• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 3
  • 3
  • 1
  • 1
  • Tagged with
  • 14
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

« […] sans m’arrêter un seul instant de débiter mes dit-il, et se dit-il, et demanda-t-il, et répondit-il, certaines formules des plus prometteuses […]. » (S. Beckett, L’Innommable) : L’incise de citation dans les genres narratifs / “[…] without ceasing for an instant to emit my "he said", and "he said to himself", and "he asked", and "he answered", a certain number of highly promising formulae […].” (S. Beckett, The Unnamable) : Interpolated clauses in narrative genres

Laferrière, Aude 21 November 2013 (has links)
L’incise de citation a mauvaise réputation dans le champ narratif, où elle est pourtant fort utile pour indiquer la source des répliques : elle soulève de nombreuses polémiques, tant sur le plan de la théorie que de la pratique. Peu traitée par les études grammaticales, elle est souvent fustigée par les discours normatifs dès qu’elle s’écarte du prototypique dit-il, au nom de transgressions de certaines règles syntaxiques et logiques, décourageant les auteurs qui déplorent sa monotonie de la déjouer par des variations distributives et lexicales. Ce travail vise à exposer les difficultés analytiques soulevées par cette forme, qui voit bon nombre de ses réalisations rejetées comme incorrectes, et à s’interroger sur les fondements de tels jugements. Le parcours diachronique d’un vaste corpus narratif invite à reconsidérer sa monotonie, en rendant compte de son histoire, qui est celle d’une diversification formelle et fonctionnelle : bien plus que simple escorte du dialogue qui se contenterait d’en indiquer les actants, elle possède de nombreux rôles textuels qui font d’elle un enjeu narratorial et esthétique. / Interpolated clauses have a bad reputation in the narrative field, although they are very useful in indicating the source of lines ; they arouse numerous theoretical as well as practical controversies. Seldom dealt with in grammatical studies, they are often censured by normative discourses whenever they stray from the prototypical he said, as they transgress certain syntactic and logical rules. This censure discourages those authors who lament their monotony from trying to avoid this thanks to distributive and lexical variations. This study aims at showing the analytical difficulties that are raised by this form – many variants of which are rejected as incorrect –, and seeks to question the bases of such judgments. Looking at a vast, diachronic corpus of narrative texts invites us to qualify its monotony by accounting for its history, one of formal and functional diversification : interpolated clauses do not accompagny dialogues simply to point out their speakers, they have many textual roles that put them at the centre of narratorial and aesthetic issues.
12

Signal Processing Algorithms For Digital Image Forensics

Prasad, S 02 1900 (has links)
Availability of digital cameras in various forms and user-friendly image editing softwares has enabled people to create and manipulate digital images easily. While image editing can be used for enhancing the quality of the images, it can also be used to tamper the images for malicious purposes. In this context, it is important to question the originality of digital images. Digital image forensics deals with the development of algorithms and systems to detect tampering in digital images. This thesis presents some simple algorithms which can be used to detect tampering in digital images. Out of the various kinds of image forgeries possible, the discussion is restricted to photo compositing (Photo montaging) and copy-paste forgeries. While creating photomontage, it is very likely that one of the images needs to be resampled and hence there will be an inconsistency in some of its underlying characteristics. So, detection of resampling in an image will give a clue to decide whether the image is tampered or not. Two pixel domain techniques to detect resampling have been presented. The rest of them exploits the property of periodic zeros that occur in the second divergences due to interpolation during resembling. It requires a special condition on the resembling factor to be met. The second technique is based on the periodic zero-crossings that occur in the second divergences, which does not require any special condition on the resembling factor. It has been noted that this is an important property of revamping and hence the decay of this technique against mild counter attacks such as JPEG compression and additive noise has been studied. This property has been repeatedly used throughout this thesis. It is a well known fact that interpolation is essentially low-pass filtering. In case of photomontage image which consists of resample and non resample portions, there will be an in consistency in the high-frequency content of the image. This can be demonstrated by a simple high-pass filtering of the image. This fact has also been exploited to detect photomontaging. One approach involves performing block wise DCT and reconstructing the image using only a few high-frequency coercions. Another elegant approach is to decompose the image using wavelets and reconstruct the image using only the diagonal detail coefficients. In both the cases mere visual inspection will reveal the forgery. The second part of the thesis is related to tamper detection in colour filter array (CFA) interpolated images. Digital cameras employ Bayer filters to efficiently capture the RGB components of an image. The output of Bayer filter are sub-sampled versions of R, G and B components and they are completed by using demosaicing algorithms. It has been shown that demos icing of the color components is equivalent to resembling the image by a factor of two. Hence, CFA interpolated images contain periodic zero-crossings in its second differences. Experimental demonstration of the presence of periodic zero-crossings in images captured using four digital cameras of deferent brands has been done. When such an image is tampered, these periodic zero-crossings are destroyed and hence the tampering can be detected. The utility of zero-crossings in detecting various kinds of forgeries on CFA interpolated images has been discussed. The next part of the thesis is a technique to detect copy-paste forgery in images. Generally, while an object or a portion if an image has to be erased from an image, the easiest way to do it is to copy a portion of background from the same image and paste it over the object. In such a case, there are two pixel wise identical regions in the same image, which when detected can serve as a clue of tampering. The use of Scale-Invariant-Feature-Transform (SIFT) in detecting this kind of forgery has been studied. Also certain modifications that can to be done to the image in order to get the SIFT working effectively has been proposed. Throughout the thesis, the importance of human intervention in making the final decision about the authenticity of an image has been highlighted and it has been concluded that the techniques presented in the thesis can effectively help the decision making process.
13

