• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 350
  • 134
  • 38
  • 33
  • 32
  • 31
  • 16
  • 12
  • 11
  • 10
  • 8
  • 6
  • 6
  • 6
  • 4
  • Tagged with
  • 782
  • 122
  • 89
  • 86
  • 84
  • 73
  • 65
  • 59
  • 53
  • 51
  • 51
  • 50
  • 44
  • 41
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
521

Design of an ultra-wideband microstrip antenna array with low size, weight and power

Staffan, Paul January 2019 (has links)
No description available.
522

Models and Graphics in the Analysis of Categorical Variables: The Case of the Youth Tobacco Survey.

Hosler, Deborah Susan 16 August 2002 (has links) (PDF)
Youth Tobacco Surveys have been conducted in several states in the U.S. in recent years, in order to design policies with the goal of reducing tobacco use among young people. Some primary analysis of those surveys has been done, but few analyses include modeling, and the study of independence has been addressed, mainly, in the bivariate context. In this work contemporary methods, which are of relative recent appearance in categorical data analysis, will be examined, including logistic and log-linear modeling as well as graphical displays and correspondence analysis. These methods will be applied to data from the 2000 Tennessee Youth Tobacco Survey. The objective is to demonstrate that methods of multivariate categorical data analysis can provide fresh insight about the behavior of adolescents with respect to tobacco use. The ultimate purpose of this work is to recommend methodology that goes beyond that which is currently published.
523

YSCAT Backscatter Distributions

Barrowes, Benjamin E. 14 May 2003 (has links) (PDF)
YSCAT is a unique ultrawideband microwave scatterometer developed to investigate the sea surface under a variety of environmental and radar parameters. The YSCAT94 experiment consisted of a six month deployment on the WAVES research tower operated by the Canada Center for inland Waters (CCIW). Over 3500 hours of data were collected at 2Γ 3.05Γ 5.3Γ 10.02Γ and 14 GHz and at a variety of wind speeds, relative azimuth angles, and incidence angle. A low wind speed "rolloff" of the normalized radar cross section (σ°) in YSCAT94 data is found and quantified. The rolloff wind speedΓ γΓ is estimated through regression estimation analysis using an Epanechnikov kernel. For YSCAT94 data, the rolloff is most noticeable at mid-range incidence angles with γ values ranging from 3 to 6 m/s. In order to characterized YSCAT94 backscatter distributions, a second order polynomial in log space is developed as a model for the probability of the radar cross sectionΓρ(σ°). Following Gotwols and ThompsonΓρ(σ°) is found to adhere to a log-normal distribution for horizontal polarization and a generalized log-normal distribution for vertical polarization. If ρ(α|σ°) is assumed to be Rayleigh distributed, the instantaneous amplitude distribution ρ(α) is found to be the integral of a Rayleigh/generalized log-normal distribution. A robust algorithm is developed to fit this probability density function to YSCAT94 backscatter distributions. The mean and variance of the generalized log-normal distribution are derived to facilitate this algorithm. Over 2700 distinct data cases sorted according to five different frequencies, horizontal and vertical polarizations, upwind and downwind, eight different incidence angles Γ1-10 m/s wind speeds, and 0.1-0.38 mean wave slope are considered. Definite trends are recognizable in the fitted parameters a1Γ a2Γ and C of the Rayleigh/generalized log-normal distribution when sorted according to wind speed and mean wave slope. At mid-range incidence angles, the Rayleigh/generalized log-normal distribution is found to adequately characterize both low and high amplitude portions of YSCAT94 backscatter distributions. However, at higher incidence angels (50°and 60°) the more general Weibull/generalized log-normal distributions is found to better characterized the low amplitude portion of the backscatter distributions.
524

Naive Bayesian Spam Filters for Log File Analysis

Havens, Russel William 13 July 2011 (has links) (PDF)
As computer system usage grows in our world, system administrators need better visibility into the workings of computer systems, especially when those systems have problems or go down. Most system components, from hardware, through OS, to application server and application, write log files of some sort, be it system-standardized logs such syslog or application specific logs. These logs very often contain valuable clues to the nature of system problems and outages, but their verbosity can make them difficult to utilize. Statistical data mining methods could help in filtering and classifying log entries, but these tools are often out of the reach of administrators. This research tests the effectiveness of three off-the-shelf Bayesian spam email filters (SpamAssassin, SpamBayes and Bogofilter) for effectiveness as log entry classifiers. A simple scoring system, the Filter Effectiveness Scale (FES), is proposed and used to compare these filters. These filters are tested in three stages: 1) the filters were tested with the SpamAssassin corpus, with various manipulations made to the messages, 2) the filters were tested for their ability to differentiate two types of log entries taken from actual production systems, and 3) the filters were trained on log entries from actual system outages and then tested on effectiveness for finding similar outages via the log files. For stage 1, messages were tested with normalized bodies, normalized headers and with each sentence from each message body as a separate message with a standardized message. The impact of each manipulation is presented. For stages 2 and 3, log entries were tested with digits normalized to zeros, with words chained together to various lengths and one or all levels of word chains used together. The impacts of these manipulations are presented. In each of these stages, it was found that these widely available Bayesian content filters were effective in differentiating log entries. Tables of correct match percentages or score graphs, according to the nature of tests and numbers of entries are presented, are presented, and FES scores are assigned to the filters according to the attributes impacting their effectiveness. This research leads to the suggestion that simple, off-the-shelf Bayesian content filters can be used to assist system administrators and log mining systems in sifting log entries to find entries related to known conditions (for which there are example log entries), and to exclude outages which are not related to specific known entry sets.
525

