de los clientes, donde en vecindarios de GSE de menores ingresos se compraba hasta un 50% más que en otros. Se propone para trabajos futuros incorporar la variable GSE y comprobar si es que ésta juega un rol fundamental en el monto comprado, así como también ampliar el estudio georeferenciado a otras dimensiones, como análisis de canastas por barrio, de modo de complementar mejor promociones personalizadas para cada cliente según el lugar donde viva.
5

Representing uncertainty analyses : Proposing guidelines for the design and presentation of representations of uncertainty analyses for position estimations in crime scene visualizations

Iversen, Katarina January 2022 (has links)
At the Swedish National Forensic Centre [Nationellt Forensiskt Centrum] (NFC) 3D-models are being used to document crime scenes, and visualizations based on 3D-models are being used in court. In addition to this, 3D-models of crime scenes allows for new methods to be developed and used. One of these are position estimations in 3D-models based on 2D-images. The software program P3KA has been developed at NFC for the purpose of conducting assisted position estimations with uncertainty analyses in 3D-models. The objective of the current study was to develop guidelines for the design and presentation of the uncertainty analyses produced by P3KA. The research questions that the current study aimed to answer were as follows. - How should uncertainty analyses for position estimations in crime scene visualizations be designed and presented? - What guidelines can support the process of designing and presenting uncertainty analyses for position estimations in crime scene visualizations? The concept of uncertainties is multifaceted and can be defined to include both statistical uncertainties and the uncertainty of scientific judgement. Uncertainties are unavoidable, and the field of forensic science is no exception. Previous studies have investigated the use of heat maps as a strategy for representing uncertainty. This strategy was applied to represent the uncertainty analyses produced by P3KA in an effort to create intuitive and comprehensible representation of uncertainty. In addition to studies regarding the representation of uncertainty, the field of information visualization provided a theoretical foundation on which the first version of guidelines could be developed. The guidelines were then evaluated through an iterative process consisting of three focus groups with members of the public, journalists, and communicators, as well as eight interviews with actors working within the justice system. All these groups have different relationships to crime scene visualizations, and could therefore contribute with knowledge about the domain, and different perspectives regarding the representation of uncertainty analyses for position estimations in crime scene visualizations. This was important to ensure that the representation was interpreted as intended. The guidelines were adjusted between each iteration, and finally one last version of the guidelines was established. Thus, answering the second of two research questions. The results from the current study furthermore showed that uncertainty analyses for position estimations in crime scene visualizations should be designed as single-colored heat maps that use a change of hue and boarders to distinguish levels of uncertainty within the representation. There should also be a clear marking that indicates the estimated position. When an uncertainty analysis is presented, it should be accompanied by the purpose of the position estimation; the results from the position estimation; the conclusions that can be drawn based on the position estimation; and the context for the position estimation. A crime scene visualization containing a position estimation should also be accompanied by documentation of the procedure. Additional views of the visualization or scales can be added to support the recipients understanding for spatial relationship and distances at the scene of the crime. Finally, the elements that are included in the crime scene visualization containing a position estimation and an uncertainty should be explained, through a legend for example. By creating guidelines for the design and presentation for representations of uncertainty analyses for position estimations, a standardized and transparent process can be achieved. Thus, supporting the legal security of the evidence that position estimations and crime scene visualizations constitute. The guidelines also open for a discussion regarding bias in the field of forensic science.
6

Multi-Rotor--Aided Three-Dimensional 802.11 Wireless Heat Mapping

Pack, Scott James 18 March 2014 (has links) (PDF)
Traditional wireless site surveys produce a heat-map of link strength or quality over a target area, usually on the ground plane. In recent years research has gone into using aerial drones in network attack and surveillance, making three dimensional awareness of wireless coverage areas of interest. A multi-rotor drone and data collection module were built and tested as part of this research. Site assessments were conducted both in open space and near structures. Collected data was interpolated across the target area, and visualized as points and contours. These visualizations were exported to a Keyhole Markup Language (KML) for visualization in context. Resulting visualizations proved to be beneficial in identifying the coverage area of both authorized and rogue access points.
7