On Adaptive Filtering Using Delayless IFIR Structure : Analysis, Experiments And Application To Active Noise Control And Acoustic Echo Cancellation

Venkataraman, S 09 1900 (has links) (PDF)
No description available.
14

Applications of Adaptive Antennas in Third-Generation Mobile Communications Systems

Lau, Buon Kiong January 2002 (has links)
Adaptive antenna systems (AAS's) are traditionally of interest only in radar and sonar applications. However, since the onset of the explosive growth in demand for wireless communications during the 1990's, researchers are giving increasing attention to the use of AAS technology to overcome practical challenges in providing the service. The main benefit of the technology lies in its ability to exploit the spatial domain, on top of the temporal and frequency domains, to improve on transceiver performance. This thesis presents a unified study on two classes of preprocessing techniques for uniform circular arrays (UCA's). UCA's are of interest because of their natural ability to provide a full azimuth (i.e. 360') coverage found in typical scenarios for sensor array applications, such as radar, sonar and wireless communications. The two classes of preprocessing techniques studied are the Davies transformation and the interpolated array transformations. These techniques yield a mathematically more convenient form - the Vandermonde form - for the array steering vector via a linear transformation. The Vandermonde form is useful for different applications such as direction-of-arrival (DOA) estimation and optimum or minimum variance distortionless response (MVDR) beamforming in correlated signal environment and beampattem synthesis. A novel interpolated array transformation is proposed to overcome limitations in the existing interpolated array transformations. A disadvantage of the two classes of preprocessing techniques for UCA's with omnidirectional elements is the lack of robustness in the transformed array steering vector to array imperfections under certain conditions. In order to mitigate the robustness problem, optimisation problems are formulated to modify the transformation matrices. / Suitable optimisation techniques are then applied to obtain more robust transformations. The improved transformations are shown to improve robustness but at the cost of larger transformation errors. The benefits of the robustification procedure are most apparent in DOA estimation. In addition to the algorithm level studies, the thesis also investigates the use of AAS technology with respect to two different third generation (3G) mobile communications systems: Enhanced Data rates for Global Evolution (EDGE) and Wideband Code Division Multiple Access (WCDMA). EDGE, or more generally GSM/EDGE Radio Access Network (GERAN), is the evolution of the widely successful GSM system to provide 3G mobile services in the existing radio spectrum. It builds on the TDMA technology of GSM and relies on improved coding and higher order modulation schemes to provide packet-based services at high data rates. WCDMA, on the other hand, is based on CDMA technology and is specially designed and streamlined for 3G mobile services. For WCDMA, a single-user approach to DOA estimation which utilises the user spreading code and the pulse-shaped chip waveform is proposed. It is shown that the proposed approach produces promising performance improvements. The studies with EDGE are concerned with the evaluation of a simple AAS at the system and link levels. / Results from, the system and link level simulations are presented to demonstrate the effectiveness of AAS technology in the new mobile communications system. Finally, it is noted that the WCDMA and EDGE link level simulations employ the newly developed COST259 directional channel model, which is capable of producing accurate channel realisations of macrocell environments for the evaluation of AAS's.

Page generated in 0.0564 seconds