Fritidshus 2.0 / Cottage 2.0

Törnkvist, Frida, Metzler Sædén, Maria January 2019 (has links)
Detta är ett examensarbete gjort inom byggnadsingenjörsutbildningen, inriktning arkitektur, vid Kungliga Tekniska Högskolan. Att ha ett alternativt boende, en sommarstuga, ett fritidshus har varit en del av den svenska kulturen under lång tid. Från att bara ha varit ett privilegium för de rikaste blev fritidshus ett mer utbrett fenomen under 1900-talet. Syftet med detta examensarbete är att planera ett fritidshusområde och gestalta typhus utifrån dagens behov och förutsättningar. Tidigare litteratur och statistik har studerats, en egen utförd enkätundersökning samt intervjuer har utförts vilket legat till grund för examensarbetet. Resultatet presenteras i ett idékoncept där ett naturskönt område i Södermanland planeras att bebyggas med ett fritidshusområde. Stor vikt läggs vid att skapa ett boende som ska vara långsiktigt hållbart. Platsen och boendet ska erbjuda återhämtning och rekreation i närhet till naturen. / To have a second home, a country house, a summer cottage has been a part of Swedish culture for a long period of time. This report examines the phenomenon of leisure, cottages and cottage areas in a historical pretext. From being a benefit for those who are most well-off financially it became more and more common among ordinary people during the time of the twentieth century. How relevant the division between first and second homes are today, the different rules when it comes to construction, insulation and availability is discussed. The needs of our time are investigated and results in a draft for development of a property. A place close to Stockholm is selected. The ground is used as a basis for further development to a leisure area. Roads, joint facilities and houses are being planned close to a lake in the region Södermanland. The focus lies primarily on creating an area with buildings of durability and sustainability. The territory and the living areas are meant to offer recovery and recreation close to nature.
526

Integration of Hidden Markov Modelling and Bayesian Network for Fault Detection and Prediction of Complex Engineered Systems

Soleimani, Morteza, Campean, Felician, Neagu, Daniel 07 June 2021 (has links)
yes / This paper presents a methodology for fault detection, fault prediction and fault isolation based on the integration of hidden Markov modelling (HMM) and Bayesian networks (BN). This addresses the nonlinear and non-Gaussian data characteristics to support fault detection and prediction, within an explainable hybrid framework that captures causality in the complex engineered system. The proposed methodology is based on the analysis of the pattern of similarity in the log-likelihood (LL) sequences against the training data for the mixture of Gaussians HMM (MoG-HMM). The BN model identifies the root cause of detected/predicted faults, using the information propagated from the HMM model as empirical evidence. The feasibility and effectiveness of the presented approach are discussed in conjunction with the application to a real-world case study of an automotive exhaust gas Aftertreatment system. The paper details the implementation of the methodology to this case study, with data available from real-world usage of the system. The results show that the proposed methodology identifies the fault faster and attributes the fault to the correct root cause. While the proposed methodology is illustrated with an automotive case study, its applicability is much wider to the fault detection and prediction problem of any similar complex engineered system.
527