Turning Up the Heat!: Using Fault-Localizing Heat Maps to Help Students Improve Their Code

Edmison, Kenneth Robert, Jr. 16 December 2019 (has links)
Automated grading systems provide feedback to computer science students in a variety of ways, but often focus on incorrect program behaviors. These tools will provide indications of test case failures or runtime errors, but without debugging skills, students often become frus- trated when they don't know where to start. They know their code has defects, but finding the problem may be beyond their experience, especially for beginners. An additional concern is balancing the need to provide enough direction to be useful, without giving the student so much direction that they are effectively given the answer. Drawing on the experiences of the software engineering community, in this work we apply a technique called statistical fault location (SFL) to student program assignments. Using the GZoltar software tool, we applied this technique to a set of previously-submitted student assignments gathered from students in our introductory CS course, CS 1114: Introduction to Software Design. After a manual inspection of the student code, this exercise demonstrated that the SFL technique identifies the defective method in the first three most suspicious methods in the student's code 90% of the time. We then developed a plug-in for Web-CAT to allow new student submissions to be evaluated with the GZoltar SFL system. Additionally, we developed a tool to create a heat map visualization to show the results of the SFL evaluation overlaid on the student's source code. We deployed this toolset for use in CS 1114 in Fall 2017. We then surveyed the students about their perceptions of the utility of the visualization for helping them understand how to find and correct the defects in their code, versus not having access to the heat map. Their responses led to refinements in our presentation of the feedback. We also evaluated the performance of CS 1114 classes from two semesters and discovered that having the heat maps led to more frequent incremental improvements in their code, as well as reaching their highest correctness score on instructor-provided tests more quickly than students that did not have access to the heat maps. Finally, we suggest several directions for future enhancements to the feedback interface. / Doctor of Philosophy / Automated grading systems provide feedback to computer science students in a variety of ways, but often focus on incorrect program behaviors. These tools will provide indications of test case failures or runtime errors, but without debugging skills, students often become frus- trated when they don't know where to start. They know their code has defects, but finding the problem may be beyond their experience, especially for beginners. An additional concern is balancing the need to provide enough direction to be useful, without giving the student so much direction that they are effectively given the answer. Drawing on the experiences of the software engineering community, in this work we apply a technique called statistical fault location (SFL) to student program assignments. Using the GZoltar software tool, we applied this technique to a set of previously-submitted student assignments gathered from students in our introductory CS course, CS 1114: Introduction to Software Design. After a manual inspection of the student code, this exercise demonstrated that the SFL technique identifies the defective method in the first three most suspicious methods in the student's code 90% of the time. We then developed a plug-in for Web-CAT to allow new student submissions to be evaluated with the GZoltar SFL system. Additionally, we developed a tool to create a heat map visualization to show the results of the SFL evaluation overlaid on the student's source code. We deployed this toolset for use in CS 1114 in Fall 2017. We then surveyed the students about their perceptions of the utility of the visualization for helping them understand how to find and correct the defects in their code, versus not having access to the heat map. Their responses led to refinements in our presentation of the feedback. We also evaluated the performance of CS 1114 classes from two semesters and discovered that having the heat maps led to more frequent incremental improvements in their code, as well as reaching their highest correctness score on instructor-provided tests more quickly than students that did not have access to the heat maps. Finally, we suggest several directions for future enhancements to the feedback interface.
8

Trendy v retail bankovnictví a jejich dopad na IT architekturu banky / Trends in retail banking and their impact on bank’s IT architecture

Jabůrek, Tomáš January 2015 (has links)
The theme of this thesis are trends in retail banking and their impact on bank's IT architecture. The history teaches us that the ability to catch trends quickly and to use them can bring significant competitive advantage. At the same time some trends may pose a threat to the company and their (trends) early detection may prevent later problems. It is therefore important to monitor trends and evaluate their impact on bank's business. Roughly half of the overall bank costs consists of IT costs which are determined by IT architecture of the bank. Bank's IT is defined by IT architecture so it is useful to consider examining the impact of trends to the IT architecture. The aim of this thesis is to identify impact of trends in retail banking on bank's IT architecture. In the first part I analyze trends in retail banking in order to find out which are the key. In the next section I compare different reference IT architectures. Subsequently at the most appropriate architecture I identify impact of trends in retail banking on bank's IT architecture. Banks that perceive trends mentioned in this thesis as important and at the same time have similar architecture which I describe in this thesis may use my findings to gain competitive advantage or to take measures necessary to mitigate risks which are connected with coming trends which can have a negative impact on banks.
9

Map Engine with Route and Slope Prediction for Autonomous Vehicles in Offroad Applications

Stigenius, Erik January 2017 (has links)
With an imminent future of fully autonomous heavy duty vehicles in offroad applications, the need for advanced control system will increase accordingly. By implementing a raster map with tiles and pixels, to which a vehicle can record slope and position data while driving, it is possible to map earth's surface. By adding a heat parameter to every pixel, i.e. the number of passings through it historically, it is possible in future visits of the same are to generate a route prediction made up by the "hottest" pixels. By fetching the slope values in the hottest pixels, it is possible to generate a slope horizon that can be utilized by control systems, e.g. when planning gear shifts in hilly offroad terrain. To mange the incrementally growing map, a memory management system was implemented. It buffers the relevant map data from the database, i.e. the vehicles closest surroundings, which is then used for route prediction and horizon generation. As the vehicle moves into other areas, new data is read from the database, and the recently passed area is written back to the database, however updated from the recent passing. The system is implemented so that it runs through another application in the telematics electrical controller unit (ECU) in a Scania vehicle. The ECU contains a GNSS module from which the vehicle fetches satellite positioning data. Slope data is fetched from a slope sensor mounted on the truck. Due to implications during testing and debugging of the resulting application developed and implemented during this thesis project, the application's performance couldn't be assessed properly. However, it is concluded that the background the application is built on is reliable, although tweaks to get the application fit for usage in offroad terrain had to be made. Mainly, the horizon length and map building techniques should not be the same as in similar applications for onroad driving.
10

Diseño de red inalámbrica para una compañía del sector minero

Pascual Mendoza, Christian José 24 April 2021 (has links)
La siguiente tesis, es sobre el diseño de la red inalámbrica para una compañía del sector minero, utilizando fórmulas, estándares y buenas prácticas brindadas por diversas entidades internacionales, que nos permiten el mejor diseño posible. En el capítulo 1 se dará aspectos introductorios acerca de la compañía y los objetivos planteados. En el capítulo 2, se da soporte científico y teórico a la tecnología, estándares y especificaciones empleadas. En el capítulo 3, se plantea el problema a resolver, sus causas, consecuencias, requerimientos y posible solución. En el capítulo 4, a nivel técnico, se propone las especificaciones y mejores prácticas en el desarrollo del diseño como es: las frecuencias libres de 2.4 GHz para acceso a la red, 5 GHz para la utilización de mesh y la frecuencia de 60 GHz para los enlaces microondas. En el capítulo 5, se validará el diseño propuesto contra los objetivos específicos propuestos en el capítulo 1. Finalmente, en el capítulo 6 y 7, se da recomendaciones y conclusiones. / The following thesis is about the design of the wireless network for one mining company, using formulas, standards and good practices provided by various international entities, which allow us the best possible design. In chapter 1 introductory aspects about the company and its objectives will be given. In Chapter 2, scientific and theoretical support is given to the technology, standards and specifications used. In chapter 3, the problem to be solved, its causes, consequences, requirements and possible solution are presented. In chapter 4, at a technical level, the specifications and best practices in the development of the design are proposed, such as: the free frequencies of 2.4 GHz for network access, 5 GHz for the use of mesh and the frequency of 60 GHz for microwave links. In Chapter 5, the proposed design will be validated against the specific objectives proposed in Chapter 1. Finally, in Chapter 6 and 7, recommendations and conclusions are given. / Tesis

Page generated in 0.0562 seconds