Keeping an Indefinitely Growing Audit Log / En kontinuerligt växande audit log

Andersson, Måns January 2022 (has links)
An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. The most common type of attack would be to try to remove or modify entries which contain information about some events in the system that a malicious actor does not want anyone to know about. In this thesis, the state-of-the-art research on secure logging is presented together with a design for a new logging system. The new design has superior properties in terms of both security and functionality compared to the current EJBCA implementation. The design is based on a combination of two well-cited logging schemes presented in the literature. Our design is an audit log built on a Merkle tree structure which enables efficient integrity proofs, flexible auditing schemes, efficient queries and exporting capabilities. On top of the Merkle tree structue, an FssAgg (Forward secure sequential Aggregate) MAC (Message Authentication Code) is introduced which strengthens the resistance to truncation-attacks and provides more options for auditing schemes. A proof-of-concept implementation was created and performance was measured to show that the combination of the Merkle tree log and the FssAgg MAC does not significantly reduce the performance compared to the individual schemes, while offering better security. The logging system design and the proof-of-concept implementation presented in this project will serve as a starting point for PrimeKey when developing a new audit log for EJBCA. / En granskningslogg är viktig eftersom den ger oss möjligheten att upptäcka misstänkt aktivitet i ett system. Granskningsloggen ger också möjligheten att undersöka och förstå ett säkerhetsintrång efter att det har inträffat. En attackerare som komprometterar ett system har ofta granskningsloggen som mål, eftersom de ofta vill dölja sina spår. I denna rapport presenteras en litteraturstudie av nuvarande forskning på säkra loggingsystem samt en design av ett nytt loggingsystem. Det nya loggingsystemet har bättre säkerhetsegentskaper och funktionalitet jämfört med den nuvarande implementationen i EJBCA. Designen bygger på en kombination av två välciterade forskningsartiklar. Vår design är en granskningslogg baserad på en Merkle träd-struktur som möjliggör effektiva bevis av loggens integritet, flexibel granskning, effektiv sökning och exportfunktionalitet. Förutom Merkle träd-strukturen består den nya loggen även av en FssAgg (Forward secure sequential Aggregate) MAC (Message Authentication Code) som förstärker loggens motstånd mot trunkeringsattacker och möjliggör fler sätt att granska loggen. En prototypimplementation skapades och prestandamätningar genomfördes som visar att kombinationen av Merkle träd-loggen och FssAgg MAC:en inte försämrar loggens prestanda jämfört med de individuella logglösningarna, trots att starkare säkerhet uppnås. Designen av det nya loggingsystemet samt prototypimplementationen kommer att utgöra en grund för PrimeKeys arbete med att implementera en ny audit log i EJBCA.
528

Sångtext, något att lägga på minnet? : En självstudie på utförande av minnestekniker / Song lyrics, something to remember? : A study on performing memory techniques

Höglund, Jonathan January 2023 (has links)
Detta är ett självständigt arbete som handlar om hur jag utforskar min egen övning där jag memorerar texter ur två olika sånger under två separata veckor. Arbetet genomförs ur ett sociokulturellt perspektiv och grundar sig i tidigare forskning och självständiga arbeten om minne och musicerande utantill. Arbetet har dokumenterats genom videoobservationer och loggboksanteckningar under övningstillfällen hösten 2022. Resultatet presenterar olika teman som observerats och svarar där igenom på mina frågeställningar vilka redskap jag använder mig av och vilka faktorer som påverkar svårighetsgraden på lärandet av olika texter. I diskussionen sätter jag resultatet i relation till tidigare litteratur kring ämnet, forskning och det sociokulturella perspektivet. / This is a self-study about how I study my own practice where I memorized two different song lyrics in two separate weeks. The study is made with a sociocultural perspective and is based on previous research and studies about memory and playing music without sheet music. The study was being documented through video recordings and notes in a logbook in the autumn of 2022. The result presents different themes that came to be observed and they answer my research questions about which cultural tools I use and what it is that affects the degree of difficulty when learning song lyrics. In the discussion I put my result in relation to the previous literature, research and the sociocultural perspective.
529

Inferences on the power-law process with applications to repairable systems

Chumnaul, Jularat 13 December 2019 (has links)
System testing is very time-consuming and costly, especially for complex high-cost and high-reliability systems. For this reason, the number of failures needed for the developmental phase of system testing should be relatively small in general. To assess the reliability growth of a repairable system, the generalized confidence interval and the modified signed log-likelihood ratio test for the scale parameter of the power-law process are studied concerning incomplete failure data. Specifically, some recorded failure times in the early developmental phase of system testing cannot be observed; this circumstance is essential to establish a warranty period or determine a maintenance phase for repairable systems. For the proposed generalized confidence interval, we have found that this method is not biased estimates which can be seen from the coverage probabilities obtained from this method being close to the nominal level 0.95 for all levels of γ and β. When the performance of the proposed method and the existing method are compared and validated regarding average widths, the simulation results show that the proposed method is superior to another method due to shorter average widths when the predetermined number of failures is small. For the proposed modified signed log-likelihood ratio test, we have found that this test performs well in controlling type I errors for complete failure data, and it has desirable powers for all parameters configurations even for the small number of failures. For incomplete failure data, the proposed modified signed log-likelihood ratio test is preferable to the signed log-likelihood ratio test in most situations in terms of controlling type I errors. Moreover, the proposed test also performs well when the missing ratio is up to 30% and n > 10. In terms of empirical powers, the proposed modified signed log-likelihood ratio test is superior to another test for most situations. In conclusion, it is quite clear that the proposed methods, the generalized confidence interval, and the modified signed log-likelihood ratio test, are practically useful to save business costs and time during the developmental phase of system testing since the only small number of failures is required to test systems, and it yields precise results.
530

A DIRECTION FINDING SYSTEM USING LOG PERIODIC DIPOLE ANTENNAS IN A SPARSELY SAMPLED LINEAR ARRAY

Weldon, Jonathan Andrew 08 July 2010 (has links)
No description available.

Page generated in 0.0304 seconds